Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data encryption method, mobile terminal and system

A data encryption, mobile terminal technology, applied in digital data authentication, digital data protection, electronic digital data processing and other directions, can solve the problems of flexible screen deformation, unable to continue viewing, chat information being snooped by others, etc., to strengthen protection, avoid The effect of illegally viewing or calling user private information

Active Publication Date: 2020-04-07
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of mobile communication technology, more and more users choose to load more and more applications in smart terminals, but many of these applications will involve the user's personal privacy information, such as some current chat In terms of software, users usually cover the screen with their hands in order to prevent the chat information from being peeped by others during the communication using the chat software, and then hide and protect some chat content so that it cannot be seen or viewed by other users. transfer
But this way of covering chat content with hands is too troublesome, and for others, this behavior is often impolite, especially in some social situations
In addition, in some existing technologies, in order to prevent the currently displayed information from being peeped by others, the user can manually deform the flexible screen to protect the personal privacy information on the smart terminal; however, this method belongs to a A fixed deformation method, but the deformed interface makes it impossible for the user and others to continue to view the content on the terminal
It can be seen that in the above method, whether it is covering with hands or deforming the flexible screen, there is a possibility that the user's personal information will be leaked, which will affect the user's access to personal privacy information to a certain extent.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data encryption method, mobile terminal and system
  • A data encryption method, mobile terminal and system
  • A data encryption method, mobile terminal and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0031] The terms "including" and "having" in the specification and claims of the present invention and the above-mentioned drawings and any variations thereof are intended to cover non-exclusive inclusions. For example, a process, method, system, product, or device that includes a series of steps or units is not limited to the listed steps or units, but optionally includes unlisted steps or units, or optionally also includes Other steps ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for data encryption and a corresponding mobile terminal and system. The method comprises the steps of obtaining a click operation command, and controlling a terminal screen to display original interface data according to the click operation command; conducting light encryption treatment on the original interface data, controlling the terminal screen to show the interface data after the interface data is subjected to light encryption treatment, and determining the interface data which is subjected to light encryption treatment as messy code interface data; sending the messy code interface data to a pair of decoding glasses, so that the decoding glasses conduct decoding on the messy code interface data, and the original interface data can be shown in a display screen of the decoding glasses. According to the method, the mobile terminal and system for data encryption, the privacy and safety of private information of a user can be strengthened, and the encrypted original interface data can be obtained through the decoding glasses so as to make it convenient for the user to conduct query on the private information in the terminal screen.

Description

Technical field [0001] The present invention relates to the field of computer application programs, in particular to a data encryption method, mobile terminal and system. Background technique [0002] With the rapid development of mobile communication technology, more and more users choose to load more and more applications in smart terminals, but many of them will involve users’ personal privacy information, such as chats In terms of software, in order to prevent the chat information from being snooped by others, users usually cover the screen with their hands during the communication using the chat software, and then hide and protect some chat content so that it cannot be seen or seen by other users. transfer. But this way of covering chat content with hands is too troublesome, and for others, this behavior is often impolite, especially in some social situations. In addition, in some existing technologies, in order to prevent the currently displayed information from being spi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/84G06F21/31
CPCG06F21/31G06F21/602G06F21/84G06F2221/2107
Inventor 吴和平叶瑞权
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products