Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and terminal for realizing data processing

A data processing and terminal technology, which is applied in the field of data communication, can solve problems affecting privacy and security protection, and achieve the effect of realizing privacy security protection and improving security

Inactive Publication Date: 2016-11-23
ZTE CORP
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although such encryption meets the requirements of privacy protection to a certain extent, any decryptable terminal can be decrypted, which seriously affects the security protection of privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and terminal for realizing data processing
  • Method and terminal for realizing data processing
  • Method and terminal for realizing data processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0103] image 3 It is the method flowchart of the first embodiment of the present invention, as image 3 shown, including:

[0104] In step 300, the terminal obtains the communication information input by the user, performs general encryption on the communication information, and obtains the general encrypted communication information.

[0105] Here, the general encryption method is a conventional technical means well known to those skilled in the art, and the general encrypted communication information can be decrypted by all terminals equipped with a general decryption function.

[0106] Step 301, perform differentiated encryption on the general encrypted communication information; specifically, encrypt with the unique identifier of the terminal or the unique identifier of the SIM card loaded on the terminal as an encryption parameter, that is, only terminals with the same unique identifier can be decrypted process.

[0107] It should be noted that in practical applicatio...

Embodiment 2

[0113] In this embodiment, the differentiated encryption and decryption process of communication information is described from the receiving end.

[0114] Figure 4 It is the method flowchart of the second embodiment of the present invention, as Figure 4 shown, including:

[0115] Step 400, the receiving end receives the communication information using general encryption from the sending end.

[0116] It should be noted that if the receiving end is a terminal that does not use differential encryption to process the communication information, it only needs to perform decryption and display processing on the communication information according to the general encryption process.

[0117] Step 401, the receiving end performs receiving-end differentiated encryption on the received general encrypted communication information.

[0118] Step 402: After the differential encryption is completed, the received general encrypted communication information is deleted.

[0119] Step 403,...

Embodiment 3

[0123] Figure 6 It is the method flowchart of the third embodiment of the present invention, as Figure 6 shown, including:

[0124] Step 600: Obtain communication information, and add random numbers to the head or tail of the communication information for general encryption. Here, different random numbers can be used each time to ensure the security of communication information during transmission. In addition, when the general encryption communication information is sent to the receiving end, according to the processing method in the prior art, the general encryption decryption public key is carried during the sending process.

[0125] Step 601, the sending end performs differentiated encryption on the general encrypted communication information. During the encryption process, the encryption algorithm uses the sent unique identifier as a parameter to encrypt; for example, the IMEI number or MEID number is used as a parameter to encrypt, and after encryption, add The decr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a terminal for realizing data processing. The method comprises the steps: the terminal performs differentiated encryption for acquired communication information through a differentiated identifier; and when displaying the communication information, the terminal performs differentiated decryption. In the method provided by the invention, differentiated encryption is carried out with the differentiated identifier through the terminal, displaying can be carried out only by the differentiated decryption, and privacy security protection of the communication information is realized; moreover, the communication information subjected to differentiated encryption is stored in a secure storage space of the terminal, and security of the communication information is improved further.

Description

technical field [0001] The invention relates to data communication technology, in particular to a method, terminal and system for realizing data processing. Background technique [0002] With the continuous development of wireless communication application technology, users have higher and higher requirements for the protection of personal privacy. In order to protect the personal privacy of users, data processing is generally performed on information related to privacy; among them, the privacy of communication applications used in user communication Especially concerned, such as communication information involving personal privacy in instant messaging applications. [0003] Taking instant messaging as an example, the general encryption of communication information is realized by using the current encryption method. After the general encrypted communication information is stored at the sending end, the communication information is obtained through general decryption; Decryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02
CPCH04W12/02H04W12/03
Inventor 魏明业
Owner ZTE CORP