CN108681664A - A kind of encryption method and device - Google Patents
A kind of encryption method and device Download PDFInfo
- Publication number
- CN108681664A CN108681664A CN201810524964.4A CN201810524964A CN108681664A CN 108681664 A CN108681664 A CN 108681664A CN 201810524964 A CN201810524964 A CN 201810524964A CN 108681664 A CN108681664 A CN 108681664A
- Authority
- CN
- China
- Prior art keywords
- target object
- pattern
- encryption
- input
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The embodiment of the invention discloses a kind of encryption method and devices, are related to field of communication technology, to solve the problems, such as that existing cipher mode compares limitation and flexibility is poor.The encryption method includes:Receive the first input of user on the first interface;In response to first input, target area corresponding with first input and prompt message are shown on first interface, for the prompt message for prompting user's selection to the encrypted encryption pattern of target object, which is the object in the target area;Receive second input of the user in the prompt message;In response to second input, the target object is encrypted using the first encryption pattern of user's selection.The encryption method can be applied in the scene to the content-encrypt of terminal.
Description
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of encryption method and devices.
Background technology
With will be used wider and wider for terminal, user increasingly puies forward personal information security, the demand of personal secrets
It rises.
Currently, can be by way of " private space " be arranged in the terminal to content-encrypt.Specifically, can be in terminal
Middle setting " private space ", and password is arranged to " private space ", when user needs to some content-encrypt, user can be with
Triggering terminal moves into the content in " private space ", with to the content-encrypt.In user needs use " private space "
When content, user can first input password triggering terminal and open " private space ", then reuse the content in " private space ".
However, in above-mentioned cipher mode, encrypted content will be needed to move into " private space " from original position by then passing through
To the content-encrypt, and user needs first triggering terminal to open " private space ", then reuses content therein, therefore
Above-mentioned cipher mode and manner of decryption are usually applicable only to moveable content-encrypt and decryption, i.e., this encryption and decryption side
It is poor that formula compares limitation, flexibility.
Invention content
The embodiment of the present invention provides a kind of encryption method and device, with solve existing encryption and manner of decryption compare limitation,
And the problem of flexibility difference.
In order to solve the above-mentioned technical problem, the invention is realized in this way:
In a first aspect, an embodiment of the present invention provides a kind of encryption method, it is applied to terminal, which includes:It connects
Receive the first input of user on the first interface;In response to first input, display and first input on first interface
Corresponding target area and prompt message, the prompt message are used to prompt user to select to the encrypted encryption pattern of target object,
The target object is the object in the target area;Receive second input of the user in the prompt message;In response to this second
Input encrypts the target object using the first encryption pattern of user's selection.
Second aspect, an embodiment of the present invention provides a kind of encryption device, which includes receiving module, display mould
Block and encrypting module.Receiving module is used to receive the first input of user on the first interface;Display module is used in response to connecing
The first input that module receives is received, target area corresponding with first input and prompt message are shown on first interface,
For the prompt message for prompting user's selection to the encrypted encryption pattern of target object, which is in the target area
Object;Receiving module is additionally operable to receive second input of the user in the prompt message;Encrypting module is used in response to receiving mould
The second input that block receives encrypts the target object using the first encryption pattern of user's selection.
The third aspect, an embodiment of the present invention provides a kind of terminal, which includes processor, memory and is stored in
On reservoir and the computer program that can run on a processor, the computer program realize above-mentioned first party when being executed by processor
The step of encryption method in face.
Fourth aspect, an embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage mediums
Computer program is stored in matter, which realizes the step of the encryption method in above-mentioned first aspect when being executed by processor
Suddenly.
In embodiments of the present invention, the first input by the user in response to receiving on the first interface, Ke Yi
Show that (prompt message is for prompting user to select for target area corresponding with the first input and prompt message on first interface
To the encrypted encryption pattern of target object, which is the object in the target area);And in response to the use received
Second input of the family in prompt message, encrypts the target object using the first encryption pattern of user's selection.Pass through the party
Case can make target object since (packaging) is encrypted to target object by using one or more encryption patterns
Show Styles changes, so that the target object is not easy to be identified, therefore by the way that target object packaging may be implemented
Show Styles encryption to target object.Compared with prior art, the encryption method of the embodiment of the present invention and device can be direct
Show Styles encryption to target object, without changing layout of the target object on interface, in this way, the embodiment of the present invention carries
The encryption method and device of confession be no longer limited to move content encryption, i.e., encryption method provided in an embodiment of the present invention and
The application range of device is wider and more flexible, better user experience.
5th aspect, an embodiment of the present invention provides a kind of decryption methods, are applied to terminal, which includes:
In the case of the first pattern display target object, first object input of the user on the target object is received;In response to this
First object inputs, in the case where the first object inputs corresponding first finger print information and meets the first preset fingerprint information,
The target object is shown with the second pattern;Wherein, which is the acquiescence Show Styles of the target object, second pattern
For the first encryption pattern that user is target object setting, which is used to encrypt the target object;Or
First pattern is the first encryption pattern, which is the acquiescence Show Styles of the target object.
6th aspect, an embodiment of the present invention provides a kind of decryption devices, which includes receiving module and display
Module.Receiving module is used in the case where target object show with the first pattern, reception user on the target object the
One target inputs;The first object that display module is used to receive in response to receiving module inputs, and inputs and corresponds in the first object
The first finger print information meet the first preset fingerprint information in the case of, which is shown with the second pattern;Wherein, this
One pattern is the acquiescence Show Styles of the target object, which is the first encryption sample that user is target object setting
Formula, the first encryption pattern are used to encrypt the target object;Or first pattern is the first encryption pattern, second sample
Formula is the acquiescence Show Styles of the target object.
7th aspect, an embodiment of the present invention provides a kind of terminal, which includes processor, memory and is stored in
On reservoir and the computer program that can run on a processor, the computer program realize above-mentioned 5th side when being executed by processor
The step of decryption method in face.
Eighth aspect, an embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage mediums
Computer program is stored in matter, which realizes the step of the decryption method in above-mentioned 5th aspect when being executed by processor
Suddenly.
In embodiments of the present invention, with the first pattern display target object, user can be received in the mesh
The first object input on object is marked, and is inputted in response to the first object, corresponding first fingerprint is inputted in the first object
In the case that information meets the first preset fingerprint information, with the second pattern display target object, wherein the first pattern is target pair
The acquiescence Show Styles of elephant, the second pattern are the first encryption pattern that user is target object setting, and the first encryption pattern is used for
Target object is encrypted;Or first pattern be first encryption pattern, the second pattern be target object acquiescence Show Styles.It is logical
The program is crossed, after being encrypted to the Show Styles of target object, since the display sample of encrypted target object can be triggered
Formula switches between the first encryption pattern and acquiescence Show Styles, therefore the display directly to target object after encryption may be implemented
The decryption of pattern.Compared with prior art, the decryption method of the embodiment of the present invention and device can be directly to encrypted targets
Object is decrypted, and without being decrypted again to encrypted target object in individual private space, therefore the present invention is implemented
The decryption method and device that example provides are no longer limited to that target object is decrypted in individual private space, i.e., of the invention
The application range of decryption method and device that embodiment provides is wider and more flexible, better user experience.
Description of the drawings
Fig. 1 is a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention;
Fig. 2 is one of the schematic diagram of encryption method provided in an embodiment of the present invention;
Fig. 3 is one of the schematic diagram at interface provided in an embodiment of the present invention;
Fig. 4 is the schematic diagram of encryption pattern provided in an embodiment of the present invention;
Fig. 5 is the two of the schematic diagram of encryption method provided in an embodiment of the present invention;
Fig. 6 is the three of the schematic diagram of encryption method provided in an embodiment of the present invention;
Fig. 7 is one of the schematic diagram of ciphering process provided in an embodiment of the present invention;
Fig. 8 is the two of the schematic diagram of ciphering process provided in an embodiment of the present invention;
Fig. 9 is the four of the schematic diagram of encryption method provided in an embodiment of the present invention;
Figure 10 is one of the schematic diagram of decrypting process provided in an embodiment of the present invention;
Figure 11 is one of the schematic diagram of decryption method provided in an embodiment of the present invention;
Figure 12 is the two of the schematic diagram of decryption method provided in an embodiment of the present invention;
Figure 13 is one of the structural schematic diagram of encryption device provided in an embodiment of the present invention;
Figure 14 is the second structural representation of encryption device provided in an embodiment of the present invention;
Figure 15 is one of the structural schematic diagram of decryption device provided in an embodiment of the present invention;
Figure 16 is the hardware schematic of terminal provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
The terms "and/or" is a kind of incidence relation of description affiliated partner, indicates may exist three kinds of relationships,
For example, A and/or B, can indicate:Individualism A exists simultaneously A and B, these three situations of individualism B.Symbol herein
"/" indicates that affiliated partner is relationship such as A/B expressions A or B either.
Term " first " and " second " in description and claims of this specification etc. are for distinguishing different pairs
As, rather than for the particular order of description object.For example, the first input and the second input etc. are different defeated for distinguishing
Enter, rather than the particular order for describing input.
In embodiments of the present invention, " illustrative " or " such as " etc. words for indicate make example, illustration or explanation.This
Be described as in inventive embodiments " illustrative " or " such as " any embodiment or design scheme be not necessarily to be construed as comparing
Other embodiments or design scheme more preferably or more advantage.Specifically, use " illustrative " or " such as " etc. words purport
Related notion is being presented in specific ways.
In the description of the embodiment of the present invention, unless otherwise indicated, the meaning of " plurality " is refer to two or more,
For example, multiple target objects refer to two or more target object etc..
A kind of encryption method of offer of the embodiment of the present invention and device, on the first interface by the user in response to receiving
The first input, target area corresponding with the first input and prompt message (prompt letter can shows on first interface
For breath for prompting user's selection to the encrypted encryption pattern of target object, which is the object in the target area);And
And second input of the user in response to receiving in prompt message, using the first encryption pattern of user's selection to the target
Object encryption.It with this solution, can since (packaging) is encrypted to target object by using one or more encryption patterns
So that the Show Styles of target object changes, so that the target object is not easy to be identified, therefore by target
The Show Styles encryption to target object may be implemented in object encapsulation.Compared with prior art, the encryption side of the embodiment of the present invention
Method and device can directly encrypt the Show Styles of target object, without changing layout of the target object on interface, such as
This, encryption method provided in an embodiment of the present invention and device are no longer limited to the encryption to moving content, i.e. the present invention is implemented
The application range of encryption method and device that example provides is wider and more flexible, better user experience.
A kind of decryption method of offer of the embodiment of the present invention and device, with the first pattern display target object,
First object input of the user on the target object can be received, and is inputted in response to the first object, in the first object
It inputs in the case that corresponding first finger print information meets the first preset fingerprint information, with the second pattern display target object,
In, the first pattern is the acquiescence Show Styles of target object, and the second pattern is the first encryption sample that user is target object setting
Formula, the first encryption pattern are used to encrypt target object;Or first pattern be first encryption pattern, the second pattern be target pair
The acquiescence Show Styles of elephant.With this solution, after being encrypted to the Show Styles of target object, due to it can trigger encryption after
Target object Show Styles first encryption pattern and acquiescence Show Styles between switch, therefore may be implemented direct pair plus
The decryption of the Show Styles of target object after close.Compared with prior art, the decryption method of the embodiment of the present invention and device can be with
Directly encrypted target object is decrypted, without again in individual private space to encrypted target object solution
It is close, therefore decryption method provided in an embodiment of the present invention and device are no longer limited in individual private space to target object
Be decrypted, i.e., the application range of decryption method provided in an embodiment of the present invention and device is wider and more flexible, user experience compared with
It is good.
Terminal in the embodiment of the present invention can be the terminal with operating system.The operating system can be Android
(Android) operating system can be ios operating systems, can also be other possible operating systems, the embodiment of the present invention is not
Make specific limit.
Below by taking Android operation system as an example, introduces encryption and decryption approaches provided in an embodiment of the present invention and applied
Software environment.
As shown in Figure 1, being a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention.Scheming
In 1, the framework of Android operation system includes 4 layers, respectively:Application layer, application framework layer, system operation library layer and
Inner nuclear layer (is specifically as follows Linux inner core).
Wherein, application layer includes each application program (including system application and in Android operation system
Tripartite's application program).
Application framework layer is the frame of application program, and developer can be in the exploitation of the frame in accordance with application program
In the case of principle, some application programs are developed based on application framework layer.
System operation library layer includes library (also referred to as system library) and Android operation system running environment.Library is mainly Android behaviour
All kinds of resources needed for it are provided as system.Android operation system running environment is used to provide software loop for Android operation system
Border.
Inner nuclear layer is the operating system layer of Android operation system, belongs to the bottom of Android operation system software level.It is interior
Stratum nucleare provides core system service and hardware-related driver based on linux kernel for Android operation system.
By taking Android operation system as an example, in the embodiment of the present invention, developer can be based on above-mentioned Android as shown in Figure 1
The system architecture of operating system, the software program of encryption and decryption approaches provided in an embodiment of the present invention is realized in exploitation, to make
Obtaining the encryption and decryption approaches can be run based on Android operation system as shown in Figure 1.I.e. processor or terminal can lead to
It crosses and runs software program realization encryption and decryption approaches provided in an embodiment of the present invention in Android operation system.
