Unlock instant, AI-driven research and patent intelligence for your innovation.

An operation control method and terminal

An operation control and terminal technology, applied in the field of communication, can solve problems such as low security, achieve high security, reduce the probability of information leakage, and improve security.

Active Publication Date: 2021-05-25
VIVO MOBILE COMM CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide an operation control method and a terminal to solve the problem of low security of traditional methods for encrypting or decrypting files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An operation control method and terminal
  • An operation control method and terminal
  • An operation control method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0052] The term "and / or" in this article is an association relationship describing associated objects, which means that there can be three relationships, for example, A and / or B can mean: A exists alone, A and B exist simultaneously, and B exists alone These three situations. The symbol " / " in this document indicates that the associated object is an or relationship, for example, A / B indicates A or B.

[0053] The terms "first" and "second" in the spec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an operation control method and a terminal, which relate to the field of communication technology and solve the problem of low security of traditional methods for encrypting or decrypting files. The method is applied to the first terminal, and the method includes: receiving a first input from the user in a state where the first terminal and the second terminal are magnetically connected; in response to the first input, based on the N characters indicated by the target identifier, generating the first A key, where N is a positive integer; based on the first key, target control operations are performed. Wherein, the target identification is displayed on the display screen of the first terminal, and N characters are displayed on the display screen of the second terminal; or, the target identification is displayed on the display screen of the second terminal, and N characters are displayed on the display screen of the first terminal on the display. The method can be applied to a scenario of encrypting or decrypting a terminal and a file in the terminal.

Description

technical field [0001] Embodiments of the present invention relate to the field of communication technologies, and in particular, to an operation control method and a terminal. Background technique [0002] With the development of communication technology, the terminal may store some important files. [0003] Currently, in order to better protect user privacy, it is generally possible to lock the screen of the terminal or encrypt files stored in the terminal. Exemplarily, if the user wants to encrypt a certain file in the terminal, the user can first select the file, and then set a key, so that the terminal can encrypt the file according to the key. In this way, when the user wants to use the encrypted file, the user can input the key, so that the terminal can decrypt the file according to the key. [0004] However, under normal circumstances, the user sets the key to be relatively simple for the convenience of remembering the key, which may cause the key to be easily deci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6209G06F2221/2107
Inventor 崔青虎
Owner VIVO MOBILE COMM CO LTD