File protection method and device, and terminal

A technology for protecting devices and files, applied in the field of information security, which can solve problems such as terminal loss, low terminal information security, user privacy information leakage, etc., to achieve the effect of improving information security and avoiding privacy information leakage

Inactive Publication Date: 2017-03-22
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the user carries the terminal with him, the terminal is lost or the storage device (such as a memory card) in the terminal is lost.
Once the terminal or the storage device in the terminal is lost, the information stored by the user is easy to be known by others, resulting in the leakage of user privacy information
[0004] Therefore, the current terminal cannot effectively protect the information stored by the user, resulting in low information security of the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File protection method and device, and terminal
  • File protection method and device, and terminal
  • File protection method and device, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0032] The terms "first", "second", "third", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects and not necessarily to describe a specific order or sequentially. It should be understood that the items so described are interchangeable under appropriate circumstances. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a file protection method and device, and a terminal. The method comprises the following steps of: when a file is detected to operate, receiving decryption information input by a user; comparing the decryption information with encryption information in the file to obtain a comparison result; according to the comparison result, judging whether the decryption information is abnormal or not; and if the decryption information is abnormal, transferring the file to a preset storage position. By use of the scheme, after the user inputs the decryption information, whether the decryption information is abnormal or not is judged through the comparison result of the decryption information and the encryption information in the file, and the file is transferred when the decryption information is abnormal. When other people carry out illegal cracking on an encrypted file, the file can be transferred, and a phenomenon that the private file of the user is illegally obtained by other people so as to cause the leakage of the private information of the user is avoided so as to improve the information security of the terminal.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a file protection method, device and terminal. Background technique [0002] With the development of terminal technology, users rely more and more on terminals such as smart phones, and the storage space of terminals is also increasing. Users can store various information in the terminal. For example, the user can store multimedia information such as music and video in the terminal, and can also store private information such as address book and short message. [0003] On the other hand, due to the portability of the terminal, users usually carry the terminal with them. However, when the user carries the terminal with him, the terminal is lost or the storage device (such as a memory card) in the terminal is lost from time to time. Once the terminal or the storage device in the terminal is lost, the information stored by the user is easy to be known by others, resu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/6245G06F21/602G06F2221/2141
Inventor 任利宽
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products