CN106384060B - A kind of mobile terminal data encryption method and mobile terminal - Google Patents
A kind of mobile terminal data encryption method and mobile terminal Download PDFInfo
- Publication number
- CN106384060B CN106384060B CN201610848901.5A CN201610848901A CN106384060B CN 106384060 B CN106384060 B CN 106384060B CN 201610848901 A CN201610848901 A CN 201610848901A CN 106384060 B CN106384060 B CN 106384060B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- encryption
- target data
- data
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of mobile terminal data encryption method and mobile terminal, method includes: to determine target data to be encrypted according to the predetermined registration operation to mobile terminal data;According to target data, one encryption drawing area of display;According to the encryption information that mobile terminal user inputs in encryption drawing area, cryptographic operation is executed to target data.The present invention is when the operation for mobile terminal data input operational motion and predetermined encryption flow setting matches, determine the target data of pending cryptographic operation, and show an encryption drawing area, so that user inputs encryption information in the region, realize the encryption to target data, setting menu is encrypted without entering, it is easy to operate, operating procedure is few, substantially increase the treatment effeciency of encryption flow.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of mobile terminal data encryption method and mobile terminals.
Background technique
As the rapid development mobile terminal of mobile Internet is more more and more universal, will be installed on intelligent terminal (such as mobile phone)
There are multiple application programs, in order to guarantee the privacy and safety of user, mobile phone can be encrypted.But current cryptographic operation
It needs to enter pre-set encrypted interface just and can be carried out encryption, such as need to encrypt QQ, user is needed to open
After QQ, encryption setting menu is found from the function menu of QQ, could carry out cryptographic operation to QQ into encryption setting menu, or
Person opens system setup menu, finds the application program that encryption setting menu could encrypt needs item by item from setting menu
Or file is encrypted, encryption flow is complicated, encipheror it is cumbersome, time-consuming.
Summary of the invention
The embodiment of the invention provides a kind of mobile terminal data encryption method and mobile terminals, to solve in the prior art
To the problem that encryption flow is complicated, cumbersome, time-consuming.
In a first aspect, the embodiment of the invention provides a kind of mobile terminal data encryption methods, comprising:
According to the predetermined registration operation to mobile terminal data, target data to be encrypted is determined;
According to target data, one encryption drawing area of display;
According to the encryption information that mobile terminal user inputs in encryption drawing area, encryption behaviour is executed to target data
Make.
Second aspect, the embodiment of the invention also provides a kind of mobile terminals, comprising:
Determining module, for determining target data to be encrypted according to the predetermined registration operation to mobile terminal data;
Display module, the target data for being determined according to determining module, one encryption drawing area of display;
Encrypting module, the encryption for being inputted in the encryption drawing area that display module is shown according to mobile terminal user
Information executes cryptographic operation mobile terminal to target data.
In this way, in the embodiment of the present invention, for mobile terminal data input operational motion and predetermined encryption flow setting
Operation determine the target data of pending cryptographic operation when matching, and an encryption drawing area is shown, so that user is at this
Region inputs encryption information, realizes the encryption to target data, encrypts setting menu without entering, easy to operate, behaviour
Make that step is few, substantially increases the treatment effeciency of encryption flow.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention
Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings
Obtain other attached drawings.
Fig. 1 shows the flow charts of the first embodiment of mobile terminal data encryption method of the invention;
Fig. 2 indicates the flow chart of the second embodiment of mobile terminal data encryption method of the invention;
Fig. 3 indicates the flow chart of the 3rd embodiment of mobile terminal data encryption method of the invention;
Fig. 4 A indicates the flow chart of the fourth embodiment of mobile terminal data encryption method of the invention;
Fig. 4 B is indicated in the encryption or decryption process of the fourth embodiment of mobile terminal data encryption method of the invention
Interface schematic diagram;
Fig. 5 indicates one of the structural schematic diagram of the 5th embodiment of mobile terminal of the invention;
Fig. 6 indicates the second structural representation of the 5th embodiment of mobile terminal of the invention;
Fig. 7 indicates the block diagram of the sixth embodiment of mobile terminal of the present invention;
Fig. 8 shows the block diagrams of the 7th embodiment of mobile terminal of the present invention.
Specific embodiment
The exemplary embodiment that the present invention will be described in more detail below with reference to accompanying drawings.Although showing the present invention in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the present invention without should be by embodiments set forth here
It is limited.It is to be able to thoroughly understand the present invention on the contrary, providing these embodiments, and can be by the scope of the present invention
It is fully disclosed to those skilled in the art.
First embodiment
As shown in Figure 1, the embodiment provides a kind of mobile terminal data encryption method, this method is specifically wrapped
It includes:
Step 101: according to the predetermined registration operation to mobile terminal data, determining target data to be encrypted.
Wherein, mobile terminal data mentioned here includes application program, file and/or file etc., and target data is extremely
It less include application program and/or file to be encrypted.By taking application program as an example, generally, application program is generally on the table all
There can be an icon, as the entrance of application program, user can realize different demands by handle icon, such as:
Click the application of icon opening, dragging icon unloads etc. to file, long-pressing icon.Wherein, at least one application program
Application icon is set in the file.Further, user can also be realized by operation file clip icon to file
Different operational requirements are pressed from both sides, such as: click folder icon enters file, dragging folder icon changes file and showing
The display position at interface, long-pressing folder icon enter unloading mode etc..
And operation in the display interface can be the gesture obtained by camera, the gesture obtained by ultrasonic wave,
The triggering command obtained by infrared sensor, the pressure value obtained by pressure sensor are obtained by Fingerprint Identification Unit
Fingerprint, or iris, the white of the eye texture etc. that are obtained by camera.
