Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, mobile terminal and system for data encryption

A data encryption and mobile terminal technology, applied in digital data authentication, digital data protection, electronic digital data processing, etc., can solve problems such as inability to continue viewing, flexible screen deformation, troublesome chat content, etc., to avoid illegal viewing or calling The effect of user privacy information and enhanced protection

Active Publication Date: 2017-05-10
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of mobile communication technology, more and more users choose to load more and more applications in smart terminals, but many of these applications will involve the user's personal privacy information, such as some current chat In terms of software, users usually cover the screen with their hands in order to prevent the chat information from being peeped by others during the communication using the chat software, and then hide and protect some chat content so that it cannot be seen or viewed by other users. transfer
But this way of covering chat content with hands is too troublesome, and for others, this behavior is often impolite, especially in some social situations
In addition, in some existing technologies, in order to prevent the currently displayed information from being peeped by others, the user can manually deform the flexible screen to protect the personal privacy information on the smart terminal; however, this method belongs to a A fixed deformation method, but the deformed interface makes it impossible for the user and others to continue to view the content on the terminal
It can be seen that in the above method, whether it is covering with hands or deforming the flexible screen, there is a possibility that the user's personal information will be leaked, which will affect the user's access to personal privacy information to a certain extent.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, mobile terminal and system for data encryption
  • Method, mobile terminal and system for data encryption
  • Method, mobile terminal and system for data encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0031] The terms "comprising" and "having" and any variations thereof in the description and claims of the present invention and the above drawings are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes unlisted steps or units, or optionally further includes For other steps or units inherent in these pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for data encryption and a corresponding mobile terminal and system. The method comprises the steps of obtaining a click operation command, and controlling a terminal screen to display original interface data according to the click operation command; conducting light encryption treatment on the original interface data, controlling the terminal screen to show the interface data after the interface data is subjected to light encryption treatment, and determining the interface data which is subjected to light encryption treatment as messy code interface data; sending the messy code interface data to a pair of decoding glasses, so that the decoding glasses conduct decoding on the messy code interface data, and the original interface data can be shown in a display screen of the decoding glasses. According to the method, the mobile terminal and system for data encryption, the privacy and safety of private information of a user can be strengthened, and the encrypted original interface data can be obtained through the decoding glasses so as to make it convenient for the user to conduct query on the private information in the terminal screen.

Description

technical field [0001] The invention relates to the field of computer application programs, in particular to a data encryption method, a mobile terminal and a system. Background technique [0002] With the rapid development of mobile communication technology, more and more users choose to load more and more applications in smart terminals, but many of these applications will involve the user's personal privacy information, such as some current chat In terms of software, users usually cover the screen with their hands in order to prevent the chat information from being peeped by others during the communication using the chat software, and then hide and protect some chat content so that it cannot be seen or viewed by other users. transfer. However, this method of covering chat content with hands is too troublesome, and for others, this behavior is often impolite, especially in some social occasions. In addition, in some existing technologies, in order to prevent the currentl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/84G06F21/31
CPCG06F21/31G06F21/602G06F21/84G06F2221/2107
Inventor 吴和平叶瑞权
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products