CN105069365A - Data processing method and mobile terminal - Google Patents
Data processing method and mobile terminal Download PDFInfo
- Publication number
- CN105069365A CN105069365A CN201510386842.XA CN201510386842A CN105069365A CN 105069365 A CN105069365 A CN 105069365A CN 201510386842 A CN201510386842 A CN 201510386842A CN 105069365 A CN105069365 A CN 105069365A
- Authority
- CN
- China
- Prior art keywords
- data
- priority
- encryption
- mobile terminal
- importance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title description 15
- 238000000034 method Methods 0.000 claims abstract description 37
- 238000012545 processing Methods 0.000 claims abstract description 22
- 238000013478 data encryption standard Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 5
- 230000009977 dual effect Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a data encryption method. The data encryption method comprises steps of reading data stored in the mobile terminal; determining the significance priority of the data; and carrying out encryption processing to the data according to the significance priority of the data. The invention also discloses a mobile terminal. In this way, the data can be encrypted according to the determined significance priority of the data, and therefore when a lot of data is encrypted, the lot of data is encrypted by means of the significance priority of the data, the encryption process is simplified, the data having the same significance priority can use the same password, and therefore the number of passwords is reduced, and the passwords used in the encryption process can be remembered easily.
Description
Technical Field
The embodiment of the invention relates to the technical field of electronic equipment, in particular to a data processing method and a mobile terminal.
Background
With the development of science and technology, mobile terminals (such as mobile phones, tablet computers, intelligent wearable devices, and the like) are increasingly popularized, and meanwhile, functions are also increasingly powerful, and the mobile terminals have evolved from a simple communication tool to be an integrated multifunctional electronic portable device.
In life, in the process of carrying out different encryptions on different data in the mobile terminal, different data can adopt different encryption modes, so that the following situation can occur, some data can adopt digital encryption, some data can adopt fingerprint encryption, and some data can adopt voice encryption, therefore, the data adopt various different modes to encrypt more cockamamie, and forget the password easily.
Disclosure of Invention
The embodiment of the invention provides a data processing method and a mobile terminal, aiming at simplifying the encryption process in the process of encrypting a large amount of data and simultaneously enabling a password used in the encryption to be easier to remember.
The first aspect of the embodiments of the present invention discloses a data processing method, including:
reading data stored in the mobile terminal;
determining an importance priority of the data;
and encrypting the data according to the importance priority of the data.
Accordingly, a second aspect of the embodiments of the present invention discloses a mobile terminal, including:
a reading unit for reading data stored in the mobile terminal;
a determination unit configured to determine an importance priority of the data read by the reading unit;
and the encryption unit is used for encrypting the data according to the importance priority of the data determined by the determination unit.
The embodiment of the invention reads the data stored in the mobile terminal; determining an importance priority of the data; and encrypting the data according to the importance priority of the data. Therefore, the data can be encrypted according to the determined importance priority of the data, so that the importance priority of the data is used for encrypting in the process of encrypting a large amount of data, the encryption process is simplified, and the data with the same importance priority can adopt the same password, so that the number of the passwords is reduced, and the passwords used in the encryption are easier to remember.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the embodiments and the drawings used in the description will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a data processing method according to a first embodiment of the present invention;
fig. 2 is a flowchart illustrating a second embodiment of a data processing method according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a data processing method according to a third embodiment of the present invention;
fig. 4a is a schematic structural diagram of a mobile terminal according to a first embodiment of the present invention;
fig. 4b is a schematic structural diagram of a mobile terminal according to a first embodiment of the present invention;
fig. 5 is a schematic structural diagram of a mobile terminal according to a second embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention without any creative efforts shall fall within the protection scope of the embodiments of the present invention.
In implementation, in the embodiment of the present invention, the mobile terminal may include, but is not limited to: notebook computers, cell phones, tablet computers, smart wearable devices, and the like. The system of the mobile terminal refers to an operating system of the device, and may include but is not limited to: android system, Sayboard system, Windows system, IOS (apple Mobile operating System), XP system, Windows8 system, and the like. It should be noted that the Android mobile terminal refers to a mobile terminal of an Android system, the shift mobile terminal refers to a mobile terminal of a shift system, and the like. The above-mentioned mobile terminals are only examples, not exhaustive, and include but are not limited to the above-mentioned mobile terminals.
The embodiment of the present invention is described with reference to fig. 1 to 5, where the method for processing data and the mobile terminal provided by the embodiment of the present invention are described.
Referring to fig. 1, fig. 1 is a flowchart illustrating a data processing method according to a first embodiment of the present invention. The data processing method described in this embodiment includes the following steps:
and S101, reading data stored in the mobile terminal.
In a specific implementation, the mobile terminal may read data stored in the mobile terminal. In practical applications, not all data need to be encrypted, and in general, the data to be encrypted is important data or data that is not easily consulted by outsiders for privacy purposes. Alternatively, the types of data may include, but are not limited to: word data, excel data, picture data, video data, audio data, folders, applications, desktop shortcuts, and the like.
And S102, determining the importance priority of the data.
In a specific implementation, the mobile terminal may determine an importance priority of the data, and further, the importance priority may be divided into a first priority, a second priority, and a third priority. Wherein the first priority is higher than the second priority, which is higher than the third priority. In general, the first priority data may be considered to be equivalent to the data with the highest importance in the mobile terminal, the decryption difficulty of the data is the greatest, and the part of the data may be considered to be not easy to see by others; the second priority data is equivalent to general important data in the mobile terminal, but the part of data can be seen by good friends, and the decryption difficulty of the part of data is smaller than that of the first priority; while the third priority may be understood as normal data, the portion of data may be exposed.
Alternatively, the mobile terminal may determine the importance priority of the data by means of marking the data by the user, for example, the user marks the data read by the mobile terminal as the first priority. Further optionally, in case of non-essential data, the user may not mark the data.
Alternatively, the mobile terminal may determine the importance priority of the data by the type of the data, for example, the picture data may be a first priority, or the video data may be a second priority. Further optionally, in case of unimportant data, the data may not be prioritized.
S103, encrypting the data according to the importance priority of the data.
In a specific implementation, the mobile terminal may encrypt the data according to the determined importance priority of the data, and if the data is the first priority, may perform the first encryption processing on the data in an encryption manner of the first priority.
For example, when the mobile terminal encrypts data, the mobile terminal may first read the data stored in the mobile terminal, and then determine the priority of the importance of the data; and carrying out encryption processing on the data according to the importance priority of the data. That is, assuming that the mobile terminal reads M data, where N data is data of a first priority, M is greater than N, N is greater than 1, and M and N are integers, the mobile terminal may encrypt the N data by using a first encryption algorithm and a first key corresponding to the first priority, where the N keys may be preset by the system, and thus, it is not necessary to obtain the key each time the importance priority of the data is determined, and thus, the N data may be encrypted by using the same key, which does not require a user to remember too many passwords in the decryption process. That is, as long as the importance priority of the data read by the mobile terminal is determined, the data can be encrypted according to the importance priority of the data.
The embodiment of the invention reads the data stored in the mobile terminal; determining an importance priority of the data; and encrypting the data according to the importance priority of the data. Therefore, the data can be encrypted according to the determined importance priority of the data, so that the importance priority of the data is used for encrypting in the process of encrypting a large amount of data, the encryption process is simplified, and the data with the same importance priority can adopt the same password, so that the number of the passwords is reduced, and the passwords used in the encryption are easier to remember.
Referring to fig. 2, fig. 2 is a flowchart illustrating a data processing method according to a second embodiment of the present invention. The data processing method described in this embodiment includes the following steps:
s201, reading data stored in the mobile terminal.
In a specific implementation, the mobile terminal may read data stored in the mobile terminal. In practical applications, not all data need to be encrypted, and in general, the data to be encrypted is important data or data that is not easily consulted by outsiders for privacy purposes. Alternatively, the types of data may include, but are not limited to: word data, excel data, picture data, video data, audio data, folders, applications, desktop shortcuts, and the like.
And S202, acquiring the mark information associated with the data.
In specific implementation, the mobile terminal may obtain the tag information associated with the data, where the tag information associated with the data may be: data type (i.e., picture, video, web page, etc.), data date, data size, data source, data version, etc.
S203, comparing the marking information with a preset importance priority list to obtain the importance priority of the data.
In a specific implementation, the mobile terminal may compare the tag information with a preset importance priority list to obtain the importance priority of the data. For example, the preset importance priority list may be shaped as: picture first priority, video second priority. Then, assuming that the tag information associated with the data read by the mobile terminal is a picture, the mobile terminal may compare the identifier information with a preset importance priority list, so as to determine that the importance priority of the data is the first priority.
S204, encrypting the data according to the importance priority of the data.
In a specific implementation, the mobile terminal may encrypt the data according to the determined importance priority of the data, and if the data is the first priority, may perform the first encryption processing on the data in an encryption manner of the first priority.
