An information encryption method and device
An information encryption and password technology, applied in the field of communication, can solve the problems of heavy user operations, increase the number of decryption operations, and increase the user's operation burden, so as to improve the experience and reduce the operation burden.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0074] figure 1 is a flow chart of an information encryption method shown according to an exemplary embodiment, such as figure 1 As shown, the information encryption method can be used in the terminal, and the method can ensure that the sensitive data in the information received by the terminal is encrypted, reducing the user's operation burden, thereby improving the user's experience. The method includes the following step.
[0075] In step S101, information received by the terminal is acquired.
[0076] Wherein, the information may be information such as short messages or emails. When the terminal receives information such as short messages or emails sent by other terminals, the information is acquired for use in subsequent steps.
[0077] In step S102, a preset identification rule is used to determine whether sensitive data exists in the information.
[0078] Among them, sensitive data refers to information that is very important to the user. If this very important info...
Embodiment 2
[0095] See figure 2 as shown, figure 2 It is a flow chart of another information encryption method shown according to an exemplary embodiment. Since this embodiment is an improvement based on the first embodiment, please refer to the content of the first embodiment for the similarities between this embodiment and the first embodiment, and the repeated content will not be repeated. The embodiments provided by the present disclosure can be applied in terminals. The method disclosed in this embodiment can find out in advance the preset keywords that often appear together with each sensitive data, and establish a relationship between the identification rules of each sensitive data and the preset keywords. Once the preset keywords are found in the information, Then, the sensitive data in the information is determined according to the identification rule corresponding to the preset keyword, and it is quicker to locate the sensitive data in the information in this way. The metho...
Embodiment 3
[0106] See image 3 as shown, image 3 It is a flow chart of another information encryption method shown according to an exemplary embodiment. Since this embodiment is an improvement based on the first embodiment, please refer to the content of the first embodiment for the similarities between this embodiment and the first embodiment, and the repeated content will not be repeated. The embodiments provided by the present disclosure can be applied in terminals. The method disclosed in this embodiment can not only receive the password input by the user, so that the user can view the information with sensitive data, but also automatically convert the sensitive data in the information into safe data after the information is displayed for a predetermined time, thereby The security of sensitive data in information can be continuously guaranteed. The method includes the following steps.
[0107] In step S301, information received by the terminal is acquired.
[0108] In step S302...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


