CN112214794A - Method for processing encrypted file by terminal equipment and terminal equipment - Google Patents
Method for processing encrypted file by terminal equipment and terminal equipment Download PDFInfo
- Publication number
- CN112214794A CN112214794A CN202011069235.8A CN202011069235A CN112214794A CN 112214794 A CN112214794 A CN 112214794A CN 202011069235 A CN202011069235 A CN 202011069235A CN 112214794 A CN112214794 A CN 112214794A
- Authority
- CN
- China
- Prior art keywords
- user
- privacy
- file
- application
- terminal device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The application discloses a method for processing an encrypted file by terminal equipment and the terminal equipment. The method comprises the following steps: when an instruction of opening a privacy application or a privacy file by a user is received, displaying an input password interface; acquiring a password input by a user, and storing the password input by the user in a target buffer area; and when the user is determined to exit the privacy application or the privacy file and then receives the privacy application or the privacy file, opening the privacy application or the privacy file according to the password input by the user and stored in the target buffer area. The terminal device may store the password input by the user in the target buffer when the user inputs the password. And when the user is determined to exit the privacy application or the privacy file and then receives the privacy application or the privacy file, opening the privacy application or the privacy file according to the password input by the user and stored in the target buffer area. Repeated input by a user is not needed, user operation can be simplified, and the use efficiency of the user is improved.
Description
Technical Field
The invention relates to the technical field of terminal equipment, in particular to a method for processing an encrypted file by the terminal equipment and the terminal equipment.
Background
With the development of information technology, terminal devices (such as notebook computers, mobile phones, tablet computers, etc.) have become an essential part of people's lives. In general, a user can lock the terminal device when the user does not use the terminal device. Such as locking a screen of the terminal device, or locking a privacy application or file in the terminal device, etc. Therefore, the safety of the information in the terminal equipment can be ensured. When the user needs to use the terminal device, the corresponding unlocking operation can be carried out on the terminal device. Such as unlocking a screen of the terminal device, or unlocking a privacy application or file in the terminal device, and the like.
However, when the user uses the terminal device, the user usually needs to input the password for unlocking in the locked state, and when the user needs to open the privacy application or the privacy file, the user needs to input the password for verification again. After the user uses the privacy application or the privacy file exits, if the user needs to enter the privacy application again, the user needs to input the password again for verification. This results in complicated operation for the user.
Disclosure of Invention
A first aspect of the present application provides a method for processing an encrypted file by a terminal device, where the method includes: when an instruction of opening a privacy application or a privacy file by a user is received, displaying an input password interface; acquiring a password input by a user, and storing the password input by the user in a target buffer area; and when the user is determined to exit the privacy application or the privacy file and then receives the privacy application or the privacy file, opening the privacy application or the privacy file according to the password input by the user and stored in the target buffer area.
Optionally, with reference to the first aspect, the method further includes: receiving a screen locking instruction of a user; clearing the password input by the user and stored in the target buffer area according to the screen locking instruction.
A second aspect of the present application provides a terminal device, wherein the terminal device includes: the receiving module is used for receiving an instruction of opening a privacy application or a privacy file by a user; the display module is used for displaying an input password interface when the receiving module receives an instruction of opening a privacy application or a privacy file by a user; the processing module is used for determining that the user exits the privacy application or the privacy file; the receiving module is further configured to receive the privacy application or the privacy file after the processing module determines that the user exits from the privacy application or the privacy file; the processing module is further configured to open the privacy application or the privacy file according to the password input by the user and stored in the target buffer.
Optionally, with reference to the second aspect, the receiving module is further configured to receive a screen locking instruction of a user; and the processing module is also used for clearing the password input by the user and stored in the target buffer area according to the screen locking instruction.
With reference to any one of the foregoing possible implementation manners of the first aspect, or any one of the second aspect to the second aspect. The method for processing the encrypted file by the terminal equipment and the terminal equipment have the following advantages that: the terminal device may store the password input by the user in the target buffer when the user inputs the password. And when the user is determined to exit the privacy application or the privacy file and then receives the privacy application or the privacy file, opening the privacy application or the privacy file according to the password input by the user and stored in the target buffer area. Repeated input by a user is not needed, user operation can be simplified, and the use efficiency of the user is improved.
Drawings
Fig. 1 is a schematic flowchart of a method for processing an encrypted file by a terminal device according to the present application;
fig. 2 is a schematic structural diagram of a terminal device provided in the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," and the like in the description and in the claims of the present application and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Moreover, the terms "comprises," "comprising," and any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or modules is not necessarily limited to those steps or modules explicitly listed, but may include other steps or modules not expressly listed or inherent to such process, method, article, or apparatus.
With the development of information technology, terminal devices (such as notebook computers, mobile phones, tablet computers, etc.) have become an essential part of people's lives. In general, a user can lock the terminal device when the user does not use the terminal device. Such as locking a screen of the terminal device, or locking a privacy application or file in the terminal device, etc. Therefore, the safety of the information in the terminal equipment can be ensured. When the user needs to use the terminal device, the corresponding unlocking operation can be carried out on the terminal device. Such as unlocking a screen of the terminal device, or unlocking a privacy application or file in the terminal device, and the like.
However, when the user uses the terminal device, the user usually needs to input the password for unlocking in the locked state, and when the user needs to open the privacy application or the privacy file, the user needs to input the password for verification again. After the user uses the privacy application or the privacy file exits, if the user needs to enter the privacy application again, the user needs to input the password again for verification. This results in complicated operation for the user.
In view of this, the present application provides a method for processing an encrypted file by a terminal device, please refer to fig. 1, where the method includes:
101. and when an instruction of opening the privacy application or the privacy file by the user is received, displaying an input password interface.
When an instruction of opening a privacy application or a privacy file by a user is received, displaying an input password interface;
102. and acquiring the password input by the user, and storing the password input by the user in the target buffer area.
Acquiring a password input by a user, and storing the password input by the user in a target buffer area;
103. and when the user is determined to exit the privacy application or the privacy file and then receives the privacy application or the privacy file, opening the privacy application or the privacy file according to the password input by the user and stored in the target buffer area.
And when the user is determined to exit the privacy application or the privacy file and then receives the privacy application or the privacy file, opening the privacy application or the privacy file according to the password input by the user and stored in the target buffer area.
The method further comprises the following steps:
receiving a screen locking instruction of a user;
clearing the password input by the user and stored in the target buffer area according to the screen locking instruction.
The present application provides a terminal device, please refer to fig. 2, where the terminal device 201 includes:
a receiving module 201, configured to receive an instruction of a user to open a privacy application or a privacy file;
the display module 202 is configured to display an input password interface when the receiving module receives an instruction of opening a privacy application or a privacy file by a user;
the processing module 203 is used for determining that the user exits the privacy application or the privacy file;
the receiving module 201 is further configured to receive the privacy application or the privacy file after the processing module determines that the user exits from the privacy application or the privacy file;
the processing module 203 is further configured to open the privacy application or the privacy file according to the password input by the user and stored in the target buffer.
The receiving module 201 is further configured to receive a screen locking instruction of a user;
the processing module 203 is further configured to clear the password input by the user stored in the target buffer area according to the screen locking instruction.
The terminal device provided by the application can be represented in the form of a general computing device. The components of the general purpose computer device may include, but are not limited to: one or more processors or processing units, a system memory, a bus connecting different system components (including the system memory and the processing units);
a bus represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus;
a general purpose computing device typically includes a variety of computer system readable media. Such media may be any available media that is accessible by the electronic device and includes both volatile and nonvolatile media, removable and non-removable media.
The Memory may include computer system readable media in the form of volatile Memory, such as Random Access Memory (RAM) and/or cache Memory. The electronic device may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, the storage system may be used to read from and write to non-removable, nonvolatile magnetic media (commonly referred to as "hard disk drives"). A magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a Compact disk Read Only Memory (CD-ROM), a Digital versatile disk Read Only Memory (DVD-ROM), or other optical media) may be provided. In these cases, each drive may be connected to the bus by one or more data media interfaces. The memory may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the application.
The method for processing the encrypted file by the terminal device and the terminal device provided by the embodiment of the invention are described in detail, a specific embodiment is applied in the description to explain the principle and the implementation of the invention, and the description of the embodiment is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention. Although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.
Claims (4)
1. A method for processing an encrypted file by a terminal device, the method comprising:
when an instruction of opening a privacy application or a privacy file by a user is received, displaying an input password interface;
acquiring a password input by a user, and storing the password input by the user in a target buffer area;
and when the user is determined to exit the privacy application or the privacy file and then receives the privacy application or the privacy file, opening the privacy application or the privacy file according to the password input by the user and stored in the target buffer area.
2. The method of claim 1, further comprising:
receiving a screen locking instruction of a user;
clearing the password input by the user and stored in the target buffer area according to the screen locking instruction.
3. A terminal device, characterized in that the terminal device comprises:
the receiving module is used for receiving an instruction of opening a privacy application or a privacy file by a user;
the display module is used for displaying an input password interface when the receiving module receives an instruction of opening a privacy application or a privacy file by a user;
the processing module is used for determining that the user exits the privacy application or the privacy file;
the receiving module is further configured to receive the privacy application or the privacy file after the processing module determines that the user exits from the privacy application or the privacy file;
the processing module is further configured to open the privacy application or the privacy file according to the password input by the user and stored in the target buffer.
4. The terminal device of claim 3,
the receiving module is also used for receiving a screen locking instruction of a user;
and the processing module is also used for clearing the password input by the user and stored in the target buffer area according to the screen locking instruction.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011069235.8A CN112214794A (en) | 2020-09-30 | 2020-09-30 | Method for processing encrypted file by terminal equipment and terminal equipment |
PCT/CN2020/126739 WO2022067964A1 (en) | 2020-09-30 | 2020-11-05 | Method for terminal device to handle encrypted file, and terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011069235.8A CN112214794A (en) | 2020-09-30 | 2020-09-30 | Method for processing encrypted file by terminal equipment and terminal equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112214794A true CN112214794A (en) | 2021-01-12 |
Family
ID=74052815
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011069235.8A Withdrawn CN112214794A (en) | 2020-09-30 | 2020-09-30 | Method for processing encrypted file by terminal equipment and terminal equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112214794A (en) |
WO (1) | WO2022067964A1 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9294281B2 (en) * | 2012-02-10 | 2016-03-22 | Microsoft Technology Licensing, Llc | Utilization of a protected module to prevent offline dictionary attacks |
CN108040047A (en) * | 2017-12-08 | 2018-05-15 | 深圳天珑无线科技有限公司 | Terminal applies log-in control method, mobile terminal and computer-readable recording medium |
CN109635579A (en) * | 2018-12-10 | 2019-04-16 | 万兴科技股份有限公司 | Document decryption method, device, computer equipment and storage medium |
CN110162941A (en) * | 2019-04-12 | 2019-08-23 | 厦门天锐科技股份有限公司 | A kind of terminal log-on message store method |
-
2020
- 2020-09-30 CN CN202011069235.8A patent/CN112214794A/en not_active Withdrawn
- 2020-11-05 WO PCT/CN2020/126739 patent/WO2022067964A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
WO2022067964A1 (en) | 2022-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8312196B2 (en) | Dual processor system and method for using the same | |
US20130305355A1 (en) | Data secrecy method and electronic device using data secrecy method | |
US10789914B2 (en) | Computer system, screen sharing method, and program | |
CN110287816B (en) | Vehicle door motion detection method, device and computer readable storage medium | |
CN110287810B (en) | Vehicle door motion detection method, device and computer readable storage medium | |
US20190107929A1 (en) | Method and device for loading content of page, and electronic device | |
CN111241043A (en) | Multimedia file sharing method, terminal and storage medium | |
US20150112997A1 (en) | Method for content control and electronic device thereof | |
CN112214794A (en) | Method for processing encrypted file by terminal equipment and terminal equipment | |
CN112017631A (en) | Method for determining used language and mobile terminal | |
CN109241787B (en) | Call detection method and device for image input device and computer readable storage medium | |
US10430503B2 (en) | Electronic display content fitting | |
CN113010128A (en) | Multi-screen interaction method and system based on BIM (building information modeling) | |
CN111083552A (en) | Thumbnail generation method, device, equipment and medium | |
CN111696010A (en) | Scene-based training method, server, terminal device and storage medium | |
CN112214150A (en) | Terminal device control method and terminal device | |
CN111176611B (en) | Method and device for generating random data set | |
CN112214110A (en) | Screen display method of terminal equipment and terminal equipment | |
CN113438419B (en) | Camera starting method and device and electronic equipment | |
US20230259656A1 (en) | Systems and methods for rendering secured content items | |
CN114168274A (en) | Task processing method and device, electronic equipment and storage medium | |
CN111428544B (en) | Scene recognition method and device, electronic equipment and storage medium | |
CN115297273B (en) | Video processing method, device, system, electronic equipment and storage medium | |
CN112214385A (en) | Terminal device alarming method and terminal device | |
CN112235453A (en) | Method for displaying message by terminal equipment and terminal equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20210112 |
|
WW01 | Invention patent application withdrawn after publication |