CN106384060B - A kind of mobile terminal data encryption method and mobile terminal - Google Patents

A kind of mobile terminal data encryption method and mobile terminal Download PDF

Info

Publication number
CN106384060B
CN106384060B CN201610848901.5A CN201610848901A CN106384060B CN 106384060 B CN106384060 B CN 106384060B CN 201610848901 A CN201610848901 A CN 201610848901A CN 106384060 B CN106384060 B CN 106384060B
Authority
CN
China
Prior art keywords
mobile terminal
encryption
target data
data
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610848901.5A
Other languages
Chinese (zh)
Other versions
CN106384060A (en
Inventor
郑传亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610848901.5A priority Critical patent/CN106384060B/en
Publication of CN106384060A publication Critical patent/CN106384060A/en
Application granted granted Critical
Publication of CN106384060B publication Critical patent/CN106384060B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of mobile terminal data encryption method and mobile terminal, method includes: to determine target data to be encrypted according to the predetermined registration operation to mobile terminal data;According to target data, one encryption drawing area of display;According to the encryption information that mobile terminal user inputs in encryption drawing area, cryptographic operation is executed to target data.The present invention is when the operation for mobile terminal data input operational motion and predetermined encryption flow setting matches, determine the target data of pending cryptographic operation, and show an encryption drawing area, so that user inputs encryption information in the region, realize the encryption to target data, setting menu is encrypted without entering, it is easy to operate, operating procedure is few, substantially increase the treatment effeciency of encryption flow.

Description

A kind of mobile terminal data encryption method and mobile terminal
Technical field
The present invention relates to field of communication technology more particularly to a kind of mobile terminal data encryption method and mobile terminals.
Background technique
As the rapid development mobile terminal of mobile Internet is more more and more universal, will be installed on intelligent terminal (such as mobile phone) There are multiple application programs, in order to guarantee the privacy and safety of user, mobile phone can be encrypted.But current cryptographic operation It needs to enter pre-set encrypted interface just and can be carried out encryption, such as need to encrypt QQ, user is needed to open After QQ, encryption setting menu is found from the function menu of QQ, could carry out cryptographic operation to QQ into encryption setting menu, or Person opens system setup menu, finds the application program that encryption setting menu could encrypt needs item by item from setting menu Or file is encrypted, encryption flow is complicated, encipheror it is cumbersome, time-consuming.
Summary of the invention
The embodiment of the invention provides a kind of mobile terminal data encryption method and mobile terminals, to solve in the prior art To the problem that encryption flow is complicated, cumbersome, time-consuming.
In a first aspect, the embodiment of the invention provides a kind of mobile terminal data encryption methods, comprising:
According to the predetermined registration operation to mobile terminal data, target data to be encrypted is determined;
According to target data, one encryption drawing area of display;
According to the encryption information that mobile terminal user inputs in encryption drawing area, encryption behaviour is executed to target data Make.
Second aspect, the embodiment of the invention also provides a kind of mobile terminals, comprising:
Determining module, for determining target data to be encrypted according to the predetermined registration operation to mobile terminal data;
Display module, the target data for being determined according to determining module, one encryption drawing area of display;
Encrypting module, the encryption for being inputted in the encryption drawing area that display module is shown according to mobile terminal user Information executes cryptographic operation mobile terminal to target data.
In this way, in the embodiment of the present invention, for mobile terminal data input operational motion and predetermined encryption flow setting Operation determine the target data of pending cryptographic operation when matching, and an encryption drawing area is shown, so that user is at this Region inputs encryption information, realizes the encryption to target data, encrypts setting menu without entering, easy to operate, behaviour Make that step is few, substantially increases the treatment effeciency of encryption flow.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 shows the flow charts of the first embodiment of mobile terminal data encryption method of the invention;
Fig. 2 indicates the flow chart of the second embodiment of mobile terminal data encryption method of the invention;
Fig. 3 indicates the flow chart of the 3rd embodiment of mobile terminal data encryption method of the invention;
Fig. 4 A indicates the flow chart of the fourth embodiment of mobile terminal data encryption method of the invention;
Fig. 4 B is indicated in the encryption or decryption process of the fourth embodiment of mobile terminal data encryption method of the invention Interface schematic diagram;
Fig. 5 indicates one of the structural schematic diagram of the 5th embodiment of mobile terminal of the invention;
Fig. 6 indicates the second structural representation of the 5th embodiment of mobile terminal of the invention;
Fig. 7 indicates the block diagram of the sixth embodiment of mobile terminal of the present invention;
Fig. 8 shows the block diagrams of the 7th embodiment of mobile terminal of the present invention.
Specific embodiment
The exemplary embodiment that the present invention will be described in more detail below with reference to accompanying drawings.Although showing the present invention in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the present invention without should be by embodiments set forth here It is limited.It is to be able to thoroughly understand the present invention on the contrary, providing these embodiments, and can be by the scope of the present invention It is fully disclosed to those skilled in the art.
First embodiment
As shown in Figure 1, the embodiment provides a kind of mobile terminal data encryption method, this method is specifically wrapped It includes:
Step 101: according to the predetermined registration operation to mobile terminal data, determining target data to be encrypted.
Wherein, mobile terminal data mentioned here includes application program, file and/or file etc., and target data is extremely It less include application program and/or file to be encrypted.By taking application program as an example, generally, application program is generally on the table all There can be an icon, as the entrance of application program, user can realize different demands by handle icon, such as: Click the application of icon opening, dragging icon unloads etc. to file, long-pressing icon.Wherein, at least one application program Application icon is set in the file.Further, user can also be realized by operation file clip icon to file Different operational requirements are pressed from both sides, such as: click folder icon enters file, dragging folder icon changes file and showing The display position at interface, long-pressing folder icon enter unloading mode etc..
And operation in the display interface can be the gesture obtained by camera, the gesture obtained by ultrasonic wave, The triggering command obtained by infrared sensor, the pressure value obtained by pressure sensor are obtained by Fingerprint Identification Unit Fingerprint, or iris, the white of the eye texture etc. that are obtained by camera.
Further, different operational motions corresponds to the different movements that executes, such as: the touching of encryption flow can be preset Hair operational motion (such as every empty-handed gesture, shake), when the gesture obtained by camera, by the gesture of ultrasonic wave acquisition, The triggering command obtained by infrared sensor, the pressure value obtained by pressure sensor are obtained by Fingerprint Identification Unit When fingerprint, or the iris, the white of the eye texture that obtain by camera etc. match with the movement of default trigger action, that is, it can trigger encryption Process then searches corresponding encryption function option without the setting menu into system in this way and selects corresponding mobile terminal number According to, corresponding encryption function option also is searched without entering the corresponding setting menu of mobile terminal data, reduces operating procedure, It is easy to operate, improve treatment effeciency.
Step 102: according to the target data, one encryption drawing area of display.
After determining target data, into state to be encrypted, an encryption drawing area at this moment is shown in current interface, generally Ground, the encryption drawing area include at least: Password Input region or gesture drawing area or pattern drawing area or fingerprint are defeated Enter region etc..
Step 103: the encryption information inputted in encryption drawing area according to mobile terminal user executes target data Cryptographic operation.
User can input encryption information in encryption drawing area, and target data to be encrypted, protection user is hidden Private improves safety.
The mobile terminal data encryption method of the embodiment of the present invention, for mobile terminal data input operational motion and in advance If the operation of encryption flow setting matches, the target data of pending cryptographic operation is determined, and show that area is drawn in an encryption The encryption to target data is realized so that user inputs encryption information in the region in domain, encrypts setting dish without entering It is single, it is easy to operate, operating procedure is few, substantially increase the treatment effeciency of encryption flow.
Second embodiment
First embodiment above has carried out simple introduction to mobile terminal data encryption method of the invention, below this implementation Example will be described further it in conjunction with attached drawing and concrete application scene.
As shown in Fig. 2, the mobile terminal data encryption method of the embodiment of the present invention the following steps are included:
Step 201: receiving the first operation to the first movement terminal data in mobile terminal.
