CN106548083B - A kind of note encryption method and terminal - Google Patents
A kind of note encryption method and terminal Download PDFInfo
- Publication number
- CN106548083B CN106548083B CN201611055770.1A CN201611055770A CN106548083B CN 106548083 B CN106548083 B CN 106548083B CN 201611055770 A CN201611055770 A CN 201611055770A CN 106548083 B CN106548083 B CN 106548083B
- Authority
- CN
- China
- Prior art keywords
- note
- information
- newly
- built
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of note encryption method and terminal, solve the problems, such as that existing note application cannot encrypt automatically note.Note encryption method of the invention includes: to obtain the note information of newly-built note;Judge whether the note information of the newly-built note matches with target encryption information, the target encryption information be reach preset quantity in the terminal encrypted note information common to note;If the note information of the newly-built note is matched with the target encryption information, the newly-built note is encrypted.The note encryption method of the embodiment of the present invention has encrypted note information common to note by identification, note content or type of encryption note needed for statistics available user out etc., so as to which subsequent newly-built note is encrypted according to the note information identified, realize the purpose encrypted automatically to the note that user wants to be encrypted, reduce user's operation, the user experience is improved.
Description
Technical field
The present invention relates to the technical fields of note encryption, particularly relate to a kind of note encryption method and terminal.
Background technique
With the rapid development of network, user greatly improves working efficiency by network, but simultaneously network there is
Various security risks, various internet security Frequent Accidents in recent years, various security risks will be faced by being connected into internet,
Such as leakage of information, information is distorted, resource stealing etc..In addition, with the development of electronic industry, mobile device such as smart phone is put down
Plate, notebook etc. enter huge numbers of families, and also along with disadvantage easy to be lost while mobile device is easy to carry, it is set after loss
Standby upper information is arbitrarily checked by other people, will cause the leakage of various important informations.The presence of these risks hinders network
Using and development, under networking, the irreversible situation of the process of IT application, ensure information safety most important.
Therefore, for note application, the encryption function for many types that have been born, the note for establishing oneself is not by other people
Arbitrarily check.But existing note encryption needs user to encrypt manually to note, cumbersome, cannot want to carry out to user
The note of encryption encrypts automatically.
Summary of the invention
The purpose of the present invention is to provide a kind of note encryption method and terminals, it is intended to which solving existing note application cannot be right
The problem of note is encrypted automatically.
To achieve the goals above, the present invention provides a kind of note encryption methods, are applied to terminal, comprising:
Obtain the note information of newly-built note;
Judge whether the note information of the newly-built note matches with target encryption information, the target encryption information is institute
State reach preset quantity in terminal encrypted note information common to note;
If the note information of the newly-built note is matched with the target encryption information, the newly-built note is added
Close processing.
To achieve the goals above, the present invention also provides a kind of terminals, comprising:
First obtains module, for obtaining the note information of newly-built note;
First judgment module, for judging whether the note information of the newly-built note matches with target encryption information, institute
State target encryption information be reach preset quantity in the terminal encrypted note information common to note;
Encrypting module, if the note information for the newly-built note is matched with the target encryption information, to described
Newly-built note is encrypted.
The embodiment of the present invention has the advantages that
The above-mentioned technical proposal of the embodiment of the present invention obtains the note information of newly-built note;Judge the newly-built note
Whether note information matches with target encryption information, and the target encryption information is to reach having added for preset quantity in the terminal
Note information common to close note;If the note information of the newly-built note is matched with the target encryption information, to institute
Newly-built note is stated to be encrypted.The note encryption method of the embodiment of the present invention has been encrypted common to note just by identification
Information, the note content or type of encryption note needed for statistics available user out etc. are signed, so as to believe according to the note identified
Subsequent newly-built note is encrypted in breath, realizes the purpose encrypted automatically to the note that user wants to be encrypted, reduces
User's operation, the user experience is improved.
Detailed description of the invention
Fig. 1 is a work flow diagram of note of embodiment of the present invention encryption method;
Fig. 2 is the another work flow diagram of note of embodiment of the present invention encryption method;
Fig. 3 is a structural block diagram of the terminal of the embodiment of the present invention;
Fig. 4 is the another structural block diagram of the terminal of the embodiment of the present invention;
Fig. 5 is another structural block diagram of the terminal of the embodiment of the present invention.
Specific embodiment
To keep the technical problem to be solved in the present invention, technical solution and advantage clearer, below in conjunction with specific implementation
Example and attached drawing are described in detail.
The embodiment of the present invention is aiming at the problem that existing note application cannot encrypt automatically note, the embodiment of the present invention
Provide a kind of note encryption method and terminal, note information common to note encrypted by identification, it is statistics available go out user
Note content or type of required encryption note etc., so as to be carried out according to the note information identified to subsequent newly-built note
Encryption realizes the purpose encrypted automatically to the note that user wants to be encrypted, reduces user's operation, improve user
Experience.
First embodiment
As shown in Figure 1, being applied to terminal the embodiment provides a kind of note encryption method, comprising:
Step 101: obtaining the note information of newly-built note.
Here note information can be specially note type or note content.
In a specific embodiment of the present invention, if user opens automatic encryption function, after user creates note,
The note information of the newly-built note will be obtained, newly-built note is carried out certainly according to the note information for creating note so as to subsequent
Dynamic encryption.
Step 102: judging whether the note information of above-mentioned newly-built note matches with target encryption information, target encryption letter
Breath be reach preset quantity in terminal encrypted note information common to note.
Here, above-mentioned note information may include keyword or note type.Having encrypted note can be specially that user adds manually
Close obtained note then counts the note of the preset quantity when having encrypted the quantity of note in the terminal and reaching preset quantity
Common note information will if all or most all has same note information in the note of above-mentioned preset quantity
The note information is as above-mentioned target encryption information.Note information common to note has been encrypted by identification, it may be appreciated that user
The note information of encryption is wished, so that convenient encrypt newly-built note automatically.
Further, above-mentioned target encryption information is target keyword, and above-mentioned note information is note content;
Above-mentioned steps 102 may particularly include: determine in the note content of newly-built note whether include target keyword;If new
It builds in the note content of note comprising target keyword, it is determined that the note information of newly-built note is matched with target encryption information.
Further, above-mentioned target encryption information includes target encryption type, and above-mentioned note information is note type;
Above-mentioned steps 102 may particularly include: determine in target encryption type whether include the note type for creating note;If
It is, it is determined that the note information of newly-built note is matched with target encryption information.
Step 103: if the note information of newly-built note is matched with above-mentioned target encryption information, to above-mentioned newly-built note into
Row encryption.
If the note information of newly-built note is matched with above-mentioned target encryption information, illustrate that the newly-built note is that user wishes
The note encrypted is encrypted automatically so as to create note to this, is manually operated without user, is brought for user very big
Convenience.
Certainly, in the embodiment of the present invention, above-mentioned target encryption information can also for user according to set by self-demand just
Sign information.
Further, in the embodiment of the present invention, if the note information of above-mentioned newly-built note and above-mentioned target encryption information
After the step of matching, then above-mentioned newly-built note being encrypted, further includes:
Generate a prompt information for prompting the above-mentioned newly-built note of user to encrypt.
Here, it generates above-mentioned prompt information and shows, user is facilitated to understand the encryption information of the newly-built note in time.
The note encryption method of the embodiment of the present invention obtains the note information of newly-built note;Judge the newly-built note
Whether note information matches with target encryption information, and the target encryption information is to reach having added for preset quantity in the terminal
Note information common to close note;If the note information of the newly-built note is matched with the target encryption information, to institute
Newly-built note is stated to be encrypted.The note encryption method of the embodiment of the present invention has been encrypted common to note just by identification
Information, the note content or type of encryption note needed for statistics available user out etc. are signed, so as to believe according to the note identified
Subsequent newly-built note is encrypted in breath, realizes the purpose encrypted automatically to the note that user wants to be encrypted, reduces
User's operation, the user experience is improved.
Second embodiment
As shown in Fig. 2, being applied to terminal the embodiment provides a kind of note encryption method, comprising:
Step 201: obtaining the note information of newly-built note.
The step is identical as the step 101 in above-mentioned first embodiment, and details are not described herein again.
Step 202: obtaining the note information that note has been encrypted in terminal.
Here note information may include note type and note content.
Step 203: whether the note quantity for judging that terminal has encrypted in note with identical note information reaches present count
Amount.
Step 204: if reaching above-mentioned preset quantity, that extracts the preset quantity has encrypted the letter of note common to note
Breath is used as above-mentioned target encryption information.
