Unlock instant, AI-driven research and patent intelligence for your innovation.

Chatting record encryption method and mobile terminal

A technology of chat records and mobile terminals, which is applied to instruments, electronic digital data processing, and digital data protection, etc. It can solve problems such as economic loss of users, use by lawbreakers, and poor security of user information, so as to improve security, avoid leakage, loss avoidance effect

Inactive Publication Date: 2015-12-23
NUBIA TECHNOLOGY CO LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the security of the chat records is only guaranteed by the security measures of the mobile terminal. For example, the user has set a power-on password for the mobile phone. If the user's mobile phone is lost, the thief cannot unlock the mobile phone because he cannot know the user's mobile phone power-on password. Unable to check the chat history of the chat software in the mobile phone
However, because the power-on passwords of mobile phones are mostly relatively simple, they are easy to be cracked; moreover, due to the lack of awareness of some users, they may inadvertently disclose the power-on passwords of mobile phones, making the mobile phones easy to be used by criminals after they are lost or stolen. In turn, the important information in the chat records is leaked, so the security of user information is poor, and it is easy to cause economic losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chatting record encryption method and mobile terminal
  • Chatting record encryption method and mobile terminal
  • Chatting record encryption method and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0080] Such as image 3 As shown, the first embodiment of the present invention proposes a method for encrypting chat records, including:

[0081] Step 301, when the user selects the chat record to be encrypted for a preset duration, instruct the user to input encrypted information through a display interface.

[0082] Generally, there are two types of existing mobile terminals, one is button-type, that is, the screen of the mobile terminal is a non-touch display, and the buttons are usually set at the bottom of the screen, and the mobile terminal is operated through the buttons; the other is touch-type , that is, the mobile terminal has no buttons, or only a few buttons, and the screen is a touch screen, and the user operates the mobile terminal with a finger or a touch pen.

[0083] For example, if the user is using a push-button mobile terminal, the push-button mobile terminal is as Figure 4 As shown, the screen 3011 of the mobile terminal is a non-touch screen, and the ...

Embodiment 2

[0094] Embodiments of the present invention provide a method for encrypting chat records, such as Figure 11 As shown, the method includes:

[0095] Step 1101, when the user selects the chat record to be encrypted for a preset duration, instruct the user to input encrypted information through the display interface.

[0096] For example, assuming that the preset duration is 5 seconds, if the user is using a push-button mobile terminal, refer to Figure 4 As shown, assuming that the user needs to encrypt the chat record 3, the user can move the selection box 3016 by pressing the up arrow key 3013 or the down arrow key 3014, so that the selection box 3016 selects the chat record 3, and then press the OK key 3015 for 5 seconds . When it is detected that the user selects the chat record 3 for 5 seconds, the mobile terminal can display the encryption interface on the screen, refer to Figure 5 , prompting the user for encryption information for encryption. A common mobile termin...

Embodiment 3

[0105] Embodiments of the present invention provide a method for encrypting chat records, such as Figure 13 As shown, the method includes:

[0106] Step 1301, when the user selects the chat record to be encrypted for a preset duration, instruct the user to input encrypted information through the display interface.

[0107] For example, assuming that the preset duration is 5 seconds, if the user is using a push-button mobile terminal, refer to Figure 4 As shown, assuming that the user needs to encrypt the chat record 3, the user can move the selection box 3016 by pressing the up arrow key 3013 or the down arrow key 3014, so that the selection box 3016 selects the chat record 3, and then press the OK key 3015 for 5 seconds . When it is detected that the user selects the chat record 3 for 5 seconds, the mobile terminal can display the encryption interface on the screen, refer to Figure 5 , prompting the user for encryption information for encryption. A common mobile termin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a chatting record encryption method. The method comprises the following steps: instructing a user to input encryption information through a display interface when the user selects a to-be-encrypted chatting record fora preset time length; and encrypting the chatting record according to the received encryption information. The invention further discloses a mobile terminal.

Description

technical field [0001] The invention relates to terminal security technology in the communication field, in particular to a method for encrypting chat records and a mobile terminal. Background technique [0002] With the increasing intelligence of mobile terminals, the application of mobile terminals is becoming more and more extensive, especially with the popularization of instant messaging tools, communication between many users can be carried out through instant messaging tools, inevitably It involves the exchange of important information, for example, the exchange of business information or financial information between users, so the requirements for the security of chat records are getting higher and higher. [0003] At present, the security of the chat records is only guaranteed by the security measures of the mobile terminal. For example, the user has set a power-on password for the mobile phone. If the user's mobile phone is lost, the thief cannot unlock the mobile p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6209G06F2221/2107
Inventor 陶冬
Owner NUBIA TECHNOLOGY CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More