Terminal in the embodiment of the present invention can be mobile terminal, or immobile terminal.Illustratively, mobile whole
End can be mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device, super mobile personal meter
Calculation machine (ultra-mobile personal computer, UMPC), net book or personal digital assistant (personal
Digital assistant, PDA) etc., immobile terminal can be personal computer (personal computer, PC), electricity
Depending on machine (television, TV), automatic teller machine or self-service machine etc., the embodiment of the present invention is not especially limited.
The executive agent of encryption and decryption approaches provided in an embodiment of the present invention can be above-mentioned terminal, or should
The function module and/or functional entity that the encryption and decryption approaches can be realized in terminal, specifically can be according to actual use
Demand determines that the embodiment of the present invention is not construed as limiting.Below by taking terminal as an example, encryption provided in an embodiment of the present invention is conciliate respectively
Decryption method is illustratively illustrated.
As shown in Fig. 2, the embodiment of the present invention provides a kind of encryption method, which can be applied to terminal, should add
Decryption method may include following step 201- steps 204.
Step 201, terminal receive the first input of user on the first interface.
In the embodiment of the present invention, the first interface can be any one interface shown on the screen of terminal, such as main boundary
Face or the interface (interface of application can be any one interface in application) etc. of application.
Optionally, first input of the user on the arbitrary region at first interface, can be with triggering terminal to the region
In include the process that is encrypted of target object (such as icon, text).Wherein, first input can be click, again by or
The inputs such as person's long-press.
Step 202, in response to first input, terminal show on the first interface target area corresponding with the first input and
Prompt message.
Wherein, which can be used for prompting user's selection to the encrypted encryption pattern of target object, the target pair
As for the object in target area.
Optionally, in the embodiment of the present invention, target area can be terminal according to user's on the first interface first defeated
Enter identified region.In the region encrypted target object, such as application icon, file, picture, text are needed comprising user
At least one of this and control etc..Illustratively, as shown in (a) in Fig. 3, if user wants to add shopping application
It is close, then user can grow (such as long-press 5s, i.e., the above-mentioned first input) at preset timed intervals on the icon of the shopping application,
For terminal after receiving the first input of user, terminal can determine target area corresponding with first input, and the
The target area is shown on one interface.
Optionally, in the embodiment of the present invention, the shape of above-mentioned target area can be rectangle, circle or ellipse etc.,
It can specifically be determined according to actual use demand, the embodiment of the present invention is not construed as limiting.
Optionally, in the embodiment of the present invention, above-mentioned prompt message can be tabular form, wherein preserving encryption section
With region to be encrypted (i.e. fixed target area), thus user can select to the encipherment scheme of encryption section (i.e. plus
Close pattern) it modifies, or can select to determine its encipherment scheme for region to be encrypted.Optionally, the embodiment of the present invention
In, above-mentioned prompt message can be the prompting frame for including multiple prompt options, wherein the encryption of prompt options instruction target object
Pattern.The form of above-mentioned prompt message can specifically determine that the embodiment of the present invention is not construed as limiting according to actual use demand.
Illustratively, it is determined in user's triggering terminal and after display target region, terminal can be in the target area
Side (shown in (b) in such as Fig. 3, target area is ellipse) display is for prompting user to select the prompt letter of encryption pattern
Breath, which may include multiple prompt options, and a prompt options can serve to indicate that a kind of encryption pattern.The encryption
Pattern can be preset encryption pattern or user-defined encryption pattern.Wherein, preset encryption pattern may include
Mysterious pack pattern and camouflage pack pattern etc.;User-defined encryption pattern can be user according to personal like or reality
The content for inputting or being arranged is needed, for example, picture or text input by user etc. that user uploads.Optionally, user makes by oneself
The encryption pattern of justice can also include the change to the color, shape of the acquiescence Show Styles of target object, specifically can basis
Actual use demand determines that the embodiment of the present invention is not construed as limiting.
Illustratively, as shown in (b) in Fig. 3, prompt message may include 3 prompt options, 3 prompt options point
It is not used to indicate mysterious pack pattern, camouflage pack pattern, User Defined pack pattern, thus user can be according to actually making
With demand, one or more encryption patterns are selected from 3 prompt options, for being encrypted to target object.
Illustratively, Fig. 4 be the embodiment of the present invention signal target object acquiescence Show Styles and it is selectable plus
Close pattern.Wherein, the acquiescence Show Styles of target object can be the Show Styles as shown in (a) in Fig. 4, mystery packaging sample
Formula can be the Show Styles as shown in (b) in Fig. 4, and camouflage pack pattern can be to show sample as shown in (c) in Fig. 4
Formula, self-defined pack pattern can be the Show Styles as shown in (d) in Fig. 4.
Step 203, terminal receive second input of the user in prompt message.
In the embodiment of the present invention, user can select to prompt in prompt message according to personal like or actual use demand
Encryption pattern in one or more encryption patterns target object is encrypted.And select a variety of encryption patterns in user
In the case of, user can determine that it selects the sequencing of a variety of encryption patterns according to personal like or actual use demand.
Step 204 is inputted in response to second, and terminal encrypts target object using the first encryption pattern of user's selection.
Optionally, in the embodiment of the present invention, in the case where user has selected at least two encryption patterns, terminal can be by
According to the sequences of at least two encryption patterns of user's selection, using at least two encryption patterns to the target pair that includes in target area
As encryption;Wherein, after being encrypted to the target object, which can correspond to a variety of Show Styles, a variety of Show Styles
May include at least two encryption pattern and acquiescence Show Styles, and with the input of user, the display sample of the target object
Formula can switch between a variety of Show Styles.Alternatively, terminal can also according to preset encryption (packaging) sequence, such as by
According to mysterious pack pattern, camouflage pack pattern, the sequence of User Defined pack pattern, to the target pair for including in target area
As being encrypted.It can specifically be determined according to actual use demand, the embodiment of the present invention is not construed as limiting.
Optionally, in the embodiment of the present invention, target object can be the removable content such as application icon, file, also may be used
To be the irremovable content such as text, picture, control, that is to say, that encryption method provided in an embodiment of the present invention is not limited to pair
Removable content-encrypt.
Optionally, in the embodiment of the present invention, target object can be interchangeable content in target area.For example, the mesh
Display can be replaced by other content by marking object.Specifically, if partial content (such as application icon, text in target area
Part folder, picture or control etc.) it is interchangeable, then can be the encryption to the contents of the section to the encryption of target object;
If the full content (such as text) in target area is all replaceable, can be to entire target to the encryption of target object
The encryption in region.
Optionally, include multiple target objects (such as application icon, file in the target area in the embodiment of the present invention
Folder, picture, control) in the case of, it can be directed to target area selection encryption pattern, so that user may be used in terminal
The encryption pattern of selection is carried out at the same time encryption to multiple target object in the target area, so may be implemented to multiple
The quick encryption of target object.
Optionally, encryption method provided in an embodiment of the present invention can be used for a pair target area corresponding with the first input
In target object encryption;Or it is interior comprising that in the case of encrypted content, can also have been encrypted to this in the region of interest
Appearance is operated, such as the encryption pattern etc. for changing the encrypted content, can specifically be determined according to actual use demand, this hair
Bright embodiment is not construed as limiting.
The encryption method that inventive embodiments provide, due to being carried out to target object by using one or more encryption patterns
It encrypts (packaging), the Show Styles of target object can be made to change, so that the target object is not easy to be identified, because
This is by may be implemented target object packaging the Show Styles encryption to target object.Compared with prior art, the present invention is real
Can directly the Show Styles of target object be encrypted by applying the encryption method of example, without changing cloth of the target object on interface
Office, in this way, encryption method provided in an embodiment of the present invention is no longer limited to the encryption to moving content, the i.e. embodiment of the present invention
The application range of the encryption method of offer is wider and more flexible, better user experience.
Optionally, in conjunction with Fig. 2, as shown in figure 5, after step 201, it is provided in an embodiment of the present invention before step 202
Encryption method can also include following step 205 and step 206.
Step 205, terminal determine target area.
Associated description in above-mentioned steps 202 to target area specifically may refer to for the description of target area, herein
It repeats no more.
Optionally, in the embodiment of the present invention, above-mentioned steps 205 can specifically pass through following step 205a- steps 205b
It realizes.
Step 205a, terminal obtains input parameter corresponding with the first input.
Wherein, which may include at least one in location information, duration information and pressure information.I.e. with
The corresponding input parameter of one input may include and first inputs corresponding location information, duration information corresponding with the first input
With with the first input in corresponding pressure information at least one of.
Step 205b, terminal determines target area according to input parameter.
Target object in step 206, terminal recognition target area.
Illustratively, it is assumed that input parameter includes location information and duration information, in user at the first interface of terminal
In the case of carrying out the first input (such as pressing) on a certain region, terminal can obtain the location information of the region on the screen
And duration information corresponding with first input, and according to the location information and the input duration information, determine target area.
Optionally, in the embodiment of the present invention, the size of target area can be according to corresponding defeated with the first of user the input
Enter parameter determination.Illustratively, the size of target area can be according to duration information corresponding with the first of user the input, pressure
Information etc. determines.For example, longer with the first corresponding duration of input, the target area is bigger, and (i.e. the area of target area is got over
Greatly);Bigger with the first corresponding pressure of input, the target area is bigger.
Optionally, in the embodiment of the present invention, above-mentioned target object is shown with the first pattern, i.e., target object is with the first pattern
It is shown in the first interface.
In conjunction with Fig. 2, as shown in fig. 6, after step 204, encryption method provided in an embodiment of the present invention can also include
Following steps 207 and step 208.
Step 207, terminal receive third input of the user on target object.
Step 208 is inputted in response to third, and inputting corresponding first finger print information in third meets the first preset fingerprint letter
In the case of breath, terminal is with the second pattern display target object.
Wherein, the first pattern can be the acquiescence Show Styles of target object, and the second pattern can be the first encryption pattern;
Or first pattern can be first encryption pattern, the second pattern can be target object acquiescence Show Styles.It specifically can be with
Determine that the embodiment of the present invention is not construed as limiting according to actual use demand.
Optionally, it is a kind of encryption sample in the first encryption pattern that user is target object setting in the embodiment of the present invention
In the case of formula, terminal in response to the input of user, can realize the Show Styles of target object in this encryption pattern and write from memory
Recognize the switching between Show Styles.The case where the first encryption pattern that user is target object setting includes a variety of encryption patterns
Under, terminal in response to the input of user, can realize that the Show Styles of target object is shown in a variety of encryption patterns and acquiescence
Switching between pattern.
Illustratively, as shown in fig. 7, in the icon and the icon that target object is chat application with a kind of encryption pattern
In the case of (being illustrated as mysterious encryption pattern in Fig. 7) display, if (i.e. above-mentioned third is defeated for input of the user on the icon
Entering) corresponding first finger print information meets the first preset fingerprint information, then and terminal is to give tacit consent to Show Styles display target object, i.e.,
The Show Styles of target object is switched to acquiescence Show Styles by terminal from mystery encryption pattern.If user continues in the icon
Upper input (i.e. third inputs), then terminal encrypts pattern display target object with the mystery again, i.e. terminal can be by target object
Show Styles be switched to mysterious encryption pattern from acquiescence Show Styles.
Illustratively, as shown in figure 8, in the icon and the icon that target object is chat application with a variety of pack patterns
In the case of (being illustrated as mysterious encryption pattern, camouflage encryption pattern in Fig. 8) display, if input of the user on the icon
(i.e. above-mentioned third input) corresponding first finger print information meets the first preset fingerprint information, then terminal can make target object
Show Styles is switched to camouflage pack pattern from mystery encryption pattern.If user continues the input on the icon, (i.e. third is defeated
Enter), then terminal can make the Show Styles of target object be switched to the Show Styles of acquiescence from camouflage pack pattern.If user
Continue input (i.e. third inputs) on the icon, then terminal encrypts pattern display target object with the mystery again, i.e. terminal can
With by the Show Styles of target object mysterious encryption pattern, camouflage encryption pattern, acquiescence Show Styles between switch over.
Optionally, in conjunction with Fig. 2, as shown in figure 9, encryption method provided in an embodiment of the present invention can also include following step
Rapid 209 and step 210.
Step 209, terminal receive fourth input of the user on target object.
Step 210 is inputted in response to the 4th, meets the second preset fingerprint letter in corresponding second finger print information of the 4th input
In the case of breath, the content of terminal display target object.
Optionally, in the embodiment of the present invention, terminal can be directed to the target object shown with a certain encryption pattern after encryption,
In the case where corresponding second finger print information of input (i.e. above-mentioned 4th input) of user meets the second preset fingerprint information, show
Show the content of target object.
Illustratively, as shown in Figure 10, terminal judges user after receiving user to the input of the icon of chat application
Corresponding second finger print information of input (i.e. above-mentioned 4th input) whether meet the second preset fingerprint information, in second fingerprint
In the case that information meets the second preset fingerprint information, terminal can show the interface of the chat application, can so to use
Family conveniently and efficiently triggering terminal show chat application interface.
It should be noted that in the embodiment of the present invention, above-mentioned method as shown in FIG. 6 can be applied in target object
Show Styles encryption (such as target object is application icon, the encryption pattern that user's selection may be used shows application icon
Sample formula is encrypted) in the case of, to the decryption of the Show Styles of target object (such as in the acquiescence Show Styles of application icon and right
Application icon it is encrypted encryption pattern between switch) scene in.Above-mentioned method as shown in Figure 9 can be applied in target pair
In the case of the content-encrypt (such as being encrypted to the application of application icon instruction) of elephant, to the decryption of the content of target object (such as
Show application icon instruction application interface) scene in.
Optionally, in the embodiment of the present invention, before executing step 201, encryption method provided in an embodiment of the present invention is also
May include the default condition for entering encryption space and preset fingerprint information (including the first above-mentioned preset fingerprint information and the
Two preset fingerprint information).Wherein, encrypt space in may include the corresponding encipherment scheme in all encryption sections (i.e. plus
Close pattern) between correspondence, further include region to be encrypted, i.e., fixed but unencryption target area.Optionally, add
Above- mentioned information in close space can be preserved and be shown in the form of a list.
Illustratively, the above-mentioned condition for entering encryption space can be at least one in password, fingerprint or face recognition etc.
, to ensure that the safety of operation is encrypted in user.For example, if the condition that user preset enters encryption space is fingerprint
Information, then terminal can on the first interface of the user in terminal input (such as long-press) in the case of acquisition user fingerprint letter
Breath, if the finger print information of acquisition meets for the encryption preset finger print information in space, terminal can show encryption space
In encryption section and region to be encrypted, thus user can select to the encipherment scheme of encryption section (encryption pattern) into
Row modification, or can select to determine its encipherment scheme for region to be encrypted.
Wherein, the first preset fingerprint information and the second preset fingerprint information are different two finger print informations, respectively can be with
Decryption for carrying out different purposes to encrypted target object.Illustratively, in the corresponding finger print information of the input of user
In the case of meeting the first preset fingerprint information, the Show Styles of encrypted target object can be cut with triggering terminal
It changes;For example, can with triggering terminal to the Show Styles of encrypted target object user setting encryption pattern and target pair
It is switched between the acquiescence Show Styles of elephant, the decryption to the Show Styles of target object so may be implemented.User's
It inputs in the case that corresponding finger print information meets the second preset fingerprint information, encrypted target pair can be shown with triggering terminal
The decryption to the content of target object so may be implemented in the content of elephant.
Optionally, the above-mentioned preset finger print information for entering encryption space can be believed with the first finger print information and the second fingerprint
A finger print information in breath is identical, can also be different from the first finger print information and the second finger print information, specifically can basis
Actual use demand determines that the embodiment of the present invention is not construed as limiting.
As shown in figure 11, the embodiment of the present invention provides a kind of decryption method, which can be applied to terminal, the solution
Decryption method may include following step 301 and step 302.
Step 301, with the first pattern display target object, terminal receives the of user on target object
One target inputs.
Step 302 is inputted in response to first object, and inputting corresponding first finger print information in first object meets first in advance
If in the case of finger print information, terminal is with the second pattern display target object.
Wherein, the first pattern can be the acquiescence Show Styles of target object, and the second pattern can be that user is target pair
As the first encryption pattern of setting, the first encryption pattern is used to encrypt target object;Or first pattern can be first plus
Close pattern, the second pattern can be the acquiescence Show Styles of target object.
The description of step 301 and step 302 specifically may refer in above-mentioned embodiment of the method as shown in FIG. 6 to step
Rapid 207 and step 208 associated description, details are not described herein again.
Optionally, in conjunction with Figure 11, as shown in figure 12, decryption method provided in an embodiment of the present invention can also include following
Step 303 and step 304.
Step 303, terminal receive the of user on target object with the first pattern display target object
Two targets input.
Step 304 is inputted in response to the second target, and inputting corresponding second finger print information in the second target meets second in advance
If in the case of finger print information, the content of terminal display target object.
The description of step 303 and step 304 specifically may refer in above-mentioned embodiment of the method as shown in Figure 9 to step
Rapid 209 and step 210 associated description, details are not described herein again.
Decryption method provided in an embodiment of the present invention, after being encrypted to the Show Styles of target object, due to that can touch
The Show Styles for sending out target object encrypted switches between the first encryption pattern and acquiescence Show Styles, therefore may be implemented
Directly to the decryption of the Show Styles of target object after encryption.Compared with prior art, the decryption method of the embodiment of the present invention can
Directly encrypted target object to be decrypted, without again in individual private space to encrypted target object
Decryption, therefore decryption method provided in an embodiment of the present invention is no longer limited in individual private space carry out target object
Decryption, i.e., the application range of decryption method provided in an embodiment of the present invention is wider and more flexible, better user experience.
As shown in figure 13, the embodiment of the present invention provides a kind of encryption device 13, which may include receiving mould
Block 131, display module 132 and encrypting module 133.
Receiving module 131, for receiving the first input of user on the first interface;Display module 132, in response to
The first input that receiving module 131 receives, shows target area corresponding with first input and prompt on first interface
Information, for the prompt message for prompting user's selection to the encrypted encryption pattern of target object, which is the target area
Object in domain;Receiving module 131 is additionally operable to receive second input of the user in the prompt message;Encrypting module 133 is used
In the second input received in response to receiving module 131, the target object is encrypted using the first encryption pattern of user's selection.
Optionally, in conjunction with Figure 13, as shown in figure 14, encryption device 13 provided in an embodiment of the present invention can also include determining
Module 134 and identification module 135.Determining module 134, for receiving first of user on the first interface in receiving module 131
After input, display module 132 shown on first interface target area corresponding with first input and prompt message it
Before, determine the target area;Identification module 135, for identification determining module 134 determine the target area in the target pair
As.
Optionally, in the embodiment of the present invention, the first encryption pattern includes at least two encryption patterns.Encrypting module 133, tool
Body is used for the sequence according at least two encryption pattern of user's selection, is added to the target object using at least two encryption patterns
It is close;Wherein, after being encrypted to the target object, which can correspond to a variety of Show Styles, which can be with
Including at least two encryption pattern and acquiescence Show Styles, and with the input of user, the Show Styles of the target object can
To switch between a variety of Show Styles.
Optionally, in the embodiment of the present invention, which is shown with the first pattern.Receiving module 131, can be also used for
After encrypting module 133 encrypts the target object using the first encryption pattern of user's selection, user is received in the target pair
As upper third inputs;Display module 132 is additionally operable to the third input received in response to receiving module 131, is inputted in the third
In the case that corresponding first finger print information meets the first preset fingerprint information, which is shown with the second pattern.Wherein,
First pattern is the acquiescence Show Styles of the target object, which is the first encryption pattern;Or first sample
Formula is the first encryption pattern, which is the acquiescence Show Styles of the target object.
Optionally, in the embodiment of the present invention, receiving module 131 can be also used for receiving the of user on the target object
Four inputs;Display module 132 can be also used for the 4th input received in response to receiving module 131, be corresponded in the 4th input
The second finger print information meet the second preset fingerprint information in the case of, show the content of the target object.
Optionally, in the embodiment of the present invention, determining module 134 is specifically used for obtaining input corresponding with first input
Parameter, and according to the input parameter, determine the target area;The input parameter may include location information, duration information and pressure
At least one of in force information.
The embodiment of the present invention provides a kind of encryption device, since encryption device is by using one or more encryption patterns pair
(packaging) is encrypted in target object, and the Show Styles of target object can be made to change, so that the target object
It is not easy to be identified, therefore encryption device to target object packaging by may be implemented to encrypt the Show Styles of target object.With
The prior art is compared, and encryption device provided in an embodiment of the present invention can directly encrypt the Show Styles of target object, and nothing
Layout of the target object on interface need to be changed, in this way, encryption device provided in an embodiment of the present invention is no longer limited to removable
The application range of the encryption of dynamic content, i.e., encryption device provided in an embodiment of the present invention is wider and more flexible, user experience compared with
It is good.
As shown in figure 15, the embodiment of the present invention provides a kind of decryption device 15, which includes receiving module 151
With display module 152.
Receiving module 151, in the case where target object is shown with the first pattern, receiving user in the target object
On first object input;Display module 152, the first object input for receiving in response to receiving module 151, this first
In the case that corresponding first finger print information of target input meets the first preset fingerprint information, which is shown with the second pattern
As.Wherein, which can be the acquiescence Show Styles of the target object, which can be that user is the target
First encryption pattern of object setting, the first encryption pattern are used to encrypt the target object;Or first pattern can be with
For the first encryption pattern, which can be the acquiescence Show Styles of the target object.
Optionally, in the embodiment of the present invention, receiving module 151 is additionally operable to the feelings of the first pattern display target object
Under condition, second target input of the user on the target object is received;Display module 152 is additionally operable in response to receiving module 151
The the second target input received, the feelings that corresponding second finger print information meets the second preset fingerprint information are inputted in second target
Under condition, the content of the target object is shown.
The embodiment of the present invention provides a kind of decryption device, after being encrypted to the Show Styles of target object, due to the solution
The Show Styles that close device can trigger encrypted target object switches between the first encryption pattern and acquiescence Show Styles,
Therefore the decryption directly to the Show Styles of target object after encryption may be implemented in decryption device.Compared with prior art, this hair
The decryption device of bright embodiment can directly be decrypted encrypted target object, without again in individual private space
In encrypted target object is decrypted, therefore decryption device provided in an embodiment of the present invention is no longer limited in individual privacy
Target object is decrypted in space, i.e., the application range of decryption device provided in an embodiment of the present invention is wider and more flexible,
Better user experience.
A kind of hardware architecture diagram of Figure 16 terminals of each embodiment to realize the present invention.As shown in figure 16, the end
End 100 includes but not limited to:Radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor
105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110 and power supply 111 etc.
Component.It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Figure 16, terminal can be with
Including than illustrating more or fewer components, either combining certain components or different components arrangement.In the embodiment of the present invention
In, terminal include but not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and
Pedometer etc..
In the case of one kind, correspond to encryption method provided in an embodiment of the present invention:
User input unit 107, for receiving the first input of user on the first interface;Display unit 106, for ringing
Should in the first input that user input unit 107 receives, show on the first interface corresponding with the first input target area and
Prompt message, for the prompt message for prompting user's selection to the encrypted encryption pattern of target object, which is the mesh
Mark the object in region;User input unit 107 is additionally operable to receive second input of the user in the prompt message;Processor
110, the second input for being received in response to user input unit 107, using the first encryption pattern of user's selection to the mesh
Mark object encryption.
The embodiment of the present invention provides a kind of terminal, due to terminal by using one or more encryption patterns to target object
(packaging) is encrypted, the Show Styles of target object can be made to change, so that the target object is not easy to be distinguished
Know, therefore terminal to target object packaging by may be implemented to encrypt the Show Styles of target object.Compared with prior art,
Terminal provided in an embodiment of the present invention can directly encrypt the Show Styles of target object, without changing target object on boundary
Layout on face, in this way, terminal provided in an embodiment of the present invention is no longer limited to the encryption to moving content, i.e. the present invention is real
Apply the terminal of example offer application range is wider and more flexible, better user experience.
In another case, corresponding to decryption method provided in an embodiment of the present invention:
User input unit 107, in the case where target object is shown with the first pattern, receiving user in the target
First object input on object;Display unit 106, the first object for being received in response to user input unit 107 input,
In the case where the first object inputs corresponding first finger print information and meets the first preset fingerprint information, shown with the second pattern
The target object.Wherein, the first pattern is the acquiescence Show Styles of target object, and the second pattern is that user is target object setting
First encryption pattern, first encryption pattern be used for target object encrypt;Or first pattern be first encryption pattern, second
Pattern is the acquiescence Show Styles of target object.
The embodiment of the present invention provides a kind of terminal, and terminal is after encrypting the Show Styles of target object, due to can be with
The Show Styles for triggering encrypted target object switches between the first encryption pattern and acquiescence Show Styles, therefore terminal can
To realize the decryption directly to the Show Styles of target object after encryption.Compared with prior art, the terminal of the embodiment of the present invention
Directly encrypted target object can be decrypted, without again in individual private space to encrypted target pair
As decryption, therefore terminal provided in an embodiment of the present invention is no longer limited to solve target object in individual private space
Close, i.e., the application range of terminal provided in an embodiment of the present invention is wider and more flexible, better user experience.
It should be understood that the embodiment of the present invention in, radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 110 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 101 includes but not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by radio communication system and network and other set
Standby communication.
Terminal has provided wireless broadband internet to the user by network module 102 and has accessed, and such as user is helped to receive and dispatch electricity
Sub- mail, browsing webpage and access streaming video etc..
It is that audio output unit 103 can receive radio frequency unit 101 or network module 102 or in memory 109
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 103 can also provide and end
The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that end 100 executes.Sound
Frequency output unit 103 includes loud speaker, buzzer and receiver etc..
Input unit 104 is for receiving audio or video signal.Input unit 104 may include graphics processor
(graphics processing unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the image data of the static images or video obtained by image capture apparatus (such as camera) in image capture mode carries out
Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited
Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or network module 102.Mike
Wind 1042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be
The format output of mobile communication base station can be sent to via radio frequency unit 101 by being converted in the case of telephone calling model.
Terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjusts the brightness of display panel 1061, and proximity sensor can close display panel when terminal 100 is moved in one's ear
1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add
The size of speed can detect that size and the direction of gravity when static, can be used to identify terminal posture (such as horizontal/vertical screen switching,
Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 105 can be with
Including fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, thermometer,
Infrared sensor etc., details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (liquid crystal display, LCD), Organic Light Emitting Diode may be used
Forms such as (organic light-emitting diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generates and set with the user of terminal
It sets and the related key signals of function control inputs.Specifically, user input unit 107 include touch panel 1071 and other
Input equipment 1072.Touch panel 1071, also referred to as touch screen, collect user on it or neighbouring touch operation (such as
User is using any suitable objects or attachment such as finger, stylus on touch panel 1071 or near touch panel 1071
Operation).Touch panel 1071 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined
The touch orientation of user is surveyed, and detects the signal that touch operation is brought, transmits a signal to touch controller;Touch controller from
Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 110, receives processor 110
The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
Realize touch panel 1071.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.
Specifically, other input equipments 1072 can include but is not limited to physical keyboard, function key (such as volume control button, switch
Button etc.), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 1071 can be covered on display panel 1061, when touch panel 1071 is detected at it
On or near touch operation after, send processor 110 to determine the type of touch event, be followed by subsequent processing device 110 according to touch
The type for touching event provides corresponding visual output on display panel 1061.Although in figure 16, touch panel 1071 with it is aobvious
Show that panel 1061 is to realize the function that outputs and inputs of terminal as two independent components, but in certain embodiments,
The function that outputs and inputs that can touch panel 1071 and display panel 1061 be integrated and be realized terminal, does not limit specifically herein
It is fixed.
Interface unit 108 is the interface that external device (ED) is connect with terminal 100.For example, external device (ED) may include it is wired or
Wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, memory card port,
For connecting the port of device with identification module, the port audio input/output (I/O), video i/o port, ear port
Etc..Interface unit 108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and will
One or more elements that the input received is transferred in terminal 100 or can be used for terminal 100 and external device (ED) it
Between transmission data.
Memory 109 can be used for storing software program and various data.Memory 109 can include mainly storing program area
And storage data field, wherein storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to
It crosses operation or executes the software program and/or module being stored in memory 109, and call and be stored in memory 109
Data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 110 may include one
Or multiple processing units;Optionally, processor 110 can integrate application processor and modem processor, wherein application processing
The main processing operation system of device, user interface and application program etc., modem processor mainly handles wireless communication.It can manage
Solution, above-mentioned modem processor can not also be integrated into processor 110.
Terminal 100 can also include the power supply 111 (such as battery) powered to all parts, and optionally, power supply 111 can be with
It is logically contiguous by power-supply management system and processor 110, to by power-supply management system realize management charging, electric discharge, with
And the functions such as power managed.
In addition, terminal 100 includes some unshowned function modules, details are not described herein.
Optionally, the embodiment of the present invention also provides a kind of terminal, including processor 110 as shown in figure 16, memory
109, it is stored in the computer program that can be run on memory 109 and on the processor 110, which is handled
It realizes that terminal executes each process of encryption and decryption approaches in above method embodiment when device 110 executes, and can reach identical
Technique effect, to avoid repeating, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program realizes that terminal executes encryption and decryption approaches in above method embodiment when the computer program is executed by processor
Each process, and identical technique effect can be reached, to avoid repeating, which is not described herein again.Wherein, this computer-readable is deposited
Storage media may include read-only memory (read-only memory, ROM), random access memory (random access
Memory, RAM), magnetic disc or CD etc..
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements include not only those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this
There is also other identical elements in the process of element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within the protection of the present invention.
Claims (12)
1. a kind of encryption method is applied to terminal, which is characterized in that the method includes:
Receive the first input of user on the first interface;
In response to first input, target area corresponding with first input and prompt are shown on first interface
Information, for the prompt message for prompting user's selection to the encrypted encryption pattern of target object, the target object is described
Object in target area;
Receive second input of the user in the prompt message;
In response to second input, the target object is encrypted using the first encryption pattern of user's selection.
2. encryption method according to claim 1, which is characterized in that described to receive user's on the first interface first defeated
After entering, before the display target area corresponding with first input on first interface and prompt message, institute
The method of stating further includes:
Determine the target area;
Identify the target object in the target area.
3. encryption method according to claim 1 or 2, which is characterized in that the first encryption pattern includes at least two
Encrypt pattern;
It is described that the target object is encrypted using the first encryption pattern of user's selection, including:
The sequence that at least two encryptions pattern is selected according to user encrypts pattern to the target using described at least two
Object encryption;
Wherein, after being encrypted to the target object, the target object corresponds to a variety of Show Styles, a variety of Show Styles packets
At least two encryption pattern and acquiescence Show Styles are included, and with the input of user, the Show Styles of the target object
Switch between a variety of Show Styles.
4. encryption method according to claim 1, which is characterized in that the target object is shown with the first pattern;
After the first encryption pattern using user's selection encrypts the target object, the method further includes:
Receive third input of the user on the target object;
It is inputted in response to the third, inputs corresponding first finger print information in the third and meet the first preset fingerprint information
In the case of, the target object is shown with the second pattern;
Wherein, first pattern is the acquiescence Show Styles of the target object, and second pattern is first encryption
Pattern;Or first pattern is the first encryption pattern, second pattern is that the acquiescence of the target object is shown
Pattern.
5. encryption method according to claim 1 or 4, which is characterized in that the method further includes:
Receive fourth input of the user on the target object;
In response to the 4th input, meet the second preset fingerprint information in corresponding second finger print information of the 4th input
In the case of, show the content of the target object.
6. encryption method according to claim 2, which is characterized in that the determination target area, including:
Input parameter corresponding with first input is obtained, the input parameter includes location information, duration information and pressure
At least one of in information;
According to the input parameter, the target area is determined.
7. a kind of encryption device, which is characterized in that including receiving module, display module and encrypting module;
The receiving module, for receiving the first input of user on the first interface;
The display module, first input for being received in response to the receiving module, shows on first interface
Show target area corresponding with first input and prompt message, the prompt message is for prompting user's selection to target pair
As encrypted encryption pattern, the target object is the object in the target area;
The receiving module is additionally operable to receive second input of the user in the prompt message;
The encrypting module, second input for being received in response to the receiving module, using the first of user's selection
Encryption pattern encrypts the target object.
8. encryption device according to claim 7, which is characterized in that the encryption device further includes determining module and identification
Module;
The determining module, it is described aobvious after receiving the first input of user on the first interface in the receiving module
Before showing that module shows target area corresponding with first input and prompt message on first interface, described in determination
Target area;
The identification module, the target object in the target area that the determining module determines for identification.
9. encryption device according to claim 7 or 8, which is characterized in that the first encryption pattern includes at least two
Encrypt pattern;
The encrypting module, specifically for according to user select it is described at least two encryption pattern sequences, using it is described at least
Two kinds of encryption patterns encrypt the target object;
Wherein, after being encrypted to the target object, the target object corresponds to a variety of Show Styles, a variety of Show Styles packets
At least two encryption pattern and acquiescence Show Styles are included, and with the input of user, the Show Styles of the target object
Switch between a variety of Show Styles.
10. encryption device according to claim 7, which is characterized in that the target object is shown with the first pattern;
The receiving module is additionally operable to the encrypting module and is added to the target object using the first encryption pattern of user's selection
After close, third input of the user on the target object is received;
The display module is additionally operable to the third input received in response to the receiving module, in third input pair
In the case that the first finger print information answered meets the first preset fingerprint information, the target object is shown with the second pattern;
Wherein, first pattern is the acquiescence Show Styles of the target object, and second pattern is first encryption
Pattern;Or first pattern is the first encryption pattern, second pattern is that the acquiescence of the target object is shown
Pattern.
11. the encryption device according to claim 7 or 10, which is characterized in that
The receiving module is additionally operable to receive fourth input of the user on the target object;
The display module is additionally operable to the 4th input received in response to the receiving module, in the 4th input pair
In the case that the second finger print information answered meets the second preset fingerprint information, the content of the target object is shown.
12. encryption device according to claim 8, which is characterized in that
The determining module, is specifically used for obtaining corresponding with first input input parameter, and according to the input parameter,
Determine that the target area, the input parameter include at least one in location information, duration information and pressure information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810524964.4A CN108681664B (en) | 2018-05-28 | 2018-05-28 | Encryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810524964.4A CN108681664B (en) | 2018-05-28 | 2018-05-28 | Encryption method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108681664A true CN108681664A (en) | 2018-10-19 |
CN108681664B CN108681664B (en) | 2020-05-19 |
Family
ID=63808922
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810524964.4A Active CN108681664B (en) | 2018-05-28 | 2018-05-28 | Encryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108681664B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109740312A (en) * | 2019-01-28 | 2019-05-10 | 维沃移动通信有限公司 | A kind of application control method and terminal device |
CN109828908A (en) * | 2018-12-15 | 2019-05-31 | 中国平安人寿保险股份有限公司 | Interface testing parameter encryption method, device, electronic equipment and storage medium |
CN109886000A (en) * | 2019-02-01 | 2019-06-14 | 维沃移动通信有限公司 | A kind of image encryption method and mobile terminal |
CN109918882A (en) * | 2019-02-01 | 2019-06-21 | 维沃移动通信有限公司 | A kind of image encryption method and mobile terminal |
CN109993010A (en) * | 2019-03-29 | 2019-07-09 | 维沃移动通信有限公司 | A kind of information display method and mobile terminal |
CN112149064A (en) * | 2019-06-28 | 2020-12-29 | Oppo广东移动通信有限公司 | Encryption and decryption method, electronic device and non-volatile computer-readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103763091A (en) * | 2014-01-09 | 2014-04-30 | 深圳市欧珀通信软件有限公司 | Encrypting method, decrypting method, encrypting device and decrypting device of application program |
CN105184183A (en) * | 2015-07-30 | 2015-12-23 | 努比亚技术有限公司 | Chatting record encryption method and mobile terminal |
CN106228085A (en) * | 2016-07-27 | 2016-12-14 | 维沃移动通信有限公司 | The method for secret protection of application program and mobile terminal |
CN106453052A (en) * | 2016-10-14 | 2017-02-22 | 北京小米移动软件有限公司 | Message interaction method and apparatus thereof |
CN106548082A (en) * | 2016-11-08 | 2017-03-29 | 深圳市万普拉斯科技有限公司 | Message treatment method and device |
-
2018
- 2018-05-28 CN CN201810524964.4A patent/CN108681664B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103763091A (en) * | 2014-01-09 | 2014-04-30 | 深圳市欧珀通信软件有限公司 | Encrypting method, decrypting method, encrypting device and decrypting device of application program |
CN105184183A (en) * | 2015-07-30 | 2015-12-23 | 努比亚技术有限公司 | Chatting record encryption method and mobile terminal |
CN106228085A (en) * | 2016-07-27 | 2016-12-14 | 维沃移动通信有限公司 | The method for secret protection of application program and mobile terminal |
CN106453052A (en) * | 2016-10-14 | 2017-02-22 | 北京小米移动软件有限公司 | Message interaction method and apparatus thereof |
CN106548082A (en) * | 2016-11-08 | 2017-03-29 | 深圳市万普拉斯科技有限公司 | Message treatment method and device |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109828908A (en) * | 2018-12-15 | 2019-05-31 | 中国平安人寿保险股份有限公司 | Interface testing parameter encryption method, device, electronic equipment and storage medium |
CN109740312A (en) * | 2019-01-28 | 2019-05-10 | 维沃移动通信有限公司 | A kind of application control method and terminal device |
WO2020156440A1 (en) * | 2019-01-28 | 2020-08-06 | 维沃移动通信有限公司 | Application control method and terminal device |
CN109886000A (en) * | 2019-02-01 | 2019-06-14 | 维沃移动通信有限公司 | A kind of image encryption method and mobile terminal |
CN109918882A (en) * | 2019-02-01 | 2019-06-21 | 维沃移动通信有限公司 | A kind of image encryption method and mobile terminal |
CN109918882B (en) * | 2019-02-01 | 2023-11-21 | 维沃移动通信有限公司 | Image encryption method and mobile terminal |
CN109886000B (en) * | 2019-02-01 | 2024-03-01 | 维沃移动通信有限公司 | Image encryption method and mobile terminal |
CN109993010A (en) * | 2019-03-29 | 2019-07-09 | 维沃移动通信有限公司 | A kind of information display method and mobile terminal |
CN112149064A (en) * | 2019-06-28 | 2020-12-29 | Oppo广东移动通信有限公司 | Encryption and decryption method, electronic device and non-volatile computer-readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108681664B (en) | 2020-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108681664A (en) | A kind of encryption method and device | |
CN108491133A (en) | A kind of application control method and terminal | |
CN109525874A (en) | A kind of screenshotss method and terminal device | |
CN110188524B (en) | Information encryption method, information decryption method and terminal | |
CN109002340A (en) | A kind of screen locking method and electronic equipment | |
CN109871164A (en) | A kind of message method and terminal device | |
CN108595946A (en) | A kind of method and terminal of protection privacy | |
CN109656437A (en) | A kind of information display method and terminal device | |
CN109886000B (en) | Image encryption method and mobile terminal | |
CN108459788A (en) | A kind of image display method and terminal | |
CN108391123A (en) | A kind of method and terminal generating video | |
CN109145552A (en) | Information ciphering method and terminal device | |
CN108600078A (en) | A kind of method and terminal of communication | |
CN109407948A (en) | A kind of interface display method and mobile terminal | |
CN110308838A (en) | A kind of application interaction processing method and terminal device | |
CN109117054A (en) | A kind of display control method and terminal | |
CN109471524A (en) | A kind of method and mobile terminal controlling motor vibrations | |
CN108153460A (en) | A kind of icon hiding method and terminal | |
CN107992770A (en) | A kind of photograph album processing method and mobile terminal | |
CN109871177A (en) | Display control method and mobile terminal | |
CN109766156A (en) | A kind of conversation establishing method and terminal device | |
CN109672845A (en) | A kind of method, apparatus and mobile terminal of video calling | |
CN109740312A (en) | A kind of application control method and terminal device | |
CN108446153A (en) | A kind of method and terminal of control e-sourcing | |
CN108109188A (en) | A kind of image processing method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |