CN107220552B - A kind of encryption and decryption approaches and mobile terminal - Google Patents
A kind of encryption and decryption approaches and mobile terminal Download PDFInfo
- Publication number
- CN107220552B CN107220552B CN201710377339.7A CN201710377339A CN107220552B CN 107220552 B CN107220552 B CN 107220552B CN 201710377339 A CN201710377339 A CN 201710377339A CN 107220552 B CN107220552 B CN 107220552B
- Authority
- CN
- China
- Prior art keywords
- destination folder
- arrangement state
- state
- decryption
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of encryption and decryption approaches and mobile terminal, and wherein whether method includes: and detect the arrangement state of object in destination folder to change;If detecting, the arrangement state of object in the destination folder is changed, and the arrangement state of object in the destination folder after variation is compared with preset decryption arrangement state;If the arrangement state of object matches with the decryption arrangement state in the destination folder, decrypted state is set by the target object for being in encrypted state in the destination folder.The embodiment of the present invention can be realized the privacy protection to target object;Multiple target objects can be uniformly controlled by destination folder, improve mobile terminal to the control efficiency of target object;The arrangement state of object is not only intuitive, simple to operation for a user, but also be not easy to discover for other people as encryption and decryption means using in destination folder, improves the safety that target object encrypts.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of encryption and decryption approaches and mobile terminals.
Background technique
As mobile terminal intelligence degree increasingly improves, the purposes of mobile terminal is more and more extensive.In mobile terminal
Various objects (such as application program, file) are that the life of user brings convenience.With pay class application program (APP,
Application for), this class object almost becomes indispensable object of most of user installation in mobile terminal.Usually this
It include individual privacy information or property safety information in a little objects, these objects lack privacy protection at present, anyone is
Arbitrarily it can check or use, may cause individual privacy information exposure or property loss.As it can be seen that in existing mobile terminal
Object lack privacy protection.
Summary of the invention
The embodiment of the present invention provides a kind of encryption and decryption approaches and mobile terminal, to solve pair in existing mobile terminal
The problem of as lacking privacy protection.
In a first aspect, being applied to mobile terminal the embodiment of the invention provides a kind of encryption and decryption approaches, comprising:
Whether the arrangement state of object changes in detection destination folder;
If detecting, the arrangement state of object in the destination folder is changed, by the file destination after variation
The arrangement state of object is compared with preset decryption arrangement state in folder;
If the arrangement state of object matches with the decryption arrangement state in the destination folder, by the target
Target object in file in encrypted state is set as decrypted state;
Wherein, the starting permission of the target object in encrypted state and/or operating right are in off state;It is described
Arrangement state include: the number of object in the destination folder, the putting in order of object, in the spread geometry of object at least
One.
Second aspect, the embodiment of the present invention also provide a kind of mobile terminal, comprising:
Whether first detection module, the arrangement state for detecting object in destination folder change;
Comparison module, if for detecting that the arrangement state of object in the destination folder changes, after changing
The destination folder in the arrangement state of object be compared with preset decryption arrangement state;
First setup module, if arrangement state and the decryption arrangement state phase for object in the destination folder
Matching then sets decrypted state for the target object for being in encrypted state in the destination folder;
Wherein, the starting permission of the target object in encrypted state and/or operating right are in off state;It is described
Arrangement state include: the number of object in the destination folder, the putting in order of object, in the spread geometry of object at least
One.
The third aspect, the embodiment of the present invention also provide another mobile terminal, including processor, memory, are stored in institute
State the encryption and decryption process program that can be run on memory and on the processor, the encryption and decryption process program quilt
The step of processor realizes above-mentioned encryption and decryption approaches when executing.
Fourth aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, the computer-readable storage
Encryption and decryption process program is stored on medium, the encryption and decryption process program realizes above-mentioned add when being executed by processor
The step of close and decryption method.
In this way, whether being changed in the embodiment of the present invention by the arrangement state of object in detection destination folder;If inspection
The arrangement state for measuring object in the destination folder changes, then by the row of object in the destination folder after variation
Cloth state is compared with preset decryption arrangement state;If the arrangement state of object and the decryption in the destination folder
Arrangement state matches, then sets decrypted state for the target object for being in encrypted state in the destination folder.This hair
Bright embodiment can be realized the privacy protection to target object;It can be united by destination folder to multiple target objects
One control, is respectively controlled compared to single target object, improves mobile terminal to the control efficiency of target object;With
The arrangement state of object is used as encryption and decryption means in destination folder, not only intuitive, simple to operation for a user, and
And be not easy to discover for other people, improve the safety of target object encryption.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention
Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention,
For those of ordinary skill in the art, without any creative labor, it can also obtain according to these attached drawings
Take other attached drawings.
Fig. 1 is one of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention;
Fig. 2 is the two of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention;
Fig. 2-1 is the schematic diagram that destination folder provided in an embodiment of the present invention shows encryption identification;
Fig. 2-2 is the schematic diagram that destination folder provided in an embodiment of the present invention shows operation button;
Fig. 3 is the three of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention;
Fig. 4 is the four of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention;
Fig. 5 is one of the structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 6 is the two of the structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 7 is the three of the structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 8 is the four of the structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 9 is the five of the structure chart of mobile terminal provided in an embodiment of the present invention;
Figure 10 is the six of the structure chart of mobile terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, those of ordinary skill in the art's acquired every other implementation without creative efforts
Example, shall fall within the protection scope of the present invention.
It is one of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention referring to Fig. 1, Fig. 1, as shown in Figure 1,
This method is applied to mobile terminal, comprising the following steps:
Whether the arrangement state of object changes in step 101, detection destination folder.
The embodiment of the present invention is adapted to any object in mobile terminal, i.e. the embodiment of the present invention can be to mobile whole
Control is encrypted and decrypted in any object in end.For example, the object can be stored in the application program in mobile terminal
APP (such as social category APP, payment class APP, media player or browser etc.), is also possible to be stored in mobile terminal
Miscellaneous Documents (such as picture, audio, video or document etc.).
The embodiment of the present invention is real by way of the arrangement state of object in setting destination folder and destination folder
The purpose that now target object in destination folder is encrypted or decrypted.
Here, target object is different from the object of common meaning, the object of common meaning can arbitrarily be checked or by
Use, target object can be checked or be used only under decrypted state, and can not then be checked in encrypted state or
Person is used.
Likewise, destination folder is different from the file of common meaning, the arrangement state of object is determined in destination folder
Fixed target object therein is in encrypted state or decrypted state.
In mobile terminal the quantity of destination folder can be at least one, the number of target object in each destination folder
Amount may be at least one.Destination folder can be any file in mobile terminal, for example, for consolidation picture
Photograph album file is set to the desktop folder that consolidation APP is used on mobile terminal desktop for the file of consolidation document,
Etc..
Wherein, the arrangement state of object may include at least one of following in destination folder: object in destination folder
Title;The number of object in destination folder;Object puts in order in destination folder;The row of object in destination folder
Column shape.The different arrangement state of complexity can be arranged according to encryption requirements in user.
The embodiment of the present invention lays particular emphasis on the method that the target object in encrypted state is decrypted, individually below from step
Rapid 101 are specifically described to step 103.
In the step, whether the arrangement state that mobile terminal can detecte object in destination folder is changed.It can manage
Xie Wei, target object is in encrypted state in current goal file.If detecting the arrangement shape of object in destination folder
State changes, then continues to execute step 102;If the arrangement state that object in destination folder is not detected changes, tie
The beam process.
If step 102 detects that the arrangement state of object in the destination folder changes, described in after variation
The arrangement state of object is compared with preset decryption arrangement state in destination folder.
In a step 101, if mobile terminal detects that the arrangement state of object in destination folder changes, at this
In step, the arrangement state of object in the destination folder after the available variation of mobile terminal, and the target after variation is literary
The arrangement state of object is compared with decryption arrangement state in part folder.
Wherein, it is pre-set to can be user for decryption arrangement state, and after setting, decryption arrangement state is become
Decrypt the password of target object in destination folder.At any time, user can be to the decryption arrangement state set before
It is modified.
It, will if the arrangement state of object matches with the decryption arrangement state in step 103, the destination folder
Target object in the destination folder in encrypted state is set as decrypted state.
In a step 102, if the arrangement state of object matches with decryption arrangement state in destination folder, at this
In step, mobile terminal can set decrypted state for the target object for being in encrypted state in destination folder.It can manage
Xie Wei, the starting permission and/or operating right of the target object in encrypted state are in off state.
So far, the target object in destination folder, which is decrypted, completes, and user can check or using in destination folder
Target object.
As it can be seen that user can make mobile terminal that will be in and add by adjusting the arrangement state of object in the destination folder
The target object of close state is decrypted.It is readily appreciated that, user's (or mobile terminal) can also be by adjusting the destination folder
The arrangement state of middle object encrypts mobile terminal by the target object in decrypted state, it is thus possible to realize to mesh
Mark the privacy protection of object;Multiple target objects can be uniformly controlled by destination folder, compared to single
Target object is respectively controlled, and improves mobile terminal to the control efficiency of target object;With object in destination folder
Arrangement state is used as encryption and decryption means, not only intuitive, simple to operation for a user, but also is not easy to discover for other people,
Improve the safety of target object encryption
In the embodiment of the present invention, above-mentioned mobile terminal can be any equipment with file setting function, such as: meter
Calculation machine (Computer), mobile phone, tablet computer (Tablet Personal Computer), laptop computer (Laptop
Computer), personal digital assistant (personal digital assistant, abbreviation PDA), mobile Internet access electronic equipment
(Mobile Internet Device, MID), wearable device (Wearable Device) etc..
Whether the encryption and decryption approaches of the embodiment of the present invention, the arrangement state for detecting object in destination folder have change
Change;If detecting, the arrangement state of object in the destination folder is changed, will be in the destination folder after variation
The arrangement state of object is compared with preset decryption arrangement state;If in the destination folder arrangement state of object with
The decryption arrangement state matches, then sets decryption shape for the target object for being in encrypted state in the destination folder
State.In this way, the embodiment of the present invention passes through the decryption arrangement state preset for decrypting target object, in destination folder
When the arrangement state of object and decryption arrangement state match, target object is decrypted, it is on the contrary then to target object into
Row encryption.As it can be seen that the embodiment of the present invention can be realized the privacy protection to target object;It can be by destination folder to more
A target object is uniformly controlled, and is respectively controlled compared to single target object, improves mobile terminal to target
The control efficiency of object;The arrangement state of object is as encryption and decryption means using in destination folder, for a user not
It is only intuitive, simple to operation, and be not easy to discover for other people, improve the safety of target object encryption.
Referring to fig. 2, Fig. 2 is the two of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention, as shown in Fig. 2,
This method is applied to mobile terminal, comprising the following steps:
Step 201, the encryption information to destination folder for receiving user's input.
Wherein, encryption information includes: at least one corresponding target object of destination folder, the corresponding solution of destination folder
Solid matter cloth state and at least one corresponding encryption arrangement state of destination folder.
In the embodiment of the present invention, can corresponding encryption information, the encryption information be arranged for destination folder in advance in user
It may include at least one corresponding target object of destination folder and the corresponding decryption arrangement state of destination folder.With
During presetting encryption information the number for the object for including in destination folder can be arranged according to the demand of user in family
Which measure, specifically comprising information such as target objects in destination folder.At any time, user can add to what is set before
Confidential information is modified, to realize the update of encryption information.
It is in advance destination folder setting encryption information by user, user can be according to itself in the embodiment of the present invention
Habit and demand, to encryption information carry out flexible setting.
The embodiment of the present invention is adapted to any object in mobile terminal, i.e. the embodiment of the present invention can be to mobile whole
Control is encrypted and decrypted in any object in end.For example, the object can be stored in the application program in mobile terminal
APP (such as social category APP, payment class APP, media player or browser etc.), is also possible to be stored in mobile terminal
Miscellaneous Documents (such as picture, audio, video or document etc.).
For example, at least one corresponding target object of destination folder can be set in user are as follows: short message APP, wechat APP,
Phone APP and photograph album APP, it is that the destination folder only wraps that the corresponding decryption arrangement state of the destination folder, which can be set, in user
Include aforementioned four APP and put in order it is unlimited, user can be set the destination folder it is corresponding at least one encryption arrangement shape
State include: any one of aforementioned four APP APP removed into the destination folder and be added in the destination folder to
Few other APP.
Step 202, detection are to the object moving operation of the destination folder.
The embodiment of the present invention is real by way of the arrangement state of object in setting destination folder and destination folder
The purpose that now target object in destination folder is encrypted or decrypted.
Wherein, the arrangement state of object may include at least one of following in destination folder: object in destination folder
Title;The number of object in destination folder;Object puts in order in destination folder;The row of object in destination folder
Column shape.The different arrangement state of complexity can be arranged according to encryption requirements in user.
The embodiment of the present invention lays particular emphasis on the method that the target object in encrypted state is decrypted, individually below from step
Rapid 202 are specifically described to step 204.
In the step, mobile terminal can detecte the object moving operation to destination folder, it can be understood as, current mesh
Target object is in encrypted state in mark file.If detected to the object moving operation of destination folder, show mesh
The arrangement state of object changes in mark file, then continues to execute step 203;If pair to destination folder is not detected
As moving operation, then shows that the arrangement state of object in destination folder does not change, then terminate the process.
Optionally, the object moving operation in step 202 includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
In embodiment of the present invention, the object moving operation of destination folder can be to move at least one object and be somebody's turn to do
Operation in destination folder is also possible to removing at least one object into the operation in the destination folder, can also be shifting
The operation for moving position of at least one object in the destination folder in the destination folder can also be two kinds of any of the above
Or the combination of a variety of operations.The above object moving operation strong operability is not only simple but also quick when operation.
For example, the encryption for receiving user's input refers in step 201 after the encryption information of the good destination folder of user setting
It enables, sets encrypted state for the target object of the destination folder.For example, it may be including short message APP, wechat APP, electricity
It talks about and increases a game APP in the file destination of APP and photograph album APP, and phone APP is removed into the destination folder.
After user inputs encrypted instruction, user can not open short message APP, wechat APP, phone APP and photograph album APP
Dynamic and/or operation.
If desired user starts and/or operates the target object in encrypted state, then needing will be in the destination folder
Arrangement state be adjusted to decryption arrangement state.That is, in step 202, user can be to pair in destination folder
As being moved, for example, the game APP in the destination folder can be removed the destination folder, and again by phone APP
Move into the destination folder.
If step 203 detects the object moving operation, by the destination folder after the object moving operation
The arrangement state of middle object is compared with preset decryption arrangement state.
In step 202, if mobile terminal detects the object moving operation to destination folder, in the step
In, after the available object moving operation of mobile terminal, the arrangement state of object in destination folder, and what be will acquire is somebody's turn to do
Arrangement state is compared with decryption arrangement state.
Wherein, it is pre-set to can be user for decryption arrangement state, and after setting, decryption arrangement state is become
Decrypt the password of target object in destination folder.At any time, user can be to the decryption arrangement state set before
It is modified.
For example, mobile terminal can be by movement after user carries out moving operation to object in destination folder in step 202
Arrangement state after operation is compared with the decryption arrangement state being arranged in step 201.
If the game APP in the destination folder is removed the destination folder by user, and phone APP is moved into again
The destination folder, then the arrangement state after moving operation matches with the decryption arrangement state being arranged in step 201.It is no
Then, then it mismatches.
It, will if the arrangement state of object matches with the decryption arrangement state in step 204, the destination folder
Target object in the destination folder in encrypted state is set as decrypted state.
In step 203, if the arrangement state of object matches with decryption arrangement state in destination folder, at this
In step, mobile terminal can set decrypted state, thus energy for the target object for being in encrypted state in destination folder
Enough realize protects the privacy of target object;Multiple target objects can be uniformly controlled by destination folder, phase
Than being respectively controlled in single target object, mobile terminal is improved to the control efficiency of target object;With file destination
In folder object arrangement state as encryption and decryption means, it is not only intuitive, simple to operation for a user, and be not easy for
Other people discover, and improve the safety of target object encryption.
For example, the game APP in the destination folder is removed the destination folder by user, and phone APP is moved again
Enter the destination folder, the arrangement state of object matches with decryption arrangement state in destination folder, in destination folder
This four APP of short message APP, wechat APP, phone APP and photograph album APP are changed to decrypted state by encrypted state, and user can be with
Any of them APP is started and/or operated.
So far, the target object in destination folder, which is decrypted, completes, and user can check or using in destination folder
Target object.
As it can be seen that user can be by the object moving operation to destination folder, to adjust object in the destination folder
Arrangement state, mobile terminal is decrypted will in the target object of encrypted state.It is readily appreciated that, user (or it is mobile whole
End) it can also be made by the object moving operation to destination folder to adjust the arrangement state of object in the destination folder
Mobile terminal encrypts the target object in decrypted state.
In the embodiment of the present invention, other than step 201 to step 203, remaining step can be with invention shown in FIG. 1
Embodiment is identical, and to avoid repeating, same section is not repeated.
As a kind of preferable encryption and decryption approaches, one or several target objects can be gathered as one, when
And if only if user could open the mesh in destination folder when containing all corresponding target objects in destination folder
Object is marked, i.e. decryption arrangement state is the arrangement state in destination folder comprising all corresponding target objects.
User or mobile terminal wherein some target object or certain several target object can will remove file destination
Folder, perhaps toward one or several plain objects of immigration in destination folder or by the sequence of target object in destination folder
It is adjusted, or moves into one or several other destination folders pair for being different from the destination folder in destination folder
Target object answered, etc., to achieve the purpose that encryption.
When user needs to decrypt the target object in destination folder, can by inverse operations, for example, by removal certain
One target object or certain several target object move into destination folder again, or the plain objects that will move into remove target text
Part folder, the sequence of target object in destination folder is perhaps adjusted to correct sequence or what be will move into be different from the target
The corresponding target object of other destination folders of file removes the destination folder, etc..
Optionally, the destination folder shows encryption identification.
In embodiment of the present invention, encryption identification can be shown on destination folder by mobile terminal, such as Fig. 2-1 institute
Show, the upper left corner of destination folder shows an encryption identification 211, is convenient for user area partial objectives for file and normal folder.
In addition, encryption identification can change with the cryptographic attributes of file and be changed, when the encryption function of file is opened
When, encryption identification can be shown on destination folder;When the encryption function of file is closed, the encryption identification of this document folder
It can disappear.
It should be noted that the form that is particularly shown of encryption identification is not limited to form shown in Fig. 2-1.
Embodiment of the present invention can also embodiment as shown in connection with fig. 1 implemented, to avoid repeating, this is not done superfluous
It states.
Optionally, operation button is shown in the destination folder, the operation button includes configuration button, moves into and press
Button at least one of removes button or moves in and out button.
In embodiment of the present invention, mobile terminal can in destination folder display operation button, as shown in Fig. 2-2,
In this way, user can carry out corresponding operation by operation button.Wherein, operation button can be configuration button, as in Fig. 2-2
Upper left side in destination folder shows a configuration button 221, which can be used to configure to destination folder
Encryption information.Operation button, which can also be, moves into button 222, and moving into button 222 can help user to move object into target text
Part folder;Moving into button 222 can also be removal button, user can be helped to move the object out destination folder;Move into button 222
It can also be and move in and out button, user can be helped to move object into or remove destination folder.User can also directly by
Any one object in destination folder removes destination folder by drag operation, can also be by any outside destination folder
A object moves into file by drag operation.
It should be noted that the form that is particularly shown of operation button is not limited to form shown in Fig. 2-2.
Embodiment of the present invention can also embodiment as shown in connection with fig. 1 implemented, to avoid repeating, this is not done superfluous
It states.
The encryption and decryption approaches of the embodiment of the present invention detect the object moving operation to the destination folder;If inspection
The object moving operation is measured, then by the arrangement state of object and institute in the destination folder after the object moving operation
Decryption arrangement state is stated to be compared;If the arrangement state of object and the decryption arrangement state phase in the destination folder
Match, then sets decrypted state for the target object for being in encrypted state in the destination folder.In this way, the embodiment of the present invention
By presetting the decryption arrangement state for decrypting target object, the arrangement state Yu the solution of object in destination folder
When solid matter cloth state matches, target object is decrypted, it is on the contrary then target object is encrypted.As it can be seen that the present invention is real
Apply example can be realized to target object privacy protection;Unified control can be carried out to multiple target objects by destination folder
System, is respectively controlled compared to single target object, improves mobile terminal to the control efficiency of target object;With target
The arrangement state of object is used as encryption and decryption means in file, not only intuitive, simple to operation for a user, but also not
Easily discover for other people, improves the safety of target object encryption.
It is the three of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention referring to Fig. 3, Fig. 3, as shown in figure 3,
This method is applied to mobile terminal, comprising the following steps:
Whether the arrangement state of object changes in step 301, detection destination folder.
In the embodiment of the present invention, the arrangement state of object may include at least one of following in destination folder:
The title of object in destination folder;
The number of object in destination folder;
Object puts in order in destination folder;
The spread geometry of object in destination folder.
The different arrangement state of complexity can be arranged according to encryption requirements in user.
The embodiment of the present invention is laid particular emphasis on, and the target object in encrypted state is decrypted, and will be in decrypted state
The method that is encrypted of target object, be specifically described individually below from step 301 to step 306.
In the step, whether the arrangement state that mobile terminal can detecte object in destination folder is changed.It can manage
Xie Wei, target object is in encrypted state in current goal file.If detecting the arrangement shape of object in destination folder
State changes, then continues to execute step 302;If the arrangement state that object in destination folder is not detected changes, tie
The beam process.
If step 302 detects that the arrangement state of object in the destination folder changes, described in after variation
The arrangement state of object is compared with preset decryption arrangement state in destination folder.
In step 301, if mobile terminal detects that the arrangement state of object in destination folder changes, at this
In step, the arrangement state of object in the destination folder after the available variation of mobile terminal, and the target after variation is literary
The arrangement state of object is compared with decryption arrangement state in part folder.
It, will if the arrangement state of object matches with the decryption arrangement state in step 303, the destination folder
Target object in the destination folder in encrypted state is set as decrypted state.
In step 302, if the arrangement state of object matches with decryption arrangement state in destination folder, at this
In step, mobile terminal can set decrypted state for the target object for being in encrypted state in destination folder.
Step 304, detection triggering command.
In this step, mobile terminal can detect triggering command.Wherein, which is pre-set
For triggering the instruction encrypted to target object.
Here, triggering command, which can be mobile terminal and put out, shields corresponding instruction, and it is corresponding to be also possible to mobile terminal screen locking
Instruction is also possible to mobile terminal shutdown or restarts corresponding instruction, can also be that mobile terminal receives some user's operation
The instruction of (such as to clicking operation of trigger button, gesture graph etc.).
If step 305 detects the triggering command, the target pair of decrypted state will be in the destination folder
As being set as encrypted state.
In step 304, if mobile terminal detects triggering command, in this step, mobile terminal can be responded
The target object for being in decrypted state in destination folder is set encrypted state by the triggering command.At this point, destination folder
In target object encrypted state is transformed by decrypted state, user cannot check or using the target in destination folder
Object.It is to be understood that the starting permission and/or operating right of the target object in decrypted state are open state.
The arrangement state of object in the destination folder is adjusted to preset first encryption arrangement state by step 306.
Since the embodiment of the present invention is the arrangement state by object in setting destination folder and destination folder
Mode realizes the purpose that the target object in destination folder is encrypted or decrypted.In step 305, destination folder
In target object encrypted state is transformed by decrypted state, correspondingly, in this step, mobile terminal is needed target
The arrangement state of object is adjusted in file, it can the arrangement state of object in destination folder is adjusted to first and is added
Solid matter cloth state.
It should be noted that the sequencing that step 305 is executed with step 306 in the embodiment of the present invention is not construed as limiting, it can
To execute step 306 again after executing step 305, step 305, Huo Zhetong can also be executed again after step 306 is performed
Shi Zhihang step 305 and step 306.Fig. 3 shows the case where being performed simultaneously.
Wherein, the first encryption arrangement state can be user or mobile terminal is pre-set, and each destination folder can
At least one first encryption arrangement state is arranged.When a destination folder it is corresponding first encryption arrangement state be two or
When more than two, any first encryption arrangement state is can be randomly selected in mobile terminal.For the setting of each destination folder
Multiple first encryption arrangement states, are conducive to improve level of encryption.
In the embodiment of the present invention, other than step 303 to step 306, remaining step can with shown in Fig. 1 or Fig. 2
Inventive embodiments it is identical, to avoid repeating, same section is not repeated.
Optionally, the step of whether the arrangement state of object changes in the detection destination folder, comprising:
Detect the object moving operation to the destination folder;
If the arrangement state of object changes in the destination folder, by the destination folder after variation
The step of arrangement state of middle object is compared with preset decryption arrangement state, comprising:
If detecting the object moving operation, by object in the destination folder after the object moving operation
Arrangement state is compared with the decryption arrangement state.
In embodiment of the present invention, the arrangement shape of object in destination folder can be adjusted by object moving operation
State, reference can be made to illustrating in inventive embodiments shown in Fig. 2 does not repeat this to avoid repeating.
Optionally, the object moving operation includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
In embodiment of the present invention, the object moving operation of destination folder can be to move at least one object and be somebody's turn to do
Operation in destination folder is also possible to removing at least one object into the operation in the destination folder, can also be shifting
The operation for moving position of at least one object in the destination folder in the destination folder can also be two kinds of any of the above
Or the combination of a variety of operations.
Optionally, described before the step of whether the arrangement state of object changes in the detection destination folder
Method further include:
Receive the encryption information to the destination folder of user's input;
In embodiment of the present invention, corresponding encryption information can be set for destination folder in advance, specifically, mobile whole
End can receive user's input to the encryption information of destination folder.
Wherein, which may include: at least one corresponding target object of destination folder, destination folder pair
At least one corresponding first encryption arrangement state of the decryption arrangement state and destination folder answered.
Embodiment of the present invention by user be in advance destination folder be arranged encryption information, user can according to itself
Habit and demand carry out flexible setting to encryption information.
Embodiment of the present invention can be combined with embodiment progress embodiment shown in FIG. 1 and not make to avoid repeating to this
It repeats.
As a kind of preferable encryption and decryption approaches, one or several target objects can be gathered as one, when
And if only if user could open the mesh in destination folder when containing all corresponding target objects in destination folder
Object is marked, i.e. decryption arrangement state is the arrangement state in destination folder comprising all corresponding target objects.
User or mobile terminal wherein some target object or certain several target object can will remove file destination
Folder, perhaps toward one or several plain objects of immigration in destination folder or by the sequence of target object in destination folder
It is adjusted, or moves into one or several other destination folders pair for being different from the destination folder in destination folder
Target object answered, etc., to achieve the purpose that encryption.
When user needs to decrypt the target object in destination folder, can by inverse operations, for example, by removal certain
One target object or certain several target object move into destination folder again, or the plain objects that will move into remove target text
Part folder, the sequence of target object in destination folder is perhaps adjusted to correct sequence or what be will move into be different from the target
The corresponding target object of other destination folders of file removes the destination folder, etc..
Optionally, the destination folder shows encryption identification.
In embodiment of the present invention, encryption identification can be shown on destination folder by mobile terminal, destination folder
The upper left corner show an encryption identification.Embodiment of the present invention can be in order to user area partial objectives for file and ordinary file
Folder.
In addition, encryption identification can change with the cryptographic attributes of file and be changed, when the encryption function of file is opened
When, encryption identification can be shown on destination folder;When the encryption function of file is closed, the encryption identification of this document folder
It can disappear.
Optionally, operation button is shown in the destination folder, the operation button includes configuration button, moves into and press
Button at least one of removes button or moves in and out button.
In embodiment of the present invention, mobile terminal can in destination folder display operation button, in this way, user can be with
Corresponding operation is carried out by operation button.Wherein, operation button can be configuration button, which can be used to mesh
It marks file and configures encryption information.Operation button can also be immigration button, and moving into button can help user to move object into
Destination folder;Operation button can also be removal button, and removing button can help user to move the object out destination folder;
Operation button, which can also be, moves in and out button, this, which moves in and out button, can help user to move object into or remove target
File.
In the embodiment of the present invention, by the way that triggering command is arranged, allow mobile terminal when detecting triggering command, certainly
It is dynamic that target object in destination folder is changed to encrypted state by decrypted state, it is manually changed without user.On the one hand, it mentions
The high intelligence degree of mobile terminal, reduces the operation of user;On the other hand, it is possible to reduce because user carelessness due to fail and
When risk that target object is protected.
Whether the encryption and decryption approaches of the embodiment of the present invention, the arrangement state for detecting object in destination folder have change
Change;If detecting, the arrangement state of object in the destination folder is changed, will be in the destination folder after variation
The arrangement state of object is compared with preset decryption arrangement state;If in the destination folder arrangement state of object with
The decryption arrangement state matches, then sets decryption shape for the target object for being in encrypted state in the destination folder
State;Detect triggering command;If detecting the triggering command, the target object in the destination folder is set as encrypting
State;The arrangement state of object in the destination folder is adjusted to preset first encryption arrangement state.In this way, of the invention
Embodiment passes through the decryption arrangement state preset for decrypting target object, the arrangement state of object in destination folder
When matching with decryption arrangement state, target object is decrypted, it is on the contrary then target object is encrypted.As it can be seen that this
Inventive embodiments can be realized the privacy protection to target object;Multiple target objects can be carried out by destination folder
It is uniformly controlled, is respectively controlled compared to single target object, improve mobile terminal to the control efficiency of target object;
Using in destination folder the arrangement state of object as encryption and decryption means, it is not only intuitive, simple to operation for a user,
And be not easy to discover for other people, improve the safety of target object encryption.
Referring to fig. 4, Fig. 4 is the four of the flow chart of encryption and decryption approaches provided in an embodiment of the present invention, as shown in figure 4,
This method is applied to mobile terminal, comprising the following steps:
Whether the arrangement state of object changes in step 401, detection destination folder.
In the embodiment of the present invention, the arrangement state of object may include at least one of following in destination folder:
The title of object in destination folder;
The number of object in destination folder;
Object puts in order in destination folder;
The spread geometry of object in destination folder.
The different arrangement state of complexity can be arranged according to encryption requirements in user.
The embodiment of the present invention is laid particular emphasis on, and the target object in encrypted state is decrypted, and will be in decrypted state
The method that is encrypted of target object, be specifically described individually below from step 401 to step 404.
In the step, whether the arrangement state that mobile terminal can detecte object in destination folder is changed.It can manage
Xie Wei, target object is in encrypted state in current goal file.If detecting the arrangement shape of object in destination folder
State changes, then continues to execute step 402;If the arrangement state that object in destination folder is not detected changes, tie
The beam process.
If step 402 detects that the arrangement state of object in the destination folder changes, described in after variation
The arrangement state of object is compared with preset decryption arrangement state in destination folder.
In step 401, if mobile terminal detects that the arrangement state of object in destination folder changes, at this
In step, the arrangement state of object in the destination folder after the available variation of mobile terminal, and the target after variation is literary
The arrangement state of object is compared with decryption arrangement state in part folder.
It, will if the arrangement state of object matches with the decryption arrangement state in step 403, the destination folder
Target object in the destination folder in encrypted state is set as decrypted state.
In step 402, if the arrangement state of object matches with decryption arrangement state in destination folder, at this
In step, mobile terminal can set decrypted state for the target object for being in encrypted state in destination folder.
If step 404 detects the arrangement state of object in the destination folder by decryption arrangement state change
For preset second encryption arrangement state, then the target object for being in decrypted state in the destination folder is set as encrypting
State.
In the embodiment of the present invention, user, can under the scene for needing to encrypt the target object in destination folder
The purpose of encryption is realized with the arrangement state by adjusting object in destination folder.In the step, if mobile terminal detects
Into destination folder, the arrangement state of object is the second encryption arrangement state by decryption arrangement state change, then mobile terminal can
To set encrypted state for the target object for being in decrypted state in destination folder.
Wherein, second encryption arrangement state can be user it is pre-set and with decryption arrangement state arrangement state
Different any arrangement states.
For example, user need to borrow mobile terminal give other people in use, or it is other need the scene that encrypts under, Yong Huke
The arrangement state of object in the destination folder to be adjusted, keep its arrangement state different from decryption arrangement state.
The difference of the embodiment of the present invention and inventive embodiments shown in Fig. 3 is that the embodiment of the present invention is that user adjusts manually
The arrangement state of object in whole destination folder, inventive embodiments shown in Fig. 3 are that mobile terminal is detecting triggering command certainly
The arrangement state of object in dynamic adjustment destination folder.No matter may be implemented using which kind of above mode to destination folder
The purpose of middle target object encryption.
In the embodiment of the present invention, other than step 404, remaining step can be implemented with invention shown in fig. 1 or fig. 2
Example is identical, and to avoid repeating, same section is not repeated.
Optionally, the step of whether the arrangement state of object changes in the detection destination folder, comprising:
Detect the object moving operation to the destination folder;
If the arrangement state of object changes in the destination folder, by the destination folder after variation
The step of arrangement state of middle object is compared with preset decryption arrangement state, comprising:
If detecting the object moving operation, by object in the destination folder after the object moving operation
Arrangement state is compared with the decryption arrangement state.
In embodiment of the present invention, the arrangement shape of object in destination folder can be adjusted by object moving operation
State, reference can be made to illustrating in inventive embodiments shown in Fig. 2 does not repeat this to avoid repeating.
Optionally, the object moving operation includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
In embodiment of the present invention, the object moving operation of destination folder can be to move at least one object and be somebody's turn to do
Operation in destination folder is also possible to removing at least one object into the operation in the destination folder, can also be shifting
The operation for moving position of at least one object in the destination folder in the destination folder can also be two kinds of any of the above
Or the combination of a variety of operations.
The above object moving operation strong operability is not only simple but also quick when operation.
Optionally, described before the step of whether the arrangement state of object changes in the detection destination folder
Method further include:
Receive the encryption information to the destination folder of user's input;
In embodiment of the present invention, corresponding encryption information can be set for destination folder in advance, specifically, mobile whole
End can receive user's input to the encryption information of destination folder.
Wherein, which may include: at least one corresponding target object of destination folder, destination folder pair
At least one corresponding second encryption arrangement state of the decryption arrangement state and destination folder answered.
Embodiment of the present invention by user be in advance destination folder be arranged encryption information, user can according to itself
Habit and demand carry out flexible setting to encryption information.
As a kind of preferable encryption and decryption approaches, one or several target objects can be gathered as one, when
And if only if user could open the mesh in destination folder when containing all corresponding target objects in destination folder
Object is marked, i.e. decryption arrangement state is the arrangement state in destination folder comprising all corresponding target objects.
User or mobile terminal wherein some target object or certain several target object can will remove file destination
Folder, perhaps toward one or several plain objects of immigration in destination folder or by the sequence of target object in destination folder
It is adjusted, or moves into one or several other destination folders pair for being different from the destination folder in destination folder
Target object answered, etc., to achieve the purpose that encryption.
When user needs to decrypt the target object in destination folder, can by inverse operations, for example, by removal certain
One target object or certain several target object move into destination folder again, or the plain objects that will move into remove target text
Part folder, the sequence of target object in destination folder is perhaps adjusted to correct sequence or what be will move into be different from the target
The corresponding target object of other destination folders of file removes the destination folder, etc..
Optionally, the destination folder shows encryption identification.
In embodiment of the present invention, encryption identification can be shown on destination folder by mobile terminal, destination folder
The upper left corner show an encryption identification.Embodiment of the present invention can be in order to user area partial objectives for file and ordinary file
Folder.
In addition, encryption identification can change with the cryptographic attributes of file and be changed, when the encryption function of file is opened
When, encryption identification can be shown on destination folder;When the encryption function of file is closed, the encryption identification of this document folder
It can disappear.
Optionally, operation button is shown in the destination folder, the operation button includes configuration button, moves into and press
Button at least one of removes button or moves in and out button.
In embodiment of the present invention, mobile terminal can in destination folder display operation button, in this way, user can be with
Corresponding operation is carried out by operation button.Wherein, operation button can be configuration button, which can be used to mesh
It marks file and configures encryption information.Operation button can also be immigration button, and moving into button can help user to move object into
Destination folder;Operation button can also be removal button, and removing button can help user to move the object out destination folder;
Operation button, which can also be, moves in and out button, this, which moves in and out button, can help user to move object into or remove target
File.
Whether the encryption and decryption approaches of the embodiment of the present invention, the arrangement state for detecting object in destination folder have change
Change;If detecting, the arrangement state of object in the destination folder is changed, will be in the destination folder after variation
The arrangement state of object is compared with preset decryption arrangement state;If in the destination folder arrangement state of object with
The decryption arrangement state matches, then sets decryption shape for the target object for being in encrypted state in the destination folder
State;If detecting, the arrangement state of object in the destination folder is added by decryption arrangement state change for preset second
Solid matter cloth state then sets encrypted state for the target object for being in decrypted state in the destination folder.In this way, this hair
Bright embodiment passes through the decryption arrangement state preset for decrypting target object, the arrangement shape of object in destination folder
State and decryption arrangement state are decrypted target object when matching, on the contrary then encrypt to target object.As it can be seen that
The embodiment of the present invention can be realized the privacy protection to target object;Can by destination folder to multiple target objects into
Row is uniformly controlled, and is respectively controlled compared to single target object, is improved mobile terminal and is imitated to the control of target object
Rate;The arrangement state of object is as encryption and decryption means using in destination folder, not only intuitive, operation letter for a user
Victory, and be not easy to discover for other people, improve the safety of target object encryption.
It is one of the structure chart of mobile terminal provided in an embodiment of the present invention referring to Fig. 5, Fig. 5, as shown in figure 5, mobile whole
End 500, including first detection module 501, comparison module 502 and the first setup module 503, wherein first detection module 501 with
Comparison module 502 connects, and comparison module 502 is connect with the first setup module 503.
Whether first detection module 501, the arrangement state for detecting object in destination folder change;
Comparison module 502, if for detecting that the arrangement state of object in the destination folder changes, it will variation
The arrangement state of object is compared with preset decryption arrangement state in the destination folder afterwards;
First setup module 503, if for the arrangement state of object in the destination folder and decryption arrangement shape
State matches, then sets decrypted state for the target object for being in encrypted state in the destination folder;
Wherein, the starting permission of the target object in encrypted state and/or operating right are in off state;It is described
Arrangement state include: the number of object in the destination folder, the putting in order of object, in the spread geometry of object at least
One.
Optionally, first detection module 501 is specifically used for: detecting the object moving operation to the destination folder;
Comparison module 502 is specifically used for: if detecting the object moving operation, by institute after the object moving operation
The arrangement state for stating object in destination folder is compared with the decryption arrangement state.
Optionally, the object moving operation includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
Optionally, as shown in fig. 6, mobile terminal 500 further include:
Second detection module 504, for detecting triggering command, the triggering command is to be pre-set for triggering to institute
State the instruction that target object is encrypted;
Second setup module 505, if decryption will be in the destination folder for detecting the triggering command
The target object of state is set as encrypted state;
Module 506 is adjusted, for the arrangement state of object in the destination folder to be adjusted to preset first encryption
Arrangement state;
Wherein, the starting permission of the target object in decrypted state and/or operating right are open state.
Optionally, as shown in fig. 7, mobile terminal 500 further include:
Third setup module 507, if for detecting the arrangement state of object in the destination folder by the decryption
State change of arranging is preset second encryption arrangement state, then the target pair of decrypted state will be in the destination folder
As being set as encrypted state;
Wherein, the second encryption arrangement state is different from the decryption arrangement state of arrangement state.
Optionally, as shown in figure 8, mobile terminal 500 further include:
Receiving module 508, for receiving the encryption information to the destination folder of user's input;
Wherein, the encryption information includes: at least one corresponding target object of the destination folder, the target text
Part presss from both sides corresponding decryption arrangement state and at least one corresponding encryption arrangement state of the destination folder.
Optionally, the object includes application program or file.
Mobile terminal 500 can be realized each process that mobile terminal is realized in the embodiment of the method for Fig. 1 to Fig. 4, to keep away
Exempt to repeat, which is not described herein again.
Whether the mobile terminal 500 of the embodiment of the present invention, the arrangement state for detecting object in destination folder change;If
Detect that the arrangement state of object in the destination folder changes, then by object in the destination folder after variation
Arrangement state is compared with preset decryption arrangement state;If the arrangement state Yu the solution of object in the destination folder
Solid matter cloth state matches, then sets decrypted state for the target object for being in encrypted state in the destination folder.This
Sample, the embodiment of the present invention pass through the decryption arrangement state preset for decrypting target object, the object in destination folder
Arrangement state and decryption arrangement state when matching, target object is decrypted, it is on the contrary then target object is added
It is close.As it can be seen that the embodiment of the present invention can carry out private protection to target object.
The embodiment of the present invention also provides a kind of mobile terminal, including processor, and memory is stored on the memory simultaneously
The encryption and decryption process program that can be run on the processor, the encryption and decryption process program are held by the processor
Each process of above-mentioned encryption and decryption approaches embodiment is realized when row, and can reach identical technical effect, to avoid repeating,
Which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored with and adds on computer readable storage medium
Close and decryption processing routine, the encryption and decryption process program realize that above-mentioned encryption and decryption approaches are real when being executed by processor
Each process of example is applied, and identical technical effect can be reached, to avoid repeating, which is not described herein again.Wherein, the calculating
Machine readable storage medium storing program for executing, such as read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random
Access Memory, abbreviation RAM), magnetic or disk etc..
Referring to five that Fig. 9, Fig. 9 are the structure charts that the present invention implements the mobile terminal provided, as shown in figure 9, mobile terminal
900 include: at least one processor 901, memory 902, at least one network interface 904 and user interface 903.Mobile terminal
Various components in 900 are coupled by bus system 905.It is understood that bus system 905 for realizing these components it
Between connection communication.Bus system 905 further includes power bus, control bus and status signal in addition to including data/address bus
Bus.But for the sake of clear explanation, various buses are all designated as bus system 905 in Fig. 9.
Wherein, user interface 903 may include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 902 in the embodiment of the present invention can be volatile memory or nonvolatile memory,
It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read-
Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable
Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or
Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high
Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory
(Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory
(Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate
SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct
Rambus RAM, DRRAM).Memory 902 described herein is intended to include but is not limited to these and any other suitable type
Memory.
In some embodiments, memory 902 stores following element, executable modules or data structures, or
Their subset of person or their superset: operating system 9021 and application program 9022.
Wherein, operating system 9021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for
Realize various basic businesses and the hardware based task of processing.Application program 9022 includes various application programs, such as media
Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention
The program of method may be embodied in application program 9022.
In embodiments of the present invention, mobile terminal 900 further include: be stored on memory 902 and can be on processor 901
The encryption and decryption process program of operation specifically can be the encryption and decryption process program in application program 9022, encryption
Following steps are realized when being executed with decryption processing routine by processor 901: the arrangement state of object is in detection destination folder
It is no to change;If detecting, the arrangement state of object in the destination folder is changed, by the target text after variation
The arrangement state of object is compared with preset decryption arrangement state in part folder;If the arrangement of object in the destination folder
State matches with the decryption arrangement state, then sets the target object that encrypted state is in the destination folder to
Decrypted state;Wherein, the starting permission of the target object in encrypted state and/or operating right are in off state;Institute
State arrangement state include: the number of object in the destination folder, the putting in order of object, in the spread geometry of object extremely
One item missing.
The method that the embodiments of the present invention disclose can be applied in processor 901, or be realized by processor 901.
Processor 901 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each
Step can be completed by the integrated logic circuit of the hardware in processor 901 or the instruction of software form.Above-mentioned processing
Device 901 can be general processor, digital signal processor (Digital Signal Processor, DSP), dedicated integrated electricity
Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general
Processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with institute of the embodiment of the present invention
The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor
And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only
In the computer readable storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The meter
Calculation machine readable storage medium storing program for executing is located at memory 902, and processor 901 reads the information in memory 902, completes in conjunction with its hardware
The step of stating method.Specifically, encryption and decryption process program, encryption and decryption are stored on the computer readable storage medium
Each step such as above-mentioned encryption and decryption approaches embodiment is realized when processing routine is executed by processor 901.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its
Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (Application
Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing,
DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic
Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor,
In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein
The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or
It is realized outside processor.
Optionally, can also be achieved following steps when encryption and decryption process program is executed by processor 901: detection is to described
The object moving operation of destination folder;It, will be described after the object moving operation if detecting the object moving operation
The arrangement state of object is compared with the decryption arrangement state in destination folder.
Optionally, the object moving operation includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
Optionally, can also be achieved following steps when encryption and decryption process program is executed by processor 901: detection triggering refers to
It enables, the triggering command is pre-set for triggering the instruction encrypted to the target object;If detecting described
Triggering command then sets encrypted state for the target object for being in decrypted state in the destination folder;By the target
The arrangement state of object is adjusted to preset first encryption arrangement state in file;Wherein, the mesh in decrypted state
The starting permission and/or operating right for marking object are open state.
Optionally, following steps be can also be achieved when encryption and decryption process program is executed by processor 901: if detecting institute
The arrangement state for stating object in destination folder encrypts arrangement state by decryption arrangement state change for preset second, then
Encrypted state is set by the target object for being in decrypted state in the destination folder;Wherein, the second encryption arrangement
State is different from the decryption arrangement state of arrangement state.
Optionally, following steps be can also be achieved when encryption and decryption process program is executed by processor 901: it is defeated to receive user
The encryption information to the destination folder entered;
Wherein, the encryption information includes: at least one corresponding target object of the destination folder, the target text
Part presss from both sides corresponding decryption arrangement state and at least one corresponding encryption arrangement state of the destination folder.
Optionally, the object includes application program or file.
Mobile terminal 900 can be realized each process that mobile terminal is realized in previous embodiment, to avoid repeating, here
It repeats no more.
Whether the mobile terminal 900 of the embodiment of the present invention, the arrangement state for detecting object in destination folder change;If
Detect that the arrangement state of object in the destination folder changes, then by object in the destination folder after variation
Arrangement state is compared with preset decryption arrangement state;If the arrangement state Yu the solution of object in the destination folder
Solid matter cloth state matches, then sets decrypted state for the target object for being in encrypted state in the destination folder.This
Sample, the embodiment of the present invention pass through the decryption arrangement state preset for decrypting target object, the object in destination folder
Arrangement state and decryption arrangement state when matching, target object is decrypted, it is on the contrary then target object is added
It is close.It can be seen that, it is seen then that the embodiment of the present invention can be realized the privacy protection to target object;Destination folder pair can be passed through
Multiple target objects are uniformly controlled, and are respectively controlled compared to single target object, improve mobile terminal to mesh
Mark the control efficiency of object;The arrangement state of object is as encryption and decryption means using in destination folder, for a user
It is not only intuitive, simple to operation, but also be not easy to discover for other people, improve the safety of target object encryption.
Referring to Fig. 10, Figure 10 is the six of the structure chart that the present invention implements the mobile terminal provided, it is as shown in Figure 10, mobile
Terminal 1000 includes radio frequency (Radio Frequency, RF) circuit 1010, memory 1020, input unit 1030, display unit
1040, processor 1050, voicefrequency circuit 1060, communication module 1070, power supply 1080.
Wherein, input unit 1030 can be used for receiving the number or character information of user's input, and generate with movement eventually
The related signal input of the user setting and function control at end 1000.Specifically, in the embodiment of the present invention, the input unit
1030 may include touch panel 1031.Touch panel 1031, also referred to as touch screen collect the touching of user on it or nearby
It touches operation (for example user uses the operations of any suitable object or attachment on touch panel 1031 such as finger, stylus), and
Corresponding attachment device is driven according to preset formula.Optionally, touch panel 1031 may include touch detecting apparatus and
Two parts of touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation bring letter
Number, transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into
Contact coordinate, then give the processor 1050, and order that processor 1050 is sent can be received and executed.Furthermore, it is possible to
Touch panel 1031 is realized using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel
1031, input unit 1030 can also include other input equipments 1032, other input equipments 1032 can include but is not limited to
One of physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are more
Kind.
Wherein, display unit 1040 can be used for showing information input by user or be supplied to the information and movement of user
The various menu interfaces of terminal 1000.Display unit 1040 may include display panel 1041, optionally, using LCD or can have
The forms such as machine light emitting diode (Organic Light-Emitting Diode, OLED) configure display panel 1041.
It should be noted that touch panel 1031 can cover display panel 1041, touch display screen is formed, when the touch display screen
After detecting touch operation on it or nearby, processor 1050 is sent to determine the type of touch event, is followed by subsequent processing
Device 1050 provides corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area
And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious
Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with
The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area
Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example,
Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 1050 is the control centre of mobile terminal 1000, utilizes various interfaces and connection whole mobile phone
Various pieces, by running or execute the software program and/or module that are stored in first memory 1021, and call and deposit
The data in second memory 1022 are stored up, the various functions and processing data of mobile terminal 1000 are executed, thus eventually to movement
End 1000 carries out integral monitoring.Optionally, processor 1050 may include one or more processing units.
In embodiments of the present invention, mobile terminal 1000 further include: be stored on memory 1021 and can be in processor
The encryption and decryption process program run on 1050 specifically can be the encryption and decryption process program in application program, add
Close and decryption processing routine realizes following steps when being executed by processor 1050: the arrangement state of object in detection destination folder
Whether change;If detecting, the arrangement state of object in the destination folder is changed, by the target after variation
The arrangement state of object is compared with preset decryption arrangement state in file;If the row of object in the destination folder
Cloth state matches with the decryption arrangement state, then the target object that encrypted state is in the destination folder is arranged
For decrypted state;Wherein, the starting permission of the target object in encrypted state and/or operating right are in off state;
The arrangement state includes: that the number of object in the destination folder, object put in order, in the spread geometry of object
At least one of.
Optionally, can also be achieved following steps when encryption and decryption process program is executed by processor 1050: detection is to institute
State the object moving operation of destination folder;If detecting the object moving operation, by institute after the object moving operation
The arrangement state for stating object in destination folder is compared with the decryption arrangement state.
Optionally, the object moving operation includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
Optionally, can also be achieved following steps when encryption and decryption process program is executed by processor 1050: detection triggers
Instruction, the triggering command are pre-set for triggering the instruction encrypted to the target object;If detecting institute
Triggering command is stated, then sets encrypted state for the target object for being in decrypted state in the destination folder;By the mesh
The arrangement state of object is adjusted to preset first encryption arrangement state in mark file;Wherein, in described in decrypted state
The starting permission and/or operating right of target object are open state.
Optionally, following steps be can also be achieved when encryption and decryption process program is executed by processor 1050: if detecting
The arrangement state of object is preset second encryption arrangement state by decryption arrangement state change in the destination folder,
Then encrypted state is set by the target object for being in decrypted state in the destination folder;Wherein, the second encryption row
Cloth state is different from the decryption arrangement state of arrangement state.
Optionally, following steps be can also be achieved when encryption and decryption process program is executed by processor 1050: receiving user
The encryption information to the destination folder of input;
Wherein, the encryption information includes: at least one corresponding target object of the destination folder, the target text
Part presss from both sides corresponding decryption arrangement state and at least one corresponding encryption arrangement state of the destination folder.
Optionally, the object includes application program or file.
Mobile terminal 1000 can be realized each process that mobile terminal is realized in previous embodiment, to avoid repeating, this
In repeat no more.
Whether the mobile terminal 1000 of the embodiment of the present invention, the arrangement state for detecting object in destination folder change;
If detecting, the arrangement state of object in the destination folder is changed, by object in the destination folder after variation
Arrangement state be compared with preset decryption arrangement state;If in the destination folder arrangement state of object with it is described
Decryption arrangement state matches, then sets decrypted state for the target object for being in encrypted state in the destination folder.
In this way, the embodiment of the present invention passes through the decryption arrangement state preset for decrypting target object, it is right in destination folder
When the arrangement state of elephant and decryption arrangement state match, target object is decrypted, on the contrary it is then to target object progress
Encryption.It can be seen that, it is seen then that the embodiment of the present invention can be realized the privacy protection to target object;Destination folder can be passed through
Multiple target objects are uniformly controlled, is respectively controlled compared to single target object, improves mobile terminal pair
The control efficiency of target object;The arrangement state of object is as encryption and decryption means using in destination folder, for user
Speech is not only intuitive, simple to operation, but also is not easy to discover for other people, improves the safety of target object encryption.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of mobile terminal and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed mobile terminal and method can pass through it
Its mode is realized.For example, mobile terminal embodiment described above is only schematical, for example, the unit is drawn
Point, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can
To combine or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or beg for
The mutual coupling, direct-coupling or communication connection of opinion can be through some interfaces, mobile terminal or unit it is indirect
Coupling or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.Some or all of unit therein can be selected to realize the embodiment of the present invention according to the actual needs
Purpose.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program code
Medium.
Encryption and decryption process program, the encryption and decryption process journey are stored on the computer readable storage medium
Realization when sequence is executed by processor: whether the arrangement state of object changes in detection destination folder;If detecting the mesh
The arrangement state of object changes in mark file, then by the arrangement state of object in the destination folder after variation and in advance
If decryption arrangement state be compared;If the arrangement state of object and the decryption arrangement state phase in the destination folder
Matching then sets decrypted state for the target object for being in encrypted state in the destination folder;Wherein, in encryption shape
The starting permission and/or operating right of the target object of state are in off state;The arrangement state includes: the target text
The number of object in part folder, the putting in order of object, in the spread geometry of object at least one of.
Optionally, realization when the encryption and decryption process program is executed by processor: detection is to the destination folder
Object moving operation;If detecting the object moving operation, by the destination folder after the object moving operation
The arrangement state of middle object is compared with the decryption arrangement state.
Optionally, the object moving operation includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
Optionally, realization when the encryption and decryption process program is executed by processor: detection triggering command, the triggering
Instruction is pre-set for triggering the instruction encrypted to the target object;If detecting the triggering command,
Encrypted state is set by the target object for being in decrypted state in the destination folder;By object in the destination folder
Arrangement state be adjusted to it is preset first encryption arrangement state;Wherein, the starting of the target object in decrypted state
Permission and/or operating right are open state.
Optionally, realization when the encryption and decryption process program is executed by processor: if detecting the file destination
The arrangement state of object is preset second encryption arrangement state by decryption arrangement state change in folder, then by the target
Target object in file in decrypted state is set as encrypted state;Wherein, it is described second encryption arrangement state with it is described
The arrangement state for decrypting arrangement state is different.
Optionally, realization when the encryption and decryption process program is executed by processor: receive user input to described
The encryption information of destination folder;Wherein, the encryption information includes: at least one corresponding target pair of the destination folder
As the corresponding decryption arrangement state of destination folder and at least one corresponding encryption arrangement shape of the destination folder
State.
Optionally, the object includes application program or file.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (16)
1. a kind of encryption and decryption approaches are applied to mobile terminal characterized by comprising
Whether the arrangement state of object changes in detection destination folder;
If detecting, the arrangement state of object in the destination folder is changed, will be in the destination folder after variation
The arrangement state of object is compared with preset decryption arrangement state;
If the arrangement state of object matches with the decryption arrangement state in the destination folder, by the file destination
Target object in folder in encrypted state is set as decrypted state;
Wherein, the starting permission of the target object in encrypted state and/or operating right are in off state;The arrangement
State includes: the title of object in the destination folder, the number of object, the putting in order of object, the spread geometry of object
At least one of in.
2. the method according to claim 1, wherein the arrangement state of object is in the detection destination folder
No the step of changing, comprising:
Detect the object moving operation to the destination folder;
It, will be right in the destination folder after variation if the arrangement state of object changes in the destination folder
The step of arrangement state of elephant is compared with preset decryption arrangement state, comprising:
If detecting the object moving operation, by the arrangement of object in the destination folder after the object moving operation
State is compared with the decryption arrangement state.
3. according to the method described in claim 2, it is characterized in that, the object moving operation includes at least one of the following:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
4. the method according to claim 1, wherein encrypted state will be in the destination folder described
Target object the step of being set as decrypted state after, the method also includes:
Triggering command is detected, the triggering command is pre-set for triggering the finger encrypted to the target object
It enables;
If detecting the triggering command, the target object that decrypted state is in the destination folder is set as encrypting
State;
The arrangement state of object in the destination folder is adjusted to preset first encryption arrangement state;
Wherein, the starting permission of the target object in decrypted state and/or operating right are open state.
5. the method according to claim 1, wherein encrypted state will be in the destination folder described
Target object the step of being set as decrypted state after, the method also includes:
If detecting, the arrangement state of object in the destination folder by decryption arrangement state change is preset second
Arrangement state is encrypted, then sets encrypted state for the target object for being in decrypted state in the destination folder;
Wherein, the second encryption arrangement state is different from the decryption arrangement state of arrangement state.
6. the method according to claim 1, wherein in the arrangement state for detecting object in destination folder
Before the step of whether changing, the method also includes:
Receive the encryption information to the destination folder of user's input;
Wherein, the encryption information includes: at least one corresponding target object of the destination folder, the destination folder
Corresponding decryption arrangement state and at least one corresponding encryption arrangement state of the destination folder.
7. the method according to claim 1, wherein the object includes application program or file.
8. a kind of mobile terminal characterized by comprising
Whether first detection module, the arrangement state for detecting object in destination folder change;
Comparison module, if for detecting that the arrangement state of object in the destination folder changes, by the institute after variation
The arrangement state for stating object in destination folder is compared with preset decryption arrangement state;
First setup module, if arrangement state and the decryption arrangement state phase for object in the destination folder
Match, then sets decrypted state for the target object for being in encrypted state in the destination folder;
Wherein, the starting permission of the target object in encrypted state and/or operating right are in off state;The arrangement
State includes: the title of object in the destination folder, the number of object, the putting in order of object, the spread geometry of object
At least one of in.
9. mobile terminal according to claim 8, which is characterized in that the first detection module is specifically used for: detection pair
The object moving operation of the destination folder;
The comparison module is specifically used for:, will be described after the object moving operation if detecting the object moving operation
The arrangement state of object is compared with the decryption arrangement state in destination folder.
10. mobile terminal according to claim 9, which is characterized in that the object moving operation includes following at least one
:
At least one object is moved into the operation of the destination folder;
At least one object is removed to the operation of the destination folder;
The operation of position of at least one object in the destination folder in the mobile destination folder.
11. mobile terminal according to claim 8, which is characterized in that the mobile terminal further include:
Second detection module, for detecting triggering command, the triggering command is pre-set for triggering to the target
The instruction that object is encrypted;
Second setup module, if decrypted state will be in the destination folder for detecting the triggering command
Target object is set as encrypted state;
Module is adjusted, for the arrangement state of object in the destination folder to be adjusted to preset first encryption arrangement shape
State;
Wherein, the starting permission of the target object in decrypted state and/or operating right are open state.
12. mobile terminal according to claim 8, which is characterized in that the mobile terminal further include:
Third setup module, if for detecting the arrangement state of object in the destination folder by the decryption arrangement state
Variation is preset second encryption arrangement state, then sets the target object that decrypted state is in the destination folder to
Encrypted state;
Wherein, the second encryption arrangement state is different from the decryption arrangement state of arrangement state.
13. mobile terminal according to claim 8, which is characterized in that the mobile terminal further include:
Receiving module, for receiving the encryption information to the destination folder of user's input;
Wherein, the encryption information includes: at least one corresponding target object of the destination folder, the destination folder
Corresponding decryption arrangement state and at least one corresponding encryption arrangement state of the destination folder.
14. mobile terminal according to claim 8, which is characterized in that the object includes application program or file.
15. a kind of mobile terminal, which is characterized in that including processor, memory is stored on the memory and can be described
The encryption and decryption process program run on processor, the encryption and decryption process program are realized when being executed by the processor
The step of encryption and decryption approaches as described in any one of claims 1 to 7.
16. a kind of computer readable storage medium, which is characterized in that be stored on the computer readable storage medium encryption and
Decryption processing program is realized when the encryption and decryption process program is executed by processor such as any one of claims 1 to 7 institute
The step of encryption and decryption approaches stated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710377339.7A CN107220552B (en) | 2017-05-25 | 2017-05-25 | A kind of encryption and decryption approaches and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710377339.7A CN107220552B (en) | 2017-05-25 | 2017-05-25 | A kind of encryption and decryption approaches and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107220552A CN107220552A (en) | 2017-09-29 |
CN107220552B true CN107220552B (en) | 2019-11-05 |
Family
ID=59945390
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710377339.7A Active CN107220552B (en) | 2017-05-25 | 2017-05-25 | A kind of encryption and decryption approaches and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107220552B (en) |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090282248A1 (en) * | 2008-05-09 | 2009-11-12 | International Business Machines Corporation. | Method and system for securing electronic mail |
CN102737199B (en) * | 2011-04-15 | 2017-01-25 | 富泰华工业(深圳)有限公司 | Electronic device with use authority management function and method |
CN103488918B (en) * | 2013-09-18 | 2016-09-14 | 广东欧珀移动通信有限公司 | Intelligent terminal applies encryption method and device |
KR102356549B1 (en) * | 2014-03-12 | 2022-01-28 | 삼성전자주식회사 | System and method for encrypting folder in device |
CN105868617B (en) * | 2016-03-25 | 2020-02-04 | 维沃移动通信有限公司 | Application program encryption method and mobile terminal |
CN105893854B (en) * | 2016-03-30 | 2019-04-12 | 北京小米移动软件有限公司 | Encryption and decryption method and device |
CN106250754B (en) * | 2016-07-27 | 2018-11-30 | 维沃移动通信有限公司 | A kind of control method and mobile terminal of application program |
CN106599702B (en) * | 2016-12-08 | 2020-02-07 | 武汉斗鱼网络科技有限公司 | File encryption and decryption method and device |
CN106599723B (en) * | 2016-12-19 | 2020-03-17 | 武汉斗鱼网络科技有限公司 | File encryption method and device and file decryption method and device |
-
2017
- 2017-05-25 CN CN201710377339.7A patent/CN107220552B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN107220552A (en) | 2017-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106127076B (en) | A kind of inspection method and mobile terminal of photograph album photo | |
CN104834449B (en) | The icon management method and device of mobile terminal | |
EP2390812B1 (en) | Method and apparatus for controlling objects of a user interface | |
CN107644170B (en) | A kind of image processing method and mobile terminal | |
CN106127003B (en) | A kind of fingerprint recognition unlocking method and mobile terminal | |
CN106228085B (en) | The method for secret protection and mobile terminal of application program | |
CN106203061B (en) | Encryption method of application program and mobile terminal | |
CN106156600B (en) | A kind of unlocking method and mobile terminal of application program | |
CN105827816B (en) | A kind of the split screen method and mobile terminal of terminal screen | |
CN105068723A (en) | Information processing method and electronic device | |
CN107506111A (en) | The encryption and decryption method and terminal of a kind of terminal applies | |
CN106250757B (en) | A kind of control method and mobile terminal of application program | |
CN107632870A (en) | The startup method and terminal of a kind of application | |
CN107229396A (en) | A kind of hiding method of mobile terminal application icon and mobile terminal | |
CN105243331A (en) | Encryption device and encryption method, and decryption device and decryption method | |
CN106384060B (en) | A kind of mobile terminal data encryption method and mobile terminal | |
CN106027794A (en) | Encryption method of photo and mobile terminal | |
CN106709457A (en) | Task execution method based on fingerprint, and mobile terminal | |
CN106355109A (en) | File encryption method and mobile terminal | |
CN106778344B (en) | A kind of data permission control method and terminal | |
CN106709320A (en) | Identity authentication method and mobile terminal | |
CN106648370B (en) | A kind of encryption method and mobile terminal of sectional drawing | |
CN106372492B (en) | A kind of encryption method and mobile terminal | |
CN107220552B (en) | A kind of encryption and decryption approaches and mobile terminal | |
WO2023160640A1 (en) | Application identifier control method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |