CN108197489A - A kind of processing method and processing unit for intelligent terminal secret file - Google Patents
A kind of processing method and processing unit for intelligent terminal secret file Download PDFInfo
- Publication number
- CN108197489A CN108197489A CN201711459915.9A CN201711459915A CN108197489A CN 108197489 A CN108197489 A CN 108197489A CN 201711459915 A CN201711459915 A CN 201711459915A CN 108197489 A CN108197489 A CN 108197489A
- Authority
- CN
- China
- Prior art keywords
- file
- store path
- access
- secret
- file store
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The present invention provides a kind of processing methods and processing unit for intelligent terminal secret file, the treating method comprises following steps:In the access rights that a file store path and the file store path are preset in an intelligent terminal;Judge whether the intelligent terminal receives an access operation for being directed to the file store path;When the intelligent terminal receives the access operation that one is directed to the file store path, judge the access operation whether by the access authority verification;When the access operation is by the access authority verification, the secret file under the file store path is allowed to be accessed.After adopting the above technical scheme, improving the processing speed to secret file, the user's operation stand-by period is saved, promotes user experience;Support the secret access process to large capacity file.
Description
Technical field
The present invention relates to intelligent terminal field more particularly to a kind of processing methods and place for intelligent terminal secret file
Manage device.
Background technology
With the development of technology, the function of the intelligent terminals such as smart mobile phone, tablet computer is more and more, and processing capacity is more next
More powerful, particularly described intelligent terminal internal storage has the file of magnanimity, above-mentioned including document, photo, audio, video etc.
File is different according to the different sources either generated of its file type, is stored in position different in the intelligent terminal,
Under namely different files.For certain files, particularly photo or video file, user wants to become these files
Secret file, user must be by that could access, that is, " secret photograph album " function being commonly called as after Authority Verification.
The prior art be all by the way that video file or photo are encrypted, to realize secret photograph album, that is,
Employ the mode that file is encrypted in itself.Traditional image encryption technology is based primarily upon modern password system, usually will
Image pixel information regards one-dimensional data stream as, under the control of the key, using Encryption Algorithm (common Encryption Algorithm such as DES, AES,
RSA etc.) it is encrypted.Digital image data amount is larger, and has the characteristics that very strong correlation between adjacent pixel so that one
A little encryption technologies for being directed to text, it is impossible to fully meet the encrypted needs of image file.And to digital image encryption need compared with
Big calculation amount, the memory of intelligent terminal is small, and operational capability is limited, therefore runs time-consuming longer.To the encrypted master of secret photograph album
The thought wanted is that digital picture is carried out greyscale transformation and image scrambling.Greyscale transformation refers to change the gray value of image slices vegetarian refreshments
Size so that before and after encryption, the content of pixel sequence changes completely.Image scrambling is exactly to upset the information order of image,
A pixels being moved on the position of b pixels, b pixels are moved on the position of c pixels, and so on, it is made to be transformed into mixed and disorderly nothing
Chapter is difficult to the image recognized.
The realization method process of the prior art is complex, and encryption times mistake can be caused when especially video file is excessive
It is long, cause user experience bad, in certain intelligent terminals, many secret photograph albums do not support adding for the large capacities file such as video
It is close.
Therefore how rapidly to realize the processing of secret file, support the privacy protection to large capacity file, promote user
Experience, is a technical issues that need to address.
Invention content
In order to overcome above-mentioned technological deficiency, the purpose of the present invention is to provide a kind of places for intelligent terminal secret file
Reason method and processing unit, can quickly access to secret file priority assignation and judgement, protect user privacy information.
The first aspect of the present invention discloses a kind of processing method for intelligent terminal secret file, including following step
Suddenly:
In the access rights that a file store path and the file store path are preset in an intelligent terminal;
Judge whether the intelligent terminal receives an access operation for being directed to the file store path;
When the intelligent terminal receives the access operation that one is directed to the file store path, the access operation is judged
Whether the access authority verification is passed through;
When the access operation is by the access authority verification, allow the secret file under the file store path
It is accessed.
Preferably, when the access rights that the file store path is preset in the intelligent terminal, the access rights
It is realized by the access limit for opening or closing the file store path corresponding folder.
Preferably, in the access rights that a file store path and the file store path are preset in the intelligent terminal
The step of and judge the intelligent terminal whether receive one be directed to the file store path access operation the step of between, institute
It is further comprising the steps of to state processing method:
Open the access limit of the file store path;
Secret file is sheared from former store path to the corresponding file of the file store path;
Record the former store path;
Close the access limit of the file store path.
Preferably, when the access operation is by the access authority verification, allow under the file store path
After the step that secret file is accessed, the processing method is further comprising the steps of:
Open the access limit of the file store path;
User's operation is received, selection does not need to the secret file of privacy protection;
By the former store path of the secret paper cut for not needing to privacy protection to the secret file;
Close the access limit of the file store path.
Preferably, the secret file under the file store path is photo or video file;When the access operation is led to
When crossing the access authority verification, the step that the secret file under the file store path is accessed is allowed to include:
Open the access limit of the file store path;
Scan the catalogue of the corresponding file of the file store path;
The secret file under the store path is checked by multimedia database.
The second aspect of the present invention also discloses a kind of processing unit for intelligent terminal secret file, including:
Presetting module, in the access right that a file store path and the file store path are preset in an intelligent terminal
Limit;
First judgment module is connect with the presetting module, judges whether the intelligent terminal receives one for the text
The access operation of part store path;
Second judgment module is connect with the presetting module and the first judgment module, when first judgment module judges
When the intelligent terminal receives the access operation that one is directed to the file store path, judge whether the access operation passes through institute
State access authority verification;
Access modules are connect with second judgment module, when second judgment module judges that the access operation is led to
When crossing the access authority verification, the secret file under the file store path is allowed to be accessed.
Preferably, the presetting module in the intelligent terminal preset the file store path access rights when,
The access rights are realized by opening or closing the access limit of the file store path corresponding folder.
Preferably, the processing unit further includes:
First opens module, opens the access limit of the file store path;
Secret file is sheared file corresponding to the file store path by the first shear module from former store path
It is interior;
Logging modle is connect with first shear module, records the former store path;
First closedown module closes the access limit of the file store path.
Preferably, the processing unit further includes:
Second opens module, opens the access limit of the file store path;
Selecting module, receives user's operation, and selection does not need to the secret file of privacy protection;
Second shear module is connect with the selecting module and logging modle, by the secret for not needing to privacy protection
Paper cut to the secret file former store path;
Second closedown module closes the access limit of the file store path.
Preferably, the secret file under the file store path is photo or video file;The access modules include:
Opening unit opens the access limit of the file store path;
Scanning element scans the catalogue of the corresponding file of the file store path;
It checks unit, is connect with the scanning element, the secret under the store path is checked by multimedia database
File.
After employing above-mentioned technical proposal, compared with prior art, have the advantages that:
1. improving the processing speed to secret file, the user's operation stand-by period is saved, promotes user experience;
2. support the secret access process to large capacity file.
Description of the drawings
Fig. 1 is to meet in one embodiment of the present invention for the flow signal of the processing method of intelligent terminal secret file
Figure;
Fig. 2 is to meet in another preferred embodiment of the present invention to show for the flow of the processing method of intelligent terminal secret file
It is intended to;
Fig. 3 is to meet in further embodiment of the present invention to show for the flow of processing method of intelligent terminal secret file
It is intended to;
Fig. 4 is the flow diagram of step S104 in Fig. 1;
Fig. 5 is to meet in one embodiment of the present invention for the structural frames of the processing unit of intelligent terminal secret file
Figure;
Fig. 6 is to meet in another preferred embodiment of the present invention for the structural frames of the processing unit of intelligent terminal secret file
Figure;
Fig. 7 is to meet in further embodiment of the present invention for the structural frames of the processing unit of intelligent terminal secret file
Figure;
Fig. 8 is the structure diagram of access modules 14 in Fig. 5.
Reference numeral:
10- is for the processing unit of intelligent terminal secret file, 11- presetting modules, the first judgment modules of 12-, 13- second
Judgment module, 14- access modules, 141- opening units, 142- scanning elements, 143- check unit, 15- first open module,
The first shear modules of 16-, 17- logging modles, the first closedown modules of 18-, 19- second open module, 20- selecting modules, 21- the
Two shear modules, the second closedown modules of 22-.
Specific embodiment
The advantages of the present invention is further explained below in conjunction with attached drawing and specific embodiment.
Here exemplary embodiment will be illustrated in detail, example is illustrated in the accompanying drawings.Following description is related to
During attached drawing, unless otherwise indicated, the same numbers in different attached drawings represent the same or similar element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
It is only merely for the purpose of description specific embodiment in the term that the disclosure uses, and is not intended to be limiting the disclosure.
" one kind " of singulative used in disclosure and the accompanying claims book, " described " and "the" are also intended to including majority
Form, unless context clearly shows that other meanings.It is also understood that term "and/or" used herein refers to and wraps
Containing one or more associated list items purposes, any or all may be combined.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the disclosure
A little information should not necessarily be limited by these terms.These terms are only used for same type of information being distinguished from each other out.For example, not departing from
In the case of disclosure range, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as
One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determining ".
In the description of the present invention, it is to be understood that term " longitudinal direction ", " transverse direction ", " on ", " under ", "front", "rear",
The orientation or position relationship of the instructions such as "left", "right", " vertical ", " level ", " top ", " bottom " " interior ", " outer " is based on attached drawing institutes
The orientation or position relationship shown is for only for ease of the description present invention and simplifies description rather than instruction or imply signified dress
It puts or element must have specific orientation, with specific azimuth configuration and operation, therefore it is not intended that limit of the invention
System.
In the description of the present invention, unless otherwise prescribed and limit, it should be noted that term " installation ", " connected ",
" connection " should be interpreted broadly, for example, it may be the connection inside mechanical connection or electrical connection or two elements, it can
To be to be connected directly, can also be indirectly connected by intermediary, it for the ordinary skill in the art, can basis
Concrete condition understands the concrete meaning of above-mentioned term.
In subsequent description, using for representing that the suffix of such as " module ", " component " or " unit " of element is only
Be conducive to the explanation of the present invention, itself there is no specific meanings.Therefore, " module " can mixedly make with " component "
With.
Refering to Fig. 1, to meet in one embodiment of the present invention for the stream of the processing method of intelligent terminal secret file
Journey schematic diagram, the treating method comprises following steps:
S101:In the access rights that a file store path and the file store path are preset in an intelligent terminal.
The intelligent terminal can be smart mobile phone, tablet computer, multimedia equipment and other with operating system
Terminal device.The file store path refers to the position record that file is stored in the intelligent terminal, commonly uses tree-like path table
Show, for representing one or more levels file, for example, the intelligent terminal memory is placed with document, the entitled company personnel of file is led to
News record, data format Excel, size 35kB, the file store path of this document is hard disk name/working document/management text
Part/company personnel's address list, here it is the information content of this document, above- mentioned information content is stored in depositing for the intelligent terminal
In reservoir.In the present embodiment, after the file store path is preset, a file is corresponded to, is specially deposited in this document folder
Store up secret file.Heretofore described access rights have only passed through power only for the access for the file store path
Limit verification could carry out the access to the file store path, and the authentication mode for presetting the access rights can be default close
The modes such as code password, fingerprint.In this step, preset after completing the file store path, it can be in the desktop of the intelligent terminal
Upper display one corresponds to the shortcut of the file of the file store path, such as " secret photograph album ", so that user quickly visits
It asks.
S102:Judge whether the intelligent terminal receives an access operation for being directed to the file store path.
The access operation can be the click to the shortcut of the file of the file store path or touch behaviour
Make or searched by file management system the file of the file store path.This step passes through to intelligent terminal
Input operation monitoring, and with reference to it is described input operation active position, to realize the judgement to access operation.
S103:When the intelligent terminal receives the access operation that one is directed to the file store path, the visit is judged
Ask operation whether by the access authority verification.
When step S102 judges to set up, i.e., described intelligent terminal receives the access behaviour for the file store path
When making, this step is performed.This step still performs judgement operation, judges whether the access operation is tested by the access rights
Card.Such as whether user has input correct password password when accessing operation or has input correct finger print information.
S104:When the access operation is by the access authority verification, allow the private under the file store path
Ciphertext part is accessed.
When step S103 judges to set up, i.e., when described access operation is by the access authority verification, perform this step.
This step is to perform to access as a result, the display interface in the intelligent terminal shows the file of the file store path, institute
The various secret files of multiple sub-folder classification storages can also be equipped with by stating in file.User can be with unrestricted choice in this step
And open the secret file that access is needed to check.Correspondingly, if the step S103 judges invalid, i.e., described access operation does not have
When having through the access authority verification, then file or secret file under the file store path are not shown.
Privacy protection method provided by the invention to secret file need to only carry out secret file the shifting of storage location
It is dynamic, without secret file is encrypted in itself, the time of encipherment protection is greatly saved, has saved system resource.
As being further improved for the processing method, in the visit that the file store path is preset in the intelligent terminal
When asking permission, the access rights are realized by opening or closing the access limit of the file store path corresponding folder.
Can access limit be the important permission in intelligent terminal operation system, determine that read operation can be carried out to some object or write behaviour
Make.The open access rights, it is meant that current user has to the file or secret under the file store path
The access limit of file;Close the access rights, it is meant that current user can not be under the file store path
File or secret file are written and read, and the file or secret file under the store path are invisible for the user
's.Application program can rewrite the read-write properties of the file store path by Java reflex mechanisms, so as to change the text
The access limit of part store path.The Java reflex mechanisms are in operating status, for any one class, can be known
The all properties and method of this class;For any one object, its any means and attribute can be called;This dynamic
Acquisition information and the function of dynamic call object method are known as the reflex mechanism of Java language, therefore Java language is also referred to as dynamic
State language.The Java reflex mechanisms, which are provided with interface, can carry out the attribute modification of file store path.
Referring to Fig.2, to meet in another preferred embodiment of the present invention for the processing method of intelligent terminal secret file
Flow diagram, between step S101 and step S102, the processing method is further comprising the steps of:
S105:Open the access limit of the file store path.
This step implements opening operation to the access limit of the file store path, that is, opens the file store path
File access access limit, it is all application or process can access the file store path.This step passes through modification
The attribute of the file store path is realized.
S106:Secret file is sheared from former store path to the corresponding file of the file store path.
This step performs the shearing manipulation of secret file, i.e., secret file first is copied to the file store path corresponds to
File in, then by former secret file delete, realize shearing manipulation.Since step S105 has had already turned on the file storage
The access limit in path, therefore can realize the read-write operation to file.Secret file described in this step refers to not exist originally
It is stored in the file store path, needs to carry out the file of privacy protection, such as photo, video file newly shot etc., this
A little files can be stored in the relevant position in the intelligent terminal according to default path after generating, to carry out privacy protection, need
It is moved under the file store path.Such as one secret file generate after be stored in path A (secret file herein for original
Secret file), the file store path is B, then the secret file at A is copied at B, and the secret file at A is deleted
It removes.In the implementation procedure of this step, user may also allow for carry out selection operation, select to need the file of privacy protection as secret
File is sheared.
S107:Record the former store path.
Although deleting former secret file in step S106, in order to carry out behavior record, this step is also recorded for former secret
The former store path of file, that is, the path A in the explanation of step S106, so as to subsequent secret file restoring operation.
S108:Close the access limit of the file store path.
This step implements shutoff operation to the access limit of the file store path, that is, closes the file store path
File access access limit, it is all application or process cannot all access the file store path.This step is by repairing
The attribute for changing the file store path is realized.File store path described in this way has restored access guard mode again, ensures
The access rights of secret file.
The present embodiment realizes the process that the file for needing privacy protection is set as to secret file, i.e., by that will need secret
The secret file of protection is put under the file store path, is realized by the access rights of the file store path to institute
State the access protection of secret file.
Refering to Fig. 3, to meet in further embodiment of the present invention for the processing method of intelligent terminal secret file
Flow diagram, after step S104, the processing method is further comprising the steps of:
S109:Open the access limit of the file store path.
This step implements opening operation to the access limit of the file store path, that is, opens the file store path
File access access limit, it is all application or process can access the file store path.This step passes through modification
The attribute of the file store path is realized.
S110:User's operation is received, selection does not need to the secret file of privacy protection.
In this step, the intelligent terminal receives user's operation, and user is allowed to select not needing to the secret text of privacy protection
Part.The user's operation can be the touch operation either clicking operation of mouse or button to touch screen.User's operation
Object is the secret file under the file store path.
S111:By the former store path of the secret paper cut for not needing to privacy protection to the secret file.
This step performs the shearing manipulation of secret file, i.e., secret file is first copied to the position of the former store path
It puts, then the secret file under the file store path is deleted, realize shearing manipulation.Since step S109 has had already turned on institute
The access limit of file store path is stated, therefore can realize the read-write operation to file.Secret file described in this step is
Refer to the files such as photo, the video file under the file store path in file or the file store path pair
File in the file subdirectories answered.What is recorded in the original store path, that is, step S107 corresponds to secret text
The former store path of part.
S112:Close the access limit of the file store path.
This step implements shutoff operation to the access limit of the file store path, that is, closes the file store path
File access access limit, it is all application or process cannot all access the file store path.This step is by repairing
The attribute for changing the file store path is realized.File store path described in this way has restored access guard mode again, ensures
The access rights of secret file.
The present embodiment is realized is set as normal file by the secret file for not needing to privacy protection, by from the text
The corresponding file of part store path deletes the secret file, and the secret file is positioned over former store path to realize.On
After stating step execution, user, which does not need to any access rights, can just operate the file being not protected.
Refering to Fig. 4, for the flow diagram of step S104 in Fig. 1, the private under file store path described in the present embodiment
Ciphertext part is photo or video file, and the step S104 includes:
S104-1:Open the access limit of the file store path.
This step implements opening operation to the access limit of the file store path, that is, opens the file store path
File access access limit, it is all application or process can access the file store path.This step passes through modification
The attribute of the file store path is realized.
S104-2:Scan the catalogue of the corresponding file of the file store path.
Corresponding file may also have multiple sub-folders under the file store path, this step is to the file
Catalogue be scanned, to obtain the information of All Files in the file.After this step performs, the intelligent terminal operation
Media provider classes update multimedia database in system, the multi-medium data is included in by the content in the catalogue
In library, to check.
S104-3:The secret file under the store path is checked by multimedia database.
The multimedia database be Android operation system provide for the module that is handled multimedia messages, again
It is referred to as Media databases.This step checks the secret on the basis of step S104-2 using the multimedia database
File, can due to being added to the catalogue of the corresponding file of the file store path in the multimedia database
It is checked with accessing to corresponding secret file.
Refering to Fig. 5, to meet in one embodiment of the present invention for the processing unit 10 of intelligent terminal secret file
Structure diagram, the processing unit 10 include:
Presetting module 11
The presetting module 11 is in the visit that a file store path and the file store path are preset in an intelligent terminal
Ask permission.The presetting module 11 can repair the attribute of file under a file store path by Java reflex mechanisms
Change, change content related with access rights in attribute, to realize the setting to file store path and access rights.It is described pre-
Can be preset password password, fingerprint etc. if module 11 can also preset the access authority authentication mode of the file store path
Mode
- the first judgment module 12
First judgment module 12 is connect with the presetting module 11, judges whether the intelligent terminal receives one and be directed to
The access operation of the file store path.First judgment module 12 obtains the file storage from the presetting module 11
Path, by the monitoring operated to the input of intelligent terminal, and with reference to the active position of the input operation, to realize to accessing
The judgement of operation.
- the second judgment module 13
Second judgment module 13 is connect with 11 and first judgment module 12 of presetting module, when the described first judgement
When module 12 judges that the intelligent terminal receives the access operation that one is directed to the file store path, the access operation is judged
Whether the access authority verification is passed through.Second judgment module 13 is operated by receiving the access authority verification of user, then
It is compared with the authentication mode content of the 11 preset access rights of presetting module, judges whether the two is consistent, such as with
Whether family has input correct password password when accessing operation or has input correct finger print information.
Access modules 14
The access modules 14 are connect with second judgment module 13, when second judgment module 13 judges the visit
When asking operation by the access authority verification, the secret file under the file store path is allowed to be accessed.The access
Module 14 obtains judging result from second judgment module 13, if judging result is set up, in the display of the intelligent terminal
The file of file store path described in interface display is shown by other applications under the file store path
Secret file.
As being further improved for the processing unit 10, the presetting module 11 is described in being preset in the intelligent terminal
During the access rights of file store path, the access rights are by opening or closing the file store path corresponding folder
Access limit realize.The presetting module 11 rewrites the file store path by the interface that Java reflex mechanisms provide
Read-write properties, so as to change the access limit of the file store path.
Refering to Fig. 6, the processing unit 10 of intelligent terminal secret file is used in another preferred embodiment of the present invention to meet
Structure diagram, the processing unit 10 further includes:
- the first opens module 15
The first opening module 15 opens the access limit of the file store path, is provided by Java reflex mechanisms
Interface rewrite the read-write properties of the file store path, open the access limit of the file store path.
- the first shear module 16
First shear module 16 shears secret file from former store path corresponding to the file store path
In file.
Logging modle 17
The logging modle 17 is connect with first shear module 16, records the former store path.
- the first closedown module 18
First closedown module 18 closes the access limit of the file store path, is provided by Java reflex mechanisms
Interface rewrite the read-write properties of the file store path, close the access limit of the file store path.
Refering to Fig. 7, the processing unit 10 of intelligent terminal secret file is used in further embodiment of the present invention to meet
Structure diagram, the processing unit 10 further includes:
- the second opens module 19
The second opening module 19 opens the access limit of the file store path, is provided by Java reflex mechanisms
Interface rewrite the read-write properties of the file store path, open the access limit of the file store path.
Selecting module 20
The selecting module 20 receives user's operation, and selection does not need to the secret file of privacy protection.The selecting module
20 obtain the information of input operation by the interface that the intelligent terminal operation system provides, with reference to the position judgment of input operation
Its secret file selected.
- the second shear module 21
Second shear module 21 is connect with the selecting module 20 and logging modle 17, and the secret that do not need to is protected
The secret paper cut of shield to the secret file former store path.
- the second closedown module 22
Second closedown module 22 closes the access limit of the file store path, is provided by Java reflex mechanisms
Interface rewrite the read-write properties of the file store path, close the access limit of the file store path.
It is the structure diagram of access modules 14 in Fig. 5 refering to Fig. 8, the secret file under the file store path is shines
Piece or video file, the access modules 14 include:
Opening unit 141
The opening unit 141 opens the access limit of the file store path, is provided by Java reflex mechanisms
Interface rewrites the read-write properties of the file store path, opens the access limit of the file store path.
Scanning element 142
The scanning element 142 scans the catalogue of the corresponding file of the file store path.The scanning element 142
Content in the corresponding file of the file store path is traversed, to obtain its catalogue, and catalogue is stored in more
In media database.
Check unit 143
It is described to check that unit 143 is connect with the scanning element 142, the store path is checked by multimedia database
Under secret file.
It should be noted that the embodiment of the present invention has preferable implementation, and not the present invention is made any type of
Limitation, any one skilled in the art change or are modified to possibly also with the technology contents of the disclosure above equivalent effective
Embodiment, as long as without departing from the content of technical solution of the present invention, what technical spirit according to the present invention made above example
Any modification or equivalent variations and modification, in the range of still falling within technical solution of the present invention.
Claims (10)
1. a kind of processing method for intelligent terminal secret file, which is characterized in that include the following steps:
In the access rights that a file store path and the file store path are preset in an intelligent terminal;
Judge whether the intelligent terminal receives an access operation for being directed to the file store path;
When the intelligent terminal receives the access operation that one is directed to the file store path, whether the access operation is judged
Pass through the access authority verification;
When the access operation is by the access authority verification, the secret file under the file store path is allowed to be interviewed
It asks.
2. processing method as described in claim 1, which is characterized in that
When the access rights that the file store path is preset in the intelligent terminal, the access rights are by playing on or off
The access limit for closing the file store path corresponding folder is realized.
3. processing method as claimed in claim 2, which is characterized in that
With sentencing in the access rights that a file store path and the file store path are preset in the intelligent terminal the step of
Break the intelligent terminal whether receive one be directed to the file store path access operation the step of between, the processing method
It is further comprising the steps of:
Open the access limit of the file store path;
Secret file is sheared from former store path to the corresponding file of the file store path;
Record the former store path;
Close the access limit of the file store path.
4. processing method as claimed in claim 3, which is characterized in that
When the access operation is by the access authority verification, the secret file under the file store path is allowed to be interviewed
After the step of asking, the processing method is further comprising the steps of:
Open the access limit of the file store path;
User's operation is received, selection does not need to the secret file of privacy protection;
By the former store path of the secret paper cut for not needing to privacy protection to the secret file;
Close the access limit of the file store path.
5. such as claim 1-4 any one of them processing methods, which is characterized in that
Secret file under the file store path is photo or video file;
When the access operation is by the access authority verification, the secret file under the file store path is allowed to be interviewed
The step of asking includes:
Open the access limit of the file store path;
Scan the catalogue of the corresponding file of the file store path;
The secret file under the store path is checked by multimedia database.
6. a kind of processing unit for intelligent terminal secret file, which is characterized in that including:
Presetting module, in the access rights that a file store path and the file store path are preset in an intelligent terminal;
First judgment module is connect with the presetting module, judges whether the intelligent terminal receives one and deposited for the file
Store up the access operation in path;
Second judgment module is connect with the presetting module and the first judgment module, when described in first judgment module judgement
When intelligent terminal receives the access operation that one is directed to the file store path, judge the access operation whether by the visit
Ask Authority Verification;
Access modules are connect with second judgment module, when second judgment module judges that the access operation passes through institute
When stating access authority verification, the secret file under the file store path is allowed to be accessed.
7. processing unit as claimed in claim 6, which is characterized in that
The presetting module is when the access rights that the file store path is preset in the intelligent terminal, the access rights
It is realized by the access limit for opening or closing the file store path corresponding folder.
8. processing unit as claimed in claim 7, which is characterized in that
The processing unit further includes:
First opens module, opens the access limit of the file store path;
First shear module shears secret file to the corresponding file of the file store path from former store path;
Logging modle is connect with first shear module, records the former store path;
First closedown module closes the access limit of the file store path.
9. processing unit as claimed in claim 8, which is characterized in that
The processing unit further includes:
Second opens module, opens the access limit of the file store path;
Selecting module, receives user's operation, and selection does not need to the secret file of privacy protection;
Second shear module is connect with the selecting module and logging modle, by the secret file for not needing to privacy protection
It shears to the former store path of the secret file;
Second closedown module closes the access limit of the file store path.
10. such as claim 6-9 any one of them processing units, which is characterized in that
Secret file under the file store path is photo or video file;
The access modules include:
Opening unit opens the access limit of the file store path;
Scanning element scans the catalogue of the corresponding file of the file store path;
It checks unit, is connect with the scanning element, the secret file under the store path is checked by multimedia database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711459915.9A CN108197489A (en) | 2017-12-28 | 2017-12-28 | A kind of processing method and processing unit for intelligent terminal secret file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711459915.9A CN108197489A (en) | 2017-12-28 | 2017-12-28 | A kind of processing method and processing unit for intelligent terminal secret file |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108197489A true CN108197489A (en) | 2018-06-22 |
Family
ID=62585373
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711459915.9A Pending CN108197489A (en) | 2017-12-28 | 2017-12-28 | A kind of processing method and processing unit for intelligent terminal secret file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108197489A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113691528A (en) * | 2021-08-23 | 2021-11-23 | 维沃移动通信有限公司 | Two-dimensional code processing method and device and electronic equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170069151A1 (en) * | 2010-11-23 | 2017-03-09 | Morphotrust Usa, Llc | System and Method to Streamline Identity Verification at Airports and Beyond |
CN107071183A (en) * | 2017-04-27 | 2017-08-18 | 努比亚技术有限公司 | A kind of method of hidden file, device and mobile terminal |
-
2017
- 2017-12-28 CN CN201711459915.9A patent/CN108197489A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170069151A1 (en) * | 2010-11-23 | 2017-03-09 | Morphotrust Usa, Llc | System and Method to Streamline Identity Verification at Airports and Beyond |
CN107071183A (en) * | 2017-04-27 | 2017-08-18 | 努比亚技术有限公司 | A kind of method of hidden file, device and mobile terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113691528A (en) * | 2021-08-23 | 2021-11-23 | 维沃移动通信有限公司 | Two-dimensional code processing method and device and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11057355B2 (en) | Protecting documents using policies and encryption | |
US8918633B2 (en) | Information processing device, information processing system, and program | |
WO2017143879A1 (en) | File permission management method and device | |
US10979450B2 (en) | Method and system for blocking phishing or ransomware attack | |
US20070016771A1 (en) | Maintaining security for file copy operations | |
CN102257483A (en) | Managing access to an address range in a storage device | |
CN105493054A (en) | Fast data protection using dual file systems | |
CN102254124A (en) | Information security protecting system and method of mobile terminal | |
WO2008072883A1 (en) | System for controling documents in a computer | |
CN108228353A (en) | resource access control method, device and corresponding terminal | |
CN104811580A (en) | Image processing apparatus capable of efficiently deleting stored data, method of controlling the same, and storage medium | |
CN103209179A (en) | Secure network storage method and secure network storage system | |
CN108197489A (en) | A kind of processing method and processing unit for intelligent terminal secret file | |
CN101243469A (en) | Digital license migration from first platform to second platform | |
EP1521162A2 (en) | Method of managing file structure in memory card | |
CN106529338A (en) | Safe processing method and equipment of data file | |
KR100941320B1 (en) | Method for Managing Distribution Duration of Secret Material through Inter-working DRM with Portable Memory and the System | |
JP2006252448A (en) | Document management device, sentence management program and document management method | |
CN105760733A (en) | Data encrypting method and module and data accessing method and module | |
CN109784073A (en) | Data access method and device, storage medium, computer equipment | |
CN105205403A (en) | Method and system for managing and controlling file data of local area network based on file filtering | |
CN111199049A (en) | File authority management method and device | |
US11625365B2 (en) | Method for managing virtual file, apparatus for the same, computer program for the same, and recording medium storing computer program thereof | |
CN110929235A (en) | Method and device for processing watermark, computer storage medium and terminal | |
US20230076870A1 (en) | Protections for sensitive content items in a content management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180622 |