Unlock instant, AI-driven research and patent intelligence for your innovation.

A file encryption method and electronic device

An electronic device and file encryption technology, which is applied in the direction of electronic digital data processing, digital data protection, instruments, etc., can solve the problems of privacy leakage of electronic devices, achieve the effect of improving user experience and ensuring privacy security

Active Publication Date: 2018-06-26
BEIJING CHUANGXIN JOURNEY NETWORK TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiment of the present invention is to provide a file encryption method applied to an electronic device, aiming to solve the problem that the target electronic device is easy to leak privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A file encryption method and electronic device
  • A file encryption method and electronic device
  • A file encryption method and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] figure 2 The flow of the method for encrypting files applied to electronic devices provided by the first embodiment of the present invention is shown. For the convenience of description, only the parts related to the embodiment of the present invention are listed, and the details are as follows:

[0053] As a preferred embodiment of the present invention, step S10 includes:

[0054] Step S101, when the current user is browsing pictures / videos, listen to the sound of the surrounding environment, that is, when the file type that may involve privacy (the type of file that the user has encrypted and set, refers to pictures or videos in the present invention) is being browsed Or when watching, start listening to the sound of the surrounding environment to determine whether there is a file encryption command (code word) sent by the owner user. For example, the owner user has set a file encryption command (code word) before, and the content of the command is: cough three time...

Embodiment 2

[0058] image 3 It shows the flow of the file encryption method applied to electronic equipment provided by the second embodiment of the present invention. For the convenience of description, only the parts related to the embodiment of the present invention are listed, and the details are as follows:

[0059] As a preferred embodiment of the present invention, step S30 includes:

[0060] Step S301, comparing the acquired facial features with the preset user's facial features;

[0061] Step S302: Encrypt the preset encrypted file in the electronic device when the preset user issues a file encryption instruction and the similarity between the acquired facial features and the preset user's facial features is less than a preset similarity threshold.

[0062] In the embodiment of the present invention, when the similarity between the acquired facial features and the preset user's facial features is less than the preset similarity threshold, the user who uses the electronic device ...

Embodiment 3

[0064] Figure 4 It shows the flow of the file encryption method applied to electronic equipment provided by the third embodiment of the present invention. For the convenience of description, only the parts related to the embodiment of the present invention are listed, and the details are as follows:

[0065] As a preferred embodiment of the present invention, after step S30, the following steps are further included:

[0066] Step S40, detecting whether the preset user issues a file decryption command, and reacquiring the facial features of the current user;

[0067] Step S50, when the predetermined user issues a file decryption instruction, and the similarity between the re-acquired facial features and the preset facial features is greater than the preset similarity threshold, decrypt the preset encrypted file in the electronic device.

[0068] The embodiment of the present invention mainly performs encryption processing after encrypting the preset encrypted file, and decryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of encryption, and provides a method for encrypting a file and electronic equipment. According to the method, whether a preset user sends a file encrypting command or not is detected; the face features of the current user are acquired; the preset encryption file in the electronic equipment is encrypted according to the face features of the preset user and the acquired face features and file encrypting command. Therefore, when other people use the electronic equipment of the user, the user can encrypt the private file of the electronic equipment used by other people through a command, the privacy safety of the user is ensured, and the use experience of the user is improved.

Description

technical field [0001] The invention belongs to the field of encryption, in particular to a file encryption method and electronic equipment. Background technique [0002] As a way to ensure data security, encryption is not unique now. It has a long history. It originated in 2000 BC (several centuries), although it is not what we are talking about now. Encryption (not even called encryption), but as a concept of encryption, it was born centuries ago. The Egyptians were the first to use special hieroglyphs to encode messages, and over time Babylonian, Mesopotamian, and Greek civilizations all began using methods to protect their written messages. [0003] At present, private photos or videos are generally stored on electronic devices. When electronic devices are used by others, it is easy to cause privacy leakage, which brings great physical and mental distress to users. Contents of the invention [0004] The purpose of the embodiment of the present invention is to provide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06F21/62
CPCG06F21/32G06F21/62G06F2221/2107
Inventor 刘勇
Owner BEIJING CHUANGXIN JOURNEY NETWORK TECH CO LTD