The embodiment of the invention reads the data stored in the mobile terminal; acquiring mark information associated with the data; comparing the marking information with a preset importance priority list to obtain the importance priority of the data; and encrypting the data according to the importance priority of the data. Therefore, the data can be encrypted according to the determined importance priority of the data, so that the importance priority of the data is used for encrypting in the process of encrypting a large amount of data, the encryption process is simplified, and the data with the same importance priority can adopt the same password, so that the number of the passwords is reduced, and the passwords used in the encryption are easier to remember.
Referring to fig. 3, fig. 3 is a flowchart illustrating a data processing method according to a third embodiment of the present invention. The data processing method described in this embodiment includes the following steps:
s301, reading data stored in the mobile terminal.
In a specific implementation, the mobile terminal may read data stored in the mobile terminal. In practical applications, not all data need to be encrypted, and in general, the data to be encrypted is important data or data that is not easily consulted by outsiders for privacy purposes. Alternatively, the types of data may include, but are not limited to: word data, excel data, picture data, video data, audio data, folders, applications, desktop shortcuts, and the like.
S302, determining the importance priority of the data.
In a specific implementation, the mobile terminal may determine an importance priority of the data, and further, the importance priority may be divided into a first priority, a second priority, and a third priority. Wherein the first priority is higher than the second priority, which is higher than the third priority. In general, the first priority data may be considered to be equivalent to the data with the highest importance in the mobile terminal, the decryption difficulty of the data is the greatest, and the part of the data may be considered to be not easy to see by others; the second priority data is equivalent to general important data in the mobile terminal, but the part of data can be seen by good friends, and the decryption difficulty of the part of data is smaller than that of the first priority; while the third priority may be understood as normal data, the portion of data may be exposed.
Alternatively, the mobile terminal may determine the importance priority of the data by means of marking the data by the user, for example, the user marks the data read by the mobile terminal as the first priority. Further optionally, in case of non-essential data, the user may not mark the data.
Alternatively, the mobile terminal may determine the importance priority of the data by the type of the data, for example, the self-picture data may be a first priority, or the video data may be a second priority. Further optionally, in case of unimportant data, the data may not be prioritized.
And S303, under the condition that the importance priority of the data is the first priority, performing first encryption processing on the data according to a first encryption algorithm and a preset first key to obtain first encrypted data.
In a specific implementation, the mobile terminal may perform a first encryption process on the data according to a first encryption algorithm and a preset first key to obtain first encrypted data. Alternatively, the first encryption algorithm may include, but is not limited to: data encryption algorithm (english: DataEncryptionStandard, abbreviation: DES), international data encryption algorithm (english: international dataencryptionalgorithm, abbreviation: IDEA), RSA, one-way hash algorithm (english: Message-DigestAlgorithm5, abbreviation: MD5), digital signature algorithm (english: DigitalSignatureAlgorithm, abbreviation: DSA), advanced encryption standard (english: advanced encryptionstandard, abbreviation: AES), or the like.
Further, under the condition that the importance priority of the data is the second priority, the mobile terminal may perform a second encryption process on the data according to a second encryption algorithm and a preset second key to obtain second encrypted data. Alternatively, the second encryption algorithm may include, but is not limited to: data encryption algorithm DES, international data encryption algorithm IDEA, RSA, one-way hashing algorithm MD5, digital signature algorithm DSA or advanced encryption standard AES. Optionally, the preset second key is a character password set by the user for the data or identification information of the mobile terminal. The identification information of the mobile terminal may include, but is not limited to: international Mobile Equipment Identity (IMEI), a phone number recognized by the mobile terminal, an Integrated Circuit Card Identification (ICCID), and a mobile terminal network access permission number. Alternatively, the number of the phone numbers recognized by the mobile terminal may be plural, for example, a dual card dual standby handset may insert two cards. Alternatively, the identification information of the mobile terminal may be a combination of two or any other combination of an international mobile equipment identity IMEI, a telephone number recognized by the mobile terminal, an integrated circuit card identification code ICCID, and a mobile terminal network access permission number. Alternatively, the character password set by the user for the data may include, but is not limited to: a number, letter, or symbol. Alternatively, the character password length set by the user for the file may include, but is not limited to: 1 bit, 2 bits, 3 bits to 8 bits, 6 bits to 8 bits, not less than 3 bits, and the like.
For example, the mobile terminal determines that the priority of importance of the read data is a first priority, and the first key is fingerprint information input by the user. If the mobile terminal encrypts a picture, the first secret key selects fingerprint information of a middle finger of the left hand input by the user, and the first encryption algorithm selects RSA, the mobile terminal can encrypt the picture according to the first encryption algorithm RSA and the fingerprint information of the middle finger of the left hand input by the user.
The embodiment of the invention reads the data stored in the mobile terminal; determining an importance priority of the data; and under the condition that the importance priority of the data is the first priority, performing first encryption processing on the data according to a first encryption algorithm and a preset first key to obtain first encrypted data. Therefore, the data can be encrypted according to the determined importance priority of the data, so that the importance priority of the data is used for encrypting in the process of encrypting a large amount of data, the encryption process is simplified, and the data with the same importance priority can adopt the same password, so that the number of the passwords is reduced, and the passwords used in the encryption are easier to remember.
Referring to fig. 4a, fig. 4a is a schematic structural diagram of a mobile terminal according to a first embodiment of the present invention, and the mobile terminal described in fig. 4a may include: the reading unit 401, the determining unit 402 and the encrypting unit 403 are specifically as follows:
a reading unit 401, configured to read data stored in the mobile terminal.
In a specific implementation, the reading unit 401 may read data stored in the mobile terminal. In practical applications, not all data need to be encrypted, and in general, the data to be encrypted is important data or data that is not easily consulted by outsiders for privacy purposes. Alternatively, the types of data may include, but are not limited to: word data, excel data, picture data, video data, audio data, folders, applications, desktop shortcuts, and the like.
A determining unit 402, configured to determine an importance priority of the data read by the reading unit 401.
In a specific implementation, the determining unit 402 may determine the importance priority of the data, and further, the importance priority may be divided into a first priority, a second priority, and a third priority. Wherein the first priority is higher than the second priority, which is higher than the third priority. In general, the first priority data may be considered to be equivalent to the data with the highest importance in the mobile terminal, the decryption difficulty of the data is the greatest, and the part of the data may be considered to be not easy to see by others; the second priority data is equivalent to general important data in the mobile terminal, but the part of data can be seen by good friends, and the decryption difficulty of the part of data is smaller than that of the first priority; while the third priority may be understood as normal data, the portion of data may be exposed.
Alternatively, the determining unit 402 may determine the importance priority of the data by marking the data by the user, for example, the user marks the data read by the mobile terminal as the first priority. Further optionally, in case of non-essential data, the user may not mark the data.
Alternatively, the determination unit 402 may determine the importance priority of the data by determining the importance priority of the data according to the type of the data, for example, the self-picture data may be a first priority, or the video data may be determined to be a second priority. Further optionally, in case of unimportant data, the data may not be prioritized.
An encryption unit 403, configured to perform encryption processing on the data according to the importance priority of the data determined by the determination unit 402.
In a specific implementation, the encryption unit 403 may perform encryption processing on the data according to the determined importance priority of the data, and if the data is of the first priority, perform first encryption processing on the data by using an encryption manner of the first priority.
For example, in the process of encrypting data by the encryption unit 403, the reading unit 401 may first read the data stored in the mobile terminal, and the determining unit 402 then determines the priority of importance of the data; the encryption unit 403 performs encryption processing on the data according to the importance priority of the data. That is, assuming that the reading unit 401 reads M data, where N data is data of a first priority, M is greater than N, N is greater than 1, and M and N are integers, the mobile terminal may encrypt the N data by using a first encryption algorithm and a first key corresponding to the first priority, where N key systems may be preset, and thus, it is not necessary to obtain a key each time the priority of importance of the data is determined, and thus, the N data may be encrypted by using the same key, which does not require a user to remember too many passwords in the decryption process. That is, the determination unit 402 can encrypt the data read by the determination unit according to the importance priority of the data as long as the importance priority of the data is determined.
As a possible implementation, as shown in fig. 4b, the determining unit 402 of the mobile terminal depicted in fig. 4a may include: the obtaining unit 4021 and the comparing unit 4022 are as follows:
an obtaining unit 4021, configured to obtain tag information associated with the data read by the reading unit 401.
In a specific implementation, the obtaining unit 4021 may obtain the data-related tag information, where the data-related tag information may be: data type (i.e., picture, video, web page, etc.), data date, data size, data source, data version, etc.
A comparing unit 4022, configured to compare the tag information acquired by the acquiring unit 4021 with a preset importance priority list to obtain an importance priority of the data.
In a specific implementation, the comparing unit 4022 may compare the tag information with a preset importance priority list to obtain the importance priority of the data. For example: the preset importance priority list may be in the form of: picture first priority, video second priority. Next, assuming that the obtaining unit 4021 obtains that the tag information associated with the data read by the reading unit 401 is a picture, the comparing unit 4022 may compare the tag information with a preset importance priority list to determine that the importance priority of the data is the first priority.
As a possible implementation manner, in the case that the importance priority of the data is the first priority, the encryption unit 403 may perform the first encryption processing on the data according to the first encryption algorithm and the preset first key to obtain the first encrypted data.
In a specific implementation, the mobile terminal may perform a first encryption process on the data according to a first encryption algorithm and a preset first key to obtain first encrypted data. Alternatively, the first encryption algorithm may include, but is not limited to: data encryption algorithm DES, international data encryption algorithm IDEA, RSA, one-way hashing algorithm MD5, digital signature algorithm DSA or advanced encryption standard AES.
For example, the determination unit 402 determines that the priority of importance of the read data is a first priority, and the first key is fingerprint information input by the user. If the mobile terminal encrypts a picture, the first key selects fingerprint information of the middle finger of the left hand input by the user, and the first encryption algorithm selects RSA, the encryption unit 403 may encrypt the picture according to the first encryption algorithm RSA and the fingerprint information of the middle finger of the left hand input by the user.
As a possible implementation manner, in the case that the importance priority of the data is the second priority, the encryption unit 403 may perform the second encryption processing on the data according to the second encryption algorithm and the preset second key to obtain the second encrypted data.
In a specific implementation, when the importance priority of the data is the second priority, the mobile terminal may perform a second encryption process on the data according to a second encryption algorithm and a preset second key to obtain second encrypted data. Alternatively, the second encryption algorithm may include, but is not limited to: data encryption algorithm DES, international data encryption algorithm IDEA, RSA, one-way hashing algorithm MD5, digital signature algorithm DSA or advanced encryption standard AES. Optionally, the preset second key is a character password set by the user for the data or identification information of the mobile terminal. The identification information of the mobile terminal may include, but is not limited to: international mobile equipment identity code IMEI, telephone number identified by mobile terminal, integrated circuit card identification code ICCID and mobile terminal network access permission number. Alternatively, the number of the phone numbers recognized by the mobile terminal may be plural, for example, a dual card dual standby handset may insert two cards. Alternatively, the identification information of the mobile terminal may be a combination of two or any other combination of an international mobile equipment identity IMEI, a telephone number recognized by the mobile terminal, an integrated circuit card identification code ICCID, and a mobile terminal network access permission number. Alternatively, the password set by the user for the data may include, but is not limited to: a number, letter, or symbol. Alternatively, the password length set by the user for the file may include, but is not limited to: 1 bit, 2 bits, 3 bits to 8 bits, 6 bits to 8 bits, not less than 3 bits, and the like.
The terminal described in the embodiment of the invention reads the data stored in the mobile terminal; determining an importance priority of the data; and encrypting the data according to the importance priority of the data. Therefore, the data can be encrypted according to the determined importance priority of the data, so that the importance priority of the data is used for encrypting in the process of encrypting a large amount of data, the encryption process is simplified, and the data with the same importance priority can adopt the same password, so that the number of the passwords is reduced, and the passwords used in the encryption are easier to remember.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a mobile terminal according to a second embodiment of the present invention. The mobile terminal described in this embodiment includes: at least one input device 1000; at least one output device 2000; at least one processor 3000, e.g., a CPU; and a memory 4000, the input device 1000, the output device 2000, the processor 3000, and the memory 4000 being connected by a bus 5000.
The input device 1000 may be a touch panel, a general PC, a liquid crystal display, a touch screen, a touch button, or the like.
The memory 4000 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 4000 is used for storing a set of program codes, and the input device 1000, the output device 2000 and the processor 3000 are used for calling the program codes stored in the memory 4000 to execute the following operations:
the processor 3000 is configured to:
reading data stored in the mobile terminal;
determining an importance priority of the data;
and encrypting the data according to the importance priority of the data.
In some possible embodiments, the processor 3000 determines the priority of importance of the data, specifically:
acquiring mark information associated with the data;
and comparing the marking information with a preset importance priority list to obtain the importance priority of the data.
In some possible embodiments, if the importance priority includes at least a first priority and a second priority, and the first priority is higher than the second priority, the processor 3000 performs encryption processing on the data according to the importance priority of the data, specifically:
under the condition that the importance priority of the data is the first priority, performing first encryption processing on the data according to a first encryption algorithm and a preset first key to obtain first encrypted data;
or,
and under the condition that the importance priority of the data is the second priority, performing second encryption processing on the data according to a second encryption algorithm and a preset second key to obtain second encrypted data.
As a possible implementation, the first key is preset to be at least one of the following: fingerprint information, iris information, face information, at least two combinations of the fingerprint information, the iris information, the face information and the character password are used as keys;
as a possible implementation manner, the preset second key is a character password set by the user for data or identification information of the mobile terminal.
As a possible implementation, the first encryption algorithm may include, but is not limited to: a data encryption algorithm DES, an international data encryption algorithm IDEA, RSA, a one-way hash algorithm MD5, a digital signature algorithm DSA and an advanced encryption standard AES;
as a possible implementation, the second encryption algorithm may include, but is not limited to: data encryption algorithm DES, international data encryption algorithm IDEA, RSA, one-way hash algorithm MD5, digital signature algorithm DSA, and advanced encryption Standard AES.
The mobile terminal described in the embodiment of the invention reads the data stored in the mobile terminal; determining an importance priority of the data; and encrypting the data according to the importance priority of the data. Therefore, the data can be encrypted according to the determined importance priority of the data, so that the importance priority of the data is used for encrypting in the process of encrypting a large amount of data, the encryption process is simplified, and the data with the same importance priority can adopt the same password, so that the number of the passwords is reduced, and the passwords used in the encryption are easier to remember.
An embodiment of the present invention further provides a computer storage medium, where the computer storage medium may store a program, and the program includes, when executed, some or all of the steps of any one of the signal processing methods described in the above method embodiments.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like, and may specifically be a processor in the computer device) to execute all or part of the steps of the above-described method according to the embodiments of the present invention. The storage medium may include: a U-disk, a removable hard disk, a magnetic disk, an optical disk, a Read-only memory (ROM) or a Random Access Memory (RAM), and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. A method of data processing, comprising:
reading data stored in the mobile terminal;
determining an importance priority of the data;
and encrypting the data according to the importance priority of the data.
2. The method of claim 1, the determining an importance priority of the data, comprising:
acquiring mark information associated with the data;
and comparing the marking information with a preset importance priority list to obtain the importance priority of the data.
3. The method of claim 1, wherein the importance priority comprises at least a first priority and a second priority, wherein the first priority is higher than the second priority, and wherein encrypting the data according to the importance priority of the data comprises:
under the condition that the importance priority of the data is the first priority, performing first encryption processing on the data according to a first encryption algorithm and a preset first key to obtain first encrypted data;
or,
and under the condition that the importance priority of the data is the second priority, performing second encryption processing on the data according to a second encryption algorithm and a preset second key to obtain second encrypted data.
4. The method of claim 3, wherein the pre-defined first key is at least one of: fingerprint information, iris information, face information, at least two combinations of the fingerprint information, the iris information, the face information and the character password are used as keys;
the preset second key is a character password set by the user aiming at the data or identification information of the mobile terminal.
5. The method of claim 3, wherein the first encryption algorithm comprises at least one of the following encryption algorithms: a data encryption algorithm DES, an international data encryption algorithm IDEA, RSA, a one-way hash algorithm MD5, a digital signature algorithm DSA and an advanced encryption standard AES;
the second encryption algorithm comprises at least one of the following encryption algorithms: data encryption algorithm DES, international data encryption algorithm IDEA, RSA, one-way hash algorithm MD5, digital signature algorithm DSA, and advanced encryption Standard AES.
6. A mobile terminal, comprising:
a reading unit for reading data stored in the mobile terminal;
a determination unit configured to determine an importance priority of the data read by the reading unit;
and the encryption unit is used for encrypting the data according to the importance priority of the data determined by the determination unit.
7. The method of claim 6, the determining unit comprising:
the acquisition unit is used for acquiring the mark information related to the data read by the reading unit;
and the comparison unit is used for comparing the marking information acquired by the acquisition unit with a preset importance priority list to obtain the importance priority of the data.
8. The method according to claim 6, wherein the importance priority comprises at least a first priority and a second priority, wherein the first priority is higher than the second priority, the encryption unit being specifically configured to:
under the condition that the importance priority of the data is the first priority, performing first encryption processing on the data according to a first encryption algorithm and a preset first key to obtain first encrypted data;
or,
and under the condition that the importance priority of the data is the second priority, performing second encryption processing on the data according to a second encryption algorithm and a preset second key to obtain second encrypted data.
9. The mobile terminal of claim 8, wherein the preset first key is at least one of: fingerprint information, iris information, face information, at least two combinations of the fingerprint information, the iris information, the face information and the character password are used as keys;
the preset second key is a character password set by the user aiming at the data or identification information of the mobile terminal.
10. The mobile terminal of claim 8, wherein the first encryption algorithm comprises at least one of the following encryption algorithms: a data encryption algorithm DES, an international data encryption algorithm IDEA, RSA, a one-way hash algorithm MD5, a digital signature algorithm DSA and an advanced encryption standard AES;
the second encryption algorithm comprises at least one of the following encryption algorithms: data encryption algorithm DES, international data encryption algorithm IDEA, RSA, one-way hash algorithm MD5, digital signature algorithm DSA, and advanced encryption Standard AES.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510386842.XA CN105069365A (en) | 2015-06-30 | 2015-06-30 | Data processing method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510386842.XA CN105069365A (en) | 2015-06-30 | 2015-06-30 | Data processing method and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105069365A true CN105069365A (en) | 2015-11-18 |
Family
ID=54498728
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510386842.XA Pending CN105069365A (en) | 2015-06-30 | 2015-06-30 | Data processing method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105069365A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106453663A (en) * | 2016-12-13 | 2017-02-22 | 宁夏凯速德科技有限公司 | Improved cloud service-based storage capacity expansion method and device |
CN106656972A (en) * | 2016-10-14 | 2017-05-10 | 郑州云海信息技术有限公司 | Data encryption method and device |
CN107171800A (en) * | 2017-03-30 | 2017-09-15 | 山东超越数控电子有限公司 | A kind of scheduling system of multichannel cryptographic algorithm |
CN109063458A (en) * | 2018-06-30 | 2018-12-21 | 北京东方英卡数字信息技术有限公司 | A kind of terminal safety method and device of hierarchical information management |
CN109120589A (en) * | 2018-06-30 | 2019-01-01 | 北京东方英卡数字信息技术有限公司 | A kind of end message guard method and device based on Crypted password |
CN112149095A (en) * | 2020-10-26 | 2020-12-29 | 上海松鼠课堂人工智能科技有限公司 | Student data safety management method and system |
CN114430351A (en) * | 2022-04-06 | 2022-05-03 | 北京快立方科技有限公司 | Distributed database node secure communication method and system |
WO2022126980A1 (en) * | 2020-12-15 | 2022-06-23 | 平安科技(深圳)有限公司 | Data transmission method and apparatus, terminal, and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1983292A (en) * | 2006-04-21 | 2007-06-20 | 华为技术有限公司 | Method for protecting data while copying mobile-terminal data |
US20090262926A1 (en) * | 2008-04-16 | 2009-10-22 | Infineon Technologies Ag | Method and apparatus for generating a cryptographic key |
CN102118503A (en) * | 2011-01-25 | 2011-07-06 | 宇龙计算机通信科技(深圳)有限公司 | Data protection method, device and terminal |
CN103886263A (en) * | 2014-03-19 | 2014-06-25 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for protecting data in mobile terminal |
CN104134046A (en) * | 2014-07-29 | 2014-11-05 | 深圳市中兴移动通信有限公司 | Encryption method and device |
CN104205117A (en) * | 2014-04-10 | 2014-12-10 | 华为技术有限公司 | Device file encryption and decryption method and device |
CN104573535A (en) * | 2015-01-04 | 2015-04-29 | 深圳市中兴移动通信有限公司 | Mobile terminal, and method and device for improving encryption efficiency |
CN104573551A (en) * | 2014-12-25 | 2015-04-29 | 广东欧珀移动通信有限公司 | File processing method and mobile terminal |
-
2015
- 2015-06-30 CN CN201510386842.XA patent/CN105069365A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1983292A (en) * | 2006-04-21 | 2007-06-20 | 华为技术有限公司 | Method for protecting data while copying mobile-terminal data |
US20090262926A1 (en) * | 2008-04-16 | 2009-10-22 | Infineon Technologies Ag | Method and apparatus for generating a cryptographic key |
CN102118503A (en) * | 2011-01-25 | 2011-07-06 | 宇龙计算机通信科技(深圳)有限公司 | Data protection method, device and terminal |
CN103886263A (en) * | 2014-03-19 | 2014-06-25 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for protecting data in mobile terminal |
CN104205117A (en) * | 2014-04-10 | 2014-12-10 | 华为技术有限公司 | Device file encryption and decryption method and device |
CN104134046A (en) * | 2014-07-29 | 2014-11-05 | 深圳市中兴移动通信有限公司 | Encryption method and device |
CN104573551A (en) * | 2014-12-25 | 2015-04-29 | 广东欧珀移动通信有限公司 | File processing method and mobile terminal |
CN104573535A (en) * | 2015-01-04 | 2015-04-29 | 深圳市中兴移动通信有限公司 | Mobile terminal, and method and device for improving encryption efficiency |
Non-Patent Citations (1)
Title |
---|
罗文兴: "《移动通信技术》", 31 July 2009, 西南交通大学出版社 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106656972A (en) * | 2016-10-14 | 2017-05-10 | 郑州云海信息技术有限公司 | Data encryption method and device |
CN106453663A (en) * | 2016-12-13 | 2017-02-22 | 宁夏凯速德科技有限公司 | Improved cloud service-based storage capacity expansion method and device |
CN106453663B (en) * | 2016-12-13 | 2019-10-22 | 河北思达歌数据科技投资有限公司 | Improved storage expansion method and device based on cloud service |
CN107171800A (en) * | 2017-03-30 | 2017-09-15 | 山东超越数控电子有限公司 | A kind of scheduling system of multichannel cryptographic algorithm |
CN107171800B (en) * | 2017-03-30 | 2020-07-17 | 山东超越数控电子股份有限公司 | Scheduling system of multi-channel cryptographic algorithm |
CN109063458A (en) * | 2018-06-30 | 2018-12-21 | 北京东方英卡数字信息技术有限公司 | A kind of terminal safety method and device of hierarchical information management |
CN109120589A (en) * | 2018-06-30 | 2019-01-01 | 北京东方英卡数字信息技术有限公司 | A kind of end message guard method and device based on Crypted password |
CN109120589B (en) * | 2018-06-30 | 2021-03-23 | 北京东方英卡数字信息技术有限公司 | Terminal information protection method and device based on encryption password |
CN109063458B (en) * | 2018-06-30 | 2021-11-02 | 恒宝股份有限公司 | Terminal security method and device for hierarchical information management |
CN112149095A (en) * | 2020-10-26 | 2020-12-29 | 上海松鼠课堂人工智能科技有限公司 | Student data safety management method and system |
WO2022126980A1 (en) * | 2020-12-15 | 2022-06-23 | 平安科技(深圳)有限公司 | Data transmission method and apparatus, terminal, and storage medium |
CN114430351A (en) * | 2022-04-06 | 2022-05-03 | 北京快立方科技有限公司 | Distributed database node secure communication method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105069365A (en) | Data processing method and mobile terminal | |
US10078599B2 (en) | Application access control method and electronic apparatus implementing the same | |
US20090298468A1 (en) | System and method for deleting data in a communication device | |
CN105005731A (en) | Data encryption and decryption methods and mobile terminal | |
EP3229400B1 (en) | Password push method, push system, and terminal device | |
CN104573551A (en) | File processing method and mobile terminal | |
EP2835997B1 (en) | Cell phone data encryption method and decryption method | |
US20170201378A1 (en) | Electronic device and method for authenticating identification information thereof | |
CN107248972B (en) | Data encryption and decryption method and device and electronic equipment | |
CN112636914B (en) | Identity verification method, identity verification device and smart card | |
CN105760741A (en) | Code input method, security chip and system | |
CN104144174B (en) | Protect method, user equipment and the server of privacy of user data | |
US8462948B2 (en) | System and method for protecting data of mobile phone | |
JP2017516343A (en) | Address book protection method, apparatus and communication system | |
CN107092834A (en) | A kind of finger print data management method and terminal | |
CN105574429A (en) | File data encryption and decryption method and device and terminal | |
CN105069360A (en) | File encryption and decryption methods and terminal | |
US8347113B2 (en) | System and method for encrypting an electronic file in a mobile electronic device | |
US9203607B2 (en) | Keyless challenge and response system | |
CN104994160B (en) | Document transmission method and relevant apparatus and Transmission system | |
CN107533617B (en) | Server device, information management system, information management method, and computer program | |
CN103902921A (en) | File encryption method and system | |
WO2015154398A1 (en) | Data processing method and device | |
CN109325354B (en) | Data storage, processing and reading method, data storage device and system | |
CN105116997A (en) | Data encryption and decryption method and smart watch |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151118 |