A note encryption method and terminal

An encryption method and technology for sticky notes, applied in the direction of digital data protection, etc., can solve the problem of automatic encryption of sticky notes, etc., and achieve the effect of improving user experience and reducing user operations.

Active Publication Date: 2019-10-15
VIVO MOBILE COMM CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a note encryption method and terminal, aiming to solve the problem that existing note applications cannot automatically encrypt notes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A note encryption method and terminal
  • A note encryption method and terminal
  • A note encryption method and terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0023] Such as figure 1 As shown, the embodiment of the present invention provides a note encryption method applied to a terminal, including:

[0024] Step 101: Obtain the note information of the newly created note.

[0025] The note information here may specifically be note type or note content.

[0026] In a specific embodiment of the present invention, if the user turns on the automatic encryption function, after the user creates a new note, the note information of the newly created note will be obtained, so that the new note will be automatically encrypted according to the note information of the newly created note .

[0027] Step 102: Determine whether the note information of the above-mentioned newly created note matches the target encrypted information, which is the note information shared by the preset number of encrypted notes in the terminal.

[0028] Here, the above note information may include keywords or note types. The encrypted note can be specifically the n...

no. 2 example

[0041] Such as figure 2 As shown, the embodiment of the present invention provides a note encryption method applied to a terminal, including:

[0042] Step 201: Obtain the note information of the newly created note.

[0043] This step is the same as step 101 in the above-mentioned first embodiment, and will not be repeated here.

[0044] Step 202: Obtain the note information of the encrypted note in the terminal.

[0045] The note information here may include note type and note content.

[0046] Step 203: Judging whether the number of notes with the same note information in the encrypted notes of the terminal reaches a preset number.

[0047] Step 204: If the preset number is reached, extract the note information shared by the preset number of encrypted notes as the target encrypted information.

[0048] When the number of identical note information is greater than or equal to the preset number, it indicates that the note information is common information of encrypted not...

no. 3 example

[0059] like image 3 As shown, the embodiment of the present invention also provides a terminal, including:

[0060] The first obtaining module 301 is used to obtain the note information of the newly created note;

[0061] The first judging module 302 is used to judge whether the note information of the newly-created note matches the target encrypted information, and the target encrypted information is the note information shared by the encrypted notes reaching a preset number in the terminal;

[0062] The encryption module 303 is configured to perform encryption processing on the newly created note if the note information of the newly created note matches the target encrypted information.

[0063] The terminal of the embodiment of the present invention also includes:

[0064] The second obtaining module 304 is used to obtain the note information of the encrypted note in the terminal;

[0065] The second judging module 305 is used to judge whether the number of notes with t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a note encryption method and a terminal. The problem that the existing note application cannot automatically encrypt notes is solved. The note encryption method provided by the invention comprises the following steps: obtaining note information of a newly built note; judging whether the note information of the newly built note is matched with target encryption information, wherein the target encryption information is note information shared by a preset number of encrypted notes in the terminal; and if the note information of the newly built note is matched with target encryption information, performing encryption processing on the newly built note. According to the note encryption method provided by the embodiment of the invention, the note information shared by the encrypted notes is identified to count the note contents or types or the like of the encrypted notes necessary for a user, so that the subsequent newly built notes can be encrypted according to the identified note information, the purpose that the user wants to realize automatic encryption of the notes is realized, the user operations are reduced, and the user experience is improved.

Description

technical field [0001] The invention relates to the technical field of note encryption, in particular to a note encryption method and terminal. Background technique [0002] With the rapid development of the network, users have greatly improved their work efficiency with the help of the network, but at the same time there are various security risks in the network. In recent years, various Internet security accidents have occurred frequently, and connecting to the Internet will face various security risks. Such as information leakage, information tampering, resource theft, etc. In addition, with the development of the electronics industry, mobile devices such as smartphones, tablets, and notebooks have entered thousands of households. Mobile devices are easy to carry but also have the disadvantage of being easy to lose. After being lost, the information on the device can be viewed by others at will. It will cause the leakage of various important information. The existence o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
Inventor 李少赓
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products