Unlock instant, AI-driven research and patent intelligence for your innovation.

Encrypting method, decrypting method, encrypting device, decrypting device and terminal

An encryption method and encryption device technology, applied in the computer field, can solve problems such as human-computer interaction language translation defects, inability to perceive rich language of users, and inability to perceive subtle changes in operations, etc., to achieve the effect of enriching the language of human-computer interaction

Inactive Publication Date: 2015-12-23
MEIZU TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing technology is mainly limited to the traditional field. For example, by simply judging whether there is a pressing operation and then judging whether a certain operation is triggered, it cannot perceive the rich language contained in the user's operation itself, and cannot perceive the subtle changes in the operation itself. There are defects in the mutual translation of computer-interactive languages
[0004] Specific to encryption and decryption, at present, the password is mainly input manually, and the corresponding password has not been generated through the pressure value. The operation is cumbersome and the user experience is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypting method, decrypting method, encrypting device, decrypting device and terminal
  • Encrypting method, decrypting method, encrypting device, decrypting device and terminal
  • Encrypting method, decrypting method, encrypting device, decrypting device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0043] The embodiment of the present invention discloses an encryption method, a decryption method, an encryption device, a decryption device, and a terminal. By pressing different pressure values ​​of keys, corresponding key passwords are generated, and preset objects are encrypted and decrypted, so that users can encrypt and decrypt The operation is simpler and faster, and the language of human-computer interaction is also enriched. Each will be described in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encrypting method, a decrypting method, an encrypting device, a decrypting device and a terminal. The encrypting method can be used for the terminal with keys, and includes the steps of receiving pressing operation signals acting on the keys, obtaining pressure values corresponding to the pressing operation signals according to the pressing operation signals, generating key passwords according to information corresponding to the keys corresponding to the pressing operation signals and the values of pressure pressing the keys, and encrypting a preset object in the terminal according to the key passwords. The invention further relates to the decrypting method, the encrypting device, the decrypting device and the terminal. According to the technical scheme, corresponding key passwords are generated according to different values of pressure pressing the keys, the preset object is encrypted and decrypted, a user can more easily and rapidly conduct encryption operation and decryption operation, and man-machine interaction languages are enriched.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to an encryption method, a decryption method, an encryption device, a decryption device and a terminal. Background technique [0002] With the continuous development and maturity of wireless communication technology and computer programming technology, terminals such as smart phones have been greatly improved in terms of hardware performance and software experience. The use of abundant application programs on terminals has penetrated into every aspect of daily life and brought great convenience to people's daily life. [0003] With the continuous expansion of the form and latitude of human-computer interaction, the user's operation of the handheld terminal device is no longer limited to triggering by specifying keys or touching the screen. With the support of different sensors, handheld terminal devices can more and more sense the changes in the user's emotions and thinki...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/30G06F3/041
CPCG06F21/30G06F3/0414
Inventor 易鹏
Owner MEIZU TECH CO LTD