Text encryption method and device

An encryption method and text technology, applied in the field of encryption, can solve problems such as piracy supervision

Inactive Publication Date: 2016-03-30
CHINA MOBILE COMM GRP CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is to say, there is currently no effective means to su

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Text encryption method and device
  • Text encryption method and device
  • Text encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail by citing the following embodiments and referring to the accompanying drawings.

[0079] figure 1 It is a flow chart of text encryption method 1 of the embodiment of the present invention, as figure 1 As shown, the text encryption method of the embodiment of the present invention comprises the following steps:

[0080] Step 101: After receiving the text file sent by the network side, the user terminal encrypts the text file by using the identification information of the user terminal or the setting part information in the identification information, and generates a unique encryption key on the text file. graphics.

[0081] In the embodiment of the present invention, after the user terminal receives the text file sent by the network side, if the text file is encrypted by the network side, the text file needs to be de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a text encryption method and device. The method comprises the following steps: after a user terminal receives a text file sent by a network side, conducing encryption on the text file by utilizing identification information of the user terminal or set part information in the identification information, and generating a unique encrypted image on the text file; converting the text file and the encrypted image into an image file to be outputted. Or, the method comprises the following steps: when the network side sends the text file to the user terminal, conducing encryption on the text file by utilizing the identification information of the user terminal or the set part information in the identification information, and generating the unique encrypted image on the text file; converting the text file and the encrypted image into a graphic file, and sending the graphic file to the user terminal. According to the embodiment, through the setting of a graphic password on the text file, the identity of an infringer can be accurately positioned.

Description

technical field [0001] The embodiments of the present invention relate to encryption technology, and in particular to a text encryption method and device. Background technique [0002] At present, in the existing text distribution system, the text information is mainly encrypted, and after being distributed to the user, the user decrypts the key to view the relevant text information. Alternatively, the text is directly graphically distributed to users on the network side. By making the text graphical, it prevents the user from directly copying the text file and eliminates the piracy of the text file. However, the existing text distribution system can only prevent piracy of text files. For graphical text files, browsing users can directly download graphical files and publish them on the Internet. That is to say, there is currently no effective means to supervise the phenomenon of piracy for graphically processed text files. Contents of the invention [0003] In order to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/10
Inventor 刘阳
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products