File encryption method, terminal and computer readable storage medium

A file encryption and terminal technology, applied in computer security devices, calculations, instruments, etc., can solve problems affecting user experience, threatening the privacy and confidentiality of files to be encrypted, and prolonging the display time of files to be encrypted, so as to avoid being leaked The possibility of saving users' time and ensuring privacy and confidentiality

Inactive Publication Date: 2018-04-06
NUBIA TECHNOLOGY CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The entire encryption process involves multi-level page jumps, and many steps are required, which seriously affects the user experience
At the same time, for the method that requires the user to control the terminal to enter the display interface of the file content to select the file encryption function, entering the display interface of the file content will prolong the display time of the file to be encrypted, which seriously threatens the privacy of the file to be encrypted during the entire encryption process sex and confidentiality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption method, terminal and computer readable storage medium
  • File encryption method, terminal and computer readable storage medium
  • File encryption method, terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0066] In order to simplify the file encryption process, improve user experience, and improve the privacy and confidentiality of files during the file encryption process, this embodiment provides a file encryption method. see figure 2 , figure 2 The basic flowchart of the file encryption method provided in this embodiment includes:

[0067] S201: When a gesture operation acting on the target file icon is received, check whether the gesture operation matches the preset encryption trigger gesture; if yes, go to step S202; otherwise, end.

[0068] In this embodiment, for the terminal, the collection of gesture operations can be realized through the touch screen installed on the terminal. After the touch screen collects the user's gesture operation track on the touch screen, the The collected gesture operation information is fed back to the processor, and the processor compares it with various preset gesture operations in the terminal, so as to obtain instruction information c...

no. 2 example

[0099]This embodiment is based on the first embodiment, taking a case where there is a user identity verification process, and the file encryption process includes providing and displaying an encryption confirmation interface as an example to further illustrate the present invention.

[0100] The default encryption trigger gesture is set as the icon long press gesture, and the terminal adopts screen fingerprint recognition technology.

[0101] see Figure 12 , Figure 12 It is a detailed flow chart of a file encryption method provided in the second embodiment of the present invention. The file encryption method includes:

[0102] S1201: Obtain the fingerprint of the finger performing the gesture operation while receiving the long press operation acting on the target file icon;

[0103] S1202: Detect whether the fingerprint is a registered fingerprint; if so, go to step S1203; otherwise, exit the file encryption process.

[0104] It should be understood that when the termina...

no. 3 example

[0111] This embodiment also provides a terminal, see Figure 13 As shown, it includes a processor 131, a memory 132 and a communication bus 133, wherein:

[0112] The communication bus 133 is used to realize connection and communication between the processor 131 and the memory 132;

[0113] The processor 131 is used to execute one or more programs stored in the memory 132, so as to realize the following steps:

[0114] When receiving a gesture operation acting on the icon of the target file, detect whether the gesture operation matches the preset encryption trigger gesture; if they match, trigger the file encryption process, and perform file encryption on the file corresponding to the target file icon according to the file encryption process Encryption processing.

[0115] In this embodiment, for the terminal, the collection of gesture operations can be realized through the touch screen installed on the terminal. After the touch screen collects the user's gesture operation t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file encryption method and terminal and a computer readable storage medium. When a gesture operation acting on a target file icon is received, whether or not the gesture is apreset encryption trigger gesture is detected, if the gesture operation is the preset encryption trigger gesture, a file encryption process is triggered, and according to the file encryption process,the file corresponding to the target file icon is encrypted. In this way, when a user performs the file encryption, the file encryption can be directly achieved by conducting a direct specific gesture operation on the file icon of the current display interface, multi-level page turns are not needed, required operation steps are less, the user's time is saved, and the user experience is better; meanwhile, because the operation is conducted on the file icon, the display interface of a file content is not accessed, which fully guarantees privacy and confidentiality of the file in the file encryption process, and avoids possibility of the file being revealed in the file encryption process.

Description

technical field [0001] The present invention relates to the technical field of terminals, and more specifically, to a file encryption method, a terminal and a computer-readable storage medium. Background technique [0002] With the continuous development of electronic information technology, terminals have entered thousands of households and become an indispensable part of people's daily life. As the most intimate electronic device for people, the terminal often stores a large number of private files of the user, and these private files often have strong privacy, which gives birth to the file encryption function of the terminal. [0003] Currently, before using the file encryption function, the user needs to control the terminal to enter the file selection interface, and then select the file to be encrypted, or the user needs to control the terminal to enter the display interface of the file content, and then the file encryption function and the encryption method can be sele...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/32
CPCG06F21/32G06F21/602G06F21/6245G06F2221/2107G06F2221/2133
Inventor 黄旭
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products