[go: up one dir, main page]

WO2018171503A1 - Procédé et dispositif de masquage de fichier - Google Patents

Procédé et dispositif de masquage de fichier Download PDF

Info

Publication number
WO2018171503A1
WO2018171503A1 PCT/CN2018/079131 CN2018079131W WO2018171503A1 WO 2018171503 A1 WO2018171503 A1 WO 2018171503A1 CN 2018079131 W CN2018079131 W CN 2018079131W WO 2018171503 A1 WO2018171503 A1 WO 2018171503A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
folder
picture
hidden
specified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2018/079131
Other languages
English (en)
Chinese (zh)
Inventor
廖东鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Publication of WO2018171503A1 publication Critical patent/WO2018171503A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Definitions

  • the present application relates to the field of terminal technologies, and in particular, to a file hiding method and apparatus.
  • the storage capacity of the terminal is increasing, which enables the terminal to implement the storage function as a storage device, thereby storing files acquired by the user through shooting, transmission, and downloading.
  • the terminal is generally used by the user, there are some cases where it is necessary to display the terminal to others. If there are some privacy files on the terminal that the user does not want others to see, it will be very embarrassing. Many product providers offer file hiding methods.
  • the embodiment of the present application provides a file hiding method and device.
  • the technical solution is as follows:
  • a file hiding method comprising:
  • the file format of the file to be hidden is changed to implement a file hiding operation.
  • a file hiding apparatus comprising: a processor and a memory, the memory storing computer readable instructions, the computer readable instructions being executed by the processor to:
  • the file format of the file to be hidden is changed to implement a file hiding operation.
  • a file hiding method including:
  • a file hiding apparatus comprising: a processor and a memory, the computer having stored thereon computer readable instructions, the computer readable instructions being executed by the processor to:
  • a file hiding method for a terminal, the terminal comprising a processor and a memory, the method comprising:
  • the file format of the file to be hidden is changed to implement a file hiding operation.
  • a file hiding method for a terminal, the terminal includes a processor and a memory, and the method includes:
  • a non-volatile storage medium having stored therein computer readable instructions executable by a processor to perform the following operations:
  • the file format of the file to be hidden is changed to implement a file hiding operation.
  • a non-volatile storage medium having stored therein computer readable instructions executable by a processor to perform the following operations:
  • FIG. 2 is a flowchart of a file hiding method provided by an embodiment of the present application.
  • FIG. 3 is a schematic diagram of a display interface provided by an embodiment of the present application.
  • FIG. 4A is a schematic diagram of a display interface provided by an embodiment of the present application.
  • 4B is a schematic diagram of a display interface provided by an embodiment of the present application.
  • FIG. 5A is a schematic diagram of a folder provided by an embodiment of the present application.
  • FIG. 5B is a schematic diagram of adding encryption information according to an embodiment of the present application.
  • 6A is a schematic diagram of displaying a file icon in a second folder according to an embodiment of the present application.
  • 6B is a schematic diagram of a file display interface of a file in a second folder according to an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a file hiding device according to an embodiment of the present application.
  • FIG. 8A is a flowchart of a file hiding method according to an embodiment of the present application.
  • FIG. 8B is a flowchart of a process of unhiding after file hiding according to an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a file hiding device according to an embodiment of the present application.
  • FIG. 10 is a block diagram of a terminal according to an embodiment of the present application.
  • FIG. 11 is a block diagram of a file hiding apparatus 1100, according to an exemplary embodiment.
  • One of the file hiding methods is to modify the display attribute of the file to be hidden from the display to not display in the folder, so that when the terminal displays the file management interface, the file is no longer displayed to achieve a hidden effect.
  • the embodiment of the present application provides a file hiding method and device, and moves a file to be hidden to a specific folder. Since this folder stores a specified file that can declare a file of the type to be hidden in the folder, when other applications or terminals scan the folder, it can scan the specified file. It is known that the folder does not store the file of the type, thereby stopping the scanning, and concealing the hidden file from the folder level, and combining the changes to the file format, the file itself cannot be scanned into the original.
  • the type of file this two-layer hidden way, can hide the file from the actual meaning, and achieve the purpose of ensuring privacy and security.
  • FIG. 1 is a schematic diagram of an implementation environment provided by an embodiment of the present application.
  • the implementation environment includes a plurality of terminals 101, a server 102 for servicing the plurality of terminals.
  • the plurality of terminals 101 are connected to the server 102 via a wireless or wired network, and the plurality of terminals 101 may be electronic devices capable of accessing the server 102, which may be computers, smart phones, tablets, or other electronic devices.
  • the server 102 may be one or more website servers, and may also be a cloud storage center for performing file storage and the like for the terminal 101. Of course, the server 102 may also perform file format conversion, file preview, etc. for the terminal 101. Other file related services. In this implementation environment, the terminal user can obtain the service of the server 102 by means of registration on the server 102, and the embodiment of the present application does not limit this.
  • the server 102 can also have at least one database for storing user relationship chains, files, and user-related data, etc., so as to provide a more user-oriented and large-capacity storage service.
  • the file involved in the embodiment of the present application may refer to any file that can be stored in the terminal or stored on the server, such as a picture, a document, or a video.
  • FIG. 2 is a flowchart of a file hiding method according to an embodiment of the present application.
  • the file hiding device is only used as an execution entity.
  • the file hiding device can be applied to a device such as a terminal or a server. Referring to FIG. 2, the method specifically includes:
  • the file hiding instruction refers to an instruction for triggering a file hiding function.
  • the calling interface of the file hiding instruction may be provided by a hidden option, and the user may pass a hidden option on the user interface displayed on the terminal. Click and other operations to trigger the file hiding instruction, so that the terminal obtains the file hiding instruction and triggers the file hiding function.
  • the terminal may provide a hidden option 301 on the display interface 300 of the stored first folder.
  • the file hiding instruction is triggered, so that the terminal obtains the file hiding.
  • the instruction is to display the file in the first folder as an alternate state (such as displaying the frame 302 at a certain position of the file icon for the user to manually check), and the state of the box 302 is checked as shown in 303.
  • the calling interface of the file hiding instruction may be provided by a specified area, and the user may trigger a file hiding instruction by using a first specified operation on the specified area, thereby causing the terminal to obtain a file hiding instruction, thereby triggering file hiding.
  • the first specified operation may be a touch-type operation on a blank area of a current interface (such as a display interface of a folder on the terminal) on the terminal, and the touch-type operation includes, but is not limited to, a continuous click operation performed by a certain rule ( For example, a double-click operation, a pressing operation in which the duration is longer than a preset duration (for example, a long-press operation), and a sliding operation in which the touch trajectory is in a certain pattern (such as a circle operation), the first designated operation may be a preset hidden trigger operation.
  • the embodiment of the present application does not specifically limit which operation mode is specifically adopted.
  • the first folder refers to a folder on the terminal for storing the first file to be hidden, and the first folder may be a default folder of the application, or may be installed by the user.
  • the folder specified at the time. For example, for a mobile terminal such as a mobile phone, if it is necessary to hide the picture in the album, the mobile phone album can be opened by the picture management application. At this time, the mobile phone album is the first folder, of course, if the user wants to hide is The picture in a subfolder of the mobile phone album can be opened by the subfolder. At this time, the subfile is the first folder.
  • the file can be any type of file, such a file can be displayed as an icon on the terminal, thereby being observed by the user, and can be opened by clicking and the like to browse The specific content of the file.
  • the file may be a file, a document, or the like, and may be a multimedia file such as an audio or a video. The embodiment of the present application does not specifically limit this.
  • the file is first switched to an alternate state by a certain operation, and then the file is selected to determine the file to be hidden.
  • the terminal can also detect the file for a certain file.
  • the second specified operation determines the file to be hidden.
  • the terminal when any one or more files are selected by the user, that is, when the terminal obtains a selection operation for any file, the one or more files are determined as files to be hidden.
  • the picture to be hidden process based on the second specified operation may be the same as the process.
  • the terminal first uses a certain operation to switch the file to an alternate state, and then selects a file to determine a file to be hidden, and in the actual scenario, the first folder is The file indicated by the file hiding instruction is used as the file to be hidden.
  • the terminal can also determine the file to be hidden by detecting a second specified operation for a certain file.
  • the second specified operation may be a touch-type operation on a file icon, including but not limited to a continuous click operation (such as a double-click operation) performed by the user on a certain regularity, and a pressing operation in which the pressing duration exceeds a preset duration ( For example, when the terminal detects the touch operation of the file icon, the terminal triggers a hidden instruction on the file, and the file can be determined as the file to be hidden.
  • a continuous click operation such as a double-click operation
  • a pressing operation in which the pressing duration exceeds a preset duration
  • a hidden option may be provided on a file display interface of a certain file, and when the terminal detects a trigger operation on the hidden option, triggering a hidden instruction on the file, This file is identified as the file to be hidden.
  • some function options such as a hidden option 402, a rotation option, and the like may be provided.
  • a trigger operation on the hidden option 402 is detected, a hidden instruction is triggered, and the picture is triggered. 1 Determine the file to be hidden, and continue the subsequent processing to realize the hiding of the picture 1.
  • the second designation operation may be an operation assisted by a hidden function icon.
  • the hidden function icon 403 is displayed in a certain display area 405 in the folder 404, and the display area is 405.
  • a hidden function icon may be displayed, when a drag operation on a file icon 406 is detected, such as pressing a touch point 407 on the file icon 406 for dragging, if the end point of the drag operation (eg, touch point 407) The final location) is located in the display area 405 in the folder 404, triggering a hidden instruction on the file corresponding to the file icon 406, and determining the file indicated by the hidden instruction as a file to be hidden, of course
  • the above drag operation can also be replaced with a sliding operation with a certain speed to simplify the actual operation flow and improve the processing efficiency.
  • the display of the hidden function icon may be a fixed display, that is, when any folder is opened, it may be displayed in a corresponding area of the folder, or may be displayed by a certain trigger, for example, through a function list.
  • the hidden function is triggered, the hidden function icon is displayed in the corresponding display area of the folder, and when the display of the hidden function is canceled, the display area is no longer occupied for display.
  • the second specified operation can be a voice indication operation for a certain file. That is, when the terminal detects that a file command name, a file number, and the like can be used to determine a voice command of the file, it is determined that a hidden instruction for a file is received, and the file indicated by the voice command is determined as The file to be hidden.
  • a voice indication operation for a certain file. That is, when the terminal detects that a file command name, a file number, and the like can be used to determine a voice command of the file, it is determined that a hidden instruction for a file is received, and the file indicated by the voice command is determined as The file to be hidden.
  • the above implementation manners are to explain how the terminal determines the file to be hidden from the level of the user-based hidden operation.
  • the file when the file is hidden, it may also be determined based on some hidden rules set in advance. Which files are used to increase the intelligence of the application, so that the user does not need to manually select the pictures to be hidden each time, and the processing efficiency is also improved accordingly.
  • the terminal receives the hidden instruction, it scans in the first folder, and uses the file whose file information conforms to the preset hiding rule as the file to be hidden.
  • the preset hiding rule can be preset by the user, and the user can set at least one hidden rule to protect his privacy security from multiple dimensions. In the embodiment of the present application, only the preset hidden rule is any one of the following or a combination of at least two rules:
  • the file name includes the specified keyword.
  • some of the files related to privacy may be named according to a certain naming convention. Therefore, whether the file is a file to be hidden may be determined by scanning whether the file name includes a specified keyword.
  • Preset hidden rules 2 The geographic information of the document meets the specified geographical location; for the user, some of the documents related to privacy may be obtained at a certain place, for example, in their own home, therefore, Whether the file is a file to be hidden can be determined by scanning whether the geographic information of the file is a specified geographical location.
  • the tag information of the file is a specified tag; for the user, some files related to privacy may be added to the file when the user stores some files related to the privacy, so it is possible to scan the file for the specified tag. Determine if the file is a file to be hidden.
  • the tags here can be categorized tags set by the user, such as "Private Photo”, “Ordinary Photo”, “Selfie”, and the like.
  • the download link of the file includes the specified domain name.
  • some files related to privacy may be downloaded from a website, so it is possible to determine whether the file is a file to be hidden by scanning whether the file includes the specified domain name.
  • the hidden command may be triggered by the user at the terminal.
  • the user may set a preset hidden rule required for scanning in the hidden function setting interface of the terminal, and trigger a hidden command.
  • the terminal may be preset according to the preset.
  • the hidden rule is scanned to realize the process of determining the file, and the manner of determining the scan can greatly reduce the degree of manual intervention and improve the processing efficiency.
  • Create a subfolder in the first folder create a specified file in the subfolder, obtain a second folder, and move the to-be-hidden file to the second folder.
  • the specified file is used to indicate that a file of the same type as the file to be hidden is not stored in the second folder.
  • the inventors have recognized that the storage path of folders and files may have an impact on scanning. For example, some applications or terminals only scan the first layer of folders, not their subfolders or the ability to scan subfolders, so you can use subfolders as hidden files in the current folder. Folder.
  • the first folder is the .tmfs folder
  • a .privacy folder can be created in the .tmfs folder
  • a .nomedia is created in the .privacy folder.
  • the above step 202 may refer to the creation process when the file hiding is performed for the first time in the first folder, and if the second folder already exists in the first folder, the file is directly moved without being created again. can.
  • step 202 the technical process involved in the above step 202 is actually to hide the file by moving the file to be hidden to a subfolder and creating a specified file in the subfolder.
  • a new folder associated with the first folder is created in the storage space on the terminal, and the new file is created in the new file.
  • the specified file is created in the folder, the second folder is obtained, and the file to be hidden is moved to the second folder.
  • the storage space may refer to a storage space for storing a first folder, and the new folder associated with the first folder refers to a new folder that an application can bind.
  • a folder for default storage there may be a folder for default storage, or an associated folder newly created based on user operations, which can be implemented by setting a new storage path in the application settings, so that the application can read the The storage path or write in the storage path to achieve file read and write.
  • This alternative method can also realize the hiding of the file, and the replacement method separates the first folder and the new folder in the storage space, and some applications and terminals generally scan certain fixed folders when scanning. Therefore, this separate processing method improves the difficulty of scanning and also improves the hiding effect.
  • the encrypted information is added to the binary information of the stored photo file.
  • the encrypted information may be a fixed information or an encrypted information that changes based on the file. If the encrypted information is changed based on the file, the encrypted information may have certain characteristics, so that when the file format is restored, the recovery can be performed in the same manner.
  • the encrypted information added to each file includes the same number of characters, for example, the encrypted information includes 12 characters; or the encrypted information added to each file has the same termination symbol, such as the terminator of the encrypted information. 1a.
  • the encrypted information may be generated based on a certain encryption algorithm, and the specific form may include letters, numbers, symbols, and the like, which are not described herein.
  • the foregoing encrypted information may also be obtained based on user information.
  • the encrypted information uniquely corresponding to the user is generated. That is to say, for different users who log in to the application, the added encryption information is different, and for the same user, the encrypted information is the same. Therefore, the step of generating the encrypted information multiple times can be reduced correspondingly while enhancing the security, as long as the encrypted information is generated when the first hiding is performed, the encrypted information can be directly used subsequently.
  • step 203 changes the file format of the hidden file to further implement the file hiding process on the basis of the moving folder.
  • the file to be hidden is changed by changing the data structure of the file, but in the actual scene. You can also change the file to be hidden by deleting the file extension in the file format information of the file to be hidden. Since the scanning of the folder by other applications or terminals is generally superficial, it is a scan of the file extension. Therefore, if the file format is changed to some extent, the scanning side cannot recognize the file as its original file type. So you can achieve better hiding effects.
  • the movement of the file to be hidden is performed first, and the format change is performed after the completion of the movement as an example.
  • the format change may be performed before the movement is performed, and then the file to be hidden is moved. This application does not specifically limit this.
  • a folder entry may be provided on the application, and the portal may be displayed on the application's menu interface in the form of a folder icon.
  • the menu interface may be the main interface of the application, or may be an interface that can be called out from the hidden state based on a certain operation on the main interface or any interface.
  • the second folder can be encryptedly accessed through the folder entry, and the encrypted password can be set by the user, and the file stored in the second folder is displayed only when the password is detected to be correct. That is, the method further includes: obtaining a view instruction for the second folder, displaying a password input field; and displaying the file stored in the second folder when the password verification received by the password input field passes.
  • the above display based on the file in the second folder has other display modes.
  • the terminal acquires a viewing instruction for the second folder, displaying a first icon of the file stored in the second folder, the first icon is to blur the thumbnail of the file a file icon; when a click operation on the first icon is obtained, on the file display interface of the file, the blurred image of the file is displayed; when it is detected that the file display interface of the file is unhidden
  • the option is triggered, the file is displayed or formatted and moved. That is, the encryption may not be performed on the second folder, but the hidden effect may be achieved by blurring the file in the second folder, and the blurred display may be first applied to the file icon 601, as shown in the figure.
  • the hatching 602 in 6A shows that the file using the thumbnail as the file icon achieves the purpose of hiding the actual information of the file.
  • the blurred display 602 can also be applied to the file display interface 603 of the file, as shown in FIG. 6B. So that the user cannot know the contents of the file by direct observation.
  • the fuzzification process may be to cover an opaque mask layer on the file display interface of the file, so that the actual content of the file cannot be observed by the outside layer through the mask layer.
  • the fuzzification process may also be performed based on the fuzzy algorithm. This embodiment of the present application does not limit this.
  • the user can not observe the actual content of the file from the file icon or the file display interface of the file, thereby realizing the hiding of the file.
  • the file icon of the original picture is generally a thumbnail of the picture
  • the obscured display can achieve the purpose of hiding at the icon level, and even if the user clicks on the picture, the above-mentioned fuzzification is performed.
  • the display can still not display the real content of the picture, achieving the hidden purpose at the display level.
  • the file After the file is hidden, if the user wants to unhide the file view, the file can be uncleared through the file display interface.
  • the terminal can remove the blur. The effect of the process is displayed while the file is displayed.
  • the terminal can also perform the inverse processing corresponding to the hiding process by directly performing the file display, so as to restore the file to the original file format and move back to the first folder, so that the user is in the first folder. Can view files in .
  • the above steps 204 to 205 are steps of how to unhide the file, and after the file is hidden, the hidden can also be cancelled.
  • the unhiding instruction can be triggered based on multiple manners. For example, when the terminal detects the triggering operation on the unhide option, it is determined that the unhidden instruction is received, and the hidden file can be reversed to restore the file format and Move. If the change is made after moving in the above hiding process, the file format is restored first in the reverse operation, and then the order of the movement is performed.
  • the terminal detects the un-hidden instruction for the file (for example, the user triggers the unhide option on the file display interface)
  • the password input field is displayed, and the password received in the password input field is displayed.
  • the verification is passed, the file is displayed or the format is restored and moved.
  • password verification can also be performed during the unhide operation to prevent malicious users from processing the file at will.
  • the first folder may refer to a mobile phone system accessing a removable SD card or a folder in a storage space provided by the mobile phone.
  • the terminal logs in to the cloud storage server, the terminal can usually obtain itself through scanning.
  • the various information in the corresponding folder, therefore, the above file hiding method can also be applied to the folder on the cloud storage server corresponding to the application.
  • the method provided by the embodiment of the present application by moving a file to be hidden to a specific folder, since the folder stores a specified file that can declare that the file is not stored in the folder, therefore, when When other applications or terminals scan the folder, when scanning the specified file, it is known that the folder does not store the file of the type, thereby stopping the scanning and hiding the file from the layer of the folder. Combined with the change of the file format, the file itself cannot be scanned into the original type of file. This two-layer hidden mode can hide the file from the actual meaning and achieve the purpose of ensuring privacy and security. Further, since the hiding effect is good, the user has greater willingness to recover, and this can provide more commercial opportunities for more users.
  • FIG. 7 is a schematic structural diagram of a file hiding device according to an embodiment of the present application.
  • the apparatus includes:
  • the instruction obtaining module 701 is configured to acquire a file hiding instruction and trigger a file hiding function
  • a file obtaining module 702 configured to acquire a selected file to be hidden in the first folder
  • a moving module 703 configured to move the selected file to be hidden from the first folder to a second folder, where the specified file is stored in the second folder, where the specified file is used to indicate the The same type of file as the file to be hidden is not stored in the second folder;
  • the change module 704 is configured to modify a file format of the file to be hidden to implement a file hiding operation.
  • the mobile module 703 is configured to:
  • the changing module 704 is configured to delete a file extension in the file format information of the file to be hidden; or add encryption information in a file header of the file to be hidden.
  • the device further includes:
  • the generating module is configured to generate, according to the preset algorithm and the user information, the encrypted information uniquely corresponding to the user.
  • the change module 704 is further configured to acquire a cryptographic instruction, and restore the file format to the file according to a format recovery manner corresponding to the change mode;
  • the moving module 703 is further configured to move the restored file from the second folder to the first folder.
  • the file obtaining module 702 is configured to scan, in the first folder, a file that meets a preset hidden rule as a file to be hidden when the hidden instruction is obtained;
  • the preset hiding rule is any one of the following or a combination of at least two rules: the file name includes the specified keyword; the photographing geographic information of the file conforms to the specified geographic location; the label information of the file is the designated label; and the file is downloaded
  • the link includes the specified domain name.
  • the file obtaining module 702 is configured to:
  • the file indicated by the file hiding instruction in the first folder is used as the file to be hidden.
  • the instruction obtaining module 701 is configured to: when the drag operation of the file icon in the first folder is detected, if the end point of the drag operation is located in the hidden function icon display The region triggers a hidden instruction to the file to obtain a hidden instruction for the file.
  • the device further includes:
  • a first display module configured to acquire a viewing instruction for the second folder, and display a password input field
  • the first display module is further configured to display the file stored in the second folder when the password verification received by the password input field is passed.
  • the device further includes:
  • a second display module configured to acquire a view instruction for the second folder, display a first icon of the file stored in the second folder, and the first icon is to blur the thumbnail of the file After the file icon;
  • the second display module is further configured to acquire a viewing instruction for the first icon, and display, on the file display interface of the file, a blurring processing image of the file;
  • the second display module is further configured to acquire an unhide instruction for the file, and display the file;
  • the moving module and the changing module are further configured to acquire an un-hidden instruction for the file, and perform format recovery and movement processing on the file.
  • the second display module is configured to acquire an un-hidden instruction for the file, display a password input field, and display the file when the password verification received by the password input field passes;
  • the moving module and the changing module are further configured to perform format recovery and movement processing on the file when the password verification received by the password input field is passed.
  • file hiding device provided by the foregoing embodiment is only illustrated by the division of the foregoing functional modules when the file is hidden. In actual applications, the function allocation may be completed by different functional modules as needed. The internal structure of the device is divided into different functional modules to perform all or part of the functions described above.
  • file hiding device and the file hiding method embodiment provided by the foregoing embodiments are in the same concept, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.
  • FIG. 8A is a file provided by the embodiment of the present application.
  • the flowchart of the hidden method is described in the specific processing flow of the image application client and the background of the image application client. Referring to FIG. 8A, the method specifically includes:
  • the image application client can be displayed in the form of an icon on the application management interface of the terminal.
  • the application manager's display interface or desktop, etc. the user can click on the image application icon of the image application client to trigger the terminal's click event.
  • the image application client is initialized, and the initialization process may include reading the startup file of the image application client, creating a client running environment, and the like.
  • any touch event to the terminal interface may be detected, and the touch event may include a click event (eg, a touch event with a contact duration of less than 0.2 s) and a long press event (eg, a contact duration greater than 0.5) s touch event or other type of touch event).
  • a click event eg, a touch event with a contact duration of less than 0.2 s
  • a long press event eg, a contact duration greater than 0.5
  • the application folder may be an album folder of the terminal, a folder created by the image application during installation, or a folder created by the user during use.
  • the embodiment does not limit this.
  • only the pictures stored in the folder of the picture application are referred to as the first picture, and, in order to simplify the process of description, the specific number of the first picture is not limited here, and the first picture may actually For one or more.
  • the image application client renders the first image icon based on the first image read, and displays the first image icon on the image management interface.
  • the rendering process is essentially performed by the image application client by calling the terminal for displaying the image, and the display module of the terminal performs rendering of the corresponding image based on the drawing parameters transmitted through the interface.
  • the thumbnail data of the first picture may be acquired based on the read first picture, and the thumbnail data is used as the first picture icon. Rendering, so that the user can understand the approximate content of the image through the actual display of the first picture icon, and enhance the amount of information provided by the display.
  • the instruction is to render the picture interface of the first picture, and display a picture interface of the first picture, where the picture interface includes a hidden option, and the hidden option is used to provide an entry of the hidden process to trigger the hidden instruction.
  • the specific rendering process is similar to the rendering process in the above step 3, and is not described herein.
  • the picture interface of the first picture may include a hidden option 402.
  • the specific display form may be a lock that is not closed to prompt the user that the first picture currently displayed is not in a hidden state.
  • the specified folder is a folder in which the specified file is stored, and the specific creation manner can be as described above.
  • the specified folder may have, for example, FIG. 5A. Construct, that is, the current folder is the .tmfs folder, the specified folder is the .privacy folder in the .tmfs folder, and the .privacy folder stores the .nomedia file to indicate the current .privacy A file type file is not stored in the folder.
  • the image application client adds the encryption information to the image data header of the first picture that has been moved to the specified folder, and the effect presented on the terminal is that the first picture icon is no longer displayed on the picture management interface. The hidden operation of the first picture.
  • Step 6 is actually a process of modifying the picture format information of the first picture.
  • the image format information may be modified in other manners, such as deleting the file extension in the file format information of the first image, so that other terminals or other applications do not drop the scan.
  • the picture with the file extension removed is recognized as a picture.
  • the foregoing steps 5 and 6 provide a specific method for hiding the first picture.
  • the picture is moved first, and then the picture format information is modified.
  • the picture format information is modified, and then the image is moved. This embodiment of the present application does not specifically limit this.
  • the access may include viewing the picture or canceling the hiding of the picture
  • the image application client may also provide an access portal for the hidden picture
  • the entry may It is regarded as the entrance of the specified folder, and the portal can be displayed in the form of a folder icon on the menu interface of the image application client, so that the user can access the hidden image by accessing the entry.
  • the menu interface may be a main interface of the image application client, or an interface that can be called out from the hidden state based on a certain operation on the main interface or any interface, for example, when acquired on the main interface.
  • a menu call instruction is triggered, and the picture application client displays the menu interface in response to the menu call instruction, and the menu interface provides an entry icon of the specified folder.
  • a menu callout option may be provided on the main interface, and the menu interface is displayed when a click operation on the menu callout option is detected.
  • FIG. 8B is a flowchart of the process of canceling the hidden file after the file is hidden according to the embodiment of the present application:
  • the picture application client since the picture application client knows the function of the specified folder, when the file in the specified folder is read, the picture may already be stored in the specified folder by default.
  • the file can be further parsed in the specified folder.
  • Read, and for the implementation of adding the encrypted information it can be realized by deleting the encrypted information in the picture data header of the read picture data, it should be noted that the deletion is only a temporary deletion at the time of reading. , does not modify the stored image data.
  • the password may also be added to the specified folder, and when the specified folder is accessed, the image application client triggers a click event on the folder icon to trigger the specified folder.
  • the instruction is viewed, and in response to the viewing instruction, the password input field is rendered and displayed; and when the password verification received by the password input field is passed, the step of reading the second picture in the specified folder is performed.
  • This form of password protection limits access to specific folders for further protection.
  • the pictures stored in the specified folder are referred to herein as the second picture, and the number of the second pictures may be one or more.
  • the second picture refers to a picture as an operation object in the stored picture.
  • the image application client blurs and renders the second image icon based on the read second image, and displays the second image icon on the image management interface of the specified folder.
  • the image application client blurs and renders the second image icon based on the read second image, and displays the second image icon on the image management interface of the specified folder.
  • the hide option is used to provide an entry for unhide processing.
  • the manner of the specific fuzzification processing refer to the description of the fuzzification processing in the specific content of step 203.
  • the hidden instruction is canceled, and in response to the unhide instruction, the second picture is moved from the specified folder to the original folder.
  • the specified folder may be deleted to avoid the impact on the client operation due to too many paths.
  • the picture application client deletes the encrypted information in the picture data header of the second picture, so that the picture icon of the first picture is in the display state on the picture management interface.
  • the encrypted information added is pre-stored in the image application client, or generated based on the change of the image data.
  • the direct data from the image data header can be used.
  • the part deletes the encrypted information. For example, if the encrypted information is a 12-bit character string, the data of the first 12 bits of the picture data header can be deleted.
  • the second picture is not stored in the specified folder, but is stored in the original folder, so when viewed through the image application client, the picture can be directly viewed. Actual image.
  • the method provided by the embodiment of the present application by moving a picture to be hidden to a specific folder, since the folder stores a file that can declare the type of the image not stored in the folder, when other applications or When the terminal scans the folder, it can know that the folder does not store the image when scanning the specified file, so that the scanning is stopped, and the effect of hiding the image from the layer of the folder is achieved, and the image format is combined.
  • the change makes the picture itself unable to be scanned into the original type of file.
  • This two-layer hidden way can hide the picture from the actual meaning and achieve the purpose of ensuring privacy and security. Further, since the hiding effect is good, the user has a greater willingness to recover, and this can provide more commercial opportunities for more users.
  • FIG. 9 is a schematic structural diagram of a file hiding device according to an embodiment of the present application. See Figure 9, including:
  • the display module 902 is configured to render a picture interface of the first picture, and display a picture interface of the first picture, where the picture interface includes a hidden option, where the hidden option is used to trigger a hidden instruction;
  • the instruction obtaining module 901 is further configured to acquire a hidden instruction for the first picture
  • the processing module 903 is configured to move the first picture from a current folder to a specified folder, where the specified file is stored with a specified file, where the specified file is used to indicate that no image is stored in the specified folder. a file of a type; modifying a picture format of the first picture to implement a hiding operation on the first picture.
  • the processing module 903 is configured to delete a file extension in the file format information of the first picture; or add encryption information in a picture data header of the first picture.
  • the rendering display module 902 is further configured to display a folder icon of the specified folder;
  • the rendering display module is further configured to: when acquiring a viewing instruction for the specified folder, read the second image in the specified folder;
  • the rendering display module is further configured to perform blurring processing and rendering on the second image icon based on the read second image, and display the second image icon on the image management interface of the specified folder;
  • the rendering display module is further configured to: when obtaining a fuzzy display instruction for the second image, perform blurring processing and rendering on the second image, and display a blurred image of the second image on the image interface, where the image The interface includes an unhide option for providing an entry for the unhide process;
  • the processing module is further configured to: when the un-hidden instruction is obtained, move the second picture from the specified folder to an original folder;
  • the processing module is further configured to restore the picture format information of the second picture, so that the picture icon of the first picture is in a display state on the picture management interface.
  • the rendering display module is further configured to: when the viewing instruction for the specified folder is obtained, rendering and displaying a password input field;
  • the rendering display module is further configured to perform the step of reading the second picture in the specified folder when the password verification received by the password input field is passed.
  • the processing module is configured to:
  • the terminal 1000 includes:
  • Terminal 1000 may include one or more processing core processor 110, one or more computer readable storage medium memories 120, input unit 130, display unit 140, communication module 150, and the like. It will be understood by those skilled in the art that the terminal structure shown in FIG. 10 does not constitute a limitation to the terminal, and may include more or less components than those illustrated, or combine some components, or different component arrangements. among them:
  • the communication module 150 may include at least one of an RF (Radio Frequency) circuit and a WiFi (Wireless Fidelity) module.
  • the RF circuit can be used for receiving and transmitting signals during and after receiving or transmitting information, in particular, after receiving downlink information of the base station, and processing it by one or more processors 110; in addition, transmitting data related to the uplink to the base station.
  • RF circuits include, but are not limited to, an antenna, at least one amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, an LNA (Low Noise Amplifier), Duplexer and so on.
  • SIM Subscriber Identity Module
  • the RF circuit can communicate with the network and other devices through wireless communication.
  • the wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System of Mobile communication), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access). , Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), e-mail, SMS (Short Messaging Service), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • Code Division Multiple Access Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • e-mail Short Messaging Service
  • SMS Short Messaging Service
  • the memory 120 can be used to store software programs and modules, and the processor 110 executes various functional applications and data processing by running software programs and modules stored in the memory 120.
  • the memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to The data created by the use of the terminal 1000 (such as audio data, phone book, etc.) and the like.
  • memory 120 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, memory 120 may also include a memory controller to provide access to memory 120 by processor 110 and input unit 130.
  • the input unit 130 can be configured to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls.
  • input unit 130 can include touch-sensitive surface 131 as well as other input devices 132.
  • Touch-sensitive surface 131 also referred to as a touch display or trackpad, can collect touch operations on or near the user (such as a user using a finger, stylus, etc., on any suitable object or accessory on touch-sensitive surface 131 or The operation near the touch-sensitive surface 131) and driving the corresponding connecting device according to a preset program.
  • the touch-sensitive surface 131 can include two portions of a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 110 is provided and can receive commands from the processor 110 and execute them.
  • the touch-sensitive surface 131 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 130 can also include other input devices 132.
  • other input devices 132 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 140 can be used to display information input by the user or information provided to the user and various graphical user interfaces of the terminal 1000, which can be composed of graphics, text, icons, video, and any combination thereof.
  • the display unit 140 may include a display panel 141.
  • the display panel 141 may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like.
  • the touch-sensitive surface 131 may cover the display panel 141, and when the touch-sensitive surface 131 detects a touch operation thereon or nearby, it is transmitted to the processor 110 to determine the type of the touch event, and then the processor 110 according to the touch event The type provides a corresponding visual output on display panel 141.
  • touch-sensitive surface 131 and display panel 141 are implemented as two separate components to implement input and input functions, in some embodiments, touch-sensitive surface 131 can be integrated with display panel 141 for input. And output function.
  • the processor 110 is a control center of the terminal 1000 that connects various portions of the entire handset with various interfaces and lines, by running or executing software programs and/or modules stored in the memory 120, and recalling data stored in the memory 120, The various functions and processing data of the terminal 1000 are performed to perform overall monitoring of the mobile phone.
  • the processor 110 may include one or more processing cores; preferably, the processor 110 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It can be understood that the above modem processor may not be integrated into the processor 110.
  • the terminal 1000 further includes a power source (such as a battery) for supplying power to the various components.
  • a power source such as a battery
  • the power source can be logically connected to the processor 110 through the power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the power supply may also include any one or more of a DC or AC power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
  • the terminal 1000 may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the display unit of the terminal is a touch screen display
  • the terminal further includes a memory, and one or more programs, wherein one or more programs are stored in the memory and configured to be processed by one or more Execution.
  • the one or more programs include instructions for performing the operations performed by the terminal in the embodiment of Figure 2 or Figure 8A or Figure 8B.
  • FIG. 11 is a block diagram of a file hiding apparatus 1100, according to an exemplary embodiment.
  • device 1100 can be provided as a server.
  • apparatus 1100 includes a processing component 1122 that further includes one or more processors, and memory resources represented by memory 1132 for storing instructions executable by processing component 1122, such as an application.
  • An application stored in memory 1132 can include one or more modules each corresponding to a set of instructions.
  • processing component 1122 is configured to execute instructions to perform the file hiding method provided by the embodiment illustrated in Figure 2 or Figure 8A or Figure 8B above.
  • the device 1100 can also include a power supply component 1126 configured to perform power management of the device 1100, a wired or wireless network interface 1150 configured to connect the device 1100 to the network, and an input/output (I/O) interface 1158.
  • Apparatus 1100 may operate based on an operating system stored in the memory 1132, for example, Windows Server TM, Mac OS X TM , Unix TM, Linux TM, FreeBSD TM or the like.
  • non-transitory computer readable storage medium comprising instructions, such as a memory comprising instructions executable by a processor in a terminal to perform a file hiding method in the embodiments described below .
  • the non-transitory computer readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
  • a person skilled in the art may understand that all or part of the steps of implementing the above embodiments may be completed by hardware, or may be instructed by a program to execute related hardware, and the program may be stored in a computer readable storage medium.
  • the storage medium mentioned may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

L'invention concerne un procédé et un dispositif de masquage de fichier. Lorsqu'un fichier à masquer est déplacé vers un dossier spécifique, étant donné que ledit dossier contient un fichier spécifié apte à déclarer que ledit dossier ne contient aucun fichier du même type de fichier que le fichier à masquer, une autre application ou un autre terminal, lors du balayage dudit dossier et de la détection du fichier spécifié, sera informé que ledit dossier ne contient aucun fichier du même type de fichier que le fichier à masquer et lesdits autres application ou terminal arrêteront le balayage, ce qui permet d'obtenir l'effet de masquage d'un fichier au niveau du dossier. En outre, la présente invention comprend une modification du format de fichier de telle sorte que le fichier lui-même ne peut pas être balayé en tant que type de fichier d'origine.
PCT/CN2018/079131 2017-03-24 2018-03-15 Procédé et dispositif de masquage de fichier Ceased WO2018171503A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710183868.3A CN106909855B (zh) 2017-03-24 2017-03-24 文件隐藏方法及装置
CN201710183868.3 2017-03-24

Publications (1)

Publication Number Publication Date
WO2018171503A1 true WO2018171503A1 (fr) 2018-09-27

Family

ID=59195068

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/079131 Ceased WO2018171503A1 (fr) 2017-03-24 2018-03-15 Procédé et dispositif de masquage de fichier

Country Status (2)

Country Link
CN (1) CN106909855B (fr)
WO (1) WO2018171503A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109740374A (zh) * 2018-12-20 2019-05-10 努比亚技术有限公司 一种隐藏方法、移动终端及计算机可读存储介质
CN111353170A (zh) * 2020-02-27 2020-06-30 北京北信源软件股份有限公司 文件隐私信息处理方法、装置、电子设备及存储介质
CN112580074A (zh) * 2020-12-17 2021-03-30 南方电网深圳数字电网研究院有限公司 文件隐藏和恢复方法和工具、电子设备、存储介质

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106909855B (zh) * 2017-03-24 2021-10-29 腾讯科技(深圳)有限公司 文件隐藏方法及装置
CN108647291B (zh) * 2018-05-07 2021-11-02 深圳市创梦天地科技有限公司 移动端文件管理方法、装置、电子设备及可读存储介质
CN109002728B (zh) * 2018-07-01 2021-12-10 深圳市爱聊科技有限公司 一种基于一键触发的群组显示控制方法
CN108829322A (zh) * 2018-07-02 2018-11-16 Oppo(重庆)智能科技有限公司 一种图片移动方法、系统及显示设备
CN109597542A (zh) 2018-10-08 2019-04-09 华为技术有限公司 一种相册展示方法、电子设备及存储介质
CN112395252B (zh) * 2020-10-10 2024-08-16 广州三七互娱科技有限公司 文件合并方法、装置及电子设备
CN113505099A (zh) * 2021-05-11 2021-10-15 深圳软牛科技有限公司 Windows系统的文件隐藏方法、装置、设备及存储介质
CN113535278B (zh) * 2021-06-15 2024-10-18 深圳市元征科技股份有限公司 动态库调用方法、装置、电子设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102479307A (zh) * 2010-11-23 2012-05-30 腾讯科技(深圳)有限公司 一种移动设备上的视频文件隐藏方法以及一种移动设备
CN102970420A (zh) * 2012-11-07 2013-03-13 广东欧珀移动通信有限公司 一种Android 系统中的图片过滤方法及系统
CN103106266A (zh) * 2013-01-31 2013-05-15 华为终端有限公司 基于安卓系统的文件夹管理和显示方法及移动终端
CN103338445A (zh) * 2013-06-19 2013-10-02 深圳市垦鑫达科技有限公司 文件加解密方法及系统
WO2015177636A2 (fr) * 2014-05-17 2015-11-26 Braden Miles Jennings Accès différencié pour dispositif mobile
CN106909855A (zh) * 2017-03-24 2017-06-30 腾讯科技(深圳)有限公司 文件隐藏方法及装置

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8266314B2 (en) * 2009-12-16 2012-09-11 International Business Machines Corporation Automated audio or video subset network load reduction
US9881177B2 (en) * 2013-02-13 2018-01-30 Security First Corp. Systems and methods for a cryptographic file system layer
CN103136348B (zh) * 2013-02-22 2018-09-04 小米科技有限责任公司 一种文件显示方法及装置
CN104036201A (zh) * 2014-06-25 2014-09-10 电子科技大学 一种Windows操作系统下的应用层文件隐藏方法
CN104573536A (zh) * 2015-01-28 2015-04-29 深圳市中兴移动通信有限公司 文件保护方法及文件保护装置
CN105930145B (zh) * 2016-04-12 2020-07-17 Oppo广东移动通信有限公司 一种信息隐藏方法及移动终端

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102479307A (zh) * 2010-11-23 2012-05-30 腾讯科技(深圳)有限公司 一种移动设备上的视频文件隐藏方法以及一种移动设备
CN102970420A (zh) * 2012-11-07 2013-03-13 广东欧珀移动通信有限公司 一种Android 系统中的图片过滤方法及系统
CN103106266A (zh) * 2013-01-31 2013-05-15 华为终端有限公司 基于安卓系统的文件夹管理和显示方法及移动终端
CN103338445A (zh) * 2013-06-19 2013-10-02 深圳市垦鑫达科技有限公司 文件加解密方法及系统
WO2015177636A2 (fr) * 2014-05-17 2015-11-26 Braden Miles Jennings Accès différencié pour dispositif mobile
CN106909855A (zh) * 2017-03-24 2017-06-30 腾讯科技(深圳)有限公司 文件隐藏方法及装置

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109740374A (zh) * 2018-12-20 2019-05-10 努比亚技术有限公司 一种隐藏方法、移动终端及计算机可读存储介质
CN109740374B (zh) * 2018-12-20 2023-05-19 努比亚技术有限公司 一种隐藏方法、移动终端及计算机可读存储介质
CN111353170A (zh) * 2020-02-27 2020-06-30 北京北信源软件股份有限公司 文件隐私信息处理方法、装置、电子设备及存储介质
CN112580074A (zh) * 2020-12-17 2021-03-30 南方电网深圳数字电网研究院有限公司 文件隐藏和恢复方法和工具、电子设备、存储介质

Also Published As

Publication number Publication date
CN106909855A (zh) 2017-06-30
CN106909855B (zh) 2021-10-29

Similar Documents

Publication Publication Date Title
WO2018171503A1 (fr) Procédé et dispositif de masquage de fichier
US11003331B2 (en) Screen capturing method and terminal, and screenshot reading method and terminal
JP6915091B2 (ja) アプリケーション処理方法、装置および記憶媒体
US9164657B2 (en) File management and transfer using user interface icons associated with applications
US7797529B2 (en) Upload security scheme
CN102521284B (zh) 基于移动终端浏览器的页面截图处理方法和装置
WO2019149218A1 (fr) Procédé et appareil de visualisation d'un fichier utilisé historiquement, et terminal
US20180373426A1 (en) Information Showing Method and Apparatus, and Electronic Device
US20140082610A1 (en) Mesh network and mesh network node application
US20110202864A1 (en) Apparatus and methods of receiving and acting on user-entered information
US11314820B2 (en) Systems and methods for web collaboration
US11729130B2 (en) Live database records in a chat platform
CN113127773B (zh) 页面处理方法、装置、存储介质及终端设备
CN106598677A (zh) 下载安装包的方法及装置
US8631236B2 (en) Auto file locker
CN106844104A (zh) 一种终端数据处理方法、装置及移动终端
US11553316B2 (en) Method and apparatus for storing and sending a computer location
CN111817944A (zh) 图片分享的方法、装置及电子设备
CN115967692A (zh) 会话信息处理方法及相关设备
CN110399177A (zh) 基于输入法的数据处理方法、装置和用于数据处理的装置
US20230164289A1 (en) Method and apparatus for storing and sending a computer location
CN110162237A (zh) 在电子终端中打开应用的方法及设备
JP6375235B2 (ja) 情報処理装置、プログラムに対するデータの引渡し方法及びプログラム
CN114237797B (zh) 跨设备呈现方法、客户端、电子设备、存储介质
HK40019564A (en) Screenshot processing method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18771754

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18771754

Country of ref document: EP

Kind code of ref document: A1