CN106612376A - Mobile terminal and file processing method thereof - Google Patents
Mobile terminal and file processing method thereof Download PDFInfo
- Publication number
- CN106612376A CN106612376A CN201611227734.9A CN201611227734A CN106612376A CN 106612376 A CN106612376 A CN 106612376A CN 201611227734 A CN201611227734 A CN 201611227734A CN 106612376 A CN106612376 A CN 106612376A
- Authority
- CN
- China
- Prior art keywords
- file
- mobile terminal
- operation event
- module
- type
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 17
- 238000001514 detection method Methods 0.000 claims abstract description 11
- 238000000034 method Methods 0.000 claims description 33
- 238000004891 communication Methods 0.000 description 21
- 238000000605 extraction Methods 0.000 description 15
- 230000006870 function Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 10
- 238000012545 processing Methods 0.000 description 6
- 230000005236 sound signal Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000005192 partition Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 101150012579 ADSL gene Proteins 0.000 description 1
- 102100020775 Adenylosuccinate lyase Human genes 0.000 description 1
- 108700040193 Adenylosuccinate lyases Proteins 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000003909 pattern recognition Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001629 suppression Effects 0.000 description 1
- 239000010409 thin film Substances 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a mobile terminal and a file processing method thereof. The mobile terminal comprises a detection module which is used for detecting an operation event for a file in the mobile terminal, a judgment module which is used for determining the preset operation event type of the operation event, and a control module which is used for encrypting the file if the judgment module judges that the operation event belongs to the first type of preset operation event. After the file is encrypted, the first type of preset operation corresponding to the operation event is carried out for the encrypted file. According to the technical scheme of the invention, automatic file encryption is realized; the user experience is promoted; and the security of data information can be improved.
Description
Technical Field
The invention relates to the technical field of communication, in particular to a mobile terminal and a file processing method thereof.
Background
With the development of science and technology, electronic files are used more and more frequently, so that the information security of the electronic files is more and more important. At present, the method for protecting important electronic files is to backup the important files, set passwords for the important electronic files at the same time, and manually input the set passwords by a user when the electronic files are opened. However, the operation of manually setting the important backup file password by the user is troublesome, the set software password is easy to crack, the password is easy to forget after a long time, the safety index of the electronic file information is low, and the electronic file information is easy to steal.
Disclosure of Invention
In view of this, the present invention is expected to provide a mobile terminal and a file processing method thereof, which can automatically encrypt a file, and improve the user experience and the security of file information.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
an embodiment of the present invention provides a mobile terminal, including:
the detection module is used for detecting an operation event aiming at a file in the mobile terminal;
the judging module is used for judging the type of the preset operation event to which the operation event belongs;
the control module is used for encrypting the file if the judging module judges that the operation event belongs to a first type of preset operation event; and after the encryption of the file is finished, executing a first type of preset operation corresponding to the operation event aiming at the encrypted file.
In the foregoing scheme, optionally, the control module is further configured to: and after the file is encrypted, storing the encryption key into a user identity identification module of the mobile terminal.
In the foregoing scheme, optionally, the control module is further configured to: if the judging module judges that the operation event belongs to a second type of preset operation event, decrypting the file; and after the file is successfully decrypted, executing a second type of preset operation corresponding to the operation event aiming at the decrypted file.
In the foregoing scheme, optionally, the control module is further configured to: extracting a decryption key corresponding to the file from a user identity identification module of the mobile terminal;
and if the decryption key is successfully matched with the encryption key corresponding to the file, completing the decryption operation of the file based on the decryption key.
In the foregoing solution, optionally, the mobile terminal further includes:
the prompting module is used for outputting a prompting message;
the control module is further configured to detect whether a user identity recognition module is present in the mobile terminal, and if not, notify the prompt module to output a prompt message.
The embodiment of the invention also provides a file processing method which is applied to the mobile terminal and comprises the following steps:
detecting an operation event aiming at a file in the mobile terminal;
judging the type of a preset operation event to which the operation event belongs;
if the operation event is judged to belong to a first type of preset operation event, encrypting the file; and after the encryption of the file is finished, executing a first type of preset operation corresponding to the operation event aiming at the encrypted file.
In the foregoing solution, optionally, after the encrypting the file is completed, the method further includes:
and storing the encryption key into a user identity identification module of the mobile terminal.
In the foregoing scheme, optionally, the method further includes:
if the operation event is judged to belong to a second type of preset operation event, decrypting the file; and after the file is successfully decrypted, executing a second type of preset operation corresponding to the operation event aiming at the decrypted file.
In the foregoing scheme, optionally, the decrypting the file includes:
extracting a decryption key corresponding to the file from a user identity identification module of the mobile terminal;
and if the decryption key is successfully matched with the encryption key corresponding to the file, completing the decryption operation of the file based on the decryption key.
In the foregoing solution, optionally, before decrypting the file, the method further includes:
and detecting whether a user identity identification module exists in the mobile terminal, and if not, outputting a prompt message.
