Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information encryption and decryption methods and devices as well as terminal

An information encryption and information decryption technology, applied in security devices, telephone communication, wireless communication, etc., can solve the problems of waste of encryption resources and complicated encryption process, and achieve the effect of reducing waste of resources and simplifying the encryption process.

Pending Publication Date: 2017-12-22
ZTE CORP
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides an information encryption and decryption method, device, and terminal to at least solve the problems in the related art that when encrypting information, the full text of the information is encrypted, resulting in a complicated encryption process and a waste of encryption resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information encryption and decryption methods and devices as well as terminal
  • Information encryption and decryption methods and devices as well as terminal
  • Information encryption and decryption methods and devices as well as terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking running on a mobile terminal as an example, figure 1 It is a hardware structural block diagram of a mobile terminal of an information encryption method in an embodiment of the present invention. like figure 1As shown, the mobile terminal 10 may include one or more (only one is shown in the figure) processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), for A memory 104 for storing data, and a transmission device 106 for communication functions. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above-mentioned electronic device. For example, the mobile terminal 10 may also include figure 1 more or...

Embodiment 2

[0066] In this embodiment, an information encryption and decryption device and a terminal are provided, and the device is used to implement the above embodiments and preferred implementation modes, and those that have already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0067] Figure 4 is a structural block diagram of an information encryption device according to an embodiment of the present invention, such as Figure 4 As shown, the device includes:

[0068] The first determining module 42 is configured to determine the object to be encrypted in the predetermined information, wherein the object to be encrypted is a part of the predetermined information;

...

Embodiment 3

[0148] The embodiment of the invention also provides a storage medium. Optionally, in this embodiment, the above-mentioned storage medium may be configured to store program codes for performing the following steps:

[0149] S1. Determine the object to be encrypted in the predetermined information, wherein the object to be encrypted is a part of the predetermined information;

[0150] S2, encrypting the object to be encrypted.

[0151] Optionally, the storage medium is also configured to store program codes for performing the following steps:

[0152] S1. The scheduled information includes at least one of the following: information to be sent and received information.

[0153] Optionally, the storage medium is further configured to store program codes for performing the following steps: determining that the object to be encrypted in the predetermined information includes at least one of the following:

[0154] S1. Determine the object to be encrypted in the predetermined inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides information encryption and decryption methods and devices as well as a terminal. The information encryption method comprises the following steps of determining a to-be-encrypted object in reservation information, wherein the to-be-encrypted object is a part of the reservation information; and encrypting the to-be-encrypted object. According to the information encryption and decryption methods and devices as well as the terminal, the problems of complicated encryption process and encryption resource waste which are caused by encrypting the information full text when the information is encrypted in the correlation technique are solved, and the effects of simplifying the encryption process and reducing the resource waste are realized.

Description

technical field [0001] The present invention relates to the communication field, in particular, to an information encryption and decryption method, device and terminal. Background technique [0002] With the explosive growth of the Internet and mobile smart terminals, various social applications are developing rapidly, such as instant messaging systems such as WeChat, which are highly popularized by the public and bring great convenience to the public's life and work communication. It is easy to be lost and peeped by others, which brings big problems to the security of information. [0003] In order to solve the problem of information display security, currently existing technical solutions mainly fall into the following three categories: one is to send information by means of burning after reading, and the receiving end destroys the information after receiving and reading it; The information is sent in the form of full-text encryption. The encrypted information cannot be r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04M1/725
CPCH04L63/0428H04M1/725H04W12/033
Inventor 陈辉锋陈永禄雷杨王勿英
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products