Unlock instant, AI-driven research and patent intelligence for your innovation.

An information encryption method and device

An information encryption and password technology, applied in the field of communication, can solve the problems of heavy user operations, increase the number of decryption operations, and increase the user's operation burden, so as to improve the experience and reduce the operation burden.

Active Publication Date: 2018-05-29
XIAOMI INC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] For the first encryption strategy mentioned above, although this encryption strategy can well guarantee the security of important information in the terminal, there may be many pieces of important information received by the terminal. Encryption, the user's operation may be too heavy, increasing the user's operation burden
[0007] For the second encryption strategy mentioned above, although this mask strategy can reduce the amount of user operations, not all the information sent by a specific number is important information, so according to the second encryption strategy, the user views the All information of a specific number needs to be decrypted, thereby increasing the number of operations that users need to decrypt

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information encryption method and device
  • An information encryption method and device
  • An information encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] figure 1 is a flow chart of an information encryption method shown according to an exemplary embodiment, such as figure 1 As shown, the information encryption method can be used in the terminal, and the method can ensure that the sensitive data in the information received by the terminal is encrypted, reducing the user's operation burden, thereby improving the user's experience. The method includes the following step.

[0075] In step S101, information received by the terminal is acquired.

[0076] Wherein, the information may be information such as short messages or emails. When the terminal receives information such as short messages or emails sent by other terminals, the information is acquired for use in subsequent steps.

[0077] In step S102, a preset identification rule is used to determine whether sensitive data exists in the information.

[0078] Among them, sensitive data refers to information that is very important to the user. If this very important info...

Embodiment 2

[0095] See figure 2 as shown, figure 2 It is a flow chart of another information encryption method shown according to an exemplary embodiment. Since this embodiment is an improvement based on the first embodiment, please refer to the content of the first embodiment for the similarities between this embodiment and the first embodiment, and the repeated content will not be repeated. The embodiments provided by the present disclosure can be applied in terminals. The method disclosed in this embodiment can find out in advance the preset keywords that often appear together with each sensitive data, and establish a relationship between the identification rules of each sensitive data and the preset keywords. Once the preset keywords are found in the information, Then, the sensitive data in the information is determined according to the identification rule corresponding to the preset keyword, and it is quicker to locate the sensitive data in the information in this way. The metho...

Embodiment 3

[0106] See image 3 as shown, image 3 It is a flow chart of another information encryption method shown according to an exemplary embodiment. Since this embodiment is an improvement based on the first embodiment, please refer to the content of the first embodiment for the similarities between this embodiment and the first embodiment, and the repeated content will not be repeated. The embodiments provided by the present disclosure can be applied in terminals. The method disclosed in this embodiment can not only receive the password input by the user, so that the user can view the information with sensitive data, but also automatically convert the sensitive data in the information into safe data after the information is displayed for a predetermined time, thereby The security of sensitive data in information can be continuously guaranteed. The method includes the following steps.

[0107] In step S301, information received by the terminal is acquired.

[0108] In step S302...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information encryption method and device. The method comprises the steps of acquiring the information received by a terminal, determining whether the information contains sensitive data according to a preset identification rule, converting the sensitive data into safe data according to a preset encryption rule when it is determined that the information contains the sensitive data, and displaying the information containing the safe data. By means of the preset identification rule, the sensitive data in the information received by the terminal can be determined, the sensitive data are converted into the safe data by means of the preset encryption rule after the sensitive data are found, and only the information containing safe data is displayed finally. In the encryption process, encryption of the sensitive data in the information can be conducted without user participation, and therefore operation burdens of a user can be reduced on the premise that encryption of the sensitive data in the information received by the terminal is achieved, and then user experience is improved.

Description

technical field [0001] The present invention relates to the technical field of communication, and more specifically, to an information encryption method and device. Background technique [0002] At present, in order to ensure that the information received by the terminal is not stolen by others, there are various information encryption strategies. [0003] There are mainly two methods for related encryption strategies. The first encryption strategy is for the user to manually encrypt the information received by the terminal. For example, if the user's terminal receives an important message, the user will set a password for this important message in order to ensure that the important information will not be seen by others. Even if the terminal is stolen by other criminals, the criminals cannot View important information with a password, so this method can well ensure the security of important information on the terminal. [0004] The second encryption strategy pre-sets some...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 陈志军张涛张波王琳
Owner XIAOMI INC