Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Object processing method and terminal device

A processing method and terminal equipment technology, applied in the field of communication, can solve problems such as password leakage

Active Publication Date: 2018-11-06
VIVO MOBILE COMM CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide an object processing method and a terminal device to solve the problem that encryption or decryption methods in the prior art easily cause password leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Object processing method and terminal device
  • Object processing method and terminal device
  • Object processing method and terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0032] The terms "first", "second", "third" and "fourth" in the specification and claims of the present invention are used to distinguish different objects, rather than to describe a specific order of objects. For example, the first touch input, the second touch input, the third input, and the fourth input are used to distinguish different inputs, rather than describing a specific sequence of inputs.

[0033] In the embodiments of the present invention...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an object processing method and a terminal device, and relates to the technical field of communications, for solving the problem that the encryption or decryption method in the prior art easily causes password leakage. The method comprises the following steps: receiving a first touch input of a user on an encrypted target object; displaying the decrypted target object in response to the first touch input, wherein N fingerprint partitions and a first fingerprint input sequence input via the first touch input are used for decrypting the encrypted targetobject, and N is an integer greater than one. The scheme is specifically applied to a scene in which the target object is encrypted and decrypted.

Description

technical field [0001] The embodiments of the present invention relate to the field of communication technologies, and in particular, to an object processing method and a terminal device. Background technique [0002] With the continuous development of terminal technology, the application of terminal equipment is becoming more and more extensive. Users can install some applications with financial functions on the terminal device, such as mobile payment, electronic wallet, etc.; users can also store some important information or personal privacy on the terminal device. [0003] At present, under normal circumstances, users will encrypt or decrypt the data in the terminal device by using methods such as digital passwords, but this encryption or decryption method is easy to be guessed or stolen by others, so this encryption or decryption This method is easy to cause password leakage. Contents of the invention [0004] Embodiments of the present invention provide an object p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/62
CPCG06F21/32G06F21/6245
Inventor 谢锦洋
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products