Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption method and device

A data confidentiality and data technology, applied in the field of electronic information, can solve problems such as increasing user workload, reducing user experience, and consuming user time, so as to improve user experience, reduce the frequency of password input, and save time and workload. Effect

Active Publication Date: 2013-02-13
DONGGUAN YULONG COMM TECH +1
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Since the password needs to be re-entered every time a new document or program is opened, it takes extra time for the user and increases the workload of the user, thus reducing the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and device
  • Data encryption method and device
  • Data encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] The embodiment of the present invention provides a data security method, such as figure 1 shown, including:

[0031] It should be noted that, in this embodiment of the present invention, a terminal device for executing the method of the present invention may be a terminal device, such as a smart phone, a mobile computer or other portable terminals, or a personal computer or an electronic reader, etc. equipment.

[0032] Step 101, decrypt the data according to the received password.

[0033] In this embodiment, the terminal device can decrypt the data according to the received password through existing technical means, and the source and location of the decrypted data are not limited, for example, it can be stored in the memory of the terminal device itself It can also be data stored in other devices and the terminal device can directly obtain these data from other devices.

[0034] Step 102: Detect whether the decrypted data is currently being read or written.

[00...

Embodiment 2

[0046] The embodiment of the present invention provides a data security method, such as Figure 2a shown, including:

[0047] Step 201, receiving indication information.

[0048] Wherein, the indication information includes the identification information and identification information.

[0049] In this embodiment, the terminal device can receive the indication information input by the user through the input device, the indication information is used to instruct the terminal device to mark the data specified by the user, and the identification information included in the indication information is used for the terminal device to identify the data specified by the user. Designated data, the identification information is used to mark the data designated by the user corresponding to the identification information.

[0050] It should be noted that the identification information, the specific information format of the identification information, and the specific implementation for ...

Embodiment 3

[0076] The embodiment of the present invention provides a data security device, such as image 3 shown, including:

[0077] The decryption module 31 is used for decrypting the data according to the received password.

[0078] The detection module 32 is configured to detect whether the decrypted data is currently being read or written every specified time.

[0079] The timing module 33 is configured to start timing when the read and write ends when the detection module detects that the decrypted data is currently being read and written.

[0080] The encryption module 34 is configured to re-encrypt the data if the decrypted data has not been read or written within the preset time period.

[0081] The file encryption device provided by the embodiment of the present invention can not re-encrypt the data that is being read or written within a specified time after the data is decrypted, and if the decrypted data is not used within the preset time, the decrypted data to re-encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data encryption method and device and relates to the technical field of electronic information, and the method and the device can be used for reducing the frequency of inputting passwords for data in use of a user and saving the time and work load of the user so as to improve the user experience. The data encryption method comprises the following steps of: decrypting the data according to the received passwords; detecting whether the decrypted data are written and read at present; and keeping the decryption state of the decrypted data or encrypting the decrypted data again according to preset rules. The data encryption method and device are applicable to data confidentiality.

Description

technical field [0001] The invention relates to the technical field of electronic information, and in particular, to a data security method and device. Background technique [0002] With the development of electronic information technology, the encryption technology on personal terminals has become more and more mature, especially encryption methods such as password authentication and fingerprint recognition, which ensure the security of information stored by users on terminal devices. [0003] In the prior art, users who want to use encrypted information, applications, etc., mainly need to go through the following processes: [0004] Every time you open an encrypted document or application, you need to manually enter the password. If you want to open a series of information encrypted by the same password, you need to re-enter the password. For example, many readers can directly read the RAR format compressed package. The content in the compressed package, and the decompres...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
Inventor 刘子超吴辉
Owner DONGGUAN YULONG COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products