Unlock instant, AI-driven research and patent intelligence for your innovation.

Applied encryption method, device, electronic device and storage medium

A technology that uses passwords and target applications. It is applied in the terminal field, which can solve problems such as cumbersome operations and leakage of private information, and achieve the effect of improving convenience and reducing the risk of being leaked

Active Publication Date: 2022-03-11
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, when encrypting an application, you need to open the application first, and select the encryption option in the application setting option to encrypt. Not only is the operation cumbersome, but there is also a risk of private information being leaked during the application encryption process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Applied encryption method, device, electronic device and storage medium
  • Applied encryption method, device, electronic device and storage medium
  • Applied encryption method, device, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to enable those skilled in the art to better understand the solution of the present invention, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0027] The terms "first", "second" and the like in the description and claims of the present invention and the above drawings are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application discloses an application encryption method, device, electronic equipment, and storage medium. The method is applied to electronic equipment including a touch screen and an under-screen fingerprint sensor. The touch screen includes a fingerprint collection area and an under-screen fingerprint sensor. The sensor is located below the fingerprint collection area, and the method includes: detecting a first fingerprint sliding operation in the fingerprint collection area, and collecting fingerprint data generated during the first fingerprint sliding operation through an under-screen fingerprint sensor; acquiring the fingerprint corresponding to the first fingerprint sliding operation. The first swipe track, determine the target application corresponding to the first swipe track; if the fingerprint quality of the fingerprint data generated during the first fingerprint swipe operation meets the encryption requirements, generate a fingerprint template according to the fingerprint data generated during the first fingerprint swipe operation , use the fingerprint template to encrypt the target application. During the process of encrypting the target application, the risk of leakage of private information in the target application can be reduced.

Description

technical field [0001] The present application relates to the technical field of terminals, in particular to an application encryption method, device, electronic equipment and storage medium. Background technique [0002] With the popularization and application of a large number of electronic devices (such as mobile phones, tablet computers, etc.), the electronic devices can support more and more applications, and the functions are more and more powerful, and people are increasingly dependent on various applications in the electronic devices. Some applications involve private information such as user privacy and user property. In order to avoid leakage of private information such as privacy and property, some applications can be encrypted. At present, when encrypting an application, it is necessary to open the application first and select the encryption option in the application setting option to encrypt. Not only is the operation cumbersome, but also there is a risk of priv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/32
CPCG06F21/32G06F21/602G06F21/6245
Inventor 袁石林陈汝轩
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD