[go: up one dir, main page]

CN112597537A - File processing method and device, intelligent device and storage medium - Google Patents

File processing method and device, intelligent device and storage medium Download PDF

Info

Publication number
CN112597537A
CN112597537A CN202011556984.3A CN202011556984A CN112597537A CN 112597537 A CN112597537 A CN 112597537A CN 202011556984 A CN202011556984 A CN 202011556984A CN 112597537 A CN112597537 A CN 112597537A
Authority
CN
China
Prior art keywords
file
password
target
decryption
association
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011556984.3A
Other languages
Chinese (zh)
Other versions
CN112597537B (en
Inventor
陈志文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202011556984.3A priority Critical patent/CN112597537B/en
Publication of CN112597537A publication Critical patent/CN112597537A/en
Priority to PCT/CN2021/107163 priority patent/WO2022134559A1/en
Application granted granted Critical
Publication of CN112597537B publication Critical patent/CN112597537B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/156Query results presentation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Library & Information Science (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention relates to a file processing method, a file processing device, intelligent equipment and a storage medium, wherein the method comprises the following steps: receiving an input decryption password of a file to be decrypted; inquiring a corresponding first file from a pre-stored association relationship between the password and the file; and displaying a first file corresponding to the decryption password. By the method, the real file can be opened by the real password, and the corresponding file can be opened by any non-real password, so that the effect of falsifying and falsifying is achieved, and the password is prevented from being cracked successfully by other people through trying the password for many times.

Description

File processing method and device, intelligent device and storage medium
Technical Field
The embodiment of the invention relates to the field of file processing, in particular to a file processing method and device, intelligent equipment and a storage medium.
Background
Nowadays, with the popularization of intelligent equipment, people can not leave the intelligent equipment more and more in daily work, life, study and the like. People often store some important files or privacy, etc. on smart devices. Therefore, the security and confidentiality of the smart devices are increasingly emphasized.
However, the existing file encryption method can only set one password for a file, when the input password is the correct password, the file can be decrypted and the content of the file can be displayed, when the input password is the wrong password, the password error can be prompted, no corresponding file can be displayed, the effect of falseness and falseness cannot be achieved, so that a person who wants to steal file information can complete the decryption of the password by trying the password for many times, and privacy leakage can still be caused.
Disclosure of Invention
In view of this, in order to solve the technical problem that a file is leaked due to the fact that a password is easily cracked when a wrong password is input for multiple times during file decryption, embodiments of the present invention provide a file processing method, an apparatus, an intelligent device, and a storage medium.
In a first aspect, an embodiment of the present invention provides a file processing method, including:
receiving an input decryption password of a file to be decrypted;
inquiring a corresponding first file from a pre-stored association relationship between the password and the file;
and displaying a first file corresponding to the decryption password.
In one possible embodiment, the method further comprises:
when the decryption password is determined to be a target password, inquiring a target file corresponding to the target password from the association relation as a first file;
and when the decryption password is determined to be a non-target password, querying a non-target file corresponding to the non-target password from the association relation as a first file.
In one possible embodiment, the method further comprises:
and when the decryption password is any one of the non-target passwords, taking the non-target file as a first file.
In one possible embodiment, the method further comprises:
and when the non-target password in the association relation contains the decryption password, querying a non-target file corresponding to the decryption password from a plurality of non-target files as a first file.
In one possible embodiment, the method further comprises:
and when the target password and the non-target password in the association relation do not contain the decryption password, randomly selecting a non-target file from the plurality of non-target files as a first file.
In one possible embodiment, the method further comprises:
and when the target password and the non-target password in the association do not contain the decryption password, taking the alternative file as a first file.
In one possible embodiment, the method further comprises:
the attributes of the non-target file and/or the alternate file are set to be hidden.
In one possible embodiment, the method further comprises:
when neither the target password nor the non-target password in the association relation contains the decryption password, copying a target file to a preset position, changing part of contents in the copied target file, and taking the changed target file as a second file;
and displaying a second file corresponding to the decryption password.
In a second aspect, an embodiment of the present invention provides a file processing apparatus, including:
the receiving device is used for receiving the input decryption password of the file to be decrypted;
the query module is used for querying a corresponding first file from the association relationship between the prestored password and the file;
and the display module is used for displaying the first file corresponding to the decryption password.
In a third aspect, an embodiment of the present invention provides an intelligent device, including: a processor and a memory, the processor being configured to execute a file processing program stored in the memory to implement the file processing method described in the first aspect.
In a fourth aspect, an embodiment of the present invention provides a storage medium, including: the storage medium stores one or more programs that are executable by one or more processors to implement the file processing method described in the above first aspect.
According to the file processing scheme provided by the embodiment of the invention, the input decryption password of the file to be decrypted is received; inquiring a corresponding first file from a pre-stored association relationship between the password and the file; and displaying a first file corresponding to the decryption password. In the prior art, the file is decrypted, if the password is correct, the file is normally opened, and if the password is incorrect, the password is wrong and the file cannot be opened. However, in some situations where it is inconvenient to display a real file, a password cannot be displayed externally, the file cannot be opened, and a non-real file needs to be displayed externally, which cannot be achieved by the prior art. According to the scheme, the modified non-real file can be displayed through different decryption passwords, so that the effect of falsely and falsely displaying the real file is achieved under the scene that a user inconveniently displays the real file, and the privacy safety of the user is guaranteed.
Drawings
Fig. 1 is a schematic flow chart of a file processing method according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart illustrating another document processing method according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating another file processing method according to an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of a document processing apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an intelligent device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
For the convenience of understanding of the embodiments of the present invention, the following description will be further explained with reference to specific embodiments, which are not to be construed as limiting the embodiments of the present invention.
Fig. 1 is a schematic flowchart of a file processing method according to an embodiment of the present invention, and as shown in fig. 1, the method is applied to a scenario in which a file is decrypted by different decryption passwords and then different file contents are displayed, where file types include, but are not limited to: documents, folders, tables, or text, etc. The method can be applied to intelligent equipment such as smart phones, notebook computers, desktop computers, portable computers and the like.
Further, the method specifically comprises the following steps:
and S11, receiving the input decryption password of the file to be decrypted.
In the embodiment of the present invention, when the file is set with the encryption password, an association relationship between the current file and the corresponding encryption password, and between other files and other passwords is constructed, where the association relationship includes at least two sets of correspondence relationships, and the correspondence relationship may be: current file (true file) -encrypted password (true password), and other file (false file) -other password (false password).
And performing association setting on the association relationship between the current file-encryption password and other file-other passwords so that when a user accesses the current file, a decryption password needs to be input, and the association relationship is inquired based on the decryption password.
When the condition that a user accesses a current file (file to be decrypted) is detected, a decryption interface is generated, a password input area for inputting a decryption password is arranged in the decryption interface, and the input decryption password of the file to be decrypted is received through the password input area.
And S12, inquiring the corresponding first file from the association relationship between the pre-stored password and the file.
And S13, displaying the first file corresponding to the decryption password.
Identifying a decryption password input by a user, inquiring the association relation between a file and the password, inquiring a first file corresponding to the decryption password input by the user from the association relation, and if the decryption password is a true password from the association relation, displaying the true file corresponding to the true password as the first file; and if the decryption password is a false password, which is inquired from the association relation, displaying the false file corresponding to the false password as the first file.
The file processing method provided by the embodiment of the invention receives the input decryption password of the file to be decrypted; inquiring a corresponding first file from a pre-stored association relationship between the password and the file; and displaying a first file corresponding to the decryption password. Compared with the one-to-one relation between the existing file and the password, the visitor can try to decode the password for a plurality of times, set the association relation and do not display the wrong password prompt, so that the condition that the password input by the visitor at each time is displayed by the corresponding file can be ensured, and only a file creator or a file authorizer can identify the authenticity of the file, so that the aim of falsely and falsely preventing the file from being decoded is fulfilled, and the information safety is ensured.
Fig. 2 is a schematic flow chart of another file processing method according to an embodiment of the present invention, and as shown in fig. 2, the method specifically includes:
and S21, receiving the input decryption password of the file to be decrypted.
In an optional embodiment of the present invention, a plurality of files are stored in advance, each file is set with an encryption password, wherein the plurality of files comprise an encryption password corresponding to a target file of a true file (hereinafter referred to as a target file) and at least one false file (hereinafter referred to as a non-target file), and the encryption password is a target password; the encrypted password corresponding to the non-target file is a non-target password, the target file and the non-target file can be documents, tables, folders and the like, the content in the target file is real content, namely important content which is inconvenient to be disclosed externally, the content in the non-target file can be similar to the real content, some data are inconsistent, and the content can be other content which can be disclosed externally. The target file and the non-target file may be stored in the same storage location or may be stored in different storage locations.
And further, establishing an association relationship between the file and the password according to the target password corresponding to the target file and the non-target password corresponding to the non-target file.
Further, the association relationship between the file and the password may be: the method comprises the steps that a target file and a non-target file are stored in the same storage position, wherein the target file corresponds to a target password, and the non-target file can correspond to a plurality of non-target passwords; the association relationship between the file and the password and the storage location of the file can be as shown in table 1:
filename Cipher code File storage location
Object document 123 First memory address
Non-target document A 234 First memory address
TABLE 1
Optionally, a target file and a plurality of non-target files may be stored in the same storage location, where the target file corresponds to a target password, and each non-target file corresponds to a non-target password; the association relationship between the file and the password and the storage location of the file can be shown in table 2:
filename Cipher code File storage location
Object document 123 First memory address
Non-target document A 234 First memory address
Non-target file B 345 First memory address
Non-target file C 456 First memory address
TABLE 2
Optionally, a target file and a plurality of non-target files may be stored in different storage locations, where the target file corresponds to a target password, each non-target file corresponds to a non-target password, and the password may point to a location where the file is stored; the association relationship between the file and the password and the storage location of the file can be shown in table 3:
filename Cipher code File storage location
Object document 123 First memory address
Non-target document A 234 Second memory address
Non-target file B 345 The third storage address
Non-target file C 456 The fourth storage address
TABLE 3
Optionally, different storage locations may store one target file, multiple non-target files, and one candidate file, where the target file corresponds to one target password, each non-target file corresponds to one non-target password, and the candidate file may be another password except the target password and the multiple non-target passwords, and when the files are stored in different locations, the passwords may point to the location where the file is stored; the association relationship between the file and the password and the storage location of the file can be as shown in table 4:
filename Cipher code File storage location
Object document 123 First memory address
Non-target document A 234 Second memory address
Non-target file B 345 The third storage address
Alternative files 567 The fourth storage address
TABLE 4
Further, a target password corresponding to the target file, a non-target password corresponding to the non-target file and an association relation are set in an associated mode, when the target file and the non-target file are stored in the same storage position, the attribute of the target file is set to be displayed in an interface displayed in the file, and the attribute of the non-target file is set to be hidden, so that the purpose that a visitor is confused that only one target file is displayed in the interface displayed in the file is achieved; therefore, when a user accesses a current file (a target file, namely a file to be decrypted), a decryption password needs to be input, and the association relation is inquired based on the decryption password.
When the condition that a user accesses a current file (file to be decrypted) is detected, a decryption interface is generated, a password input area for inputting a decryption password is arranged in the decryption interface, and the input decryption password of the file to be decrypted is received through the password input area.
And S22, when the decryption password is determined to be the target password, inquiring a target file corresponding to the target password from the association relationship to be used as a first file.
And inquiring whether the decryption password currently input by the user exists in the association relationship after receiving the decryption password currently input by the user, if so, searching a file corresponding to the current decryption password according to the association relationship, and when determining that the decryption password is a target password according to the association relationship, taking the target file corresponding to the target password as a first file corresponding to the decryption password currently input by the user, and displaying the searched first file.
For example, if the currently input decryption password is 123, the association relationship in the table is queried, and it is determined that the currently input decryption password is the same as the target password, the target file corresponding to the target password is used as the first file corresponding to the currently input decryption password.
And S23, when the decryption password is determined to be a non-target password, querying a non-target file corresponding to the non-target password from the association relationship to serve as a first file.
In the embodiment of the present invention, the number of the non-target files may be one or more, and when it is found from the preset association relationship that the decryption password currently input by the user is the non-target password, the non-target file corresponding to the non-target password is used as the first file corresponding to the decryption password currently input by the user. Different query modes are corresponding to one or more non-target files.
In an alternative of the embodiment of the invention, only one target file and one non-target file are stored. And the password corresponding to the non-target file in the association relationship is any non-target password.
Further, when the decryption password input by the user is determined to be a non-target password, the pre-stored non-target file is used as the first file corresponding to the decryption password currently input by the user.
Further, the first file is displayed on a display screen of the intelligent device. And the attribute information of the target file is modified to be hidden, so that other files under the folder are prevented from being displayed to the outside, the sizes of the attribute information of the folder for storing the target file and the non-target file are modified, and the modified folder size can be the same as the size of the displayed non-target file.
In another alternative of an embodiment of the present invention, one target file and a plurality of non-target files are stored in the same folder.
Further, when the decryption password input by the user is determined to be a non-target password, whether a non-target password identical to the decryption password currently input by the user exists in a plurality of preset non-target passwords is inquired, if the plurality of non-target passwords include the decryption password currently input by the user, a non-target file corresponding to the non-target password identical to the decryption password input by the user is searched according to the association relationship, and the searched non-target file is used as a first file corresponding to the decryption password currently input by the user. And modifying the attribute information of other non-target files and target files stored under the folder to be hidden, hiding all files, and modifying the size in the attribute information of the folder, wherein the modified folder size can be the same as the size of the displayed non-target files.
S24, when neither the target password nor the non-target password in the association relation contains the decryption password, randomly selecting a non-target file from the non-target files as a first file.
When the decryption password input by the user is determined to be the non-target password and the plurality of non-target passwords do not contain the decryption password currently input by the user, one non-target file can be randomly selected from the plurality of non-target files to be used as the first file to be displayed. And modifying the attribute information of other non-target files and target files stored under the folder to be hidden, hiding all files, and modifying the size in the attribute information of the folder, wherein the modified folder size can be the same as the size of the displayed non-target files.
Optionally, an alternative file may be stored, where the alternative file may be stored in a folder that is the same as the one target file and the plurality of non-target files, or may be stored in another folder, and when neither the target password nor the plurality of non-target passwords includes the decryption password currently input by the user, the alternative file may be displayed as the first file.
The file processing method provided by the embodiment of the invention receives the input decryption password of the file to be decrypted; inquiring a corresponding first file from a pre-stored association relationship between the password and the file; and displaying a first file corresponding to the decryption password. By the method, any decryption password has a corresponding display file, password error prompt is avoided, the effect of falseness and trueness is achieved, a person who wants to steal file information is prevented from cracking the password by trying the password for many times, and information safety is guaranteed.
Fig. 3 is a schematic flowchart of another file processing method according to an embodiment of the present invention, and as shown in fig. 3, the method specifically includes:
and S31, receiving the input decryption password of the file to be decrypted.
And S32, when the decryption password is determined to be the target password, inquiring a target file corresponding to the target password from the association relationship to be used as a first file.
In the embodiment of the invention, one target file and a plurality of non-target files are stored in advance. The target file and the non-target file may be under the same folder.
Further, the user inputs a decryption password in the password input box, and the intelligent device receives the decryption password currently input by the user. And when the current decryption password is determined to be the target password, determining that the target file corresponding to the target password is used as the first file corresponding to the decryption password currently input by the user according to the association relation.
And S33, when the decryption password is determined to be a non-target password, querying a non-target file corresponding to the non-target password from the association relationship to serve as a first file.
When the decryption password currently input by the user is determined to be contained in a plurality of pre-stored non-target passwords, a non-target file corresponding to the non-target password is inquired from a preset association relation, and the non-target file is used as a first file corresponding to the decryption password currently input by the user.
And S34, copying the target file to a preset position when the target password and the non-target password in the association relation do not contain the decryption password, changing part of the content in the copied target file, and taking the changed target file as a second file.
And S35, displaying a second file corresponding to the decryption password.
When the decryption password input by the user is determined not to be included in the target password and the non-target password, the target file can be copied, the copied target file is stored to a preset position, wherein the preset position is different from the positions for storing the target file and the non-target file, and then part of content in the copied target file is changed. A second file is obtained. Wherein, the changed content may be: the order of the steps of the flow diagrams in the files, numerical information, alphabetical order, or random modification of data in the tables, etc.
Further, the second file is displayed.
The file processing method provided by the embodiment of the invention receives the input decryption password of the file to be decrypted; inquiring a corresponding first file from a pre-stored association relationship between the password and the file; and displaying a first file corresponding to the decryption password. By the method, any decryption password has a corresponding display file, password error prompt is avoided, the effect of falseness and trueness is achieved, a person who wants to steal file information is prevented from cracking the password by trying the password for many times, and information safety is guaranteed.
Fig. 4 is a schematic structural diagram of a file processing apparatus according to an embodiment of the present invention, which specifically includes:
the receiving device 401 is configured to receive an input decryption password of a file to be decrypted;
a query module 402, configured to query a corresponding first file from a pre-stored association relationship between a password and a file;
a displaying module 403, configured to display a first file corresponding to the decryption password.
In a possible implementation manner, the querying module 402 is specifically configured to query, when it is determined that the decryption password is a target password, a target file corresponding to the target password from the association relationship as a first file; and when the decryption password is determined to be a non-target password, querying a non-target file corresponding to the non-target password from the association relation as a first file.
In a possible implementation manner, the query module 402 is further configured to take the non-target file as the first file when the decryption password is any one of the non-target passwords.
In a possible implementation manner, the querying module 402 is further configured to query, as the first file, a non-target file corresponding to the decryption password from a plurality of non-target files when the non-target password in the association relationship includes the decryption password.
In a possible implementation manner, the query module 402 is further configured to randomly select a non-target file from the plurality of non-target files as the first file when neither the target password nor the non-target password in the association relationship includes the decryption password.
In a possible implementation manner, the query module 402 is further configured to take the alternative file as the first file when the target password and the non-target password in the association do not include the decryption password.
In a possible embodiment, the query module 402 is further configured to set the attribute of the non-target file and/or the alternative file to be hidden.
In a possible embodiment, the query module 402 is further configured to copy, when neither the target password nor the non-target password in the association relationship includes the decryption password, a target file to a preset position, change a part of content in the copied target file, and use the changed target file as a second file;
in a possible implementation manner, the presenting module 403 is specifically configured to present a second file corresponding to the decryption password.
The file processing apparatus provided in this embodiment may be the file processing apparatus shown in fig. 4, and may execute all the steps of the file processing method shown in fig. 1 to 3, so as to achieve the technical effect of the file processing method shown in fig. 1 to 3, and for brevity, it is specifically described with reference to fig. 1 to 3, and no further description is provided here.
Fig. 5 is a schematic structural diagram of an intelligent device according to an embodiment of the present invention, where the intelligent device 500 shown in fig. 5 includes: at least one processor 501, memory 502, at least one network interface 504, and other user interfaces 503. The various components in the smart device 500 are coupled together by a bus system 505. It is understood that the bus system 505 is used to enable connection communications between these components. The bus system 505 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 505 in FIG. 5.
The user interface 503 may include, among other things, a display, a keyboard, or a pointing device (e.g., a mouse, trackball, touch pad, or touch screen, among others.
It is to be understood that the memory 502 in embodiments of the present invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic random access memory (ddr Data Rate SDRAM, ddr SDRAM), Enhanced Synchronous SDRAM (ESDRAM), synchlronous SDRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The memory 502 described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 502 stores elements, executable units or data structures, or a subset thereof, or an expanded set thereof as follows: an operating system 5021 and application programs 5022.
The operating system 5021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application 5022 includes various applications, such as a Media Player (Media Player), a Browser (Browser), and the like, for implementing various application services. The program for implementing the method according to the embodiment of the present invention may be included in the application program 5022.
In the embodiment of the present invention, by calling a program or an instruction stored in the memory 502, specifically, a program or an instruction stored in the application 5022, the processor 501 is configured to execute the method steps provided by the method embodiments, for example, including:
receiving an input decryption password of a file to be decrypted; inquiring a corresponding first file from a pre-stored association relationship between the password and the file; and displaying a first file corresponding to the decryption password.
In one possible implementation manner, when the decryption password is determined to be a target password, a target file corresponding to the target password is inquired from the association relationship to serve as a first file; and when the decryption password is determined to be a non-target password, querying a non-target file corresponding to the non-target password from the association relation as a first file.
In one possible embodiment, when the decryption password is any one of the non-target passwords, the non-target file is used as the first file.
In one possible implementation, when the non-target password in the association relationship includes the decryption password, a non-target file corresponding to the decryption password is queried from a plurality of the non-target files as the first file.
In a possible embodiment, when neither the target password nor the non-target password in the association relationship includes the decryption password, a non-target file is randomly selected from the plurality of non-target files as the first file.
In a possible embodiment, when neither the target password nor the non-target password in the association relationship contains the decryption password, the candidate file is taken as the first file.
In one possible embodiment, the attributes of the non-target files and/or the alternate files are set to hidden.
In a possible implementation manner, when neither the target password nor the non-target password in the association relationship contains the decryption password, copying the target file to a preset position, changing part of content in the copied target file, and taking the changed target file as a second file; and displaying a second file corresponding to the decryption password.
The method disclosed by the above-mentioned embodiments of the present invention may be applied to the processor 501, or implemented by the processor 501. The processor 501 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 501. The Processor 501 may be a general-purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software elements in the decoding processor. The software elements may be located in ram, flash, rom, prom, or eprom, registers, among other storage media that are well known in the art. The storage medium is located in the memory 502, and the processor 501 reads the information in the memory 502 and completes the steps of the method in combination with the hardware.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the Processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units configured to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented by means of units performing the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
The intelligent device provided in this embodiment may be the intelligent device shown in fig. 5, and may execute all the steps of the file processing method shown in fig. 1 to 3, so as to achieve the technical effect of the file processing method shown in fig. 1 to 3, and for brevity, it is described with reference to fig. 1 to 3, which is not described herein again.
The embodiment of the invention also provides a storage medium (computer readable storage medium). The storage medium herein stores one or more programs. Among others, the storage medium may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, a hard disk, or a solid state disk; the memory may also comprise a combination of memories of the kind described above.
When one or more programs in the storage medium can be executed by one or more processors, the file processing method executed on the intelligent device side is realized.
The processor is used for executing the file processing program stored in the memory so as to realize the following steps of the file processing method executed on the intelligent device side:
receiving an input decryption password of a file to be decrypted; inquiring a corresponding first file from a pre-stored association relationship between the password and the file; and displaying a first file corresponding to the decryption password.
In one possible implementation manner, when the decryption password is determined to be a target password, a target file corresponding to the target password is inquired from the association relationship to serve as a first file; and when the decryption password is determined to be a non-target password, querying a non-target file corresponding to the non-target password from the association relation as a first file.
In one possible embodiment, when the decryption password is any one of the non-target passwords, the non-target file is used as the first file.
In one possible implementation, when the non-target password in the association relationship includes the decryption password, a non-target file corresponding to the decryption password is queried from a plurality of the non-target files as the first file.
In a possible embodiment, when neither the target password nor the non-target password in the association relationship includes the decryption password, a non-target file is randomly selected from the plurality of non-target files as the first file.
In a possible embodiment, when neither the target password nor the non-target password in the association relationship contains the decryption password, the candidate file is taken as the first file.
In one possible embodiment, the attributes of the non-target files and/or the alternate files are set to hidden.
In a possible implementation manner, when neither the target password nor the non-target password in the association relationship contains the decryption password, copying the target file to a preset position, changing part of content in the copied target file, and taking the changed target file as a second file; and displaying a second file corresponding to the decryption password.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, a software module executed by a processor, or a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (11)

1. A file processing method, comprising:
receiving an input decryption password of a file to be decrypted;
inquiring a corresponding first file from a pre-stored association relationship between the password and the file;
and displaying a first file corresponding to the decryption password.
2. The method according to claim 1, wherein the querying the corresponding first file from the association relationship between the pre-stored password and the file comprises:
when the decryption password is determined to be a target password, inquiring a target file corresponding to the target password from the association relation as a first file;
and when the decryption password is determined to be a non-target password, querying a non-target file corresponding to the non-target password from the association relation as a first file.
3. The method of claim 2, wherein said association comprises one of said non-target files;
the querying, from the association, a non-target file corresponding to the non-target password as a first file includes:
and when the decryption password is any one of the non-target passwords, taking the non-target file as a first file.
4. The method of claim 2, wherein the incidence relation comprises a plurality of the non-target files;
the querying, from the association, a non-target file corresponding to the non-target password as a first file includes:
and when the non-target password in the association relation contains the decryption password, querying a non-target file corresponding to the decryption password from a plurality of non-target files as a first file.
5. The method of claim 4, further comprising:
and when the target password and the non-target password in the association relation do not contain the decryption password, randomly selecting a non-target file from the plurality of non-target files as a first file.
6. The method according to claim 3, wherein the association further comprises an alternative file;
the querying, from the association, a non-target file corresponding to the non-target password as a first file includes:
and when the target password and the non-target password in the association do not contain the decryption password, taking the alternative file as a first file.
7. The method according to any one of claims 2-6, further comprising:
the attributes of the non-target file and/or the alternate file are set to be hidden.
8. The method of claim 2, further comprising:
when neither the target password nor the non-target password in the association relation contains the decryption password, copying a target file to a preset position, changing part of contents in the copied target file, and taking the changed target file as a second file;
and displaying a second file corresponding to the decryption password.
9. A document processing apparatus, characterized by comprising:
the receiving device is used for receiving the input decryption password of the file to be decrypted;
the query module is used for querying a corresponding first file from the association relationship between the prestored password and the file;
and the display module is used for displaying the first file corresponding to the decryption password.
10. A smart device, comprising: a processor and a memory, the processor being configured to execute a file processing program stored in the memory to implement the file processing method of any one of claims 1 to 7.
11. A storage medium storing one or more programs executable by one or more processors to implement the file processing method of any one of claims 1 to 7.
CN202011556984.3A 2020-12-23 2020-12-23 File processing method and device, intelligent equipment and storage medium Active CN112597537B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011556984.3A CN112597537B (en) 2020-12-23 2020-12-23 File processing method and device, intelligent equipment and storage medium
PCT/CN2021/107163 WO2022134559A1 (en) 2020-12-23 2021-07-19 File processing method and apparatus, intelligent device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011556984.3A CN112597537B (en) 2020-12-23 2020-12-23 File processing method and device, intelligent equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112597537A true CN112597537A (en) 2021-04-02
CN112597537B CN112597537B (en) 2024-04-09

Family

ID=75201965

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011556984.3A Active CN112597537B (en) 2020-12-23 2020-12-23 File processing method and device, intelligent equipment and storage medium

Country Status (2)

Country Link
CN (1) CN112597537B (en)
WO (1) WO2022134559A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113486191A (en) * 2021-06-25 2021-10-08 北京计算机技术及应用研究所 Confidential electronic file fixed decryption method
WO2022134559A1 (en) * 2020-12-23 2022-06-30 珠海格力电器股份有限公司 File processing method and apparatus, intelligent device, and storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117931755B (en) * 2024-03-22 2024-06-18 上海合见工业软件集团有限公司 Method, device, equipment and medium for batch import of package library
CN119323042A (en) * 2024-11-16 2025-01-17 力瑞信(扬州)科技有限公司 Encrypted solid state disk data processing system and processing method thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020166053A1 (en) * 2001-05-02 2002-11-07 Sun Microsystems, Inc. Method, system, and program for encrypting files in a computer system
CN102750497A (en) * 2012-07-20 2012-10-24 腾讯科技(深圳)有限公司 Method and device for deciphering private information
CN103455737A (en) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 User information protection method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201427366A (en) * 2012-12-28 2014-07-01 Ibm Method and appliance of decrypting files for data leakage protection in an enterprise network
CN111931134A (en) * 2020-08-04 2020-11-13 高邮诺雷成科技有限公司 Encryption method of computer system
CN112597537B (en) * 2020-12-23 2024-04-09 珠海格力电器股份有限公司 File processing method and device, intelligent equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020166053A1 (en) * 2001-05-02 2002-11-07 Sun Microsystems, Inc. Method, system, and program for encrypting files in a computer system
CN103455737A (en) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 User information protection method and device
CN102750497A (en) * 2012-07-20 2012-10-24 腾讯科技(深圳)有限公司 Method and device for deciphering private information

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022134559A1 (en) * 2020-12-23 2022-06-30 珠海格力电器股份有限公司 File processing method and apparatus, intelligent device, and storage medium
CN113486191A (en) * 2021-06-25 2021-10-08 北京计算机技术及应用研究所 Confidential electronic file fixed decryption method
CN113486191B (en) * 2021-06-25 2024-04-05 北京计算机技术及应用研究所 Secret-related electronic file fixed decryption method

Also Published As

Publication number Publication date
CN112597537B (en) 2024-04-09
WO2022134559A1 (en) 2022-06-30

Similar Documents

Publication Publication Date Title
CN112597537B (en) File processing method and device, intelligent equipment and storage medium
US11704419B2 (en) Automatic protection of partial document content
US9342689B2 (en) File system access for one or more sandboxed applications
US20210037270A1 (en) System and techniques for digital data lineage verification
US8590026B2 (en) Method and system for generating a touch CAPTCHA
US11392682B2 (en) Image based passphrase for authentication
CN111737304B (en) A method, device and equipment for processing blockchain data
TWI783284B (en) Cross-border payment method, device, equipment and system
CN103701614B (en) A kind of auth method and device
CN115277143B (en) Data security transmission method, device, equipment and storage medium
US10192278B2 (en) Traceable data audit apparatus, method, and non-transitory computer readable storage medium thereof
CN110889131A (en) a file sharing system
US10146926B2 (en) Differentiated authentication for compartmentalized computing resources
JP6717131B2 (en) Control program, control method, information processing device, decoding program, decoding method, and terminal device
US20050015605A1 (en) System and method for ensuring mobile device data and content security
CN106201153A (en) A method and device for displaying an operation entrance
CN107133514A (en) The method and mobile terminal of a kind of password prompt
KR101844534B1 (en) Method for securing electronic file
CN112231717A (en) Method, device, electronic device and storage medium for processing encrypted file name
CN118626013A (en) A local dual storage method, device, equipment and medium for application data
US10187380B2 (en) User device, method for setting password thereof, and operating method for setting and verifying password thereof
HK40056796A (en) Block chain data processing method, device and apparatus
TWI291824B (en) Hiding system and method for group data
CN116070244A (en) A method and device for processing ledger data, storage medium and electronic equipment
HK40039035B (en) Block chain data processing method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant