Object encryption method and device
An encryption method and object technology, applied in the computer field, can solve the problems of inconvenient operation, poor user experience, complicated encryption process, etc., and achieve the effect of improving user experience and convenience.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0076] Here, exemplary embodiments will be described in detail, and examples thereof are shown in the accompanying drawings. When the following description refers to the drawings, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements. The implementation manners described in the following exemplary embodiments do not represent all implementation manners consistent with the present disclosure. Rather, they are merely examples of devices and methods consistent with some aspects of the present disclosure as detailed in the appended claims.
[0077] figure 1 Is a flowchart of an object encryption method according to an exemplary embodiment, such as figure 1 As shown, the object encryption method according to this exemplary embodiment is used in a terminal (such as a smart phone) and includes the following steps.
[0078] In step S11, it is determined whether the object meets the encryption condition according to the user's usage mode o...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com