The mobile terminal and the file processing method thereof provided by the embodiment of the invention detect the operation event aiming at the file in the mobile terminal; judging the type of a preset operation event to which the operation event belongs; if the operation event is judged to belong to a first type of preset operation event, encrypting the file; and after the encryption of the file is finished, executing a first type of preset operation corresponding to the operation event aiming at the encrypted file. By adopting the technical scheme of the embodiment of the invention, the file can be automatically encrypted, the problem of complicated operation of manually setting the file password is solved, and the user experience is improved and the safety of the file information can be improved.
Drawings
Fig. 1 is a schematic hardware configuration diagram of an alternative mobile terminal implementing various embodiments of the present invention;
FIG. 2 is a diagram of a wireless communication system for the mobile terminal shown in FIG. 1;
fig. 3 is a schematic flow chart illustrating an implementation of a file processing method according to an embodiment of the present invention;
FIG. 4 is a schematic diagram illustrating an implementation flow of another file processing method according to an embodiment of the present invention;
fig. 5 is a schematic flow chart illustrating an implementation process of encrypting a backup file by a mobile terminal according to an embodiment of the present invention;
fig. 6 is a schematic diagram of an implementation flow of decrypting a backup file by a mobile terminal according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a control module shown in fig. 7 according to an embodiment of the present invention.
Detailed Description
So that the manner in which the features and aspects of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings.
A terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the description of the embodiments of the present invention, and have no specific meaning in themselves. Thus, "module", "component" or "unit" may be used mixedly.
The terminal may be implemented in various forms. For example, the terminal described in the embodiments of the present invention may include terminals such as a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a Personal Digital Assistant (PDA), a tablet computer (PAD), a Portable Multimedia Player (PMP), a navigation device, and the like, and fixed terminals such as a digital TV, a desktop computer, and the like. In the following, it is assumed that the terminal is a mobile terminal. However, it will be understood by those skilled in the art that the configuration according to the embodiment of the present invention can be applied to a fixed type terminal in addition to elements particularly used for moving purposes.
Fig. 1 is a schematic hardware configuration of a mobile terminal implementing various embodiments of the present invention.
The mobile terminal 100 may include an audio/video (a/V) input unit 120, a user input unit 130, an output unit 150, a memory 160, an interface unit 170, a controller 180, and a power supply unit 190, and the like. Fig. 1 illustrates a mobile terminal having various components, but it is to be understood that not all illustrated components are required to be implemented. More or fewer components may alternatively be implemented. Elements of the mobile terminal will be described in detail below.
The a/V input unit 120 is used to receive an audio or video signal. The a/V input unit 120 may include a camera 121 and a microphone 1220, and the camera 121 processes image data of still pictures or video obtained by an image capturing apparatus in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 151. The image frames processed by the camera 121 may be stored in the memory 160 (or other storage medium), and two or more cameras 1210 may be provided according to the construction of the mobile terminal. The microphone 122 may receive sounds (audio data) via the microphone in a phone call mode, a recording mode, a voice recognition mode, or the like, and can process such sounds into audio data. The microphone 122 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The user input unit 130 may generate key input data according to a command input by a user to control various operations of the mobile terminal. The user input unit 130 allows a user to input various types of information, and may include a keyboard, dome sheet, touch pad (e.g., a touch-sensitive member that detects changes in resistance, pressure, capacitance, and the like due to being touched), scroll wheel, joystick, and the like. In particular, when the touch pad is superimposed on the display unit 151 in the form of a layer, a touch screen may be formed.
The interface unit 170 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The identification Module may store various information for authenticating a User using the mobile terminal 100 and may include a User Identity Module (UIM), a Subscriber Identity Module (SIM), a Universal Subscriber Identity Module (USIM), and the like. In addition, a device having an identification module (hereinafter, referred to as an "identification device") may take the form of a smart card, and thus, the identification device may be connected with the mobile terminal 100 via a port or other connection means. The interface unit 170 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal and the external device.
In addition, when the mobile terminal 100 is connected with an external cradle, the interface unit 170 may serve as a path through which power is supplied from the cradle to the mobile terminal 100 or may serve as a path through which various command signals input from the cradle are transmitted to the mobile terminal. Various command signals or power input from the cradle may be used as signals for recognizing whether the mobile terminal is accurately mounted on the cradle. The output unit 150 is configured to provide output signals (e.g., audio signals, video signals, alarm signals, vibration signals, etc.) in a visual, audio, and/or tactile manner. The output unit 150 may include a display unit 151, an audio output module 152, an alarm unit 153, and the like.
The display unit 151 may display information processed in the mobile terminal 100. For example, when the mobile terminal 100 is in a phone call mode, the display unit 151 may display a User Interface (UI) or a Graphical User Interface (GUI) related to a call or other communication (e.g., text messaging, multimedia file downloading, etc.). When the mobile terminal 100 is in a video call mode or an image capturing mode, the display unit 151 may display a captured image and/or a received image, a UI or GUI showing a video or an image and related functions, and the like.
Meanwhile, when the display unit 151 and the touch pad are overlapped with each other in the form of a layer to form a touch screen, the display unit 151 may serve as an input device and an output device. The Display unit 151 may include at least one of a Liquid Crystal Display (LCD), a Thin Film Transistor LCD (TFT-LCD), an Organic Light-Emitting Diode (OLED) Display, a flexible Display, a three-dimensional (3D) Display, and the like. Some of these displays may be configured to be transparent to allow a user to see from the outside, which may be referred to as transparent displays, and a typical transparent display may be, for example, a Transparent Organic Light Emitting Diode (TOLED) display or the like. Depending on the particular desired implementation, the mobile terminal 100 may include two or more display units (or other display devices), for example, the mobile terminal may include an external display unit (not shown) and an internal display unit (not shown). The touch screen may be used to detect a touch input pressure as well as a touch input position and a touch input area.
The audio output module 152 may convert audio data received by the wireless communication unit 110 or stored in the memory 160 into an audio signal and output as sound when the mobile terminal is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output module 152 may provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output module 152 may include a speaker, a buzzer, and the like.
The alarm unit 153 may provide an output to notify the mobile terminal 100 of the occurrence of an event. Typical events may include call reception, message reception, key signal input, touch input, and the like. In addition to audio or video output, the alarm unit 153 may provide output in different ways to notify the occurrence of an event. For example, the alarm unit 153 may provide an output in the form of vibration, and when a call, a message, or some other incoming communication (communicating communication) is received, the alarm unit 153 may provide a tactile output (i.e., vibration) to inform the user thereof. By providing such a tactile output, the user can recognize the occurrence of various events even when the user's mobile phone is in the user's pocket. The alarm unit 153 may also provide an output notifying the occurrence of an event via the display unit 151 or the audio output module 152.
The memory 160 may store software programs or the like for processing and controlling operations performed by the controller 180, or may temporarily store data (e.g., a phonebook, messages, still images, videos, etc.) that has been output or is to be output. Also, the memory 160 may store data regarding various ways of vibration and audio signals output when a touch is applied to the touch screen.
The Memory 160 may include at least one type of storage medium including a flash Memory, a hard disk, a multimedia card, a card-type Memory (e.g., SD or DX Memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic Memory, a magnetic disk, an optical disk, etc. Also, the mobile terminal 100 may cooperate with a network storage device that performs a storage function of the memory 160 through a network connection.
The controller 180 generally controls the overall operation of the mobile terminal. For example, the controller 180 performs control and processing related to voice calls, data communications, video calls, and the like. In addition, the controller 180 may include a multimedia module 181 for reproducing (or playing back) multimedia data, and the multimedia module 181 may be constructed within the controller 180 or may be constructed separately from the controller 180. The controller 180 may perform a pattern recognition process to recognize a handwriting input or a picture drawing input performed on the touch screen as a character or an image.
The power supply unit 190 receives external power or internal power and provides appropriate power required to operate various elements and components under the control of the controller 180.
The various embodiments described herein may be implemented in a computer-readable medium using, for example, computer software, hardware, or any combination thereof. For a hardware implementation, the embodiments described herein may be implemented using at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a processor, a controller, a microcontroller, a microprocessor, and an electronic unit designed to perform the functions described herein, and in some cases, such embodiments may be implemented in the controller 180. For a software implementation, the implementation such as a process or a function may be implemented with a separate software module that allows performing at least one function or operation. The software codes may be implemented by software applications (or programs) written in any suitable programming language, which may be stored in the memory 160 and executed by the controller 180.
Up to now, the mobile terminal has been described in terms of its functions. Hereinafter, a slide-type mobile terminal among various types of mobile terminals, such as a folder-type, bar-type, swing-type, slide-type mobile terminal, and the like, will be described as an example for the sake of brevity. Accordingly, the present invention can be applied to any type of mobile terminal, and is not limited to a slide type mobile terminal.
The mobile terminal 100 as shown in fig. 1 may be configured to operate with communication systems such as wired and wireless communication systems and satellite-based communication systems that transmit data via frames or packets.
A communication system in which a mobile terminal according to an embodiment of the present invention is operable will now be described with reference to fig. 2.
Such communication systems may use different air interfaces and/or physical layers. For example, the air interface used by the communication System includes, for example, Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Universal Mobile Telecommunications System (UMTS) (in particular, Long Term Evolution (LTE)), global System for Mobile communications (GSM), and the like. By way of non-limiting example, the following description relates to a CDMA communication system, but such teachings are equally applicable to other types of systems.
Referring to fig. 2, the CDMA wireless communication system may include a plurality of Mobile terminals 100, a plurality of Base Stations (BSs) 270, a Base Station Controller (BSC) 275, and a Mobile Switching Center (MSC) 280. The MSC280 is configured to interface with a Public Switched Telephone Network (PSTN) 290. The MSC280 is also configured to interface with a BSC275, which may be coupled to the base station 270 via a backhaul. The backhaul may be constructed according to any of several known interfaces including, for example, E1/T1, ATM, IP, PPP, frame Relay, HDSL, ADSL, or xDSL. It will be understood that a system as shown in fig. 2 may include multiple BSCs 275.
Each BS270 may serve one or more sectors (or regions), each sector covered by a multi-directional antenna or an antenna pointing in a particular direction being radially distant from the BS 270. Alternatively, each partition may be covered by two or more antennas for diversity reception. Each BS270 may be configured to support multiple frequency allocations, with each frequency allocation having a particular frequency spectrum (e.g., 1.25MHz, 5MHz, etc.).
The intersection of partitions with frequency allocations may be referred to as a CDMA channel. The BS270 may also be referred to as a Base Transceiver Subsystem (BTS) or other equivalent terminology. In such a case, the term "base station" may be used to generically refer to a single BSC275 and at least one BS 270. The base stations may also be referred to as "cells". Alternatively, each sector of a particular BS270 may be referred to as a plurality of cell sites.
As shown in fig. 2, a Broadcast Transmitter (BT) 295 transmits a Broadcast signal to the mobile terminal 100 operating within the system. A broadcast receiving module 111 as shown in fig. 1 is provided at the mobile terminal 100 to receive a broadcast signal transmitted by the BT 295. In fig. 2, several Global Positioning System (GPS) satellites 300 are shown. The satellite 300 assists in locating at least one of the plurality of mobile terminals 100.
In fig. 2, a plurality of satellites 300 are depicted, but it is understood that useful positioning information may be obtained with any number of satellites. The GPS module 115 as shown in fig. 1 is generally configured to cooperate with satellites 300 to obtain desired positioning information. Other techniques that can track the location of the mobile terminal may be used instead of or in addition to GPS tracking techniques. In addition, at least one GPS satellite 300 may selectively or additionally process satellite DMB transmission.
As a typical operation of the wireless communication system, the BS270 receives reverse link signals from various mobile terminals 100. The mobile terminal 100 is generally engaged in conversations, messaging, and other types of communications. Each reverse link signal received by a particular base station 270 is processed within the particular BS 270. The obtained data is forwarded to the associated BSC 275. The BSC provides call resource allocation and mobility management functions including coordination of soft handoff procedures between BSs 270. The BSCs 275 also route the received data to the MSC280, which provides additional routing services for interfacing with the PSTN 290. Similarly, the PSTN290 interfaces with the MSC280, the MSC interfaces with the BSCs 275, and the BSCs 275 accordingly control the BS270 to transmit forward link signals to the mobile terminal 100.
Based on the above mobile terminal hardware structure and communication system, various embodiments of the present invention are proposed.
Example one
Fig. 3 is a schematic view of an implementation flow of a file processing method according to an embodiment of the present invention, which is applied to a mobile terminal, and as shown in fig. 3, the control method mainly includes the following steps:
step 301: and detecting an operation event aiming at the file in the mobile terminal.
In this embodiment, the file includes, but is not limited to:
text files, picture files, video files, audio files.
Here, the operation event refers to an event corresponding to an operation on a file.
Here, the operations include, but are not limited to:
transfer, copy, backup.
Step 302: and judging the type of the preset operation event to which the operation event belongs.
In this embodiment, the preset operation event type at least includes:
the method comprises a first type of preset operation event and a second type of preset operation event.
And when the mobile terminal executes the first type of preset operation event, the file needs to be encrypted.
And when the mobile terminal executes the second type of preset operation event, the file needs to be decrypted.
Step 303: if the operation event is judged to belong to a first type of preset operation event, encrypting the file; and after the encryption of the file is finished, executing a first type of preset operation corresponding to the operation event aiming at the encrypted file.
As an embodiment, when the operation event is a backup operation, the file is automatically encrypted; and after the encryption of the file is finished, executing backup operation on the encrypted file.
As an embodiment, when the operation event is a transfer operation, the file is automatically encrypted; and after the encryption of the file is finished, carrying out transmission operation on the encrypted file.
As an embodiment, when the operation event is a copy operation, automatically encrypting the file; after the encryption of the file is completed, a copy operation is performed on the encrypted file.
Therefore, when the operation event which belongs to the first type of preset operation event and aims at the file is detected, the file is automatically encrypted, the complex operation of manually setting the file password is avoided, and the use experience of a user is improved.
In the foregoing solution, optionally, after the encrypting the file is completed, the method further includes:
and storing the encryption key into a user identity identification module of the mobile terminal.
Therefore, the encryption key is stored in the user identity identification module of the mobile terminal, the information security of the file can be improved, and the problem that the encrypted file cannot be opened due to the fact that the user forgets the password can be avoided.
In this embodiment, the user identity module includes but is not limited to:
SIM card, USIM card.
Here, the SIM is an abbreviation of Subscriber Identity Module, and the USIM is an abbreviation of universal Subscriber Identity Module, where the abbreviation is global Subscriber Identity Module.
The file processing method provided by the embodiment of the invention detects the operation event aiming at the file in the mobile terminal; judging the type of a preset operation event to which the operation event belongs; if the operation event is judged to belong to a first type of preset operation event, encrypting the file; and after the encryption of the file is finished, executing a first type of preset operation corresponding to the operation event aiming at the encrypted file. By adopting the technical scheme of the embodiment of the invention, the backup file can be automatically encrypted, the problem of complicated operation of manually setting the password of the backup file is solved, and the user experience is improved and the safety of the file information can be improved.
Example two
Fig. 4 is a schematic flowchart of another file processing method according to an embodiment of the present invention, and as shown in fig. 4, the flowchart includes:
step 401: and detecting an operation event aiming at the file in the mobile terminal.
In this embodiment, the file includes, but is not limited to:
text files, picture files, video files, audio files.
Here, the operation event refers to an event corresponding to an operation on a file.
Here, the operations include, but are not limited to:
and opening and editing.
Step 402: and judging the type of the preset operation event to which the operation event belongs.
In this embodiment, the preset operation event type at least includes:
the method comprises a first type of preset operation event and a second type of preset operation event.
And when the mobile terminal executes the first type of preset operation event, the file needs to be encrypted.
And when the mobile terminal executes the second type of preset operation event, the file needs to be decrypted.
Step 403: if the operation event is judged to belong to a second type of preset operation event, decrypting the file; and after the file is successfully decrypted, executing a second type of preset operation corresponding to the operation event aiming at the decrypted file.
As an embodiment, when the operation event is an open operation, decrypting the file; and after the file is successfully decrypted, allowing the decrypted file to execute an opening operation.
In one embodiment, when the operation event is an editing operation, decrypting the file; and after the file is successfully decrypted, allowing the decrypted file to execute editing operation.
As an embodiment, the decrypting the file includes:
extracting a decryption key corresponding to the file from a user identity identification module of the mobile terminal;
and if the decryption key is successfully matched with the encryption key corresponding to the file, completing the decryption operation of the file based on the decryption key.
Here, the encryption key and the decryption key may be the same; alternatively, the encryption key and the decryption key are a pair of keys that can be paired, for example, when the file a is encrypted by using the encryption key a, the file a can be decrypted by using the decryption key a'; wherein the encryption key A and the decryption key A' are a pair of paired keys.
Therefore, the file decryption operation is performed on the basis of the decryption key extracted from the user identity identification module of the mobile terminal, so that the information security of the file can be improved, and the problem that the encrypted file cannot be opened due to the fact that the user forgets the password can be avoided.
Further, optionally, before decrypting the file, the method further includes:
and detecting whether a user identity identification module exists in the mobile terminal, and if not, outputting a prompt message.
As an embodiment, the decrypting the file further includes:
and if the decryption key corresponding to the file is not extracted from the user identity identification module of the mobile terminal within a preset time period, outputting a second prompt message.
And the second prompt message is used for prompting the user that the decryption key is overtime, and asking the user to confirm whether the user identity identification module in the mobile terminal is correct or not.
As an embodiment, the decrypting the file further includes:
and if the decryption key corresponding to the file is extracted from the user identity identification module of the mobile terminal, but the decryption key fails to be matched with the encryption key corresponding to the file, outputting a third prompt message.
And the third prompt message is used for prompting the user to replace the user identity identification module in the mobile terminal.
Here, the output modes of the second and third presentation information include, but are not limited to, the following modes:
voice prompt, short message, email.
Of course, the output mode of the prompt message can be set by the user according to the use requirement.
Therefore, the user can know the prompt message in time, and the user can check the reason of unsuccessful decryption according to the prompt message.
The file processing method provided by the embodiment of the invention detects the operation event aiming at the file in the mobile terminal; judging the type of a preset operation event to which the operation event belongs; if the operation event is judged to belong to a second type of preset operation event, decrypting the file; and after the file is successfully decrypted, executing a second type of preset operation corresponding to the operation event aiming at the decrypted file. Therefore, the file decryption operation is performed on the basis of the decryption key extracted from the user identity identification module of the mobile terminal, so that the information security of the file can be improved, and the problem that the encrypted file cannot be opened due to the fact that the user forgets the password can be avoided.
EXAMPLE III
Fig. 5 is a schematic diagram of a process of encrypting a backup file by a mobile terminal according to an embodiment of the present invention, where as shown in fig. 5, the process mainly includes:
step 501: detecting an operation event aiming at a file in the mobile terminal in real time, and then executing a step 502;
step 502: judging whether the operation event belongs to a first preset event operation type, if so, executing a step 503; otherwise, returning to step 501;
step 503: automatically encrypting the file and then performing step 504;
step 504: after the encryption of the file is finished, executing a first type of preset operation corresponding to the operation event aiming at the encrypted file;
step 505: and after the file is encrypted, storing the encryption key into a user identity identification module of the mobile terminal.
It should be noted that, in this embodiment, the step 504 and the step 505 may be performed synchronously.
For example, an operation event for a file in the mobile terminal is detected in real time, whether the operation corresponding to the operation event has an operation of copying or uploading the file (such as uploading to the cloud) is judged, and if so, the copied or transmitted file is automatically encrypted; after the file encryption is finished, copying or uploading is carried out, and the copied or transmitted file is an encrypted file; and storing the encryption key in a Subscriber Identity Module (SIM) card of the mobile terminal.
The file processing method provided by the embodiment of the invention can automatically encrypt the file, solves the problem of complicated operation when the backup file password is manually set, and can improve the user experience and the safety of file information.
Example four
Fig. 6 is a schematic diagram of an implementation process of decrypting a backup file by a mobile terminal according to an embodiment of the present invention, and as shown in fig. 6, the process mainly includes:
step 601: detecting an operation event aiming at a file in the mobile terminal in real time, and then executing step 602;
step 602: judging whether the operation event belongs to a second preset event operation type, if so, executing step 603; otherwise, returning to the step 601;
step 603: detecting whether the mobile terminal is inserted into the user identity identification module, if so, executing step 604; otherwise, go to step 607;
step 604: extracting an encryption key from the mobile terminal, and then executing step 605;
step 605: judging whether the extraction time of the encryption key is overtime, if so, executing step 606; otherwise, go to step 608;
step 606: judging whether the extracted encryption key is matched with the encryption key of the file, if so, executing step 609; otherwise, go to step 610;
step 607: prompting a user to insert a user identity identification module and not allowing the encrypted file to be opened; then ending the whole control flow;
step 608: prompting the user that the key is overtime, and asking for confirming whether the user identity identification module is correctly inserted; then the whole control flow is ended;
step 609: automatically decrypting and opening the file, and then finishing the whole control flow;
step 610: reminding the user to replace the correct user identity recognition module, and then ending the whole control flow.
For example, an operation event aiming at a file in the mobile terminal is detected in real time, whether an operation of requesting to open the file exists in the operation corresponding to the operation event is judged, if yes, whether the mobile terminal is inserted into an SIM card is detected, if yes, an encryption key is extracted from the SIM card, and if the extracted key is matched with the encryption key of the file, the file is automatically opened.
According to the file processing method provided by the embodiment of the invention, the file is decrypted based on the decryption key extracted from the user identity identification module of the mobile terminal, so that the information security of the file can be improved, and the problem that the encrypted file cannot be opened due to the fact that a user forgets a password can be avoided.
EXAMPLE five
An embodiment of the present invention provides a mobile terminal, fig. 7 is a schematic diagram of a composition structure of the mobile terminal provided in the embodiment of the present invention, and as shown in fig. 7, the mobile terminal includes: a detection module 71, a judgment module 72 and a control module 73; wherein,
the detection module 71 is configured to detect an operation event for a file in the mobile terminal;
the judging module 72 is configured to judge a preset operation event type to which the operation event belongs;
the control module 73 is configured to encrypt the file if the determining module 72 determines that the operation event belongs to a first type of preset operation event; and after the encryption of the file is finished, executing a first type of preset operation corresponding to the operation event aiming at the encrypted file.
As an alternative embodiment, the control module 73 is further configured to: and after the file is encrypted, storing the encryption key into a user identity identification module of the mobile terminal.
As an alternative embodiment, the control module 73 is further configured to: if the judging module 72 judges that the operation event belongs to a second type of preset operation event, decrypting the file; and after the file is successfully decrypted, executing a second type of preset operation corresponding to the operation event aiming at the decrypted file.
As an alternative embodiment, the control module 73 is further configured to: extracting a decryption key corresponding to the file from a user identity identification module of the mobile terminal;
and if the decryption key is successfully matched with the encryption key corresponding to the file, completing the decryption operation of the file based on the decryption key.
Further optionally, the mobile terminal further includes:
a prompt module 74 for outputting a prompt message;
the control module 73 is further configured to detect whether there is a user identification module in the mobile terminal, and if not, notify the prompt module 74 to output a prompt message.
Those skilled in the art should understand that the functions of the modules in the mobile terminal of the present embodiment can be understood by referring to the related description of the foregoing file processing method.
In practical applications, the specific structures of the detecting module 71, the determining module 72, the controlling module 73, and the prompting module 74 may all correspond to a processor. The specific structure of the processor may be a Central Processing Unit (CPU), a Micro Controller Unit (MCU), a Digital Signal Processor (DSP), a Programmable Logic Controller (PLC), or other electronic components or a collection of electronic components having a processing function. The processor includes executable codes, the executable codes are stored in a storage medium, the processor can be connected with the storage medium through a communication interface such as a bus, and when the corresponding functions of specific units are executed, the executable codes are read from the storage medium and executed. The portion of the storage medium used to store the executable code is preferably a non-transitory storage medium. The executable code is used for executing the control method described in the above embodiments.
This embodiment mobile terminal can carry out automatic encryption to the backup file, has solved the problem of the loaded down with trivial details operation of manual setting backup file password, when promoting user experience, can also improve the security of file information, also can avoid the user because of forgetting the problem that the password leads to can't open the encryption file.
EXAMPLE six
Based on the mobile terminal in the fifth embodiment, this embodiment provides a schematic structural diagram of a control module, where the control module 73 includes: a file encryption unit 731, a SIM card detection unit 732, a file decryption unit 733, and a key extraction unit 734;
the detection module 71 is responsible for detecting file event operation types, such as file copy, file upload (e.g., uploading to the cloud), file open, and other events. When detecting that the file copy, file transfer and other events occur, sending a file encryption request to the file encryption unit 731; when an event such as file opening is detected, a trigger signal is generated to the SIM card detection unit 732.
Wherein the file encrypting unit 731: mainly executes the encryption operation of copying and uploading files. Specifically, if a file encryption request is received from the detection module 71, the copied and transmitted file is automatically encrypted, and then copied or transmitted after the file encryption is completed, and the copied or transmitted file is an encrypted file and the encryption key is stored in the SIM card of the mobile terminal.
The SIM card detection unit 732 mainly detects whether a SIM card is inserted into the mobile terminal. When receiving a trigger signal sent by the detection module 71, detecting whether the mobile terminal is inserted into the SIM, and if the mobile terminal is not inserted into the SIM, sending a message that the SIM card is not inserted to the prompt module 74; if the mobile terminal has inserted the SIM card, the file decryption request information is transmitted to the file decryption unit 733.
The file decryption unit 733 mainly performs a decryption operation for a file requested to be opened. When receiving a file decryption request from the SIM card detecting unit 732, determining whether the file is a key-encrypted file, and if not, directly opening the file; otherwise, a key extraction instruction is sent to the key extraction unit 734, an internal timer starts timing, if the key information of the key extraction unit 734 is received within time T (T is a software-set key extraction time threshold) after the key extraction instruction is sent, the key information is matched, if the matching is successful, the file is automatically decrypted and the file is opened, otherwise, key mismatch information is sent to the prompt module 74 and the key encrypted file is not allowed to be opened; if the feedback key information from the key extraction unit 734 is not received after the timer reaches T (T is the threshold of the time for extracting the key set by the software), a key extraction failure message is sent to the prompt module 74 and the key encrypted file is not allowed to be opened.
The key extraction unit 734 mainly implements a function of extracting key information from the SIM card. When the key extraction unit 734 receives the key extraction instruction from the file decryption unit 733, key information is extracted from the SIM card, and the key information is transmitted to the file decryption unit 733 after the key extraction is successful.
The prompting module 74 primarily recognizes the received information and alerts the user based on the content of the information. For example, if the information is that the SIM card is not inserted, a prompt "please insert the SIM" is prompted on the user interface; if the information is the information of key mismatch, prompting 'key mismatch, please change the correct SIM card' on the user interface; if the key extraction fails, prompting 'key extraction overtime, please confirm SIM correct insertion' on the user interface.
The mobile terminal can automatically encrypt the backup file and store the encryption key in an SIM card of the mobile terminal; meanwhile, the secret key is stored in the SIM card, so that the information security of the backup file can be improved, and the problems that the encrypted file cannot be opened due to the fact that the user forgets the password and the like are avoided.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media capable of storing program codes, such as a removable Memory device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, and an optical disk.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
Claims (10)
1. A mobile terminal, characterized in that the mobile terminal comprises:
the detection module is used for detecting an operation event aiming at a file in the mobile terminal;
the judging module is used for judging the type of the preset operation event to which the operation event belongs;
the control module is used for encrypting the file if the judging module judges that the operation event belongs to a first type of preset operation event; and after the encryption of the file is finished, executing a first type of preset operation corresponding to the operation event aiming at the encrypted file.
2. The mobile terminal of claim 1, wherein the control module is further configured to: and after the file is encrypted, storing the encryption key into a user identity identification module of the mobile terminal.
3. The mobile terminal of claim 2, wherein the control module is further configured to: if the judging module judges that the operation event belongs to a second type of preset operation event, decrypting the file; and after the file is successfully decrypted, executing a second type of preset operation corresponding to the operation event aiming at the decrypted file.
4. The mobile terminal of claim 3, wherein the control module is further configured to: extracting a decryption key corresponding to the file from a user identity identification module of the mobile terminal;
and if the decryption key is successfully matched with the encryption key corresponding to the file, completing the decryption operation of the file based on the decryption key.
5. The mobile terminal of claim 3, wherein the mobile terminal further comprises:
the prompting module is used for outputting a prompting message;
the control module is further configured to detect whether a user identity recognition module is present in the mobile terminal, and if not, notify the prompt module to output a prompt message.
6. A file processing method is applied to a mobile terminal, and is characterized by comprising the following steps:
detecting an operation event aiming at a file in the mobile terminal;
judging the type of a preset operation event to which the operation event belongs;
if the operation event is judged to belong to a first type of preset operation event, encrypting the file; and after the encryption of the file is finished, executing a first type of preset operation corresponding to the operation event aiming at the encrypted file.
7. The method of claim 6, wherein after completing the encryption of the file, the method further comprises:
and storing the encryption key into a user identity identification module of the mobile terminal.
8. The method of claim 7, further comprising:
if the operation event is judged to belong to a second type of preset operation event, decrypting the file; and after the file is successfully decrypted, executing a second type of preset operation corresponding to the operation event aiming at the decrypted file.
9. The method of claim 8, wherein decrypting the file comprises:
extracting a decryption key corresponding to the file from a user identity identification module of the mobile terminal;
and if the decryption key is successfully matched with the encryption key corresponding to the file, completing the decryption operation of the file based on the decryption key.
10. The method of claim 8, wherein prior to decrypting the file, the method further comprises:
and detecting whether a user identity identification module exists in the mobile terminal, and if not, outputting a prompt message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611227734.9A CN106612376A (en) | 2016-12-27 | 2016-12-27 | Mobile terminal and file processing method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611227734.9A CN106612376A (en) | 2016-12-27 | 2016-12-27 | Mobile terminal and file processing method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106612376A true CN106612376A (en) | 2017-05-03 |
Family
ID=58636763
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611227734.9A Pending CN106612376A (en) | 2016-12-27 | 2016-12-27 | Mobile terminal and file processing method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106612376A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113688106A (en) * | 2021-10-27 | 2021-11-23 | 广东睿江云计算股份有限公司 | File monitoring method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101000648A (en) * | 2006-01-12 | 2007-07-18 | 鸿富锦精密工业(深圳)有限公司 | Automatic encipher system and method for file |
CN102781001A (en) * | 2011-05-10 | 2012-11-14 | 中兴通讯股份有限公司 | Method for encrypting built-in file of mobile terminal and mobile terminal |
US20140143541A1 (en) * | 2012-11-20 | 2014-05-22 | Cloudioh Inc. | Method and Apparatus for Managing Encrypted Files in Network System |
CN103995990A (en) * | 2014-05-14 | 2014-08-20 | 江苏敏捷科技股份有限公司 | Method for preventing electronic documents from divulging secrets |
CN104361294A (en) * | 2014-10-28 | 2015-02-18 | 深圳市大成天下信息技术有限公司 | Document protection method, device and system |
CN104394530A (en) * | 2014-12-09 | 2015-03-04 | 天津光电安辰信息技术有限公司 | Wechat content encryption system based on smartphone and implementation method of wechat content encryption system |
US20150095663A1 (en) * | 2013-10-02 | 2015-04-02 | Phison Electronics Corp. | Data processing method, memory storage device and memory control circuit unit |
-
2016
- 2016-12-27 CN CN201611227734.9A patent/CN106612376A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101000648A (en) * | 2006-01-12 | 2007-07-18 | 鸿富锦精密工业(深圳)有限公司 | Automatic encipher system and method for file |
CN102781001A (en) * | 2011-05-10 | 2012-11-14 | 中兴通讯股份有限公司 | Method for encrypting built-in file of mobile terminal and mobile terminal |
US20140143541A1 (en) * | 2012-11-20 | 2014-05-22 | Cloudioh Inc. | Method and Apparatus for Managing Encrypted Files in Network System |
US20150095663A1 (en) * | 2013-10-02 | 2015-04-02 | Phison Electronics Corp. | Data processing method, memory storage device and memory control circuit unit |
CN103995990A (en) * | 2014-05-14 | 2014-08-20 | 江苏敏捷科技股份有限公司 | Method for preventing electronic documents from divulging secrets |
CN104361294A (en) * | 2014-10-28 | 2015-02-18 | 深圳市大成天下信息技术有限公司 | Document protection method, device and system |
CN104394530A (en) * | 2014-12-09 | 2015-03-04 | 天津光电安辰信息技术有限公司 | Wechat content encryption system based on smartphone and implementation method of wechat content encryption system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113688106A (en) * | 2021-10-27 | 2021-11-23 | 广东睿江云计算股份有限公司 | File monitoring method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104636030B (en) | Method, device and mobile terminal for starting application program | |
CN104932697B (en) | Gesture unlocking method and device | |
CN106341817A (en) | Access control system, access control method, mobile terminals and access server | |
CN104660912A (en) | Photographing method and photographing device | |
CN104836900A (en) | Mobile terminal unlocking method and mobile terminal | |
CN104793849A (en) | Application icon display method and device | |
CN105791548A (en) | Voice information broadcast device and method | |
CN104992109A (en) | Method and device for password setting and method and device for password matching | |
CN104836884A (en) | Standby unlocking method of mobile terminal, and mobile terminal | |
CN105554386A (en) | Mobile terminal and camera shooting control method thereof | |
CN105101186A (en) | Mobile terminal and method and device for preventing information leakage of virtual SIM card thereof | |
CN106778176A (en) | A kind of information processing method and mobile terminal | |
CN104866352A (en) | Method for starting application and mobile terminal | |
CN106485163A (en) | Control method and control device that mobile terminal data storehouse accesses | |
CN105282155B (en) | Authority control method, device and system for interaction between terminals | |
CN106507343A (en) | A kind of information processing method, mobile terminal and server | |
WO2016015643A1 (en) | Call encryption method, communication terminal, base station and computer storage medium | |
CN105120091A (en) | Mobile terminal and maloperation prompting apparatus and method thereof | |
CN105898736A (en) | Mobile terminal and control method | |
CN106412877B (en) | Activation method and activation device for mobile terminal SIM card | |
CN106488007A (en) | A kind of auth method and terminal | |
CN105184131B (en) | A kind of apparatus and method for carrying out unlocking screen by connecting WI FI | |
CN106612376A (en) | Mobile terminal and file processing method thereof | |
CN106506785B (en) | Terminal and encryption method for realizing terminal theft prevention | |
CN106535196A (en) | Routing equipment, terminal and method for controlling WiFi access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170503 |