Mobile terminal data mentioned here includes application program, file and file etc., and display interface is generally referred to as The main interface of mobile terminal, there are multiple files and/or application icons in main interface.When user needs to first movement terminal When data (such as some application program or file) carry out cryptographic operation, encryption stream can be triggered by carrying out corresponding operation to it Journey.
Step 202: when the first operation matches with the first predetermined registration operation, first movement terminal data being determined as to be added Close target data.
When the first predetermined registration operation of the first operation of user's input and triggering encryption flow matches, by corresponding first Mobile terminal data is determined as the target data of pending cryptographic operation.For example, user needs to encrypt QQ application, then may be used Default trigger action is carried out to QQ application, then can directly trigger the encryption flow of QQ application, be arranged under catalogue without entering The corresponding encryption function menu of cryptographic operation is searched, it is easy to operate, reduce operating procedure, improves treatment effeciency.
Step 203: according to determining target data, showing that one is used to input encryption information in the display interface of mobile terminal Encryption drawing area.
Wherein, a target data corresponds at least one encryption drawing area, i.e. a target data is corresponding at least one The encryption drawing area (such as gesture drawing area, numeral input region and/or fingerprint typing region) of type, alternatively, one Encryption drawing area correspond at least one target data, i.e., the corresponding encryption drawing area of multiple target datas (such as QQ applies, Wechat application, short message application etc. correspond to a gesture drawing area jointly).Here it means, different target datas can be single Solely carry out the input of encryption information, the i.e. corresponding encryption information of a mobile terminal data;Alternatively, different target datas can The common input for carrying out encryption information, i.e., multiple corresponding encryption information of mobile terminal data.Such as: it can be respectively to QQ and micro- Letter carries out cryptographic operation, can also be encrypted to QQ and wechat using same encryption information, ciphering process can also carry out jointly.
Step 204: the encryption information inputted in encryption drawing area according to mobile terminal user executes target data Cryptographic operation.
User can input encryption information in encryption drawing area, and target data to be encrypted, protection user is hidden Private improves safety.
Below by taking QQ is applied as an example, when mobile terminal user needs to encrypt QQ application, QQ application is added The default trigger action of close operation shows an encryption drawing area in current display interface to trigger the encryption flow of QQ application, The encryption drawing area can draw any, Yong Hu such as interface, numeral input interface or fingerprint input interface with display pattern After the encryption drawing area inputs encryption information and confirms, encryption flow is exited.
The mobile terminal data encryption method of the embodiment of the present invention, for mobile terminal data input operational motion and in advance If the operation of encryption flow setting matches, the target data of pending cryptographic operation is determined, and show that area is drawn in an encryption The encryption to target data is realized so that user inputs encryption information in the region in domain, encrypts setting dish without entering It is single, it is easy to operate, operating procedure is few, substantially increase the treatment effeciency of encryption flow.
3rd embodiment
The present embodiment will be described further it in conjunction with attached drawing and concrete application scene below.As shown in figure 3, this The mobile terminal data encryption methods of inventive embodiments the following steps are included:
Step 301: receiving the second operation to mobile terminal.
Wherein, it refers here to obtain the second operation that mobile terminal user inputs mobile terminal, it is especially mobile whole The second operation that end subscriber inputs display interface, wherein display interface is generally referred to as the main interface of mobile terminal, main interface On there are multiple files and/or application icons.
Step 302: when the second operation matches with second predetermined registration operation, showing a number in the display interface of mobile terminal According to list.
It wherein, include at least one mobile terminal data in the data list, it is preferable that the data list includes supporting to add All mobile terminal datas of close operation, to improve the safety of mobile terminal data.Mobile terminal data packet mentioned here Include application program, file and file etc..It here is said when the second operation occurred on the display interface got adds with triggering When the predetermined registration operation of close process matches, a data list is shown in display interface, for selection by the user eventually to which movement End data carries out cryptographic operation.Setting menu without entering system searches corresponding encryption function option and selects corresponding shifting Dynamic terminal data is also searched corresponding encryption function option without entering the corresponding setting menu of mobile terminal data, is reduced Operating procedure, it is easy to operate, improve treatment effeciency.
Step 303: receiving the selection operation to data list.
After showing data list, mobile terminal user can select the mobile terminal to be encrypted according to the data list Data, mobile terminal can be the selection operation of data list and choose to mobile terminal data to be encrypted.
Step 304: at least one corresponding mobile terminal data of selection operation is determined as target data to be encrypted.
For example, inputting encryption in some key or display interface of mobile terminal when user needs to carry out cryptographic operation Corresponding default trigger action is operated, to trigger encryption flow and show a data list in display interface, in the data list In include multiple mobile terminal datas wait for user select, if user need to QQ application encryption if can choose QQ application, with triggering The encryption flow of QQ application.It is worth noting that the mobile terminal data selected is either one or more.
Step 305: according to determining target data, showing that one is used to input encryption information in the display interface of mobile terminal Encryption drawing area.
Wherein, a target data corresponds at least one encryption drawing area, alternatively, an encryption drawing area is corresponding extremely A few target data.
Step 306: the encryption information inputted in encryption drawing area according to mobile terminal user executes target data Cryptographic operation.
User can input encryption information in encryption drawing area, and target data to be encrypted, protection user is hidden Private improves safety.Such as after the encryption flow for triggering certain mobile terminal data, show that an encryption is drawn in current display interface Region processed, the encryption drawing area can be any with display pattern drafting interface, numeral input interface or fingerprint input interface etc., User exits encryption flow after the encryption drawing area inputs encryption information and confirms.
The mobile terminal data encryption method of the embodiment of the present invention, for mobile terminal data input operational motion and in advance If the operation of encryption flow setting matches, the target data of pending cryptographic operation is determined, and show that area is drawn in an encryption The encryption to target data is realized so that user inputs encryption information in the region in domain, encrypts setting dish without entering It is single, it is easy to operate, operating procedure is few, substantially increase the treatment effeciency of encryption flow.
Fourth embodiment
As shown in Figure 4 A, the embodiment provides a kind of mobile terminal data encryption method, this method is specifically wrapped It includes:
Step 401: according to the predetermined registration operation to mobile terminal data, determining target data to be encrypted.
Wherein, mobile terminal data mentioned here includes application program, file and file etc., and target data is at least wrapped Include application program and/or file to be encrypted.Further, different operational motions corresponds to the different movements that executes, such as: it can The trigger action movement of encryption flow is preset, when the gesture obtained by camera, the gesture obtained by ultrasonic wave is led to The triggering command for crossing infrared sensor acquisition, the pressure value obtained by pressure sensor, the finger obtained by Fingerprint Identification Unit When line, or the iris, the white of the eye texture that obtain by camera etc. match with the movement of default trigger action, that is, it can trigger encryption stream Journey reduces operating procedure, easy to operate, improves treatment effeciency.
Step 402: according to the target data, one encryption drawing area of display.
After determining target data, into state to be encrypted, an encryption drawing area at this moment is shown in current interface, generally Ground, the encryption drawing area include at least: Password Input region or gesture drawing area or pattern drawing area or fingerprint are defeated Enter region etc..
Step 403: the encryption information inputted in encryption drawing area according to mobile terminal user executes target data Cryptographic operation.
Mobile terminal user can input encryption information in encryption drawing area, target data to be encrypted, protect Privacy of user is protected, safety is improved.In practical applications, the same mobile terminal data may be provided with a plurality of types of Encryption information, such as password encryption, pattern encryption and encrypting fingerprint etc. are carried out to QQ simultaneously.The present embodiment is by taking pattern encrypts as an example It is illustrated.
Specifically, the encryption information inputted in encryption drawing area according to mobile terminal user, executes target data The step of cryptographic operation includes: the encryption information for obtaining mobile terminal user and inputting in encryption drawing area;Based on input Encryption information determines target encrypted image and target rotational track;Based on target encrypted image and target rotational track, to target Data execute cryptographic operation.I.e. after display encrypts drawing area, obtain mobile terminal user's input is directed to the target data Encrypted patterns, which includes target encrypted image and target rotational track (i.e. the track draftings of encrypted patterns).Its In, which includes: to show target encrypted image in target data, and according to target rotational track to target data It is encrypted.
After having executed cryptographic operation to target data, this method further includes the solution secret letter for obtaining mobile terminal user's input Breath executes decryption oprerations to target data according to the solution confidential information.Specifically decrypting process can refer to following steps realization:
Step 404: receiving and the third of the target encrypted image in encrypted target data is operated.
Specifically, it is illustrated so that pattern is decrypted as an example, since pattern cryptographic operation includes: to show target encrypted image Target data is encrypted in target data, and according to target rotational track, then corresponding pattern decryption oprerations include The matching of target encrypted image and the matching of target rotational track, only target encrypted patterns and target rotational track match Target data is decrypted in Shi Caineng, enhances the safety of target data.
It further, can also be before decryption oprerations to mobile terminal in order to further increase the safety of target data User carries out identification, such as carries out recognition of face by camera, or carry out fingerprint recognition by fingerprint recognition key, or Other personal identification methods.Reception is being executed in encrypted target data after the identification of mobile terminal user passes through Target encrypted image third operation the step of, with enter decrypt process, such as after identification passes through display interface show Show a decryption prompt information.Step 405: when third operation matches with target rotational track, decryption being executed to target data Operation.
When the pattern target encrypted image corresponding with target data of mobile terminal user's input target that is identical, and drawing Rotary motion trace is also identical, then executes decryption oprerations to target data.Such as: it include several in display interface 4 as shown in Figure 4 B A mobile terminal data, wherein the upper left corner of mobile terminal data 42 shows a target encrypted image 41, target encryption figure The pattern for the lock shape surrounded as 41 for a circle, but not limited to this.If the encryption information of mobile terminal data is set as Target encrypted image 41 is rotated clockwise into three circles according to target rotational track (annular trace as shown in dashed lines in fig. 4b), then When operation is decrypted to the mobile terminal data, user is needed to pin the mobile terminal data in Fig. 4 B in display interface 4 The target encrypted image 41 shown on 42, and rotated along target rotational track, if user drags the rotation of lock angle target Direction is different from turnning circle when rotation different or turnning circle of sequence and encryption when encryption, then decrypts and fail.Namely It says, target encrypted image and target rotational track could successful decryptions when matching;When the direction of target rotational track mismatches Decryption failure;The initial position of target rotational track is also decrypted when mismatching to fail;The turnning circle of target rotational track is not Timing decryption failure;The mode that information matches multiple in this way could decrypt improves the safety of target data, protects user Privacy.
Further, in practical applications, a plurality of types of encryptions may be provided with for the same mobile terminal data Information, such as password encryption, pattern encryption and encrypting fingerprint etc. are carried out to QQ simultaneously.Therefore, the present embodiment additionally provides a variety of Quick switching mode between different cipher modes.It specifically can refer to following steps realization.
Step 406: receiving the 4th operation to target data.
When there are many when encryption type, correspond to there are many type is decrypted, to movement end for the setting of certain mobile terminal data End data switches over the predetermined registration operation of decryption type, to trigger the process of switching manner of decryption.
Step 407: according to manner of decryption corresponding to the 4th operation switching target data.
Such as: the encryption type of QQ application includes numerical ciphers and two kinds of pattern password, when user forget numerical ciphers or When pattern password, it is desirable to when switching to that the decryption type that do not forget, the 4th operation is carried out to QQ and decrypts type to switch it, It is carried out under function menu without entering specified change password, simplifies operating process, improve the operating experience of user.
Specifically, switch manner of decryption implementation include, but is not limited to it is following several:
Mode one: when the 4th operation matches with third predetermined registration operation, the first manner of decryption of target data is obtained;It will First manner of decryption switches to the second corresponding manner of decryption of the 4th operation.It is different to mean that different operations is corresponding with Manner of decryption, such as upper sliding operation corresponding pattern enciphering/deciphering mode, the corresponding gesture enciphering/deciphering mode of operation of gliding, left sliding operation Corresponding number enciphering/deciphering mode, it is right it is sliding operate corresponding fingerprint enciphering/deciphering mode etc., wherein operating gesture and enciphering/deciphering mode it Between corresponding relationship can customize setting.When mobile terminal user needs the enciphering/deciphering mode of certain target data switching to figure When case enciphering/deciphering mode, carrying out upper sliding operation to the target data can be realized switching.
Mode two: when the 4th operation matches with third predetermined registration operation, the current manner of decryption of target data is switched To another kind.It means, third predetermined registration operation is the operating gesture of preset switching manner of decryption, when detecting movement When terminal user matches to the 4th operation of target data with third predetermined registration operation, switch the manner of decryption of the target data, Such as the current manner of decryption of the target data is gesture manner of decryption, when mobile terminal user executes third predetermined registration operation, The manner of decryption of the target data switches to another manner of decryption in addition to gesture manner of decryption.
In this way, when the operation for mobile terminal data input operational motion and predetermined encryption flow setting matches, It determines the target data of pending cryptographic operation, and shows an encryption drawing area, so that user inputs encryption letter in the region Breath realizes encryption to target data, encrypts setting menu without entering, easy to operate, operating procedure is few, mentions significantly The high treatment effeciency of encryption flow.In addition, when switching manner of decryption without entering the specified function menu for changing password Lower progress, further simplifies operating process, improves the operating experience of user.
5th embodiment
First embodiment above to fourth embodiment describes the encryption of the mobile terminal data under different scenes in detail respectively Method is described further corresponding mobile terminal below in conjunction with Fig. 5 and Fig. 6.
The mobile terminal of the embodiment of the present invention is able to achieve first embodiment mobile terminal data into fourth embodiment and encrypts The details of method, and reach identical effect.The mobile terminal includes:
Determining module 51, for determining target data to be encrypted according to the predetermined registration operation to mobile terminal data;
Display module 52, the target data for being determined according to determining module 51, one encryption drawing area of display;
Encrypting module 53, for what is inputted in the encryption drawing area that display module 52 is shown according to mobile terminal user Encryption information executes cryptographic operation to target data.
Wherein it is determined that module 51 includes:
First receiving unit 511, for receiving the first operation to the first movement terminal data in mobile terminal;
First determination unit 512, the first operation and the first predetermined registration operation phase for being received when the first receiving unit 511 When matching, first movement terminal data is determined as to target data to be encrypted.
Wherein it is determined that module 51 includes:
Second receiving unit 513, for receiving the second operation to mobile terminal;
First display unit 514, the second operation and second predetermined registration operation phase for being received when the second receiving unit 513 When matching, a data list is shown in the display interface of mobile terminal;The data list includes at least one mobile terminal data;
Third receiving unit 515, for receiving the selection operation of the data list to the display of the first display unit 514;
Second determination unit 516, at least one corresponding shifting of selection operation for receiving third receiving unit 515 Dynamic terminal data is determined as target data to be encrypted.
Wherein, display module 52 includes:
Second display unit 521, for showing that one is used in the display interface of mobile terminal according to determining target data Input the encryption drawing area of encryption information;
Wherein, a target data corresponds at least one encryption drawing area, alternatively, an encryption drawing area is corresponding extremely A few target data.
Wherein, encrypting module 53 includes:
First acquisition unit 531, the encryption information inputted in encryption drawing area for obtaining mobile terminal user;
Third determination unit 532, the encryption information for being got based on first acquisition unit 531 determine that target encrypts Image and target rotational track;
Encryption unit 533, target encrypted image and target rotational track for being determined based on third determination unit 532, Cryptographic operation is executed to target data;
Wherein, cryptographic operation includes: and shows target encrypted image in target data, and according to target rotational track pair Target data is encrypted.
Wherein, mobile terminal further include:
First receiving module 54, for receiving the third operation to the target encrypted image in encrypted target data;
Deciphering module 55, when the third operation for receiving when the first receiving module matches with target rotational track, Decryption oprerations are executed to target data.
Wherein, mobile terminal further include:
Second receiving module 56, for receiving the 4th operation to target data;
Switching module 57, the 4th operation for being received according to the second receiving module switch decryption corresponding to target data Mode.
Wherein, switching module 57 includes:
Second acquisition unit 571, for obtaining the of target data when the 4th operation matches with third predetermined registration operation One manner of decryption;
Switch unit 572, the first manner of decryption for getting second acquisition unit 571 switch to the 4th operation institute Corresponding second manner of decryption.
It is worth noting that the mobile terminal of the embodiment of the present invention is corresponding with above-mentioned mobile terminal data encryption method Mobile terminal, the embodiment of the above method and the technical effect of realization are suitable for the embodiment of the mobile terminal.Wherein, The mobile terminal is determined when the operation for mobile terminal data input operational motion and predetermined encryption flow setting matches The target data of pending cryptographic operation, and show an encryption drawing area, so that user inputs encryption information in the region, it is real Now to the encryption of target data, setting menu is encrypted without entering, it is easy to operate, operating procedure is few, it substantially increases The treatment effeciency of encryption flow.
Sixth embodiment
Fig. 7 is the block diagram of the mobile terminal 700 of another embodiment of the present invention, mobile terminal as shown in Figure 7 include: to A few processor 701, memory 702 and user interface 703.Various components in mobile terminal 700 pass through bus system 704 It is coupled.It is understood that bus system 704 is for realizing the connection communication between these components.Bus system 704 is removed It further include power bus, control bus and status signal bus in addition except data/address bus.But for the sake of clear explanation, in Fig. 7 It is middle that various buses are all designated as bus system 704.
Wherein, user interface 703 may include display or pointing device (such as touch-sensitive plate or touch screen etc..
It is appreciated that the memory 702 in the embodiment of the present invention can be volatile memory or nonvolatile memory, It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memory 702 of system and method described herein is intended to include but is not limited to these and arbitrarily its It is suitble to the memory of type.
In some embodiments, memory 702 stores following element, executable modules or data structures, or Their subset of person or their superset: operating system 7021 and application program 7022.
Wherein, operating system 7021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and the hardware based task of processing.Application program 7022 includes various application programs, such as media Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 7022.
In an embodiment of the present invention, specifically it can be and answer by the program or instruction of calling memory 702 to store With the program or instruction stored in program 7022.Wherein, processor 701 is used for according to the predetermined registration operation to mobile terminal data, Determine target data to be encrypted;According to target data, one encryption drawing area of display;It is drawn according to mobile terminal user in encryption The encryption information inputted in region processed executes cryptographic operation to target data.
The method that the embodiments of the present invention disclose can be applied in processor 701, or be realized by processor 701. Processor 701 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 701 or the instruction of software form.Above-mentioned processing Device 701 can be general processor, digital signal processor (Digital Signal Processor, DSP), dedicated integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at The step of memory 702, processor 701 reads the information in memory 702, completes the above method in conjunction with its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or It is realized outside processor.
Specifically, user interface 703 is used to receive the first operation to the first movement terminal data in mobile terminal;Place Reason device 701 is also used to: when the first operation matches with the first predetermined registration operation, first movement terminal data being determined as to be encrypted Target data.
Specifically, user interface 703 is used to receive the second operation to mobile terminal;Processor 701 is also used to: when second When operation matches with second predetermined registration operation, show that one includes at least one mobile terminal data in the display interface of mobile terminal Data list;Receive the selection operation to data list;At least one corresponding mobile terminal data of selection operation is determined For target data to be encrypted.
Specifically, processor 701 is also used to: according to determining target data, showing one in the display interface of mobile terminal For inputting the encryption drawing area of encryption information;Wherein, a target data corresponds at least one encryption drawing area, or Person, an encryption drawing area correspond at least one target data.
Further, user interface 703 is used to obtain the encryption letter that mobile terminal user inputs in encryption drawing area Breath;Processor 701 is also used to: the encryption information based on input determines target encrypted image and target rotational track;Based on target Encrypted image and target rotational track execute cryptographic operation to target data.Wherein, which includes: to encrypt target Image is shown in target data, and is encrypted according to target rotational track to target data.
Further, user interface 703 is used to receive the third to the target encrypted image in encrypted target data Operation;Processor 701 is also used to: when third operation matches with target rotational track, executing decryption oprerations to target data.
Further, user interface 703 is used to receive the 4th operation to target data;Processor 701 is also used to: according to Manner of decryption corresponding to 4th operation switching target data.
Further, processor 701 is also used to: when the 4th operation matches with third predetermined registration operation, obtaining number of targets According to the first manner of decryption;First manner of decryption is switched into the second corresponding manner of decryption of the 4th operation.
The mobile terminal 700 of the embodiment of the present invention, for mobile terminal data input operational motion and predetermined encryption stream When the operation of journey setting matches, the target data of pending cryptographic operation is determined, and show an encryption drawing area, to use Family inputs encryption information in the region, realizes the encryption to target data, encrypts setting menu without entering, operation letter List, operating procedure are few, substantially increase the treatment effeciency of encryption flow.
7th embodiment
Fig. 8 is the structural schematic diagram of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 8 800 can be mobile phone, tablet computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle mounted electric Brain etc..
Mobile terminal 800 in Fig. 8 includes power supply 810, memory 820, input unit 830, display unit 840, processing Device 850, WIFI (Wireless Fidelity) module 860, voicefrequency circuit 870 and RF circuit 880.
Wherein, input unit 830 can be used for receiving the information of user's input, and generate the user with mobile terminal 800 Setting and the related signal input of function control.Specifically, in the embodiment of the present invention, which may include touching Control panel 831.Touch panel 831, also referred to as touch screen collect touch operation (such as the user of user on it or nearby Use the operation of any suitable object or attachment such as finger, stylus on touch panel 831), and according to preset journey Formula drives corresponding attachment device.Optionally, touch panel 831 may include two portions of touch detecting apparatus and touch controller Point.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected, it transmits a signal to Touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives The processor 850, and order that processor 850 is sent can be received and executed.Furthermore, it is possible to using resistance-type, condenser type, The multiple types such as infrared ray and surface acoustic wave realize touch panel 831.In addition to touch panel 831, input unit 830 can be with Including other input equipments 832, other input equipments 832 can include but is not limited to physical keyboard, function key (such as volume control Key processed, switch key etc.), trace ball, mouse, one of operating stick etc. or a variety of.
Wherein, display unit 840 can be used for showing information input by user or be supplied to the information and movement of user The various menu interfaces of terminal.Display unit 840 may include display panel 841, optionally, can use LCD or organic light emission The forms such as diode (Organic Light-Emitting Diode, OLED) configure display panel 841.
It should be noted that touch panel 831 can cover display panel 841, touch display screen is formed, when the touch display screen is examined After measuring touch operation on it or nearby, processor 850 is sent to determine the type of touch event, is followed by subsequent processing device 850 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example, Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 850 is the control centre of mobile terminal, utilizes each of various interfaces and connection whole mobile phone A part by running or execute the software program and/or module that are stored in first memory 821, and is called and is stored in Data in second memory 822 execute the various functions and processing data of mobile terminal, to carry out to mobile terminal whole Monitoring.Optionally, processor 850 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 821 in software program and/or module and/ Target data to be encrypted is determined according to the predetermined registration operation to mobile terminal data to the data in second memory 822;Root According to target data, one encryption drawing area of display;The encryption information inputted in drawing area is being encrypted according to mobile terminal user, Cryptographic operation mobile terminal data is executed to target data.
Specifically, input unit 830 is used to receive the first operation to the first movement terminal data in mobile terminal;Place Reason device 850 is also used to: when the first operation matches with the first predetermined registration operation, first movement terminal data being determined as to be encrypted Target data.
Specifically, input unit 830 is used to receive the second operation to mobile terminal;Processor 850 is also used to: when second When operation matches with second predetermined registration operation, show that one includes at least one mobile terminal data in the display interface of mobile terminal Data list;Receive the selection operation to data list;At least one corresponding mobile terminal data of selection operation is determined For target data to be encrypted.
Specifically, processor 850 is also used to: according to determining target data, showing one in the display interface of mobile terminal For inputting the encryption drawing area of encryption information;Wherein, a target data corresponds at least one encryption drawing area, or Person, an encryption drawing area correspond at least one target data.
Further, input unit 830 is used to obtain the encryption letter that mobile terminal user inputs in encryption drawing area Breath;Processor 850 is also used to: the encryption information based on input determines target encrypted image and target rotational track;Based on target Encrypted image and target rotational track execute cryptographic operation to target data.Wherein, which includes: to encrypt target Image is shown in target data, and is encrypted according to target rotational track to target data.
Further, input unit 830 is used to receive the third to the target encrypted image in encrypted target data Operation;Processor 850 is also used to: when third operation matches with target rotational track, executing decryption oprerations to target data.
Further, input unit 830 is used to receive the 4th operation to target data;Processor 850 is also used to: according to Manner of decryption corresponding to 4th operation switching target data.
Further, processor 850 is also used to: when the 4th operation matches with third predetermined registration operation, obtaining number of targets According to the first manner of decryption;First manner of decryption is switched into the second corresponding manner of decryption of the 4th operation.
The mobile terminal 800 of the embodiment of the present invention, for mobile terminal data input operational motion and predetermined encryption stream When the operation of journey setting matches, the target data of pending cryptographic operation is determined, and show an encryption drawing area, to use Family inputs encryption information in the region, realizes the encryption to target data, encrypts setting menu without entering, operation letter List, operating procedure are few, substantially increase the treatment effeciency of encryption flow.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program code Medium.
Above-described is the preferred embodiment of the present invention, it should be pointed out that the ordinary person of the art is come It says, can also make several improvements and retouch under the premise of not departing from principle of the present invention, these improvements and modifications also exist In protection scope of the present invention.

Claims (12)

1. a kind of mobile terminal data encryption method characterized by comprising
According to the predetermined registration operation to mobile terminal data, target data to be encrypted is determined;
According to the target data, one encryption drawing area of display;
According to the encryption information that mobile terminal user inputs in the encryption drawing area, encryption is executed to the target data Operation;
The encryption information inputted in the encryption drawing area according to mobile terminal user, executes the target data The step of cryptographic operation, comprising:
Obtain the encryption information that mobile terminal user inputs in the encryption drawing area;
Encryption information based on input determines target encrypted image and target rotational track;
Based on the target encrypted image and target rotational track, cryptographic operation is executed to the target data;
Wherein, the cryptographic operation includes: and shows the target encrypted image in the target data, and according to the mesh Mark rotary motion trace encrypts the target data;
The encryption information inputted in the encryption drawing area according to mobile terminal user, executes the target data After the step of cryptographic operation, the method also includes:
It receives and the third of the target encrypted image in the encrypted target data is operated;
When third operation matches with the target rotational track, decryption oprerations are executed to the target data, wherein The decryption oprerations include pattern decryption oprerations, and the pattern decryption oprerations include that the matching of target encrypted image and target turn The matching of dynamic rail mark.
2. mobile terminal data encryption method according to claim 1, which is characterized in that the basis is to mobile terminal number According to predetermined registration operation, the step of determining target data to be encrypted, comprising:
Receive the first operation to the first movement terminal data in mobile terminal;
When first operation matches with the first predetermined registration operation, the first movement terminal data is determined as to be encrypted Target data.
3. mobile terminal data encryption method according to claim 1, which is characterized in that the basis is to mobile terminal number According to predetermined registration operation, the step of determining target data to be encrypted, comprising:
Receive the second operation to mobile terminal;
When second operation matches with second predetermined registration operation, show that a data arrange in the display interface of the mobile terminal Table, the data list include at least one mobile terminal data;
Receive the selection operation to the data list;
At least one corresponding mobile terminal data of the selection operation is determined as target data to be encrypted.
4. mobile terminal data encryption method according to claim 1, which is characterized in that described according to the number of targets According to, display one encryption drawing area the step of, comprising:
According to the determining target data, show that one draws for inputting the encryption of encryption information in the display interface of mobile terminal Region processed;
Wherein, a target data corresponds at least one encryption drawing area, alternatively, an encryption drawing area corresponding at least one A target data.
5. mobile terminal data encryption method according to claim 1, which is characterized in that described according to mobile terminal user The encryption information that inputs in the encryption drawing area, it is described after the step of executing cryptographic operation to the target data Method further include:
Receive the 4th operation to the target data;
Switch manner of decryption corresponding to the target data according to the 4th operation.
6. mobile terminal data encryption method according to claim 5, which is characterized in that described according to the 4th operation The step of switching manner of decryption corresponding to the target data, comprising:
When the 4th operation matches with third predetermined registration operation, the first manner of decryption of the target data is obtained;
First manner of decryption is switched into the second corresponding manner of decryption of the 4th operation.
7. a kind of mobile terminal characterized by comprising
Determining module, for determining target data to be encrypted according to the predetermined registration operation to mobile terminal data;
Display module, the target data for being determined according to the determining module, one encryption drawing area of display;
Encrypting module, the encryption for being inputted in the encryption drawing area that the display module is shown according to mobile terminal user Information executes cryptographic operation to the target data;
The encrypting module includes:
First acquisition unit, the encryption information inputted in the encryption drawing area for obtaining mobile terminal user;
Third determination unit, the encryption information for being got based on the first acquisition unit, determine target encrypted image and Target rotational track;
Encryption unit, target encrypted image and target rotational track for being determined based on the third determination unit, to described Target data executes cryptographic operation;
Wherein, the cryptographic operation includes: and shows the target encrypted image in the target data, and according to the mesh Mark rotary motion trace encrypts the target data;
The mobile terminal further include:
First receiving module, for receiving the third behaviour to the target encrypted image in the encrypted target data Make;
Deciphering module, the third for receiving when first receiving module is operated to match with the target rotational track When, decryption oprerations are executed to the target data, wherein the decryption oprerations include pattern decryption oprerations, the pattern decryption Operation includes the matching of target encrypted image and the matching of target rotational track.
8. mobile terminal according to claim 7, which is characterized in that the determining module includes:
First receiving unit, for receiving the first operation to the first movement terminal data in mobile terminal;
First determination unit, the first operation for receiving when first receiving unit match with the first predetermined registration operation When, the first movement terminal data is determined as target data to be encrypted.
9. mobile terminal according to claim 7, which is characterized in that the determining module includes:
Second receiving unit, for receiving the second operation to mobile terminal;
First display unit, the second operation for receiving when second receiving unit match with second predetermined registration operation When, show that a data list, the data list include at least one mobile terminal number in the display interface of the mobile terminal According to;
Third receiving unit, for receiving the selection operation of the data list shown to first display unit;
Second determination unit, at least one corresponding mobile terminal of selection operation for receiving the third receiving unit Data are determined as target data to be encrypted.
10. mobile terminal according to claim 7, which is characterized in that the display module includes:
Second display unit is shown one for defeated in the display interface of mobile terminal for according to the determining target data Enter the encryption drawing area of encryption information;
Wherein, a target data corresponds at least one encryption drawing area, alternatively, an encryption drawing area corresponding at least one A target data.
11. mobile terminal according to claim 7, which is characterized in that the mobile terminal further include:
Second receiving module, for receiving the 4th operation to the target data;
Switching module, the 4th operation for being received according to second receiving module switch solution corresponding to the target data Close mode.
12. mobile terminal according to claim 11, which is characterized in that the switching module includes:
Second acquisition unit, for obtaining the target data when the 4th operation matches with third predetermined registration operation First manner of decryption;
Switch unit, it is right that the first manner of decryption for getting the second acquisition unit switches to the 4th operation institute The second manner of decryption answered.
CN201610848901.5A 2016-09-23 2016-09-23 A kind of mobile terminal data encryption method and mobile terminal Active CN106384060B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610848901.5A CN106384060B (en) 2016-09-23 2016-09-23 A kind of mobile terminal data encryption method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610848901.5A CN106384060B (en) 2016-09-23 2016-09-23 A kind of mobile terminal data encryption method and mobile terminal

Publications (2)

Publication Number Publication Date
CN106384060A CN106384060A (en) 2017-02-08
CN106384060B true CN106384060B (en) 2019-11-15

Family

ID=57937065

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610848901.5A Active CN106384060B (en) 2016-09-23 2016-09-23 A kind of mobile terminal data encryption method and mobile terminal

Country Status (1)

Country Link
CN (1) CN106384060B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109118551A (en) * 2017-06-22 2019-01-01 西安中兴新软件有限责任公司 A kind of image processing method, terminal and storage medium
CN108694331B (en) * 2018-05-15 2022-01-11 广东工业大学 Data storage method, device and system and computer readable storage medium
CN109740312B (en) * 2019-01-28 2021-04-06 维沃移动通信有限公司 Application control method and terminal equipment
CN110848890B (en) * 2019-11-29 2021-12-03 广东美的制冷设备有限公司 Air conditioner control display method, air conditioner and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102637105A (en) * 2011-02-15 2012-08-15 鸿富锦精密工业(深圳)有限公司 Screen unlocking method
CN102968276A (en) * 2012-11-27 2013-03-13 广东欧珀移动通信有限公司 Screen unlocking method and touch screen terminal
CN104732121A (en) * 2015-03-24 2015-06-24 广东欧珀移动通信有限公司 Encryption setting method, decryption setting method and corresponding device of application program
CN105893854A (en) * 2016-03-30 2016-08-24 北京小米移动软件有限公司 Encryption and decryption method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201539247A (en) * 2014-04-09 2015-10-16 hong-jian Zhou Password input and verification method and system thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102637105A (en) * 2011-02-15 2012-08-15 鸿富锦精密工业(深圳)有限公司 Screen unlocking method
CN102968276A (en) * 2012-11-27 2013-03-13 广东欧珀移动通信有限公司 Screen unlocking method and touch screen terminal
CN104732121A (en) * 2015-03-24 2015-06-24 广东欧珀移动通信有限公司 Encryption setting method, decryption setting method and corresponding device of application program
CN105893854A (en) * 2016-03-30 2016-08-24 北京小米移动软件有限公司 Encryption and decryption method and device

Also Published As

Publication number Publication date
CN106384060A (en) 2017-02-08

Similar Documents

Publication Publication Date Title
CN106127076B (en) A kind of inspection method and mobile terminal of photograph album photo
CN106384060B (en) A kind of mobile terminal data encryption method and mobile terminal
CN106022196B (en) A kind of method and intelligent terminal of information sharing
AU2014327030B2 (en) Scrambling passcode entry interface
US9613356B2 (en) Secure passcode entry user interface
AU2022204797B2 (en) Raw sensor input encryption for passcode entry security
CN106203061B (en) Encryption method of application program and mobile terminal
CN107180203B (en) Image encryption and decryption method, mobile terminal and computer readable storage medium
CN106027794B (en) A kind of encryption method and mobile terminal of photo
CN104732121A (en) Encryption setting method, decryption setting method and corresponding device of application program
US10203864B2 (en) Information processing method and electronic apparatus
JP2020504407A (en) Method and apparatus for starting application based on fingerprint identification
WO2012166613A1 (en) Secure input via a touchscreen
CN105868617B (en) Application program encryption method and mobile terminal
CN105827816B (en) A kind of the split screen method and mobile terminal of terminal screen
CN107450799B (en) Message display method and mobile terminal
TW201539247A (en) Password input and verification method and system thereof
CN106228085B (en) The method for secret protection and mobile terminal of application program
CN106156600B (en) A kind of unlocking method and mobile terminal of application program
CN106250757B (en) A kind of control method and mobile terminal of application program
CN106709457A (en) Task execution method based on fingerprint, and mobile terminal
CN106355109A (en) File encryption method and mobile terminal
CN106791542B (en) A kind of panoramic picture image pickup method and mobile terminal
CN106778344B (en) A kind of data permission control method and terminal
CN106326712B (en) Picture processing method and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant