Movatterモバイル変換


[0]ホーム

URL:


CN108563959A - File encrypting method, device and computer storage media - Google Patents

File encrypting method, device and computer storage media
Download PDF

Info

Publication number
CN108563959A
CN108563959ACN201810377783.3ACN201810377783ACN108563959ACN 108563959 ACN108563959 ACN 108563959ACN 201810377783 ACN201810377783 ACN 201810377783ACN 108563959 ACN108563959 ACN 108563959A
Authority
CN
China
Prior art keywords
file
sequence
user
image
subject image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810377783.3A
Other languages
Chinese (zh)
Inventor
蔡克虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co LtdfiledCriticalNubia Technology Co Ltd
Priority to CN201810377783.3ApriorityCriticalpatent/CN108563959A/en
Publication of CN108563959ApublicationCriticalpatent/CN108563959A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses a kind of file encrypting methods, include the following steps:Receive the CIPHERING REQUEST triggered based on file;Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formed into initial image set;It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show the pre-set text frame of the secret grade corresponding number;The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input in the pre-set text frame and forms the corresponding standard cipher sequence of the secret grade;Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.The invention also discloses a kind of document encrypting apparatus and computer storage medias.The present invention improves encrypted interesting and convenience by way of image encryption.

Description

File encrypting method, device and computer storage media
Technical field
The present invention relates to data processing field more particularly to file encrypting method, device and computer storage medias.
Background technology
With the raising of terminal intelligent degree, the increase of memory capacity, people increasingly like by some private datas withThe form of file preserves in the terminal.In order to protect the privacy of user, that is, ensure the safety of the file stored in terminal, to fileThe processing such as being encrypted, decrypt seems increasingly important.
The prior art is in the principle to file encryption:Judge whether user has text by verifying information input by userThe operating right of part, that is, most of existing file encryption is all to use encrypting fingerprint or digital encryption, such encryption sideFormula is more dull, in addition, digital encryption needs user to remember corresponding number, if the numerical ciphers of setting are long excessively complicatedIt may result in encrypted file and file decryption oprerations be also complex, and encrypting fingerprint can not carry out the transmission of file.Such asWhat real file is easily encrypted, and improves the interest of file encryption decryption, and effectively become to subscriber authenticationA technical problem to be solved urgently.
The above is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that the above is existing skillArt.
Invention content
A kind of file encrypting method of present invention offer, device and computer storage media, it is intended to improve file encryption decryptionInterest, realize the convenient encryption of file.
The present invention provides file encrypting method, and the file encrypting method includes:
Receive the CIPHERING REQUEST triggered based on file;
Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formedInitial image set;
It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;
Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show the secret gradeThe pre-set text frame of corresponding number;
The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input toThe corresponding standard cipher sequence of the secret grade is formed in the pre-set text frame;
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.
Optionally, described that the subject image element that initial pictures are concentrated is chosen based on user's operation, and by the target figurePixel element is input in the pre-set text frame the step of forming the secret grade corresponding standard cipher sequence, including:
The subject image element that initial pictures are concentrated is chosen based on user's operation, subject image element is input to default textIn this frame;
It determines that subject image element sorts according to the preset numbers of pre-set text frame, forms the corresponding mark of the secret gradeQuasi- keying sequence.
Optionally, described that standard cipher sequence and file are associated preservation, to complete the step of the cryptographic operation of fileAfter rapid, including:
The decoding request triggered based on file is received, the standard cipher sequence of file association is obtained, determines standard cipher sequenceThe subject image element for including in row;
The decrypted image set for including subject image element is chosen from pre-set image set, is received user and is based on decryption figureImage set closes the decrypted image sequence chosen;
Decrypted image sequence is compared with standard sequence image;
If decrypted image sequence is matched with standard sequence image, judges that user has operating right, carry out file decryption.
Optionally, described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, is determinedAfter the step of subject image element for including in standard cipher sequence, including:
Determine subject image element number, generate the prompt message for including subject image element number, with prompt user intoRow decryption oprerations.
Optionally, after described the step of decrypted image sequence is compared with standard sequence image, including:
If decrypted image sequence is mismatched with standard sequence image, judge that user does not have operating right, and prompt to useFamily carries out the secondary decryption oprerations of file;
The decryption number of statistics file locks file if file decryption number is more than predetermined threshold value.
Optionally, the decryption number of the statistics file carries out file if file decryption number is more than predetermined threshold valueAfter the step of locking, including:
Authentication request is received, the subscriber identity information for including in authentication request is obtained;
Subscriber identity information is compared with pre-stored criteria identity information, if subscriber identity information and pre-stored criteria identityInformation matches then release file locking and carry out file decryption.
Optionally, described that the subject image element that initial pictures are concentrated is chosen based on user's operation, and by the target figurePixel element was input in the pre-set text frame after the step of forming the secret grade corresponding standard cipher sequence, packetIt includes:
By the cryptographic Hash of default hash algorithm calculation document, using the cryptographic Hash being calculated as initial Hash value, and protectDeposit initial Hash value;
It is described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, determines that standard is closeThe step of subject image element for including in code sequence, including:
The decoding request triggered based on file is received, by the current cryptographic Hash of default hash algorithm calculation document;
Current cryptographic Hash is compared with initial Hash value;
If current cryptographic Hash is identical as initial Hash value, the standard cipher sequence of file association is obtained, determines that standard is closeThe subject image element for including in code sequence.
Optionally, described that pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and by each of selectionAfter pictorial element forms the step of initial image set, including:
Selecting frequency is higher than the pictorial element of preset value by the selecting frequency for counting each pictorial element in pre-set image setIt is marked.
In addition, to achieve the above object, the present invention also provides a kind of document encrypting apparatus;
The document encrypting apparatus includes:It memory, processor and is stored on the memory and can be in the processingThe file encryption program run on device, wherein:
It is realized such as the step of above-mentioned file encrypting method when the file encryption program is executed by the processor.
In addition, to achieve the above object, the present invention also provides a kind of computer storage medias;
File encryption program is stored on the computer storage media, when the file encryption program is executed by processorIt realizes such as the step of above-mentioned file encrypting method.
File encrypting method of the embodiment of the present invention, device and computer storage media specifically include user and are triggered in terminalCIPHERING REQUEST, terminal receive the CIPHERING REQUEST that is triggered based on file, terminal from the selection pictorial element in pre-set image set, andEach pictorial element of selection is formed into initial image set;Terminal shows initial image set on the screen, and generates encryption prompt letterBreath, to prompt user that setting is encrypted based on initial image set;Grade setting instruction is received, the grade setting instruction is obtainedIn secret grade, and show the pre-set text frame of the secret grade corresponding number;Initial pictures are chosen based on user's operationThe subject image element of concentration, and the subject image element is input in the pre-set text frame and forms the secret gradeCorresponding standard cipher sequence;Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.This hairIt is bright that different pictorial elements is applied into encrypting and decrypting processing so that file encryption is not that dull digital alphabet combines, and is madeMore interesting, the operation combined and facilitate user of sorting of image must be encrypted so that the encryption of file is more convenient, in addition,Different subject image element numbers can be arranged in user in the present invention compared with the encryptions such as existing data, by different targetsPictorial element the forms such as is arranged or is combined and forms standard cipher sequence so that the encryption of file is more intelligent.
Description of the drawings
A kind of Fig. 1 hardware architecture diagrams of terminal of each embodiment to realize the present invention;
Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of file encrypting method first embodiment of the present invention;
Fig. 4 is the flow diagram of file encrypting method second embodiment of the present invention;
Fig. 5 is the flow diagram of file encrypting method 3rd embodiment of the present invention;
Fig. 6 is the flow diagram of file encrypting method fourth embodiment of the present invention;
Fig. 7 is the concrete scene signal for decrypting file in file encrypting method second embodiment of the present invention by pictorial elementFigure;
Fig. 8 is that subscriber identity information is compared with pre-stored criteria identity information in file encrypting method 3rd embodiment of the present inventionConcrete scene schematic diagram.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, using for indicating that the suffix of such as " module ", " component " or " unit " of element is onlyThe explanation for being conducive to the present invention, itself does not have a specific meaning.Therefore, " module ", " component " or " unit " can mixGround uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, tabletComputer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portableThe shiftings such as media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometerThe fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to specialExcept element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware architecture diagram of its mobile terminal of each embodiment to realize the present invention, the shiftingMoving terminal 100 may include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram,Either combine certain components or different components arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base stationDownlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetratingFrequency unit 101 can also be communicated with network and other equipment by radio communication.Above-mentioned wireless communication can use any communicationStandard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunicationsSystem), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (CodeDivision Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code DivisionMultiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous CodeDivision Multiple Access, TD SDMA), FDD-LTE (Frequency DivisionDuplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time DivisionDuplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102Sub- mail, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 1 showsGo out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to needIt to be omitted in the range for the essence for not changing invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100When under the isotypes such as formula, speech recognition mode, broadcast reception mode, it is that radio frequency unit 101 or WiFi module 102 are received orThe audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103The relevant audio output of specific function executed with mobile terminal 100 can also be provided (for example, call signal receives sound, disappearsBreath receives sound etc.).Audio output unit 103 may include loud speaker, buzzer etc..
A/V input units 104 are for receiving audio or video signal.A/V input units 104 may include graphics processor(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition modeOr the image data of the static images or video obtained by image capture apparatus (such as camera) in image capture mode carries outReason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be depositedStorage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.MikeWind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data canTo be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case of telephone calling model.Microphone 1042 can implement various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition)The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographiesSensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environmentThe light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's earDisplay panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generalFor three axis) size of acceleration, size and the direction of gravity are can detect that when static, can be used to identify the application of mobile phone posture(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrapDisplay panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be usedForms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminalFamily is arranged and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 withAnd other input equipments 1072.Touch panel 1071, also referred to as touch screen collect user on it or neighbouring touch operation(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detectionTwo parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation bandThe signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by itIt is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, canTo realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrapIt includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc.It is one or more, do not limit herein specifically.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it orAfter neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thingThe type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel1061 be to realize the function that outputs and inputs of mobile terminal as two independent components, but in certain embodiments, canThe function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specificallyIt limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example,External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothingLine data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) endMouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, numberIt is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be withFor the transmission data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can include mainly storing program areaAnd storage data field, wherein storing program area can storage program area, application program (such as the sound needed at least one functionSound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such asAudio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include non-easyThe property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connectionA part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storageData in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.PlaceReason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediatedManage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is mainProcessing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
In addition, in terminal shown in Fig. 1, the text run on the processor 110 is stored on the memory 109Part encipheror, the terminal call the file encryption program stored in memory 109 by processor 110, and execute followingOperation:
Receive the CIPHERING REQUEST triggered based on file;
Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formedInitial image set;
It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;
Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show the secret gradeThe pre-set text frame of corresponding number;
The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input toThe corresponding standard cipher sequence of the secret grade is formed in the pre-set text frame;
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.
Further, the terminal calls the file encryption program stored in memory 109 by processor 110, with realityThe existing subject image element concentrated based on user's operation selection initial pictures, and the subject image element is input to instituteThe step of corresponding standard cipher sequence of the secret grade is formed in pre-set text frame is stated, including:
The subject image element that initial pictures are concentrated is chosen based on user's operation, subject image element is input to default textIn this frame;
It determines that subject image element sorts according to the preset numbers of pre-set text frame, forms the corresponding mark of the secret gradeQuasi- keying sequence.
Further, described standard cipher sequence and file are associated preservation, to complete the cryptographic operation of fileAfter step, the terminal calls the file encryption program stored in memory 109 by processor 110, to realize following stepSuddenly:
The decoding request triggered based on file is received, the standard cipher sequence of file association is obtained, determines standard cipher sequenceThe subject image element for including in row;
The decrypted image set for including subject image element is chosen from pre-set image set, is received user and is based on decryption figureImage set closes the decrypted image sequence chosen;
Decrypted image sequence is compared with standard sequence image;
If decrypted image sequence is matched with standard sequence image, judges that user has operating right, carry out file decryption.
Further, described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, reallyAfter the step of calibrating the subject image element for including in quasi- keying sequence, the terminal calls memory by processor 110The file encryption program stored in 109, to realize following steps:
Determine subject image element number, generate the prompt message for including subject image element number, with prompt user intoRow decryption oprerations.
Further, after described the step of decrypted image sequence is compared with standard sequence image, the terminalThe file encryption program stored in memory 109 is called by processor 110, to realize following steps:
If decrypted image sequence is mismatched with standard sequence image, judge that user does not have operating right, and prompt to useFamily carries out the secondary decryption oprerations of file;
The decryption number of statistics file locks file if file decryption number is more than predetermined threshold value.
Further, the decryption number of the statistics file, if file decryption number be more than predetermined threshold value, by file intoAfter line-locked step, the terminal calls the file encryption program stored in memory 109 by processor 110, with realityExisting following steps:
Authentication request is received, the subscriber identity information for including in authentication request is obtained;
Subscriber identity information is compared with pre-stored criteria identity information, if subscriber identity information and pre-stored criteria identityInformation matches then release file locking and carry out file decryption.
Further, described that the subject image element that initial pictures are concentrated is chosen based on user's operation, and by the targetPictorial element was input in the pre-set text frame after the step of forming the secret grade corresponding standard cipher sequence, instituteIt states terminal and the file encryption program stored in memory 109 is called by processor 110, to realize following steps:
By the cryptographic Hash of default hash algorithm calculation document, using the cryptographic Hash being calculated as initial Hash value, and protectDeposit initial Hash value;
It is described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, determines that standard is closeThe step of subject image element for including in code sequence, including:
The decoding request triggered based on file is received, by the current cryptographic Hash of default hash algorithm calculation document;
Current cryptographic Hash is compared with initial Hash value;
If current cryptographic Hash is identical as initial Hash value, the standard cipher sequence of file association is obtained, determines that standard is closeThe subject image element for including in code sequence.
Further, described that pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and by selectionAfter the step of each pictorial element composition initial image set, the terminal is called by processor 110 to be stored in memory 109File encryption program, to realize following steps:
Selecting frequency is higher than the pictorial element of preset value by the selecting frequency for counting each pictorial element in pre-set image setIt is marked.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, putThe functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Embodiment to facilitate the understanding of the present invention, below to the communications network system that is based on of mobile terminal of the present invention intoRow description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network systemSystem is the LTE system of universal mobile communications technology, which includes communicating UE (User Equipment, the use of connection successivelyFamily equipment) (the lands Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRANGround wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returningJourney (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203,ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy andCharging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 andThe control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registersSuch as the function of home location register (not shown) etc, and some are preserved in relation to use such as service features, data ratesThe dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resourcesPoint, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimediaSystem) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not onlySuitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA withAnd the following new network system etc., it does not limit herein.
Based on above-mentioned terminal hardware structure and communications network system, each implementation of file encrypting method of the present invention is proposedExample.
The present invention provides a kind of file encrypting method.In the present embodiment, the file encrypting method is optional is applied to eventuallyIn end, the terminal is chosen as the mobile terminal described in Fig. 1, and the file encrypting method includes:
Receive the CIPHERING REQUEST triggered based on file;
Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formedInitial image set;
It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;
Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show the secret gradeThe pre-set text frame of corresponding number
The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input toThe corresponding standard cipher sequence of the secret grade is formed in the pre-set text frame;
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.
The scheme of image encryption is set in the terminal in the present embodiment, prestores different pictorial elements in terminal, noSame pictorial element forms pre-set image set, and for user when terminal triggers CIPHERING REQUEST, terminal randomly selects pre-set image collectionPictorial element in conjunction forms initial image set, and user can carry out arrangement group by the pictorial element for selecting initial pictures to concentrateIt closes pictorial element and forms standard cipher sequence, when user decrypts, the solution of file can be realized by carrying out the reproduction of pictorial elementClose operation.
It should be added that the concrete form for carrying out file encryption in the present invention by image is not construed as limiting, modeOne:Initial pictures concentration includes 6 pictorial elements, and user selects 4 pictorial elements from 6 pictorial elements, and by 4 imagesThe file encryption mode of combination, for example, user selects 4 pictorial elements to be decoded behaviour in user as subject image elementWhen making, this 4 pictorial elements are chosen from decrypted image set, you can to realize the decryption of file, the arrangement of 4 pictorial elementsSequence is not construed as limiting, wherein decrypted image set can be identical as initial image set, can also be comprising 4 pictorial elementsThe set of other pictorial elements;Mode two:Initial pictures concentration includes 6 pictorial elements, and user selects from 6 pictorial elements4 pictorial elements, by 4 pictorial element sequence setting file encryption modes, for example, user clicks this document or file,Display the prompt box is corresponded in terminal, there are 4 different pictorial elements once to sort sidewards in prompting frame.Initial image set has 44 pictorial elements are moved to empty text box by empty text box, user, are clicked corresponding button encryption is arranged, are completed textThe cryptographic operation of part, similarly, when operation is decrypted in user, user by need by 4 pictorial elements according to encryption whenIt is arranged, realizes the decryption of file.
Further, compared with simple digital alphabet combined ciphering, user can select to be an image in this programmeElement or multiple images element, when user selects multiple images aes encryption, it is by multiple images that user, which is also an option that,Element is combined or sorts, and such file encryption mode is more flexible.
With reference to Fig. 3, in the first embodiment of file encrypting method of the present invention, the file encrypting method includes:
Step S10 is received the CIPHERING REQUEST triggered based on file, is selected from pre-set image set according to the CIPHERING REQUESTPictorial element is taken, and each pictorial element of selection is formed into initial image set.
User clicks the CIPHERING REQUEST of file triggering file in terminal, wherein the mode of triggering file encryption request is notMake specific restriction, can click file triggering CIPHERING REQUEST, can also be that user speech triggers CIPHERING REQUEST, terminal receives baseIn the CIPHERING REQUEST of file triggering, terminal obtains pre-set image set, and pre-set image set can be the photo in user's photograph albumThe set of composition can also be the set of other image identification compositions, and the image number minimum value in pre-set image set is notTen can be less than, the upper limit is not specifically limited, and terminal is chosen from random or according to setting the rule in pre-set image set to be schemedPixel element, and each pictorial element of selection is formed into initial image set, for example, in pre-set image set including 100 in terminalImage is opened, terminal randomly chooses 10 pictures in 100 pictures and forms initial image set.
Further, include after step S10:
Selecting frequency is higher than the pictorial element of preset value by the selecting frequency for counting each pictorial element in pre-set image setIt is marked.
Terminal counts the selecting frequency of each pictorial element in pre-set image set, that is, terminal carries out each pictorial elementRecord determines that the selecting frequency of each pictorial element, pictorial element of the terminal by selecting frequency higher than preset value are marked,In, preset value can be arranged as the case may be, for example, user setting is 10 times, to prevent from repeating selecting identical pictorial element,There is the identical standard cipher sequence for file encryption;The selecting frequency of terminal statistical picture element in the present embodiment,And according to the selecting frequency of pictorial element, the pictorial element of preset value is less than from the selection selecting frequency in pre-set image set,And pictorial element is formed into initial image set so that the form of image encryption has more diversity.
Step S20 shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting.
After terminal determines initial image set, initial image set is shown on the screen of terminal, and generates encryption prompt message,With prompt user carry out grade setting, that is, terminal shows initial image set, and generates prompt message, prompt user intoRow cryptographic operation.
Step S30, reception grade setting instruction, obtains the secret grade in the grade setting instruction, and described in displayThe pre-set text frame of secret grade corresponding number.
Terminal shows that secret grade setting prompt, user determine the secret grade of file or file, and display numberPre-set text frame, that is, the encryption of user setting the first estate, then it is corresponding in terminal to show the corresponding number of the first estate encryptionPre-set text frame;The encryption of the second grade of user setting, then it is corresponding in terminal to show that the encryption of the second grade corresponds to numberPre-set text frame then shows 3 text boxes for example, user setting the first estate is encrypted;The second grade of user setting is encrypted, thenShow 6 text boxes, and so on.Wherein pre-set text frame refers to the empty text box that user inputs subject image element.
Step S40 chooses the subject image element that initial pictures are concentrated based on user's operation, and the target image is firstElement, which is input in the pre-set text frame, forms the corresponding standard cipher sequence of the secret grade.
Terminal chooses the subject image element that initial pictures are concentrated based on user's operation, and further, terminal is according to userOperation determines whether to carry out file encryption for the mode of sequence, if the mode of sequence carries out file encryption, then user can incite somebody to actionSubject image element is moved to the pre-set text frame of corresponding number, and terminal determines subject image element according to the sequence of text boxSequence, and using the subject image element of ordered arrangement as standard cipher sequence, user needs when carrying out file decryption operationSubject image element is chosen, and subject image element is sorted in sequence, only user is formed identical as standard cipher sequenceElement sequence when, file decryption just may be implemented, if not sequence but combination mode carry out file encryption, then user existsWhen the pictorial element selected in decrypting process is consistent with encrypted pictorial element, so that it may to realize file decryption.
Further, determine that the realization method of the sequence of subject image element includes according to user's operation in step S40:
Step a1 chooses the subject image element that initial pictures are concentrated based on user's operation, subject image element is inputtedInto pre-set text frame.
Step b1 determines that subject image element sorts according to the preset numbers of pre-set text frame, forms the secret gradeCorresponding standard cipher sequence.
User's operation chooses the subject image element that initial pictures are concentrated, and subject image element is input to pre-set text frameIn (wherein, the quantity of pre-set text frame is determined according to secret grade);Target figure is determined according to the preset numbers of pre-set text framePixel element sorts, and forms the corresponding standard cipher sequence of the secret grade, that is, terminal sorts the pictorial element in text boxAs the corresponding standard cipher sequence of secret grade.
Due to the diversity of pre-set image set in the present embodiment, the randomness of initial image set is selected, in addition, user canSecret grade is independently arranged, for terminal according to the pre-set text frame for adding the bright corresponding number of grade display, such user can basisCorresponding secret grade is arranged in the importance of file so that the safety higher of file.
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file by step S50.
After the determination of terminal monitoring standard cipher sequence, standard cipher sequence and file are associated preservation by terminal, withThe cryptographic operation of file is completed, terminal can be by decrypted image sequence input by user and standard sequence image when user decryptsIt is compared, carries out the decryption of file.
Encrypting and decrypting processing is applied to by different pictorial elements in the present embodiment so that file encryption is not listThe digital alphabet of tune combines so that encryption is more interesting, and the sequence combination of image facilitates the operation of user so that fileEncryption is more convenient, in addition, different secret grades can be arranged in the present invention, and shows the corresponding text box of secret grade,User's selection target pictorial element is prompted to input years text box so that the encryption of file is more intelligent, safety higher.
With reference to Fig. 4, the of file encrypting method of the present invention is further provided on the basis of first embodiment of the inventionTwo embodiments, are omitted the step in first embodiment in Fig. 4, step S60 in the present embodiment, optionally in the first embodimentStep S50 after, that is, file encryption complete, user carry out file decryption.
The present embodiment is the decrypting process to encrypting file, and the present embodiment includes:
Step S60 receives the decoding request triggered based on file, obtains the standard cipher sequence of file association, determines markThe subject image element for including in quasi- keying sequence.
Step S70 chooses the decrypted image set for including subject image element from pre-set image set, receives user's baseIn the decrypted image sequence that decrypted image set is chosen.
User triggers the decoding request of file in terminal, wherein for triggering mode without limiting, terminal receives user's baseIn the decoding request of file triggering, the standard cipher sequence of file association is obtained, that is, terminal determines that user needs the text decryptedPart, and the pre-set standard cipher sequence of this document is obtained, terminal determines the target image for including in standard cipher sequenceElement, terminal choose the decrypted image set for including subject image element from pre-set image set, and in conjunction with Fig. 7, terminal obtainsStandard cipher sequence to file is B figures, A figures, C figures and D figures, is known as 4 comprising image primitive in standard cipher sequence, terminal fromA figures, B figures, C figures, D figures, E figures and F figures are chosen in pre-set image set into decrypted image set, wherein decrypted image setWith initial image set can it is identical can not also be identical, user selects 4 pictorial elements in decrypted image set, and by 4Pictorial element carries out arrangement form decrypted image sequence.
It should be added that decryption prompt can be arranged in user in terminal in the present embodiment, that is, upper display encryptionThe pre-set text frame of the corresponding number of grade, to prompt user that operation is decrypted, for example, standard when user forgets to encrypt is closeCode sequence, user can click prompt button, and terminal prompts the pictorial element number of standard cipher sequence, so that userInput decrypted image sequence.
Decrypted image sequence is compared step S80 with standard sequence image.
Step S90 judges that user has operating right, carries out if decrypted image sequence is matched with standard sequence imageFile decryption.
The decrypted image sequence that user decrypts is compared terminal with standard sequence image, and terminal judges decrypted image sequenceWhether row and the pictorial element number for including in standard sequence image are identical, and whether pictorial element is identical, the sequence of pictorial elementWhether identical, if close image sequence is identical as the pictorial element number for including in standard sequence image, pictorial element is identical, imageThe sequence of element is identical, then terminal judgement decrypted image sequence is matched with standard sequence image, it is determined that user has operating rightsLimit, and file decryption is carried out, so that user checks file.
Terminal determines the decryption of the file of terminal depending on the user's operation in the present embodiment so that document image is encryptedMethod is more interesting.
Further, further include after step S80:
Step S100 judges that user does not have operating right if decrypted image sequence is mismatched with standard sequence image,And prompt the secondary decryption oprerations of user's progress file;
Step S110, the decryption number of statistics file lock file if file decryption number is more than predetermined threshold valueIt is fixed.
If terminal determines close image sequence and standard sequence figure according to the comparison of decrypted image sequence and standard sequence imageAs in include pictorial element number, pictorial element, in the sequence of pictorial element by any one or it is multiple differ, then eventuallyEnd judgement decrypted image sequence and standard sequence image mismatch, and terminal notifying user carries out secondary decryption oprerations, user intoWhen the secondary decryption oprerations of row, the decryption oprerations number of terminal counting user, if it is more than predetermined threshold value that user, which decrypts number, whereinPredetermined threshold value can be arranged according to concrete scene, such as be set as 5 times, 10 times, then the file that terminal decrypts user carries out shortThe locking of phase.
User is obstructed to file decryption out-of-date in the present embodiment, the operating frequency of terminal counting user, if the behaviour of userWorking frequency is higher, and terminal automatically locks file, to prevent file from revealing.
Further, in the 3rd embodiment of file encrypting method of the present invention, the present embodiment is the base in second embodimentItd is proposed on plinth, terminal monitoring to user repeatedly decryption not over when, terminal judgement user forget the standard pre-enteredSequence image is decrypted, specifically automatically after terminal-pair subscriber authentication:
With reference to Fig. 5, the file encrypting method includes:
Step S120 receives authentication request, obtains the subscriber identity information for including in authentication request.
User triggers authentication request, and terminal receives authentication request, obtains the use for including in authentication requestFamily identity information, that is, user can preset authentication button by click and trigger authentication request or user speechThe other forms such as instruction trigger authentication request, and terminal receives authentication request, includes in acquisition authentication requestSubscriber identity information, wherein the subscriber identity information in authentication request can be that user is manually entered, can also beIt is carried when user's triggering authentication request, for example, it is that automatic collection is used that terminal clicks authentication virtual key in userThe fingerprint at family acquires the sound of user as subscriber authentication or terminal, and user voice is analyzed to obtain user's soundLine is as subscriber authentication.
Subscriber identity information is compared step S130 with pre-stored criteria identity information, if subscriber identity information with it is pre-Standard identity information matches are deposited, then release file locking and carry out file decryption.
Subscriber identity information is compared terminal with pre-stored criteria identity information, wherein pre-stored criteria identity information isRefer to the standard identity information gathered in advance for verifying user identity, showing terminal in conjunction with Fig. 8, Fig. 8 obtains authenticationThe subscriber identity information for including in request refers to the real-time face feature information of user, and pre-stored criteria identity information refers to that user is pre-The bare-headed photo information deposited;If subscriber identity information is matched with pre-stored criteria identity information, that is, subscriber identity information and the mark that prestoresQuasi- identity information is identical, for example, collected user fingerprints are matched with pre-stored fingerprint, or the user voice of acquisition and the sound that prestoresFor sound after sound compares, two sound are same person, and terminal releases file locking and carries out file decryption.
Subscriber identity information is compared with standard identity information in the present embodiment, the unlock of style of writing of going forward side by side part and solutionIt is close, i.e., operation can also be decrypted when user forgets the password of advance facility, under the premise of ensuring information security property, sideJust the operation of user.
With reference to Fig. 6, the present embodiment can be combined with above-described embodiment, and the 4th of file encrypting method of the present invention implementsIn example, file is subjected to hash check, to prevent from occurring the problem of file is distorted, specifically, this implementation in file storing processExample include:
Step S140 is breathed out by the cryptographic Hash of default hash algorithm calculation document using the cryptographic Hash being calculated as initialUncommon value, and preserve initial Hash value;
After user setting standard cipher sequence, that is, after file encryption, terminal presses default hash algorithm (default HashAlgorithm is the file identification of creator's setting according to file size, time, type) cryptographic Hash of calculation document, terminal will calculateObtained cryptographic Hash is as initial Hash value, so that user determines whether the file of terminal is tampered according to cryptographic Hash.
The present embodiment and file decryption in second embodiment are combined, step S60, described receive is triggered based on fileDecoding request, obtain the standard cipher sequence of file association, determine the subject image element for including in standard cipher sequenceStep, including:
Step S61 receives the decoding request triggered based on file, by the current Hash of default hash algorithm calculation documentValue;
Current cryptographic Hash is compared by step S62 with initial Hash value;
Step S63 obtains the standard cipher sequence of file association, really if current cryptographic Hash is identical as initial Hash valueCalibrate the subject image element for including in quasi- keying sequence.
Terminal receives the decoding request that trigger based on file, terminal press default hash algorithm (wherein, preset hash algorithm andThe algorithm for calculating initial Hash value is consistent) the current cryptographic Hash of calculation document;Terminal by current cryptographic Hash and initial Hash value intoRow compares;If current cryptographic Hash is identical as initial Hash value, terminal judges file file in the period for being encrypted into decryptionIt is not tampered with, at this point, terminal obtains the standard cipher sequence of file association, determines the target image for including in standard cipher sequenceElement, the step of to carry out file decryption, if current cryptographic Hash is differed with initial Hash value, terminal judges that file is being encryptedIt is tampered to file in the period of decryption, at this point, terminal can generate a prompt message.
The encrypting and decrypting of file is combined with cryptographic Hash in the present embodiment, file can be prevented to be tampered, is ensuredThe integrality of file, authenticity.
In addition, the embodiment of the present invention also proposes a kind of computer storage media.
File encryption program is stored on the computer storage media, when the file encryption program is executed by processorRealize that file encryption operates as follows:
Receive the CIPHERING REQUEST triggered based on file;
Pictorial element is chosen from pre-set image set according to the CIPHERING REQUEST, and each pictorial element of selection is formedInitial image set;
It shows initial image set, and generates encryption prompt message, to prompt user to carry out grade setting;
Grade setting instruction is received, obtains the secret grade in the grade setting instruction, and show the secret gradeThe pre-set text frame of corresponding number;
The subject image element that initial pictures are concentrated is chosen based on user's operation, and the subject image element is input toThe corresponding standard cipher sequence of the secret grade is formed in the pre-set text frame;
Standard cipher sequence and file are associated preservation, to complete the cryptographic operation of file.
Further, following operation is also realized when the file encryption program is executed by processor:
It is described that the subject image element that initial pictures are concentrated is chosen based on user's operation and the subject image element is defeatedThe step of entering into the pre-set text frame to be formed the secret grade corresponding standard cipher sequence, including:
The subject image element that initial pictures are concentrated is chosen based on user's operation, subject image element is input to default textIn this frame;
It determines that subject image element sorts according to the preset numbers of pre-set text frame, forms the corresponding mark of the secret gradeQuasi- keying sequence.
Further, following operation is also realized when the file encryption program is executed by processor:
It is described that standard cipher sequence and file are associated preservation, the step of cryptographic operation to complete file after,Including:
The decoding request triggered based on file is received, the standard cipher sequence of file association is obtained, determines standard cipher sequenceThe subject image element for including in row;
The decrypted image set for including subject image element is chosen from pre-set image set, is received user and is based on decryption figureImage set closes the decrypted image sequence chosen;
Decrypted image sequence is compared with standard sequence image;
If decrypted image sequence is matched with standard sequence image, judges that user has operating right, carry out file decryption.
Further, following operation is also realized when the file encryption program is executed by processor:
It is described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, determines that standard is closeAfter the step of subject image element for including in code sequence, including:
Determine subject image element number, generate the prompt message for including subject image element number, with prompt user intoRow decryption oprerations.
Further, following operation is also realized when the file encryption program is executed by processor:
After described the step of decrypted image sequence is compared with standard sequence image, including:
If decrypted image sequence is mismatched with standard sequence image, judge that user does not have operating right, and prompt to useFamily carries out the secondary decryption oprerations of file;
The decryption number of statistics file locks file if file decryption number is more than predetermined threshold value.
Further, following operation is also realized when the file encryption program is executed by processor:
The decryption number of the statistics file, if file decryption number is more than predetermined threshold value, by file into line-lockedAfter step, including:
Authentication request is received, the subscriber identity information for including in authentication request is obtained;
Subscriber identity information is compared with pre-stored criteria identity information, if subscriber identity information and pre-stored criteria identityInformation matches then release file locking and carry out file decryption.
Further, following operation is also realized when the file encryption program is executed by processor:
It is described that the subject image element that initial pictures are concentrated is chosen based on user's operation and the subject image element is defeatedAfter the step of entering into the pre-set text frame to be formed the secret grade corresponding standard cipher sequence, including:
By the cryptographic Hash of default hash algorithm calculation document, using the cryptographic Hash being calculated as initial Hash value, and protectDeposit initial Hash value;
It is described to receive the decoding request triggered based on file, the standard cipher sequence of file association is obtained, determines that standard is closeThe step of subject image element for including in code sequence, including:
The decoding request triggered based on file is received, by the current cryptographic Hash of default hash algorithm calculation document;
Current cryptographic Hash is compared with initial Hash value;
If current cryptographic Hash is identical as initial Hash value, the standard cipher sequence of file association is obtained, determines that standard is closeThe subject image element for including in code sequence.
Further, following operation is also realized when the file encryption program is executed by processor:
It is described to receive the CIPHERING REQUEST triggered based on file;Figure is chosen from pre-set image set according to the CIPHERING REQUESTPixel element, and after the step of each pictorial element of selection is formed initial image set, including:
Selecting frequency is higher than the pictorial element of preset value by the selecting frequency for counting each pictorial element in pre-set image setIt is marked.
It should be noted that herein, relational terms such as first and second and the like are used merely to a realityBody/operation/object is distinguished with another entity/operation/object, without necessarily requiring or implying these entity/operations/There are any actual relationship or orders between object;The terms "include", "comprise" or its any other variant meaningCovering non-exclusive inclusion, so that process, method, article or system including a series of elements include not only thatA little elements, but also include other elements that are not explicitly listed, or further include for this process, method, article orThe intrinsic element of system.In the absence of more restrictions, the element limited by sentence "including a ...", is not arrangedExcept there is also other identical elements in process, method, article or the system including the element.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hairEquivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skillsArt field, is included within the scope of the present invention.

Claims (10)

CN201810377783.3A2018-04-242018-04-24File encrypting method, device and computer storage mediaPendingCN108563959A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201810377783.3ACN108563959A (en)2018-04-242018-04-24File encrypting method, device and computer storage media

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201810377783.3ACN108563959A (en)2018-04-242018-04-24File encrypting method, device and computer storage media

Publications (1)

Publication NumberPublication Date
CN108563959Atrue CN108563959A (en)2018-09-21

Family

ID=63536316

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201810377783.3APendingCN108563959A (en)2018-04-242018-04-24File encrypting method, device and computer storage media

Country Status (1)

CountryLink
CN (1)CN108563959A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN112989398A (en)*2021-05-182021-06-18腾讯科技(深圳)有限公司Data processing method and device for block chain network, computer equipment and medium
CN113079011A (en)*2021-03-182021-07-06长鑫存储技术有限公司Key pushing method, file operating method, storage medium and computer equipment
CN114329651A (en)*2021-12-312022-04-12联想(北京)有限公司 Data protection implementation method, device, computer equipment and storage medium
CN115589290A (en)*2022-10-082023-01-10中国南方电网有限责任公司 Password identification method, device, computer equipment and storage medium
CN117193863A (en)*2023-09-082023-12-08上海合芯数字科技有限公司 Host boot program startup method, device, system and processor
CN117828649A (en)*2024-03-062024-04-05天津帕克耐科技有限公司Micro data center system

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040246523A1 (en)*2003-06-092004-12-09Konica Minolta Business Technologies, Inc.Data communication device, computer readable medium and method for transmitting and managing data
CN102571341A (en)*2010-12-312012-07-11中国银联股份有限公司Authentication system and method based on dynamic image
CN105453483A (en)*2013-06-132016-03-30维萨国际服务协会Image-based key derivation function

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040246523A1 (en)*2003-06-092004-12-09Konica Minolta Business Technologies, Inc.Data communication device, computer readable medium and method for transmitting and managing data
CN102571341A (en)*2010-12-312012-07-11中国银联股份有限公司Authentication system and method based on dynamic image
CN105453483A (en)*2013-06-132016-03-30维萨国际服务协会Image-based key derivation function

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113079011A (en)*2021-03-182021-07-06长鑫存储技术有限公司Key pushing method, file operating method, storage medium and computer equipment
US12219046B2 (en)2021-03-182025-02-04Changxin Memory Technologies, Inc.Method for pushing key, method for operating file, storage medium, and computer device
CN112989398A (en)*2021-05-182021-06-18腾讯科技(深圳)有限公司Data processing method and device for block chain network, computer equipment and medium
CN112989398B (en)*2021-05-182021-07-30腾讯科技(深圳)有限公司Data processing method and device for block chain network, computer equipment and medium
CN114329651A (en)*2021-12-312022-04-12联想(北京)有限公司 Data protection implementation method, device, computer equipment and storage medium
CN115589290A (en)*2022-10-082023-01-10中国南方电网有限责任公司 Password identification method, device, computer equipment and storage medium
CN115589290B (en)*2022-10-082024-11-22中国南方电网有限责任公司 Password identification method, device, computer equipment and storage medium
CN117193863A (en)*2023-09-082023-12-08上海合芯数字科技有限公司 Host boot program startup method, device, system and processor
CN117193863B (en)*2023-09-082024-05-24上海合芯数字科技有限公司Method, device, system and processor for starting host bootstrap program
CN117828649A (en)*2024-03-062024-04-05天津帕克耐科技有限公司Micro data center system
CN117828649B (en)*2024-03-062024-05-28天津帕克耐科技有限公司Micro data center system

Similar Documents

PublicationPublication DateTitle
CN108563959A (en)File encrypting method, device and computer storage media
CN108289141A (en)A kind of the screen locking unlocking method and mobile terminal of mobile terminal
CN107194291A (en)Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium
CN110069229A (en)Screen sharing method, mobile terminal and computer readable storage medium
CN107315937A (en)A kind of method for secret protection, mobile terminal and computer-readable recording medium
CN108733811A (en)A kind of file access method, terminal and computer readable storage medium
CN107862196A (en)Fingerprint verification method, mobile terminal and computer-readable recording medium
CN108171037A (en)Using startup method, terminal and computer storage media
CN107133498A (en)A kind of privacy application management method and device and mobile terminal
CN109558718A (en)Application program login method, computer end, mobile terminal, system and storage medium
CN107784232A (en)A kind of image processing method and mobile terminal
CN107395850A (en)A kind of social communication information guard method, device and computer-readable recording medium
CN108206892A (en)Guard method, device, mobile terminal and the storage medium of contact person's privacy
CN110187925A (en)A kind of desktop pretrigger control method, equipment and computer readable storage medium
CN108920917A (en)Log in end switching method, mobile terminal and computer readable storage medium
CN108989534A (en)Message prompt method, mobile terminal and computer readable storage medium
CN109145552A (en) Information encryption method and terminal device
CN108052845A (en)file display control method, terminal and computer readable storage medium
WO2020233218A1 (en)Information encryption method, information decryption method, and terminal
CN108197441A (en)Flexible screen terminal and its solution lock control method, computer readable storage medium
CN107770443A (en)A kind of image processing method, mobile terminal and computer-readable recording medium
CN107888762A (en)Memorandum record generation method and mobile terminal
CN107317680A (en)Labeling method, system and the computer-readable recording medium of secured account numbers
CN107516051A (en)A kind of data encryption storage method, device and computer-readable recording medium
CN108712567A (en)Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication

Application publication date:20180921

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp