Private file encryption method and private file encryption device

A file encryption and file technology, applied in the Internet field, can solve the problems of private file information leakage, cumbersome encryption process, and inability to apply for file encryption, etc., and achieve the effect of simple encryption process and avoiding the leakage of private files

Active Publication Date: 2014-11-05
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiments of the present invention is to provide a method for encrypting private files, which aims to solve the problem of the encryption process of private files in the prior art. The encryption process is cumbersome and the application files cannot be encrypted in real time, which may lead to the leakage of private file information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private file encryption method and private file encryption device
  • Private file encryption method and private file encryption device
  • Private file encryption method and private file encryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] figure 1 It shows the flow chart of the implementation of the private file encryption method provided by Embodiment 1 of the present invention, and the details are as follows:

[0026] In S101, monitor the running of the current application program;

[0027] In this embodiment, the application program is an application program installed locally on the terminal device, for example, a game program, an instant messaging program, a call program, and the like.

[0028] In S102, if the application program belongs to the standard listening program list, determine whether the file generated during the running of the current application program is a private file;

[0029] Wherein, the standard listening program list stores the application program information to be monitored, and the application program information may include information such as the name and size of the application program. When the application program belongs to the standard listening program list, it indicate...

Embodiment 2

[0034] figure 2 It shows the flow chart of the implementation of the private file encryption method provided by Embodiment 2 of the present invention, and is described in detail as follows:

[0035] In this embodiment, after the terminal device is powered on, it may output prompt information to the user whether to encrypt the private file, and if yes, execute S201.

[0036] In S201, generate a list of standard listening programs;

[0037] Optionally, S201 is implemented in the following way 1: generate a standard listening program list according to the application information to be encrypted selected by the user and the encrypted file type corresponding to each application set, specifically, a shortcut entry can be set on the terminal, when When the shortcut entry is clicked, a list of encryption program selection and setting encrypted files will pop up. The list shows the applications that need to be encrypted locally on the terminal device and the corresponding encrypted f...

Embodiment 3

[0057] image 3 The structure diagram of the private file encryption device provided by the third embodiment of the present invention, for the convenience of description, only shows the part related to the embodiment of the present invention, the device can be a software unit, a hardware unit or a software unit built in the terminal device. Hard binding unit.

[0058] The device includes: a monitoring unit 31 , a judging unit 32 and an encryption unit 33 .

[0059] A monitoring unit 31, configured to monitor currently running application programs;

[0060] A judging unit 32, configured to judge whether the file generated during the running of the current application is a private file if the application belongs to a standard listening program list, and the standard listening program list stores application information to be monitored;

[0061] The encryption unit 33 is configured to encrypt the private file in real time when the file generated during the running of the curren...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the technical field of Internet, and provides a private file encryption method and a private file encryption device. The private file encryption method comprises the following steps that: a current running application program is monitored; when the application program belongs to a standard monitoring program list, whether a file generated in the current application program running process is a private file or not is judged, and the standard monitoring program list stores application program information to be monitored; and when the file generated in the current application program running process is the private file, the private file is encrypted in real time. The method and the device provided by the invention have the advantages that the real-time encryption on the private file is realized; the manual operation is not needed; the encryption process is simple and convenient; and the private file generated in the application program running process is encrypted in real time, so that the private file leakage due to encryption forgetting can be avoided.

Description

technical field [0001] The invention belongs to the technical field of the Internet, and in particular relates to a private file encryption method and device. Background technique [0002] With the development of Internet technology and terminal technology, various applications continue to appear to meet people's life, work, entertainment and other needs. For example, through phone applications, users can conduct voice communication, through instant messaging applications, Text communication, voice communication or video communication can be carried out. [0003] However, in the process of communicating through the application program, files such as video, audio, and text may be generated, and some of these files are private files that need to be protected, and the private files need to be encrypted by encryption, wherein, Private files can be videos, photos, call records, chat records, system files, etc. Currently, when users encrypt a private file, they need to first sele...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/6245G06F2221/2107
Inventor 李丹华
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products