When the quantity of note information having the same is more than or equal to preset quantity, show that the note information is to have added
The common information of close note, user wish to encrypt the note for carrying the common information.
Step 205: judging whether the note information of newly-built note matches with target encryption information, which is
Reach preset quantity in the terminal has encrypted note information common to note.
Further, above-mentioned target encryption information is target keyword, and above-mentioned note information is note content;
Above-mentioned steps 205 may particularly include: determine in the note content of newly-built note whether include target keyword;If new
It builds in the note content of note comprising target keyword, it is determined that the note information of newly-built note is matched with target encryption information.
Further, above-mentioned target encryption information includes target encryption type, and above-mentioned note information is note type;
Above-mentioned steps 205 may particularly include: determine in target encryption type whether include the note type for creating note;If
It is, it is determined that the note information of newly-built note is matched with target encryption information.
Step 206: if the note information of newly-built note is matched with above-mentioned target encryption information, to above-mentioned newly-built note into
Row encryption.
Here, when the note information of newly-built note is matched with above-mentioned target encryption information, newly-built note is carried out automatically
Encryption can effectively prevent user to forget that the note encrypted to needs encrypts.
The note encryption method of the embodiment of the present invention has encrypted note information common to note by identification, statistics available
The note content or type etc. of encryption note needed for user out, so as to be created just according to the note information identified to subsequent
Label are encrypted, and realize the purpose encrypted automatically to the note that user wants to be encrypted, reduce user's operation, are promoted
User experience.
In addition, the encryption method of the embodiment of the present invention, is equally applicable to the encryption of application program in terminal, such as pass through statistics
Encrypt the type of application program or according to predetermined keyword, to determine application program that user wants to be encrypted, thus
Automatically newly-built application program is encrypted.
3rd embodiment
As shown in figure 3, the embodiments of the present invention also provide a kind of terminals, comprising:
First obtains module 301, for obtaining the note information of newly-built note;
First judgment module 302, for judging whether the note information of the newly-built note matches with target encryption information,
The target encryption information be reach preset quantity in the terminal encrypted note information common to note;
Encrypting module 303, if the note information for the newly-built note is matched with the target encryption information, to institute
Newly-built note is stated to be encrypted.
The terminal of the embodiment of the present invention, further includes:
Second obtains module 304, for obtaining the note information for having encrypted note in terminal;
Second judgment module 305, for judging that the terminal has encrypted the note number in note with identical note information
Whether amount reaches the preset quantity;
Extraction module 306, if the note of encryption for extracting the preset quantity is total to for reaching the preset quantity
Some note information is as the target encryption information.
The terminal of the embodiment of the present invention, the target encryption information are target keyword, and the note information is in note
Hold;
The first judgment module 302 includes:
Whether first determines submodule 3021, close comprising the target in the note content for determining the newly-built note
Keyword;
Second determines submodule 3022, if for including the target keyword in the note content of the newly-built note,
Then determine that the note information of the newly-built note is matched with the target encryption information.
The terminal of the embodiment of the present invention, the target encryption information are target encryption type, and the note information is note
Type;
The first judgment module 302 includes:
Third determines submodule 3023, for determine in the target encryption type whether comprising the newly-built note just
Sign type;
4th determines submodule 3024, includes if determining that submodule determines in the target encryption type for the third
The note type of the newly-built note, it is determined that the note information of the newly-built note is matched with the target encryption information.
The terminal of the embodiment of the present invention, further includes:
Generation module 307, for generating one for prompting the prompt information that newly-built note has encrypted described in user.
The terminal of the embodiment of the present invention obtains the note information of newly-built note;Judge the note information of the newly-built note
Whether matched with target encryption information, the target encryption information is the note of the encryption institute that reaches preset quantity in the terminal
Shared note information;If the note information of the newly-built note is matched with the target encryption information, created just to described
Label are encrypted.The note encryption method of the embodiment of the present invention has encrypted note information common to note by identification,
It is statistics available go out user needed for encryption note note content or type etc., so as to according to the note information identified to subsequent
Newly-built note is encrypted, and realizes the purpose encrypted automatically to the note that user wants to be encrypted, reduces user behaviour
Make, the user experience is improved.
Fourth embodiment
As shown in figure 4, being the another structural block diagram of the terminal of that embodiment of the invention, terminal 400 shown in Fig. 4 includes: at least
One processor 401, memory 402, at least one network interface 404 and user interface 403.Various components in terminal 400
It is coupled by bus system 405.It is understood that bus system 405 is for realizing the connection communication between these components.Always
Linear system system 405 further includes power bus, control bus and status signal bus in addition in addition to including data/address bus.But in order to clear
For the sake of Chu's explanation, various buses are all designated as bus system 405 in Fig. 4.
Wherein, user interface 403 may include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 402 in the embodiment of the present invention can be volatile memory or nonvolatile memory,
It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read-
Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable
Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or
Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high
Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory
(Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory
(Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate
SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct
Rambus RAM, DRRAM).The memory 402 of system and method described herein is intended to include but is not limited to these and arbitrarily its
It is suitble to the memory of type.
In some embodiments, memory 402 stores following element, executable modules or data structures, or
Their subset of person or their superset: operating system 4021 and application program 4022.
Wherein, operating system 4021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for
Realize various basic businesses and the hardware based task of processing.Application program 4022 includes various application programs, such as media
Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention
The program of method may be embodied in application program 4022.
In one embodiment of this invention, by the program or instruction of calling memory 402 to store, the specific can be that
The program or instruction stored in application program 4022, processor 401 are used to obtain the note information of newly-built note;Judge described new
Whether the note information for building note matches with target encryption information, and the target encryption information is to reach present count in the terminal
Amount has encrypted note information common to note;If the note information of the newly-built note and the target encryption information
Match, then the newly-built note is encrypted.
Optionally, processor 401 is also used to: obtaining the note information that note has been encrypted in terminal;Judge the terminal
Whether the note quantity with identical note information reaches the preset quantity in encryption note;If reaching the preset quantity,
That then extracts the preset quantity has encrypted note information common to note as the target encryption information.
Optionally, the target encryption information is target keyword, and the note information is note content;Processor 401
It is also used to: whether determining in the note content of the newly-built note comprising the target keyword;If the newly-built note is just
Signing includes the target keyword in content, it is determined that the note information of the newly-built note and the target encryption information
Match.
Optionally, the target encryption information is target encryption type, and the note information is note type;Processor
401 are also used to: determine in the target encryption type whether include the newly-built note note type;If so, determining institute
The note information for stating newly-built note is matched with the target encryption information.
Optionally, processor 401 is also used to: generating a prompt letter for prompting newly-built note described in user to encrypt
Breath.
The terminal 400 of the embodiment of the present invention, processor 401 are used to obtain the note information of newly-built note;Judge described new
Whether the note information for building note matches with target encryption information, and the target encryption information is to reach present count in the terminal
Amount has encrypted note information common to note;If the note information of the newly-built note and the target encryption information
Match, then the newly-built note is encrypted.The note encryption method of the embodiment of the present invention has encrypted note by identification
Common note information, it is statistics available go out user needed for encryption note note content or type etc., so as to according to being known
Subsequent newly-built note is encrypted in other note information, what realization encrypted the note that user wants to be encrypted automatically
Purpose reduces user's operation, and the user experience is improved.
Terminal of the invention such as can be mobile phone, tablet computer, personal digital assistant (Personal Digital
Assistant, PDA) or vehicle-mounted computer etc. terminal.
Terminal 400 can be realized each process that terminal is realized in previous embodiment, no longer superfluous here to avoid repeating
It states.
The method that the embodiments of the present invention disclose can be applied in processor 401, or real by processor 401
It is existing.Processor 401 may be a kind of IC chip, the processing capacity with signal.During realization, the above method
Each step can be completed by the integrated logic circuit of the hardware in processor 401 or the instruction of software form.Above-mentioned place
Reason device 401 can be general processor, digital signal processor (Digital Signal Processor, DSP), dedicated integrated
Circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general
Processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with institute of the embodiment of the present invention
The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor
And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only
In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at
The step of memory 402, processor 401 reads the information in memory 402, completes the above method in conjunction with its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its
Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (Application
Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing,
DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic
Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor,
In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein
The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or
It is realized outside processor.
5th embodiment:
As shown in figure 5, another structural block diagram of the terminal for the embodiment of the present invention.Terminal 500 shown in fig. 5 includes radio frequency
(Radio Frequency, RF) circuit 510, memory 520, input unit 530, display unit 540, processor 560, audio
Circuit 570, WiFi (Wireless Fidelity) module 580 and power supply 590.
Wherein, input unit 530 can be used for receiving the number or character information of user's input, and generate and terminal 500
User setting and function control related signal input.Specifically, in the embodiment of the present invention, which can be with
Including touch panel 531.Touch panel 531, also referred to as touch screen collect the touch operation (ratio of user on it or nearby
Such as user uses the operation of finger, stylus any suitable object or attachment on touch panel 531), and according to setting in advance
Fixed formula drives corresponding attachment device.Optionally, touch panel 531 may include touch detecting apparatus and touch controller two
A part.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected, signal is passed
Give touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then
The processor 560 is given, and order that processor 560 is sent can be received and executed.Furthermore, it is possible to using resistance-type, electricity
The multiple types such as appearance formula, infrared ray and surface acoustic wave realize touch panel 531.In addition to touch panel 531, input unit 530
Can also include other input equipments 532, other input equipments 532 can include but is not limited to physical keyboard, function key (such as
Volume control button, switch key etc.), trace ball, mouse, one of operating stick etc. or a variety of.
Wherein, display unit 540 can be used for showing information input by user or be supplied to the information and terminal of user
500 various menu interfaces.Display unit 540 may include display panel 541, optionally, can use LCD or organic light emission two
The forms such as pole pipe (Organic Light-Emitting Diode, OLED) configure display panel 541.
It should be noted that touch panel 531 can cover display panel 541, touch display screen is formed, when the touch display screen is examined
After measuring touch operation on it or nearby, processor 560 is sent to determine the type of touch event, is followed by subsequent processing device
560 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area
And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious
Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with
The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area
Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example,
Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 560 is the control centre of terminal 500, utilizes each of various interfaces and connection whole mobile phone
Part by running or execute the software program and/or module that are stored in first memory 521, and calls and is stored in the
Data in two memories 522 execute the various functions and processing data of terminal 500, to carry out whole prison to terminal 500
Control.Optionally, processor 560 may include one or more processing units.
In one embodiment of this invention, by calling the software program and/or module that store in the first memory 521
And/or the data in the second memory 522, processor 560 are used to obtain the note information of newly-built note;Judge described newly-built
Whether the note information of note matches with target encryption information, and the target encryption information is to reach preset quantity in the terminal
Encrypted note information common to note;If the note information of the newly-built note is matched with the target encryption information,
Then the newly-built note is encrypted.
Optionally, processor 560 is also used to: obtaining the note information that note has been encrypted in terminal;Judge the terminal
Whether the note quantity with identical note information reaches the preset quantity in encryption note;If reaching the preset quantity,
That then extracts the preset quantity has encrypted note information common to note as the target encryption information.
Optionally, the target encryption information is target keyword, and the note information is note content;Processor 560
It is also used to: whether determining in the note content of the newly-built note comprising the target keyword;If the newly-built note is just
Signing includes the target keyword in content, it is determined that the note information of the newly-built note and the target encryption information
Match.
Optionally, the target encryption information is target encryption type, and the note information is note type;Processor
560 are also used to: determine in the target encryption type whether include the newly-built note note type;If so, determining institute
The note information for stating newly-built note is matched with the target encryption information.
Optionally, processor 560 is also used to: generating a prompt letter for prompting newly-built note described in user to encrypt
Breath.
The terminal 500 of the embodiment of the present invention, processor 560 obtain the note information of newly-built note;Judge described create just
Whether the note information of label matches with target encryption information, and the target encryption information is to reach preset quantity in the terminal
Note information common to note is encrypted;If the note information of the newly-built note is matched with the target encryption information,
The newly-built note is encrypted.The note encryption method of the embodiment of the present invention has been encrypted common to note by identification
Note information, it is statistics available go out user needed for encryption note note content or type etc., so as to according to being identified just
Subsequent newly-built note is encrypted in label information, realizes the purpose encrypted automatically to the note that user wants to be encrypted,
Reduce user's operation, the user experience is improved.
Terminal of the invention such as can be mobile phone, tablet computer, personal digital assistant (Personal Digital
Assistant, PDA) or vehicle-mounted computer etc. terminal.
Terminal 500 can be realized each process that terminal is realized in previous embodiment, no longer superfluous here to avoid repeating
It states.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others
Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit
It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program code
Medium.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is controlled by computer program to complete, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access
Memory, RAM) etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Within mind and principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (8)
1. a kind of note encryption method is applied to terminal characterized by comprising
Obtain the note information of newly-built note;
Judge whether the note information of the newly-built note matches with target encryption information, the target encryption information is the end
Reach preset quantity in end has encrypted note information common to note;
If the note information of the newly-built note is matched with the target encryption information, the newly-built note is carried out at encryption
Reason;
Before judging the step of whether the note information of the newly-built note matches with target encryption information, the note encryption side
Method further include:
Obtain the note information that note has been encrypted in terminal;
Whether the note quantity for judging that the terminal has encrypted in note with identical note information reaches the preset quantity;
If reaching the preset quantity, extract the preset quantity encrypted note information common to note be used as described in
Target encryption information.
2. note encryption method according to claim 1, which is characterized in that the target encryption information is target critical
Word, the note information are note content;
The step of whether the note information for judging the newly-built note matches with target encryption information include:
It whether determines in the note content of the newly-built note comprising the target keyword;
If in the note content of the newly-built note including the target keyword, it is determined that the note information of the newly-built note
It is matched with the target encryption information.
3. note encryption method according to claim 1, which is characterized in that the target encryption information is that target encrypts class
Type, the note information are note type;
The step of whether the note information for judging the newly-built note matches with target encryption information include:
Determine in the target encryption type whether include the newly-built note note type;
If so, determining that the note information of the newly-built note is matched with the target encryption information.
4. note encryption method according to claim 1, which is characterized in that if the note information of the newly-built note
After the step of matching, then the newly-built note being encrypted with the target encryption information, the note encryption side
Method further include:
One is generated for prompting the prompt information that newly-built note has encrypted described in user.
5. a kind of terminal characterized by comprising
First obtains module, for obtaining the note information of newly-built note;
First judgment module, for judging whether the note information of the newly-built note matches with target encryption information, the mesh
Mark encryption information be reach preset quantity in the terminal encrypted note information common to note;
Encrypting module, if the note information for the newly-built note is matched with the target encryption information, to described newly-built
Note is encrypted;
The terminal further include:
Second obtains module, for obtaining the note information for having encrypted note in terminal;
Whether the second judgment module, the note quantity for judging that the terminal has encrypted in note with identical note information reach
To the preset quantity;
Extraction module, if extracting having encrypted common to note just for the preset quantity for reaching the preset quantity
Information is signed as the target encryption information.
6. terminal according to claim 5, which is characterized in that the target encryption information be target keyword, it is described just
Label information is note content;
The first judgment module includes:
Whether first determines submodule, include the target keyword in the note content for determining the newly-built note;
Second determines submodule, if for including the target keyword in the note content of the newly-built note, it is determined that institute
The note information for stating newly-built note is matched with the target encryption information.
7. terminal according to claim 5, which is characterized in that the target encryption information is target encryption type, described
Note information is note type;
The first judgment module includes:
Third determines submodule, for determine in the target encryption type whether include the newly-built note note type;
4th determines submodule, if determining that submodule determines in the target encryption type comprising described newly-built for the third
The note type of note, it is determined that the note information of the newly-built note is matched with the target encryption information.
8. terminal according to claim 5, which is characterized in that further include:
Generation module, for generating one for prompting the prompt information that newly-built note has encrypted described in user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611055770.1A CN106548083B (en) | 2016-11-25 | 2016-11-25 | A kind of note encryption method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611055770.1A CN106548083B (en) | 2016-11-25 | 2016-11-25 | A kind of note encryption method and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106548083A CN106548083A (en) | 2017-03-29 |
CN106548083B true CN106548083B (en) | 2019-10-15 |
Family
ID=58395177
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611055770.1A Active CN106548083B (en) | 2016-11-25 | 2016-11-25 | A kind of note encryption method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106548083B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107332973B (en) * | 2017-05-19 | 2020-09-25 | 北京安云世纪科技有限公司 | Text data processing method and device and mobile terminal |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1924866A (en) * | 2006-09-28 | 2007-03-07 | 北京理工大学 | Static feature based web page malicious scenarios detection method |
CN101401061A (en) * | 2005-05-09 | 2009-04-01 | 普罗维拉公司 | Cascading security architecture |
CN102201048A (en) * | 2010-03-24 | 2011-09-28 | 日电(中国)有限公司 | Method and system for performing topic-level privacy protection on document set |
CN103150499A (en) * | 2012-12-27 | 2013-06-12 | 中华电信股份有限公司 | Protection method for preventing file from being leaked in encrypted form |
CN103679012A (en) * | 2012-09-03 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Clustering method and device of portable execute (PE) files |
CN104317976A (en) * | 2014-11-21 | 2015-01-28 | 四川智诚天逸科技有限公司 | Method for storing information |
CN105069358A (en) * | 2015-07-13 | 2015-11-18 | 西安理工大学 | Keyword searchable encryption method based on Bloom filter with storage structure |
CN105468694A (en) * | 2015-11-17 | 2016-04-06 | 小米科技有限责任公司 | Information template mining method and apparatus |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8458179B2 (en) * | 2007-11-29 | 2013-06-04 | Palo Alto Research Center Incorporated | Augmenting privacy policies with inference detection |
-
2016
- 2016-11-25 CN CN201611055770.1A patent/CN106548083B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101401061A (en) * | 2005-05-09 | 2009-04-01 | 普罗维拉公司 | Cascading security architecture |
CN1924866A (en) * | 2006-09-28 | 2007-03-07 | 北京理工大学 | Static feature based web page malicious scenarios detection method |
CN102201048A (en) * | 2010-03-24 | 2011-09-28 | 日电(中国)有限公司 | Method and system for performing topic-level privacy protection on document set |
CN103679012A (en) * | 2012-09-03 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Clustering method and device of portable execute (PE) files |
CN103150499A (en) * | 2012-12-27 | 2013-06-12 | 中华电信股份有限公司 | Protection method for preventing file from being leaked in encrypted form |
CN104317976A (en) * | 2014-11-21 | 2015-01-28 | 四川智诚天逸科技有限公司 | Method for storing information |
CN105069358A (en) * | 2015-07-13 | 2015-11-18 | 西安理工大学 | Keyword searchable encryption method based on Bloom filter with storage structure |
CN105468694A (en) * | 2015-11-17 | 2016-04-06 | 小米科技有限责任公司 | Information template mining method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN106548083A (en) | 2017-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106681623B (en) | A kind of sharing method and mobile terminal of screenshotss image | |
CN106126077B (en) | Display control method of application program icons and mobile terminal | |
CN106844067B (en) | A kind of processing method and mobile terminal of content | |
CN106127076B (en) | A kind of inspection method and mobile terminal of photograph album photo | |
CN106570372B (en) | A kind of the starting method and mobile terminal of application program | |
CN106445392A (en) | Operating method of status bar icon and mobile terminal | |
CN106371789B (en) | The display methods and mobile terminal of prompting message in a kind of application program | |
CN106127003B (en) | A kind of fingerprint recognition unlocking method and mobile terminal | |
CN105827816B (en) | A kind of the split screen method and mobile terminal of terminal screen | |
CN107678644A (en) | A kind of image processing method and mobile terminal | |
CN106325753B (en) | A kind of display methods and mobile terminal of payment interface | |
CN107506111A (en) | The encryption and decryption method and terminal of a kind of terminal applies | |
CN106557259B (en) | A kind of operating method and mobile terminal of mobile terminal | |
CN106228085B (en) | The method for secret protection and mobile terminal of application program | |
CN105867830B (en) | A kind of processing method and mobile terminal based on fingerprint recognition | |
CN106203038B (en) | A kind of unlocking method and mobile terminal | |
CN106485166A (en) | Screenshotss method and apparatus for electric terminal | |
CN106250757B (en) | A kind of control method and mobile terminal of application program | |
CN106503507A (en) | Method and mobile terminal that a kind of password shows | |
CN106874046A (en) | The operating method and mobile terminal of a kind of application program | |
CN106484301A (en) | A kind of method of hiden application and terminal | |
CN106446614B (en) | A kind of right management method and mobile terminal of application program | |
CN106156600A (en) | The unlocking method of a kind of application program and mobile terminal | |
CN106991306B (en) | A kind of method and mobile terminal inputting password | |
CN106709320A (en) | Identity authentication method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |