+

CN108337355B - Object encryption method and device - Google Patents

Object encryption method and device Download PDF

Info

Publication number
CN108337355B
CN108337355B CN201710043968.6A CN201710043968A CN108337355B CN 108337355 B CN108337355 B CN 108337355B CN 201710043968 A CN201710043968 A CN 201710043968A CN 108337355 B CN108337355 B CN 108337355B
Authority
CN
China
Prior art keywords
encryption
user
condition
encrypted
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710043968.6A
Other languages
Chinese (zh)
Other versions
CN108337355A (en
Inventor
孙伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201710043968.6A priority Critical patent/CN108337355B/en
Publication of CN108337355A publication Critical patent/CN108337355A/en
Application granted granted Critical
Publication of CN108337355B publication Critical patent/CN108337355B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

本公开是关于一种对象加密方法及装置。所述方法包括:根据用户针对对象的使用模式,判断所述对象是否满足加密条件;在所述对象满足加密条件的情况下,显示加密确认控件;在所述加密确认控件被触发的情况下,对所述对象进行加密。本公开的实施例通过分析用户针对对象的使用模式来判断是否满足加密条件,并在满足加密条件且加密确认控件被触发时对对象进行加密,实现针对对象的自动加密,提高了用户使用的便利性,提升了用户体验。

Figure 201710043968

The present disclosure relates to an object encryption method and apparatus. The method includes: judging whether the object satisfies the encryption condition according to the usage pattern of the object by the user; in the case that the object satisfies the encryption condition, displaying the encryption confirmation control; when the encryption confirmation control is triggered, The object is encrypted. The embodiment of the present disclosure determines whether the encryption condition is satisfied by analyzing the usage pattern of the object by the user, and encrypts the object when the encryption condition is satisfied and the encryption confirmation control is triggered, so as to realize the automatic encryption of the object and improve the convenience of the user. , improving the user experience.

Figure 201710043968

Description

对象加密方法及装置Object encryption method and device

技术领域technical field

本公开涉及计算机技术领域,尤其涉及一种对象加密方法及装置。The present disclosure relates to the field of computer technologies, and in particular, to an object encryption method and device.

背景技术Background technique

随着终端设备的发展和普及,在使用终端设备时,用户通常希望在终端设备上保护自己的一些隐私。针对某些对象(例如应用或应用中的部分内容),用户可能想要对对象进行单独加密,但是对象的种类繁多,且加密方式多样,使得用户的加密过程较为复杂,操作很不方便,导致用户体验变差。With the development and popularization of terminal devices, when using terminal devices, users usually want to protect some of their privacy on the terminal devices. For some objects (such as an application or part of the content in the application), the user may want to encrypt the object separately, but there are many types of objects and various encryption methods, which make the encryption process for the user more complicated and the operation is very inconvenient, resulting in Bad user experience.

发明内容SUMMARY OF THE INVENTION

为克服相关技术中存在的问题,本公开提供一种对象加密方法及装置。In order to overcome the problems existing in the related art, the present disclosure provides an object encryption method and apparatus.

根据本公开实施例的第一方面,提供一种对象加密方法,包括:According to a first aspect of the embodiments of the present disclosure, an object encryption method is provided, including:

根据用户针对对象的使用模式,判断所述对象是否满足加密条件;According to the usage pattern of the object by the user, determine whether the object satisfies the encryption conditions;

在所述对象满足加密条件的情况下,显示加密确认控件;In the case that the object satisfies the encryption condition, displaying the encryption confirmation control;

在所述加密确认控件被触发的情况下,对所述对象进行加密。The object is encrypted when the encryption confirmation control is triggered.

对于以上方法,在一种可能的实现方式中,根据用户针对对象的使用模式,判断所述对象是否满足加密条件,包括:For the above method, in a possible implementation manner, judging whether the object satisfies the encryption condition according to the user's usage pattern of the object, including:

在用户针对对象的使用模式符合第一模式的情况下,判断所述对象满足加密条件,In the case that the usage pattern of the object by the user conforms to the first pattern, it is determined that the object satisfies the encryption condition,

其中,所述第一模式包括以下使用模式中的一种或多种:Wherein, the first mode includes one or more of the following usage modes:

在退出对象的情况下,删除所述对象中的记录;in the case of exiting an object, delete the record in said object;

在退出对象的情况下,删除所述对象;in the case of exiting the object, delete the object;

第一时间内,启动对象的次数大于或等于第一次数阈值;Within the first time, the number of times to start the object is greater than or equal to the first threshold;

对对象中的文件进行加密。Encrypt the files in the object.

对于以上方法,在一种可能的实现方式中,在所述加密确认控件被触发的情况下,对所述对象进行加密,包括:For the above method, in a possible implementation manner, when the encryption confirmation control is triggered, encrypting the object includes:

获取针对所述对象的加密信息;obtain encrypted information for the object;

基于所述加密信息对所述对象进行加密。The object is encrypted based on the encrypted information.

对于以上方法,在一种可能的实现方式中,获取针对所述对象的加密信息,包括:For the above method, in a possible implementation manner, obtaining encrypted information for the object includes:

在用户触摸屏幕时,采集用户的指纹信息;When the user touches the screen, collect the user's fingerprint information;

在所采集的指纹信息达到作为加密信息的条件的情况下,将所采集的指纹信息作为针对所述对象的加密信息。In the case that the collected fingerprint information meets the condition of being used as encrypted information, the collected fingerprint information is used as encrypted information for the object.

对于以上方法,在一种可能的实现方式中,获取针对所述对象的加密信息,包括:For the above method, in a possible implementation manner, obtaining encrypted information for the object includes:

获取已存储的加密信息作为待选择的加密信息;Obtain the stored encrypted information as the encrypted information to be selected;

向用户提供待选择的加密信息;Provide users with encrypted information to be selected;

将用户选择的加密信息作为针对所述对象的加密信息。The encrypted information selected by the user is used as the encrypted information for the object.

对于以上方法,在一种可能的实现方式中,所述方法还包括:For the above method, in a possible implementation manner, the method further includes:

在已加密的对象启动的情况下,显示加密信息输入控件;When the encrypted object is started, display the encryption information input control;

在通过加密信息输入控件获取到针对所述已加密的对象的加密信息的情况下,使所述已加密的对象解密。When the encrypted information for the encrypted object is obtained through the encrypted information input control, the encrypted object is decrypted.

对于以上方法,在一种可能的实现方式中,所述方法还包括:For the above method, in a possible implementation manner, the method further includes:

在未获取到针对所述已加密的对象的加密信息的情况下,进行对应于解密失败的处理。If the encrypted information for the encrypted object has not been acquired, processing corresponding to decryption failure is performed.

根据本公开实施例的第二方面,提供一种对象加密装置,包括:According to a second aspect of the embodiments of the present disclosure, an object encryption apparatus is provided, including:

条件判断模块,用于根据用户针对对象的使用模式,判断所述对象是否满足加密条件;a condition judging module for judging whether the object satisfies the encryption condition according to the user's usage pattern for the object;

控件显示模块,用于在所述对象满足加密条件的情况下,显示加密确认控件;A control display module, used for displaying an encryption confirmation control when the object satisfies the encryption conditions;

加密模块,用于在所述加密确认控件被触发的情况下,对所述对象进行加密。An encryption module, configured to encrypt the object when the encryption confirmation control is triggered.

对于以上装置,在一种可能的实现方式中,所述条件判断模块包括:For the above device, in a possible implementation manner, the condition judging module includes:

第一判断子模块,用于在用户针对对象的使用模式符合第一模式的情况下,判断所述对象满足加密条件,a first judging submodule for judging that the object satisfies the encryption condition when the user's usage pattern for the object conforms to the first pattern,

其中,所述第一模式包括以下使用模式中的一种或多种:Wherein, the first mode includes one or more of the following usage modes:

在退出对象的情况下,删除所述对象中的记录;in the case of exiting an object, delete the record in said object;

在退出对象的情况下,删除所述对象;in the case of exiting the object, delete the object;

第一时间内,启动对象的次数大于或等于第一次数阈值;Within the first time, the number of times to start the object is greater than or equal to the first threshold;

对对象中的文件进行加密。Encrypt the files in the object.

对于以上装置,在一种可能的实现方式中,所述加密模块包括:For the above device, in a possible implementation manner, the encryption module includes:

加密信息获取子模块,用于获取针对所述对象的加密信息;an encrypted information acquisition sub-module for acquiring encrypted information for the object;

第一加密子模块,用于基于所述加密信息对所述对象进行加密。a first encryption submodule, configured to encrypt the object based on the encryption information.

对于以上装置,在一种可能的实现方式中,所述加密信息获取子模块包括:For the above device, in a possible implementation manner, the encrypted information acquisition submodule includes:

采集子模块,用于在用户触摸屏幕时,采集用户的指纹信息;The collection sub-module is used to collect the user's fingerprint information when the user touches the screen;

第一加密信息获取子模块,用于在所采集的指纹信息达到作为加密信息的条件的情况下,将所采集的指纹信息作为针对所述对象的加密信息。The first encrypted information acquisition sub-module is configured to use the collected fingerprint information as encrypted information for the object under the condition that the collected fingerprint information meets the condition of being used as encrypted information.

对于以上装置,在一种可能的实现方式中,所述加密信息获取子模块包括:For the above device, in a possible implementation manner, the encrypted information acquisition submodule includes:

已存储信息获取子模块,用于获取已存储的加密信息作为待选择的加密信息;A stored information acquisition sub-module, used to acquire the stored encrypted information as the encrypted information to be selected;

信息选择子模块,用于向用户提供待选择的加密信息;an information selection submodule, used to provide the user with encrypted information to be selected;

第二加密信息获取子模块,用于将用户选择的加密信息作为针对所述对象的加密信息。The second encrypted information acquisition sub-module is configured to use the encrypted information selected by the user as the encrypted information for the object.

对于以上装置,在一种可能的实现方式中,所述装置还包括:For the above apparatus, in a possible implementation manner, the apparatus further includes:

输入显示模块,用于在已加密的对象启动的情况下,显示加密信息输入控件;The input display module is used to display the encrypted information input control when the encrypted object is activated;

解密模块,用于在通过加密信息输入控件获取到针对所述已加密的对象的加密信息的情况下,使所述已加密的对象解密。The decryption module is configured to decrypt the encrypted object when the encrypted information for the encrypted object is obtained through the encrypted information input control.

对于以上装置,在一种可能的实现方式中,所述装置还包括:For the above apparatus, in a possible implementation manner, the apparatus further includes:

失败处理模块,用于在未获取到针对所述已加密的对象的加密信息的情况下,进行对应于解密失败的处理。The failure processing module is configured to perform processing corresponding to the decryption failure in the case that the encrypted information for the encrypted object is not obtained.

根据本公开实施例的第三方面,提供一种对象加密装置,包括:According to a third aspect of the embodiments of the present disclosure, an object encryption apparatus is provided, including:

处理器;processor;

用于存储处理器可执行指令的存储器;memory for storing processor-executable instructions;

其中,所述处理器被配置为:wherein the processor is configured to:

根据用户针对对象的使用模式,判断所述对象是否满足加密条件;According to the usage pattern of the object by the user, determine whether the object satisfies the encryption conditions;

在所述对象满足加密条件的情况下,显示加密确认控件;In the case that the object satisfies the encryption condition, displaying the encryption confirmation control;

在所述加密确认控件被触发的情况下,对所述对象进行加密。The object is encrypted when the encryption confirmation control is triggered.

本公开的实施例提供的技术方案可以包括以下有益效果:通过分析用户针对对象的使用模式来判断是否满足加密条件,并在满足加密条件且加密确认控件被触发时对对象进行加密,实现对象的自动加密,提高了用户使用的便利性,提升了用户体验。The technical solutions provided by the embodiments of the present disclosure may include the following beneficial effects: judging whether the encryption condition is satisfied by analyzing the usage pattern of the object by the user, and encrypting the object when the encryption condition is satisfied and the encryption confirmation control is triggered, so as to realize the encryption of the object. Automatic encryption improves user convenience and user experience.

应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。It is to be understood that the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the present disclosure.

附图说明Description of drawings

此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description serve to explain the principles of the disclosure.

图1是根据一示例性实施例示出的一种对象加密方法的流程图。Fig. 1 is a flowchart of an object encryption method according to an exemplary embodiment.

图2是根据一示例性实施例示出的一种对象加密方法的流程图。Fig. 2 is a flow chart of an object encryption method according to an exemplary embodiment.

图3是根据一示例性实施例示出的一种对象加密方法的步骤S13的流程图。Fig. 3 is a flowchart of step S13 of an object encryption method according to an exemplary embodiment.

图4是根据一示例性实施例示出的一种对象加密方法的步骤S131的流程图。Fig. 4 is a flowchart of step S131 of an object encryption method according to an exemplary embodiment.

图5是根据一示例性实施例示出的一种对象加密方法的步骤S131的流程图。Fig. 5 is a flowchart of step S131 of an object encryption method according to an exemplary embodiment.

图6是根据一示例性实施例示出的一种对象加密方法的流程图。Fig. 6 is a flow chart of an object encryption method according to an exemplary embodiment.

图7是根据一示例性实施例示出的一种对象加密方法的流程图。Fig. 7 is a flow chart of an object encryption method according to an exemplary embodiment.

图8是根据一示例性实施例示出的一种对象加密装置的框图。Fig. 8 is a block diagram of an object encryption apparatus according to an exemplary embodiment.

图9是根据一示例性实施例示出的一种对象加密装置的框图。Fig. 9 is a block diagram of an object encryption apparatus according to an exemplary embodiment.

图10是根据一示例性实施例示出的一种对象加密装置的框图。Fig. 10 is a block diagram of an object encryption apparatus according to an exemplary embodiment.

具体实施方式Detailed ways

这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with this disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as recited in the appended claims.

图1是根据一示例性实施例示出的一种对象加密方法的流程图,如图1所示,根据该示例性实施例的对象加密方法用于终端(例如智能手机)中,包括以下步骤。FIG. 1 is a flow chart of an object encryption method according to an exemplary embodiment. As shown in FIG. 1 , the object encryption method according to this exemplary embodiment is used in a terminal (such as a smart phone) and includes the following steps.

在步骤S11中,根据用户针对对象的使用模式,判断所述对象是否满足加密条件;In step S11, according to the usage pattern of the object by the user, it is judged whether the object satisfies the encryption condition;

在步骤S12中,在所述对象满足加密条件的情况下,显示加密确认控件;In step S12, when the object satisfies the encryption condition, an encryption confirmation control is displayed;

在步骤S13中,在所述加密确认控件被触发的情况下,对所述对象进行加密。In step S13, when the encryption confirmation control is triggered, the object is encrypted.

本实施例通过分析用户针对对象的使用模式来判断是否满足加密条件,并在满足加密条件且加密确认控件被触发时对对象进行加密,实现针对对象的自动加密,提高了用户使用的便利性,提升了用户体验。This embodiment determines whether the encryption condition is satisfied by analyzing the usage pattern of the object by the user, and encrypts the object when the encryption condition is satisfied and the encryption confirmation control is triggered, so as to realize the automatic encryption of the object and improve the convenience of the user. Improved user experience.

举例来说,对于用户所使用的对象(例如某个应用),可以分析用户针对对象的使用模式,进而判断该对象是否满足加密条件。例如对象为某一浏览器应用,如果用户使用完该应用之后经常清理浏览历史,则可以认为用户针对该应用的使用模式符合特定模式,从而判断该应用满足加密条件。For example, for an object used by a user (eg, an application), the user's usage pattern of the object can be analyzed, and then it can be determined whether the object satisfies the encryption conditions. For example, if the object is a browser application, if the user frequently clears the browsing history after using the application, it can be considered that the user's usage pattern for the application conforms to a specific pattern, and thus it is determined that the application satisfies the encryption conditions.

在一种可能的实现方式中,在所述对象满足加密条件的情况下,可以显示加密确认控件,提示用户是否需要对所述对象加密,例如可以弹出是否加密的确认框,以供用户点击。本公开对加密确认控件的具体显示方式不做限定。In a possible implementation manner, when the object meets the encryption conditions, an encryption confirmation control may be displayed to prompt the user whether the object needs to be encrypted. For example, a confirmation box for encryption may pop up for the user to click. The present disclosure does not limit the specific display manner of the encryption confirmation control.

在一种可能的实现方式中,如果用户确认对所述对象加密,加密确认控件被触发,则自动对所述对象进行加密,所述对象再次启动时需要输入相应的加密信息,然后才能正常使用;如果用户未确认对所述对象加密,加密确认控件未被触发,则不对所述对象进行加密,该对象仍然正常使用。其中,可以采用各种方式对对象进行加密,例如,可以获取终端设备中已有的加密内容(例如密码、手势、指纹等),采用已有的加密内容对所述对象进行加密;也可以提示用户输入新的加密内容,以便对所述对象进行加密;还可以通过终端设备的指纹采集模块,在用户对对象的使用过程中采集用户的指纹,采用采集的用户指纹信息对所述对象进行加密。本公开对针对所述对象加密的具体方式不做限定。In a possible implementation manner, if the user confirms to encrypt the object and the encryption confirmation control is triggered, the object is automatically encrypted, and the object needs to enter the corresponding encryption information when it is started again, and then it can be used normally. ; If the user does not confirm to encrypt the object, and the encryption confirmation control is not triggered, the object is not encrypted, and the object is still used normally. The object can be encrypted in various ways. For example, the existing encrypted content (such as password, gesture, fingerprint, etc.) in the terminal device can be obtained, and the object can be encrypted by using the existing encrypted content; The user inputs new encrypted content to encrypt the object; the fingerprint collection module of the terminal device can also collect the user's fingerprint during the user's use of the object, and use the collected user fingerprint information to encrypt the object . The present disclosure does not limit the specific manner of encrypting the object.

图2是根据一示例性实施例示出的一种对象加密方法的流程图。如图2所示,在一种可能的实现方式中,步骤S11包括:Fig. 2 is a flow chart of an object encryption method according to an exemplary embodiment. As shown in FIG. 2, in a possible implementation manner, step S11 includes:

在步骤S111中,在用户针对对象的使用模式符合第一模式的情况下,判断所述对象满足加密条件,In step S111, if the user's usage pattern for the object conforms to the first pattern, it is determined that the object satisfies the encryption condition,

其中,所述第一模式包括以下使用模式中的一种或多种:Wherein, the first mode includes one or more of the following usage modes:

在退出对象的情况下,删除所述对象中的记录;in the case of exiting an object, delete the record in said object;

在退出对象的情况下,删除所述对象;in the case of exiting the object, delete the object;

在第一时间内,启动对象的次数大于或等于第一次数阈值;Within the first time, the number of times to start the object is greater than or equal to the first threshold of times;

对对象中的文件进行加密。Encrypt the files in the object.

举例来说,可以分析用户针对对象的使用模式,如果用户针对对象的使用模式符合第一模式,则可以判断该对象满足加密条件。其中,第一模式可以为用户针对对象的具体使用方式。For example, the user's usage pattern of the object can be analyzed, and if the user's usage pattern of the object conforms to the first pattern, it can be determined that the object satisfies the encryption condition. Wherein, the first mode may be a specific usage mode of the object by the user.

在一种可能的实现方式中,对象可以例如为终端设备中的应用,如果用户使用完该应用之后经常清理浏览历史,则可能是出于隐私或者安全性考虑,例如该应用为浏览器或翻译器等。可以认为用户针对该应用(对象)的使用模式符合第一模式,判断该对象满足加密条件,进而可以执行提示用户进行加密的操作。In a possible implementation manner, the object may be, for example, an application in a terminal device. If the user often clears the browsing history after using the application, it may be due to privacy or security considerations, for example, the application is a browser or a translator device, etc. It can be considered that the user's usage pattern for the application (object) conforms to the first pattern, and it is determined that the object satisfies the encryption condition, and then the operation of prompting the user to perform encryption can be performed.

在一种可能的实现方式中,对象可以例如为终端设备中的应用,如果该应用被多次下载,使用一段时间后多次删除,则有可能是出于隐私或者安全性考虑,例如该应用为某些银行的应用或者支付类应用等。可以认为用户针对该应用(对象)的使用模式符合第一模式,判断该对象满足加密条件,进而可以执行提示用户进行加密的操作。In a possible implementation manner, the object may be, for example, an application in a terminal device. If the application is downloaded multiple times and deleted many times after being used for a period of time, it may be due to privacy or security considerations, for example, the application For some bank applications or payment applications, etc. It can be considered that the user's usage pattern for the application (object) conforms to the first pattern, and it is determined that the object satisfies the encryption condition, and then the operation of prompting the user to perform encryption can be performed.

在一种可能的实现方式中,针对终端设备中的应用,如果用户采用不同的账户分别登录该应用(例如该应用为社交类应用),并采用终端设备的系统支持的双开或应用分身等方式多次分别登录该应用,则可以认为该应用的一个或多个账户(对象)可能涉及到用户的隐私。可以认为用户针对该对象的使用模式符合第一模式,判断该对象满足加密条件,进而可以执行提示用户进行加密的操作,询问用户是否需要对该应用的一个或多个账户(对象)进行加密。In a possible implementation manner, for an application in a terminal device, if the user logs in to the application using different accounts (for example, the application is a social application), and adopts the dual-opening or application-separating methods supported by the system of the terminal device, etc. If you log in to the application several times, it can be considered that one or more accounts (objects) of the application may involve the privacy of the user. It can be considered that the user's usage mode for the object conforms to the first mode, and it is determined that the object satisfies the encryption conditions, and then the operation of prompting the user for encryption can be performed, and the user is asked whether one or more accounts (objects) of the application need to be encrypted.

在一种可能的实现方式中,针对终端设备中的应用,如果该应用中的部分内容被用户单独加密,则该应用中的内容可能涉及到用户的隐私,用户可能需要对该应用中的其他部分内容或全部内容进行加密。可以认为用户针对该对象的使用模式符合第一模式,判断该对象满足加密条件,进而可以执行提示用户进行加密的操作,询问用户是否需要对该应用的其他部分内容或全部内容进行加密。例如,该应用为文件管理器,如果文件管理器内的一个或多个文件被用户单独加密,则有可能需要对整个文件管理器加密,也可能需要对相关联的一个或多个文件,或者相关联的一个或多个文件夹进行单独加密。In a possible implementation manner, for an application in a terminal device, if part of the content in the application is encrypted by the user alone, the content in the application may involve the user's privacy, and the user may need other content in the application. Part or all of the content is encrypted. It can be considered that the user's usage pattern for the object conforms to the first pattern, and it is determined that the object satisfies the encryption conditions, and then an operation of prompting the user for encryption can be performed to ask the user whether other part or all of the content of the application needs to be encrypted. For example, if the application is a file manager, if one or more files in the file manager are individually encrypted by the user, the entire file manager may need to be encrypted, or one or more associated files may need to be encrypted, or The associated folder or folders are individually encrypted.

在一种可能的实现方式中,针对终端设备中的应用,如果该应用的某个号码或联系人的记录被删除,则该记录可能涉及到用户的隐私,用户可能需要对该号码或联系人的记录进行加密。可以认为用户针对该对象的使用模式符合第一模式,判断该对象满足加密条件,进而可以执行提示用户进行加密的操作,询问用户是否需要对该应用中的号码或联系人的记录进行加密。例如,该应用可以是通信录或短信等,如果通信录中的一个或多个电话号码经常拨打,但对应的通话记录被删除,则可以询问用户是否需要对该电话号码的通话记录加密,在用户确认后对该电话号码的通话记录进行加密;如果短信中经常有用户与一个或多个电话号码之间的短信,而用户在查看短信后将相应的短信删除,则可以询问用户是否需要对该电话号码的短信加密,在用户确认后对该电话号码的短信进行加密。该应用还可以是便签等记录信息的应用,淘宝等购物类应用,或是微信、QQ等交互类应用,可以在用户对应用的使用符合第一模式时,对应用中的记录、信息等进行加密。In a possible implementation manner, for an application in a terminal device, if the record of a certain number or contact of the application is deleted, the record may involve the user's privacy, and the user may need to record the number or contact of the application. records are encrypted. It can be considered that the user's usage pattern for the object conforms to the first pattern, and it is determined that the object satisfies the encryption conditions, and then an operation of prompting the user for encryption can be performed to ask the user whether the number or contact record in the application needs to be encrypted. For example, the application can be an address book or a text message, etc. If one or more phone numbers in the address book are frequently dialed, but the corresponding call records are deleted, the user can be asked whether the call records of the phone numbers need to be encrypted. After the user confirms, the call records of the phone number are encrypted; if there are often text messages between the user and one or more phone numbers in the text messages, and the user deletes the corresponding text messages after viewing the text messages, you can ask the user whether they need to The text message of the phone number is encrypted, and the text message of the phone number is encrypted after the user confirms. The application can also be an application that records information such as sticky notes, a shopping application such as Taobao, or an interactive application such as WeChat and QQ. encryption.

在一种可能的实现方式中,针对终端设备中的应用,如果该应用在第一时间内启动的次数大于或等于第一次数阈值,则该应用可能涉及到用户的隐私,用户可能需要对该应用进行加密。其中,该第一时间可以是一段较长的时间(例如一周或一个月),第一次数阈值可以用于判断该应用在第一时间内启动的次数,如果该应用在第一时间内经常启动(启动次数大于或等于第一次数阈值),则可以认为用户针对该对象的使用模式符合第一模式,判断该对象满足加密条件,进而可以执行提示用户进行加密的操作。该第一时间也可以是一个特定的时间段,例如每天的22:00-24:00,如果该应用在特定的时间段内经常启动(启动次数大于或等于第一次数阈值),则可以认为用户针对该对象的使用模式符合第一模式,判断该对象满足加密条件,进而可以执行提示用户进行加密的操作。In a possible implementation, for an application in a terminal device, if the number of times the application is started within the first time is greater than or equal to the first threshold, the application may involve the user's privacy, and the user may need to The app is encrypted. Wherein, the first time may be a relatively long period of time (for example, a week or a month), and the first number of times threshold may be used to determine the number of times the application is started within the first period of time. If it is activated (the number of activations is greater than or equal to the first threshold), it can be considered that the user's usage mode for the object conforms to the first mode, and it is judged that the object satisfies the encryption conditions, and then the operation of prompting the user for encryption can be performed. The first time can also be a specific time period, such as 22:00-24:00 every day, if the application is frequently started in a specific time period (the number of starts is greater than or equal to the threshold of the first number of times), it can be It is considered that the user's usage pattern for the object conforms to the first pattern, and it is determined that the object satisfies the encryption condition, and then the operation of prompting the user to perform encryption can be performed.

通过这种方式,可以通过分析用户针对对象的使用模式,并在使用模式符合第一模式时判断满足加密条件,进而对对象加密,提高了用户使用的便利性。In this way, the user's usage pattern for the object can be analyzed, and when the usage pattern conforms to the first pattern, it is determined that the encryption condition is satisfied, and the object is encrypted, thereby improving the convenience for the user to use.

图3是根据一示例性实施例示出的一种对象加密方法的步骤S13的流程图。如图3所示,在一种可能的实现方式中,步骤S13包括:Fig. 3 is a flowchart of step S13 of an object encryption method according to an exemplary embodiment. As shown in FIG. 3, in a possible implementation manner, step S13 includes:

在步骤S131中,获取针对所述对象的加密信息;In step S131, obtain encrypted information for the object;

在步骤S132中,基于所述加密信息对所述对象进行加密。In step S132, the object is encrypted based on the encrypted information.

举例来说,在加密确认控件被触发时,用户已经确认对对象进行加密,此时,可以获取针对该对象的加密信息。可以通过多种方式获取该加密信息,例如,可以获取终端设备中已有的加密信息(例如用于屏幕解锁的密码、手势、指纹等),将已有的加密信息作为针对该对象的加密信息,并基于该加密信息对该对象进行加密;也可以获取新的加密信息,例如提示用户输入新密码,或重新采集用户的指纹信息等,将新获取的加密信息作为针对该对象的加密信息,并基于该加密信息对该对象进行加密。For example, when the encryption confirmation control is triggered, the user has confirmed to encrypt the object, and at this time, the encryption information for the object can be obtained. The encrypted information can be obtained in various ways. For example, the existing encrypted information in the terminal device (such as a password, gesture, fingerprint, etc. for unlocking the screen) can be obtained, and the existing encrypted information can be used as the encrypted information for the object. , and encrypt the object based on the encrypted information; new encrypted information can also be obtained, such as prompting the user to enter a new password, or re-collecting the user's fingerprint information, etc., and using the newly obtained encrypted information as the encrypted information for the object, And encrypt the object based on the encrypted information.

通过这种方式,可以针对对象的加密信息,并基于该加密信息对该对象进行加密,使用户的操作更加简单快捷,提高了用户使用的便利性。In this way, the encrypted information of the object can be encrypted, and the object can be encrypted based on the encrypted information, so that the user's operation is simpler and faster, and the convenience of the user is improved.

图4是根据一示例性实施例示出的一种对象加密方法的步骤S131的流程图。如图4所示,在一种可能的实现方式中,步骤S131包括:Fig. 4 is a flowchart of step S131 of an object encryption method according to an exemplary embodiment. As shown in FIG. 4, in a possible implementation manner, step S131 includes:

在步骤S1311中,在用户触摸屏幕时,采集用户的指纹信息;In step S1311, when the user touches the screen, the fingerprint information of the user is collected;

在步骤S1312中,在所采集的指纹信息达到作为加密信息的条件的情况下,将所采集的指纹信息作为针对所述对象的加密信息。In step S1312, in the case that the collected fingerprint information meets the condition of being used as encrypted information, the collected fingerprint information is used as encrypted information for the object.

举例来说,对于支持面内指纹识别功能,且可以在屏幕面内任意位置都能够实现指纹识别的终端设备,在用户触摸屏幕时,例如用户点击应用(对象)对应的图标时,可以在用户未主动发起指纹采集的情况下自动采集用户的指纹信息。在所采集的指纹信息达到作为加密信息的条件时,例如经过多次采集组成指纹识别的模板(与现有的指纹识别方案的指纹录入过程相近)时,可以将所采集的指纹信息作为针对该应用(对象)的加密信息。在用户对该应用的使用满足加密条件且确认加密后,可以基于该加密信息对所述对象进行加密。For example, for a terminal device that supports the in-plane fingerprint recognition function and can realize fingerprint recognition at any position on the screen, when the user touches the screen, for example, when the user clicks the icon corresponding to the application (object), the user can The user's fingerprint information is automatically collected without actively initiating fingerprint collection. When the collected fingerprint information reaches the condition of being used as encrypted information, for example, when a template for fingerprint identification is collected after several times (similar to the fingerprint entry process of the existing fingerprint identification scheme), the collected fingerprint information can be used as the target for the fingerprint identification. Encrypted information for the application (object). After the user's use of the application satisfies the encryption condition and the encryption is confirmed, the object may be encrypted based on the encryption information.

通过这种方式,可以在用户使用的过程中自动采集指纹信息,并利用该指纹信息对对象加密,免除了用户在加密时录入指纹的过程,使得用户的操作更为简便。In this way, the fingerprint information can be automatically collected during the user's use, and the object can be encrypted by using the fingerprint information, which avoids the user's process of entering fingerprints during encryption, and makes the user's operation more convenient.

图5是根据一示例性实施例示出的一种对象加密方法的步骤S131的流程图。如图5所示,在一种可能的实现方式中,步骤S131包括:Fig. 5 is a flowchart of step S131 of an object encryption method according to an exemplary embodiment. As shown in FIG. 5, in a possible implementation manner, step S131 includes:

在步骤S1313中,获取已存储的加密信息作为待选择的加密信息;In step S1313, the stored encrypted information is obtained as the encrypted information to be selected;

在步骤S1314中,向用户提供待选择的加密信息;In step S1314, the encrypted information to be selected is provided to the user;

在步骤S1315中,将用户选择的加密信息作为针对所述对象的加密信息。In step S1315, the encrypted information selected by the user is used as the encrypted information for the object.

举例来说,在终端设备中已存储有加密信息的情况下,例如用户已经设置有用于屏幕解锁的密码、手势或指纹等,可以获取已存储的加密信息作为待选择的加密信息。然后,在用户对该应用的使用满足加密条件且确认加密后,可以向用户提供待选择的加密信息,用户可以选择已有的加密信息中的一个或多个,也可以新建加密信息。在用户选择新建加密信息时,可以提供输入框、手势图或启动指纹识别模块等,以供用户输入加密信息。在用户已经做出选择并确认后,可以将用户选择的加密信息作为针对所述对象的加密信息,并基于该加密信息对所述对象进行加密。For example, when encrypted information has been stored in the terminal device, for example, the user has set a password, gesture or fingerprint for unlocking the screen, the stored encrypted information can be obtained as the encrypted information to be selected. Then, after the user's use of the application satisfies the encryption conditions and the encryption is confirmed, the user can be provided with encrypted information to be selected, and the user can select one or more of the existing encrypted information, or can create new encrypted information. When the user chooses to create new encrypted information, an input box, a gesture map, or a fingerprint recognition module can be activated for the user to input encrypted information. After the user has made and confirmed the selection, the encrypted information selected by the user can be used as the encrypted information for the object, and the object can be encrypted based on the encrypted information.

通过这种方式,可以提供加密信息以供用户选择,提高了用户加密的灵活性,提升了用户体验。In this way, encrypted information can be provided for users to choose, which improves the flexibility of user encryption and improves user experience.

图6是根据一示例性实施例示出的一种对象加密方法的流程图。如图6所示,在一种可能的实现方式中,所述方法还包括:Fig. 6 is a flow chart of an object encryption method according to an exemplary embodiment. As shown in Figure 6, in a possible implementation manner, the method further includes:

在步骤S14中,在已加密的对象启动的情况下,显示加密信息输入控件;In step S14, when the encrypted object is activated, an encrypted information input control is displayed;

在步骤S15中,在通过加密信息输入控件获取到针对所述已加密的对象的加密信息的情况下,使所述已加密的对象解密。In step S15, when the encrypted information for the encrypted object is obtained through the encrypted information input control, the encrypted object is decrypted.

举例来说,在已经对对象例如应用进行了加密的情况下,如果已加密的对象启动,则可以显示加密信息输入控件。根据已加密对象的加密信息的类型,可以相应地显示加密信息输入控件,例如,在采用密码或手势加密时,可以显示输入框或手势图;在采用指纹加密时,可以提示用户按压指纹采集局域。在通过加密信息输入控件获取到针对已加密的对象的加密信息的情况下,可以使已加密的对象解密。For example, where an object, such as an application, has been encrypted, an encryption information input control may be displayed if the encrypted object is launched. According to the type of encrypted information of the encrypted object, the encrypted information input controls can be displayed accordingly. For example, when password or gesture encryption is used, an input box or gesture map can be displayed; when fingerprint encryption is used, the user can be prompted to press the fingerprint collection bureau. area. When the encrypted information for the encrypted object is obtained through the encrypted information input control, the encrypted object can be decrypted.

在一种可能的实现方式中,对于支持面内指纹识别功能的终端设备,在采用指纹加密时,可以不显示加密信息输入控件,在用户点击应用的图标时直接采集指纹信息。在获取到针对已加密的对象的加密信息(指纹信息)时,可以使已加密的对象解密。In a possible implementation manner, for a terminal device supporting the in-plane fingerprint identification function, when fingerprint encryption is used, the encryption information input control may not be displayed, and fingerprint information is directly collected when the user clicks on the application icon. When the encrypted information (fingerprint information) for the encrypted object is acquired, the encrypted object can be decrypted.

通过这种方式,可以实现已加密的对象启动时的快速解密,提高了用户使用的便利性。In this way, the encrypted object can be quickly decrypted when it is started, which improves the convenience of the user.

图7是根据一示例性实施例示出的一种对象加密方法的流程图。如图7所示,在一种可能的实现方式中,所述方法还包括:Fig. 7 is a flow chart of an object encryption method according to an exemplary embodiment. As shown in FIG. 7, in a possible implementation manner, the method further includes:

在步骤S16中,在未获取到针对所述已加密的对象的加密信息的情况下,进行对应于解密失败的处理。In step S16, if the encrypted information for the encrypted object is not obtained, a process corresponding to decryption failure is performed.

举例来说,在已加密的对象启动时,如果未获取到针对已加密的对象的加密信息,例如用户的密码或手势输入错误,指纹信息不对应等,可以进行对应于解密失败的处理。该处理可以采用多种形式。例如,在解密成功后能够进入已加密的对象,而解密失败后不能进入已加密的对象,并且可以提示该对象损坏且不能删除,或者提示该对象不能打开。For example, when the encrypted object is activated, if the encrypted information for the encrypted object is not obtained, for example, the user's password or gesture input is incorrect, the fingerprint information does not correspond, etc., processing corresponding to the decryption failure can be performed. This processing can take many forms. For example, the encrypted object can be accessed after decryption is successful, but the encrypted object cannot be accessed after decryption fails, and it can be prompted that the object is damaged and cannot be deleted, or that the object cannot be opened.

在一种可能的实现方式中,在解密成功后和解密失败后能够获取已加密对象的不同的权限或采用不同的显示形式,例如,对于一个文件或文件夹,解密成功后进入具有所有权限例如阅读、修改、添加和删除等;解密失败后仅具有部分权限,例如仅能阅读,不能修改、添加和删除等。In a possible implementation, different permissions of the encrypted object can be obtained or displayed in different forms after decryption is successful and after decryption fails. Read, modify, add, delete, etc.; after decryption fails, only have partial permissions, such as only reading, not modifying, adding, and deleting.

通过这种方式,可以在对已加密的对象解密失败时进行对应于解密失败的处理,提高了用户使用的便利性。In this way, when the decryption of the encrypted object fails, the processing corresponding to the decryption failure can be performed, which improves the convenience of the user.

图8是根据一示例性实施例示出的一种对象加密装置框图。参照图8,该装置包括条件判断模块81,控件显示模块82和加密模块83。Fig. 8 is a block diagram of an object encryption apparatus according to an exemplary embodiment. Referring to FIG. 8 , the apparatus includes a condition judgment module 81 , a control display module 82 and an encryption module 83 .

条件判断模块81被配置为根据用户针对对象的使用模式,判断所述对象是否满足加密条件;The condition judging module 81 is configured to judge whether the object satisfies the encryption condition according to the usage pattern of the object by the user;

控件显示模块82被配置为在所述对象满足加密条件的情况下,显示加密确认控件;The control display module 82 is configured to display the encryption confirmation control when the object satisfies the encryption condition;

加密模块83被配置为在所述加密确认控件被触发的情况下,对所述对象进行加密。The encryption module 83 is configured to encrypt the object if the encryption confirmation control is triggered.

图9是根据一示例性实施例示出的一种对象加密装置框图。如图9所示,在一种可能的实现方式中,所述条件判断模块81包括:Fig. 9 is a block diagram of an object encryption apparatus according to an exemplary embodiment. As shown in FIG. 9, in a possible implementation manner, the condition judgment module 81 includes:

第一判断子模块811,用于在用户针对对象的使用模式符合第一模式的情况下,判断所述对象满足加密条件,The first judging submodule 811 is used to judge that the object satisfies the encryption condition when the user's usage pattern for the object conforms to the first pattern,

其中,所述第一模式包括以下使用模式中的一种或多种:Wherein, the first mode includes one or more of the following usage modes:

在退出对象的情况下,删除所述对象中的记录;in the case of exiting an object, delete the record in said object;

在退出对象的情况下,删除所述对象;in the case of exiting the object, delete the object;

在第一时间内,启动对象的次数大于或等于第一次数阈值;Within the first time, the number of times to start the object is greater than or equal to the first threshold of times;

对对象中的文件进行加密。Encrypt the files in the object.

如图9所示,在一种可能的实现方式中,所述加密模块83包括:As shown in FIG. 9, in a possible implementation manner, the encryption module 83 includes:

加密信息获取子模块831,用于获取针对所述对象的加密信息;Encrypted information acquisition sub-module 831, for acquiring encrypted information for the object;

第一加密子模块832,用于基于所述加密信息对所述对象进行加密。The first encryption sub-module 832 is configured to encrypt the object based on the encrypted information.

如图9所示,在一种可能的实现方式中,所述加密信息获取子模块831包括:As shown in FIG. 9, in a possible implementation manner, the encrypted information acquisition submodule 831 includes:

采集子模块8311,用于在用户触摸屏幕时,采集用户的指纹信息;The collection sub-module 8311 is used to collect the user's fingerprint information when the user touches the screen;

第一加密信息获取子模块8312,用于在所采集的指纹信息达到作为加密信息的条件的情况下,将所采集的指纹信息作为针对所述对象的加密信息。The first encrypted information acquisition sub-module 8312 is configured to use the collected fingerprint information as encrypted information for the object under the condition that the collected fingerprint information meets the condition of being used as encrypted information.

如图9所示,在一种可能的实现方式中,所述加密信息获取子模块831包括:As shown in FIG. 9, in a possible implementation manner, the encrypted information acquisition submodule 831 includes:

已存储信息获取子模块8313,用于获取已存储的加密信息作为待选择的加密信息;The stored information acquisition sub-module 8313 is used to acquire the stored encrypted information as the encrypted information to be selected;

信息选择子模块8314,用于向用户提供待选择的加密信息;The information selection sub-module 8314 is used to provide the encrypted information to be selected to the user;

第二加密信息获取子模块8315,用于将用户选择的加密信息作为针对所述对象的加密信息。The second encrypted information acquisition sub-module 8315 is configured to use the encrypted information selected by the user as the encrypted information for the object.

如图9所示,在一种可能的实现方式中,所述装置还包括:As shown in FIG. 9, in a possible implementation manner, the apparatus further includes:

输入显示模块84,用于在已加密的对象启动的情况下,显示加密信息输入控件;an input display module 84 for displaying encrypted information input controls when the encrypted object is activated;

解密模块85,用于在通过加密信息输入控件获取到针对所述已加密的对象的加密信息的情况下,使所述已加密的对象解密。The decryption module 85 is configured to decrypt the encrypted object when the encrypted information for the encrypted object is obtained through the encrypted information input control.

如图9所示,在一种可能的实现方式中,所述装置还包括:As shown in FIG. 9, in a possible implementation manner, the apparatus further includes:

失败处理模块86,用于在未获取到针对所述已加密的对象的加密信息的情况下,进行对应于解密失败的处理。The failure processing module 86 is configured to perform processing corresponding to the decryption failure when the encrypted information for the encrypted object is not obtained.

关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。Regarding the apparatus in the above-mentioned embodiment, the specific manner in which each module performs operations has been described in detail in the embodiment of the method, and will not be described in detail here.

本实施例通过分析用户针对对象的使用模式来判断是否满足加密条件,并在满足加密条件且加密确认控件被触发时对对象进行加密,实现对象的自动加密,提高了用户使用的便利性,提升了用户体验。This embodiment determines whether the encryption condition is satisfied by analyzing the usage pattern of the object by the user, and encrypts the object when the encryption condition is satisfied and the encryption confirmation control is triggered, so as to realize the automatic encryption of the object, improve the convenience for the user to use, and improve the user experience.

图10是根据一示例性实施例示出的一种对象加密装置800的框图。例如,装置800可以是移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。FIG. 10 is a block diagram of an object encryption apparatus 800 according to an exemplary embodiment. For example, apparatus 800 may be a mobile phone, computer, digital broadcast terminal, messaging device, game console, tablet device, medical device, fitness device, personal digital assistant, and the like.

参照图10,装置800可以包括以下一个或多个组件:处理组件802,存储器804,电源组件806,多媒体组件808,音频组件810,输入/输出(I/O)的接口812,传感器组件814,以及通信组件816。10, the apparatus 800 may include one or more of the following components: a processing component 802, a memory 804, a power supply component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and communication component 816.

处理组件802通常控制装置800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件802可以包括一个或多个处理器820来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件802可以包括一个或多个模块,便于处理组件802和其他组件之间的交互。例如,处理组件802可以包括多媒体模块,以方便多媒体组件808和处理组件802之间的交互。The processing component 802 generally controls the overall operation of the device 800, such as operations associated with display, phone calls, data communications, camera operations, and recording operations. The processing component 802 can include one or more processors 820 to execute instructions to perform all or some of the steps of the methods described above. Additionally, processing component 802 may include one or more modules that facilitate interaction between processing component 802 and other components. For example, processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.

存储器804被配置为存储各种类型的数据以支持在装置800的操作。这些数据的示例包括用于在装置800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器804可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。Memory 804 is configured to store various types of data to support operations at device 800 . Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and the like. Memory 804 may be implemented by any type of volatile or nonvolatile storage device or combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic or Optical Disk.

电源组件806为装置800的各种组件提供电力。电源组件806可以包括电源管理系统,一个或多个电源,及其他与为装置800生成、管理和分配电力相关联的组件。Power supply assembly 806 provides power to the various components of device 800 . Power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to device 800 .

多媒体组件808包括在所述装置800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件808包括一个前置摄像头和/或后置摄像头。当装置800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。Multimedia component 808 includes a screen that provides an output interface between the device 800 and the user. In some embodiments, the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touch, swipe, and gestures on the touch panel. The touch sensor may not only sense the boundaries of a touch or swipe action, but also detect the duration and pressure associated with the touch or swipe action. In some embodiments, the multimedia component 808 includes a front-facing camera and/or a rear-facing camera. When the apparatus 800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera may receive external multimedia data. Each of the front and rear cameras can be a fixed optical lens system or have focal length and optical zoom capability.

音频组件810被配置为输出和/或输入音频信号。例如,音频组件810包括一个麦克风(MIC),当装置800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器804或经由通信组件816发送。在一些实施例中,音频组件810还包括一个扬声器,用于输出音频信号。Audio component 810 is configured to output and/or input audio signals. For example, audio component 810 includes a microphone (MIC) that is configured to receive external audio signals when device 800 is in operating modes, such as call mode, recording mode, and voice recognition mode. The received audio signal may be further stored in memory 804 or transmitted via communication component 816 . In some embodiments, audio component 810 also includes a speaker for outputting audio signals.

I/O接口812为处理组件802和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。The I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to: home button, volume buttons, start button, and lock button.

传感器组件814包括一个或多个传感器,用于为装置800提供各个方面的状态评估。例如,传感器组件814可以检测到装置800的打开/关闭状态,组件的相对定位,例如所述组件为装置800的显示器和小键盘,传感器组件814还可以检测装置800或装置800一个组件的位置改变,用户与装置800接触的存在或不存在,装置800方位或加速/减速和装置800的温度变化。传感器组件814可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件814还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件814还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。Sensor assembly 814 includes one or more sensors for providing status assessment of various aspects of device 800 . For example, the sensor assembly 814 can detect the open/closed state of the device 800, the relative positioning of components, such as the display and keypad of the device 800, and the sensor assembly 814 can also detect a change in the position of the device 800 or a component of the device 800 , the presence or absence of user contact with the device 800 , the orientation or acceleration/deceleration of the device 800 and the temperature change of the device 800 . Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact. Sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.

通信组件816被配置为便于装置800和其他设备之间有线或无线方式的通信。装置800可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件816经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。Communication component 816 is configured to facilitate wired or wireless communication between apparatus 800 and other devices. Device 800 may access wireless networks based on communication standards, such as WiFi, 2G or 3G, or a combination thereof. In one exemplary embodiment, the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 also includes a near field communication (NFC) module to facilitate short-range communication. For example, the NFC module may be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.

在示例性实施例中,装置800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。In an exemplary embodiment, apparatus 800 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation is used to perform the above method.

在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器804,上述指令可由装置800的处理器820执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。In an exemplary embodiment, there is also provided a non-transitory computer-readable storage medium including instructions, such as a memory 804 including instructions, executable by the processor 820 of the apparatus 800 to perform the method described above. For example, the non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.

本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本公开的其它实施方案。本申请旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。Other embodiments of the present disclosure will readily occur to those skilled in the art upon consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the present disclosure that follow the general principles of the present disclosure and include common knowledge or techniques in the technical field not disclosed by the present disclosure . The specification and examples are to be regarded as exemplary only, with the true scope and spirit of the disclosure being indicated by the following claims.

应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。It is to be understood that the present disclosure is not limited to the precise structures described above and illustrated in the accompanying drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (13)

1. An object encryption method, comprising:
judging whether the object meets an encryption condition or not according to the use mode of the user for the object;
displaying an encryption confirmation control under the condition that the object meets the encryption condition;
encrypting the object if the encryption confirmation control is triggered;
the method for judging whether the object meets the encryption condition or not according to the use mode of the user for the object comprises the following steps:
judging that the object satisfies an encryption condition in a case where a usage pattern of the object by the user conforms to a first pattern,
wherein the first mode comprises one or more of the following modes of use:
deleting a record in an object in the event of exiting the object;
in the case of exiting an object, deleting the object;
in a first time, the number of times the object is started is greater than or equal to a first time threshold;
the file in the object is encrypted.
2. The method of claim 1, wherein encrypting the object if the encryption confirmation control is triggered comprises:
obtaining encryption information for the object;
encrypting the object based on the encryption information.
3. The method of claim 2, wherein obtaining encryption information for the object comprises:
when a user touches a screen, fingerprint information of the user is collected;
in a case where the collected fingerprint information meets a condition as encryption information, the collected fingerprint information is taken as encryption information for the object.
4. The method of claim 2, wherein obtaining encryption information for the object comprises:
acquiring stored encryption information as encryption information to be selected;
providing the encryption information to be selected to the user;
and taking the encryption information selected by the user as the encryption information aiming at the object.
5. The method of claim 1, further comprising:
displaying an encrypted information input control under the condition that the encrypted object is started;
and when the encryption information aiming at the encrypted object is acquired through the encryption information input control, the encrypted object is decrypted.
6. The method of claim 5, further comprising:
if the encryption information for the encrypted object is not acquired, processing corresponding to a decryption failure is performed.
7. An object encryption apparatus, comprising:
the condition judgment module is used for judging whether the object meets an encryption condition or not according to the use mode of the user for the object;
the control display module is used for displaying the encryption confirmation control under the condition that the object meets the encryption condition;
the encryption module is used for encrypting the object under the condition that the encryption confirmation control is triggered;
wherein, the condition judging module comprises:
the first judgment submodule is used for judging that the object meets the encryption condition under the condition that the use mode of the user for the object meets the first mode;
wherein the first mode comprises one or more of the following modes of use:
deleting a record in an object in the event of exiting the object;
in the case of exiting an object, deleting the object;
in a first time, the number of times the object is started is greater than or equal to a first time threshold;
the file in the object is encrypted.
8. The apparatus of claim 7, wherein the encryption module comprises:
an encryption information acquisition sub-module for acquiring encryption information for the object;
a first encryption sub-module for encrypting the object based on the encryption information.
9. The apparatus according to claim 8, wherein the encryption information obtaining sub-module includes:
the acquisition submodule is used for acquiring fingerprint information of a user when the user touches a screen;
a first encryption information acquisition sub-module configured to take the acquired fingerprint information as encryption information for the object in a case where the acquired fingerprint information meets a condition as encryption information.
10. The apparatus according to claim 8, wherein the encryption information obtaining sub-module includes:
the stored information acquisition submodule is used for acquiring the stored encryption information as the encryption information to be selected;
the information selection submodule is used for providing the encryption information to be selected for the user;
and the second encryption information acquisition sub-module is used for taking the encryption information selected by the user as the encryption information aiming at the object.
11. The apparatus of claim 7, further comprising:
the input display module is used for displaying the encrypted information input control under the condition that the encrypted object is started;
and the decryption module is used for decrypting the encrypted object under the condition that the encryption information aiming at the encrypted object is acquired through the encryption information input control.
12. The apparatus of claim 11, further comprising:
and the failure processing module is used for performing processing corresponding to decryption failure under the condition that the encryption information aiming at the encrypted object is not acquired.
13. An object encryption apparatus, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
judging whether the object meets an encryption condition or not according to the use mode of the user for the object;
displaying an encryption confirmation control under the condition that the object meets the encryption condition;
encrypting the object if the encryption confirmation control is triggered;
the method for judging whether the object meets the encryption condition or not according to the use mode of the user for the object comprises the following steps:
judging that the object satisfies an encryption condition in a case where a usage pattern of the object by the user conforms to a first pattern,
wherein the first mode comprises one or more of the following modes of use:
deleting a record in an object in the event of exiting the object;
in the case of exiting an object, deleting the object;
in a first time, the number of times the object is started is greater than or equal to a first time threshold;
the file in the object is encrypted.
CN201710043968.6A 2017-01-19 2017-01-19 Object encryption method and device Active CN108337355B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710043968.6A CN108337355B (en) 2017-01-19 2017-01-19 Object encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710043968.6A CN108337355B (en) 2017-01-19 2017-01-19 Object encryption method and device

Publications (2)

Publication Number Publication Date
CN108337355A CN108337355A (en) 2018-07-27
CN108337355B true CN108337355B (en) 2020-10-13

Family

ID=62922820

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710043968.6A Active CN108337355B (en) 2017-01-19 2017-01-19 Object encryption method and device

Country Status (1)

Country Link
CN (1) CN108337355B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105574379A (en) * 2015-12-30 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Private mode starting method and device as well as terminal
CN105893854A (en) * 2016-03-30 2016-08-24 北京小米移动软件有限公司 Encryption and decryption method and device
CN106062762A (en) * 2016-05-25 2016-10-26 北京小米移动软件有限公司 Application encryption method and device
CN106250766A (en) * 2016-07-27 2016-12-21 北京金山安全软件有限公司 Information security processing method and device and terminal
CN106295358A (en) * 2015-05-20 2017-01-04 西安中兴新软件有限责任公司 A kind of information processing method and electronic equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140281518A1 (en) * 2013-03-12 2014-09-18 Commvault Systems, Inc. Multi-tier file restoration

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295358A (en) * 2015-05-20 2017-01-04 西安中兴新软件有限责任公司 A kind of information processing method and electronic equipment
CN105574379A (en) * 2015-12-30 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Private mode starting method and device as well as terminal
CN105893854A (en) * 2016-03-30 2016-08-24 北京小米移动软件有限公司 Encryption and decryption method and device
CN106062762A (en) * 2016-05-25 2016-10-26 北京小米移动软件有限公司 Application encryption method and device
CN106250766A (en) * 2016-07-27 2016-12-21 北京金山安全软件有限公司 Information security processing method and device and terminal

Also Published As

Publication number Publication date
CN108337355A (en) 2018-07-27

Similar Documents

Publication Publication Date Title
CN104765552A (en) Authority management method and device
US20160239834A1 (en) Method and apparatus for requesting account transfer
CN106453052B (en) Message interaction method and device
CN103914634A (en) Image encryption method, image encryption device and electronic device
CN106210238B (en) Short message storage method and device
CN103945275B (en) Picture recording control method and device and mobile terminal
CN104639533B (en) Method of controlling security based on terminal and device
JP6101863B2 (en) Information transmission method, apparatus, program, and recording medium for voice service
CN106909827A (en) Using account management method and device
WO2017177595A1 (en) Data migration method and device
CN108319832A (en) Unlocking method and device
CN107230060A (en) The method and apparatus that a kind of account is reported the loss
CN106529277A (en) Message preview method and device
CN107147815B (en) Taxi-based call processing method and device
CN108319419B (en) Method and device for launching applications
CN107734178A (en) Presentation of information processing method, device, equipment and storage medium
CN107169060A (en) Image processing method, device and terminal in terminal
CN107360322B (en) Information prompting method and device
CN106845199A (en) Object authentication method and device
CN105046127A (en) Encryption and decryption implementation method and device
CN106372943A (en) Message processing method and device
CN106611112A (en) Application program safe processing method, device and equipment
CN105975283A (en) Starting method and device for operating system
CN108664216A (en) Date storage method and device
CN106503573B (en) Cipher set-up method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载