Method and device for deciphering private information

A content and privacy technology, which is applied in the field of decrypting private content, can solve the problems of failure to protect private content and low security of private content, and achieve the effect of improving security and protecting security

Active Publication Date: 2014-04-16
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] When the encryption software is uninstalled from the mobile terminal, the function of protecting private content will fail, and any user can view the private content on the mobile terminal, so the security of protecting private content is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for deciphering private information
  • Method and device for deciphering private information
  • Method and device for deciphering private information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Such as figure 1 As shown, the embodiment of the present invention provides a method for decrypting private content, including:

[0036] Step 101: Receive the identification and decryption password of the private content to be decrypted input by the user;

[0037] Step 102: Decrypt the ciphertext corresponding to the identifier of the private content to be decrypted according to the decryption password;

[0038] Step 103: If the decryption is successful, display the decrypted private content; if the decryption fails, display the preset display content.

[0039] Wherein, the private content may be the content of the short message or the mobile phone number of the user.

[0040] In the embodiment of the present invention, the identification of the private content to be decrypted and the decryption password input by the user are received, and the ciphertext corresponding to the identification of the private content to be decrypted is decrypted according to the decryption...

Embodiment 2

[0042] see figure 2 , the embodiment of the present invention provides a method for decrypting private content, including:

[0043] Step 201: the terminal receives the encrypted password input by the user and the privacy content to be protected selected by the user;

[0044] Specifically, the terminal receives the command submitted by the user for setting the privacy protection content, displays the input interface, and when the user enters the encrypted password in the input interface, receives the confirmation command submitted by the user, and reads the encrypted password input by the user from the input interface; After the user selects and submits the privacy content to be protected in the terminal, the privacy content to be protected selected by the user is received.

[0045] Among them, the terminal will display a button for setting the privacy protection content. When the user needs to protect the privacy content in the terminal, the user can click this button to sub...

Embodiment 3

[0068] see image 3 , the embodiment of the present invention provides a method for decrypting private content, including:

[0069] Step 301: the terminal receives the encrypted password input by the user, the false password and the privacy content to be protected selected by the user;

[0070] Specifically, the terminal receives the command submitted by the user for setting the privacy protection content, and displays the input interface. After the user enters the encrypted password and the false password in the input interface, the terminal receives the confirmation command submitted by the user, and reads the password entered by the user from the input interface. Encrypted password and false password; when the user selects and submits the privacy content to be protected in the terminal, the privacy content to be protected selected by the user is received.

[0071] Among them, the terminal will display a button for setting the privacy protection content. When the user needs...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system to decrypt private contents stored in a device and the invention belongs to the field of computer security. The method may include: receiving a contents ID and a decrypting password from a first user; decrypting the encrypted private contents corresponding to the contents ID using the decrypting password; displaying the decrypted private contents when the decryption is successful; and displaying preset contents when the decryption is not successful. The system may include: a receiving module, a decryption module, and a display module. The present invention can improve the security of the private contents.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method and device for decrypting private content. Background technique [0002] With the rapid development of mobile terminal technology, mobile terminals have been widely used, and the information security of mobile terminals has been paid more and more attention by users. When users use mobile terminals, they will generate a large amount of private content, which needs to be protected to ensure information security. [0003] There is a method for protecting private content on a mobile terminal in the prior art, specifically: the user installs an encryption software on the mobile terminal in advance, and sets a password for the encryption software; for the private content existing in the mobile terminal, the user will The private content is stored in the encryption software; when the user views the private content, the encryption software displays a password input interface for the u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCH04L9/3226G06F21/6209G06F21/45G06F21/60
Inventor 李丹华
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products