Movatterモバイル変換


[0]ホーム

URL:


CN105574429A - Method, device and terminal for file data encryption and decryption processing - Google Patents

Method, device and terminal for file data encryption and decryption processing
Download PDF

Info

Publication number
CN105574429A
CN105574429ACN201510863241.3ACN201510863241ACN105574429ACN 105574429 ACN105574429 ACN 105574429ACN 201510863241 ACN201510863241 ACN 201510863241ACN 105574429 ACN105574429 ACN 105574429A
Authority
CN
China
Prior art keywords
file data
identification information
fingerprint information
read
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510863241.3A
Other languages
Chinese (zh)
Inventor
彭飞
朱荣昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan Coolpad Software Tech Co ltd
Original Assignee
Dongguan Coolpad Software Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Coolpad Software Tech Co ltdfiledCriticalDongguan Coolpad Software Tech Co ltd
Priority to CN201510863241.3ApriorityCriticalpatent/CN105574429A/en
Publication of CN105574429ApublicationCriticalpatent/CN105574429A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

Translated fromChinese

本发明实施例提供了一种文件数据加解密的方法、装置及终端,其中,所述方法包括:接收用于请求对明文文件数据进行加密处理的加密请求;其中,所述加密请求包括:指纹信息和标识信息;为接收到的所述加密请求中的标识信息配置相应的权限;获取明文文件数据;根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置。采用本发明,可提升文件数据的安全性和对文件数据处理的方便快捷性。

The embodiment of the present invention provides a method, device and terminal for encrypting and decrypting file data, wherein the method comprises: receiving an encryption request for requesting encryption processing of plaintext file data; wherein the encryption request comprises: fingerprint information and identification information; configuring corresponding permissions for the identification information in the received encryption request; obtaining plaintext file data; encrypting the obtained plaintext file data according to the fingerprint information, and setting corresponding permissions for the plaintext file after encryption processing according to the permissions configured for the identification information. The present invention can improve the security of file data and the convenience and speed of file data processing.

Description

Translated fromChinese
一种文件数据加解密处理的方法、装置以及终端Method, device and terminal for file data encryption and decryption processing

技术领域technical field

本发明涉及计算机技术领域,尤其涉及一种文件数据加解密处理的方法、装置以及终端。The present invention relates to the field of computer technology, in particular to a method, device and terminal for file data encryption and decryption processing.

背景技术Background technique

随着网络应用的普及,信息安全越来越受到人们的关注,其中,对信息进行加密是提高信息安全性的常用手段。With the popularization of network applications, people pay more and more attention to information security. Among them, encrypting information is a common means to improve information security.

但是,在现有的数据信息加密方案中,通信终端通过输入密码(也即是,数字和/或拼音)对文件信息进行加密。但是这种加密方式很容易被非法人士破译盗取,存在很大的安全隐患。However, in the existing data information encryption scheme, the communication terminal encrypts the file information by inputting a password (that is, numbers and/or pinyin). However, this encryption method is easy to be deciphered and stolen by illegal persons, and there is a great security risk.

发明内容Contents of the invention

本发明实施例所要解决的技术问题在于,提供一种文件数据加密/解密处理的方法、装置以及终端,可利用指纹信息对文件进行权限设置以及加/解密处理,提升了文件数据的安全性和对文件数据加解密处理的方便快捷性。The technical problem to be solved by the embodiments of the present invention is to provide a method, device, and terminal for file data encryption/decryption processing, which can use fingerprint information to perform permission setting and encryption/decryption processing on files, thereby improving the security and security of file data. The convenience and quickness of file data encryption and decryption processing.

本发明实施例第一方面公开提供了一种文件数据加密处理的方法,所述方法包括:The first aspect of the embodiments of the present invention discloses a method for encrypting file data, and the method includes:

接收用于请求对明文文件数据进行加密处理的加密请求;其中,所述加密请求包括:指纹信息和标识信息;receiving an encryption request for requesting encryption of plaintext file data; wherein, the encryption request includes: fingerprint information and identification information;

为接收到的所述加密请求中的标识信息配置相应的权限;Configuring corresponding permissions for the identification information in the received encryption request;

获取明文文件数据;Obtain plaintext file data;

根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置。Encrypting the acquired plaintext file data according to the fingerprint information, and setting corresponding permissions on the encrypted plaintext file according to the permissions configured for the identification information.

其中可选地,所述根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置之前,包括:Wherein optionally, before performing encryption processing on the obtained plaintext file data according to the fingerprint information, and setting corresponding permissions on the encrypted plaintext file according to the permissions configured for the identification information, including :

验证接收到的所述加密请求中的指纹信息是否合法;Verifying whether the fingerprint information in the received encryption request is legal;

若验证到所述指纹信息合法,则执行所述根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置。If it is verified that the fingerprint information is legal, perform the encryption process on the obtained plaintext file data according to the fingerprint information, and perform corresponding encryption on the encrypted plaintext file according to the authority configured for the identification information. Local permission settings.

其中可选地,所述根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置,包括:Wherein, optionally, said encrypting the obtained plaintext file data according to the fingerprint information, and performing corresponding permission setting on the encrypted plaintext file according to the permissions configured for the identification information, including:

当为所述标识信息配置的权限为只读权限时,根据所述指纹信息对所述明文文件数据进行加密处理,并根据所述只读权限对加密处理之后的明文文件进行相应的只读权限设置;或者,When the permission configured for the identification information is read-only permission, encrypt the plaintext file data according to the fingerprint information, and perform corresponding read-only permission on the encrypted plaintext file according to the read-only permission setting; or,

当为所述标识信息配置的权限为读写权限时,根据所述指纹信息对所述明文文件数据进行加密处理,并根据所述读写权限对加密处理之后的明文文件进行相应的读写权限设置。When the permissions configured for the identification information are read and write permissions, encrypt the plaintext file data according to the fingerprint information, and perform corresponding read and write permissions on the encrypted plaintext files according to the read and write permissions set up.

其中可选地,所述方法还包括:Wherein optionally, described method also comprises:

当验证到所述指纹信息不合法时,发送用于提示所述指纹信息验证失败的提示消息。When it is verified that the fingerprint information is invalid, a prompt message for prompting that the fingerprint information verification fails is sent.

本发明实施例第二方面公开提供了一种文件数据解密处理的方法,所述方法包括:The second aspect of the embodiment of the present invention discloses a method for decrypting file data, the method comprising:

接收用于请求对密文文件数据解密处理的解密请求;其中,所述解密请求包括:指纹信息和标识信息;其中,所述指纹信息与所述标识信息相对应;Receiving a decryption request for requesting decryption of ciphertext file data; wherein the decryption request includes: fingerprint information and identification information; wherein the fingerprint information corresponds to the identification information;

验证接收到的所述解密请求中的标识信息是否配置有相应的权限;Verifying whether the identification information in the received decryption request is configured with corresponding permissions;

若验证到所述标识信息配置有相应的权限,则获取密文文件数据;If it is verified that the identification information is configured with corresponding permissions, then obtain the ciphertext file data;

根据所述指纹信息对获取到的所述密文文件数据进行解密处理,并根据所述标识信息配置的权限对解密处理之后的密文文件进行相应的权限设置。Decrypt the obtained ciphertext file data according to the fingerprint information, and perform corresponding permission setting on the decrypted ciphertext file according to the permission configured by the identification information.

其中可选地,所述根据所述指纹信息对获取到的所述密文文件数据进行解密处理,并根据所述标识信息配置的权限对解密处理之后的密文文件进行相应的权限设置,包括:Wherein optionally, the decryption process is performed on the obtained ciphertext file data according to the fingerprint information, and the corresponding permission setting is performed on the ciphertext file after the decryption process according to the authority configured by the identification information, including :

当所述标识信息配置的权限为只读权限时,根据所述指纹信息对所述密文文件数据进行解密处理,并根据所述只读权限对解密处理之后的密文文件进行相应的只读权限设置;或者,When the authority configured by the identification information is the read-only authority, decrypt the ciphertext file data according to the fingerprint information, and perform corresponding read-only on the decrypted ciphertext file according to the read-only authority permission settings; or,

当所述标识信息配置的权限为读写权限时,根据所述指纹信息对所述密文文件数据进行解密处理,并根据所述读写权限对解密处理之后的密文文件进行相应的读写权限设置。When the authority configured by the identification information is read-write authority, decrypt the ciphertext file data according to the fingerprint information, and perform corresponding read-write on the decrypted ciphertext file according to the read-write authority Permission settings.

其中可选地,所述方法还包括:Wherein optionally, described method also comprises:

当验证到所述标识信息没有配置相应的权限时,发送用于提示所述解密请求错误的提示消息。When it is verified that the identification information is not configured with a corresponding authority, a prompt message for prompting that the decryption request is wrong is sent.

本发明实施例第三方面还公开提供了一种文件数据加密处理的装置,所述装置包括:The third aspect of the embodiment of the present invention also discloses and provides a device for encrypting file data, and the device includes:

接收模块,用于接收用于请求对明文文件数据进行加密处理的加密请求;其中,所述加密请求包括:指纹信息和标识信息;The receiving module is configured to receive an encryption request for requesting encryption processing of plaintext file data; wherein, the encryption request includes: fingerprint information and identification information;

配置模块,用于为所述接收模块接收到的所述加密请求中的标识信息配置相应的权限;a configuration module, configured to configure corresponding permissions for the identification information in the encryption request received by the receiving module;

获取模块,用于获取明文文件数据;The acquisition module is used to acquire plaintext file data;

处理模块,用于根据所述指纹信息对所述获取模块获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置。A processing module, configured to encrypt the plaintext file data obtained by the acquisition module according to the fingerprint information, and set corresponding permissions for the encrypted plaintext file according to the permissions configured for the identification information.

其中可选地,所述装置还包括:Wherein optionally, described device also comprises:

验证模块,用于验证所述接收模块接收到的所述加密请求中的指纹信息是否合法;若所述验证模块验证到所述指纹信息合法,则通知所述处理模块。A verification module, configured to verify whether the fingerprint information in the encryption request received by the receiving module is legal; if the verification module verifies that the fingerprint information is legal, then notify the processing module.

其中可选地,所述处理模块,具体用于当所述配置模块为所述标识信息配置的权限为只读权限时,根据所述指纹信息对所述明文文件数据进行加密处理,并根据所述只读权限对加密处理之后的明文文件进行相应的只读权限设置;或者,Wherein optionally, the processing module is specifically configured to encrypt the plaintext file data according to the fingerprint information when the permission configured by the configuration module for the identification information is read-only permission, and according to the According to the above read-only permission, set the corresponding read-only permission for the encrypted plaintext file; or,

所述处理模块,具体用于当所述配置模块为所述标识信息配置的权限为读写权限时,根据所述指纹信息对所述明文文件数据进行加密处理,并根据所述读写权限对加密处理之后的明文文件进行相应的读写权限设置。The processing module is specifically configured to encrypt the plaintext file data according to the fingerprint information when the permission configured by the configuration module for the identification information is read-write permission, and encrypt the plaintext file data according to the read-write permission. The encrypted plaintext files should be set with corresponding read and write permissions.

其中可选地,所述装置还包括:Wherein optionally, described device also comprises:

发送模块,用于当所述验证模块验证到所述指纹信息不合法时,发送用于提示所述指纹信息验证失败的提示消息。A sending module, configured to send a prompt message for prompting that the verification of the fingerprint information fails when the verification module verifies that the fingerprint information is invalid.

本发明实施例第四方面还公开提供了一种文件数据解密处理的装置,所述装置包括:The fourth aspect of the embodiment of the present invention also discloses and provides a device for decrypting file data, and the device includes:

接收模块,用于接收用于请求对密文文件数据解密处理的解密请求;其中,所述解密请求包括:指纹信息和标识信息;其中,所述指纹信息与所述标识信息相对应;The receiving module is configured to receive a decryption request for requesting decryption processing of ciphertext file data; wherein the decryption request includes: fingerprint information and identification information; wherein the fingerprint information corresponds to the identification information;

验证模块,用于验证所述接收模块接收到的所述解密请求中的标识信息是否配置有相应的权限;A verification module, configured to verify whether the identification information in the decryption request received by the receiving module is configured with corresponding permissions;

获取模块,用于若所述验证模块验证到所述标识信息配置有相应的权限,则获取密文文件数据;An acquisition module, configured to acquire ciphertext file data if the verification module verifies that the identification information is configured with corresponding permissions;

处理模块,用于根据所述指纹信息对所述获取模块获取到的所述密文文件数据进行解密处理,并根据所述标识信息配置的权限对解密处理之后的密文文件进行相应的权限设置。A processing module, configured to decrypt the ciphertext file data obtained by the acquisition module according to the fingerprint information, and perform corresponding permission setting on the ciphertext file after the decryption processing according to the permission configured by the identification information .

其中可选地,where optionally,

所述处理模块,具体用于当所述标识信息配置的权限为只读权限时,根据所述指纹信息对所述密文文件数据进行解密处理,并根据所述只读权限对解密处理之后的密文文件进行相应的只读权限设置;或者,The processing module is specifically configured to decrypt the ciphertext file data according to the fingerprint information when the permission configured by the identification information is a read-only permission, and decrypt the decrypted data according to the read-only permission. Set the corresponding read-only permission for the ciphertext file; or,

所述处理模块,具体用于当所述标识信息配置的权限为读写权限时,根据所述指纹信息对所述密文文件数据进行解密处理,并根据所述读写权限对解密处理之后的密文文件进行相应的读写权限设置。The processing module is specifically configured to decrypt the ciphertext file data according to the fingerprint information when the permission configured by the identification information is the read-write permission, and decrypt the decrypted data according to the read-write permission. Set the corresponding read and write permissions for the ciphertext file.

其中可选地,所述装置还包括:Wherein optionally, described device also comprises:

发送模块,用于当所述验证模块验证到所述标识信息没有配置相应的权限时,发送用于提示所述解密请求错误的提示消息。A sending module, configured to send a prompt message for prompting an error in the decryption request when the verification module verifies that the identification information is not configured with a corresponding authority.

本发明实施例第五方面还公开提供了一种终端,所述终端包括如上第三面公开提供的所述文件数据加密处理装置;或者,所述终端包括如上第四面公开提供的所述文件数据解密处理装置。The fifth aspect of the embodiment of the present invention also discloses to provide a terminal, the terminal includes the file data encryption processing device as disclosed in the third aspect above; or, the terminal includes the file as disclosed in the fourth aspect above Data decryption processing device.

本发明实施例可通过指纹信息对文件数据进行加/解密处理,检测标识信息是否配置有对应的权限,若所述标识信息配置有对应的权限,则根据所述与标识信息对应的权限对加密之后的文件进行相应地权限设置,这样提升了文件数据的安全性和对文件数据处理的方便快捷性。In the embodiment of the present invention, the file data can be encrypted/decrypted through the fingerprint information, and whether the identification information is configured with the corresponding authority is detected. If the identification information is configured with the corresponding authority, the encryption is performed according to the authority corresponding to the identification information. Subsequent files are set with corresponding permissions, which improves the security of file data and the convenience and quickness of file data processing.

附图说明Description of drawings

为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only These are some embodiments of the present invention. Those skilled in the art can also obtain other drawings based on these drawings without creative work.

图1是本发明实施例的一种文件数据加密处理方法的流程示意图;Fig. 1 is a schematic flow chart of a file data encryption processing method according to an embodiment of the present invention;

图2是本发明实施例的另一种文件数据加密处理方法的流程示意图;Fig. 2 is a schematic flow chart of another file data encryption processing method according to an embodiment of the present invention;

图3是本发明实施例的一种文件数据解密处理方法的流程示意图;Fig. 3 is a schematic flow chart of a file data decryption processing method according to an embodiment of the present invention;

图4是本发明实施例的另一种文件数据解密处理方法的流程示意图;FIG. 4 is a schematic flowchart of another method for decrypting file data according to an embodiment of the present invention;

图5是本发明实施例的一种文件数据加密处理装置的结构示意图;5 is a schematic structural diagram of a file data encryption processing device according to an embodiment of the present invention;

图6是本发明实施例的另一种文件数据加密处理装置的结构示意图;6 is a schematic structural diagram of another file data encryption processing device according to an embodiment of the present invention;

图7是本发明实施例的一种文件数据解密处理装置的结构示意图;7 is a schematic structural diagram of a file data decryption processing device according to an embodiment of the present invention;

图8是本发明实施例的另一种文件数据解密处理装置的结构示意图;8 is a schematic structural diagram of another file data decryption processing device according to an embodiment of the present invention;

图9是本发明实施例的一种终端的结构示意图;FIG. 9 is a schematic structural diagram of a terminal according to an embodiment of the present invention;

图10是本发明实施例的另一种终端的结构示意图。FIG. 10 is a schematic structural diagram of another terminal according to an embodiment of the present invention.

具体实施方式detailed description

本发明实施例提供了一种处理结果的展示方法及装置,以期可以对关键词进行快速搜索,获取用户最想得到的结果信息,操作简单,效率高。Embodiments of the present invention provide a method and device for displaying processing results, in order to quickly search for keywords and obtain the most desired result information of the user, with simple operation and high efficiency.

为了使本技术领域的人员更好地理解本发明方案,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分的实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本发明保护的范围。In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”和“第三”等是用于区别不同对象,而非用于描述特定顺序。此外,术语“包括”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。The terms "first", "second" and "third" in the specification and claims of the present invention and the above drawings are used to distinguish different objects, rather than to describe a specific order. Furthermore, the term "comprise", as well as any variations thereof, is intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes unlisted steps or units, or optionally further includes For other steps or units inherent in these processes, methods, products or apparatuses.

请参见图1,是本发明实施例的一种文件数据加密处理方法的流程示意图,本发明实施例的所述方法可以应用在诸如智能手机、平板电脑、智能可穿戴设备等带通信网络功能的终端中,具体可由这些通信终端的处理器来实现。本发明实施例的所述方法还包括如下步骤。Please refer to Figure 1, which is a schematic flow chart of a file data encryption processing method according to an embodiment of the present invention. The method described in this embodiment of the present invention can be applied to devices with communication network functions such as smart phones, tablet computers, and smart wearable devices. In the terminal, specifically, it can be implemented by the processors of these communication terminals. The method in the embodiment of the present invention further includes the following steps.

S101、接收用于请求对明文文件数据进行加密处理的加密请求;其中,所述加密请求包括:指纹信息和标识信息。S101. Receive an encryption request for requesting encryption processing of plaintext file data; wherein, the encryption request includes: fingerprint information and identification information.

本发明实施例中,通信终端向服务器发送用于请求对明文文件数据进行加密处理的加密请求;其中,所述加密请求可以包括指纹信息和标识信息。所述服务器接收所述通信终端发出的所述加密请求。In the embodiment of the present invention, the communication terminal sends to the server an encryption request for requesting encryption of plaintext file data; wherein, the encryption request may include fingerprint information and identification information. The server receives the encryption request sent by the communication terminal.

所述指纹信息可以为同一用户的指纹信息、不同用户的指纹信息,同一用户不同手指的指纹信息、或者同一手指指纹信息的不同时间对应的指纹信息,或者其他的指纹信息,本发明实施例不作限定。The fingerprint information may be fingerprint information of the same user, fingerprint information of different users, fingerprint information of different fingers of the same user, or fingerprint information corresponding to different times of the fingerprint information of the same finger, or other fingerprint information. limited.

所述标识信息用于表示用户身份信息的标识,可以为用户姓名、用户ID号、或者其他的用于表示用户身份的标识信息,本发明实施例不作限定。The identification information is used to indicate the identification of the user identity information, and may be user name, user ID number, or other identification information used to indicate the user identity, which is not limited in this embodiment of the present invention.

所述通信终端可以包括个人电脑、智能手机(如Android手机、iOS手机等)、平板电脑、掌上电脑、移动互联网设备(MID,MobileInternetDevices)或穿戴式智能设备等互联网设备,本发明实施例不作限定。The communication terminal may include Internet devices such as personal computers, smart phones (such as Android phones, iOS phones, etc.), tablet computers, palmtop computers, mobile Internet devices (MID, MobileInternetDevices) or wearable smart devices, which are not limited by the embodiments of the present invention .

S102、为接收到的所述加密请求中的标识信息配置相应的权限。S102. Configure corresponding permissions for the identification information in the received encryption request.

本发明实施例中,服务器可以为S101接收到的所述加密请求中的标识信息配置相应的权限(如只读权限、读写权限等),也即是,服务器以加密的方式写入与所述标识信息对应的权限。In the embodiment of the present invention, the server may configure corresponding permissions (such as read-only permission, read-write permission, etc.) The permissions corresponding to the above identification information.

S103、获取明文文件数据。S103. Obtain plaintext file data.

本发明实施例中,服务器可以触发通信终端发送明文文件数据至所述服务器,所述服务器接收所述明文文件数据;或者,所述服务器可以解析S101接收到的所述加密请求,得到明文文件数据;或者,所述服务器通过其他方式获取到明文文件数据,本发明实施例不作限定。In the embodiment of the present invention, the server may trigger the communication terminal to send the plaintext file data to the server, and the server receives the plaintext file data; or, the server may analyze the encryption request received in S101 to obtain the plaintext file data or, the server obtains the plaintext file data in other ways, which is not limited in this embodiment of the present invention.

S104、根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置。S104. Perform encryption processing on the acquired plaintext file data according to the fingerprint information, and set corresponding permissions on the encrypted plaintext file according to permissions configured for the identification information.

本发明实施例中,服务器可以首先验证S101接收到的所述加密请求中的指纹信息是否合法,若所述服务器验证到所述指纹信息合法,则所述服务器可以根据S101接收到的所述加密请求中的指纹信息对S103获取到的明文文件数据进行加密处理,所述服务器还可以根据S102为所述标识信息配置的权限对加密之后的明文文件进行相应的权限设置,也即是,所述服务器可以根据S102以加密方式写入的与所述标识信息对应的权限对S103获取到的明文文件数据进行相应的权限设置,所述服务器还可以根据S101接收到的所述加密请求中的指纹信息对权限设置之后的明文文件数据进行加密处理。In the embodiment of the present invention, the server may first verify whether the fingerprint information in the encryption request received in S101 is legal, and if the server verifies that the fingerprint information is legal, then the server may The fingerprint information in the request encrypts the plaintext file data obtained in S103, and the server can also set the corresponding permission for the encrypted plaintext file according to the permissions configured for the identification information in S102, that is, the The server can set the corresponding authority for the plaintext file data obtained in S103 according to the authority corresponding to the identification information written in an encrypted manner in S102, and the server can also set the corresponding authority according to the fingerprint information in the encryption request received in S101 Encrypt the plaintext file data after permission setting.

具体实现中,服务器可以先判断S101接收到的所述加密请求中的指纹信息和本服务器中存储的指纹信息的相似度是否超过预设阈值(如90%),若超过预设阈值,则确定S101接收到的所述加密请求中的指纹信息合法,进一步地,所述服务器可以根据所述指纹信息对S103获取到的明文文件数据进行加密处理,还可以根据S102为所述标识信息配置的权限对加密之后的明文文件进行相应的权限设置。In a specific implementation, the server may first judge whether the similarity between the fingerprint information in the encryption request received in S101 and the fingerprint information stored in the server exceeds a preset threshold (such as 90%), and if it exceeds the preset threshold, determine The fingerprint information in the encryption request received in S101 is legal. Further, the server may encrypt the plaintext file data obtained in S103 according to the fingerprint information, and may also configure the authority for the identification information according to S102. Set the corresponding permission for the encrypted plaintext file.

当S102为所述标识信息配置的权限为只读权限时,所述服务器根据所述指纹信息对S103获取到的明文文件数据进行加密处理,所述服务器还可以根据所述只读权限对加密处理之后的明文文件进行相应地只读权限设置;或者,When the authority configured for the identification information in S102 is the read-only authority, the server encrypts the plaintext file data obtained in S103 according to the fingerprint information, and the server may also encrypt the data according to the read-only authority. The following plaintext files are set to read-only permissions accordingly; or,

当S102为所述标识信息配置的权限为读写权限时,所述服务器根据所述指纹信息对S103获取到的明文文件数据进行加密处理,所述服务器还可以根据所述只读权限对加密处理之后的明文文件进行相应地读写权限设置。When the authority configured for the identification information in S102 is the read-write authority, the server encrypts the plaintext file data obtained in S103 according to the fingerprint information, and the server may also encrypt the data according to the read-only authority. The following plaintext files are set with corresponding read and write permissions.

当S101接收到的所述加密请求中的指纹信息和本服务器中存储的指纹信息的相似度不超过预设阈值时,所述服务器可以向通信终端发送提示消息,所述提示消息用于提示S101接收到的所述加密请求中的指纹信息验证失败,请重发加密请求或者指纹信息。When the similarity between the fingerprint information in the encryption request received in S101 and the fingerprint information stored in the server does not exceed the preset threshold, the server may send a prompt message to the communication terminal, and the prompt message is used to prompt S101 The fingerprint information in the received encryption request failed to be verified, please resend the encryption request or fingerprint information.

本发明实施例可通过接收用于请求对明文文件数据进行加密处理的加密请求,其中,所述加密请求包括:指纹信息和标识信息,并为接收到的所述加密请求中的标识信息配置相应的权限;获取明文文件数据,根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置,这样提升文件数据的安全性和对文件数据处理的方便快捷性。In this embodiment of the present invention, an encryption request for encrypting plaintext file data may be received, wherein the encryption request includes: fingerprint information and identification information, and corresponding configuration information is configured for the identification information in the received encryption request. Obtain the plaintext file data, encrypt the obtained plaintext file data according to the fingerprint information, and perform corresponding permission settings on the encrypted plaintext file according to the permissions configured for the identification information, so that Improve the security of file data and the convenience and speed of file data processing.

请参见图2,是本发明实施例的另一种文件数据加密处理方法的流程示意图,本发明实施例的所述方法可以应用在诸如智能手机、平板电脑、智能可穿戴设备等带通信网络功能的终端中,具体可由这些通信终端的处理器来实现。本发明实施例的所述方法还包括如下步骤。Please refer to Figure 2, which is a schematic flow chart of another file data encryption processing method according to an embodiment of the present invention. The method described in this embodiment of the present invention can be applied to devices with communication network functions such as smart phones, tablet computers, and smart wearable devices. In the terminal, it can be specifically implemented by the processors of these communication terminals. The method in the embodiment of the present invention further includes the following steps.

S201、接收用于请求对明文文件数据进行加密处理的加密请求;其中,所述加密请求包括:指纹信息和标识信息。S201. Receive an encryption request for requesting encryption processing of plaintext file data; wherein, the encryption request includes: fingerprint information and identification information.

S202、为接收到的所述加密请求中的标识信息配置相应的权限。S202. Configure corresponding permissions for the identification information in the received encryption request.

S203、获取明文文件数据。S203. Obtain plaintext file data.

S204、验证接收到的所述加密请求中的指纹信息是否合法。S204. Verify whether the fingerprint information in the received encryption request is legal.

本发明实施中,服务器可以验证S201接收到的所述加密请求中的指纹信息是否是合法指纹信息,具体实施方式可以为:In the implementation of the present invention, the server can verify whether the fingerprint information in the encrypted request received by S201 is legal fingerprint information, and the specific implementation method can be as follows:

所述服务器判断S201接收到的所述加密请求中的指纹信息与本服务器中存储的指纹信息的相似度是否超过预设阈值,若判断到相似度超过预设阈值,则所述服务器验证到S201接收到的所述加密请求中的指纹信息合法,所述服务器继续执行步骤S205或者S206;否则,所述服务器执行步骤S207。The server judges whether the similarity between the fingerprint information in the encryption request received in S201 and the fingerprint information stored in the server exceeds a preset threshold, and if it is judged that the similarity exceeds a preset threshold, the server verifies to S201 If the received fingerprint information in the encryption request is legal, the server continues to execute step S205 or S206; otherwise, the server executes step S207.

S205、当为所述标识信息配置的权限为只读权限时,根据所述指纹信息对所述明文文件数据进行加密处理,并根据所述只读权限对加密处理之后的明文文件进行相应的只读权限设置。S205. When the permission configured for the identification information is a read-only permission, perform encryption processing on the plaintext file data according to the fingerprint information, and perform corresponding only processing on the encrypted plaintext file according to the read-only permission Read permission settings.

S206、当为所述标识信息配置的权限为读写权限时,根据所述指纹信息对所述明文文件数据进行加密处理,并根据所述读写权限对加密处理之后的明文文件进行相应的读写权限设置。S206. When the permission configured for the identification information is the read-write permission, perform encryption processing on the plaintext file data according to the fingerprint information, and correspondingly read the encrypted plaintext file according to the read-write permission Write permission settings.

本发明实施例中,步骤S205和步骤S206是并列的,都是服务器根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置的具体实现方式:In the embodiment of the present invention, step S205 and step S206 are in parallel, and both the server encrypts the acquired plaintext file data according to the fingerprint information, and encrypts the obtained plaintext file data according to the authority configured for the identification information. The specific implementation of the corresponding permission setting for the plaintext file:

当S202服务器为S201获取到的所述加密请求中的标识信息配置的权限为只读权限时,所述服务器可以根据S204验证到的合法的所述指纹信息对S203获取到的明文文件数据进行加密处理,所述服务器还可以根据S202本服务器为S201获取到的所述加密请求中的标识信息配置的权限为只读权限对加密处理之后的明文文件进行只读权限设置;或者,When S202 the server configures the permission for the identification information in the encryption request obtained in S201 as read-only permission, the server may encrypt the plaintext file data obtained in S203 according to the legal fingerprint information verified in S204 Processing, the server can also set the read-only permission for the encrypted plaintext file according to S202 that the server configures the permission for the identification information in the encryption request obtained in S201 as read-only permission; or,

当S202服务器为S201获取到的所述加密请求中的标识信息配置的权限为读写权限时,所述服务器可以根据S204验证到的合法的所述指纹信息对S203获取到的明文文件数据进行加密处理,所述服务器还可以根据S202本服务器为S201获取到的所述加密请求中的标识信息配置的权限为读写权限对加密处理之后的明文文件进行读写权限设置。In S202, when the permission configured by the server for the identification information in the encryption request obtained in S201 is read-write permission, the server may encrypt the plaintext file data obtained in S203 according to the legal fingerprint information verified in S204 Processing, the server may also set the read and write permissions for the encrypted plaintext file according to S202 that the server configures the permissions for the identification information in the encryption request obtained in S201 as read and write permissions.

S207、当验证到所述指纹信息不合法时,发送用于提示所述指纹信息验证失败的提示消息。S207. When it is verified that the fingerprint information is invalid, send a prompt message for prompting that the verification of the fingerprint information fails.

为了对上述方案的进一步阐释和理解,下面通过一个例子进行说明。现有5名用户分别为用户A、用户B…….用户E,5名用户分别通过手机A将自己食指的指纹信息以及标识ID号发送给服务器,服务器接收并存储5名用户的食指指纹信息和标识ID号,并为接收到的5个标识ID号配置相应的权限,具体权限配置情况如下表1所示。用户A想通过自己的指纹信息对文件A进行加密,现用户A通过手机A向服务器发送加密请求,其中,所述加密请求中包括自己的指纹信息和自己的标识ID号,服务器接收到用户A发送的加密请求;用户A通过手机A将想要加密的文件A发送给所述服务器,所述服务器接收文件A;所述服务器验证接收到的加密请求中的指纹信息是否合法(也即是,验证所述指纹信息是否未本服务器中存储的用户A的食指指纹信息);当验证到所述指纹信息合法时,所述服务器根据用户A的所述指纹信息对用户A想要加密的文件A进行加密处理,所述服务器还可以根据之前为用户A的ID号001配置的读写权限对加密之后的文件A进行读写权限设置。In order to further explain and understand the above solution, an example is used below to illustrate. There are currently 5 users respectively user A, user B....user E, 5 users respectively send their index finger fingerprint information and identification ID number to the server through mobile phone A, and the server receives and stores the index finger fingerprint information of 5 users and identification ID numbers, and configure corresponding permissions for the five received identification ID numbers. The specific permission configuration is shown in Table 1 below. User A wants to encrypt file A with his own fingerprint information, now user A sends an encryption request to the server through mobile phone A, wherein the encryption request includes his own fingerprint information and his own identification ID number, and the server receives user A's The encrypted request sent; User A sends the file A that wants to be encrypted to the server through the mobile phone A, and the server receives the file A; the server verifies whether the fingerprint information in the received encrypted request is legal (that is, Verify that the fingerprint information is not the index finger fingerprint information of user A stored in this server); when the fingerprint information is verified to be legal, the server encrypts the file A that user A wants to encrypt according to the fingerprint information of user A To perform encryption processing, the server can also set the read and write permissions for the encrypted file A according to the read and write permissions previously configured for user A's ID number 001.

表1文件权限配置Table 1 File permission configuration

用户userIDID读写权限Read and write permissions只读权限read only用户AUser A001001Havenone用户BUser B002002Havenone用户CUser C003003noneHave用户DUser D004004noneHave用户EUser E005005nonenone

本发明实施例可通过接收用于请求对明文文件数据进行加密处理的加密请求,其中,所述加密请求包括:指纹信息和标识信息,并为接收到的所述加密请求中的标识信息配置相应的权限;获取明文文件数据,根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置,这样提升文件数据的安全性和对文件数据处理的方便快捷性。In this embodiment of the present invention, an encryption request for encrypting plaintext file data may be received, wherein the encryption request includes: fingerprint information and identification information, and corresponding configuration information is configured for the identification information in the received encryption request. Obtain the plaintext file data, encrypt the obtained plaintext file data according to the fingerprint information, and perform corresponding permission settings on the encrypted plaintext file according to the permissions configured for the identification information, so that Improve the security of file data and the convenience and speed of file data processing.

请参见图3,是本发明实施例的一种文件数据解密处理方法的流程示意图,本发明实施例的所述方法可以应用在诸如智能手机、平板电脑、智能可穿戴设备等带通信网络功能的终端中,具体可由这些通信终端的处理器来实现。本发明实施例的所述方法还包括如下步骤。Please refer to Figure 3, which is a schematic flow chart of a file data decryption processing method according to an embodiment of the present invention. The method described in this embodiment of the present invention can be applied to devices with communication network functions such as smart phones, tablet computers, and smart wearable devices. In the terminal, specifically, it can be implemented by the processors of these communication terminals. The method in the embodiment of the present invention further includes the following steps.

S301、接收用于请求对密文文件数据解密处理的解密请求;其中,所述解密请求包括:指纹信息和标识信息,所述指纹信息与所述标识信息相对应。S301. Receive a decryption request for requesting decryption of ciphertext file data; wherein, the decryption request includes: fingerprint information and identification information, and the fingerprint information corresponds to the identification information.

本发明实施例中,通信终端向服务器发送用于请求对密文文件数据进行解密处理的解密请求,其中,所述解密请求可以包括指纹信息和标识信息,所述指纹信息和所述标识信息相对应。服务器接收所述解密请求。In the embodiment of the present invention, the communication terminal sends to the server a decryption request for requesting decryption of the ciphertext file data, wherein the decryption request may include fingerprint information and identification information, and the fingerprint information and the identification information are related correspond. The server receives the decryption request.

S302、验证接收到的所述解密请求中的标识信息是否配置有相应的权限。S302. Verify whether the identification information in the received decryption request is configured with a corresponding authority.

本发明实施例中,服务器验证S301接收到的所述解密请求中的标识信息是否配置有对应的权限(如读写权限、只读权限等)。In the embodiment of the present invention, the server verifies in S301 whether the identification information in the decryption request received is configured with a corresponding authority (such as read-write authority, read-only authority, etc.).

S303、若验证到所述标识信息配置有相应的权限,则获取密文文件数据。S303. Obtain ciphertext file data if it is verified that the identification information is configured with a corresponding authority.

本发明实施例中,若S302服务器验证到S301接收到的所述解密请求中的标识信息配置有对应的权限时,所述服务器可以通过解析S301接收到的所述解密请求得到密文文件数据,或者,所述服务器触发通信终端向本服务器发送密文文件数据,所述服务器接收所述密文文件数据。In the embodiment of the present invention, if S302 the server verifies that the identification information in the decryption request received at S301 is configured with a corresponding authority, the server can obtain the ciphertext file data by parsing the decryption request received at S301, Or, the server triggers the communication terminal to send the ciphertext file data to the server, and the server receives the ciphertext file data.

S304、根据所述指纹信息对获取到的所述密文文件数据进行解密处理,并根据所述标识信息配置的权限对解密处理之后的密文文件进行相应的权限设置。S304. Perform decryption processing on the acquired ciphertext file data according to the fingerprint information, and perform corresponding authority setting on the decrypted ciphertext file according to the authority configured in the identification information.

本发明实施例中,服务器可以根据S301接收到的所述解密请求中的指纹信息对S303获取到的所述密文文件数据进行解密处理,所述服务器还可以根据S302验证到的S301接收到的所述解密请求中的标识信息配置的权限对解密之后的密文文件进行对应的权限设置。In the embodiment of the present invention, the server may decrypt the ciphertext file data obtained in S303 according to the fingerprint information in the decryption request received in S301, and the server may also decrypt the encrypted file data received in S301 according to the verification in S302. The authority configured by the identification information in the decryption request sets the corresponding authority for the decrypted ciphertext file.

具体实现中,当所述服务器在S302验证到的所述标识信息配置的权限为只读权限时,所述服务器根据S301接收到的所述解密请求中的指纹信息对S303获取到的所述密文文件数据进行解密处理,所述服务器还可以根据所述只读权限对解密之后的密文文件进行只读权限设置,也即是,所述服务器以只读方式对S303获取到的所述密文文件数据进行解密处理;或者,In a specific implementation, when the permission configured by the identification information verified by the server in S302 is a read-only permission, the server performs an operation based on the fingerprint information in the decryption request received in S301 for the encrypted password obtained in S303. The server can also set the read-only permission for the decrypted ciphertext file according to the read-only permission, that is, the server can read-only the encrypted ciphertext file obtained in S303. decrypt file data; or,

当所述服务器在S302验证到的所述标识信息配置的权限为读写权限时,所述服务器根据S301接收到的所述解密请求中的指纹信息对S303获取到的所述密文文件数据进行解密处理,所述服务器还可以根据所述读写权限对解密之后的密文文件进行读写权限设置,也即是,所述服务器以读写方式对S303获取到的所述密文文件数据进行解密处理。When the permission configured by the identification information verified by the server in S302 is the read-write permission, the server performs the decryption on the ciphertext file data obtained in S303 according to the fingerprint information in the decryption request received in S301. Decryption processing, the server can also set the read-write permission for the decrypted ciphertext file according to the read-write permission, that is, the server performs read-write access to the ciphertext file data obtained in S303 Decryption processing.

当所述服务器在S302验证到S301接收到的所述解密请求中的标识信息没有配置对应的权限时,所述服务器可以向通信终端发送提示消息,所述提示消息用于提示通信终端发送的所述解密请求中的指纹信息验证失败。When the server verifies in S302 that the identification information in the decryption request received in S301 does not have a corresponding authority configured, the server may send a prompt message to the communication terminal, and the prompt message is used to prompt the communication terminal to send the The verification of the fingerprint information in the above decryption request failed.

本发明实施例可通过接收用于请求对密文文件数据解密处理的解密请求;其中,所述解密请求包括:指纹信息和标识信息,所述指纹信息与所述标识信息相对应,并验证接收到的所述解密请求中的标识信息是否配置有相应的权限;若验证到所述标识信息配置有相应的权限,则获取密文文件数据,根据所述指纹信息对获取到的所述密文文件数据进行解密处理,并根据所述标识信息配置的权限对解密处理之后的密文文件进行相应的权限设置,这样提升了文件数据的安全性和对文件数据处理的方便快捷性。In the embodiment of the present invention, a decryption request for requesting decryption processing of ciphertext file data may be received; wherein, the decryption request includes: fingerprint information and identification information, the fingerprint information corresponds to the identification information, and verification is received Whether the identification information in the obtained decryption request is configured with the corresponding authority; if it is verified that the identification information is configured with the corresponding authority, then the ciphertext file data is obtained, and the obtained ciphertext is processed according to the fingerprint information The file data is decrypted, and corresponding permissions are set for the decrypted ciphertext file according to the permissions configured by the identification information, which improves the security of the file data and the convenience and quickness of file data processing.

请参见图4,是本发明实施例的另一种文件数据解密处理方法的流程示意图,本发明实施例的所述方法可以应用在诸如智能手机、平板电脑、智能可穿戴设备等带通信网络功能的终端中,具体可由这些通信终端的处理器来实现。本发明实施例的所述方法还包括如下步骤。Please refer to Figure 4, which is a schematic flow chart of another file data decryption processing method according to an embodiment of the present invention. The method described in this embodiment of the present invention can be applied to devices with communication network functions such as smart phones, tablet computers, and smart wearable devices. In the terminal, it can be specifically implemented by the processors of these communication terminals. The method in the embodiment of the present invention further includes the following steps.

S401、接收用于请求对密文文件数据解密处理的解密请求;其中,所述解密请求包括:指纹信息和标识信息,所述指纹信息与所述标识信息相对应。S401. Receive a decryption request for requesting decryption processing of ciphertext file data; wherein, the decryption request includes: fingerprint information and identification information, and the fingerprint information corresponds to the identification information.

S402、验证接收到的所述解密请求中的标识信息是否配置有相应的权限。S402. Verify whether the identification information in the received decryption request is configured with a corresponding authority.

本发明实施例中,若服务器验证到S401接收到的所述解密请求中的标识信息配置有对应的权限,执行S403步骤;否则,执行S406。In the embodiment of the present invention, if the server verifies that the identification information in the decryption request received in S401 is configured with a corresponding authority, step S403 is executed; otherwise, step S406 is executed.

S403、若验证到所述标识信息配置有相应的权限,则获取密文文件数据。S403. If it is verified that the identification information is configured with a corresponding authority, acquire the ciphertext file data.

S404、当所述标识信息配置的权限为只读权限时,根据所述指纹信息对所述密文文件数据进行解密处理,并根据所述只读权限对解密处理之后的密文文件进行相应的只读权限设置。S404. When the authority configured by the identification information is the read-only authority, decrypt the ciphertext file data according to the fingerprint information, and perform corresponding decryption on the ciphertext file after the decryption process according to the read-only authority. Read-only permission settings.

S405、当所述标识信息配置的权限为读写权限时,根据所述指纹信息对所述密文文件数据进行解密处理,并根据所述读写权限对解密处理之后的密文文件进行相应的读写权限设置。S405. When the authority configured for the identification information is the read-write authority, decrypt the ciphertext file data according to the fingerprint information, and perform corresponding decryption on the ciphertext file after the decryption process according to the read-write authority. Read and write permissions settings.

本发明实施例中,S404步骤和S405步骤是并列的,都是所述服务器根据根据所述指纹信息对获取到的所述密文文件数据进行解密处理,并根据所述标识信息配置的权限对解密处理之后的密文文件进行相应的权限设置的具体实现方式:In the embodiment of the present invention, step S404 and step S405 are parallel, and both the server decrypts the acquired ciphertext file data according to the fingerprint information, and performs authorization according to the authority configured by the identification information. The specific implementation of the corresponding permission setting for the decrypted ciphertext file:

当服务器在S402中验证到的所述标识信息配置的权限为只读权限时,所述服务器根据S401中接收到的所述解密请求中的指纹信息对S403获取到的所述密文文件数据进行解密处理,所述服务器号可以根据所述只读权限对解密之后的密文文件进行只读权限设置,也即是,所述服务器以只读方式对S403获取到的所述密文文件数据进行解密处理;或者,When the permission configured by the identification information verified by the server in S402 is a read-only permission, the server, according to the fingerprint information in the decryption request received in S401, performs the ciphertext file data obtained in S403 Decryption processing, the server number can set the read-only authority for the decrypted ciphertext file according to the read-only authority, that is, the server can perform read-only operation on the ciphertext file data obtained in S403 decryption processing; or,

当服务器在S402中验证到的所述标识信息配置的权限为读写权限时,所述服务器根据S401中接收到的所述解密请求中的指纹信息对S403获取到的所述密文文件数据进行解密处理,所述服务器号可以根据所述读写权限对解密之后的密文文件进行读写权限设置,也即是,所述服务器以读写方式对S403获取到的所述密文文件数据进行解密处理。When the permission configured by the identification information verified by the server in S402 is the read-write permission, the server performs the ciphertext file data obtained in S403 according to the fingerprint information in the decryption request received in S401 Decryption processing, the server number can set the read-write permission for the decrypted ciphertext file according to the read-write permission, that is, the server uses the read-write method to perform the ciphertext file data obtained in S403 Decryption processing.

S406、当验证到所述标识信息没有配置相应的权限时,发送用于提示所述解密请求错误的提示消息。S406. When it is verified that the identification information is not configured with a corresponding authority, send a prompt message for prompting that the decryption request is wrong.

本发明实施例可通过接收用于请求对密文文件数据解密处理的解密请求;其中,所述解密请求包括:指纹信息和标识信息,所述指纹信息与所述标识信息相对应,并验证接收到的所述解密请求中的标识信息是否配置有相应的权限;若验证到所述标识信息配置有相应的权限,则获取密文文件数据,根据所述指纹信息对获取到的所述密文文件数据进行解密处理,并根据所述标识信息配置的权限对解密处理之后的密文文件进行相应的权限设置,这样提升了文件数据的安全性和对文件数据处理的方便快捷性。In the embodiment of the present invention, a decryption request for requesting decryption processing of ciphertext file data may be received; wherein, the decryption request includes: fingerprint information and identification information, the fingerprint information corresponds to the identification information, and verification is received Whether the identification information in the obtained decryption request is configured with the corresponding authority; if it is verified that the identification information is configured with the corresponding authority, then the ciphertext file data is obtained, and the obtained ciphertext is processed according to the fingerprint information The file data is decrypted, and corresponding permissions are set for the decrypted ciphertext file according to the permissions configured by the identification information, which improves the security of the file data and the convenience and quickness of file data processing.

请参见图5,是本发明实施例的一种文件数据加密处理装置的结构示意图,本发明实施例的所述装置可以可设置在诸如智能手机、平板电脑、智能可穿戴设备等带通信网络功能的终端中,所述装置5包括:Please refer to Fig. 5, which is a schematic structural diagram of a file data encryption processing device according to an embodiment of the present invention. The device according to this embodiment of the present invention can be installed on devices with communication network functions such as smart phones, tablet computers, and smart wearable devices. In the terminal, the device 5 includes:

接收模块50,用于接收用于请求对明文文件数据进行加密处理的加密请求;其中,所述加密请求包括:指纹信息和标识信息;The receiving module 50 is configured to receive an encryption request for requesting encryption processing of plaintext file data; wherein, the encryption request includes: fingerprint information and identification information;

配置模块51,用于为所述接收模块50接收到的所述加密请求中的标识信息配置相应的权限;A configuration module 51, configured to configure corresponding permissions for the identification information in the encryption request received by the receiving module 50;

获取模块52,用于获取明文文件数据;Obtaining module 52, for obtaining plaintext file data;

处理模块53,用于根据所述指纹信息对所述获取模块52获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置。The processing module 53 is configured to perform encryption processing on the plaintext file data acquired by the acquisition module 52 according to the fingerprint information, and perform corresponding authorization on the encrypted plaintext file according to the authorization configured for the identification information set up.

本发明实施例可通过接收用于请求对明文文件数据进行加密处理的加密请求,其中,所述加密请求包括:指纹信息和标识信息,并为接收到的所述加密请求中的标识信息配置相应的权限;获取明文文件数据,根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置,这样提升文件数据的安全性和对文件数据处理的方便快捷性。In this embodiment of the present invention, an encryption request for encrypting plaintext file data may be received, wherein the encryption request includes: fingerprint information and identification information, and corresponding configuration information is configured for the identification information in the received encryption request. Obtain the plaintext file data, encrypt the obtained plaintext file data according to the fingerprint information, and perform corresponding permission settings on the encrypted plaintext file according to the permissions configured for the identification information, so that Improve the security of file data and the convenience and speed of file data processing.

本发明实施例中涉及的各个模块、单元的具体实现可参考图1至图2对象实施例中相关功能模块的描述,在此不赘述。For the specific implementation of each module and unit involved in the embodiment of the present invention, reference may be made to the description of the relevant functional modules in the object embodiment in FIG. 1 to FIG. 2 , and details are not repeated here.

请参见图6,是本发明实施例的另一种文件数据加密处理装置的结构示意图,本发明实施例的所述装置可以可设置在诸如智能手机、平板电脑、智能可穿戴设备等带通信网络功能的终端中,所述装置6包括上述实施例中的接收模块50、配置模块51、获取模块52以及处理模块53。Please refer to FIG. 6, which is a schematic structural diagram of another file data encryption processing device according to an embodiment of the present invention. The device according to this embodiment of the present invention can be installed in a communication network such as a smart phone, a tablet computer, or a smart wearable device. In the functional terminal, the device 6 includes the receiving module 50 , the configuration module 51 , the obtaining module 52 and the processing module 53 in the above embodiments.

进一步可选地,在本发明实施例中,所述装置还包括:Further optionally, in the embodiment of the present invention, the device further includes:

验证模块54,用于验证所述接收模块50接收到的所述加密请求中的指纹信息是否合法;若所述验证模块54验证到所述指纹信息合法,则通知所述处理模块53。The verification module 54 is configured to verify whether the fingerprint information in the encryption request received by the receiving module 50 is legal; if the verification module 54 verifies that the fingerprint information is legal, then notify the processing module 53 .

进一步可选地,在本发明实施例中,Further optionally, in the embodiment of the present invention,

所述处理模块53,具体用于当所述配置模块51为所述标识信息配置的权限为只读权限时,根据所述指纹信息对所述明文文件数据进行加密处理,并根据所述只读权限对加密处理之后的明文文件进行相应的只读权限设置;或者,The processing module 53 is specifically configured to, when the authority configured by the configuration module 51 for the identification information is a read-only authority, encrypt the plaintext file data according to the fingerprint information, and encrypt the plaintext file data according to the read-only authority. Permission to set the corresponding read-only permission for the encrypted plaintext file; or,

所述处理模块53,具体用于当所述配置模块51为所述标识信息配置的权限为读写权限时,根据所述指纹信息对所述明文文件数据进行加密处理,并根据所述读写权限对加密处理之后的明文文件进行相应的读写权限设置。The processing module 53 is specifically configured to encrypt the plaintext file data according to the fingerprint information when the permission configured by the configuration module 51 for the identification information is the read-write permission, and to encrypt the plaintext file data according to the read-write permission. Permission Set the corresponding read and write permission for the encrypted plaintext file.

进一步可选地,在本发明实施例中,所述装置还包括:Further optionally, in the embodiment of the present invention, the device further includes:

发送模块55,用于当所述验证模块54验证到所述指纹信息不合法时,发送用于提示所述指纹信息验证失败的提示消息。The sending module 55 is configured to send a prompt message for prompting that the verification of the fingerprint information fails when the verification module 54 verifies that the fingerprint information is invalid.

本发明实施例可通过接收用于请求对明文文件数据进行加密处理的加密请求,其中,所述加密请求包括:指纹信息和标识信息,并为接收到的所述加密请求中的标识信息配置相应的权限;获取明文文件数据,根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置,这样提升文件数据的安全性和对文件数据处理的方便快捷性。In this embodiment of the present invention, an encryption request for encrypting plaintext file data may be received, wherein the encryption request includes: fingerprint information and identification information, and corresponding configuration information is configured for the identification information in the received encryption request. Obtain the plaintext file data, encrypt the obtained plaintext file data according to the fingerprint information, and perform corresponding permission settings on the encrypted plaintext file according to the permissions configured for the identification information, so that Improve the security of file data and the convenience and speed of file data processing.

本发明实施例中涉及的各个模块、单元的具体实现可参考图1至图2对象实施例中相关功能模块的描述,在此不赘述。For the specific implementation of each module and unit involved in the embodiment of the present invention, reference may be made to the description of the relevant functional modules in the object embodiment in FIG. 1 to FIG. 2 , and details are not repeated here.

请参见图7,是本发明实施例的一种文件数据解密处理装置的结构示意图,本发明实施例的所述装置可以可设置在诸如智能手机、平板电脑、智能可穿戴设备等带通信网络功能的终端中,所述装置7包括:Please refer to FIG. 7, which is a schematic structural diagram of a file data decryption processing device according to an embodiment of the present invention. The device according to the embodiment of the present invention can be installed on devices with communication network functions such as smart phones, tablet computers, and smart wearable devices. In the terminal, the device 7 includes:

接收模块70,用于接收用于请求对密文文件数据解密处理的解密请求;其中,所述解密请求包括:指纹信息和标识信息;其中,所述指纹信息与所述标识信息相对应;The receiving module 70 is configured to receive a decryption request for requesting decryption processing of ciphertext file data; wherein, the decryption request includes: fingerprint information and identification information; wherein, the fingerprint information corresponds to the identification information;

验证模块71,用于验证所述接收模块70接收到的所述解密请求中的标识信息是否配置有相应的权限;A verification module 71, configured to verify whether the identification information in the decryption request received by the receiving module 70 is configured with corresponding permissions;

获取模块72,用于若所述验证模块71验证到所述标识信息配置有相应的权限,则获取密文文件数据;The obtaining module 72 is used to obtain the ciphertext file data if the verification module 71 verifies that the identification information is configured with corresponding permissions;

处理模块73,用于根据所述指纹信息对所述获取模块72获取到的所述密文文件数据进行解密处理,并根据所述标识信息配置的权限对解密处理之后的密文文件进行相应的权限设置。The processing module 73 is configured to decrypt the ciphertext file data acquired by the acquisition module 72 according to the fingerprint information, and perform corresponding decryption processing on the ciphertext file after decryption according to the authority configured by the identification information. Permission settings.

本发明实施例可通过接收用于请求对密文文件数据解密处理的解密请求;其中,所述解密请求包括:指纹信息和标识信息,所述指纹信息与所述标识信息相对应,并验证接收到的所述解密请求中的标识信息是否配置有相应的权限;若验证到所述标识信息配置有相应的权限,则获取密文文件数据,根据所述指纹信息对获取到的所述密文文件数据进行解密处理,并根据所述标识信息配置的权限对解密处理之后的密文文件进行相应的权限设置,这样提升了文件数据的安全性和对文件数据处理的方便快捷性。In the embodiment of the present invention, a decryption request for requesting decryption processing of ciphertext file data may be received; wherein, the decryption request includes: fingerprint information and identification information, the fingerprint information corresponds to the identification information, and verification is received Whether the identification information in the obtained decryption request is configured with the corresponding authority; if it is verified that the identification information is configured with the corresponding authority, then the ciphertext file data is obtained, and the obtained ciphertext is processed according to the fingerprint information The file data is decrypted, and corresponding permissions are set for the decrypted ciphertext file according to the permissions configured by the identification information, which improves the security of the file data and the convenience and quickness of file data processing.

本发明实施例中涉及的各个模块、单元的具体实现可参考图3至图4对象实施例中相关功能模块的描述,在此不赘述。For the specific implementation of each module and unit involved in the embodiment of the present invention, reference may be made to the description of the relevant functional modules in the embodiments shown in FIG. 3 to FIG. 4 , and details are not repeated here.

请参见图8,是本发明实施例的另一种文件数据解密处理装置的结构示意图,本发明实施例的所述装置可以可设置在诸如智能手机、平板电脑、智能可穿戴设备等带通信网络功能的终端中,所述装置8包括上述实施例中的接收模块70、验证模块71、获取模块72以及处理模块73。Please refer to FIG. 8, which is a schematic structural diagram of another file data decryption processing device according to an embodiment of the present invention. The device according to this embodiment of the present invention can be installed in a communication network such as a smart phone, a tablet computer, or a smart wearable device. In the terminal with functions, the device 8 includes the receiving module 70 , the verification module 71 , the acquisition module 72 and the processing module 73 in the above embodiments.

进一步可选地,在本发明实施例中,Further optionally, in the embodiment of the present invention,

所述处理模块73,具体用于当所述标识信息配置的权限为只读权限时,根据所述指纹信息对所述密文文件数据进行解密处理,并根据所述只读权限对解密处理之后的密文文件进行相应的只读权限设置;或者,The processing module 73 is specifically configured to decrypt the ciphertext file data according to the fingerprint information when the authority configured by the identification information is a read-only authority, and decrypt the ciphertext file data according to the read-only authority. Set the corresponding read-only permission for the ciphertext file; or,

所述处理模块73,具体用于当所述标识信息配置的权限为读写权限时,根据所述指纹信息对所述密文文件数据进行解密处理,并根据所述读写权限对解密处理之后的密文文件进行相应的读写权限设置。The processing module 73 is specifically configured to decrypt the ciphertext file data according to the fingerprint information when the authority configured by the identification information is read-write authority, and decrypt the data after decryption according to the read-write authority. Set the corresponding read and write permissions for the ciphertext file.

进一步可选地,在本发明实施例中,所述装置还包括:Further optionally, in the embodiment of the present invention, the device further includes:

发送模块74,用于当所述验证模块71验证到所述标识信息没有配置相应的权限时,发送用于提示所述解密请求错误的提示消息。The sending module 74 is configured to send a prompt message for prompting that the decryption request is wrong when the verification module 71 verifies that the identification information is not configured with a corresponding authority.

本发明实施例可通过接收用于请求对密文文件数据解密处理的解密请求;其中,所述解密请求包括:指纹信息和标识信息,所述指纹信息与所述标识信息相对应,并验证接收到的所述解密请求中的标识信息是否配置有相应的权限;若验证到所述标识信息配置有相应的权限,则获取密文文件数据,根据所述指纹信息对获取到的所述密文文件数据进行解密处理,并根据所述标识信息配置的权限对解密处理之后的密文文件进行相应的权限设置,这样提升了文件数据的安全性和对文件数据处理的方便快捷性。In the embodiment of the present invention, a decryption request for requesting decryption processing of ciphertext file data may be received; wherein, the decryption request includes: fingerprint information and identification information, the fingerprint information corresponds to the identification information, and verification is received Whether the identification information in the obtained decryption request is configured with the corresponding authority; if it is verified that the identification information is configured with the corresponding authority, then the ciphertext file data is obtained, and the obtained ciphertext is processed according to the fingerprint information The file data is decrypted, and corresponding permissions are set for the decrypted ciphertext file according to the permissions configured by the identification information, which improves the security of the file data and the convenience and quickness of file data processing.

本发明实施例中涉及的各个模块、单元的具体实现可参考图3至图4对象实施例中相关功能模块的描述,在此不赘述。For the specific implementation of each module and unit involved in the embodiment of the present invention, reference may be made to the description of the relevant functional modules in the embodiments shown in FIG. 3 to FIG. 4 , and details are not repeated here.

再请参见图9,是本发明实施例的一种终端的结构示意图。所述终端可以为智能手机、平板电脑、智能可穿戴设备等带通信网络功能的设备,如图9所示,本发明实施例的所述终端可以包括显示屏、按键、扬声器、拾音器等模块,并且还包括:至少一个总线901、与总线901相连的至少一个处理器902以及与总线901相连的至少一个存储器903,实现通信功能的通信装置905,为通信终端各耗电模块供电的电源装置904。Referring to FIG. 9 again, it is a schematic structural diagram of a terminal according to an embodiment of the present invention. The terminal may be a device with a communication network function such as a smartphone, a tablet computer, or a smart wearable device. As shown in FIG. 9, the terminal in the embodiment of the present invention may include modules such as a display screen, buttons, speakers, and a pickup And also includes: at least one bus 901, at least one processor 902 connected to the bus 901, at least one memory 903 connected to the bus 901, a communication device 905 for realizing communication functions, and a power supply device 904 for supplying power to each power consumption module of the communication terminal .

所述处理器902可通过总线901,调用存储器903中存储的代码以执行相关的功能。The processor 902 can call codes stored in the memory 903 through the bus 901 to execute related functions.

所述处理器902,用于接收用于请求对明文文件数据进行加密处理的加密请求;其中,所述加密请求包括:指纹信息和标识信息;为接收到的所述加密请求中的标识信息配置相应的权限;获取明文文件数据;根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置。The processor 902 is configured to receive an encryption request for requesting encryption processing of plaintext file data; wherein, the encryption request includes: fingerprint information and identification information; configure the identification information in the received encryption request Corresponding permissions; obtaining plaintext file data; encrypting the obtained plaintext file data according to the fingerprint information, and setting corresponding permissions for the encrypted plaintext file according to the permissions configured for the identification information.

进一步可选地,所述处理器902还可以用于验证接收到的所述加密请求中的指纹信息是否合法;若验证到所述指纹信息合法,则执行所述根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置。Further optionally, the processor 902 may also be configured to verify whether the fingerprint information in the received encryption request is legal; Encrypt the plaintext file data, and set corresponding permissions for the encrypted plaintext file according to the permissions configured for the identification information.

进一步可选地,所述处理器902还可以用于当为所述标识信息配置的权限为只读权限时,根据所述指纹信息对所述明文文件数据进行加密处理,并根据所述只读权限对加密处理之后的明文文件进行相应的只读权限设置;或者,当为所述标识信息配置的权限为读写权限时,根据所述指纹信息对所述明文文件数据进行加密处理,并根据所述读写权限对加密处理之后的明文文件进行相应的读写权限设置。Further optionally, the processor 902 may also be configured to encrypt the plaintext file data according to the fingerprint information when the permission configured for the identification information is a read-only permission, and encrypt the plaintext file data according to the read-only permission. Permission to set the corresponding read-only permission for the encrypted plaintext file; or, when the permission configured for the identification information is read and write permission, encrypt the plaintext file data according to the fingerprint information, and according to The read and write permissions set corresponding read and write permissions for the encrypted plaintext file.

进一步可选地,所述处理器902还可以用于当验证到所述指纹信息不合法时,发送用于提示所述指纹信息验证失败的提示消息。Further optionally, the processor 902 may also be configured to, when it is verified that the fingerprint information is invalid, send a prompt message for prompting that the verification of the fingerprint information fails.

本发明实施例可通过接收用于请求对明文文件数据进行加密处理的加密请求,其中,所述加密请求包括:指纹信息和标识信息,并为接收到的所述加密请求中的标识信息配置相应的权限;获取明文文件数据,根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置,这样提升文件数据的安全性和对文件数据处理的方便快捷性。In this embodiment of the present invention, an encryption request for encrypting plaintext file data may be received, wherein the encryption request includes: fingerprint information and identification information, and corresponding configuration information is configured for the identification information in the received encryption request. Obtain the plaintext file data, encrypt the obtained plaintext file data according to the fingerprint information, and perform corresponding permission settings on the encrypted plaintext file according to the permissions configured for the identification information, so that Improve the security of file data and the convenience and speed of file data processing.

再请参见图10,是本发明实施例的一种终端的结构示意图。所述终端可以为智能手机、平板电脑、智能可穿戴设备等带通信网络功能的设备,如图10所示,本发明实施例的所述终端可以包括显示屏、按键、扬声器、拾音器等模块,并且还包括:输入装置100、输出装置101、存储器102和处理器103(网络设备中的处理器103的数量可以是一个或多个,图10中以一个处理器为例)。本发明的一些实施例中,输入装置100、输出装置101、存储器102和处理器103可以通过总线或其他方式连接,其中,图10中以通过总线连接为例。Referring to FIG. 10 again, it is a schematic structural diagram of a terminal according to an embodiment of the present invention. The terminal may be a device with a communication network function such as a smart phone, a tablet computer, or a smart wearable device. As shown in FIG. It also includes: an input device 100, an output device 101, a memory 102 and a processor 103 (the number of processors 103 in the network device may be one or more, one processor is taken as an example in FIG. 10 ). In some embodiments of the present invention, the input device 100 , the output device 101 , the memory 102 and the processor 103 may be connected via a bus or in other ways, wherein connection via a bus is taken as an example in FIG. 10 .

其中,所述处理器103可以用于调用存储器102中存储的数据更新程序,并执行如下步骤:Wherein, the processor 103 can be used to call the data update program stored in the memory 102, and perform the following steps:

接收用于请求对密文文件数据解密处理的解密请求;其中,所述解密请求包括:指纹信息和标识信息,所述指纹信息与所述标识信息相对应;Receiving a decryption request for requesting decryption processing of ciphertext file data; wherein, the decryption request includes: fingerprint information and identification information, and the fingerprint information corresponds to the identification information;

验证接收到的所述解密请求中的标识信息是否配置有相应的权限;Verifying whether the identification information in the received decryption request is configured with corresponding permissions;

若验证到所述标识信息配置有相应的权限,则获取密文文件数据;If it is verified that the identification information is configured with corresponding permissions, then obtain the ciphertext file data;

根据所述指纹信息对获取到的所述密文文件数据进行解密处理,并根据所述标识信息配置的权限对解密处理之后的密文文件进行相应的权限设置。Decrypt the obtained ciphertext file data according to the fingerprint information, and perform corresponding permission setting on the decrypted ciphertext file according to the permission configured by the identification information.

本发明实施例中,处理器103可以用于调用存储器102中存储的数据更新程序,还可以执行如下步骤:In the embodiment of the present invention, the processor 103 can be used to call the data update program stored in the memory 102, and can also perform the following steps:

当所述标识信息配置的权限为只读权限时,根据所述指纹信息对所述密文文件数据进行解密处理,并根据所述只读权限对解密处理之后的密文文件进行相应的只读权限设置;或者,When the authority configured by the identification information is the read-only authority, decrypt the ciphertext file data according to the fingerprint information, and perform corresponding read-only on the decrypted ciphertext file according to the read-only authority permission settings; or,

当所述标识信息配置的权限为读写权限时,根据所述指纹信息对所述密文文件数据进行解密处理,并根据所述读写权限对解密处理之后的密文文件进行相应的读写权限设置。When the authority configured by the identification information is read-write authority, decrypt the ciphertext file data according to the fingerprint information, and perform corresponding read-write on the decrypted ciphertext file according to the read-write authority Permission settings.

本发明实施例中,处理器103可以用于调用存储器102中存储的数据更新程序,还可以执行如下步骤:In the embodiment of the present invention, the processor 103 can be used to call the data update program stored in the memory 102, and can also perform the following steps:

当验证到所述标识信息没有配置相应的权限时,发送用于提示所述解密请求错误的提示消息。When it is verified that the identification information is not configured with a corresponding authority, a prompt message for prompting that the decryption request is wrong is sent.

本发明实施例可通过接收用于请求对密文文件数据解密处理的解密请求;其中,所述解密请求包括:指纹信息和标识信息,所述指纹信息与所述标识信息相对应,并验证接收到的所述解密请求中的标识信息是否配置有相应的权限;若验证到所述标识信息配置有相应的权限,则获取密文文件数据,根据所述指纹信息对获取到的所述密文文件数据进行解密处理,并根据所述标识信息配置的权限对解密处理之后的密文文件进行相应的权限设置,这样提升了文件数据的安全性和对文件数据处理的方便快捷性。In the embodiment of the present invention, a decryption request for requesting decryption processing of ciphertext file data may be received; wherein, the decryption request includes: fingerprint information and identification information, the fingerprint information corresponds to the identification information, and verification is received Whether the identification information in the obtained decryption request is configured with the corresponding authority; if it is verified that the identification information is configured with the corresponding authority, then the ciphertext file data is obtained, and the obtained ciphertext is processed according to the fingerprint information The file data is decrypted, and corresponding permissions are set for the decrypted ciphertext file according to the permissions configured by the identification information, which improves the security of the file data and the convenience and quickness of file data processing.

本发明实施例还提供一种计算机存储介质,其中,该计算机存储介质可存储有程序,该程序执行时包括上述方法实施例中记载的任何音频播放应用的操作方法的部分或全部步骤。An embodiment of the present invention also provides a computer storage medium, wherein the computer storage medium can store a program, and the program includes some or all steps of any audio playback application operation method described in the above method embodiments when executed.

需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本发明所必须的。It should be noted that for the foregoing method embodiments, for the sake of simple description, they are expressed as a series of action combinations, but those skilled in the art should know that the present invention is not limited by the described action sequence. Because of the present invention, certain steps may be performed in other orders or simultaneously. Secondly, those skilled in the art should also know that the embodiments described in the specification belong to preferred embodiments, and the actions and modules involved are not necessarily required by the present invention.

在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the foregoing embodiments, the descriptions of each embodiment have their own emphases, and for parts not described in detail in a certain embodiment, reference may be made to relevant descriptions of other embodiments.

在本申请所提供的几个实施例中,应该理解到,所揭露的装置,可通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed device can be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components can be combined or can be Integrate into another system, or some features may be ignored, or not implemented. In another point, the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical or other forms.

所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.

另外,在本发明的各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit. The above-mentioned integrated units can be implemented in the form of hardware or in the form of software functional units.

所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可为个人计算机、服务器或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、只读存储器(ROM,Read-OnlyMemory)、随机存取存储器(RAM,RandomAccessMemory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is realized in the form of a software function unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, the essence of the technical solution of the present invention or the part that contributes to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in various embodiments of the present invention. The aforementioned storage medium includes: various media capable of storing program codes such as U disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk or optical disk.

以上所述,以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的范围。As mentioned above, the above embodiments are only used to illustrate the technical solutions of the present invention, rather than to limit them; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: it can still understand the foregoing The technical solutions recorded in each embodiment are modified, or some of the technical features are replaced equivalently; and these modifications or replacements do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (15)

Translated fromChinese
1.一种文件数据加密处理的方法,其特征在于,所述方法包括:1. A method for file data encryption processing, characterized in that the method comprises:接收用于请求对明文文件数据进行加密处理的加密请求;其中,所述加密请求包括:指纹信息和标识信息;receiving an encryption request for requesting encryption of plaintext file data; wherein, the encryption request includes: fingerprint information and identification information;为接收到的所述加密请求中的标识信息配置相应的权限;Configuring corresponding permissions for the identification information in the received encryption request;获取明文文件数据;Obtain plaintext file data;根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置。Encrypting the acquired plaintext file data according to the fingerprint information, and setting corresponding permissions on the encrypted plaintext file according to the permissions configured for the identification information.2.如权利要求1所述的方法,其特征在于,所述根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置之前,包括:2. The method according to claim 1, wherein the obtained plaintext file data is encrypted according to the fingerprint information, and the encrypted file is encrypted according to the authority configured for the identification information. Before the corresponding permissions are set for the plaintext file, it includes:验证接收到的所述加密请求中的指纹信息是否合法;Verifying whether the fingerprint information in the received encryption request is legal;若验证到所述指纹信息合法,则执行所述根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置。If it is verified that the fingerprint information is legal, perform the encryption process on the obtained plaintext file data according to the fingerprint information, and perform corresponding encryption on the encrypted plaintext file according to the authority configured for the identification information. Local permission settings.3.如权利要求1所述的方法,其特征在于,所述根据所述指纹信息对获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置,包括:3. The method according to claim 1, wherein the obtained plaintext file data is encrypted according to the fingerprint information, and the encrypted file is encrypted according to the authority configured for the identification information. Clear text files should be set correspondingly, including:当为所述标识信息配置的权限为只读权限时,根据所述指纹信息对所述明文文件数据进行加密处理,并根据所述只读权限对加密处理之后的明文文件进行相应的只读权限设置;或者,When the permission configured for the identification information is read-only permission, encrypt the plaintext file data according to the fingerprint information, and perform corresponding read-only permission on the encrypted plaintext file according to the read-only permission setting; or,当为所述标识信息配置的权限为读写权限时,根据所述指纹信息对所述明文文件数据进行加密处理,并根据所述读写权限对加密处理之后的明文文件进行相应的读写权限设置。When the permissions configured for the identification information are read and write permissions, encrypt the plaintext file data according to the fingerprint information, and perform corresponding read and write permissions on the encrypted plaintext files according to the read and write permissions set up.4.如权利要求2所述的方法,其特征在于,所述方法还包括:4. The method of claim 2, further comprising:当验证到所述指纹信息不合法时,发送用于提示所述指纹信息验证失败的提示消息。When it is verified that the fingerprint information is invalid, a prompt message for prompting that the fingerprint information verification fails is sent.5.一种文件数据解密处理的方法,其特征在于,所述方法包括:5. A method for file data decryption processing, characterized in that the method comprises:接收用于请求对密文文件数据解密处理的解密请求;其中,所述解密请求包括:指纹信息和标识信息,所述指纹信息与所述标识信息相对应;Receiving a decryption request for requesting decryption processing of ciphertext file data; wherein, the decryption request includes: fingerprint information and identification information, and the fingerprint information corresponds to the identification information;验证接收到的所述解密请求中的标识信息是否配置有相应的权限;Verifying whether the identification information in the received decryption request is configured with corresponding permissions;若验证到所述标识信息配置有相应的权限,则获取密文文件数据;If it is verified that the identification information is configured with corresponding permissions, then obtain the ciphertext file data;根据所述指纹信息对获取到的所述密文文件数据进行解密处理,并根据所述标识信息配置的权限对解密处理之后的密文文件进行相应的权限设置。Decrypt the obtained ciphertext file data according to the fingerprint information, and perform corresponding permission setting on the decrypted ciphertext file according to the permission configured by the identification information.6.如权利要求5所述的方法,其特征在于,所述根据所述指纹信息对获取到的所述密文文件数据进行解密处理,并根据所述标识信息配置的权限对解密处理之后的密文文件进行相应的权限设置,包括:6. The method according to claim 5, wherein the obtained encrypted file data is decrypted according to the fingerprint information, and the decrypted file is decrypted according to the authority configured by the identification information. The ciphertext file should be set with corresponding permissions, including:当所述标识信息配置的权限为只读权限时,根据所述指纹信息对所述密文文件数据进行解密处理,并根据所述只读权限对解密处理之后的密文文件进行相应的只读权限设置;或者,When the authority configured by the identification information is the read-only authority, decrypt the ciphertext file data according to the fingerprint information, and perform corresponding read-only on the decrypted ciphertext file according to the read-only authority permission settings; or,当所述标识信息配置的权限为读写权限时,根据所述指纹信息对所述密文文件数据进行解密处理,并根据所述读写权限对解密处理之后的密文文件进行相应的读写权限设置。When the authority configured by the identification information is read-write authority, decrypt the ciphertext file data according to the fingerprint information, and perform corresponding read-write on the decrypted ciphertext file according to the read-write authority Permission settings.7.如权利要求5所述的方法,其特征在于,所述方法还包括:7. The method of claim 5, further comprising:当验证到所述标识信息没有配置相应的权限时,发送用于提示所述解密请求错误的提示消息。When it is verified that the identification information is not configured with a corresponding authority, a prompt message for prompting that the decryption request is wrong is sent.8.一种文件数据加密处理的装置,其特征在于,所述装置包括:8. A device for file data encryption processing, characterized in that the device comprises:接收模块,用于接收用于请求对明文文件数据进行加密处理的加密请求;其中,所述加密请求包括:指纹信息和标识信息;The receiving module is configured to receive an encryption request for requesting encryption processing of plaintext file data; wherein, the encryption request includes: fingerprint information and identification information;配置模块,用于为所述接收模块接收到的所述加密请求中的标识信息配置相应的权限;a configuration module, configured to configure corresponding permissions for the identification information in the encryption request received by the receiving module;获取模块,用于获取明文文件数据;The acquisition module is used to acquire plaintext file data;处理模块,用于根据所述指纹信息对所述获取模块获取到的所述明文文件数据进行加密处理,并根据为所述标识信息配置的权限对加密处理之后的明文文件进行相应地权限设置。A processing module, configured to encrypt the plaintext file data obtained by the acquisition module according to the fingerprint information, and set corresponding permissions for the encrypted plaintext file according to the permissions configured for the identification information.9.如权利要求8所述的装置,其特征在于,所述装置还包括:9. The device of claim 8, further comprising:验证模块,用于验证所述接收模块接收到的所述加密请求中的指纹信息是否合法;若所述验证模块验证到所述指纹信息合法,则通知所述处理模块。A verification module, configured to verify whether the fingerprint information in the encryption request received by the receiving module is legal; if the verification module verifies that the fingerprint information is legal, then notify the processing module.10.如权利要求8所述的装置,其特征在于,10. The apparatus of claim 8, wherein所述处理模块,具体用于当所述配置模块为所述标识信息配置的权限为只读权限时,根据所述指纹信息对所述明文文件数据进行加密处理,并根据所述只读权限对加密处理之后的明文文件进行相应的只读权限设置;或者,The processing module is specifically configured to, when the authority configured by the configuration module for the identification information is read-only authority, encrypt the plaintext file data according to the fingerprint information, and encrypt the plaintext file data according to the read-only authority Set the corresponding read-only permission for the encrypted plaintext file; or,所述处理模块,具体用于当所述配置模块为所述标识信息配置的权限为读写权限时,根据所述指纹信息对所述明文文件数据进行加密处理,并根据所述读写权限对加密处理之后的明文文件进行相应的读写权限设置。The processing module is specifically configured to encrypt the plaintext file data according to the fingerprint information when the permission configured by the configuration module for the identification information is read-write permission, and encrypt the plaintext file data according to the read-write permission. The encrypted plaintext files should be set with corresponding read and write permissions.11.如权利要求9所述的装置,其特征在于,所述装置还包括:11. The device of claim 9, further comprising:发送模块,用于当所述验证模块验证到所述指纹信息不合法时,发送用于提示所述指纹信息验证失败的提示消息。A sending module, configured to send a prompt message for prompting that the verification of the fingerprint information fails when the verification module verifies that the fingerprint information is invalid.12.一种文件数据解密处理的装置,其特征在于,所述装置包括:12. A device for file data decryption processing, characterized in that the device comprises:接收模块,用于接收用于请求对密文文件数据解密处理的解密请求;其中,所述解密请求包括:指纹信息和标识信息,所述指纹信息与所述标识信息相对应;A receiving module, configured to receive a decryption request for requesting decryption processing of ciphertext file data; wherein, the decryption request includes: fingerprint information and identification information, and the fingerprint information corresponds to the identification information;验证模块,用于验证所述接收模块接收到的所述解密请求中的标识信息是否配置有相应的权限;A verification module, configured to verify whether the identification information in the decryption request received by the receiving module is configured with corresponding permissions;获取模块,用于若所述验证模块验证到所述标识信息配置有相应的权限,则获取密文文件数据;An acquisition module, configured to acquire ciphertext file data if the verification module verifies that the identification information is configured with corresponding permissions;处理模块,用于根据所述指纹信息对所述获取模块获取到的所述密文文件数据进行解密处理,并根据所述标识信息配置的权限对解密处理之后的密文文件进行相应的权限设置。A processing module, configured to decrypt the ciphertext file data obtained by the acquisition module according to the fingerprint information, and perform corresponding permission setting on the ciphertext file after the decryption processing according to the permission configured by the identification information .13.如权利要求12所述的装置,其特征在于,13. The apparatus of claim 12, wherein所述处理模块,具体用于当所述标识信息配置的权限为只读权限时,根据所述指纹信息对所述密文文件数据进行解密处理,并根据所述只读权限对解密处理之后的密文文件进行相应的只读权限设置;或者,The processing module is specifically configured to decrypt the ciphertext file data according to the fingerprint information when the permission configured by the identification information is a read-only permission, and decrypt the decrypted data according to the read-only permission. Set the corresponding read-only permission for the ciphertext file; or,所述处理模块,具体用于当所述标识信息配置的权限为读写权限时,根据所述指纹信息对所述密文文件数据进行解密处理,并根据所述读写权限对解密处理之后的密文文件进行相应的读写权限设置。The processing module is specifically configured to decrypt the ciphertext file data according to the fingerprint information when the permission configured by the identification information is the read-write permission, and decrypt the decrypted data according to the read-write permission. Set the corresponding read and write permissions for the ciphertext file.14.如权利要求12所述的装置,其特征在于,所述装置还包括:14. The device of claim 12, further comprising:发送模块,用于当所述验证模块验证到所述标识信息没有配置相应的权限时,发送用于提示所述解密请求错误的提示消息。A sending module, configured to send a prompt message for prompting an error in the decryption request when the verification module verifies that the identification information is not configured with a corresponding authority.15.一种终端,其特征在于,所述终端包括如权利要求8至11所述的文件数据加密处理装置;或者,所述终端包括如权利要求12至14所述的文件数据解密处理装置。15. A terminal, characterized in that the terminal comprises the file data encryption processing device according to claims 8 to 11; or, the terminal comprises the file data decryption processing device according to claims 12 to 14.
CN201510863241.3A2015-11-302015-11-30 Method, device and terminal for file data encryption and decryption processingPendingCN105574429A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201510863241.3ACN105574429A (en)2015-11-302015-11-30 Method, device and terminal for file data encryption and decryption processing

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201510863241.3ACN105574429A (en)2015-11-302015-11-30 Method, device and terminal for file data encryption and decryption processing

Publications (1)

Publication NumberPublication Date
CN105574429Atrue CN105574429A (en)2016-05-11

Family

ID=55884543

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201510863241.3APendingCN105574429A (en)2015-11-302015-11-30 Method, device and terminal for file data encryption and decryption processing

Country Status (1)

CountryLink
CN (1)CN105574429A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106992976A (en)*2017-03-242017-07-28联想(北京)有限公司Network safety managing method and server
CN107276884A (en)*2017-08-212017-10-20江苏北弓智能科技有限公司A kind of autonomous encrypting and deciphering system of social software based on intelligent terminal
WO2019036972A1 (en)*2017-08-232019-02-28深圳市优品壹电子有限公司Data backup method and device
CN110336658A (en)*2019-07-012019-10-15武汉能钠智能装备技术股份有限公司Encryption method, user equipment, storage medium and device based on aes algorithm

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101729550A (en)*2009-11-092010-06-09西北大学Digital content safeguard system based on transparent encryption and decryption method thereof
CN101727561A (en)*2009-12-042010-06-09强敏File security management system and file security management method
CN102426637A (en)*2011-11-012012-04-25北京人大金仓信息技术股份有限公司Encryption storage method for embedded database

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101729550A (en)*2009-11-092010-06-09西北大学Digital content safeguard system based on transparent encryption and decryption method thereof
CN101727561A (en)*2009-12-042010-06-09强敏File security management system and file security management method
CN102426637A (en)*2011-11-012012-04-25北京人大金仓信息技术股份有限公司Encryption storage method for embedded database

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106992976A (en)*2017-03-242017-07-28联想(北京)有限公司Network safety managing method and server
CN106992976B (en)*2017-03-242020-08-25联想(北京)有限公司Network security management method and server
CN107276884A (en)*2017-08-212017-10-20江苏北弓智能科技有限公司A kind of autonomous encrypting and deciphering system of social software based on intelligent terminal
WO2019036972A1 (en)*2017-08-232019-02-28深圳市优品壹电子有限公司Data backup method and device
CN110336658A (en)*2019-07-012019-10-15武汉能钠智能装备技术股份有限公司Encryption method, user equipment, storage medium and device based on aes algorithm

Similar Documents

PublicationPublication DateTitle
CN112771826B (en) Application program registration method, application program registration device and mobile terminal
CN104092550B (en)Cipher code protection method, system and device
US10027660B2 (en)Computer program, method, and system for secure data management
KR20210046357A (en)Method and apparatus for key storing and recovery for blockchain based system
CN105005731A (en) A data encryption and decryption method and mobile terminal
CN104657674A (en)Isolation protection system and isolation protection method of private data in mobile phone
CN109922027B (en)Credible identity authentication method, terminal and storage medium
WO2013182154A1 (en)Method, system and terminal for encrypting/decrypting application program on communication terminal
CN112636914B (en)Identity verification method, identity verification device and smart card
CN104994098B (en)Document transmission method and relevant apparatus and Transmission system
WO2013178154A1 (en)Method for implementing encryption in storage card, and decryption method and device
WO2016192165A1 (en)Data encryption method and apparatus
US10541819B2 (en)Forged command filtering system and related command authentication circuit
CN108898005A (en)A kind of hard disk knows method for distinguishing, system, equipment and computer readable storage medium
CN103152157A (en) A kind of security secret protection method and related device
JP6397046B2 (en) Address book protection method, apparatus and communication system
CN114329541A (en) Data encryption method, device, device and storage medium
CN107707562B (en) A method and device for asymmetric dynamic token encryption and decryption algorithm
WO2023065772A1 (en)Log data processing method and apparatus, storage medium, and electronic device
JP6172866B2 (en) Agent for providing security cloud service and security key device for security cloud service
CN105069365A (en)Data processing method and mobile terminal
CN105574429A (en) Method, device and terminal for file data encryption and decryption processing
CN114386104A (en) A method for storing sensitive data, data reading method and device
CN104915583A (en)Interface decryption processing method and mobile terminal
WO2015168878A1 (en)Payment method and device and payment factor processing method and device

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20160511


[8]ページ先頭

©2009-2025 Movatter.jp