Object encryption method and device

An encryption method and object technology, applied in the computer field, can solve the problems of inconvenient operation, poor user experience, complicated encryption process, etc., and achieve the effect of improving user experience and convenience.

Active Publication Date: 2020-10-13
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For some objects (such as applications or some content in applications), users may want to encrypt objects individually, but there are many types of objects and various encryption methods, which make the encryption process for users more complicated and inconvenient to operate, resulting in poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Object encryption method and device
  • Object encryption method and device
  • Object encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] Here, exemplary embodiments will be described in detail, and examples thereof are shown in the accompanying drawings. When the following description refers to the drawings, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements. The implementation manners described in the following exemplary embodiments do not represent all implementation manners consistent with the present disclosure. Rather, they are merely examples of devices and methods consistent with some aspects of the present disclosure as detailed in the appended claims.

[0077] figure 1 Is a flowchart of an object encryption method according to an exemplary embodiment, such as figure 1 As shown, the object encryption method according to this exemplary embodiment is used in a terminal (such as a smart phone) and includes the following steps.

[0078] In step S11, it is determined whether the object meets the encryption condition according to the user's usage mode o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure relates to an object encryption method and device. The method includes: judging whether the object satisfies the encryption condition according to the usage mode of the user for the object; when the object satisfies the encryption condition, displaying an encryption confirmation control; when the encryption confirmation control is triggered, The object is encrypted. The embodiment of the present disclosure judges whether the encryption condition is satisfied by analyzing the user's use mode for the object, and encrypts the object when the encryption condition is met and the encryption confirmation control is triggered, so as to realize automatic encryption for the object and improve the convenience of the user performance, improving the user experience.

Description

Technical field [0001] The present disclosure relates to the field of computer technology, in particular to an object encryption method and device. Background technique [0002] With the development and popularization of terminal equipment, when using terminal equipment, users usually want to protect some of their privacy on the terminal equipment. For some objects (such as applications or part of the content in an application), users may want to encrypt the objects individually. However, there are many types of objects and various encryption methods, which make the user's encryption process more complicated and inconvenient to operate. The user experience has deteriorated. Summary of the invention [0003] In order to overcome the problems in the related art, the present disclosure provides an object encryption method and device. [0004] According to a first aspect of the embodiments of the present disclosure, there is provided an object encryption method, including: [0005] Jud...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/725H04M1/72463
CPCH04M1/72463
Inventor 孙伟
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products