Data encryption method and device, and terminal

A terminal and data technology, applied in secure communication devices, digital transmission systems, and key distribution, can solve problems such as lost data and terminals that do not have decryption functions, and achieve the effect of optimizing user experience and improving data security.

Inactive Publication Date: 2017-05-31
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] This disclosure provides a data decryption method, device, and terminal to overcome the defect that the terminal does not have the decryp

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and device, and terminal
  • Data encryption method and device, and terminal
  • Data encryption method and device, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0077] The terminology used in the present disclosure is for the purpose of describing particular embodiments only, and is not intended to limit the present disclosure. As used in this disclosure and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data encryption method and device, and a terminal. The method can comprise the following steps: when a decryption operation of enabling a terminal decryption function is detected, obtaining an unlocking password used by the decryption operation; generating a first key based on the unlocking password; and when the first key is consistent with a pre-stored second key, decrypting encrypted data stored on the terminal based on the first key, wherein the second key is generated based on a lock screen password set by a legal user. By application of the data encryption method and device provided by the embodiment of the invention, the encrypted data on the terminal are decrypted without losing any data, therefore the data security of the terminal is improved, convenience is provided for the user and the user experience is optimized.

Description

technical field [0001] The present disclosure relates to the technical field of terminal data security, and in particular, to a data decryption method, device and terminal. Background technique [0002] In related technologies, devices using the Android system, such as terminals, all support the function of encrypting data in the data partition, but do not provide a method for decrypting the data in the data partition. Once the user encrypts a terminal such as a mobile phone, if he no longer wants to use the encryption function, or forgets the encryption password, he can only reset the mobile phone and reformat the data partition of the mobile phone to delete the password and enter the system. The conversion process will lead to loss of data in the terminal, causing certain losses to the user, and the user experience is not good. Contents of the invention [0003] The present disclosure provides a data decryption method, device and terminal to overcome the defect in the r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3226H04L9/0861
Inventor 李明浩
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products