CN112214794A - Method for processing encrypted file by terminal equipment and terminal equipment - Google Patents

Method for processing encrypted file by terminal equipment and terminal equipment Download PDF

Info

Publication number
CN112214794A
CN112214794A CN202011069235.8A CN202011069235A CN112214794A CN 112214794 A CN112214794 A CN 112214794A CN 202011069235 A CN202011069235 A CN 202011069235A CN 112214794 A CN112214794 A CN 112214794A
Authority
CN
China
Prior art keywords
user
privacy
file
application
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011069235.8A
Other languages
Chinese (zh)
Inventor
吉忠礼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taizhou Xiangsheng Technology Service Co ltd
Original Assignee
Taizhou Xiangsheng Technology Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taizhou Xiangsheng Technology Service Co ltd filed Critical Taizhou Xiangsheng Technology Service Co ltd
Priority to CN202011069235.8A priority Critical patent/CN112214794A/en
Priority to PCT/CN2020/126739 priority patent/WO2022067964A1/en
Publication of CN112214794A publication Critical patent/CN112214794A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The application discloses a method for processing an encrypted file by terminal equipment and the terminal equipment. The method comprises the following steps: when an instruction of opening a privacy application or a privacy file by a user is received, displaying an input password interface; acquiring a password input by a user, and storing the password input by the user in a target buffer area; and when the user is determined to exit the privacy application or the privacy file and then receives the privacy application or the privacy file, opening the privacy application or the privacy file according to the password input by the user and stored in the target buffer area. The terminal device may store the password input by the user in the target buffer when the user inputs the password. And when the user is determined to exit the privacy application or the privacy file and then receives the privacy application or the privacy file, opening the privacy application or the privacy file according to the password input by the user and stored in the target buffer area. Repeated input by a user is not needed, user operation can be simplified, and the use efficiency of the user is improved.

Description

Method for processing encrypted file by terminal equipment and terminal equipment
Technical Field
The invention relates to the technical field of terminal equipment, in particular to a method for processing an encrypted file by the terminal equipment and the terminal equipment.
Background
With the development of information technology, terminal devices (such as notebook computers, mobile phones, tablet computers, etc.) have become an essential part of people's lives. In general, a user can lock the terminal device when the user does not use the terminal device. Such as locking a screen of the terminal device, or locking a privacy application or file in the terminal device, etc. Therefore, the safety of the information in the terminal equipment can be ensured. When the user needs to use the terminal device, the corresponding unlocking operation can be carried out on the terminal device. Such as unlocking a screen of the terminal device, or unlocking a privacy application or file in the terminal device, and the like.
However, when the user uses the terminal device, the user usually needs to input the password for unlocking in the locked state, and when the user needs to open the privacy application or the privacy file, the user needs to input the password for verification again. After the user uses the privacy application or the privacy file exits, if the user needs to enter the privacy application again, the user needs to input the password again for verification. This results in complicated operation for the user.
Disclosure of Invention
A first aspect of the present application provides a method for processing an encrypted file by a terminal device, where the method includes: when an instruction of opening a privacy application or a privacy file by a user is received, displaying an input password interface; acquiring a password input by a user, and storing the password input by the user in a target buffer area; and when the user is determined to exit the privacy application or the privacy file and then receives the privacy application or the privacy file, opening the privacy application or the privacy file according to the password input by the user and stored in the target buffer area.
Optionally, with reference to the first aspect, the method further includes: receiving a screen locking instruction of a user; clearing the password input by the user and stored in the target buffer area according to the screen locking instruction.
A second aspect of the present application provides a terminal device, wherein the terminal device includes: the receiving module is used for receiving an instruction of opening a privacy application or a privacy file by a user; the display module is used for displaying an input password interface when the receiving module receives an instruction of opening a privacy application or a privacy file by a user; the processing module is used for determining that the user exits the privacy application or the privacy file; the receiving module is further configured to receive the privacy application or the privacy file after the processing module determines that the user exits from the privacy application or the privacy file; the processing module is further configured to open the privacy application or the privacy file according to the password input by the user and stored in the target buffer.
Optionally, with reference to the second aspect, the receiving module is further configured to receive a screen locking instruction of a user; and the processing module is also used for clearing the password input by the user and stored in the target buffer area according to the screen locking instruction.
With reference to any one of the foregoing possible implementation manners of the first aspect, or any one of the second aspect to the second aspect. The method for processing the encrypted file by the terminal equipment and the terminal equipment have the following advantages that: the terminal device may store the password input by the user in the target buffer when the user inputs the password. And when the user is determined to exit the privacy application or the privacy file and then receives the privacy application or the privacy file, opening the privacy application or the privacy file according to the password input by the user and stored in the target buffer area. Repeated input by a user is not needed, user operation can be simplified, and the use efficiency of the user is improved.
Drawings
Fig. 1 is a schematic flowchart of a method for processing an encrypted file by a terminal device according to the present application;
fig. 2 is a schematic structural diagram of a terminal device provided in the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," and the like in the description and in the claims of the present application and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Moreover, the terms "comprises," "comprising," and any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or modules is not necessarily limited to those steps or modules explicitly listed, but may include other steps or modules not expressly listed or inherent to such process, method, article, or apparatus.
With the development of information technology, terminal devices (such as notebook computers, mobile phones, tablet computers, etc.) have become an essential part of people's lives. In general, a user can lock the terminal device when the user does not use the terminal device. Such as locking a screen of the terminal device, or locking a privacy application or file in the terminal device, etc. Therefore, the safety of the information in the terminal equipment can be ensured. When the user needs to use the terminal device, the corresponding unlocking operation can be carried out on the terminal device. Such as unlocking a screen of the terminal device, or unlocking a privacy application or file in the terminal device, and the like.
However, when the user uses the terminal device, the user usually needs to input the password for unlocking in the locked state, and when the user needs to open the privacy application or the privacy file, the user needs to input the password for verification again. After the user uses the privacy application or the privacy file exits, if the user needs to enter the privacy application again, the user needs to input the password again for verification. This results in complicated operation for the user.
In view of this, the present application provides a method for processing an encrypted file by a terminal device, please refer to fig. 1, where the method includes:
101. and when an instruction of opening the privacy application or the privacy file by the user is received, displaying an input password interface.
When an instruction of opening a privacy application or a privacy file by a user is received, displaying an input password interface;
102. and acquiring the password input by the user, and storing the password input by the user in the target buffer area.
Acquiring a password input by a user, and storing the password input by the user in a target buffer area;
103. and when the user is determined to exit the privacy application or the privacy file and then receives the privacy application or the privacy file, opening the privacy application or the privacy file according to the password input by the user and stored in the target buffer area.
And when the user is determined to exit the privacy application or the privacy file and then receives the privacy application or the privacy file, opening the privacy application or the privacy file according to the password input by the user and stored in the target buffer area.
The method further comprises the following steps:
receiving a screen locking instruction of a user;
clearing the password input by the user and stored in the target buffer area according to the screen locking instruction.
The present application provides a terminal device, please refer to fig. 2, where the terminal device 201 includes:
a receiving module 201, configured to receive an instruction of a user to open a privacy application or a privacy file;
the display module 202 is configured to display an input password interface when the receiving module receives an instruction of opening a privacy application or a privacy file by a user;
the processing module 203 is used for determining that the user exits the privacy application or the privacy file;
the receiving module 201 is further configured to receive the privacy application or the privacy file after the processing module determines that the user exits from the privacy application or the privacy file;
the processing module 203 is further configured to open the privacy application or the privacy file according to the password input by the user and stored in the target buffer.
The receiving module 201 is further configured to receive a screen locking instruction of a user;
the processing module 203 is further configured to clear the password input by the user stored in the target buffer area according to the screen locking instruction.
The terminal device provided by the application can be represented in the form of a general computing device. The components of the general purpose computer device may include, but are not limited to: one or more processors or processing units, a system memory, a bus connecting different system components (including the system memory and the processing units);
a bus represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus;
a general purpose computing device typically includes a variety of computer system readable media. Such media may be any available media that is accessible by the electronic device and includes both volatile and nonvolatile media, removable and non-removable media.
The Memory may include computer system readable media in the form of volatile Memory, such as Random Access Memory (RAM) and/or cache Memory. The electronic device may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, the storage system may be used to read from and write to non-removable, nonvolatile magnetic media (commonly referred to as "hard disk drives"). A magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a Compact disk Read Only Memory (CD-ROM), a Digital versatile disk Read Only Memory (DVD-ROM), or other optical media) may be provided. In these cases, each drive may be connected to the bus by one or more data media interfaces. The memory may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the application.
The method for processing the encrypted file by the terminal device and the terminal device provided by the embodiment of the invention are described in detail, a specific embodiment is applied in the description to explain the principle and the implementation of the invention, and the description of the embodiment is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention. Although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (4)

1. A method for processing an encrypted file by a terminal device, the method comprising:
when an instruction of opening a privacy application or a privacy file by a user is received, displaying an input password interface;
acquiring a password input by a user, and storing the password input by the user in a target buffer area;
and when the user is determined to exit the privacy application or the privacy file and then receives the privacy application or the privacy file, opening the privacy application or the privacy file according to the password input by the user and stored in the target buffer area.
2. The method of claim 1, further comprising:
receiving a screen locking instruction of a user;
clearing the password input by the user and stored in the target buffer area according to the screen locking instruction.
3. A terminal device, characterized in that the terminal device comprises:
the receiving module is used for receiving an instruction of opening a privacy application or a privacy file by a user;
the display module is used for displaying an input password interface when the receiving module receives an instruction of opening a privacy application or a privacy file by a user;
the processing module is used for determining that the user exits the privacy application or the privacy file;
the receiving module is further configured to receive the privacy application or the privacy file after the processing module determines that the user exits from the privacy application or the privacy file;
the processing module is further configured to open the privacy application or the privacy file according to the password input by the user and stored in the target buffer.
4. The terminal device of claim 3,
the receiving module is also used for receiving a screen locking instruction of a user;
and the processing module is also used for clearing the password input by the user and stored in the target buffer area according to the screen locking instruction.
CN202011069235.8A 2020-09-30 2020-09-30 Method for processing encrypted file by terminal equipment and terminal equipment Withdrawn CN112214794A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011069235.8A CN112214794A (en) 2020-09-30 2020-09-30 Method for processing encrypted file by terminal equipment and terminal equipment
PCT/CN2020/126739 WO2022067964A1 (en) 2020-09-30 2020-11-05 Method for terminal device to handle encrypted file, and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011069235.8A CN112214794A (en) 2020-09-30 2020-09-30 Method for processing encrypted file by terminal equipment and terminal equipment

Publications (1)

Publication Number Publication Date
CN112214794A true CN112214794A (en) 2021-01-12

Family

ID=74052815

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011069235.8A Withdrawn CN112214794A (en) 2020-09-30 2020-09-30 Method for processing encrypted file by terminal equipment and terminal equipment

Country Status (2)

Country Link
CN (1) CN112214794A (en)
WO (1) WO2022067964A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9294281B2 (en) * 2012-02-10 2016-03-22 Microsoft Technology Licensing, Llc Utilization of a protected module to prevent offline dictionary attacks
CN108040047A (en) * 2017-12-08 2018-05-15 深圳天珑无线科技有限公司 Terminal applies log-in control method, mobile terminal and computer-readable recording medium
CN109635579A (en) * 2018-12-10 2019-04-16 万兴科技股份有限公司 Document decryption method, device, computer equipment and storage medium
CN110162941A (en) * 2019-04-12 2019-08-23 厦门天锐科技股份有限公司 A kind of terminal log-on message store method

Also Published As

Publication number Publication date
WO2022067964A1 (en) 2022-04-07

Similar Documents

Publication Publication Date Title
US8312196B2 (en) Dual processor system and method for using the same
US20130305355A1 (en) Data secrecy method and electronic device using data secrecy method
US10789914B2 (en) Computer system, screen sharing method, and program
CN110287816B (en) Vehicle door motion detection method, device and computer readable storage medium
CN110287810B (en) Vehicle door motion detection method, device and computer readable storage medium
US20190107929A1 (en) Method and device for loading content of page, and electronic device
CN111241043A (en) Multimedia file sharing method, terminal and storage medium
US20150112997A1 (en) Method for content control and electronic device thereof
CN112214794A (en) Method for processing encrypted file by terminal equipment and terminal equipment
CN112017631A (en) Method for determining used language and mobile terminal
CN109241787B (en) Call detection method and device for image input device and computer readable storage medium
US10430503B2 (en) Electronic display content fitting
CN113010128A (en) Multi-screen interaction method and system based on BIM (building information modeling)
CN111083552A (en) Thumbnail generation method, device, equipment and medium
CN111696010A (en) Scene-based training method, server, terminal device and storage medium
CN112214150A (en) Terminal device control method and terminal device
CN111176611B (en) Method and device for generating random data set
CN112214110A (en) Screen display method of terminal equipment and terminal equipment
CN113438419B (en) Camera starting method and device and electronic equipment
US20230259656A1 (en) Systems and methods for rendering secured content items
CN114168274A (en) Task processing method and device, electronic equipment and storage medium
CN111428544B (en) Scene recognition method and device, electronic equipment and storage medium
CN115297273B (en) Video processing method, device, system, electronic equipment and storage medium
CN112214385A (en) Terminal device alarming method and terminal device
CN112235453A (en) Method for displaying message by terminal equipment and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210112

WW01 Invention patent application withdrawn after publication