CN108197489A - A kind of processing method and processing unit for intelligent terminal secret file - Google Patents

A kind of processing method and processing unit for intelligent terminal secret file Download PDF

Info

Publication number
CN108197489A
CN108197489A CN201711459915.9A CN201711459915A CN108197489A CN 108197489 A CN108197489 A CN 108197489A CN 201711459915 A CN201711459915 A CN 201711459915A CN 108197489 A CN108197489 A CN 108197489A
Authority
CN
China
Prior art keywords
file
store path
access
secret
file store
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711459915.9A
Other languages
Chinese (zh)
Inventor
黎小松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuanying Information Technology Co Ltd
Original Assignee
Shanghai Chuanying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuanying Information Technology Co Ltd filed Critical Shanghai Chuanying Information Technology Co Ltd
Priority to CN201711459915.9A priority Critical patent/CN108197489A/en
Publication of CN108197489A publication Critical patent/CN108197489A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The present invention provides a kind of processing methods and processing unit for intelligent terminal secret file, the treating method comprises following steps:In the access rights that a file store path and the file store path are preset in an intelligent terminal;Judge whether the intelligent terminal receives an access operation for being directed to the file store path;When the intelligent terminal receives the access operation that one is directed to the file store path, judge the access operation whether by the access authority verification;When the access operation is by the access authority verification, the secret file under the file store path is allowed to be accessed.After adopting the above technical scheme, improving the processing speed to secret file, the user's operation stand-by period is saved, promotes user experience;Support the secret access process to large capacity file.

Description

A kind of processing method and processing unit for intelligent terminal secret file
Technical field
The present invention relates to intelligent terminal field more particularly to a kind of processing methods and place for intelligent terminal secret file Manage device.
Background technology
With the development of technology, the function of the intelligent terminals such as smart mobile phone, tablet computer is more and more, and processing capacity is more next More powerful, particularly described intelligent terminal internal storage has the file of magnanimity, above-mentioned including document, photo, audio, video etc. File is different according to the different sources either generated of its file type, is stored in position different in the intelligent terminal, Under namely different files.For certain files, particularly photo or video file, user wants to become these files Secret file, user must be by that could access, that is, " secret photograph album " function being commonly called as after Authority Verification.
The prior art be all by the way that video file or photo are encrypted, to realize secret photograph album, that is, Employ the mode that file is encrypted in itself.Traditional image encryption technology is based primarily upon modern password system, usually will Image pixel information regards one-dimensional data stream as, under the control of the key, using Encryption Algorithm (common Encryption Algorithm such as DES, AES, RSA etc.) it is encrypted.Digital image data amount is larger, and has the characteristics that very strong correlation between adjacent pixel so that one A little encryption technologies for being directed to text, it is impossible to fully meet the encrypted needs of image file.And to digital image encryption need compared with Big calculation amount, the memory of intelligent terminal is small, and operational capability is limited, therefore runs time-consuming longer.To the encrypted master of secret photograph album The thought wanted is that digital picture is carried out greyscale transformation and image scrambling.Greyscale transformation refers to change the gray value of image slices vegetarian refreshments Size so that before and after encryption, the content of pixel sequence changes completely.Image scrambling is exactly to upset the information order of image, A pixels being moved on the position of b pixels, b pixels are moved on the position of c pixels, and so on, it is made to be transformed into mixed and disorderly nothing Chapter is difficult to the image recognized.
The realization method process of the prior art is complex, and encryption times mistake can be caused when especially video file is excessive It is long, cause user experience bad, in certain intelligent terminals, many secret photograph albums do not support adding for the large capacities file such as video It is close.
Therefore how rapidly to realize the processing of secret file, support the privacy protection to large capacity file, promote user Experience, is a technical issues that need to address.
Invention content
In order to overcome above-mentioned technological deficiency, the purpose of the present invention is to provide a kind of places for intelligent terminal secret file Reason method and processing unit, can quickly access to secret file priority assignation and judgement, protect user privacy information.
The first aspect of the present invention discloses a kind of processing method for intelligent terminal secret file, including following step Suddenly:
In the access rights that a file store path and the file store path are preset in an intelligent terminal;
Judge whether the intelligent terminal receives an access operation for being directed to the file store path;
When the intelligent terminal receives the access operation that one is directed to the file store path, the access operation is judged Whether the access authority verification is passed through;
When the access operation is by the access authority verification, allow the secret file under the file store path It is accessed.
Preferably, when the access rights that the file store path is preset in the intelligent terminal, the access rights It is realized by the access limit for opening or closing the file store path corresponding folder.
Preferably, in the access rights that a file store path and the file store path are preset in the intelligent terminal The step of and judge the intelligent terminal whether receive one be directed to the file store path access operation the step of between, institute It is further comprising the steps of to state processing method:
Open the access limit of the file store path;
Secret file is sheared from former store path to the corresponding file of the file store path;
Record the former store path;
Close the access limit of the file store path.
Preferably, when the access operation is by the access authority verification, allow under the file store path After the step that secret file is accessed, the processing method is further comprising the steps of:
Open the access limit of the file store path;
User's operation is received, selection does not need to the secret file of privacy protection;
By the former store path of the secret paper cut for not needing to privacy protection to the secret file;
Close the access limit of the file store path.
Preferably, the secret file under the file store path is photo or video file;When the access operation is led to When crossing the access authority verification, the step that the secret file under the file store path is accessed is allowed to include:
Open the access limit of the file store path;
Scan the catalogue of the corresponding file of the file store path;
The secret file under the store path is checked by multimedia database.
The second aspect of the present invention also discloses a kind of processing unit for intelligent terminal secret file, including:
Presetting module, in the access right that a file store path and the file store path are preset in an intelligent terminal Limit;
First judgment module is connect with the presetting module, judges whether the intelligent terminal receives one for the text The access operation of part store path;
Second judgment module is connect with the presetting module and the first judgment module, when first judgment module judges When the intelligent terminal receives the access operation that one is directed to the file store path, judge whether the access operation passes through institute State access authority verification;
Access modules are connect with second judgment module, when second judgment module judges that the access operation is led to When crossing the access authority verification, the secret file under the file store path is allowed to be accessed.
Preferably, the presetting module in the intelligent terminal preset the file store path access rights when, The access rights are realized by opening or closing the access limit of the file store path corresponding folder.
Preferably, the processing unit further includes:
First opens module, opens the access limit of the file store path;
Secret file is sheared file corresponding to the file store path by the first shear module from former store path It is interior;
Logging modle is connect with first shear module, records the former store path;
First closedown module closes the access limit of the file store path.
Preferably, the processing unit further includes:
Second opens module, opens the access limit of the file store path;
Selecting module, receives user's operation, and selection does not need to the secret file of privacy protection;
Second shear module is connect with the selecting module and logging modle, by the secret for not needing to privacy protection Paper cut to the secret file former store path;
Second closedown module closes the access limit of the file store path.
Preferably, the secret file under the file store path is photo or video file;The access modules include:
Opening unit opens the access limit of the file store path;
Scanning element scans the catalogue of the corresponding file of the file store path;
It checks unit, is connect with the scanning element, the secret under the store path is checked by multimedia database File.
After employing above-mentioned technical proposal, compared with prior art, have the advantages that:
1. improving the processing speed to secret file, the user's operation stand-by period is saved, promotes user experience;
2. support the secret access process to large capacity file.
Description of the drawings
Fig. 1 is to meet in one embodiment of the present invention for the flow signal of the processing method of intelligent terminal secret file Figure;
Fig. 2 is to meet in another preferred embodiment of the present invention to show for the flow of the processing method of intelligent terminal secret file It is intended to;
Fig. 3 is to meet in further embodiment of the present invention to show for the flow of processing method of intelligent terminal secret file It is intended to;
Fig. 4 is the flow diagram of step S104 in Fig. 1;
Fig. 5 is to meet in one embodiment of the present invention for the structural frames of the processing unit of intelligent terminal secret file Figure;
Fig. 6 is to meet in another preferred embodiment of the present invention for the structural frames of the processing unit of intelligent terminal secret file Figure;
Fig. 7 is to meet in further embodiment of the present invention for the structural frames of the processing unit of intelligent terminal secret file Figure;
Fig. 8 is the structure diagram of access modules 14 in Fig. 5.
Reference numeral:
10- is for the processing unit of intelligent terminal secret file, 11- presetting modules, the first judgment modules of 12-, 13- second Judgment module, 14- access modules, 141- opening units, 142- scanning elements, 143- check unit, 15- first open module, The first shear modules of 16-, 17- logging modles, the first closedown modules of 18-, 19- second open module, 20- selecting modules, 21- the Two shear modules, the second closedown modules of 22-.
Specific embodiment
The advantages of the present invention is further explained below in conjunction with attached drawing and specific embodiment.
Here exemplary embodiment will be illustrated in detail, example is illustrated in the accompanying drawings.Following description is related to During attached drawing, unless otherwise indicated, the same numbers in different attached drawings represent the same or similar element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
It is only merely for the purpose of description specific embodiment in the term that the disclosure uses, and is not intended to be limiting the disclosure. " one kind " of singulative used in disclosure and the accompanying claims book, " described " and "the" are also intended to including majority Form, unless context clearly shows that other meanings.It is also understood that term "and/or" used herein refers to and wraps Containing one or more associated list items purposes, any or all may be combined.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the disclosure A little information should not necessarily be limited by these terms.These terms are only used for same type of information being distinguished from each other out.For example, not departing from In the case of disclosure range, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determining ".
In the description of the present invention, it is to be understood that term " longitudinal direction ", " transverse direction ", " on ", " under ", "front", "rear", The orientation or position relationship of the instructions such as "left", "right", " vertical ", " level ", " top ", " bottom " " interior ", " outer " is based on attached drawing institutes The orientation or position relationship shown is for only for ease of the description present invention and simplifies description rather than instruction or imply signified dress It puts or element must have specific orientation, with specific azimuth configuration and operation, therefore it is not intended that limit of the invention System.
In the description of the present invention, unless otherwise prescribed and limit, it should be noted that term " installation ", " connected ", " connection " should be interpreted broadly, for example, it may be the connection inside mechanical connection or electrical connection or two elements, it can To be to be connected directly, can also be indirectly connected by intermediary, it for the ordinary skill in the art, can basis Concrete condition understands the concrete meaning of above-mentioned term.
In subsequent description, using for representing that the suffix of such as " module ", " component " or " unit " of element is only Be conducive to the explanation of the present invention, itself there is no specific meanings.Therefore, " module " can mixedly make with " component " With.
Refering to Fig. 1, to meet in one embodiment of the present invention for the stream of the processing method of intelligent terminal secret file Journey schematic diagram, the treating method comprises following steps:
S101:In the access rights that a file store path and the file store path are preset in an intelligent terminal.
The intelligent terminal can be smart mobile phone, tablet computer, multimedia equipment and other with operating system Terminal device.The file store path refers to the position record that file is stored in the intelligent terminal, commonly uses tree-like path table Show, for representing one or more levels file, for example, the intelligent terminal memory is placed with document, the entitled company personnel of file is led to News record, data format Excel, size 35kB, the file store path of this document is hard disk name/working document/management text Part/company personnel's address list, here it is the information content of this document, above- mentioned information content is stored in depositing for the intelligent terminal In reservoir.In the present embodiment, after the file store path is preset, a file is corresponded to, is specially deposited in this document folder Store up secret file.Heretofore described access rights have only passed through power only for the access for the file store path Limit verification could carry out the access to the file store path, and the authentication mode for presetting the access rights can be default close The modes such as code password, fingerprint.In this step, preset after completing the file store path, it can be in the desktop of the intelligent terminal Upper display one corresponds to the shortcut of the file of the file store path, such as " secret photograph album ", so that user quickly visits It asks.
S102:Judge whether the intelligent terminal receives an access operation for being directed to the file store path.
The access operation can be the click to the shortcut of the file of the file store path or touch behaviour Make or searched by file management system the file of the file store path.This step passes through to intelligent terminal Input operation monitoring, and with reference to it is described input operation active position, to realize the judgement to access operation.
S103:When the intelligent terminal receives the access operation that one is directed to the file store path, the visit is judged Ask operation whether by the access authority verification.
When step S102 judges to set up, i.e., described intelligent terminal receives the access behaviour for the file store path When making, this step is performed.This step still performs judgement operation, judges whether the access operation is tested by the access rights Card.Such as whether user has input correct password password when accessing operation or has input correct finger print information.
S104:When the access operation is by the access authority verification, allow the private under the file store path Ciphertext part is accessed.
When step S103 judges to set up, i.e., when described access operation is by the access authority verification, perform this step. This step is to perform to access as a result, the display interface in the intelligent terminal shows the file of the file store path, institute The various secret files of multiple sub-folder classification storages can also be equipped with by stating in file.User can be with unrestricted choice in this step And open the secret file that access is needed to check.Correspondingly, if the step S103 judges invalid, i.e., described access operation does not have When having through the access authority verification, then file or secret file under the file store path are not shown.
Privacy protection method provided by the invention to secret file need to only carry out secret file the shifting of storage location It is dynamic, without secret file is encrypted in itself, the time of encipherment protection is greatly saved, has saved system resource.
As being further improved for the processing method, in the visit that the file store path is preset in the intelligent terminal When asking permission, the access rights are realized by opening or closing the access limit of the file store path corresponding folder. Can access limit be the important permission in intelligent terminal operation system, determine that read operation can be carried out to some object or write behaviour Make.The open access rights, it is meant that current user has to the file or secret under the file store path The access limit of file;Close the access rights, it is meant that current user can not be under the file store path File or secret file are written and read, and the file or secret file under the store path are invisible for the user 's.Application program can rewrite the read-write properties of the file store path by Java reflex mechanisms, so as to change the text The access limit of part store path.The Java reflex mechanisms are in operating status, for any one class, can be known The all properties and method of this class;For any one object, its any means and attribute can be called;This dynamic Acquisition information and the function of dynamic call object method are known as the reflex mechanism of Java language, therefore Java language is also referred to as dynamic State language.The Java reflex mechanisms, which are provided with interface, can carry out the attribute modification of file store path.
Referring to Fig.2, to meet in another preferred embodiment of the present invention for the processing method of intelligent terminal secret file Flow diagram, between step S101 and step S102, the processing method is further comprising the steps of:
S105:Open the access limit of the file store path.
This step implements opening operation to the access limit of the file store path, that is, opens the file store path File access access limit, it is all application or process can access the file store path.This step passes through modification The attribute of the file store path is realized.
S106:Secret file is sheared from former store path to the corresponding file of the file store path.
This step performs the shearing manipulation of secret file, i.e., secret file first is copied to the file store path corresponds to File in, then by former secret file delete, realize shearing manipulation.Since step S105 has had already turned on the file storage The access limit in path, therefore can realize the read-write operation to file.Secret file described in this step refers to not exist originally It is stored in the file store path, needs to carry out the file of privacy protection, such as photo, video file newly shot etc., this A little files can be stored in the relevant position in the intelligent terminal according to default path after generating, to carry out privacy protection, need It is moved under the file store path.Such as one secret file generate after be stored in path A (secret file herein for original Secret file), the file store path is B, then the secret file at A is copied at B, and the secret file at A is deleted It removes.In the implementation procedure of this step, user may also allow for carry out selection operation, select to need the file of privacy protection as secret File is sheared.
S107:Record the former store path.
Although deleting former secret file in step S106, in order to carry out behavior record, this step is also recorded for former secret The former store path of file, that is, the path A in the explanation of step S106, so as to subsequent secret file restoring operation.
S108:Close the access limit of the file store path.
This step implements shutoff operation to the access limit of the file store path, that is, closes the file store path File access access limit, it is all application or process cannot all access the file store path.This step is by repairing The attribute for changing the file store path is realized.File store path described in this way has restored access guard mode again, ensures The access rights of secret file.
The present embodiment realizes the process that the file for needing privacy protection is set as to secret file, i.e., by that will need secret The secret file of protection is put under the file store path, is realized by the access rights of the file store path to institute State the access protection of secret file.
Refering to Fig. 3, to meet in further embodiment of the present invention for the processing method of intelligent terminal secret file Flow diagram, after step S104, the processing method is further comprising the steps of:
S109:Open the access limit of the file store path.
This step implements opening operation to the access limit of the file store path, that is, opens the file store path File access access limit, it is all application or process can access the file store path.This step passes through modification The attribute of the file store path is realized.
S110:User's operation is received, selection does not need to the secret file of privacy protection.
In this step, the intelligent terminal receives user's operation, and user is allowed to select not needing to the secret text of privacy protection Part.The user's operation can be the touch operation either clicking operation of mouse or button to touch screen.User's operation Object is the secret file under the file store path.
S111:By the former store path of the secret paper cut for not needing to privacy protection to the secret file.
This step performs the shearing manipulation of secret file, i.e., secret file is first copied to the position of the former store path It puts, then the secret file under the file store path is deleted, realize shearing manipulation.Since step S109 has had already turned on institute The access limit of file store path is stated, therefore can realize the read-write operation to file.Secret file described in this step is Refer to the files such as photo, the video file under the file store path in file or the file store path pair File in the file subdirectories answered.What is recorded in the original store path, that is, step S107 corresponds to secret text The former store path of part.
S112:Close the access limit of the file store path.
This step implements shutoff operation to the access limit of the file store path, that is, closes the file store path File access access limit, it is all application or process cannot all access the file store path.This step is by repairing The attribute for changing the file store path is realized.File store path described in this way has restored access guard mode again, ensures The access rights of secret file.
The present embodiment is realized is set as normal file by the secret file for not needing to privacy protection, by from the text The corresponding file of part store path deletes the secret file, and the secret file is positioned over former store path to realize.On After stating step execution, user, which does not need to any access rights, can just operate the file being not protected.
Refering to Fig. 4, for the flow diagram of step S104 in Fig. 1, the private under file store path described in the present embodiment Ciphertext part is photo or video file, and the step S104 includes:
S104-1:Open the access limit of the file store path.
This step implements opening operation to the access limit of the file store path, that is, opens the file store path File access access limit, it is all application or process can access the file store path.This step passes through modification The attribute of the file store path is realized.
S104-2:Scan the catalogue of the corresponding file of the file store path.
Corresponding file may also have multiple sub-folders under the file store path, this step is to the file Catalogue be scanned, to obtain the information of All Files in the file.After this step performs, the intelligent terminal operation Media provider classes update multimedia database in system, the multi-medium data is included in by the content in the catalogue In library, to check.
S104-3:The secret file under the store path is checked by multimedia database.
The multimedia database be Android operation system provide for the module that is handled multimedia messages, again It is referred to as Media databases.This step checks the secret on the basis of step S104-2 using the multimedia database File, can due to being added to the catalogue of the corresponding file of the file store path in the multimedia database It is checked with accessing to corresponding secret file.
Refering to Fig. 5, to meet in one embodiment of the present invention for the processing unit 10 of intelligent terminal secret file Structure diagram, the processing unit 10 include:
Presetting module 11
The presetting module 11 is in the visit that a file store path and the file store path are preset in an intelligent terminal Ask permission.The presetting module 11 can repair the attribute of file under a file store path by Java reflex mechanisms Change, change content related with access rights in attribute, to realize the setting to file store path and access rights.It is described pre- Can be preset password password, fingerprint etc. if module 11 can also preset the access authority authentication mode of the file store path Mode
- the first judgment module 12
First judgment module 12 is connect with the presetting module 11, judges whether the intelligent terminal receives one and be directed to The access operation of the file store path.First judgment module 12 obtains the file storage from the presetting module 11 Path, by the monitoring operated to the input of intelligent terminal, and with reference to the active position of the input operation, to realize to accessing The judgement of operation.
- the second judgment module 13
Second judgment module 13 is connect with 11 and first judgment module 12 of presetting module, when the described first judgement When module 12 judges that the intelligent terminal receives the access operation that one is directed to the file store path, the access operation is judged Whether the access authority verification is passed through.Second judgment module 13 is operated by receiving the access authority verification of user, then It is compared with the authentication mode content of the 11 preset access rights of presetting module, judges whether the two is consistent, such as with Whether family has input correct password password when accessing operation or has input correct finger print information.
Access modules 14
The access modules 14 are connect with second judgment module 13, when second judgment module 13 judges the visit When asking operation by the access authority verification, the secret file under the file store path is allowed to be accessed.The access Module 14 obtains judging result from second judgment module 13, if judging result is set up, in the display of the intelligent terminal The file of file store path described in interface display is shown by other applications under the file store path Secret file.
As being further improved for the processing unit 10, the presetting module 11 is described in being preset in the intelligent terminal During the access rights of file store path, the access rights are by opening or closing the file store path corresponding folder Access limit realize.The presetting module 11 rewrites the file store path by the interface that Java reflex mechanisms provide Read-write properties, so as to change the access limit of the file store path.
Refering to Fig. 6, the processing unit 10 of intelligent terminal secret file is used in another preferred embodiment of the present invention to meet Structure diagram, the processing unit 10 further includes:
- the first opens module 15
The first opening module 15 opens the access limit of the file store path, is provided by Java reflex mechanisms Interface rewrite the read-write properties of the file store path, open the access limit of the file store path.
- the first shear module 16
First shear module 16 shears secret file from former store path corresponding to the file store path In file.
Logging modle 17
The logging modle 17 is connect with first shear module 16, records the former store path.
- the first closedown module 18
First closedown module 18 closes the access limit of the file store path, is provided by Java reflex mechanisms Interface rewrite the read-write properties of the file store path, close the access limit of the file store path.
Refering to Fig. 7, the processing unit 10 of intelligent terminal secret file is used in further embodiment of the present invention to meet Structure diagram, the processing unit 10 further includes:
- the second opens module 19
The second opening module 19 opens the access limit of the file store path, is provided by Java reflex mechanisms Interface rewrite the read-write properties of the file store path, open the access limit of the file store path.
Selecting module 20
The selecting module 20 receives user's operation, and selection does not need to the secret file of privacy protection.The selecting module 20 obtain the information of input operation by the interface that the intelligent terminal operation system provides, with reference to the position judgment of input operation Its secret file selected.
- the second shear module 21
Second shear module 21 is connect with the selecting module 20 and logging modle 17, and the secret that do not need to is protected The secret paper cut of shield to the secret file former store path.
- the second closedown module 22
Second closedown module 22 closes the access limit of the file store path, is provided by Java reflex mechanisms Interface rewrite the read-write properties of the file store path, close the access limit of the file store path.
It is the structure diagram of access modules 14 in Fig. 5 refering to Fig. 8, the secret file under the file store path is shines Piece or video file, the access modules 14 include:
Opening unit 141
The opening unit 141 opens the access limit of the file store path, is provided by Java reflex mechanisms Interface rewrites the read-write properties of the file store path, opens the access limit of the file store path.
Scanning element 142
The scanning element 142 scans the catalogue of the corresponding file of the file store path.The scanning element 142 Content in the corresponding file of the file store path is traversed, to obtain its catalogue, and catalogue is stored in more In media database.
Check unit 143
It is described to check that unit 143 is connect with the scanning element 142, the store path is checked by multimedia database Under secret file.
It should be noted that the embodiment of the present invention has preferable implementation, and not the present invention is made any type of Limitation, any one skilled in the art change or are modified to possibly also with the technology contents of the disclosure above equivalent effective Embodiment, as long as without departing from the content of technical solution of the present invention, what technical spirit according to the present invention made above example Any modification or equivalent variations and modification, in the range of still falling within technical solution of the present invention.

Claims (10)

1. a kind of processing method for intelligent terminal secret file, which is characterized in that include the following steps:
In the access rights that a file store path and the file store path are preset in an intelligent terminal;
Judge whether the intelligent terminal receives an access operation for being directed to the file store path;
When the intelligent terminal receives the access operation that one is directed to the file store path, whether the access operation is judged Pass through the access authority verification;
When the access operation is by the access authority verification, the secret file under the file store path is allowed to be interviewed It asks.
2. processing method as described in claim 1, which is characterized in that
When the access rights that the file store path is preset in the intelligent terminal, the access rights are by playing on or off The access limit for closing the file store path corresponding folder is realized.
3. processing method as claimed in claim 2, which is characterized in that
With sentencing in the access rights that a file store path and the file store path are preset in the intelligent terminal the step of Break the intelligent terminal whether receive one be directed to the file store path access operation the step of between, the processing method It is further comprising the steps of:
Open the access limit of the file store path;
Secret file is sheared from former store path to the corresponding file of the file store path;
Record the former store path;
Close the access limit of the file store path.
4. processing method as claimed in claim 3, which is characterized in that
When the access operation is by the access authority verification, the secret file under the file store path is allowed to be interviewed After the step of asking, the processing method is further comprising the steps of:
Open the access limit of the file store path;
User's operation is received, selection does not need to the secret file of privacy protection;
By the former store path of the secret paper cut for not needing to privacy protection to the secret file;
Close the access limit of the file store path.
5. such as claim 1-4 any one of them processing methods, which is characterized in that
Secret file under the file store path is photo or video file;
When the access operation is by the access authority verification, the secret file under the file store path is allowed to be interviewed The step of asking includes:
Open the access limit of the file store path;
Scan the catalogue of the corresponding file of the file store path;
The secret file under the store path is checked by multimedia database.
6. a kind of processing unit for intelligent terminal secret file, which is characterized in that including:
Presetting module, in the access rights that a file store path and the file store path are preset in an intelligent terminal;
First judgment module is connect with the presetting module, judges whether the intelligent terminal receives one and deposited for the file Store up the access operation in path;
Second judgment module is connect with the presetting module and the first judgment module, when described in first judgment module judgement When intelligent terminal receives the access operation that one is directed to the file store path, judge the access operation whether by the visit Ask Authority Verification;
Access modules are connect with second judgment module, when second judgment module judges that the access operation passes through institute When stating access authority verification, the secret file under the file store path is allowed to be accessed.
7. processing unit as claimed in claim 6, which is characterized in that
The presetting module is when the access rights that the file store path is preset in the intelligent terminal, the access rights It is realized by the access limit for opening or closing the file store path corresponding folder.
8. processing unit as claimed in claim 7, which is characterized in that
The processing unit further includes:
First opens module, opens the access limit of the file store path;
First shear module shears secret file to the corresponding file of the file store path from former store path;
Logging modle is connect with first shear module, records the former store path;
First closedown module closes the access limit of the file store path.
9. processing unit as claimed in claim 8, which is characterized in that
The processing unit further includes:
Second opens module, opens the access limit of the file store path;
Selecting module, receives user's operation, and selection does not need to the secret file of privacy protection;
Second shear module is connect with the selecting module and logging modle, by the secret file for not needing to privacy protection It shears to the former store path of the secret file;
Second closedown module closes the access limit of the file store path.
10. such as claim 6-9 any one of them processing units, which is characterized in that
Secret file under the file store path is photo or video file;
The access modules include:
Opening unit opens the access limit of the file store path;
Scanning element scans the catalogue of the corresponding file of the file store path;
It checks unit, is connect with the scanning element, the secret file under the store path is checked by multimedia database.
CN201711459915.9A 2017-12-28 2017-12-28 A kind of processing method and processing unit for intelligent terminal secret file Pending CN108197489A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711459915.9A CN108197489A (en) 2017-12-28 2017-12-28 A kind of processing method and processing unit for intelligent terminal secret file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711459915.9A CN108197489A (en) 2017-12-28 2017-12-28 A kind of processing method and processing unit for intelligent terminal secret file

Publications (1)

Publication Number Publication Date
CN108197489A true CN108197489A (en) 2018-06-22

Family

ID=62585373

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711459915.9A Pending CN108197489A (en) 2017-12-28 2017-12-28 A kind of processing method and processing unit for intelligent terminal secret file

Country Status (1)

Country Link
CN (1) CN108197489A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113691528A (en) * 2021-08-23 2021-11-23 维沃移动通信有限公司 Two-dimensional code processing method and device and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170069151A1 (en) * 2010-11-23 2017-03-09 Morphotrust Usa, Llc System and Method to Streamline Identity Verification at Airports and Beyond
CN107071183A (en) * 2017-04-27 2017-08-18 努比亚技术有限公司 A kind of method of hidden file, device and mobile terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170069151A1 (en) * 2010-11-23 2017-03-09 Morphotrust Usa, Llc System and Method to Streamline Identity Verification at Airports and Beyond
CN107071183A (en) * 2017-04-27 2017-08-18 努比亚技术有限公司 A kind of method of hidden file, device and mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113691528A (en) * 2021-08-23 2021-11-23 维沃移动通信有限公司 Two-dimensional code processing method and device and electronic equipment

Similar Documents

Publication Publication Date Title
US11057355B2 (en) Protecting documents using policies and encryption
US8918633B2 (en) Information processing device, information processing system, and program
WO2017143879A1 (en) File permission management method and device
US10979450B2 (en) Method and system for blocking phishing or ransomware attack
US20070016771A1 (en) Maintaining security for file copy operations
CN102257483A (en) Managing access to an address range in a storage device
CN105493054A (en) Fast data protection using dual file systems
CN102254124A (en) Information security protecting system and method of mobile terminal
WO2008072883A1 (en) System for controling documents in a computer
CN108228353A (en) resource access control method, device and corresponding terminal
CN104811580A (en) Image processing apparatus capable of efficiently deleting stored data, method of controlling the same, and storage medium
CN103209179A (en) Secure network storage method and secure network storage system
CN108197489A (en) A kind of processing method and processing unit for intelligent terminal secret file
CN101243469A (en) Digital license migration from first platform to second platform
EP1521162A2 (en) Method of managing file structure in memory card
CN106529338A (en) Safe processing method and equipment of data file
KR100941320B1 (en) Method for Managing Distribution Duration of Secret Material through Inter-working DRM with Portable Memory and the System
JP2006252448A (en) Document management device, sentence management program and document management method
CN105760733A (en) Data encrypting method and module and data accessing method and module
CN109784073A (en) Data access method and device, storage medium, computer equipment
CN105205403A (en) Method and system for managing and controlling file data of local area network based on file filtering
CN111199049A (en) File authority management method and device
US11625365B2 (en) Method for managing virtual file, apparatus for the same, computer program for the same, and recording medium storing computer program thereof
CN110929235A (en) Method and device for processing watermark, computer storage medium and terminal
US20230076870A1 (en) Protections for sensitive content items in a content management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180622