CN102867149A - Terminal and information protection method - Google Patents

Terminal and information protection method Download PDF

Info

Publication number
CN102867149A
CN102867149A CN2012102725919A CN201210272591A CN102867149A CN 102867149 A CN102867149 A CN 102867149A CN 2012102725919 A CN2012102725919 A CN 2012102725919A CN 201210272591 A CN201210272591 A CN 201210272591A CN 102867149 A CN102867149 A CN 102867149A
Authority
CN
China
Prior art keywords
information
control area
terminal
content
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012102725919A
Other languages
Chinese (zh)
Inventor
郭德英
于慧娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd, Dongguan Yulong Telecommunication Technology Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN2012102725919A priority Critical patent/CN102867149A/en
Publication of CN102867149A publication Critical patent/CN102867149A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a terminal, which comprises a zone setting module, a decryption processing module and an information display module, wherein the zone setting module sets a control zone on an interface of the terminal; the decryption processing module decrypts information in the control zone when encrypted information is displayed on the interface; and the information display module displays the decrypted information in the control zone. The invention also discloses an information protection method. By using the technical scheme, contents in the interface can be locally encrypted and browsed, so that the privacy and security of the contents are improved.

Description

Terminal and information protecting method
Technical field
The present invention relates to the information protection field, particularly, design a kind of terminal and a kind of information protecting method.
Background technology
At present, in user's the portable terminal, often stored the relatively information of secret such as diary, photo, in case lose, consequence is hardly imaginable.
For the cipher mode of terminal internal information, more single at present, the content in the information interface only can be encrypted by using the modes such as encoding entries, and the content at whole interface can directly be seen after the deciphering.Because all contents all can show in the entrance deciphering rear interface, and the secret content can't enciphering hiding, and the risk of leakage is arranged.
Therefore, need a kind of new information protection scheme, can the user under the scene of presenting information on the terminal, information be protected, prevent that its content from being checked easily by beyond the user other people, improve privacy and the security of content.
Summary of the invention
Technical matters to be solved by this invention is, a kind of technical scheme is provided, and can the user under the scene of presenting information on the terminal information be protected, and prevents that its content from being checked easily by beyond the user other people, improves privacy and the security of content.
In view of this, the present invention proposes a kind of terminal, comprising: the region division module arranges the control area at the interface of described terminal; The decryption processing module when representing the information of having encrypted at described interface, is decrypted processing to the information that is positioned at described control area; Information represents module, and the information after the deciphering is presented in the described control area.
In this technical scheme, by the information in the control area is decrypted processing, can carry out local deciphering and browse the content in the interface, so that the content in the interface can because the entrance deciphering all shows, not improve privacy and the security of content.
In technique scheme, preferably, also comprise: the area attribute adjusting module, according to user's operation, adjust the attribute of described control area, wherein, described attribute comprises size, shape and/or the position of described control area.
In this technical scheme, the user can adjust size, shape and/or the position of the control area that shows encrypted content as required, has improved the operability of checking operation.
In technique scheme, preferably, also comprise: the ciphertext sending module, information and corresponding manner of decryption with encrypting are sent to the take over party.
In this technical scheme, ciphertext can be sent to the take over party together with manner of decryption, guarantee that take over party's terminal can be utilized the control area equally by manner of decryption, realized the part deciphering of enciphered message.
In technique scheme, preferably, also comprise: the deciphering notification module when sending the information of encrypting in described terminal, is sent to the take over party simultaneously with the manner of decryption relative with cipher mode.
In this technical scheme, can with.
In above-mentioned arbitrary technical scheme, preferably, described information represents module and directly represents other information of having encrypted that are positioned in the described interface beyond the described control area.
In this technical scheme, the information that is in the control area shows through after deciphering, and is in the information outside the control area, is shown as the effect of encrypted state.
According to another aspect of the invention, also proposed a kind of information protecting method, having comprised: step 202 arranges the control area at the interface of terminal; Step 204 when representing the information of having encrypted at described interface, is decrypted processing to the information that is positioned at described control area; Step 206 is presented in the information after the deciphering in the described control area.
In this technical scheme, by the information in the control area is decrypted processing, can carry out local deciphering and browse the content in the interface, so that the content in the interface can because the entrance deciphering all shows, not improve privacy and the security of content.
In technique scheme, preferably, according to user's operation, adjust the attribute of described control area, wherein, described attribute comprises size, shape and/or the position of described control area.
In this technical scheme, the user can adjust size, shape and/or the position of the control area that shows encrypted content as required, has improved the operability of checking operation.
In technique scheme, preferably, before described step 204, also comprise: the information in the described terminal is encrypted processing, and wherein, cipher mode comprises the information content misplaced to be processed and/or different colours is set for the information content.
In this technical scheme, by the information content is encrypted processing, guarantee that the user when the privacy informations such as log or collection photo, realizes the safety management to information, and during deciphering as long as according to the cipher mode contrary operation.
In technique scheme, preferably, also comprise: information and corresponding manner of decryption with encrypting are sent to the take over party.
In this technical scheme, ciphertext can be sent to the take over party together with manner of decryption, guarantee that take over party's terminal can be utilized the control area equally by manner of decryption, realized the part deciphering of enciphered message.
In above-mentioned arbitrary technical scheme, preferably, described step 206 also comprises: directly represent other information of having encrypted that are positioned in the described interface beyond the described control area.
In this technical scheme, the information that is in the control area shows through after deciphering, and is in the information outside the control area, is shown as the effect of encrypted state.
Pass through technique scheme; can realize a kind of terminal and a kind of information protecting method, can the user under the scene of presenting information on the terminal, information be protected; prevent that its content from being checked easily by beyond the user other people, improve privacy and the security of content.
Description of drawings
Fig. 1 shows the according to an embodiment of the invention block diagram of terminal;
Fig. 2 shows the according to an embodiment of the invention process flow diagram of information protecting method;
Fig. 3 shows the according to an embodiment of the invention particular flow sheet of information protecting method;
Fig. 4 A to Fig. 4 D shows the synoptic diagram of according to an embodiment of the invention encryption and decryption method.
Embodiment
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments the present invention is further described in detail.Need to prove that in the situation of not conflicting, the application's embodiment and the feature among the embodiment can make up mutually.
A lot of details have been set forth in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not subjected to the restriction of following public specific embodiment.
Fig. 1 shows the according to an embodiment of the invention block diagram of terminal.
As shown in Figure 1, terminal 100 comprises: region division module 102 arranges the control area at the interface of terminal 100; Decryption processing module 104 when representing the information of having encrypted at the interface, is decrypted processing to the information that is positioned at the control area; Information represents module 106, and the information after the deciphering is presented in the control area.
In this technical scheme, by the information in the control area is decrypted processing, can carry out local deciphering and browse the content in the interface, so that the content in the interface can because the entrance deciphering all shows, not improve privacy and the security of content.
In technique scheme, also comprise: area attribute adjusting module 108, according to user's operation, adjust the attribute of control area, wherein, attribute comprises size, shape and/or the position of control area.
In this technical scheme, the user can adjust size, shape and/or the position of the control area that shows encrypted content as required, has improved the operability of checking operation.
In technique scheme, also comprise: encryption processing module 110, the information in the terminal 100 is encrypted processing, wherein, cipher mode comprises the information content misplaced to be processed and/or different colours is set for the information content.
In this technical scheme, by the information content is encrypted processing, guarantee that the user when the privacy informations such as log or collection photo, realizes the safety management to information, and during deciphering as long as according to the cipher mode contrary operation.
In technique scheme, also comprise: ciphertext sending module 112, information and corresponding manner of decryption with encrypting are sent to the take over party.
In this technical scheme, ciphertext can be sent to the take over party together with manner of decryption, guarantee that take over party's terminal can be utilized the control area equally by manner of decryption, realized the part deciphering of enciphered message.
In above-mentioned arbitrary technical scheme, information represents module 106 and directly represents other information of having encrypted that are positioned in the interface beyond the control area.
In this technical scheme, the information that is in the control area shows through after deciphering, and is in the information outside the control area, is shown as the effect of encrypted state.
Fig. 2 shows the according to an embodiment of the invention process flow diagram of information protecting method.
As shown in Figure 2, information protecting method comprises: step 202 arranges the control area at the interface of terminal; Step 204 when representing the information of having encrypted at the interface, is decrypted processing to the information that is positioned at the control area; Step 206 is presented in the information after the deciphering in the control area.
In this technical scheme, by the information in the control area is decrypted processing, can carry out local deciphering and browse the content in the interface, so that the content in the interface can because the entrance deciphering all shows, not improve privacy and the security of content.
In technique scheme, according to user's operation, adjust the attribute of control area, wherein, attribute comprises size, shape and/or the position of control area.
In this technical scheme, the user can adjust size, shape and/or the position of the control area that shows encrypted content as required, has improved the operability of checking operation.
In technique scheme, before step 204, also comprise: the information in the terminal is encrypted processing, and wherein, cipher mode comprises the information content misplaced to be processed and/or different colours is set for the information content.
In this technical scheme, by the information content is encrypted processing, guarantee that the user when the privacy informations such as log or collection photo, realizes the safety management to information, and during deciphering as long as according to the cipher mode contrary operation.
In technique scheme, also comprise: information and corresponding manner of decryption with encrypting are sent to the take over party.
In this technical scheme, ciphertext can be sent to the take over party together with manner of decryption, guarantee that take over party's terminal can be utilized the control area equally by manner of decryption, realized the part deciphering of enciphered message.
In above-mentioned arbitrary technical scheme, step 206 also comprises: directly represent other information of having encrypted that are positioned in the interface beyond the control area.
In this technical scheme, the information that is in the control area shows through after deciphering, and is in the information outside the control area, is shown as the effect of encrypted state.
Fig. 3 shows the according to an embodiment of the invention particular flow sheet of information protecting method;
As shown in Figure 3, step 302, transmit leg is inputted the information content in sending side terminal;
Step 304, terminal is encrypted processing with the information content by underlying algorithm, and wherein, encryption can be dislocation encryption or colour-enciphered;
Step 306, the information content after then will encrypting transfers to receiving side terminal.
On the other hand, step 308, transmit leg transfers to the take over party by other channels with decryption method;
Step 310, the take over party receives this decryption method;
Step 312, reciever arranges the control area according to decryption method, checks the information content of encryption, and the content in the control area is the content of deciphering, and the content outside the control area still is the content of encryption to have guaranteed the security of content.
Fig. 4 A to Fig. 4 D shows the synoptic diagram of according to an embodiment of the invention encryption and decryption method.
Shown in Fig. 4 A, the content of the content in the interface for encrypting through dislocation is difficult to identify the content in representing in the interface.
Shown in Fig. 4 B, control area 402 is set, and the content in control area 402 will be decrypted processing, carries out all dislocation deciphering such as the content that dislocation is encrypted, can check the content in the control area 402, and the content beyond the control area 402 still is encrypted content.
After the deciphering, the content that is presented in the control area is " strategic meeting, meeting-place ".
Shown in Fig. 4 C, the content in the interface is the colour-enciphered content of process, and the content in the interface shows (only distinguish with shade among this figure, specifically can be set to dissimilar colors) with different colours.
The content of ciphertext directly is presented as, " one section text after the click, ejects the A menu at the interface, and it is collaborative to comprise the place, has gathered several functions ".
Shown in Fig. 4 D, control area 402 is set, the color of the segment word in the color of control area 402 and encrypted content is identical, during with the encrypted content Overlapping display, can carry out color filtering to homochromy font and process, finish deciphering after, can check the contents in the control area 402.
After the deciphering, the information content is presented as " a bit in the set of A place ".
The encryption and decryption mode can be to misplace or the processing of color, and the user also can arrange according to concrete needs the mode of other encryption and decryption.
The mode of encrypting, the mode that goes out with above-mentioned example is passable, can select existing multiple cipher mode, and above example does not limit cipher mode.
By the encryption and decryption of content in the interface are processed, to can the checking local deciphering part of the content in the interface, avoided causing the full content in the interface to show fully by an entrance deciphering, improved privacy and the security of content.
More than be described with reference to the accompanying drawings technical scheme of the present invention, considered in the correlation technique, through after the entrance deciphering, contents all in the interface all can show, and the secret content can't enciphering hiding, and the risk of leakage is arranged.Terminal and information protecting method that the present invention proposes can carry out local refinement and browse privacy and the security of raising content the content in the interface.
In the present invention, term " first ", " second " only are used for describing purpose, and can not be interpreted as indication or hint relative importance.Term " a plurality of " refers to two or more, unless clear and definite restriction is arranged in addition.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a terminal is characterized in that, comprising:
The region division module arranges the control area at the interface of terminal;
The decryption processing module when representing the information of having encrypted at described interface, is decrypted processing to the information that is positioned at described control area;
Information represents module, and the information after the deciphering is presented in the described control area.
2. terminal according to claim 1 is characterized in that, also comprises:
The area attribute adjusting module according to user's operation, is adjusted the attribute of described control area, and wherein, described attribute comprises size, shape and/or the position of described control area.
3. terminal according to claim 1 is characterized in that, also comprises:
Encryption processing module is encrypted processing to the information in the described terminal, and wherein, cipher mode comprises the information content misplaced to be processed and/or different colours is set for the information content.
4. terminal according to claim 3 is characterized in that, also comprises:
The ciphertext sending module, information and corresponding manner of decryption with encrypting are sent to the take over party.
5. each described terminal in 4 according to claim 1 is characterized in that, described information represents module and directly represents other information of having encrypted that are positioned in the described interface beyond the described control area.
6. an information protecting method is characterized in that, comprising:
Step 202 arranges the control area at the interface of terminal;
Step 204 when representing the information of having encrypted at described interface, is decrypted processing to the information that is positioned at described control area;
Step 206 is presented in the information after the deciphering in the described control area.
7. information protecting method according to claim 6 is characterized in that, according to user's operation, adjusts the attribute of described control area, and wherein, described attribute comprises size, shape and/or the position of described control area.
8. information protecting method according to claim 6 is characterized in that, before described step 204, also comprises:
Information in the described terminal is encrypted processing, and wherein, cipher mode comprises the information content misplaced to be processed and/or different colours is set for the information content.
9. information protecting method according to claim 8 is characterized in that, also comprises:
Information and corresponding manner of decryption with encrypting are sent to the take over party.
10. each described information protecting method in 9 according to claim 6 is characterized in that described step 206 also comprises:
Directly represent and be positioned at described control area other information of having encrypted in addition in the described interface.
CN2012102725919A 2012-08-01 2012-08-01 Terminal and information protection method Pending CN102867149A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012102725919A CN102867149A (en) 2012-08-01 2012-08-01 Terminal and information protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012102725919A CN102867149A (en) 2012-08-01 2012-08-01 Terminal and information protection method

Publications (1)

Publication Number Publication Date
CN102867149A true CN102867149A (en) 2013-01-09

Family

ID=47446016

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012102725919A Pending CN102867149A (en) 2012-08-01 2012-08-01 Terminal and information protection method

Country Status (1)

Country Link
CN (1) CN102867149A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108629171A (en) * 2018-04-27 2018-10-09 维沃移动通信有限公司 A kind of unread message processing method and terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741563A (en) * 2008-11-06 2010-06-16 三星电子株式会社 Method and apparatus for ciphering user data
CN101809568A (en) * 2008-07-24 2010-08-18 夏普株式会社 Electronic device, display control method, and program
WO2012015646A1 (en) * 2010-07-28 2012-02-02 Sprint Communications Company L.P. Covert message redaction and recovery in a wireless communication device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101809568A (en) * 2008-07-24 2010-08-18 夏普株式会社 Electronic device, display control method, and program
CN101741563A (en) * 2008-11-06 2010-06-16 三星电子株式会社 Method and apparatus for ciphering user data
WO2012015646A1 (en) * 2010-07-28 2012-02-02 Sprint Communications Company L.P. Covert message redaction and recovery in a wireless communication device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108629171A (en) * 2018-04-27 2018-10-09 维沃移动通信有限公司 A kind of unread message processing method and terminal
CN108629171B (en) * 2018-04-27 2020-09-11 维沃移动通信有限公司 Unread message processing method and terminal

Similar Documents

Publication Publication Date Title
US8457308B2 (en) Communication system and method for protecting messages between two mobile phones
US20170214665A1 (en) User interface systems and methods for secure message oriented communications
CN105809042A (en) Information protection method and device, information display method and device, and terminal
CN102375651A (en) Method for unlocking portable electronic equipment
CN103327002A (en) Cloud storage access control system based on attribute
CN103400082A (en) File encryption/decryption method and system
CN103559451A (en) Method and device for protecting and displaying privacy information
CN102831346B (en) A kind of file protecting system carries out the method for file encryption-decryption
CN104270517A (en) Information encryption method and mobile terminal
WO2011137868A3 (en) Method and device for instantly encrypting and decrypting messages
CN104573551A (en) File processing method and mobile terminal
CN102932349A (en) Data transmission method, device and system
CN105005731A (en) Data encryption and decryption methods and mobile terminal
CN103198261A (en) Method and system for protecting file content security
CN102891749A (en) Method and communication terminal for data encryption
CN104182676A (en) Intelligent terminal data encryption method and device
CN101895396A (en) Mobile terminal and encryption method thereof
CN104050398B (en) Multifunctional encryption lock and operating method thereof
CN104601820A (en) Mobile terminal information protection method based on TF password card
CN101296349A (en) Video file enciphering/deciphering system and method
CN102868826A (en) Terminal and terminal data protection method
CN105281897A (en) File encryption method and device and file decryption method and device
KR20140017035A (en) Audio security storage system and method for managing certification using the same
CN101754209A (en) Method for protecting contents of mobile phone
CN105391677A (en) Information transmission method and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130109