Method and terminal for realizing data processing
A data processing and terminal technology, which is applied in the field of data communication, can solve problems affecting privacy and security protection, and achieve the effect of realizing privacy security protection and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0103] image 3 It is the method flowchart of the first embodiment of the present invention, as image 3 shown, including:
[0104] In step 300, the terminal obtains the communication information input by the user, performs general encryption on the communication information, and obtains the general encrypted communication information.
[0105] Here, the general encryption method is a conventional technical means well known to those skilled in the art, and the general encrypted communication information can be decrypted by all terminals equipped with a general decryption function.
[0106] Step 301, perform differentiated encryption on the general encrypted communication information; specifically, encrypt with the unique identifier of the terminal or the unique identifier of the SIM card loaded on the terminal as an encryption parameter, that is, only terminals with the same unique identifier can be decrypted process.
[0107] It should be noted that in practical applicatio...
Embodiment 2
[0113] In this embodiment, the differentiated encryption and decryption process of communication information is described from the receiving end.
[0114] Figure 4 It is the method flowchart of the second embodiment of the present invention, as Figure 4 shown, including:
[0115] Step 400, the receiving end receives the communication information using general encryption from the sending end.
[0116] It should be noted that if the receiving end is a terminal that does not use differential encryption to process the communication information, it only needs to perform decryption and display processing on the communication information according to the general encryption process.
[0117] Step 401, the receiving end performs receiving-end differentiated encryption on the received general encrypted communication information.
[0118] Step 402: After the differential encryption is completed, the received general encrypted communication information is deleted.
[0119] Step 403,...
Embodiment 3
[0123] Figure 6 It is the method flowchart of the third embodiment of the present invention, as Figure 6 shown, including:
[0124] Step 600: Obtain communication information, and add random numbers to the head or tail of the communication information for general encryption. Here, different random numbers can be used each time to ensure the security of communication information during transmission. In addition, when the general encryption communication information is sent to the receiving end, according to the processing method in the prior art, the general encryption decryption public key is carried during the sending process.
[0125] Step 601, the sending end performs differentiated encryption on the general encrypted communication information. During the encryption process, the encryption algorithm uses the sent unique identifier as a parameter to encrypt; for example, the IMEI number or MEID number is used as a parameter to encrypt, and after encryption, add The decr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 