Method and device for deciphering private information

A content and privacy technology, which is applied in the field of decrypting private content, can solve the problems of low security and invalidation of private content, and achieve the effect of protecting and improving security

Active Publication Date: 2012-10-24
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] When the encryption software is uninstalled from the mobile terminal, the function of protecting private content will fail, and any user can view the private content on the mobile terminal, so the security of protecting private content is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for deciphering private information
  • Method and device for deciphering private information
  • Method and device for deciphering private information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] Such as figure 1 As shown, the embodiment of the present invention provides a method for decrypting private content, including:

[0044] Step 101: Receive the identification and decryption password of the private content to be decrypted input by the user;

[0045] Step 102: Decrypt the ciphertext corresponding to the identifier of the private content to be decrypted according to the decryption password;

[0046] Step 103: If the decryption is successful, display the decrypted private content; if the decryption fails, display the preset display content.

[0047] Wherein, the private content may be the content of the short message or the mobile phone number of the user.

[0048] In the embodiment of the present invention, the identification of the private content to be decrypted and the decryption password input by the user are received, and the ciphertext corresponding to the identification of the private content to be decrypted is decrypted according to the decryption...

Embodiment 2

[0050] see figure 2 , the embodiment of the present invention provides a method for decrypting private content, including:

[0051] Step 201: the terminal receives the encrypted password input by the user and the privacy content to be protected selected by the user;

[0052] Specifically, the terminal receives the command submitted by the user for setting the privacy protection content, displays the input interface, and when the user enters the encrypted password in the input interface, receives the confirmation command submitted by the user, and reads the encrypted password input by the user from the input interface; After the user selects and submits the privacy content to be protected in the terminal, the privacy content to be protected selected by the user is received.

[0053] Among them, the terminal will display a button for setting the privacy protection content. When the user needs to protect the privacy content in the terminal, the user can click this button to sub...

Embodiment 3

[0076] see image 3 , the embodiment of the present invention provides a method for decrypting private content, including:

[0077] Step 301: the terminal receives the encrypted password input by the user, the false password and the privacy content to be protected selected by the user;

[0078] Specifically, the terminal receives the command submitted by the user for setting the privacy protection content, and displays the input interface. After the user enters the encrypted password and the false password in the input interface, the terminal receives the confirmation command submitted by the user, and reads the password entered by the user from the input interface. Encrypted password and false password; when the user selects and submits the privacy content to be protected in the terminal, the privacy content to be protected selected by the user is received.

[0079] Among them, the terminal will display a button for setting the privacy protection content. When the user needs...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for deciphering private information, belonging to the computer safety field. The method comprises the following steps: receiving identifier and deciphering password of the private information to be deciphered, which is input by a user; deciphering a cipher-text corresponding to the private information to be deciphered according to the deciphering password; displaying the deciphered private information if the deciphering is successful; and displaying preset display content if the deciphering fails; the device comprises a receiving module, a deciphering module and a display module. According to the method and the device, the safety for protecting the private information can be improved.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method and device for decrypting private content. Background technique [0002] With the rapid development of mobile terminal technology, mobile terminals have been widely used, and the information security of mobile terminals has been paid more and more attention by users. When users use mobile terminals, they will generate a large amount of private content, which needs to be protected to ensure information security. [0003] There is a method for protecting private content on a mobile terminal in the prior art, specifically: the user installs an encryption software on the mobile terminal in advance, and sets a password for the encryption software; for the private content existing in the mobile terminal, the user will The private content is stored in the encryption software; when the user views the private content, the encryption software displays a password input interface for the u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24
CPCH04L9/3226G06F21/6209G06F21/45G06F21/60
Inventor 李丹华
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products