Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method and device

An encryption method and technology of an encryption device, applied in the field of communication, can solve the problems of poor flexibility, limited encryption and decryption methods, etc.

Active Publication Date: 2018-10-19
VIVO MOBILE COMM CO LTD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide an encryption method and device to solve the problems of relatively limited and poor flexibility in existing encryption and decryption methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and device
  • Encryption method and device
  • Encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0034] The term "and / or" in this article is an association relationship describing associated objects, which means that there can be three relationships, for example, A and / or B can mean: A exists alone, A and B exist simultaneously, and B exists alone These three situations. The symbol " / " in this document indicates that the associated object is an or relationship, for example, A / B indicates A or B.

[0035] The terms "first" and "second" in the spec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an encryption method and device, relates to the technical field of communication, and aims to solve the problem of limitation and poor flexibility of the existing encryption mode. The encryption method comprises the steps: receiving a first input of a user on a first interface; in response to the first input, displaying a target area corresponding to the first input and prompt information on the first interface, wherein the prompt information is used for reminding the user to select an encryption mode for encrypting a target object which is an object in the target area; receiving a second input of the user on the prompt information; and in response to the second input, encrypting the target object by adopting a first encryption mode selected by theuser. The encryption method can be applied to a scenario of encrypting the content of a terminal.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of communications, and in particular, to an encryption method and device. Background technique [0002] As the application range of terminals becomes wider and wider, users' demands on personal information security and privacy security are increasing day by day. [0003] Currently, content can be encrypted by setting "Privacy Space" in the terminal. Specifically, a "private space" can be set in the terminal, and a password can be set for the "private space", and when the user needs to encrypt a certain content, the user can trigger the terminal to move the content into the "private space", to Content encryption. When the user needs to use the content in the "Private Space", the user can first enter the password to trigger the terminal to open the "Private Space", and then use the content in the "Private Space". [0004] However, in the above encryption method, since the content t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F3/0481
CPCG06F3/04817G06F21/32
Inventor 彭思文
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products