Information encryption and decryption methods and devices as well as terminal
An information encryption and information decryption technology, applied in security devices, telephone communication, wireless communication, etc., can solve the problems of waste of encryption resources and complicated encryption process, and achieve the effect of reducing waste of resources and simplifying the encryption process.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking running on a mobile terminal as an example, figure 1 It is a hardware structural block diagram of a mobile terminal of an information encryption method in an embodiment of the present invention. like figure 1As shown, the mobile terminal 10 may include one or more (only one is shown in the figure) processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), for A memory 104 for storing data, and a transmission device 106 for communication functions. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above-mentioned electronic device. For example, the mobile terminal 10 may also include figure 1 more or...
Embodiment 2
[0066] In this embodiment, an information encryption and decryption device and a terminal are provided, and the device is used to implement the above embodiments and preferred implementation modes, and those that have already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0067] Figure 4 is a structural block diagram of an information encryption device according to an embodiment of the present invention, such as Figure 4 As shown, the device includes:
[0068] The first determining module 42 is configured to determine the object to be encrypted in the predetermined information, wherein the object to be encrypted is a part of the predetermined information;
...
Embodiment 3
[0148] The embodiment of the invention also provides a storage medium. Optionally, in this embodiment, the above-mentioned storage medium may be configured to store program codes for performing the following steps:
[0149] S1. Determine the object to be encrypted in the predetermined information, wherein the object to be encrypted is a part of the predetermined information;
[0150] S2, encrypting the object to be encrypted.
[0151] Optionally, the storage medium is also configured to store program codes for performing the following steps:
[0152] S1. The scheduled information includes at least one of the following: information to be sent and received information.
[0153] Optionally, the storage medium is further configured to store program codes for performing the following steps: determining that the object to be encrypted in the predetermined information includes at least one of the following:
[0154] S1. Determine the object to be encrypted in the predetermined inf...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com