Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal encryption and decryption method and terminal

An encryption, decryption and terminal technology, applied in the direction of digital data protection, etc., can solve the problem of easy forgetting, and achieve the effect of concealment of encryption function and protection from leakage.

Active Publication Date: 2016-05-04
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still some defects in the above encryption methods, such as a very obvious reminder whether a certain function has been encrypted. At the same time, the password is generally a number or other characters, which is easy to forget and easy to crack through repeated attempts.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal encryption and decryption method and terminal
  • Terminal encryption and decryption method and terminal
  • Terminal encryption and decryption method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to be able to understand the above objectives, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0026] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the present invention is not limited to the specific embodiments disclosed below. limit.

[0027] figure 1 A flowchart of a terminal encryption method according to an embodiment of the present invention is shown.

[0028] Such as figure 1 As shown, the terminal encryption and decryption method according to the embodiment of the present invention is applied to a terminal with a displacement sensing device, and includes: step 102, using the displacement sensing device to obtain the first m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal encryption and decryption method, which is applied in a terminal with a displacement sensing device, and comprises the following steps of step 102, utilizing the displacement sensing device to acquire a first moving track of the terminal in space, and generating encryption track information; step 104, utilizing the encryption track information to encrypt an application module or file required to be encrypted; step 106, utilizing the displacement sensing device to acquire a second moving track of the terminal in space, and generating decryption track information; and step 108, comparing the decryption track information with the encryption track information, and if the decryption track information is matched with the encryption track information, decrypting the application module or file. Correspondingly, the invention also provides the terminal. Through the technical scheme of the invention, a secret key is set according to the preferences of users, an encryption function is more concealed, and the information can be effectively prevented from being revealed.

Description

Technical field [0001] The present invention relates to encryption technology, in particular, to a terminal encryption and decryption method and a terminal. Background technique [0002] In related technologies, the terminal encryption technologies used include the following: The first is to use character encryption methods. When a certain function (such as power-on, address book, SMS, etc.) is in an encrypted state and needs to be decrypted, a pop-up request will appear. The prompt interface for entering the password can only accept the keyboard to enter the character password; the second type, the pattern solution, such as the pattern encryption that comes with Android, the screen has n points in a fixed position, and several of them are connected into a certain shape as the key ; The third is to use the existing face and fingerprint encryption technology on the PC for encryption. However, for the above encryption methods, there are still some shortcomings, such as a very obvi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
Inventor 杨鹏辉蒋国强
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD