CN106650479A - Encrypted note processing method and mobile terminal - Google Patents

Encrypted note processing method and mobile terminal Download PDF

Info

Publication number
CN106650479A
CN106650479A CN201611242882.8A CN201611242882A CN106650479A CN 106650479 A CN106650479 A CN 106650479A CN 201611242882 A CN201611242882 A CN 201611242882A CN 106650479 A CN106650479 A CN 106650479A
Authority
CN
China
Prior art keywords
note
fuzzy
content
target
target note
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611242882.8A
Other languages
Chinese (zh)
Other versions
CN106650479B (en
Inventor
唐俊坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201611242882.8A priority Critical patent/CN106650479B/en
Publication of CN106650479A publication Critical patent/CN106650479A/en
Application granted granted Critical
Publication of CN106650479B publication Critical patent/CN106650479B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an encrypted note processing method and a mobile terminal. The method includes the steps that encryption operation on a target note is received; fuzzy processing is conducted on content of the target note, and a fuzzy note is obtained, wherein the fuzzy note displays partial content of the target note; the fuzzy note is displayed. Thus, by means of the encrypted note processing method and the mobile terminal, a basis can be provided for a user to search for an encrypted note, the user can judge whether a note is the note needing to be found according to the fuzzy note, the user can search for the encrypted note conveniently, and the user experience can be improved.

Description

One kind encryption note processing method and mobile terminal
Technical field
The present invention relates to Display Processing Technology field, more particularly to a kind of encryption note processing method and mobile terminal.
Background technology
With people live and work enrich constantly, people often record some information using paper note, with Prevent from oneself from forgetting.Nowadays, with the continuous development of electronic technology, current major part mobile terminal (such as mobile phone, panel computer Deng) can support that user creates electronics note (hereinafter referred to as note) and carrys out record information, can carry to the life of user or work For very big convenience.
In order to protect individual privacy, user to be encrypted to note, user needs the ability after successful decryption Check the content of note.Consequently, it is possible to if user is provided with multiple different notes, user needs to enter each note one by one Row decryption processing checks that particular content can just find that note of oneself needs.It can be seen that, note not side is encrypted in prior art Just user searches, and affects Consumer's Experience.
The content of the invention
The embodiment of the present invention provides a kind of encryption note processing method and mobile terminal, to solve prior art in encrypt just Sign inconvenient user to search, affect the problem of Consumer's Experience.
In a first aspect, embodiments providing a kind of encryption note processing method, methods described includes:
Receive the cryptographic operation to target note;
Fuzzy Processing is carried out to the content of the target note, fuzzy note is obtained, wherein, the fuzzy note shows institute State the partial content of target note;
Show the fuzzy note.
Second aspect, the embodiment of the present invention also provides a kind of mobile terminal, and the mobile terminal includes:
Receiver module, for receiving the cryptographic operation to target note;
Processing module, for carrying out Fuzzy Processing to the content of the target note, obtains fuzzy note, wherein, it is described Fuzzy note shows the partial content of the target note;
Display module, for showing the fuzzy note.
In embodiments of the present invention, the encryption note processing method receives the cryptographic operation to target note;To described The content of target note carries out Fuzzy Processing, obtains fuzzy note, wherein, the fuzzy note shows the portion of the target note Divide content;Show the fuzzy note.So, the encryption note processing method and mobile terminal that the present invention is provided can be to user Search encryption note and foundation is provided, user can judge the encryption for whether oneself requiring to look up just according to the fuzzy note Sign, facilitate user to search encryption note, strengthen Consumer's Experience.
Description of the drawings
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below will be to needed for embodiment of the present invention description The accompanying drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, For those of ordinary skill in the art, without having to pay creative labor, can be being obtained according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is a kind of flow chart of encryption note processing method that first embodiment of the invention is provided;
Fig. 2 is the flow chart of another kind of encryption note processing method that second embodiment of the invention is provided;
Fig. 3 is a kind of note schematic diagram that second embodiment of the invention is provided;
Fig. 4 is a kind of obscuring layer schematic diagram that second embodiment of the invention is provided;
Fig. 5 is another kind of obscuring layer schematic diagram that second embodiment of the invention is provided;
Fig. 6 is a kind of fuzzy note schematic diagram that second embodiment of the invention is provided;
Fig. 7 is the fuzzy note schematic diagram of another kind that second embodiment of the invention is provided;
Fig. 8 is a kind of structure chart of mobile terminal that third embodiment of the invention is provided;
Fig. 9 is the structure chart of another kind of mobile terminal that third embodiment of the invention is provided;
Figure 10 is the structure chart of another kind of mobile terminal that third embodiment of the invention is provided;
Figure 11 is the structure chart of another kind of mobile terminal that fourth embodiment of the invention is provided.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than the embodiment of whole.Based on this Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
First embodiment
Referring to Fig. 1, Fig. 1 be it is provided in an embodiment of the present invention it is a kind of encryption note processing method flow chart, the encryption Note processing method is applied in a mobile terminal, as shown in figure 1, the encryption note processing method includes:
The cryptographic operation of step 101, reception to target note.
In the step, the encryption note processing method receives the cryptographic operation to target note, that is to say, that this enforcement The method that example is provided is rear execution step 102 encrypted in the target note.The cryptographic operation to target note can be with Be user on the mobile terminal to the cryptographic operation of the target note, the cryptographic operation can be created in target note Front execution, for example, user can select to encrypt the target note in newly-built note;It can also be created in target note Perform afterwards and before completing to edit, i.e., user can immediately encrypt after target note is created, it is also possible in editing process The target note is encrypted;User can be added with performing after completing editor in the target note to the target note Close operation.It should be noted that the embodiment of the present invention is not limited the encryption times and cryptographic operation type of target note.
Step 102, the content to the target note carry out Fuzzy Processing, obtain fuzzy note, wherein, it is described to obscure just Sign the partial content for showing the target note.
In the step, to described after the cryptographic operation that the encryption note processing method receives to the target note The content of target note carries out Fuzzy Processing, obtains fuzzy note.The fuzzy note is shown in the part of the target note Hold, that is to say, that the encryption note processing method can carry out Fuzzy Processing to all the elements of the target note so that Note after Fuzzy Processing can faintly show the partial content of the target note such that it is able to allow user according to the mould The content that paste shows determines that the target note is the note oneself to be searched.The encryption note processing method can also be right The partial content of the target note carries out Fuzzy Processing so that the note after Fuzzy Processing can clearly display the target A part of content of note, the fuzzy another part content for showing or not showing the target note, so as to user being capable of root That note of oneself needs is searched according to the fuzzy note.
The encryption note processing method can be superimposed an obscuring layer on the target note, so as to realize to the mesh The Fuzzy Processing of the content of mark note, it is also possible to by adding horse to the content on the target note on the target note Sai Ke so that the content on the target note thickens.It should be noted that the encryption note processing method is to described The Fuzzy Processing mode of target note is not limited in the present embodiment.
Step 103, the display fuzzy note.
In the step, the encryption note processing method shows the fuzzy note so that user can be according to the mould Paste note determines the approximate contents of the target note such that it is able to further determine that the whether note for oneself requiring to look up. And for other users, even if a small amount of information for learning the target note can be obscured through the fuzzy note, but do not have There is the clear crytpographic key of the target note, it is impossible to further check the particular content of the fuzzy note.It can be seen that, the encryption is just Signing processing method can facilitate user to differentiate in the case where the main contents for protecting the target note are not compromised, Yong Huke To search the note oneself wanted according to the fuzzy note.
In the embodiment of the present invention, above-mentioned mobile terminal can be any mobile terminal for possessing shoot function, for example:Hand Machine, panel computer (Tablet Personal Computer), kneetop computer (Laptop Computer), individual digital are helped Reason (personal digital assistant, abbreviation PDA), mobile Internet access device (Mobile Internet Device, ) or Wearable device (Wearable Device) etc. MID.
The encryption note processing method of first embodiment of the invention receives the cryptographic operation to target note;To the target The content of note carries out Fuzzy Processing, obtains fuzzy note, wherein, the fuzzy note is shown in the part of the target note Hold;Show the fuzzy note.So, the encryption note processing method and mobile terminal that the present invention is provided can be searched to user Encryption note provides foundation, the encryption note whether user oneself can require to look up according to the fuzzy note judgement, side Just user searches encryption note, strengthens Consumer's Experience.
Second embodiment
Referring to Fig. 2, Fig. 2 is the flow chart of another kind of encryption note processing method that second embodiment of the invention is provided, such as Shown in Fig. 2, the encryption note processing method includes:
The cryptographic operation of step 201, reception to target note.
The step 201 is identical with the step 101 in first embodiment of the invention, will not be described here.
Step 202, on the target note obscuring layer is superimposed, obtains fuzzy note, wherein, the fuzzy note shows The partial content of the target note.
In the step, the encryption note processing method is superimposed an obscuring layer on the target note, obtains obscuring just Sign, the fuzzy note shows the partial content of the target note.The obscuring layer is to be obscured the target note The target note can be carried out being obtained after Gaussian Blur process by the obscuring layer obtained after process, such as described obscuring layer Blurred picture, or the blurred picture obtained after fuzzy masking-out is added on the target note, the obscuring layer Can also be a fuzzy masking-out.The fuzzy masking-out is one layer and enables to image blurring figure layer, for example, can be understood as covering Plank on image so that image blurring.It should be noted that the encryption note processing method is on the target note It can also be other obscuring layers that the obscuring layer of addition can be above-mentioned various obscuring layers, and here is not limited.
Step 203, the display fuzzy note.
The step 203 is identical with the step 103 in first embodiment of the invention, will not be described here.
Alternatively, it is described to be superimposed obscuring layer on the target note, fuzzy note is obtained, including:
The first obscuring layer is superimposed on the target note, fuzzy note is obtained, wherein, first obscuring layer is by institute State the first blurred picture that target note carries out being obtained after Gaussian Blur process;Or
The second obscuring layer is superimposed on the target note, fuzzy note is obtained, wherein, according to second obscuring layer The pixel of fuzzy masking-out and the target note is by the fuzzy masking-out with the target note with default overlay model The second blurred picture for obtaining is drawn in superposition;Or
The 3rd obscuring layer is superimposed on the target note, fuzzy note is obtained, wherein, the 3rd obscuring layer is fuzzy Masking-out.
In the embodiment, the encryption note processing method can be superimposed the first obscuring layer on the target note, its In, first obscuring layer is that the target note is carried out into the first blurred picture for obtaining after Fuzzy Processing.Specifically, it is described Encryption note processing method can carry out sectional drawing to the content of the target note, obtain including the content of the target note Picture, the picture can be common sectional drawing photo, or bitmap (bitmap), then to described including the target The picture of the content of note carries out Fuzzy Processing, so as to obtain the first blurred picture.It is described that mould is carried out to picture in the embodiment The mode that paste is processed is to carry out Gaussian Blur process, it is to be understood that in other embodiments of the present invention, described that picture is entered The mode of row Fuzzy Processing can also be other Fuzzy Processing modes, and here is not limited.
The encryption note processing method can also be superimposed the second obscuring layer on the target note, wherein, described the Two obscuring layers be according to the pixel of fuzzy masking-out and the target note by the fuzzy masking-out and the target note with The second blurred picture for obtaining is drawn in default overlay model superposition.Specifically, the encryption note processing method can be to institute Stating the content of target note carries out sectional drawing, the picture of the content for obtaining including the target note, then according to the picture with And the picture and the fuzzy masking-out are overlapped drafting by the pixel of fuzzy masking-out with default overlay model, so as to Obtain the second blurred picture.The fuzzy masking-out 202 is explained in detail the step of the present embodiment, and here is no longer gone to live in the household of one's in-laws on getting married State.The overlay model can include only showing superimposed layer content and the full content after display superposition etc., the superposition mould The difference of formula refers to that the show layers that superposition is obtained after drawing is different, and the embodiment of the present invention is not done to the default overlay model It is concrete to limit.
The encryption note processing method can be superimposed the 3rd obscuring layer on the target note, wherein, described the Three obscuring layers are fuzzy masking-out.In the embodiment, methods described is directly superimposed fuzzy masking-out, the mould on the target note The content that paste masking-out is enabled on the target note thickens, so as to reach blur effect.
Alternatively, the target note includes first content and the second content, first blurred picture or second Blurred picture includes clearly first content and the second fuzzy content.
The full content of the target note can be carried out Fuzzy Processing by the encryption note processing method, it is also possible to will The partial content of the target note carries out Fuzzy Processing.That is, first blurred picture or the second blurred picture can Being that the full content of the target note is carried out into the image after Fuzzy Processing, or the part by the target note Content carries out the image after Fuzzy Processing.For example, with reference to Fig. 3, Fig. 3 is a kind of showing for note that second embodiment of the invention is provided It is intended to, it is now assumed that target note 301 includes content as shown in Figure 3, the obscuring layer can be as shown in Figure 4 by the mesh The full content of mark note 301 carries out the obscuring layer 302 of Fuzzy Processing, or as shown in Figure 5 by the target note 301 partial content carries out the obscuring layer 302 of Fuzzy Processing.
In the present embodiment, the target note includes first content and the second content, first blurred picture or Second blurred picture includes clearly first content and the second fuzzy content.Specifically, methods described can be by including institute The second content in the picture of the content for stating target note carries out Gaussian Blur process, the first content is not processed, So as to obtain the first blurred picture for including clearly first content and the second fuzzy content.Similarly, methods described In the fuzzy masking-out of superposition in the second content in the picture including the target note, and can not fold on the first content Plus fuzzy masking-out, so as to obtain the second blurred picture for including clearly first content and the second fuzzy content.
It should be noted that above-mentioned first content and the second content can be the contents of preset content, predeterminated position The content of (such as first trip content etc.), or random site, here is not limited.
Alternatively, the obscuring layer covers the full content of the target note or covers the part of the target note Content.
In the embodiment of the present invention, the obscuring layer can cover the full content of the target note, obtain as shown in Figure 6 Fuzzy note 300.The partial content of the target note can also be covered, fuzzy note 300 as shown in Figure 7 is obtained.Need It is noted that either above-mentioned any coverage mode, as long as ensure that the fuzzy note shows the target just The partial content of label, facilitates user to search note, within the protection domain of the embodiment of the present invention.
Alternatively, it is described to show that methods described also includes after the fuzzy note:
If the target note successful decryption, the obscuring layer is hidden, and show the content of the target note.
In the embodiment, if the mobile terminal receives decryption oprerations of the user to the target note, and institute is judged State target note whether successful decryption.Methods described hides the obscuring layer after the target note successful decryption, and shows Show the content of the target note, so, user can check all clear content of the target note.
Alternatively, the content to the target note carries out Fuzzy Processing, obtains fuzzy note, including:
Receive user to the edit operation of the content of the target note and target note described in real-time update content;
Fuzzy Processing is carried out to the content of the target note every Preset Time, fuzzy note is obtained.
In an embodiment of the present invention, the content of the target note can be it is static, i.e., it is changeless, it is also possible to It is dynamic, i.e. real-time update.That is, methods described can be after the target note editor completes to the mesh The content of mark note carries out Fuzzy Processing, it is also possible to the content of the target note is entered in the target note editing process The real-time Fuzzy Processing of row.
In the present embodiment, edit operation and real-time update of the methods described receive user to the content of the target note The content of the target note, and the content of the target note is obscured after the content for updating the target note Process, or Fuzzy Processing is carried out to the content of the target note every Preset Time.So, methods described can be described The content that the target note is protected in the editing process of target labels do not seen by other people, protects the privacy of user.
The encryption note processing method of second embodiment of the invention receives the cryptographic operation to target note;In the target Obscuring layer is superimposed on note, fuzzy note is obtained, wherein, the fuzzy note shows the partial content of the target note;It is aobvious Show the fuzzy note.So, the encryption note processing method and mobile terminal that the present invention is provided can be searched to user encrypts Note provides foundation, and the encryption note whether user oneself can require to look up according to the fuzzy note judgement is convenient to use Encryption note is searched at family, strengthens Consumer's Experience.
3rd embodiment
It is a kind of structure chart of mobile terminal that third embodiment of the invention is provided, as shown in figure 8, the shifting referring to Fig. 8 Dynamic terminal 800 includes:
Receiver module 801, for receiving the cryptographic operation to target note;
Processing module 802, for carrying out Fuzzy Processing to the content of the target note, obtains fuzzy note, wherein, institute State the partial content that fuzzy note shows the target note;
Display module 803, for showing the fuzzy note.
Alternatively, the processing module 802, for being superimposed obscuring layer on the target note, obtains fuzzy note.
Alternatively, the processing module 802 is used for:
The first obscuring layer is superimposed on the target note, fuzzy note is obtained, wherein, first obscuring layer is by institute State the first blurred picture that target note carries out being obtained after Gaussian Blur process;Or
The second obscuring layer is superimposed on the target note, fuzzy note is obtained, wherein, according to second obscuring layer The pixel of fuzzy masking-out and the target note is by the fuzzy masking-out with the target note with default overlay model The second blurred picture for obtaining is drawn in superposition;Or
The 3rd obscuring layer is superimposed on the target note, fuzzy note is obtained, wherein, the 3rd obscuring layer is fuzzy Masking-out.
Alternatively, the target note includes first content and the second content, first blurred picture or second Blurred picture includes clearly first content and the second fuzzy content.
Alternatively, the obscuring layer covers the full content of the target note or covers the part of the target note Content.
Alternatively, it is the structure chart of another kind of mobile terminal that third embodiment of the invention is provided, such as Fig. 9 institutes referring to Fig. 9 Show, the mobile terminal 800 also includes:
Hidden module 804, if for the target note successful decryption, hiding the obscuring layer, and shows described fuzzy The content of note.
Alternatively, referring to Figure 10, be third embodiment of the invention provide another kind of mobile terminal structure chart, such as Figure 10 Shown, the content of the target note is dynamic, and the processing module 802 includes:
Receiving unit 8021, for receive user to described in the edit operation of the content of the target note and real-time update The content of target note;
Processing unit 8022, Fuzzy Processing is carried out for each Preset Time to the content of the target note, obtains mould Paste note.
Mobile terminal 800 can realize each process that mobile terminal is realized in the embodiment of the method for Fig. 1 to Fig. 3, to keep away Exempt to repeat, will not be described here.
Fourth embodiment
Referring to Figure 11, Figure 11 is the structural representation of another kind of mobile terminal 1 100 that the present invention is provided, as shown in figure 11, Mobile terminal 1 100 includes:At least one processor 1101, memory 1102, at least one user interface 1103 and network interface 1104.Each component in mobile terminal 1 100 is coupled by bus system 1105, it is understood that bus system 1105 are used to realize the connection communication between these components.Bus system 1105 is also total including power supply in addition to including data wire Line, controlling bus and status signal bus in addition.But for the sake of for clear explanation, in fig. 11 various buses are all designated as into total linear system System 1105.
Wherein, user interface 1103 can include display, keyboard or pointing device, such as mouse, trace ball (trackball), touch-sensitive plate or touch-screen etc..
It is appreciated that the memory 1102 in the embodiment of the present invention can be volatile memory or non-volatile memories Device, or may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage (Read-Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), erasable programmable are only Read memory (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, ) or flash memory EEPROM.Volatile memory can be random access memory (Random Access Memory, RAM), its use Make External Cache.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static random-access Memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random-access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), it is enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronous Connection dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memory 1102 of system and method described herein be intended to including but not limited to this The memory of a little and any other suitable type.
In some embodiments, memory 1102 stores following element, can perform module or data structure, or Person their subset, or their superset:Operating system 11021 and application program 11022.
Wherein, operating system 11021, comprising various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and process hardware based task.Application program 11022, comprising various application programs, such as matchmaker Body player (Media Player), browser (Browser) etc., for realizing various applied business.Realize that the present invention is implemented The program of example method may be embodied in application program 11022.
In embodiments of the present invention, by call memory 1102 store program or instruction, specifically, can be application The program stored in program 11022 or instruction, processor 1101 is used for:
Receive the cryptographic operation to target note;
Fuzzy Processing is carried out to the content of the target note, fuzzy note is obtained, wherein, the fuzzy note shows institute State the partial content of target note;
Show the fuzzy note.
The method that the embodiments of the present invention are disclosed can apply in processor 1101, or real by processor 1101 It is existing.A kind of possibly IC chip of processor 1101, the disposal ability with signal.During realization, said method Each step can be completed by the instruction of the integrated logic circuit of the hardware in processor 1101 or software form.Above-mentioned Processor 1101 can be general processor, digital signal processor (Digital Signal Processor, DSP), special Integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic, Discrete hardware components.Can realize or perform disclosed each method in the embodiment of the present invention, step and logic diagram.It is general Processor can be microprocessor or the processor can also be any conventional processor etc..With reference to embodiment of the present invention institute The step of disclosed method, can be embodied directly in hardware decoding processor and perform and complete, or with the hardware in decoding processor And software module combination execution is completed.Software module may be located at random access memory, and flash memory, read-only storage may be programmed read-only In the ripe storage medium in this area such as memory or electrically erasable programmable memory, register.The storage medium is located at Memory 1102, processor 1101 reads the information in memory 1102, the step of complete said method with reference to its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combine to realize.For hardware is realized, processing unit can be realized in one or more special ICs (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for performing herein described function or its combination.
For software is realized, can be realized herein by performing the module (such as process, function etc.) of function described herein Described technology.Software code is storable in memory and by computing device.Memory can within a processor or Realize processor outside.
Alternatively, the content of the target note of the processor 1101 pairs carries out Fuzzy Processing, obtains fuzzy note, bag Include:
Obscuring layer is superimposed on the target note, fuzzy note is obtained.
Alternatively, the processor 1101 is superimposed obscuring layer on the target note, obtains fuzzy note, including:
The first obscuring layer is superimposed on the target note, fuzzy note is obtained, wherein, first obscuring layer is by institute State the first blurred picture that target note carries out being obtained after Gaussian Blur process;Or
The second obscuring layer is superimposed on the target note, fuzzy note is obtained, wherein, according to second obscuring layer The pixel of fuzzy masking-out and the target note is by the fuzzy masking-out with the target note with default overlay model The second blurred picture for obtaining is drawn in superposition;Or
The 3rd obscuring layer is superimposed on the target note, fuzzy note is obtained, wherein, the 3rd obscuring layer is fuzzy Masking-out.
Alternatively, the target note includes first content and the second content, first blurred picture or second Blurred picture includes clearly first content and the second fuzzy content.
Alternatively, the obscuring layer covers the full content of the target note or covers the part of the target note Content.
Alternatively, the processor 1101 shown after the fuzzy note, is additionally operable to:
If the target note successful decryption, the obscuring layer is hidden, and show the content of the target note.
Alternatively, the content of the target note of the processor 1101 pairs carries out Fuzzy Processing, obtains fuzzy note, bag Include:
Receive user to the edit operation of the content of the target note and target note described in real-time update content;
Fuzzy Processing is carried out to the content of the target note every Preset Time, fuzzy note is obtained.
Mobile terminal 1 100 can realize each process that mobile terminal 1 100 is realized in previous embodiment, to avoid weight It is multiple, repeat no more here.
The mobile terminal 1 100 of the embodiment of the present invention, determines the first watermark information;During video record, by what is recorded Each frame of video carries out synthesis process with first watermark information;Generate the video comprising first watermark information.So, The mobile terminal that the present embodiment is provided can add watermark during video record in each frame of video, simplify in video Increase the troublesome operation of watermark, provide the user very big convenience.
Those of ordinary skill in the art are it is to be appreciated that the list of each example with reference to the embodiments described herein description Unit and algorithm steps, being capable of being implemented in combination in electronic hardware or computer software and electronic hardware.These functions are actually Performed with hardware or software mode, depending on the application-specific and design constraint of technical scheme.Professional and technical personnel Each specific application can be used different methods to realize described function, but this realization it is not considered that exceeding The scope of the present invention.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can pass through other Mode is realized.For example, device embodiment described above is only schematic, and for example, the division of the unit is only A kind of division of logic function, can there is an other dividing mode when actually realizing, such as multiple units or component can with reference to or Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit Connect, can be electrical, mechanical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be according to the actual needs selected to realize embodiment of the present invention scheme Purpose.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function is realized and as independent production marketing or when using using in the form of SFU software functional unit, can be with In being stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be individual People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the invention. And aforesaid storage medium includes:USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes Medium.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, all should contain Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.

Claims (14)

1. it is a kind of to encrypt note processing method, it is characterised in that methods described includes:
Receive the cryptographic operation to target note;
Fuzzy Processing is carried out to the content of the target note, fuzzy note is obtained, wherein, the fuzzy note shows the mesh The partial content of mark note;
Show the fuzzy note.
2. the method for claim 1, it is characterised in that the content to the target note carries out Fuzzy Processing, Fuzzy note is obtained, including:
Obscuring layer is superimposed on the target note, fuzzy note is obtained.
3. method as claimed in claim 2, it is characterised in that described to be superimposed obscuring layer on the target note, obtains mould Paste note, including:
The first obscuring layer is superimposed on the target note, fuzzy note is obtained, wherein, first obscuring layer is by the mesh Mark note carries out the first blurred picture obtained after Gaussian Blur process;Or
The second obscuring layer is superimposed on the target note, fuzzy note is obtained, wherein, second obscuring layer is according to fuzzy The pixel of masking-out and the target note is superimposed the fuzzy masking-out with default overlay model with the target note The second blurred picture that drafting is obtained;Or
The 3rd obscuring layer is superimposed on the target note, fuzzy note is obtained, wherein, the 3rd obscuring layer is fuzzy illiteracy Version.
4. method as claimed in claim 3, it is characterised in that the target note includes first content and the second content, First blurred picture or the second blurred picture include clearly first content and the second fuzzy content.
5. the method as described in claim 2 or 4, it is characterised in that the obscuring layer cover the target note all in Hold or cover the partial content of the target note.
6. method as claimed in claim 2, it is characterised in that after the display fuzzy note, methods described is also wrapped Include:
If the target note successful decryption, the obscuring layer is hidden, and show the content of the target note.
7. the method for claim 1, it is characterised in that the content to the target note carries out Fuzzy Processing, Fuzzy note is obtained, including:
Receive user to the edit operation of the content of the target note and target note described in real-time update content;
Fuzzy Processing is carried out to the content of the target note every Preset Time, fuzzy note is obtained.
8. a kind of mobile terminal, it is characterised in that the mobile terminal includes:
Receiver module, for receiving the cryptographic operation to target note;
Processing module, for carrying out Fuzzy Processing to the content of the target note, obtains fuzzy note, wherein, it is described fuzzy Note shows the partial content of the target note;
Display module, for showing the fuzzy note.
9. mobile terminal as claimed in claim 8, it is characterised in that the processing module, in the target note Superposition obscuring layer, obtains fuzzy note.
10. mobile terminal as claimed in claim 9, it is characterised in that the processing module is used for:
The first obscuring layer is superimposed on the target note, fuzzy note is obtained, wherein, first obscuring layer is by the mesh Mark note carries out the first blurred picture obtained after Gaussian Blur process;Or
The second obscuring layer is superimposed on the target note, fuzzy note is obtained, wherein, second obscuring layer is according to fuzzy The pixel of masking-out and the target note is superimposed the fuzzy masking-out with default overlay model with the target note The second blurred picture that drafting is obtained;Or
The 3rd obscuring layer is superimposed on the target note, fuzzy note is obtained, wherein, the 3rd obscuring layer is fuzzy illiteracy Version.
11. mobile terminals as claimed in claim 10, it is characterised in that the target note includes first content and second Content, first blurred picture or the second blurred picture include clearly first content and the second fuzzy content.
12. mobile terminals as described in claim 9 or 11, it is characterised in that the obscuring layer covers the target note The partial content of full content or the covering target note.
13. mobile terminals as claimed in claim 9, it is characterised in that the mobile terminal also includes:
Hidden module, if for the target note successful decryption, hiding the obscuring layer, and shows the interior of the fuzzy note Hold.
14. mobile terminals as claimed in claim 8, it is characterised in that the processing module includes:
Receiving unit, the edit operation to the content of the target note and target note described in real-time update for receive user Content;
Processing unit, for carrying out Fuzzy Processing to the content of the target note every Preset Time, obtains fuzzy note.
CN201611242882.8A 2016-12-29 2016-12-29 A kind of encryption note processing method and mobile terminal Active CN106650479B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611242882.8A CN106650479B (en) 2016-12-29 2016-12-29 A kind of encryption note processing method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611242882.8A CN106650479B (en) 2016-12-29 2016-12-29 A kind of encryption note processing method and mobile terminal

Publications (2)

Publication Number Publication Date
CN106650479A true CN106650479A (en) 2017-05-10
CN106650479B CN106650479B (en) 2018-08-17

Family

ID=58836527

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611242882.8A Active CN106650479B (en) 2016-12-29 2016-12-29 A kind of encryption note processing method and mobile terminal

Country Status (1)

Country Link
CN (1) CN106650479B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282469A (en) * 2018-01-04 2018-07-13 暨南大学 Support the steganography method extracted based on attribute information
CN113094723A (en) * 2021-03-29 2021-07-09 联想(北京)有限公司 Processing method, electronic equipment and processing device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101720070A (en) * 2009-11-11 2010-06-02 方亚南 Safety storage system of mobile phone short messages
CN103327164A (en) * 2012-03-23 2013-09-25 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and anti-peaking method thereof
CN104700371A (en) * 2015-03-18 2015-06-10 厦门美图之家科技有限公司 Generation method and system of masking
US20160246971A1 (en) * 2012-05-31 2016-08-25 Fleur De Lis Group, Llc Cryptic notes and related methods
CN105912199A (en) * 2016-04-01 2016-08-31 珠海格力电器股份有限公司 Information processing method and device
CN105959465A (en) * 2016-04-22 2016-09-21 珠海格力电器股份有限公司 Conference mode realization method, device and terminal
CN106127069A (en) * 2016-06-15 2016-11-16 珠海市魅族科技有限公司 Thumbnail treating method and apparatus and methods for interface management and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101720070A (en) * 2009-11-11 2010-06-02 方亚南 Safety storage system of mobile phone short messages
CN103327164A (en) * 2012-03-23 2013-09-25 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and anti-peaking method thereof
US20160246971A1 (en) * 2012-05-31 2016-08-25 Fleur De Lis Group, Llc Cryptic notes and related methods
CN104700371A (en) * 2015-03-18 2015-06-10 厦门美图之家科技有限公司 Generation method and system of masking
CN105912199A (en) * 2016-04-01 2016-08-31 珠海格力电器股份有限公司 Information processing method and device
CN105959465A (en) * 2016-04-22 2016-09-21 珠海格力电器股份有限公司 Conference mode realization method, device and terminal
CN106127069A (en) * 2016-06-15 2016-11-16 珠海市魅族科技有限公司 Thumbnail treating method and apparatus and methods for interface management and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108282469A (en) * 2018-01-04 2018-07-13 暨南大学 Support the steganography method extracted based on attribute information
CN108282469B (en) * 2018-01-04 2020-09-04 暨南大学 Steganography method supporting attribute information extraction
CN113094723A (en) * 2021-03-29 2021-07-09 联想(北京)有限公司 Processing method, electronic equipment and processing device

Also Published As

Publication number Publication date
CN106650479B (en) 2018-08-17

Similar Documents

Publication Publication Date Title
CN107169329A (en) A kind of method for protecting privacy, mobile terminal and computer-readable recording medium
CN104838388B (en) Secure local web application data management system
CN108874336A (en) A kind of information processing method and electronic equipment
CN107577956A (en) A kind of photo time slot scrambling and electronic equipment
US20120268258A1 (en) Electronic vehicle document display
US9141659B1 (en) Systems and methods for scrubbing confidential insurance account data
CN106844604A (en) The information providing method and mobile terminal of electronic map
CN104395882A (en) Creation and context-aware presentation of customized emoticon item sets
CN107506637A (en) Information displaying method and device, terminal and readable storage medium storing program for executing
CN106454182A (en) Video generation method and mobile terminal
CN106843655B (en) A kind of information display method and electronic equipment
CN107924263A (en) Touch thermal map
CN105468275A (en) Method and apparatus for performing operation on presented object
CN107644170A (en) A kind of image processing method and mobile terminal
CN106530222A (en) Picture saving method and mobile terminal
CN104765528A (en) Display method and device of virtual keyboard
US20090182573A1 (en) Multi-Party Payment System for Online Creative Works Sale
CN107766106A (en) The method and apparatus for generating configuration file
CN104346463A (en) Loading method and device of page label and browser client
CN106650479A (en) Encrypted note processing method and mobile terminal
US20230385426A1 (en) Encryption Method and Apparatus, Electronic Device, and Medium
CN105573696A (en) Electronic blackboard apparatus and controlling method thereof
CN106484225A (en) A kind of wallpaper changing method and mobile terminal
CN104657668A (en) Terminal
CN114756154A (en) File editing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20171110

Address after: 283 No. 523860 Guangdong province Dongguan city Changan town usha BBK Avenue

Applicant after: VIVO MOBILE COMMUNICATION CO., LTD.

Applicant after: Wewo Mobile Communication Co. Ltd. Beijing branch

Address before: 283 No. 523860 Guangdong province Dongguan city Changan town usha BBK Avenue

Applicant before: VIVO MOBILE COMMUNICATION CO., LTD.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200527

Address after: 283 No. 523860 Guangdong province Dongguan city Changan town usha BBK Avenue

Patentee after: VIVO MOBILE COMMUNICATION Co.,Ltd.

Address before: 283 No. 523860 Guangdong province Dongguan city Changan town usha BBK Avenue

Co-patentee before: Wewo Mobile Communication Co. Ltd. Beijing branch

Patentee before: VIVO MOBILE COMMUNICATION Co.,Ltd.

TR01 Transfer of patent right