CN107526950A - Data encryption/decryption method, mobile terminal and computer-readable recording medium - Google Patents
Data encryption/decryption method, mobile terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN107526950A CN107526950A CN201710815184.0A CN201710815184A CN107526950A CN 107526950 A CN107526950 A CN 107526950A CN 201710815184 A CN201710815184 A CN 201710815184A CN 107526950 A CN107526950 A CN 107526950A
- Authority
- CN
- China
- Prior art keywords
- information
- data
- decryption
- environment
- instructions
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of data encryption/decryption method, mobile terminal and computer-readable recording medium, the data encryption/decryption method includes:When receiving encrypted instruction, the first environment information that terminal is presently in environment is obtained;First environment information is associated into preservation with the Data Identification of encrypted instruction corresponding data, and performs the cryptographic operation to encrypted instruction corresponding data.Do not need user to operate input encryption information/solution confidential information by the present invention, during encryption data/ciphertext data, the operation for being encrypted/decrypting to data can be automatically performed so that enciphering/deciphering process is more convenient, lifting user experience impression.
Description
Technical field
The present invention relates to technical field of data security, more particularly to data encryption/decryption method, mobile terminal and computer can
Read storage medium.
Background technology
At present, in order to ensure the safety of data in terminal, the mode that data are encrypted generally is taken.For example, pass through
When character password or fingerprint are inputted to be encrypted, and decrypt to data, it is also desirable to input corresponding character password or
It is that data are decrypted typing corresponding finger print information.But these modes, Shortcomings part, such as character password are easy
Pass into silence, cause the data of encryption can not decrypt, finger is easily peeled or has spot to also result in fingerprint decryption failure on hand.
User, which is required to, for the data being encrypted using existing cipher mode, during ciphertext data operates input solution confidential information, it is right
It is not convenient enough for user.
The content of the invention
It is a primary object of the present invention to provide a kind of data encryption/decryption method, mobile terminal and computer-readable storage medium
Matter, it is intended to solve the inadequate easily technical problem of manner of decryption in the prior art.
To achieve the above object, the present invention provides a kind of data encryption/decryption method, and the data encryption/decryption method includes:
When receiving encrypted instruction, the first environment information that terminal is presently in environment is obtained;
First environment information is associated into preservation with the Data Identification of encrypted instruction corresponding data, and performed to encrypted instruction pair
Answer the cryptographic operation of data.
Optionally, the data encryption/decryption method also includes:
When receiving decryption instructions, the second environment information that terminal is presently in environment is obtained;
The first environment information of the Data Identification association of the decryption instructions corresponding data is obtained, according to the first environment
Information and the second environment information, the current condition for whether meeting to perform decryption instructions of detection;
If the current condition for meeting to perform decryption instructions, performs the decryption oprerations to decryption instructions corresponding data.
Optionally, described according to the first environment information and the second environment information, whether detection currently meets to hold
The condition of row decryption instructions includes:
The first position information that the first environment packet contains is obtained, obtains the second environment packet contains second
Positional information;
Whether the position difference for detecting the first position information and second place information is less than or equal to predetermined threshold value;
It is current full if the position difference of the first position information and second place information is less than or equal to predetermined threshold value
Foot performs the condition of decryption instructions;
If the position difference of the first position information and second place information is more than predetermined threshold value, currently it is unsatisfactory for holding
The condition of row decryption instructions.
Optionally, whether the position difference of the detection first position information and second place information is less than or equal to
Include before predetermined threshold value:
According to the first position information and/or user instruction, secret grade is determined;
According to the secret grade, predetermined threshold value is determined.
Optionally, described according to the first environment information and the second environment information, whether detection currently meets to hold
The condition of row decryption instructions also includes:
The first network information that the first environment packet contains is obtained, obtains the second environment packet contains second
The network information;
It is whether consistent with second network information to detect the first network information;
If the first network information is consistent with second network information, the current condition for meeting to perform decryption instructions;
If the first network information and second network information are inconsistent, currently it is unsatisfactory for performing the bar of decryption instructions
Part.
Optionally, whether the detection is current meets that the condition for performing decryption instructions includes afterwards:
If being currently unsatisfactory for performing the condition of decryption instructions, output decryption prompt message.
Optionally, the data decryption method also includes:
When receiving permanent decryption instructions, the 3rd current environmental information is obtained;
Believed according to the 3rd environmental information with the first environment that the Data Identification of the permanent decryption instructions corresponding data associates
Breath, the current condition for whether meeting to perform permanent decryption instructions of detection;
If the current condition for meeting to perform permanent decryption instructions, performs the permanent solution to permanent decryption instructions corresponding data
Close operation, and cancel the Data Identification of the permanent decryption instructions corresponding data and associating for the first environment information.
Optionally, the environmental information comprises at least positional information and/or the network information.
In addition, to achieve the above object, the present invention also provides a kind of mobile terminal, it is characterised in that the mobile terminal
Including:Memory, processor and the data encrypting and deciphering program that can be run on the memory and on the processor is stored in,
The step of data encryption/decryption method as described above being realized when the data encrypting and deciphering program is by the computing device.
In addition, to achieve the above object, the present invention also provides a kind of computer-readable recording medium, it is characterised in that institute
State and data encrypting and deciphering program is stored with computer-readable recording medium, it is real when the data encrypting and deciphering program is executed by processor
Now the step of data encryption/decryption method as described above.
In the present invention, when receiving encrypted instruction, current first environment information is obtained, first environment and encryption are referred to
Make the Data Identification of corresponding data associate to preserve, and perform the cryptographic operation to the data.For in the subsequently received data
Decryption instructions when, obtain second environment information when receiving decryption instructions, believed according to first environment information and second environment
Breath decides whether to perform, and data are decrypted.Do not need user's operation defeated by the present invention, during encryption data/ciphertext data
Enter encryption information/solution confidential information, the operation for being encrypted/decrypting to data can be automatically performed so that enciphering/deciphering process is more just
Victory, lifting user experience impression.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for the mobile terminal for realizing each embodiment of the present invention;
Fig. 2 is the schematic flow sheet of data encryption/decryption method first embodiment of the present invention;
Fig. 3 is the schematic flow sheet of data encryption/decryption method second embodiment of the present invention;
Fig. 4 is the schematic diagram of a scenario of the embodiment of preset range one;
Fig. 5 is the schematic diagram of the decryption embodiment of prompt message one.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only
Be advantageous to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can mix
Ground uses.
In scheme of the embodiment of the present invention, data encryption/decryption method is applied to mobile terminal, and the terminal can be in a variety of manners
To implement.For example, the mobile terminal being related in the present invention can include such as mobile phone, tablet personal computer, notebook computer, palm electricity
The mobile terminals such as brain, personal digital assistant (Personal Digital Assistant, PDA).
It will be illustrated in subsequent descriptions by taking tablet personal computer as an example, it will be appreciated by those skilled in the art that except special
Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to other types of movement eventually
End.
Referring to Fig. 1, Fig. 1 is the hardware architecture diagram for the mobile terminal for realizing each embodiment of the present invention, the terminal
100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103, A/V
(audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit 108, storage
The parts such as device 109, processor 110 and power supply 111.It will be understood by those skilled in the art that the terminal structure shown in Fig. 1
The restriction to mobile terminal is not formed, mobile terminal can include parts more more or less than diagram, or combine some
Part, or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station
Downlink information receive after, handled to processor 110;In addition, up data are sent to base station.Generally, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrate
Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need
To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is receiving or
It is sound that the voice data stored in memory 109, which is converted into audio signal and exported,.Moreover, audio output unit 103
The audio output related to the specific function that terminal 100 performs can also be provided (for example, call signal receives sound, message connects
Quiet down sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out
Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after the processing of graphics processor 1041 can be deposited
Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can
To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound
Caused noise or interference during frequency signal.
Mobile terminal 100 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axles) size of acceleration, size and the direction of gravity, the application available for identification terminal posture are can detect that when static
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as terminal, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produces and set with the user of terminal
Put and the input of key signals that function control is relevant.Specifically, user input unit 107 may include contact panel 1071 and its
His input equipment 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation (ratio of the user on or near it
Such as user is using finger, any suitable object of stylus or annex on contact panel 1071 or near contact panel 1071
Operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detecting apparatus
With two parts of touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect what touch operation was brought
Signal, transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and it is changed
Into contact coordinate, then processor 110 is given, and the order sent of reception processing device 110 and can be performed.Furthermore, it is possible to adopt
Contact panel 1071 is realized with polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel
1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can
Input and the output function of mobile terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not done herein specifically
Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area
And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
Individual part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in storage
Data in device 109, the various functions and processing data of mobile terminal are performed, it is overall so as to be carried out to main screen page display terminal
Monitoring.Processor 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulation
Demodulation processor, wherein, application processor mainly handles operating system, user interface and application program etc., modulation /demodulation processing
Device mainly handles radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put
The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also will not be repeated here including bluetooth module etc..
Based on above-mentioned mobile terminal hardware configuration, each embodiment of data encryption/decryption method of the present invention is proposed.
Reference picture 2, Fig. 2 are the schematic flow sheet of data encryption/decryption method first embodiment of the present invention.
In the embodiment of data encryption/decryption method one of the present invention, data encryption/decryption method includes:
Step S10, when receiving encrypted instruction, obtain the first environment information that terminal is presently in environment;
Step S20, first environment information is associated into preservation with the Data Identification of encrypted instruction corresponding data, and execution pair adds
The cryptographic operation of close instruction corresponding data.
In one embodiment of the invention, data encryption/decryption method is applied to mobile terminal, and the terminal can be come in a variety of manners
Implement.For example, the mobile terminal being related in the present invention can include such as mobile phone, tablet personal computer, notebook computer, palm electricity
The mobile terminals such as brain, personal digital assistant (Personal Digital Assistant, PDA).
Miscellaneous data, such as image data, lteral data, voice data etc. are stored with mobile terminal, is used
Family can be checked picture, open document, check word, open player, playing audio-fequency data by opening photograph album application.This reality
Apply in example, can be that directly certain one piece of data is encrypted or file/folder corresponding to data is added
It is close, it can also be and application program corresponding to data is encrypted, be not limited herein, selected with specific reference to actual conditions
Select.
In the present embodiment, encrypted instruction operates triggering by user, for example, user needs to add passage data A
Close, lteral data A is stored in document A, then user chooses document A first, then the more than long-press 1S (length of the length temporally
Can freely set), until ejecting prompting frame on mobile terminal screen, show " whether determine to perform encryption behaviour on prompting frame
Make ", and option "Yes", "No" are shown, if user chooses "Yes", trigger encrypted instruction.In the present embodiment, it is also possible that with
Family selects document A first, then adopting consecutive click chemical reaction screen, for example, adopting consecutive click chemical reaction screen is twice (number can freely be set), it is mobile
Prompting frame is ejected on terminal screen, " whether determining to perform cryptographic operation " is shown on prompting frame, and shows option "Yes", "No",
If user chooses "Yes", encrypted instruction is triggered.In the present embodiment, the mode for triggering encrypted instruction can also be defeated by voice
The mode entered, for example, user sends sound " document A is encrypted ", mobile terminal receives the voice messaging, and voice is believed
Breath carries out speech recognition, then confirms object to be encrypted, i.e., selected document A, then triggers encrypted instruction.For encrypted instruction
Triggering mode is not limited herein, is configured with specific reference to being actually needed.
When mobile terminal receives encrypted instruction, current first environment information is obtained, first environment information can wrap
Include current positional information, network information etc..For example, when mobile terminal receives encrypted instruction, pass through GPS location or network
Positioning (WiFi cell localizations, such as open positioning software, the WiFi that is connected by detecting mobile terminal ID (routers
Location), positioning is then completed under the cooperation of its WiFi location database and map datum;Architecture is logical based on honeycomb movement
Letter technology.Mobile communications network is to be made up of many according to the base station (big steel tower) of certain rule layouts, each base station covering
One regular hexagon region, each regular hexagon region are referred to as a cell, and each cell (base station) has a fixed ID
(numbering), according to this fixation ID complete positioning) mode, obtain current positional information;Add when mobile terminal receives
During close instruction, the network information of the network (such as mobile terminal is connected to WLAN) of current mobile terminal connection is obtained,
The network information includes IP address, subnet mask, router address, DNS etc..
After getting first environment information (including current positional information and/or the network information), by first environment information
Preservation is associated with the Data Identification of encrypted instruction corresponding data, for example, being that document A is encrypted in the present embodiment, then by
One environmental information associates preservation with document A mark into database, then performs the cryptographic operation to document A.The present embodiment
In, cipher mode can be that (generation key, document A is encrypted symmetric cryptography mode using the key, by the key and text
Shelves A mark association is preserved into database, and subsequently if desired this document A is decrypted, then can be obtained from database should
Key, to complete decryption oprerations), it can also be asymmetric encryption mode (a pair of private keys of generation and public key, using the private key to text
Shelves A is encrypted, and the public key is associated into preservation into database with document A mark, subsequently if desired this document A solved
It is close, then the public key can be obtained from database, to complete decryption oprerations).In the present embodiment, cipher mode is not restricted, had
Body is configured according to actual conditions.
In the present embodiment, due to subsequently when document A is decrypted, it is necessary to be obtained when receiving decryption instructions by terminal
The first environment information that obtains when receiving encrypted instruction with terminal of second environment information contrasted, to decide whether to perform
Decryption instructions.For example, first position information corresponding to first environment information is (x1, y1), second corresponding to second environment information
Positional information is (x2, y2), first position information and the second place information position difference
If D is less than or equal to predetermined threshold value, decryption instructions are performed.The first scope being set by user in advance, (the first scope refers to family
Position be the center of circle, surrounding 100m (value can freely be set) scope), the second scope (refers to using the position of company as the center of circle, week
Enclose the scope of 100m (value can freely be set)), the 3rd scope (referring to outside the first scope and the second scope), the first scope is corresponding
Predetermined threshold value be 50, predetermined threshold value corresponding to the second scope is 100, and predetermined threshold value corresponding to the 3rd scope is 150, i.e., when the
When one positional information is in the first scope, if the position difference D of first position information and second place information is less than or equal to 50,
Decryption instructions are performed, i.e., when first position information is in the second scope, if the position of first position information and second place information
Difference D is put less than or equal to 100, then performs decryption instructions, i.e., when first position information is in three scopes, if first position is believed
Breath and the position difference D of second place information are less than or equal to 150, then perform decryption instructions.By default scope with it is corresponding pre-
If threshold value association is preserved into mobile terminal data storehouse.When receiving decryption instructions, current first position information, root are obtained
Predetermined threshold value is determined according to the scope residing for the information of first position.
In the present embodiment, when receiving encrypted instruction, current first environment information is obtained, by first environment and encryption
Instruct the Data Identification association of corresponding data to preserve, and perform the cryptographic operation to the data.For in the subsequently received number
According to decryption instructions when, second environment information when receiving decryption instructions is obtained, according to first environment information and second environment
Information decides whether to perform, and data are decrypted.User behaviour is not needed by the present embodiment, during encryption data/ciphertext data
Make input encryption information/solution confidential information, the operation for being encrypted/decrypting to data can be automatically performed so that enciphering/deciphering process is more
It is convenient to add, lifting user experience impression.
Reference picture 3, Fig. 3 are the schematic flow sheet of data encryption/decryption method second embodiment of the present invention.
In the alternative embodiment of data encryption/decryption method one of the present invention, data encryption/decryption method also includes:
Step S30, when receiving decryption instructions, obtain the second environment information that terminal is presently in environment;
Step S40, the first environment information of the Data Identification association of the decryption instructions corresponding data is obtained, according to described
First environment information and the second environment information, the current condition for whether meeting to perform decryption instructions of detection;
Step S50, if the current condition for meeting to perform decryption instructions, perform the decryption behaviour to decryption instructions corresponding data
Make.
In one embodiment of the invention, after operation is encrypted to document A, document A is in encrypted state, it is necessary to document
A is decrypted, the data that can be checked in document A.In the present embodiment, decryption instructions operate triggering by user, for example, user needs
Passage data A is decrypted, lteral data A is stored in document A, then user chooses document A first, then long-press
More than 1S (length of the length temporally can freely be set), until ejecting prompting frame on mobile terminal screen, show on prompting frame
" whether determining to perform decryption oprerations " shown, and shows option "Yes", "No", if user chooses "Yes", triggers decryption instructions.This
In embodiment, it is also possible that user selects document A first, then adopting consecutive click chemical reaction screen, for example, adopting consecutive click chemical reaction screen twice (should
Number can freely be set), eject prompting frame on mobile terminal screen, display " whether determining to perform decryption oprerations " on prompting frame,
And option "Yes", "No" are shown, if user chooses "Yes", trigger decryption instructions.In the present embodiment, the side of decryption instructions is triggered
Formula can also be by way of phonetic entry, for example, user sends sound " document A is decrypted ", mobile terminal receives
To the voice messaging, speech recognition is carried out to voice messaging, then confirms object to be decrypted, i.e., selected document A, then triggering solves
Close instruction.It is not limited for the triggering mode of decryption instructions, is configured with specific reference to being actually needed herein.
When mobile terminal receives decryption instructions, current second environment information is obtained, second environment information can wrap
Include current positional information, network information etc..For example, when mobile terminal receives encrypted instruction, pass through GPS location or network
Positioning (WiFi cell localizations, such as open positioning software, the WiFi that is connected by detecting mobile terminal ID (routers
Location), positioning is then completed under the cooperation of its WiFi location database and map datum;Architecture is logical based on honeycomb movement
Letter technology.Mobile communications network is to be made up of many according to the base station (big steel tower) of certain rule layouts, each base station covering
One regular hexagon region, each regular hexagon region are referred to as a cell, and each cell (base station) has a fixed ID
(numbering), according to this fixation ID complete positioning) mode, obtain current positional information;Add when mobile terminal receives
During close instruction, the network information of the network (such as mobile terminal is connected to WLAN) of current mobile terminal connection is obtained,
The network information includes IP address, subnet mask, router address, DNS etc..
Can obtain first environment information (for example, now decryption instructions are to decrypt file A, then should in the present embodiment
When file A is encrypted, first environment information corresponding to file A Data Identification) the first position information (x1, y1) that includes, is obtained
The second place information (x2, y2) that second environment packet contains is taken, then calculates first position information and second place information
Position differenceIf D is less than or equal to predetermined threshold value, decryption instructions are performed.Predetermined threshold value can
To be a fixed value that user pre-sets, the value determined according to first position information can also be.For example, in advance by with
Family sets the first scope (the first scope refers to using the position of family as the center of circle, surrounding 100m (value can freely be set) scope), the
Two scopes (referring to using the position of company as the center of circle, surrounding 100m (value can freely be set) scope), the 3rd scope (refer to the first model
Enclose with outside the second scope), predetermined threshold value corresponding to the first scope could be arranged to 50, and predetermined threshold value corresponding to the second scope can
To be arranged to 100, predetermined threshold value corresponding to the 3rd scope could be arranged to 150, i.e., when first position information is in the first scope
When, if the position difference D of first position information and second place information is less than or equal to 50, decryption instructions are performed, i.e., when first
When positional information is in the second scope, if the position difference D of first position information and second place information is less than or equal to 100,
Decryption instructions are performed, i.e., when first position information is in three scopes, if the position of first position information and second place information
Difference D is put less than or equal to 150, then performs decryption instructions.
In another embodiment of the present invention, it can also be and obtain first environment information (for example, now decryption instructions are to file
A is decrypted, then when this document A is encrypted, first environment information corresponding to file A Data Identification) and the first network information that includes,
Second network information that second environment packet contains is obtained, if (the explanation movement consistent with second network information of first network information
The network that terminal accesses when receiving the network accessed during encrypted instruction with now receiving decryption instructions is identical), then perform solution
Close instruction.It is also possible that obtaining first position information and first network information that first environment packet contains, second environment is obtained
The second place information and second network information that packet contains, if the position difference of first position information and second place information is small
In equal to predetermined threshold value, and first network information is consistent with second network information, then performs decryption instructions.
In the present embodiment, it is in when being encrypted due to data in specific environment, ciphertext data also can only be specific
In environment, realize and encryption and decryption is carried out to data automatically in specific environment, and the mode of this encryption and decryption is adapted to some data
Can only be in the situation that specific environment is browsed.
Further, in the alternative embodiment of data encryption/decryption method one of the present invention, according to the first environment information and institute
Second environment information is stated, the current condition for whether meeting to perform decryption instructions of detection includes:
The first position information that the first environment packet contains is obtained, obtains the second environment packet contains second
Positional information;
Whether the position difference for detecting the first position information and second place information is less than or equal to predetermined threshold value;
It is current full if the position difference of the first position information and second place information is less than or equal to predetermined threshold value
Foot performs the condition of decryption instructions;
If the position difference of the first position information and second place information is more than predetermined threshold value, currently it is unsatisfactory for holding
The condition of row decryption instructions.
Can obtain first environment information (for example, now decryption instructions are to decrypt file A, then should in the present embodiment
When file A is encrypted, first environment information corresponding to file A Data Identification) the first position information (x1, y1) that includes, is obtained
The second place information (x2, y2) that second environment packet contains is taken, then calculates first position information and second place information
Position differenceIf D is less than or equal to predetermined threshold value, decryption instructions are performed.Predetermined threshold value can
To be a fixed value that user pre-sets, the value determined according to first position information can also be.For example, in advance by with
Family sets the first scope (the first scope refers to using the position of family as the center of circle, surrounding 100m (value can freely be set) scope), the
Two scopes (referring to using the position of company as the center of circle, surrounding 100m (value can freely be set) scope), the 3rd scope (refer to the first model
Enclose with outside the second scope), predetermined threshold value corresponding to the first scope could be arranged to 50, and predetermined threshold value corresponding to the second scope can
To be arranged to 100, predetermined threshold value corresponding to the 3rd scope could be arranged to 150, i.e., when first position information is in the first scope
When, if the position difference D of first position information and second place information is less than or equal to 50, decryption instructions are performed, i.e., when first
When positional information is in the second scope, if the position difference D of first position information and second place information is less than or equal to 100,
Decryption instructions are performed, i.e., when first position information is in three scopes, if the position of first position information and second place information
Difference D is put less than or equal to 150, then decryption instructions are performed, if the position difference D of first position information and second place information is more than
Predetermined threshold value, then do not perform decryption instructions.
In the present embodiment, specific position is in when being encrypted due to data, ciphertext data also can only be in specific model
In enclosing, realize and data are decrypted automatically in particular range, and this mode is adapted to some data can only be specific
The situation that environment is browsed.
Further, in the alternative embodiment of data encryption/decryption method one of the present invention, the first position information and the is detected
The position difference of two positional informations includes before whether being less than or equal to predetermined threshold value:
According to the first position information and/or user instruction, secret grade is determined;
According to the secret grade, predetermined threshold value is determined.
In the present embodiment, for example, setting the first scope by user in advance, (the first scope refers to using the position of family as the center of circle, week
Enclose the scope of 100m (value can freely be set)), the second scope (refer to using the position of company as the center of circle, surrounding 100m (value can from
By setting) scope), the 3rd scope (referring to outside the first scope and the second scope).As shown in figure 4, Fig. 4 is that preset range one is real
Apply the schematic diagram of a scenario of example.Predetermined threshold value corresponding to first scope could be arranged to 50, and predetermined threshold value corresponding to the second scope can
To be arranged to 100, predetermined threshold value corresponding to the 3rd scope could be arranged to 150, i.e., when first position information is in the first scope
When, if the position difference D of first position information and second place information is less than or equal to 50, decryption instructions are performed, i.e., when first
When positional information is in the second scope, if the position difference D of first position information and second place information is less than or equal to 100,
Decryption instructions are performed, i.e., when first position information is in three scopes, if the position of first position information and second place information
Difference D is put less than or equal to 150, then performs decryption instructions.In one embodiment of the invention, it is also possible that being encrypted to data
When, prompting frame is ejected, to inquire user's this time secret grade, such as provides three options " secret grade 1 ", " secret grades
2 ", " secret grade 3 ", pre-set " predetermined threshold value corresponding to secret grade 1 " be 150, " corresponding to secret grade 2 " preset threshold
It is worth for 100, " predetermined threshold value corresponding to secret grade 3 " is 50.If user's selection " secret grade 3 ", recording of encrypted instruction pair
The secret grade for answering data is " 3 ", predetermined threshold value 50, when receiving the decryption instructions of the data, if decryption instructions are corresponding
Second place information first position information corresponding with encrypted instruction position difference D be less than or equal to 50, then perform decryption refer to
Order.
Predetermined threshold value is smaller, illustrates that secret grade is higher.Certainly, in the present embodiment, predetermined threshold value can also be that user sets
The fixed value put, no matter that is, first position is in where, predetermined threshold value is a fixed value.
Because under different scenes, the privacy degrees of data may be different, therefore preset to different scene settings is different
Threshold value, predetermined threshold value is bigger, comparatively more readily satisfies decryption condition, and predetermined threshold value is smaller, comparatively meets decryption bar
The difficulty of part is bigger so that the present invention program can be applied to a variety of scenes, enhance the flexibility of scheme.
Further, in the alternative embodiment of data encryption/decryption method one of the present invention, according to the first environment information and institute
Second environment information is stated, the current condition for whether meeting to perform decryption instructions of detection also includes:
The first network information that the first environment packet contains is obtained, obtains the second environment packet contains second
The network information;
It is whether consistent with second network information to detect the first network information;
If the first network information is consistent with second network information, the current condition for meeting to perform decryption instructions;
If the first network information and second network information are inconsistent, currently it is unsatisfactory for performing the bar of decryption instructions
Part.
In the present embodiment, the network information is with including the IP address, subnet mask, router of the network of mobile terminal access
Location, DNS etc..Can also be obtain first environment information (for example, now decryption instructions are that file A is decrypted, then this document A quilts
During encryption, first environment information corresponding to file A Data Identification, solution is being performed comprising mobile terminal in the first environment information
The network information of the network accessed during close instruction) the first network information that includes, obtain the second net that second environment packet contains
Network information, if first network information is consistent with second network information, (explanation mobile terminal receives the net accessed during encrypted instruction
The network accessed when network is with now receiving decryption instructions is identical), then decryption instructions are performed, otherwise do not perform decryption instructions.
In the present embodiment, if first network information is consistent with second network information, illustrate that mobile terminal receives encryption
The network accessed when the network accessed during instruction is with now receiving decryption instructions is identical, illustrates that mobile terminal refers in execution encryption
Residing network environment is identical when residing network environment receives decryption instructions with this when making, then performs decryption and refer to
Order.Realize and data are decrypted automatically in specific environment, and this mode is adapted to some data can only be in specific ring
The situation that border is browsed.
Further, in the alternative embodiment of data encryption/decryption method one of the present invention, whether detection currently meets to perform decryption
Include after the condition of instruction:
If being currently unsatisfactory for performing the condition of decryption instructions, output decryption prompt message.
In the present embodiment, if the current condition for being unsatisfactory for performing decryption instructions, output decryption prompt message, such as " solution
Close failure ", it can also be that output meets the position of scope and current mobile terminal corresponding to decryption instructions condition, for example, such as Fig. 5
Shown, Fig. 5 is the schematic diagram of the decryption embodiment of prompt message one.Meet to prompt user to go to corresponding to decryption instructions condition
Scope, so as to realize to data deciphering.Or prompting user's handover network, for example, network name corresponding to first network information
For 1, then the network of user access network entitled 1 is prompted.Certainly, in order to protect the security of data, can also be discontented
When foot performs the condition of decryption instructions, user is prompted to carry out authentication, the mode of authentication is unlimited, such as cipher authentication,
Finger print identifying, voiceprint etc., only authentication just export prompt message by rear.
In the present embodiment, when being currently unsatisfactory for performing the condition of decryption instructions, prompt message is decrypted by exporting, for
This decryption oprerations can be completed.It ensure that the decrypted reliability of data.
Further, in the alternative embodiment of data encryption/decryption method one of the present invention, data encryption/decryption method also includes:
When receiving permanent decryption instructions, the 3rd current environmental information is obtained;
Believed according to the 3rd environmental information with the first environment that the Data Identification of the permanent decryption instructions corresponding data associates
Breath, the current condition for whether meeting to perform permanent decryption instructions of detection;
If the current condition for meeting to perform permanent decryption instructions, performs the permanent solution to permanent decryption instructions corresponding data
Close operation, and cancel the Data Identification of the permanent decryption instructions corresponding data and associating for the first environment information.
In the present embodiment, associated according to the 3rd environmental information with the Data Identification of the permanent decryption instructions corresponding data
First environment information, the current condition for whether meeting to perform permanent decryption instructions of detection, can refer to according to second environment information with
The first environment information of the Data Identification association of the decryption instructions corresponding data, whether detection is current meets to perform decryption instructions
Condition corresponding to embodiment, will not be described here.In the present embodiment, data are carried out after forever decrypting, eliminate permanent solution
The close instruction Data Identification of corresponding data and associating for first environment information, if subsequently operation is not encrypted to the data,
Subsequently when opening the data without being decrypted again.
In addition, the embodiment of the present invention also provides a kind of mobile terminal, the mobile terminal includes:Memory, processor and
It is stored in the data encrypting and deciphering program that can be run on the memory and on the processor, the data encrypting and deciphering program quilt
The step of data encryption/decryption method as described above is realized during the computing device.
Each embodiment of the specific embodiment of mobile terminal of the present invention and above-mentioned data encryption/decryption method is essentially identical,
This is not repeated.
In addition, the embodiment of the present invention also proposes a kind of computer-readable recording medium, the computer-readable recording medium
On be stored with data encrypting and deciphering program, the data encrypting and deciphering program realizes that data as described above add solution when being executed by processor
The step of decryption method.
Each embodiment of the specific embodiment of computer-readable recording medium of the present invention and above-mentioned data encryption/decryption method
It is essentially identical, it will not be described here.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or system including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or system institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or system.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone,
Computer, server, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of data encryption/decryption method, it is characterised in that the data encryption/decryption method includes:
When receiving encrypted instruction, the first environment information that terminal is presently in environment is obtained;
First environment information is associated into preservation with the Data Identification of encrypted instruction corresponding data, and performs and number is corresponded to encrypted instruction
According to cryptographic operation.
2. data encryption/decryption method as claimed in claim 1, it is characterised in that the data encryption/decryption method also includes:
When receiving decryption instructions, the second environment information that terminal is presently in environment is obtained;
The first environment information of the Data Identification association of the decryption instructions corresponding data is obtained, according to the first environment information
And the second environment information, the current condition for whether meeting to perform decryption instructions of detection;
If the current condition for meeting to perform decryption instructions, performs the decryption oprerations to decryption instructions corresponding data.
3. data encryption/decryption method as claimed in claim 2, it is characterised in that described according to the first environment information and institute
Second environment information is stated, the current condition for whether meeting to perform decryption instructions of detection includes:
The first position information that the first environment packet contains is obtained, obtains the second place that the second environment packet contains
Information;
Whether the position difference for detecting the first position information and second place information is less than or equal to predetermined threshold value;
It is current to meet to hold if the position difference of the first position information and second place information is less than or equal to predetermined threshold value
The condition of row decryption instructions;
If the position difference of the first position information and second place information is more than predetermined threshold value, currently it is unsatisfactory for performing solution
The condition of close instruction.
4. data encryption/decryption method as claimed in claim 3, it is characterised in that the detection first position information and the
The position difference of two positional informations includes before whether being less than or equal to predetermined threshold value:
According to the first position information and/or user instruction, secret grade is determined;
According to the secret grade, predetermined threshold value is determined.
5. data encryption/decryption method as claimed in claim 2, it is characterised in that described according to the first environment information and institute
Second environment information is stated, the current condition for whether meeting to perform decryption instructions of detection also includes:
The first network information that the first environment packet contains is obtained, obtains the second network that the second environment packet contains
Information;
It is whether consistent with second network information to detect the first network information;
If the first network information is consistent with second network information, the current condition for meeting to perform decryption instructions;
If the first network information and second network information are inconsistent, currently it is unsatisfactory for performing the condition of decryption instructions.
6. data encryption/decryption method as claimed in claim 2, it is characterised in that whether the detection currently meets to perform decryption
Include after the condition of instruction:
If being currently unsatisfactory for performing the condition of decryption instructions, output decryption prompt message.
7. such as the data encryption/decryption method any one of claim 1-6, it is characterised in that the data decryption method is also
Including:
When receiving permanent decryption instructions, the 3rd current environmental information is obtained;
The first environment information associated according to the 3rd environmental information with the Data Identification of the permanent decryption instructions corresponding data, inspection
Survey the current condition for whether meeting to perform permanent decryption instructions;
If the current condition for meeting to perform permanent decryption instructions, perform the permanent decryption behaviour to permanent decryption instructions corresponding data
Make, and cancel the Data Identification of the permanent decryption instructions corresponding data and associating for the first environment information.
8. such as the data encryption/decryption method any one of claim 1-7, it is characterised in that the environmental information is at least wrapped
Include positional information and/or the network information.
9. a kind of mobile terminal, it is characterised in that the mobile terminal includes:Memory, processor and it is stored in the storage
It is real when the data encrypting and deciphering program is executed by processor on device and the data encrypting and deciphering program that can run on the processor
Now the step of data encryption/decryption method as any one of claim 1 to 8.
10. a kind of computer-readable recording medium, it is characterised in that be stored with data on the computer-readable recording medium and add
Decryption program, the data as any one of claim 1 to 8 are realized when the data encrypting and deciphering program is executed by processor
The step of encipher-decipher method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710815184.0A CN107526950A (en) | 2017-09-07 | 2017-09-07 | Data encryption/decryption method, mobile terminal and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710815184.0A CN107526950A (en) | 2017-09-07 | 2017-09-07 | Data encryption/decryption method, mobile terminal and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107526950A true CN107526950A (en) | 2017-12-29 |
Family
ID=60735741
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710815184.0A Pending CN107526950A (en) | 2017-09-07 | 2017-09-07 | Data encryption/decryption method, mobile terminal and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107526950A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020077807A1 (en) * | 2018-10-15 | 2020-04-23 | 珠海格力电器股份有限公司 | Detection device, air detection apparatus, control system and control method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2270705A2 (en) * | 2009-07-01 | 2011-01-05 | Hand Held Products, Inc. | Gps-based provisioning for mobile terminals |
CN103632501A (en) * | 2012-08-21 | 2014-03-12 | 西安佳迅科技有限公司 | A handset with an anti-theft alarm function |
CN104753669A (en) * | 2015-03-24 | 2015-07-01 | 王运姣 | Terminal secrecy system based on location information |
CN105631352A (en) * | 2015-06-29 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Encoding and decoding methods, encoding and decoding apparatuses and mobile terminal |
CN106096539A (en) * | 2016-06-07 | 2016-11-09 | 广东欧珀移动通信有限公司 | A kind of method carrying out bio-identification and terminal |
CN106446786A (en) * | 2016-08-30 | 2017-02-22 | 广东欧珀移动通信有限公司 | Fingerprint identifying method, fingerprint identifying apparatus and terminal device |
CN106599875A (en) * | 2016-12-23 | 2017-04-26 | 努比亚技术有限公司 | Fingerprint identification device and method |
CN106934295A (en) * | 2015-12-31 | 2017-07-07 | 珠海金山办公软件有限公司 | A kind of document processing method and device |
-
2017
- 2017-09-07 CN CN201710815184.0A patent/CN107526950A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2270705A2 (en) * | 2009-07-01 | 2011-01-05 | Hand Held Products, Inc. | Gps-based provisioning for mobile terminals |
CN103632501A (en) * | 2012-08-21 | 2014-03-12 | 西安佳迅科技有限公司 | A handset with an anti-theft alarm function |
CN104753669A (en) * | 2015-03-24 | 2015-07-01 | 王运姣 | Terminal secrecy system based on location information |
CN105631352A (en) * | 2015-06-29 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Encoding and decoding methods, encoding and decoding apparatuses and mobile terminal |
CN106934295A (en) * | 2015-12-31 | 2017-07-07 | 珠海金山办公软件有限公司 | A kind of document processing method and device |
CN106096539A (en) * | 2016-06-07 | 2016-11-09 | 广东欧珀移动通信有限公司 | A kind of method carrying out bio-identification and terminal |
CN106446786A (en) * | 2016-08-30 | 2017-02-22 | 广东欧珀移动通信有限公司 | Fingerprint identifying method, fingerprint identifying apparatus and terminal device |
CN106599875A (en) * | 2016-12-23 | 2017-04-26 | 努比亚技术有限公司 | Fingerprint identification device and method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020077807A1 (en) * | 2018-10-15 | 2020-04-23 | 珠海格力电器股份有限公司 | Detection device, air detection apparatus, control system and control method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107862196A (en) | Fingerprint verification method, mobile terminal and computer-readable recording medium | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN107770369A (en) | Control method, device and the computer-readable recording medium of mobile terminal | |
CN107392013A (en) | A kind of terminal safety protection method, terminal and computer-readable recording medium | |
CN109558718A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN109800602A (en) | Method for secret protection, mobile terminal and computer readable storage medium | |
CN109743696A (en) | Identifying code encryption method, system and readable storage medium storing program for executing | |
CN107122817A (en) | Processing method and Quick Response Code terminal based on Quick Response Code | |
CN108197441A (en) | Flexible screen terminal and its solution lock control method, computer readable storage medium | |
CN110069229A (en) | Screen sharing method, mobile terminal and computer readable storage medium | |
CN108989534A (en) | Message prompt method, mobile terminal and computer readable storage medium | |
CN107273766A (en) | A kind of method and apparatus of data encryption and decryption | |
CN108563959A (en) | File encrypting method, device and computer storage media | |
CN107861669A (en) | The switching method and mobile terminal of a kind of custom system | |
CN107343272A (en) | A kind of data traffic sharing method and mobile terminal | |
CN107563158A (en) | Show hiden application figure calibration method, equipment and computer-readable recording medium | |
CN107317680A (en) | Labeling method, system and the computer-readable recording medium of secured account numbers | |
CN108920917A (en) | Log in end switching method, mobile terminal and computer readable storage medium | |
CN108601062A (en) | WiFi connections sharing method, terminal and computer storage media | |
CN107888762A (en) | Memorandum record generation method and mobile terminal | |
CN108012270A (en) | A kind of method of information processing, equipment and computer-readable recording medium | |
CN107516051A (en) | A kind of data encryption storage method, device and computer-readable recording medium | |
CN107194217A (en) | User data access control method, equipment and computer-readable recording medium | |
CN107395363A (en) | Fingerprint sharing method and mobile terminal | |
CN107463647A (en) | Audio identification method to set up, application method, terminal and computer-readable recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171229 |
|
RJ01 | Rejection of invention patent application after publication |