A mobile terminal and its method and device for improving encryption efficiency
A mobile terminal and encryption algorithm technology, applied in computer security devices, file/folder operations, instruments, etc., can solve problems such as low encryption efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] figure 1 It is a flowchart of a method for improving encryption efficiency according to an embodiment of the present invention, combined below figure 1 To describe a method for improving encryption efficiency according to an embodiment of the present invention, the method is applied to a mobile terminal, and the database of the mobile terminal stores an applicable encryption algorithm for each different file type, and the mobile terminal is such as a mobile phone, a tablet computer , laptops, all-in-one computers and other portable electronic devices that can be used for encryption. Such as figure 1 As shown, the method includes the following steps:
[0048] S100. Obtain the type of encrypted file selected by the user;
[0049] S200. Query the database for an applicable encryption algorithm corresponding to the obtained file type;
[0050] S300. Encrypt the file using the queried encryption algorithm.
[0051] Among them, the source of the algorithm stored in the d...
Embodiment 2
[0065] figure 2 It is a flowchart of a method for improving encryption efficiency according to another embodiment of the present invention, such as figure 2 As shown, the method for improving the encryption efficiency further includes:
[0066] S010, selecting different encryption algorithms to encrypt the same file, and detecting the encryption efficiency of each encryption algorithm;
[0067] S020, sort the encryption algorithms participating in the encryption according to the level of encryption efficiency;
[0068] S030. Determine the encryption algorithm with the highest encryption efficiency as the encryption algorithm applicable to the file type of the same file.
[0069] Among them, the encryption efficiency of a certain encryption algorithm for the same file can be judged by the encryption time, or by the number of files that can be encrypted at the same time. When the encryption time is shorter and / or the files that can be encrypted at the same time The more the...
Embodiment 3
[0072] image 3 It is a flowchart of a method for improving encryption efficiency according to another embodiment of the present invention, such as image 3 As shown, the encryption algorithm applicable to the above-mentioned same file type is an algorithm group comprising more than two encryption algorithms, and the database is pre-stored with encryption algorithms corresponding to the size of different encrypted files. The method for improving encryption efficiency includes the above steps On the basis of S300, the above step S100 is specifically:
[0073] S110. Obtain the file type and size of the encrypted file selected by the user.
[0074] The above step S200 specifically includes:
[0075] S210. Query the algorithm group corresponding to the type of the obtained encrypted file in the database;
[0076] S220. Further query an encryption algorithm that matches the obtained size of the encrypted file in the queried algorithm group.
[0077] Wherein, the method for dete...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


