A file encryption method and electronic device
An electronic device and file encryption technology, which is applied in the direction of electronic digital data processing, digital data protection, instruments, etc., can solve the problems of privacy leakage of electronic devices, achieve the effect of improving user experience and ensuring privacy security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] figure 2 The flow of the method for encrypting files applied to electronic devices provided by the first embodiment of the present invention is shown. For the convenience of description, only the parts related to the embodiment of the present invention are listed, and the details are as follows:
[0053] As a preferred embodiment of the present invention, step S10 includes:
[0054] Step S101, when the current user is browsing pictures / videos, listen to the sound of the surrounding environment, that is, when the file type that may involve privacy (the type of file that the user has encrypted and set, refers to pictures or videos in the present invention) is being browsed Or when watching, start listening to the sound of the surrounding environment to determine whether there is a file encryption command (code word) sent by the owner user. For example, the owner user has set a file encryption command (code word) before, and the content of the command is: cough three time...
Embodiment 2
[0058] image 3 It shows the flow of the file encryption method applied to electronic equipment provided by the second embodiment of the present invention. For the convenience of description, only the parts related to the embodiment of the present invention are listed, and the details are as follows:
[0059] As a preferred embodiment of the present invention, step S30 includes:
[0060] Step S301, comparing the acquired facial features with the preset user's facial features;
[0061] Step S302: Encrypt the preset encrypted file in the electronic device when the preset user issues a file encryption instruction and the similarity between the acquired facial features and the preset user's facial features is less than a preset similarity threshold.
[0062] In the embodiment of the present invention, when the similarity between the acquired facial features and the preset user's facial features is less than the preset similarity threshold, the user who uses the electronic device ...
Embodiment 3
[0064] Figure 4 It shows the flow of the file encryption method applied to electronic equipment provided by the third embodiment of the present invention. For the convenience of description, only the parts related to the embodiment of the present invention are listed, and the details are as follows:
[0065] As a preferred embodiment of the present invention, after step S30, the following steps are further included:
[0066] Step S40, detecting whether the preset user issues a file decryption command, and reacquiring the facial features of the current user;
[0067] Step S50, when the predetermined user issues a file decryption instruction, and the similarity between the re-acquired facial features and the preset facial features is greater than the preset similarity threshold, decrypt the preset encrypted file in the electronic device.
[0068] The embodiment of the present invention mainly performs encryption processing after encrypting the preset encrypted file, and decryp...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