Further, different operational motions corresponds to the different movements that executes, such as: the touching of encryption flow can be preset
Hair operational motion (such as every empty-handed gesture, shake), when the gesture obtained by camera, by the gesture of ultrasonic wave acquisition,
The triggering command obtained by infrared sensor, the pressure value obtained by pressure sensor are obtained by Fingerprint Identification Unit
When fingerprint, or the iris, the white of the eye texture that obtain by camera etc. match with the movement of default trigger action, that is, it can trigger encryption
Process then searches corresponding encryption function option without the setting menu into system in this way and selects corresponding mobile terminal number
According to, corresponding encryption function option also is searched without entering the corresponding setting menu of mobile terminal data, reduces operating procedure,
It is easy to operate, improve treatment effeciency.
Step 102: according to the target data, one encryption drawing area of display.
After determining target data, into state to be encrypted, an encryption drawing area at this moment is shown in current interface, generally
Ground, the encryption drawing area include at least: Password Input region or gesture drawing area or pattern drawing area or fingerprint are defeated
Enter region etc..
Step 103: the encryption information inputted in encryption drawing area according to mobile terminal user executes target data
Cryptographic operation.
User can input encryption information in encryption drawing area, and target data to be encrypted, protection user is hidden
Private improves safety.
The mobile terminal data encryption method of the embodiment of the present invention, for mobile terminal data input operational motion and in advance
If the operation of encryption flow setting matches, the target data of pending cryptographic operation is determined, and show that area is drawn in an encryption
The encryption to target data is realized so that user inputs encryption information in the region in domain, encrypts setting dish without entering
It is single, it is easy to operate, operating procedure is few, substantially increase the treatment effeciency of encryption flow.
Second embodiment
First embodiment above has carried out simple introduction to mobile terminal data encryption method of the invention, below this implementation
Example will be described further it in conjunction with attached drawing and concrete application scene.
As shown in Fig. 2, the mobile terminal data encryption method of the embodiment of the present invention the following steps are included:
Step 201: receiving the first operation to the first movement terminal data in mobile terminal.
Mobile terminal data mentioned here includes application program, file and file etc., and display interface is generally referred to as
The main interface of mobile terminal, there are multiple files and/or application icons in main interface.When user needs to first movement terminal
When data (such as some application program or file) carry out cryptographic operation, encryption stream can be triggered by carrying out corresponding operation to it
Journey.
Step 202: when the first operation matches with the first predetermined registration operation, first movement terminal data being determined as to be added
Close target data.
When the first predetermined registration operation of the first operation of user's input and triggering encryption flow matches, by corresponding first
Mobile terminal data is determined as the target data of pending cryptographic operation.For example, user needs to encrypt QQ application, then may be used
Default trigger action is carried out to QQ application, then can directly trigger the encryption flow of QQ application, be arranged under catalogue without entering
The corresponding encryption function menu of cryptographic operation is searched, it is easy to operate, reduce operating procedure, improves treatment effeciency.
Step 203: according to determining target data, showing that one is used to input encryption information in the display interface of mobile terminal
Encryption drawing area.
Wherein, a target data corresponds at least one encryption drawing area, i.e. a target data is corresponding at least one
The encryption drawing area (such as gesture drawing area, numeral input region and/or fingerprint typing region) of type, alternatively, one
Encryption drawing area correspond at least one target data, i.e., the corresponding encryption drawing area of multiple target datas (such as QQ applies,
Wechat application, short message application etc. correspond to a gesture drawing area jointly).Here it means, different target datas can be single
Solely carry out the input of encryption information, the i.e. corresponding encryption information of a mobile terminal data;Alternatively, different target datas can
The common input for carrying out encryption information, i.e., multiple corresponding encryption information of mobile terminal data.Such as: it can be respectively to QQ and micro-
Letter carries out cryptographic operation, can also be encrypted to QQ and wechat using same encryption information, ciphering process can also carry out jointly.
Step 204: the encryption information inputted in encryption drawing area according to mobile terminal user executes target data
Cryptographic operation.
User can input encryption information in encryption drawing area, and target data to be encrypted, protection user is hidden
Private improves safety.
Below by taking QQ is applied as an example, when mobile terminal user needs to encrypt QQ application, QQ application is added
The default trigger action of close operation shows an encryption drawing area in current display interface to trigger the encryption flow of QQ application,
The encryption drawing area can draw any, Yong Hu such as interface, numeral input interface or fingerprint input interface with display pattern
After the encryption drawing area inputs encryption information and confirms, encryption flow is exited.
The mobile terminal data encryption method of the embodiment of the present invention, for mobile terminal data input operational motion and in advance
If the operation of encryption flow setting matches, the target data of pending cryptographic operation is determined, and show that area is drawn in an encryption
The encryption to target data is realized so that user inputs encryption information in the region in domain, encrypts setting dish without entering
It is single, it is easy to operate, operating procedure is few, substantially increase the treatment effeciency of encryption flow.
3rd embodiment
The present embodiment will be described further it in conjunction with attached drawing and concrete application scene below.As shown in figure 3, this
The mobile terminal data encryption methods of inventive embodiments the following steps are included:
Step 301: receiving the second operation to mobile terminal.
Wherein, it refers here to obtain the second operation that mobile terminal user inputs mobile terminal, it is especially mobile whole
The second operation that end subscriber inputs display interface, wherein display interface is generally referred to as the main interface of mobile terminal, main interface
On there are multiple files and/or application icons.
Step 302: when the second operation matches with second predetermined registration operation, showing a number in the display interface of mobile terminal
According to list.
It wherein, include at least one mobile terminal data in the data list, it is preferable that the data list includes supporting to add
All mobile terminal datas of close operation, to improve the safety of mobile terminal data.Mobile terminal data packet mentioned here
Include application program, file and file etc..It here is said when the second operation occurred on the display interface got adds with triggering
When the predetermined registration operation of close process matches, a data list is shown in display interface, for selection by the user eventually to which movement
End data carries out cryptographic operation.Setting menu without entering system searches corresponding encryption function option and selects corresponding shifting
Dynamic terminal data is also searched corresponding encryption function option without entering the corresponding setting menu of mobile terminal data, is reduced
Operating procedure, it is easy to operate, improve treatment effeciency.
Step 303: receiving the selection operation to data list.
After showing data list, mobile terminal user can select the mobile terminal to be encrypted according to the data list
Data, mobile terminal can be the selection operation of data list and choose to mobile terminal data to be encrypted.
Step 304: at least one corresponding mobile terminal data of selection operation is determined as target data to be encrypted.
For example, inputting encryption in some key or display interface of mobile terminal when user needs to carry out cryptographic operation
Corresponding default trigger action is operated, to trigger encryption flow and show a data list in display interface, in the data list
In include multiple mobile terminal datas wait for user select, if user need to QQ application encryption if can choose QQ application, with triggering
The encryption flow of QQ application.It is worth noting that the mobile terminal data selected is either one or more.
Step 305: according to determining target data, showing that one is used to input encryption information in the display interface of mobile terminal
Encryption drawing area.
Wherein, a target data corresponds at least one encryption drawing area, alternatively, an encryption drawing area is corresponding extremely
A few target data.
Step 306: the encryption information inputted in encryption drawing area according to mobile terminal user executes target data
Cryptographic operation.
User can input encryption information in encryption drawing area, and target data to be encrypted, protection user is hidden
Private improves safety.Such as after the encryption flow for triggering certain mobile terminal data, show that an encryption is drawn in current display interface
Region processed, the encryption drawing area can be any with display pattern drafting interface, numeral input interface or fingerprint input interface etc.,
User exits encryption flow after the encryption drawing area inputs encryption information and confirms.
The mobile terminal data encryption method of the embodiment of the present invention, for mobile terminal data input operational motion and in advance
If the operation of encryption flow setting matches, the target data of pending cryptographic operation is determined, and show that area is drawn in an encryption
The encryption to target data is realized so that user inputs encryption information in the region in domain, encrypts setting dish without entering
It is single, it is easy to operate, operating procedure is few, substantially increase the treatment effeciency of encryption flow.
Fourth embodiment
As shown in Figure 4 A, the embodiment provides a kind of mobile terminal data encryption method, this method is specifically wrapped
It includes:
Step 401: according to the predetermined registration operation to mobile terminal data, determining target data to be encrypted.
Wherein, mobile terminal data mentioned here includes application program, file and file etc., and target data is at least wrapped
Include application program and/or file to be encrypted.Further, different operational motions corresponds to the different movements that executes, such as: it can
The trigger action movement of encryption flow is preset, when the gesture obtained by camera, the gesture obtained by ultrasonic wave is led to
The triggering command for crossing infrared sensor acquisition, the pressure value obtained by pressure sensor, the finger obtained by Fingerprint Identification Unit
When line, or the iris, the white of the eye texture that obtain by camera etc. match with the movement of default trigger action, that is, it can trigger encryption stream
Journey reduces operating procedure, easy to operate, improves treatment effeciency.
Step 402: according to the target data, one encryption drawing area of display.
After determining target data, into state to be encrypted, an encryption drawing area at this moment is shown in current interface, generally
Ground, the encryption drawing area include at least: Password Input region or gesture drawing area or pattern drawing area or fingerprint are defeated
Enter region etc..
Step 403: the encryption information inputted in encryption drawing area according to mobile terminal user executes target data
Cryptographic operation.
Mobile terminal user can input encryption information in encryption drawing area, target data to be encrypted, protect
Privacy of user is protected, safety is improved.In practical applications, the same mobile terminal data may be provided with a plurality of types of
Encryption information, such as password encryption, pattern encryption and encrypting fingerprint etc. are carried out to QQ simultaneously.The present embodiment is by taking pattern encrypts as an example
It is illustrated.
Specifically, the encryption information inputted in encryption drawing area according to mobile terminal user, executes target data
The step of cryptographic operation includes: the encryption information for obtaining mobile terminal user and inputting in encryption drawing area;Based on input
Encryption information determines target encrypted image and target rotational track;Based on target encrypted image and target rotational track, to target
Data execute cryptographic operation.I.e. after display encrypts drawing area, obtain mobile terminal user's input is directed to the target data
Encrypted patterns, which includes target encrypted image and target rotational track (i.e. the track draftings of encrypted patterns).Its
In, which includes: to show target encrypted image in target data, and according to target rotational track to target data
It is encrypted.
After having executed cryptographic operation to target data, this method further includes the solution secret letter for obtaining mobile terminal user's input
Breath executes decryption oprerations to target data according to the solution confidential information.Specifically decrypting process can refer to following steps realization:
Step 404: receiving and the third of the target encrypted image in encrypted target data is operated.
Specifically, it is illustrated so that pattern is decrypted as an example, since pattern cryptographic operation includes: to show target encrypted image
Target data is encrypted in target data, and according to target rotational track, then corresponding pattern decryption oprerations include
The matching of target encrypted image and the matching of target rotational track, only target encrypted patterns and target rotational track match
Target data is decrypted in Shi Caineng, enhances the safety of target data.
It further, can also be before decryption oprerations to mobile terminal in order to further increase the safety of target data
User carries out identification, such as carries out recognition of face by camera, or carry out fingerprint recognition by fingerprint recognition key, or
Other personal identification methods.Reception is being executed in encrypted target data after the identification of mobile terminal user passes through
Target encrypted image third operation the step of, with enter decrypt process, such as after identification passes through display interface show
Show a decryption prompt information.Step 405: when third operation matches with target rotational track, decryption being executed to target data
Operation.
When the pattern target encrypted image corresponding with target data of mobile terminal user's input target that is identical, and drawing
Rotary motion trace is also identical, then executes decryption oprerations to target data.Such as: it include several in display interface 4 as shown in Figure 4 B
A mobile terminal data, wherein the upper left corner of mobile terminal data 42 shows a target encrypted image 41, target encryption figure
The pattern for the lock shape surrounded as 41 for a circle, but not limited to this.If the encryption information of mobile terminal data is set as
Target encrypted image 41 is rotated clockwise into three circles according to target rotational track (annular trace as shown in dashed lines in fig. 4b), then
When operation is decrypted to the mobile terminal data, user is needed to pin the mobile terminal data in Fig. 4 B in display interface 4
The target encrypted image 41 shown on 42, and rotated along target rotational track, if user drags the rotation of lock angle target
Direction is different from turnning circle when rotation different or turnning circle of sequence and encryption when encryption, then decrypts and fail.Namely
It says, target encrypted image and target rotational track could successful decryptions when matching;When the direction of target rotational track mismatches
Decryption failure;The initial position of target rotational track is also decrypted when mismatching to fail;The turnning circle of target rotational track is not
Timing decryption failure;The mode that information matches multiple in this way could decrypt improves the safety of target data, protects user
Privacy.
Further, in practical applications, a plurality of types of encryptions may be provided with for the same mobile terminal data
Information, such as password encryption, pattern encryption and encrypting fingerprint etc. are carried out to QQ simultaneously.Therefore, the present embodiment additionally provides a variety of
Quick switching mode between different cipher modes.It specifically can refer to following steps realization.
Step 406: receiving the 4th operation to target data.
When there are many when encryption type, correspond to there are many type is decrypted, to movement end for the setting of certain mobile terminal data
End data switches over the predetermined registration operation of decryption type, to trigger the process of switching manner of decryption.
Step 407: according to manner of decryption corresponding to the 4th operation switching target data.
Such as: the encryption type of QQ application includes numerical ciphers and two kinds of pattern password, when user forget numerical ciphers or
When pattern password, it is desirable to when switching to that the decryption type that do not forget, the 4th operation is carried out to QQ and decrypts type to switch it,
It is carried out under function menu without entering specified change password, simplifies operating process, improve the operating experience of user.
Specifically, switch manner of decryption implementation include, but is not limited to it is following several:
Mode one: when the 4th operation matches with third predetermined registration operation, the first manner of decryption of target data is obtained;It will
First manner of decryption switches to the second corresponding manner of decryption of the 4th operation.It is different to mean that different operations is corresponding with
Manner of decryption, such as upper sliding operation corresponding pattern enciphering/deciphering mode, the corresponding gesture enciphering/deciphering mode of operation of gliding, left sliding operation
Corresponding number enciphering/deciphering mode, it is right it is sliding operate corresponding fingerprint enciphering/deciphering mode etc., wherein operating gesture and enciphering/deciphering mode it
Between corresponding relationship can customize setting.When mobile terminal user needs the enciphering/deciphering mode of certain target data switching to figure
When case enciphering/deciphering mode, carrying out upper sliding operation to the target data can be realized switching.
Mode two: when the 4th operation matches with third predetermined registration operation, the current manner of decryption of target data is switched
To another kind.It means, third predetermined registration operation is the operating gesture of preset switching manner of decryption, when detecting movement
When terminal user matches to the 4th operation of target data with third predetermined registration operation, switch the manner of decryption of the target data,
Such as the current manner of decryption of the target data is gesture manner of decryption, when mobile terminal user executes third predetermined registration operation,
The manner of decryption of the target data switches to another manner of decryption in addition to gesture manner of decryption.
In this way, when the operation for mobile terminal data input operational motion and predetermined encryption flow setting matches,
It determines the target data of pending cryptographic operation, and shows an encryption drawing area, so that user inputs encryption letter in the region
Breath realizes encryption to target data, encrypts setting menu without entering, easy to operate, operating procedure is few, mentions significantly
The high treatment effeciency of encryption flow.In addition, when switching manner of decryption without entering the specified function menu for changing password
Lower progress, further simplifies operating process, improves the operating experience of user.
5th embodiment
First embodiment above to fourth embodiment describes the encryption of the mobile terminal data under different scenes in detail respectively
Method is described further corresponding mobile terminal below in conjunction with Fig. 5 and Fig. 6.
The mobile terminal of the embodiment of the present invention is able to achieve first embodiment mobile terminal data into fourth embodiment and encrypts
The details of method, and reach identical effect.The mobile terminal includes:
Determining module 51, for determining target data to be encrypted according to the predetermined registration operation to mobile terminal data;
Display module 52, the target data for being determined according to determining module 51, one encryption drawing area of display;
Encrypting module 53, for what is inputted in the encryption drawing area that display module 52 is shown according to mobile terminal user
Encryption information executes cryptographic operation to target data.
Wherein it is determined that module 51 includes:
First receiving unit 511, for receiving the first operation to the first movement terminal data in mobile terminal;
First determination unit 512, the first operation and the first predetermined registration operation phase for being received when the first receiving unit 511
When matching, first movement terminal data is determined as to target data to be encrypted.
Wherein it is determined that module 51 includes:
Second receiving unit 513, for receiving the second operation to mobile terminal;
First display unit 514, the second operation and second predetermined registration operation phase for being received when the second receiving unit 513
When matching, a data list is shown in the display interface of mobile terminal;The data list includes at least one mobile terminal data;
Third receiving unit 515, for receiving the selection operation of the data list to the display of the first display unit 514;
Second determination unit 516, at least one corresponding shifting of selection operation for receiving third receiving unit 515
Dynamic terminal data is determined as target data to be encrypted.
Wherein, display module 52 includes:
Second display unit 521, for showing that one is used in the display interface of mobile terminal according to determining target data
Input the encryption drawing area of encryption information;
Wherein, a target data corresponds at least one encryption drawing area, alternatively, an encryption drawing area is corresponding extremely
A few target data.
Wherein, encrypting module 53 includes:
First acquisition unit 531, the encryption information inputted in encryption drawing area for obtaining mobile terminal user;
Third determination unit 532, the encryption information for being got based on first acquisition unit 531 determine that target encrypts
Image and target rotational track;
Encryption unit 533, target encrypted image and target rotational track for being determined based on third determination unit 532,
Cryptographic operation is executed to target data;
Wherein, cryptographic operation includes: and shows target encrypted image in target data, and according to target rotational track pair
Target data is encrypted.
Wherein, mobile terminal further include:
First receiving module 54, for receiving the third operation to the target encrypted image in encrypted target data;
Deciphering module 55, when the third operation for receiving when the first receiving module matches with target rotational track,
Decryption oprerations are executed to target data.
Wherein, mobile terminal further include:
Second receiving module 56, for receiving the 4th operation to target data;
Switching module 57, the 4th operation for being received according to the second receiving module switch decryption corresponding to target data
Mode.
Wherein, switching module 57 includes:
Second acquisition unit 571, for obtaining the of target data when the 4th operation matches with third predetermined registration operation
One manner of decryption;
Switch unit 572, the first manner of decryption for getting second acquisition unit 571 switch to the 4th operation institute
Corresponding second manner of decryption.
It is worth noting that the mobile terminal of the embodiment of the present invention is corresponding with above-mentioned mobile terminal data encryption method
Mobile terminal, the embodiment of the above method and the technical effect of realization are suitable for the embodiment of the mobile terminal.Wherein,
The mobile terminal is determined when the operation for mobile terminal data input operational motion and predetermined encryption flow setting matches
The target data of pending cryptographic operation, and show an encryption drawing area, so that user inputs encryption information in the region, it is real
Now to the encryption of target data, setting menu is encrypted without entering, it is easy to operate, operating procedure is few, it substantially increases
The treatment effeciency of encryption flow.
Sixth embodiment
Fig. 7 is the block diagram of the mobile terminal 700 of another embodiment of the present invention, mobile terminal as shown in Figure 7 include: to
A few processor 701, memory 702 and user interface 703.Various components in mobile terminal 700 pass through bus system 704
It is coupled.It is understood that bus system 704 is for realizing the connection communication between these components.Bus system 704 is removed
It further include power bus, control bus and status signal bus in addition except data/address bus.But for the sake of clear explanation, in Fig. 7
It is middle that various buses are all designated as bus system 704.
Wherein, user interface 703 may include display or pointing device (such as touch-sensitive plate or touch screen etc..
It is appreciated that the memory 702 in the embodiment of the present invention can be volatile memory or nonvolatile memory,
It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read-
Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable
Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or
Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high
Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory
(Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory
(Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate
SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct
Rambus RAM, DRRAM).The memory 702 of system and method described herein is intended to include but is not limited to these and arbitrarily its
It is suitble to the memory of type.
In some embodiments, memory 702 stores following element, executable modules or data structures, or
Their subset of person or their superset: operating system 7021 and application program 7022.
Wherein, operating system 7021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for
Realize various basic businesses and the hardware based task of processing.Application program 7022 includes various application programs, such as media
Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention
The program of method may be embodied in application program 7022.
In an embodiment of the present invention, specifically it can be and answer by the program or instruction of calling memory 702 to store
With the program or instruction stored in program 7022.Wherein, processor 701 is used for according to the predetermined registration operation to mobile terminal data,
Determine target data to be encrypted;According to target data, one encryption drawing area of display;It is drawn according to mobile terminal user in encryption
The encryption information inputted in region processed executes cryptographic operation to target data.
The method that the embodiments of the present invention disclose can be applied in processor 701, or be realized by processor 701.
Processor 701 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each
Step can be completed by the integrated logic circuit of the hardware in processor 701 or the instruction of software form.Above-mentioned processing
Device 701 can be general processor, digital signal processor (Digital Signal Processor, DSP), dedicated integrated electricity
Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general
Processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with institute of the embodiment of the present invention
The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor
And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only
In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at
The step of memory 702, processor 701 reads the information in memory 702, completes the above method in conjunction with its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its
Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (Application
Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing,
DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic
Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor,
In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein
The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or
It is realized outside processor.
Specifically, user interface 703 is used to receive the first operation to the first movement terminal data in mobile terminal;Place
Reason device 701 is also used to: when the first operation matches with the first predetermined registration operation, first movement terminal data being determined as to be encrypted
Target data.
Specifically, user interface 703 is used to receive the second operation to mobile terminal;Processor 701 is also used to: when second
When operation matches with second predetermined registration operation, show that one includes at least one mobile terminal data in the display interface of mobile terminal
Data list;Receive the selection operation to data list;At least one corresponding mobile terminal data of selection operation is determined
For target data to be encrypted.
Specifically, processor 701 is also used to: according to determining target data, showing one in the display interface of mobile terminal
For inputting the encryption drawing area of encryption information;Wherein, a target data corresponds at least one encryption drawing area, or
Person, an encryption drawing area correspond at least one target data.
Further, user interface 703 is used to obtain the encryption letter that mobile terminal user inputs in encryption drawing area
Breath;Processor 701 is also used to: the encryption information based on input determines target encrypted image and target rotational track;Based on target
Encrypted image and target rotational track execute cryptographic operation to target data.Wherein, which includes: to encrypt target
Image is shown in target data, and is encrypted according to target rotational track to target data.
Further, user interface 703 is used to receive the third to the target encrypted image in encrypted target data
Operation;Processor 701 is also used to: when third operation matches with target rotational track, executing decryption oprerations to target data.
Further, user interface 703 is used to receive the 4th operation to target data;Processor 701 is also used to: according to
Manner of decryption corresponding to 4th operation switching target data.
Further, processor 701 is also used to: when the 4th operation matches with third predetermined registration operation, obtaining number of targets
According to the first manner of decryption;First manner of decryption is switched into the second corresponding manner of decryption of the 4th operation.
The mobile terminal 700 of the embodiment of the present invention, for mobile terminal data input operational motion and predetermined encryption stream
When the operation of journey setting matches, the target data of pending cryptographic operation is determined, and show an encryption drawing area, to use
Family inputs encryption information in the region, realizes the encryption to target data, encrypts setting menu without entering, operation letter
List, operating procedure are few, substantially increase the treatment effeciency of encryption flow.
7th embodiment
Fig. 8 is the structural schematic diagram of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 8
800 can be mobile phone, tablet computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle mounted electric
Brain etc..
Mobile terminal 800 in Fig. 8 includes power supply 810, memory 820, input unit 830, display unit 840, processing
Device 850, WIFI (Wireless Fidelity) module 860, voicefrequency circuit 870 and RF circuit 880.
Wherein, input unit 830 can be used for receiving the information of user's input, and generate the user with mobile terminal 800
Setting and the related signal input of function control.Specifically, in the embodiment of the present invention, which may include touching
Control panel 831.Touch panel 831, also referred to as touch screen collect touch operation (such as the user of user on it or nearby
Use the operation of any suitable object or attachment such as finger, stylus on touch panel 831), and according to preset journey
Formula drives corresponding attachment device.Optionally, touch panel 831 may include two portions of touch detecting apparatus and touch controller
Point.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected, it transmits a signal to
Touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives
The processor 850, and order that processor 850 is sent can be received and executed.Furthermore, it is possible to using resistance-type, condenser type,
The multiple types such as infrared ray and surface acoustic wave realize touch panel 831.In addition to touch panel 831, input unit 830 can be with
Including other input equipments 832, other input equipments 832 can include but is not limited to physical keyboard, function key (such as volume control
Key processed, switch key etc.), trace ball, mouse, one of operating stick etc. or a variety of.
Wherein, display unit 840 can be used for showing information input by user or be supplied to the information and movement of user
The various menu interfaces of terminal.Display unit 840 may include display panel 841, optionally, can use LCD or organic light emission
The forms such as diode (Organic Light-Emitting Diode, OLED) configure display panel 841.
It should be noted that touch panel 831 can cover display panel 841, touch display screen is formed, when the touch display screen is examined
After measuring touch operation on it or nearby, processor 850 is sent to determine the type of touch event, is followed by subsequent processing device
850 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area
And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious
Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with
The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area
Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example,
Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 850 is the control centre of mobile terminal, utilizes each of various interfaces and connection whole mobile phone
A part by running or execute the software program and/or module that are stored in first memory 821, and is called and is stored in
Data in second memory 822 execute the various functions and processing data of mobile terminal, to carry out to mobile terminal whole
Monitoring.Optionally, processor 850 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 821 in software program and/or module and/
Target data to be encrypted is determined according to the predetermined registration operation to mobile terminal data to the data in second memory 822;Root
According to target data, one encryption drawing area of display;The encryption information inputted in drawing area is being encrypted according to mobile terminal user,
Cryptographic operation mobile terminal data is executed to target data.
Specifically, input unit 830 is used to receive the first operation to the first movement terminal data in mobile terminal;Place
Reason device 850 is also used to: when the first operation matches with the first predetermined registration operation, first movement terminal data being determined as to be encrypted
Target data.
Specifically, input unit 830 is used to receive the second operation to mobile terminal;Processor 850 is also used to: when second
When operation matches with second predetermined registration operation, show that one includes at least one mobile terminal data in the display interface of mobile terminal
Data list;Receive the selection operation to data list;At least one corresponding mobile terminal data of selection operation is determined
For target data to be encrypted.
Specifically, processor 850 is also used to: according to determining target data, showing one in the display interface of mobile terminal
For inputting the encryption drawing area of encryption information;Wherein, a target data corresponds at least one encryption drawing area, or
Person, an encryption drawing area correspond at least one target data.
Further, input unit 830 is used to obtain the encryption letter that mobile terminal user inputs in encryption drawing area
Breath;Processor 850 is also used to: the encryption information based on input determines target encrypted image and target rotational track;Based on target
Encrypted image and target rotational track execute cryptographic operation to target data.Wherein, which includes: to encrypt target
Image is shown in target data, and is encrypted according to target rotational track to target data.
Further, input unit 830 is used to receive the third to the target encrypted image in encrypted target data
Operation;Processor 850 is also used to: when third operation matches with target rotational track, executing decryption oprerations to target data.
Further, input unit 830 is used to receive the 4th operation to target data;Processor 850 is also used to: according to
Manner of decryption corresponding to 4th operation switching target data.
Further, processor 850 is also used to: when the 4th operation matches with third predetermined registration operation, obtaining number of targets
According to the first manner of decryption;First manner of decryption is switched into the second corresponding manner of decryption of the 4th operation.
The mobile terminal 800 of the embodiment of the present invention, for mobile terminal data input operational motion and predetermined encryption stream
When the operation of journey setting matches, the target data of pending cryptographic operation is determined, and show an encryption drawing area, to use
Family inputs encryption information in the region, realizes the encryption to target data, encrypts setting menu without entering, operation letter
List, operating procedure are few, substantially increase the treatment effeciency of encryption flow.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others
Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit
It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program code
Medium.
Above-described is the preferred embodiment of the present invention, it should be pointed out that the ordinary person of the art is come
It says, can also make several improvements and retouch under the premise of not departing from principle of the present invention, these improvements and modifications also exist
In protection scope of the present invention.
Claims (12)
1. a kind of mobile terminal data encryption method characterized by comprising
According to the predetermined registration operation to mobile terminal data, target data to be encrypted is determined;
According to the target data, one encryption drawing area of display;
According to the encryption information that mobile terminal user inputs in the encryption drawing area, encryption is executed to the target data
Operation;
The encryption information inputted in the encryption drawing area according to mobile terminal user, executes the target data
The step of cryptographic operation, comprising:
Obtain the encryption information that mobile terminal user inputs in the encryption drawing area;
Encryption information based on input determines target encrypted image and target rotational track;
Based on the target encrypted image and target rotational track, cryptographic operation is executed to the target data;
Wherein, the cryptographic operation includes: and shows the target encrypted image in the target data, and according to the mesh
Mark rotary motion trace encrypts the target data;
The encryption information inputted in the encryption drawing area according to mobile terminal user, executes the target data
After the step of cryptographic operation, the method also includes:
It receives and the third of the target encrypted image in the encrypted target data is operated;
When third operation matches with the target rotational track, decryption oprerations are executed to the target data, wherein
The decryption oprerations include pattern decryption oprerations, and the pattern decryption oprerations include that the matching of target encrypted image and target turn
The matching of dynamic rail mark.
2. mobile terminal data encryption method according to claim 1, which is characterized in that the basis is to mobile terminal number
According to predetermined registration operation, the step of determining target data to be encrypted, comprising:
Receive the first operation to the first movement terminal data in mobile terminal;
When first operation matches with the first predetermined registration operation, the first movement terminal data is determined as to be encrypted
Target data.
3. mobile terminal data encryption method according to claim 1, which is characterized in that the basis is to mobile terminal number
According to predetermined registration operation, the step of determining target data to be encrypted, comprising:
Receive the second operation to mobile terminal;
When second operation matches with second predetermined registration operation, show that a data arrange in the display interface of the mobile terminal
Table, the data list include at least one mobile terminal data;
Receive the selection operation to the data list;
At least one corresponding mobile terminal data of the selection operation is determined as target data to be encrypted.
4. mobile terminal data encryption method according to claim 1, which is characterized in that described according to the number of targets
According to, display one encryption drawing area the step of, comprising:
According to the determining target data, show that one draws for inputting the encryption of encryption information in the display interface of mobile terminal
Region processed;
Wherein, a target data corresponds at least one encryption drawing area, alternatively, an encryption drawing area corresponding at least one
A target data.
5. mobile terminal data encryption method according to claim 1, which is characterized in that described according to mobile terminal user
The encryption information that inputs in the encryption drawing area, it is described after the step of executing cryptographic operation to the target data
Method further include:
Receive the 4th operation to the target data;
Switch manner of decryption corresponding to the target data according to the 4th operation.
6. mobile terminal data encryption method according to claim 5, which is characterized in that described according to the 4th operation
The step of switching manner of decryption corresponding to the target data, comprising:
When the 4th operation matches with third predetermined registration operation, the first manner of decryption of the target data is obtained;
First manner of decryption is switched into the second corresponding manner of decryption of the 4th operation.
7. a kind of mobile terminal characterized by comprising
Determining module, for determining target data to be encrypted according to the predetermined registration operation to mobile terminal data;
Display module, the target data for being determined according to the determining module, one encryption drawing area of display;
Encrypting module, the encryption for being inputted in the encryption drawing area that the display module is shown according to mobile terminal user
Information executes cryptographic operation to the target data;
The encrypting module includes:
First acquisition unit, the encryption information inputted in the encryption drawing area for obtaining mobile terminal user;
Third determination unit, the encryption information for being got based on the first acquisition unit, determine target encrypted image and
Target rotational track;
Encryption unit, target encrypted image and target rotational track for being determined based on the third determination unit, to described
Target data executes cryptographic operation;
Wherein, the cryptographic operation includes: and shows the target encrypted image in the target data, and according to the mesh
Mark rotary motion trace encrypts the target data;
The mobile terminal further include:
First receiving module, for receiving the third behaviour to the target encrypted image in the encrypted target data
Make;
Deciphering module, the third for receiving when first receiving module is operated to match with the target rotational track
When, decryption oprerations are executed to the target data, wherein the decryption oprerations include pattern decryption oprerations, the pattern decryption
Operation includes the matching of target encrypted image and the matching of target rotational track.
8. mobile terminal according to claim 7, which is characterized in that the determining module includes:
First receiving unit, for receiving the first operation to the first movement terminal data in mobile terminal;
First determination unit, the first operation for receiving when first receiving unit match with the first predetermined registration operation
When, the first movement terminal data is determined as target data to be encrypted.
9. mobile terminal according to claim 7, which is characterized in that the determining module includes:
Second receiving unit, for receiving the second operation to mobile terminal;
First display unit, the second operation for receiving when second receiving unit match with second predetermined registration operation
When, show that a data list, the data list include at least one mobile terminal number in the display interface of the mobile terminal
According to;
Third receiving unit, for receiving the selection operation of the data list shown to first display unit;
Second determination unit, at least one corresponding mobile terminal of selection operation for receiving the third receiving unit
Data are determined as target data to be encrypted.
10. mobile terminal according to claim 7, which is characterized in that the display module includes:
Second display unit is shown one for defeated in the display interface of mobile terminal for according to the determining target data
Enter the encryption drawing area of encryption information;
Wherein, a target data corresponds at least one encryption drawing area, alternatively, an encryption drawing area corresponding at least one
A target data.
11. mobile terminal according to claim 7, which is characterized in that the mobile terminal further include:
Second receiving module, for receiving the 4th operation to the target data;
Switching module, the 4th operation for being received according to second receiving module switch solution corresponding to the target data
Close mode.
12. mobile terminal according to claim 11, which is characterized in that the switching module includes:
Second acquisition unit, for obtaining the target data when the 4th operation matches with third predetermined registration operation
First manner of decryption;
Switch unit, it is right that the first manner of decryption for getting the second acquisition unit switches to the 4th operation institute
The second manner of decryption answered.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610848901.5A CN106384060B (en) | 2016-09-23 | 2016-09-23 | A kind of mobile terminal data encryption method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610848901.5A CN106384060B (en) | 2016-09-23 | 2016-09-23 | A kind of mobile terminal data encryption method and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106384060A CN106384060A (en) | 2017-02-08 |
CN106384060B true CN106384060B (en) | 2019-11-15 |
Family
ID=57937065
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610848901.5A Active CN106384060B (en) | 2016-09-23 | 2016-09-23 | A kind of mobile terminal data encryption method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106384060B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109118551A (en) * | 2017-06-22 | 2019-01-01 | 西安中兴新软件有限责任公司 | A kind of image processing method, terminal and storage medium |
CN108694331B (en) * | 2018-05-15 | 2022-01-11 | 广东工业大学 | Data storage method, device and system and computer readable storage medium |
CN109740312B (en) * | 2019-01-28 | 2021-04-06 | 维沃移动通信有限公司 | Application control method and terminal equipment |
CN110848890B (en) * | 2019-11-29 | 2021-12-03 | 广东美的制冷设备有限公司 | Air conditioner control display method, air conditioner and computer readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102637105A (en) * | 2011-02-15 | 2012-08-15 | 鸿富锦精密工业(深圳)有限公司 | Screen unlocking method |
CN102968276A (en) * | 2012-11-27 | 2013-03-13 | 广东欧珀移动通信有限公司 | Screen unlocking method and touch screen terminal |
CN104732121A (en) * | 2015-03-24 | 2015-06-24 | 广东欧珀移动通信有限公司 | Encryption setting method, decryption setting method and corresponding device of application program |
CN105893854A (en) * | 2016-03-30 | 2016-08-24 | 北京小米移动软件有限公司 | Encryption and decryption method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201539247A (en) * | 2014-04-09 | 2015-10-16 | hong-jian Zhou | Password input and verification method and system thereof |
-
2016
- 2016-09-23 CN CN201610848901.5A patent/CN106384060B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102637105A (en) * | 2011-02-15 | 2012-08-15 | 鸿富锦精密工业(深圳)有限公司 | Screen unlocking method |
CN102968276A (en) * | 2012-11-27 | 2013-03-13 | 广东欧珀移动通信有限公司 | Screen unlocking method and touch screen terminal |
CN104732121A (en) * | 2015-03-24 | 2015-06-24 | 广东欧珀移动通信有限公司 | Encryption setting method, decryption setting method and corresponding device of application program |
CN105893854A (en) * | 2016-03-30 | 2016-08-24 | 北京小米移动软件有限公司 | Encryption and decryption method and device |
Also Published As
Publication number | Publication date |
---|---|
CN106384060A (en) | 2017-02-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106127076B (en) | A kind of inspection method and mobile terminal of photograph album photo | |
CN106384060B (en) | A kind of mobile terminal data encryption method and mobile terminal | |
CN106022196B (en) | A kind of method and intelligent terminal of information sharing | |
AU2014327030B2 (en) | Scrambling passcode entry interface | |
US9613356B2 (en) | Secure passcode entry user interface | |
AU2022204797B2 (en) | Raw sensor input encryption for passcode entry security | |
CN106203061B (en) | Encryption method of application program and mobile terminal | |
CN107180203B (en) | Image encryption and decryption method, mobile terminal and computer readable storage medium | |
CN106027794B (en) | A kind of encryption method and mobile terminal of photo | |
CN104732121A (en) | Encryption setting method, decryption setting method and corresponding device of application program | |
US10203864B2 (en) | Information processing method and electronic apparatus | |
JP2020504407A (en) | Method and apparatus for starting application based on fingerprint identification | |
WO2012166613A1 (en) | Secure input via a touchscreen | |
CN105868617B (en) | Application program encryption method and mobile terminal | |
CN105827816B (en) | A kind of the split screen method and mobile terminal of terminal screen | |
CN107450799B (en) | Message display method and mobile terminal | |
TW201539247A (en) | Password input and verification method and system thereof | |
CN106228085B (en) | The method for secret protection and mobile terminal of application program | |
CN106156600B (en) | A kind of unlocking method and mobile terminal of application program | |
CN106250757B (en) | A kind of control method and mobile terminal of application program | |
CN106709457A (en) | Task execution method based on fingerprint, and mobile terminal | |
CN106355109A (en) | File encryption method and mobile terminal | |
CN106791542B (en) | A kind of panoramic picture image pickup method and mobile terminal | |
CN106778344B (en) | A kind of data permission control method and terminal | |
CN106326712B (en) | Picture processing method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |