Unlock instant, AI-driven research and patent intelligence for your innovation.

A mobile terminal and its method and device for improving encryption efficiency

A mobile terminal and encryption algorithm technology, applied in computer security devices, file/folder operations, instruments, etc., can solve problems such as low encryption efficiency

Active Publication Date: 2019-08-16
NUBIA TECHNOLOGY CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a mobile terminal and its method and device for improving encryption efficiency, so as to achieve the purpose of improving encryption efficiency and overcome the defect of low encryption efficiency caused by the inability to select a suitable encryption algorithm for different file types in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile terminal and its method and device for improving encryption efficiency
  • A mobile terminal and its method and device for improving encryption efficiency
  • A mobile terminal and its method and device for improving encryption efficiency

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] figure 1 It is a flowchart of a method for improving encryption efficiency according to an embodiment of the present invention, combined below figure 1 To describe a method for improving encryption efficiency according to an embodiment of the present invention, the method is applied to a mobile terminal, and the database of the mobile terminal stores an applicable encryption algorithm for each different file type, and the mobile terminal is such as a mobile phone, a tablet computer , laptops, all-in-one computers and other portable electronic devices that can be used for encryption. Such as figure 1 As shown, the method includes the following steps:

[0048] S100. Obtain the type of encrypted file selected by the user;

[0049] S200. Query the database for an applicable encryption algorithm corresponding to the obtained file type;

[0050] S300. Encrypt the file using the queried encryption algorithm.

[0051] Among them, the source of the algorithm stored in the d...

Embodiment 2

[0065] figure 2 It is a flowchart of a method for improving encryption efficiency according to another embodiment of the present invention, such as figure 2 As shown, the method for improving the encryption efficiency further includes:

[0066] S010, selecting different encryption algorithms to encrypt the same file, and detecting the encryption efficiency of each encryption algorithm;

[0067] S020, sort the encryption algorithms participating in the encryption according to the level of encryption efficiency;

[0068] S030. Determine the encryption algorithm with the highest encryption efficiency as the encryption algorithm applicable to the file type of the same file.

[0069] Among them, the encryption efficiency of a certain encryption algorithm for the same file can be judged by the encryption time, or by the number of files that can be encrypted at the same time. When the encryption time is shorter and / or the files that can be encrypted at the same time The more the...

Embodiment 3

[0072] image 3 It is a flowchart of a method for improving encryption efficiency according to another embodiment of the present invention, such as image 3 As shown, the encryption algorithm applicable to the above-mentioned same file type is an algorithm group comprising more than two encryption algorithms, and the database is pre-stored with encryption algorithms corresponding to the size of different encrypted files. The method for improving encryption efficiency includes the above steps On the basis of S300, the above step S100 is specifically:

[0073] S110. Obtain the file type and size of the encrypted file selected by the user.

[0074] The above step S200 specifically includes:

[0075] S210. Query the algorithm group corresponding to the type of the obtained encrypted file in the database;

[0076] S220. Further query an encryption algorithm that matches the obtained size of the encrypted file in the queried algorithm group.

[0077] Wherein, the method for dete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile terminal, and a method and a device for improving encryption efficiency, and belongs to the technical field of mobile terminals. The method for improving the encryption efficiency is applied to the mobile terminal, and a database of the mobile terminal stores applicable encryption algorithms according to different file types. The method includes the steps: acquiring the type of an encryption file selected by a user; searching the encryption algorithm correspondingly applicable to the acquired file type in the database; encrypting the file by the searched encryption algorithm. The file is encrypted by the applicable encryption algorithm searched in a system by acquiring the file type of the encryption file, so that the encryption algorithm is selected in a targeted manner and applicable to the file selected by the user, and the encryption efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of mobile terminals, in particular to a mobile terminal and a method and device for improving encryption efficiency. Background technique [0002] Although the performance of smartphones is getting higher and higher with the development of integrated chip technology, the quality of video and audio files is getting better and better, and the size of individual files of various types is getting larger and larger. It often takes a long time to encrypt and decrypt these large files with limited mobile phone processing power, which is inefficient. [0003] The existing encryption methods for different types of files have not been subdivided for different file types, nor have they judged which encryption algorithm is applicable based on the size of the file, resulting in some encryption algorithms being more efficient for a certain type of encrypted file. However, when encrypting other types of files, it may take...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F16/16
CPCG06F21/6236G06F2221/2107
Inventor 薛晓君
Owner NUBIA TECHNOLOGY CO LTD