CN110287719A - File encrypting method and mobile terminal - Google Patents
File encrypting method and mobile terminal Download PDFInfo
- Publication number
- CN110287719A CN110287719A CN201910580491.4A CN201910580491A CN110287719A CN 110287719 A CN110287719 A CN 110287719A CN 201910580491 A CN201910580491 A CN 201910580491A CN 110287719 A CN110287719 A CN 110287719A
- Authority
- CN
- China
- Prior art keywords
- file
- encrypted
- scene information
- module
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
- G06F16/168—Details of user interfaces specifically adapted to file systems, e.g. browsing and visualisation, 2d or 3d GUIs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Human Computer Interaction (AREA)
- Data Mining & Analysis (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a kind of file encrypting method and mobile terminals, which comprises receives the first choice input of user;It is inputted in response to first choice, determines at least two first files to be encrypted;Identify the scene information of each first file to be encrypted;At least two first file mergencess to be encrypted to the first file that scene information is matched;The first file is encrypted, can be realized and file to be encrypted is stored and classified according to scene information, user can search according to file of the scene information to encryption, reduce and search the time and improve search speed, promote the usage experience of user.
Description
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of file encrypting method and mobile terminal.
Background technique
In the internet intelligent movable epoch, individual privacy safety, information security become particularly significant.Therefore, to mobile whole
Setting startup password in end sets account number cipher etc. to social account, in addition to this, the personal private file in mobile terminal storage
It is to be also required to setting password.
Currently, will generally need the file encrypted to be added to mobile whole when mobile terminal encrypts private file
In the safe cabinet at end.
However aforesaid way, when the file for needing to encrypt to be added to the safe cabinet of mobile terminal, in safe cabinet
Encrypt file storage it is disorderly and unsystematic, only in accordance with base categories mode to encryption file carry out classification storage, such as: photo, video,
Compressed package etc. expends overlong time when user requires to look up associated documents.
Summary of the invention
The embodiment of the present invention provides a kind of file encrypting method and mobile terminal, to solve in the prior art for encryption text
The storage of part causes to search difficult problem in a jumble.
In order to solve the above-mentioned technical problem, the present invention is implemented as follows:
In a first aspect, the embodiment of the invention provides a kind of file encrypting method, the method includes;Receive the of user
One selection input;It is inputted in response to the first choice, determines at least two first files to be encrypted;Identify each described first
The scene information of file to be encrypted;At least two first file mergencess to be encrypted that the scene information is matched are to
One file;Encrypt first file.
Second aspect, the embodiment of the invention also provides a kind of mobile terminal, the mobile terminal includes;First receives mould
Block, the first choice for receiving user input;First determining module determines extremely for inputting in response to the first choice
Few two the first files to be encrypted;Identification module, for identification scene information of each first file to be encrypted;First closes
And module, at least two first file mergencess to be encrypted to the first file for the scene information to match;
Encrypting module, for encrypting first file.
The third aspect the embodiment of the invention also provides a kind of mobile terminal, including processor, memory and is stored in institute
The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor
The step of realizing the file encrypting method.
Fourth aspect, it is described computer-readable to deposit the embodiment of the invention also provides a kind of computer readable storage medium
Computer program is stored on storage media, and the step of the file encrypting method is realized when the computer program is executed by processor
Suddenly.
In embodiments of the present invention, it is inputted by receiving the first choice of user;It inputs, is determined extremely in response to first choice
Few two the first files to be encrypted;Identify the scene information of each first file to be encrypted;Scene information is matched at least
Two the first file mergencess to be encrypted to the first file;The first file is encrypted, can be realized will be to be added according to scene information
Ciphertext part is stored and is classified, and user can search according to file of the scene information to encryption, is reduced and is searched the time simultaneously
Search speed is improved, the usage experience of user is promoted.
Detailed description of the invention
Fig. 1 is a kind of step flow chart of file encrypting method of the embodiment of the present invention one;
Fig. 2 is a kind of step flow chart of file encrypting method of the embodiment of the present invention two;
Fig. 3 is a kind of structural block diagram of mobile terminal of the embodiment of the present invention three;
Fig. 4 is a kind of structural block diagram of mobile terminal of the embodiment of the present invention four;
Fig. 5 is the hardware structural diagram of the mobile terminal of the embodiment of the present invention five.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
Embodiment one
Referring to Fig.1, a kind of step flow chart of file encrypting method of the embodiment of the present invention one is shown.
File encrypting method provided in an embodiment of the present invention the following steps are included:
Step 101: receiving the first choice input of user.
First choice input is for selecting the first file to be encrypted.
Step 102: being inputted in response to first choice, determine at least two first files to be encrypted.
Step 103: the scene information of each first file to be encrypted of identification.
User can select to need the first file to be encrypted in the terminal, pass through image recognition technology, identification figure
Image in picture and video identifies the text in document by character recognition technology, is identified in voice by speech recognition technology
Text information, pass through image, text, voice of identification etc. and determine scene information, wherein scene information includes: contract, with it is pre-
If the group photo of contact person, meeting etc., the embodiment of the present invention is not specifically limited this.
Step 104: at least two first file mergencess to be encrypted to the first file that scene information is matched.
Identical each first file to be encrypted of scene information is added in the first file, for the life of the first file
Name, such as: when scene information be contract when, then the first file be named as " contract " or user can be voluntarily to first
The title of file is named.
Step 105: the first file of encryption.
First file is encrypted, to protect privacy of user.
In embodiments of the present invention, it is inputted by receiving the first choice of user;It inputs, is determined extremely in response to first choice
Few two the first files to be encrypted;Identify the scene information of each first file to be encrypted;Scene information is matched at least
Two the first file mergencess to be encrypted to the first file;The first file is encrypted, can be realized will be to be added according to scene information
Ciphertext part is stored and is classified, and user can search according to file of the scene information to encryption, is reduced and is searched the time simultaneously
Search speed is improved, the usage experience of user is promoted.
Embodiment two
Referring to Fig. 2, a kind of step flow chart of file encrypting method of the embodiment of the present invention two is shown.
File encrypting method provided in an embodiment of the present invention the following steps are included:
Step 201: receiving the first choice input of user.
First choice input is for selecting the first file to be encrypted.
Step 202: being inputted in response to first choice, determine at least two first files to be encrypted.
Wherein, the first file to be encrypted can be photo, video.Compressed package, voice messaging, document etc..
Step 203: the scene information of each first file to be encrypted of identification.
User can select to need the first file to be encrypted in the terminal, pass through image recognition technology, identification figure
Image in picture and video identifies the text in document by character recognition technology, is identified in voice by speech recognition technology
Text information, pass through image, text, voice of identification etc. and determine scene information, wherein scene information includes: contract, with it is pre-
If the group photo of contact person, meeting etc., the embodiment of the present invention is not specifically limited this.
Image recognition is practical, refers to and is handled image, analyzed and understood using computer, to identify various different modes
Target and technology to picture.
Character recognition technology generally comprises the acquisition of text information, the analysis of information and processing, the discriminant classification of information etc.
Several parts.Text greyscale transformation on paper at electric signal, is input in computer by information collection.Information collection is by text
Paper advance mechanism and photo-electric conversion device in word cognitron realize there is flying-spot scanner, video camera, light-sensitive element and laser scanning
Equal photo-electric conversion devices.The discriminant classification of information carries out discriminant classification to the text information after removing noise and normalization, with defeated
Recognition result out.
Step 204: at least two first file mergencess to be encrypted to the first file that scene information is matched.
Identical first file to be encrypted of each scene information is added in the first file, for the life of the first file
Name, such as: when scene information be contract when, then the first file be named as " contract " or user can be voluntarily to first
The title of file is named.
Step 205: receiving first input of the user to the first file.
Step 206: in response to the first input, determining the format of each first file to be encrypted in the first file.
It should be noted that the first input can be singly to refer to clicking operation, give more directions and hit operation etc., the embodiment of the present invention pair
This is not specifically limited.
According to first input, determine the format of each first file to be encrypted, wherein format can for PEG, PDF, MP4,
Doc etc..
Step 207: by identical at least two first file mergences to be encrypted to the second file of format.
Wherein, the second file is included at least in the first file.
Each first file to be encrypted of same format is added to the second file, when user is to encryption Fileview,
Without finding the file of needs under multiple format, when user only needs to search the file of picture format, directly in corresponding format
Lower lookup improves search efficiency.
Step 208: the first file of encryption.
Step 209: receiving user to the first sharing operation of the first file.
Step 210: being the first compressed package by each compressing file in the first file in response to the first sharing operation.
Step 211: sending the first compressed package.
When user needs to share the first file, due to the file in the first file generally have it is multiple, because
This, by the compressing file in the first file at compressed package after, send the first compressed package.
User can also share the file in the second file, receive user at least two targets file to be encrypted
The second sharing operation, target file to be encrypted be the first file in the first file to be encrypted in file;In response to
Two sharing operations determine instruction information;When indicating that information instruction sends in the way of compressed package each target file to be encrypted,
It is the second compressed package by each target compressing file to be encrypted;Send the second compressed package;When instruction information instruction sends each mesh one by one
When marking file to be encrypted, according to the operation order to target file to be encrypted, each target file to be encrypted is sent.
For the file in the file and the second file in the first file, each file can be sent one by one, it can also
The compressing file to be shared in the first file or the second file to be sent at compressed package.
The second new file to be encrypted can also be added to the first file by user, specifically: receiving the second of user
Selection operation;In response to the second selection operation, the second file to be encrypted is determined;Detect the first scene letter of the second file to be encrypted
Breath;When the scene information matching corresponding with the first file of the first scene information, the second file to be encrypted is added to first
File;When the first scene information scene information corresponding with the first file mismatches, then according to the first scene information, creation
Third file, wherein include the second file to be encrypted in third file.
When the second file to be encrypted to be added in the first file, by judging that the scene of the second file to be encrypted is believed
Breath, will be added directly in the first file, when second with the file to be encrypted of the scene information of the first file consistent second
When corresponding with the first file scene information difference of the first scene information of file to be encrypted, then prompting frame, Yong Huke are exported
To generate third file by prompt creation third file, or automatically according to the first scene information of the second file to be encrypted
Folder.
In embodiments of the present invention, it is inputted by receiving the first choice of user;It inputs, is determined extremely in response to first choice
Few two the first files to be encrypted;Identify the scene information of each first file to be encrypted;Scene information is matched at least
Two the first file mergencess to be encrypted to the first file;The first file is encrypted, can be realized will be to be added according to scene information
Ciphertext part is stored and is classified, and user can search according to file of the scene information to encryption, is reduced and is searched the time simultaneously
Search speed is improved, the usage experience of user is promoted.
Embodiment three
Referring to Fig. 3, a kind of structural block diagram of mobile terminal of the embodiment of the present invention three is shown.
Mobile terminal provided in an embodiment of the present invention includes: the first receiving module 301, for receiving the first choice of user
Input;First determining module 302 determines at least two first files to be encrypted for inputting in response to the first choice;Know
Other module 303, for identification scene information of each first file to be encrypted;First merging module 304, being used for will be described
At least two first file mergencess to be encrypted to the first file that scene information matches;Encrypting module 305, for adding
Close first file.
In embodiments of the present invention, it is inputted by receiving the first choice of user;It inputs, is determined extremely in response to first choice
Few two the first files to be encrypted;Identify the scene information of each first file to be encrypted;Scene information is matched at least
Two the first file mergencess to be encrypted to the first file;The first file is encrypted, can be realized will be to be added according to scene information
Ciphertext part is stored and is classified, and user can search according to file of the scene information to encryption, is reduced and is searched the time simultaneously
Search speed is improved, the usage experience of user is promoted.
Example IV
Referring to Fig. 4, a kind of structural block diagram of mobile terminal of the embodiment of the present invention four is shown.
Mobile terminal provided in an embodiment of the present invention includes: the first receiving module 401, for receiving the first choice of user
Input;First determining module 402 determines at least two first files to be encrypted for inputting in response to the first choice;Know
Other module 403, for identification scene information of each first file to be encrypted;First merging module 404, being used for will be described
At least two first file mergencess to be encrypted to the first file that scene information matches;Encrypting module 405, for adding
Close first file.
Preferably, the mobile terminal further include: the second receiving module 406, being used for will in first merging module 404
After at least two first file mergencess to be encrypted to the first file that the scene information matches, user couple is received
First input of first file;Second determining module 407, for determining described first in response to first input
The format of each first file to be encrypted in file;Second merging module 408 is used for the format identical at least two
A first file mergences to be encrypted to the second file.
Preferably, the mobile terminal further include: third receiving module 409, for encrypting institute in the encrypting module 405
After stating the first file, user is received to the first sharing operation of first file;First compression module 410, is used for
It is the first compressed package by each compressing file in first file in response to first sharing operation;First sends mould
Block 411, for sending first compressed package.
Preferably, the mobile terminal further include: the 4th receiving module 412, for encrypting institute in the encrypting module 405
After stating the first file, user is received to the second sharing operation of at least two targets file to be encrypted, the target is to be added
Ciphertext part is the file in the described first file to be encrypted in first file;Third determining module 413, for responding
In second sharing operation, instruction information is determined;Second compression module 414, for indicating when the instruction information according to pressure
It is the second compressed package by each target compressing file to be encrypted when the mode of contracting packet sends each target file to be encrypted;
Second sending module 415, for sending second compressed package;Third sending module 416, for being indicated when the instruction information
When sending each target file to be encrypted one by one, according to the operation order to target file to be encrypted, send each described
Target file to be encrypted.
Preferably, the mobile terminal further include: the 5th receiving module 417, for encrypting institute in the encrypting module 405
After stating the first file, the second selection operation of user is received;4th determining module 418, in response to second choosing
Operation is selected, determines the second file to be encrypted;Detection module 419, the first scene for detecting the described second file to be encrypted are believed
Breath;Adding module 420 is used for when first scene information scene information matching corresponding with first file, will
Second file to be encrypted is added to first file;Creation module 421, for working as first scene information and institute
It states the corresponding scene information of the first file to mismatch, then according to first scene information, creates third file, wherein
It include the described second file to be encrypted in the third file.
Mobile terminal provided in an embodiment of the present invention can be realized mobile terminal in the embodiment of the method for Fig. 1 to Fig. 2 and realize
Each process, to avoid repeating, which is not described herein again.
In embodiments of the present invention, it is inputted by receiving the first choice of user;It inputs, is determined extremely in response to first choice
Few two the first files to be encrypted;Identify the scene information of each first file to be encrypted;Scene information is matched at least
Two the first file mergencess to be encrypted to the first file;The first file is encrypted, can be realized will be to be added according to scene information
Ciphertext part is stored and is classified, and user can search according to file of the scene information to encryption, is reduced and is searched the time simultaneously
Search speed is improved, the usage experience of user is promoted.
Embodiment five
Referring to Fig. 5, the hardware structural diagram of a kind of mobile terminal of each embodiment to realize the present invention.
The mobile terminal 500 includes but is not limited to: radio frequency unit 501, network module 502, audio output unit 503, defeated
Enter unit 504, sensor 505, display unit 506, user input unit 507, interface unit 508, memory 509, processor
The components such as 510 and power supply 511.It will be understood by those skilled in the art that mobile terminal structure shown in Fig. 5 is not constituted
Restriction to mobile terminal, mobile terminal may include than illustrating more or fewer components, perhaps combine certain components or
Different component layouts.In embodiments of the present invention, mobile terminal include but is not limited to mobile phone, tablet computer, laptop,
Palm PC, car-mounted terminal, wearable device and pedometer etc..
Processor 510 receives the first choice input of user for controlling user input unit 507;In response to described
One selection input, determines at least two first files to be encrypted;Identify the scene information of each first file to be encrypted;It will
At least two first file mergencess to be encrypted to the first file that the scene information matches;Encrypt first text
Part folder.
In embodiments of the present invention, it is inputted by receiving the first choice of user;It inputs, is determined extremely in response to first choice
Few two the first files to be encrypted;Identify the scene information of each first file to be encrypted;Scene information is matched at least
Two the first file mergencess to be encrypted to the first file;The first file is encrypted, can be realized will be to be added according to scene information
Ciphertext part is stored and is classified, and user can search according to file of the scene information to encryption, is reduced and is searched the time simultaneously
Search speed is improved, the usage experience of user is promoted.
It should be understood that the embodiment of the present invention in, radio frequency unit 501 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 510 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 501 includes but is not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 501 can also by wireless communication system and network and other set
Standby communication.
Mobile terminal provides wireless broadband internet by network module 502 for user and accesses, and such as user is helped to receive
It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 503 can be received by radio frequency unit 501 or network module 502 or in memory 509
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 503 can also be provided and be moved
The relevant audio output of specific function that dynamic terminal 500 executes is (for example, call signal receives sound, message sink sound etc.
Deng).Audio output unit 503 includes loudspeaker, buzzer and receiver etc..
Input unit 504 is for receiving audio or video signal.Input unit 504 may include graphics processor
(Graphics Processing Unit, GPU) 5041 and microphone 5042, graphics processor 5041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 506.Through graphics processor 5041, treated that picture frame can be deposited
Storage is sent in memory 509 (or other storage mediums) or via radio frequency unit 501 or network module 502.Mike
Wind 5042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be
The format output that mobile communication base station can be sent to via radio frequency unit 501 is converted in the case where telephone calling model.
Mobile terminal 500 further includes at least one sensor 505, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 5061, and proximity sensor can close when mobile terminal 500 is moved in one's ear
Display panel 5061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify mobile terminal posture (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes
Sensor 505 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet
Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 506 is for showing information input by user or being supplied to the information of user.Display unit 506 can wrap
Display panel 5061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 5061.
User input unit 507 can be used for receiving the number or character information of input, and generate the use with mobile terminal
Family setting and the related key signals input of function control.Specifically, user input unit 507 include touch panel 5071 and
Other input equipments 5072.Touch panel 5071, also referred to as touch screen collect the touch operation of user on it or nearby
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 5071 or in touch panel 5071
Neighbouring operation).Touch panel 5071 may include both touch detecting apparatus and touch controller.Wherein, touch detection
Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control
Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 510, receiving area
It manages the order that device 510 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Seed type realizes touch panel 5071.In addition to touch panel 5071, user input unit 507 can also include other input equipments
5072.Specifically, other input equipments 5072 can include but is not limited to physical keyboard, function key (such as volume control button,
Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 5071 can be covered on display panel 5061, when touch panel 5071 is detected at it
On or near touch operation after, send processor 510 to determine the type of touch event, be followed by subsequent processing device 510 according to touching
The type for touching event provides corresponding visual output on display panel 5061.Although in Fig. 5, touch panel 5071 and display
Panel 5061 is the function that outputs and inputs of realizing mobile terminal as two independent components, but in some embodiments
In, can be integrated by touch panel 5071 and display panel 5061 and realize the function that outputs and inputs of mobile terminal, it is specific this
Place is without limitation.
Interface unit 508 is the interface that external device (ED) is connect with mobile terminal 500.For example, external device (ED) may include having
Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end
Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module
Mouthful etc..Interface unit 508 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and
By one or more elements that the input received is transferred in mobile terminal 500 or can be used in 500 He of mobile terminal
Data are transmitted between external device (ED).
Memory 509 can be used for storing software program and various data.Memory 509 can mainly include storing program area
The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 509 may include high-speed random access memory, it can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 510 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection
A part by running or execute the software program and/or module that are stored in memory 509, and calls and is stored in storage
Data in device 509 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place
Managing device 510 may include one or more processing units;Preferably, processor 510 can integrate application processor and modulatedemodulate is mediated
Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main
Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 510.
Mobile terminal 500 can also include the power supply 511 (such as battery) powered to all parts, it is preferred that power supply 511
Can be logically contiguous by power-supply management system and processor 510, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
In addition, mobile terminal 500 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including processor 510, and memory 509 is stored in
On memory 509 and the computer program that can run on the processor 510, the computer program are executed by processor 510
Each process of the above-mentioned file encrypting method embodiment of Shi Shixian, and identical technical effect can be reached, to avoid repeating, here
It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program, the computer program realize each process of above-mentioned file encrypting method embodiment, and energy when being executed by processor
Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only
Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation
RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within protection of the invention.
Claims (12)
1. a kind of file encrypting method is applied to terminal device, which is characterized in that the described method includes:
Receive the first choice input of user;
It is inputted in response to the first choice, determines at least two first files to be encrypted;
Identify the scene information of each first file to be encrypted;
At least two first file mergencess to be encrypted to the first file that the scene information is matched;
Encrypt first file.
2. the method according to claim 1, wherein at least two that the scene information matches
After the step of first file mergences to be encrypted to the first file, the method also includes:
Receive first input of the user to first file;
In response to first input, the format of each first file to be encrypted in first file is determined;
By identical at least two first file mergences to be encrypted to the second file of the format.
3. the method according to claim 1, wherein after the encryption first file the step of,
The method also includes:
User is received to the first sharing operation of first file;
It is the first compressed package by each compressing file in first file in response to first sharing operation;
Send first compressed package.
4. the method according to claim 1, wherein after the encryption first file the step of,
The method also includes:
User is received to the second sharing operation of at least two targets file to be encrypted, the target file to be encrypted is described the
The file in the described first file to be encrypted in one file;
In response to second sharing operation, instruction information is determined;
When instruction information instruction sends in the way of compressed package each target file to be encrypted, by each target
Compressing file to be encrypted is the second compressed package;
Send second compressed package;
When instruction information instruction sends each target file to be encrypted one by one, according to target file to be encrypted
Operation order, send each target file to be encrypted.
5. the method according to claim 1, wherein after the encryption first file the step of,
The method also includes:
Receive the second selection operation of user;
In response to second selection operation, the second file to be encrypted is determined;
Detect the first scene information of the described second file to be encrypted;
When first scene information scene information matching corresponding with first file, by the described second ciphertext to be added
Part is added to first file;
When first scene information scene information corresponding with first file mismatches, then according to first scene
Information creates third file, wherein includes the described second file to be encrypted in the third file.
6. a kind of mobile terminal, which is characterized in that the mobile terminal includes;
First receiving module, the first choice for receiving user input;
First determining module determines at least two first files to be encrypted for inputting in response to the first choice;
Identification module, the first merging module of scene information of each first file to be encrypted for identification, for will be described
At least two first file mergencess to be encrypted to the first file that scene information matches;
Encrypting module, for encrypting first file.
7. mobile terminal according to claim 6, which is characterized in that the mobile terminal further include:
Second receiving module, at least two described first for the scene information to match in first merging module
After file mergences to be encrypted to the first file, first input of the user to first file is received;
Second determining module, for determining in first file that each described first is to be encrypted in response to first input
The format of file;
Second merging module is used for identical at least two first file mergences to be encrypted to the second file of the format
Folder.
8. mobile terminal according to claim 6, which is characterized in that the mobile terminal further include:
Third receiving module, for after the encrypting module encrypts first file, receiving user to described first
First sharing operation of file;
First compression module, for being by each compressing file in first file in response to first sharing operation
First compressed package;
First sending module, for sending first compressed package.
9. mobile terminal according to claim 6, which is characterized in that the mobile terminal further include:
4th receiving module, for after the encrypting module encrypts first file, receiving user at least two
Second sharing operation of target file to be encrypted, the target file to be encrypted be first file in described first to
Encrypt the file in file;
Third determining module, for determining instruction information in response to second sharing operation;
Second compression module, for sending each target ciphertext to be added in the way of compressed package when instruction information instruction
It is the second compressed package by each target compressing file to be encrypted when part;
Second sending module, for sending second compressed package;
Third sending module, for when instruction information instruction sends each target file to be encrypted one by one, according to right
The operation order of the target file to be encrypted sends each target file to be encrypted.
10. mobile terminal according to claim 6, which is characterized in that the mobile terminal further include:
5th receiving module, for after the encrypting module encrypts first file, receiving the second selection of user
Operation;
4th determining module, for determining the second file to be encrypted in response to second selection operation;
Detection module, for detecting the first scene information of the described second file to be encrypted;
Adding module is used for when first scene information scene information matching corresponding with first file, by institute
It states the second file to be encrypted and is added to first file;
Creation module, for when first scene information corresponding with first file scene information mismatch, then according to
According to first scene information, third file is created, wherein include the described second ciphertext to be added in the third file
Part.
11. a kind of mobile terminal, which is characterized in that including processor, memory and be stored on the memory and can be in institute
The computer program run on processor is stated, such as claim 1 to 5 is realized when the computer program is executed by the processor
Any one of described in file encrypting method the step of.
12. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium
Sequence, the file encrypting method as described in any one of claims 1 to 5 is realized when the computer program is executed by processor
Step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910580491.4A CN110287719B (en) | 2019-06-28 | 2019-06-28 | File encryption method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910580491.4A CN110287719B (en) | 2019-06-28 | 2019-06-28 | File encryption method and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110287719A true CN110287719A (en) | 2019-09-27 |
CN110287719B CN110287719B (en) | 2021-08-06 |
Family
ID=68019804
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910580491.4A Active CN110287719B (en) | 2019-06-28 | 2019-06-28 | File encryption method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110287719B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021083108A1 (en) * | 2019-10-31 | 2021-05-06 | 维沃移动通信有限公司 | File compression method, file decompression method, and electronic device |
CN112929444A (en) * | 2021-02-19 | 2021-06-08 | 广东云智安信科技有限公司 | Data security protection method, system, device and medium based on compressed file |
CN113297615A (en) * | 2021-05-20 | 2021-08-24 | 青岛海信移动通信技术股份有限公司 | Mobile terminal and data encryption method thereof |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6317777B1 (en) * | 1999-04-26 | 2001-11-13 | Intel Corporation | Method for web based storage and retrieval of documents |
US20050102253A1 (en) * | 2003-10-23 | 2005-05-12 | Microsoft Corporation | Resource compaction |
CN102819396A (en) * | 2012-07-31 | 2012-12-12 | 北京奇虎科技有限公司 | Method and system for playing multimedia file |
CN105338153A (en) * | 2014-08-15 | 2016-02-17 | 中兴通讯股份有限公司 | Contact person information storage method and device |
CN107809526A (en) * | 2017-09-28 | 2018-03-16 | 努比亚技术有限公司 | End application sorting technique, mobile terminal and computer-readable recording medium |
CN107819936A (en) * | 2017-10-20 | 2018-03-20 | 维沃移动通信有限公司 | A kind of SMS classified method, mobile terminal and storage medium |
CN107885887A (en) * | 2017-12-08 | 2018-04-06 | 维沃移动通信有限公司 | A kind of file memory method and mobile terminal |
CN108009274A (en) * | 2017-12-19 | 2018-05-08 | 维沃移动通信有限公司 | Piece file mergence method and mobile terminal |
CN109376771A (en) * | 2018-09-27 | 2019-02-22 | 北京小米移动软件有限公司 | Application program classification method and device |
-
2019
- 2019-06-28 CN CN201910580491.4A patent/CN110287719B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6317777B1 (en) * | 1999-04-26 | 2001-11-13 | Intel Corporation | Method for web based storage and retrieval of documents |
US20050102253A1 (en) * | 2003-10-23 | 2005-05-12 | Microsoft Corporation | Resource compaction |
CN102819396A (en) * | 2012-07-31 | 2012-12-12 | 北京奇虎科技有限公司 | Method and system for playing multimedia file |
CN105338153A (en) * | 2014-08-15 | 2016-02-17 | 中兴通讯股份有限公司 | Contact person information storage method and device |
CN107809526A (en) * | 2017-09-28 | 2018-03-16 | 努比亚技术有限公司 | End application sorting technique, mobile terminal and computer-readable recording medium |
CN107819936A (en) * | 2017-10-20 | 2018-03-20 | 维沃移动通信有限公司 | A kind of SMS classified method, mobile terminal and storage medium |
CN107885887A (en) * | 2017-12-08 | 2018-04-06 | 维沃移动通信有限公司 | A kind of file memory method and mobile terminal |
CN108009274A (en) * | 2017-12-19 | 2018-05-08 | 维沃移动通信有限公司 | Piece file mergence method and mobile terminal |
CN109376771A (en) * | 2018-09-27 | 2019-02-22 | 北京小米移动软件有限公司 | Application program classification method and device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021083108A1 (en) * | 2019-10-31 | 2021-05-06 | 维沃移动通信有限公司 | File compression method, file decompression method, and electronic device |
CN112929444A (en) * | 2021-02-19 | 2021-06-08 | 广东云智安信科技有限公司 | Data security protection method, system, device and medium based on compressed file |
CN112929444B (en) * | 2021-02-19 | 2022-09-23 | 广东云智安信科技有限公司 | Data security protection method, system, device and medium based on compressed file |
CN113297615A (en) * | 2021-05-20 | 2021-08-24 | 青岛海信移动通信技术股份有限公司 | Mobile terminal and data encryption method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN110287719B (en) | 2021-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107784089B (en) | Multimedia data storage method, processing method and mobile terminal | |
CN107808084A (en) | A kind of touch operation method and mobile terminal | |
CN109412932B (en) | Screen capturing method and terminal | |
CN107742072A (en) | Face identification method and mobile terminal | |
CN109508399A (en) | A kind of facial expression image processing method, mobile terminal | |
CN109145552A (en) | Information ciphering method and terminal device | |
CN110287719A (en) | File encrypting method and mobile terminal | |
CN110149628A (en) | A kind of information processing method and terminal device | |
CN108376096A (en) | A kind of message display method and mobile terminal | |
CN110457879A (en) | Object displaying method and terminal device | |
CN110096203A (en) | A kind of screenshot method and mobile terminal | |
CN109828668A (en) | A kind of display control method and electronic equipment | |
CN109067979A (en) | A kind of reminding method and mobile terminal | |
CN108459813A (en) | A kind of searching method and mobile terminal | |
CN107734162A (en) | The method, apparatus and mobile terminal of a kind of message informing | |
CN108494949B (en) | A kind of image classification method and mobile terminal | |
CN108495276B (en) | Sharing method and device of digital business card | |
CN109460649A (en) | A kind of document handling method and terminal device | |
CN110191106A (en) | A kind of data transmission method for uplink, terminal and communication system | |
CN109714462A (en) | A kind of labeling method and its mobile terminal of telephone number | |
CN109062492A (en) | A kind of application access method and terminal | |
CN109670105A (en) | Searching method and mobile terminal | |
CN108848270A (en) | A kind of processing method and mobile terminal of screenshotss image | |
CN108848240A (en) | A kind of protecting information safety method and terminal | |
CN108959963A (en) | A kind of management method and terminal device of application program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |