CN108681664A - A kind of encryption method and device - Google Patents

A kind of encryption method and device Download PDF

Info

Publication number
CN108681664A
CN108681664A CN201810524964.4A CN201810524964A CN108681664A CN 108681664 A CN108681664 A CN 108681664A CN 201810524964 A CN201810524964 A CN 201810524964A CN 108681664 A CN108681664 A CN 108681664A
Authority
CN
China
Prior art keywords
target object
pattern
encryption
input
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810524964.4A
Other languages
Chinese (zh)
Other versions
CN108681664B (en
Inventor
彭思文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810524964.4A priority Critical patent/CN108681664B/en
Publication of CN108681664A publication Critical patent/CN108681664A/en
Application granted granted Critical
Publication of CN108681664B publication Critical patent/CN108681664B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the invention discloses a kind of encryption method and devices, are related to field of communication technology, to solve the problems, such as that existing cipher mode compares limitation and flexibility is poor.The encryption method includes:Receive the first input of user on the first interface;In response to first input, target area corresponding with first input and prompt message are shown on first interface, for the prompt message for prompting user's selection to the encrypted encryption pattern of target object, which is the object in the target area;Receive second input of the user in the prompt message;In response to second input, the target object is encrypted using the first encryption pattern of user's selection.The encryption method can be applied in the scene to the content-encrypt of terminal.

Description

A kind of encryption method and device
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of encryption method and devices.
Background technology
With will be used wider and wider for terminal, user increasingly puies forward personal information security, the demand of personal secrets It rises.
Currently, can be by way of " private space " be arranged in the terminal to content-encrypt.Specifically, can be in terminal Middle setting " private space ", and password is arranged to " private space ", when user needs to some content-encrypt, user can be with Triggering terminal moves into the content in " private space ", with to the content-encrypt.In user needs use " private space " When content, user can first input password triggering terminal and open " private space ", then reuse the content in " private space ".
However, in above-mentioned cipher mode, encrypted content will be needed to move into " private space " from original position by then passing through To the content-encrypt, and user needs first triggering terminal to open " private space ", then reuses content therein, therefore Above-mentioned cipher mode and manner of decryption are usually applicable only to moveable content-encrypt and decryption, i.e., this encryption and decryption side It is poor that formula compares limitation, flexibility.
Invention content
The embodiment of the present invention provides a kind of encryption method and device, with solve existing encryption and manner of decryption compare limitation, And the problem of flexibility difference.
In order to solve the above-mentioned technical problem, the invention is realized in this way:
In a first aspect, an embodiment of the present invention provides a kind of encryption method, it is applied to terminal, which includes:It connects Receive the first input of user on the first interface;In response to first input, display and first input on first interface Corresponding target area and prompt message, the prompt message are used to prompt user to select to the encrypted encryption pattern of target object, The target object is the object in the target area;Receive second input of the user in the prompt message;In response to this second Input encrypts the target object using the first encryption pattern of user's selection.
Second aspect, an embodiment of the present invention provides a kind of encryption device, which includes receiving module, display mould Block and encrypting module.Receiving module is used to receive the first input of user on the first interface;Display module is used in response to connecing The first input that module receives is received, target area corresponding with first input and prompt message are shown on first interface, For the prompt message for prompting user's selection to the encrypted encryption pattern of target object, which is in the target area Object;Receiving module is additionally operable to receive second input of the user in the prompt message;Encrypting module is used in response to receiving mould The second input that block receives encrypts the target object using the first encryption pattern of user's selection.
The third aspect, an embodiment of the present invention provides a kind of terminal, which includes processor, memory and is stored in On reservoir and the computer program that can run on a processor, the computer program realize above-mentioned first party when being executed by processor The step of encryption method in face.
Fourth aspect, an embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage mediums Computer program is stored in matter, which realizes the step of the encryption method in above-mentioned first aspect when being executed by processor Suddenly.
In embodiments of the present invention, the first input by the user in response to receiving on the first interface, Ke Yi Show that (prompt message is for prompting user to select for target area corresponding with the first input and prompt message on first interface To the encrypted encryption pattern of target object, which is the object in the target area);And in response to the use received Second input of the family in prompt message, encrypts the target object using the first encryption pattern of user's selection.Pass through the party Case can make target object since (packaging) is encrypted to target object by using one or more encryption patterns Show Styles changes, so that the target object is not easy to be identified, therefore by the way that target object packaging may be implemented Show Styles encryption to target object.Compared with prior art, the encryption method of the embodiment of the present invention and device can be direct Show Styles encryption to target object, without changing layout of the target object on interface, in this way, the embodiment of the present invention carries The encryption method and device of confession be no longer limited to move content encryption, i.e., encryption method provided in an embodiment of the present invention and The application range of device is wider and more flexible, better user experience.
5th aspect, an embodiment of the present invention provides a kind of decryption methods, are applied to terminal, which includes: In the case of the first pattern display target object, first object input of the user on the target object is received;In response to this First object inputs, in the case where the first object inputs corresponding first finger print information and meets the first preset fingerprint information, The target object is shown with the second pattern;Wherein, which is the acquiescence Show Styles of the target object, second pattern For the first encryption pattern that user is target object setting, which is used to encrypt the target object;Or First pattern is the first encryption pattern, which is the acquiescence Show Styles of the target object.
6th aspect, an embodiment of the present invention provides a kind of decryption devices, which includes receiving module and display Module.Receiving module is used in the case where target object show with the first pattern, reception user on the target object the One target inputs;The first object that display module is used to receive in response to receiving module inputs, and inputs and corresponds in the first object The first finger print information meet the first preset fingerprint information in the case of, which is shown with the second pattern;Wherein, this One pattern is the acquiescence Show Styles of the target object, which is the first encryption sample that user is target object setting Formula, the first encryption pattern are used to encrypt the target object;Or first pattern is the first encryption pattern, second sample Formula is the acquiescence Show Styles of the target object.
7th aspect, an embodiment of the present invention provides a kind of terminal, which includes processor, memory and is stored in On reservoir and the computer program that can run on a processor, the computer program realize above-mentioned 5th side when being executed by processor The step of decryption method in face.
Eighth aspect, an embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage mediums Computer program is stored in matter, which realizes the step of the decryption method in above-mentioned 5th aspect when being executed by processor Suddenly.
In embodiments of the present invention, with the first pattern display target object, user can be received in the mesh The first object input on object is marked, and is inputted in response to the first object, corresponding first fingerprint is inputted in the first object In the case that information meets the first preset fingerprint information, with the second pattern display target object, wherein the first pattern is target pair The acquiescence Show Styles of elephant, the second pattern are the first encryption pattern that user is target object setting, and the first encryption pattern is used for Target object is encrypted;Or first pattern be first encryption pattern, the second pattern be target object acquiescence Show Styles.It is logical The program is crossed, after being encrypted to the Show Styles of target object, since the display sample of encrypted target object can be triggered Formula switches between the first encryption pattern and acquiescence Show Styles, therefore the display directly to target object after encryption may be implemented The decryption of pattern.Compared with prior art, the decryption method of the embodiment of the present invention and device can be directly to encrypted targets Object is decrypted, and without being decrypted again to encrypted target object in individual private space, therefore the present invention is implemented The decryption method and device that example provides are no longer limited to that target object is decrypted in individual private space, i.e., of the invention The application range of decryption method and device that embodiment provides is wider and more flexible, better user experience.
Description of the drawings
Fig. 1 is a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention;
Fig. 2 is one of the schematic diagram of encryption method provided in an embodiment of the present invention;
Fig. 3 is one of the schematic diagram at interface provided in an embodiment of the present invention;
Fig. 4 is the schematic diagram of encryption pattern provided in an embodiment of the present invention;
Fig. 5 is the two of the schematic diagram of encryption method provided in an embodiment of the present invention;
Fig. 6 is the three of the schematic diagram of encryption method provided in an embodiment of the present invention;
Fig. 7 is one of the schematic diagram of ciphering process provided in an embodiment of the present invention;
Fig. 8 is the two of the schematic diagram of ciphering process provided in an embodiment of the present invention;
Fig. 9 is the four of the schematic diagram of encryption method provided in an embodiment of the present invention;
Figure 10 is one of the schematic diagram of decrypting process provided in an embodiment of the present invention;
Figure 11 is one of the schematic diagram of decryption method provided in an embodiment of the present invention;
Figure 12 is the two of the schematic diagram of decryption method provided in an embodiment of the present invention;
Figure 13 is one of the structural schematic diagram of encryption device provided in an embodiment of the present invention;
Figure 14 is the second structural representation of encryption device provided in an embodiment of the present invention;
Figure 15 is one of the structural schematic diagram of decryption device provided in an embodiment of the present invention;
Figure 16 is the hardware schematic of terminal provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
The terms "and/or" is a kind of incidence relation of description affiliated partner, indicates may exist three kinds of relationships, For example, A and/or B, can indicate:Individualism A exists simultaneously A and B, these three situations of individualism B.Symbol herein "/" indicates that affiliated partner is relationship such as A/B expressions A or B either.
Term " first " and " second " in description and claims of this specification etc. are for distinguishing different pairs As, rather than for the particular order of description object.For example, the first input and the second input etc. are different defeated for distinguishing Enter, rather than the particular order for describing input.
In embodiments of the present invention, " illustrative " or " such as " etc. words for indicate make example, illustration or explanation.This Be described as in inventive embodiments " illustrative " or " such as " any embodiment or design scheme be not necessarily to be construed as comparing Other embodiments or design scheme more preferably or more advantage.Specifically, use " illustrative " or " such as " etc. words purport Related notion is being presented in specific ways.
In the description of the embodiment of the present invention, unless otherwise indicated, the meaning of " plurality " is refer to two or more, For example, multiple target objects refer to two or more target object etc..
A kind of encryption method of offer of the embodiment of the present invention and device, on the first interface by the user in response to receiving The first input, target area corresponding with the first input and prompt message (prompt letter can shows on first interface For breath for prompting user's selection to the encrypted encryption pattern of target object, which is the object in the target area);And And second input of the user in response to receiving in prompt message, using the first encryption pattern of user's selection to the target Object encryption.It with this solution, can since (packaging) is encrypted to target object by using one or more encryption patterns So that the Show Styles of target object changes, so that the target object is not easy to be identified, therefore by target The Show Styles encryption to target object may be implemented in object encapsulation.Compared with prior art, the encryption side of the embodiment of the present invention Method and device can directly encrypt the Show Styles of target object, without changing layout of the target object on interface, such as This, encryption method provided in an embodiment of the present invention and device are no longer limited to the encryption to moving content, i.e. the present invention is implemented The application range of encryption method and device that example provides is wider and more flexible, better user experience.
A kind of decryption method of offer of the embodiment of the present invention and device, with the first pattern display target object, First object input of the user on the target object can be received, and is inputted in response to the first object, in the first object It inputs in the case that corresponding first finger print information meets the first preset fingerprint information, with the second pattern display target object, In, the first pattern is the acquiescence Show Styles of target object, and the second pattern is the first encryption sample that user is target object setting Formula, the first encryption pattern are used to encrypt target object;Or first pattern be first encryption pattern, the second pattern be target pair The acquiescence Show Styles of elephant.With this solution, after being encrypted to the Show Styles of target object, due to it can trigger encryption after Target object Show Styles first encryption pattern and acquiescence Show Styles between switch, therefore may be implemented direct pair plus The decryption of the Show Styles of target object after close.Compared with prior art, the decryption method of the embodiment of the present invention and device can be with Directly encrypted target object is decrypted, without again in individual private space to encrypted target object solution It is close, therefore decryption method provided in an embodiment of the present invention and device are no longer limited in individual private space to target object Be decrypted, i.e., the application range of decryption method provided in an embodiment of the present invention and device is wider and more flexible, user experience compared with It is good.
Terminal in the embodiment of the present invention can be the terminal with operating system.The operating system can be Android (Android) operating system can be ios operating systems, can also be other possible operating systems, the embodiment of the present invention is not Make specific limit.
Below by taking Android operation system as an example, introduces encryption and decryption approaches provided in an embodiment of the present invention and applied Software environment.
As shown in Figure 1, being a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention.Scheming In 1, the framework of Android operation system includes 4 layers, respectively:Application layer, application framework layer, system operation library layer and Inner nuclear layer (is specifically as follows Linux inner core).
Wherein, application layer includes each application program (including system application and in Android operation system Tripartite's application program).
Application framework layer is the frame of application program, and developer can be in the exploitation of the frame in accordance with application program In the case of principle, some application programs are developed based on application framework layer.
System operation library layer includes library (also referred to as system library) and Android operation system running environment.Library is mainly Android behaviour All kinds of resources needed for it are provided as system.Android operation system running environment is used to provide software loop for Android operation system Border.
Inner nuclear layer is the operating system layer of Android operation system, belongs to the bottom of Android operation system software level.It is interior Stratum nucleare provides core system service and hardware-related driver based on linux kernel for Android operation system.
By taking Android operation system as an example, in the embodiment of the present invention, developer can be based on above-mentioned Android as shown in Figure 1 The system architecture of operating system, the software program of encryption and decryption approaches provided in an embodiment of the present invention is realized in exploitation, to make Obtaining the encryption and decryption approaches can be run based on Android operation system as shown in Figure 1.I.e. processor or terminal can lead to It crosses and runs software program realization encryption and decryption approaches provided in an embodiment of the present invention in Android operation system.
Terminal in the embodiment of the present invention can be mobile terminal, or immobile terminal.Illustratively, mobile whole End can be mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device, super mobile personal meter Calculation machine (ultra-mobile personal computer, UMPC), net book or personal digital assistant (personal Digital assistant, PDA) etc., immobile terminal can be personal computer (personal computer, PC), electricity Depending on machine (television, TV), automatic teller machine or self-service machine etc., the embodiment of the present invention is not especially limited.
The executive agent of encryption and decryption approaches provided in an embodiment of the present invention can be above-mentioned terminal, or should The function module and/or functional entity that the encryption and decryption approaches can be realized in terminal, specifically can be according to actual use Demand determines that the embodiment of the present invention is not construed as limiting.Below by taking terminal as an example, encryption provided in an embodiment of the present invention is conciliate respectively Decryption method is illustratively illustrated.
As shown in Fig. 2, the embodiment of the present invention provides a kind of encryption method, which can be applied to terminal, should add Decryption method may include following step 201- steps 204.
Step 201, terminal receive the first input of user on the first interface.
In the embodiment of the present invention, the first interface can be any one interface shown on the screen of terminal, such as main boundary Face or the interface (interface of application can be any one interface in application) etc. of application.
Optionally, first input of the user on the arbitrary region at first interface, can be with triggering terminal to the region In include the process that is encrypted of target object (such as icon, text).Wherein, first input can be click, again by or The inputs such as person's long-press.
Step 202, in response to first input, terminal show on the first interface target area corresponding with the first input and Prompt message.
Wherein, which can be used for prompting user's selection to the encrypted encryption pattern of target object, the target pair As for the object in target area.
Optionally, in the embodiment of the present invention, target area can be terminal according to user's on the first interface first defeated Enter identified region.In the region encrypted target object, such as application icon, file, picture, text are needed comprising user At least one of this and control etc..Illustratively, as shown in (a) in Fig. 3, if user wants to add shopping application It is close, then user can grow (such as long-press 5s, i.e., the above-mentioned first input) at preset timed intervals on the icon of the shopping application, For terminal after receiving the first input of user, terminal can determine target area corresponding with first input, and the The target area is shown on one interface.
Optionally, in the embodiment of the present invention, the shape of above-mentioned target area can be rectangle, circle or ellipse etc., It can specifically be determined according to actual use demand, the embodiment of the present invention is not construed as limiting.
Optionally, in the embodiment of the present invention, above-mentioned prompt message can be tabular form, wherein preserving encryption section With region to be encrypted (i.e. fixed target area), thus user can select to the encipherment scheme of encryption section (i.e. plus Close pattern) it modifies, or can select to determine its encipherment scheme for region to be encrypted.Optionally, the embodiment of the present invention In, above-mentioned prompt message can be the prompting frame for including multiple prompt options, wherein the encryption of prompt options instruction target object Pattern.The form of above-mentioned prompt message can specifically determine that the embodiment of the present invention is not construed as limiting according to actual use demand.
Illustratively, it is determined in user's triggering terminal and after display target region, terminal can be in the target area Side (shown in (b) in such as Fig. 3, target area is ellipse) display is for prompting user to select the prompt letter of encryption pattern Breath, which may include multiple prompt options, and a prompt options can serve to indicate that a kind of encryption pattern.The encryption Pattern can be preset encryption pattern or user-defined encryption pattern.Wherein, preset encryption pattern may include Mysterious pack pattern and camouflage pack pattern etc.;User-defined encryption pattern can be user according to personal like or reality The content for inputting or being arranged is needed, for example, picture or text input by user etc. that user uploads.Optionally, user makes by oneself The encryption pattern of justice can also include the change to the color, shape of the acquiescence Show Styles of target object, specifically can basis Actual use demand determines that the embodiment of the present invention is not construed as limiting.
Illustratively, as shown in (b) in Fig. 3, prompt message may include 3 prompt options, 3 prompt options point It is not used to indicate mysterious pack pattern, camouflage pack pattern, User Defined pack pattern, thus user can be according to actually making With demand, one or more encryption patterns are selected from 3 prompt options, for being encrypted to target object.
Illustratively, Fig. 4 be the embodiment of the present invention signal target object acquiescence Show Styles and it is selectable plus Close pattern.Wherein, the acquiescence Show Styles of target object can be the Show Styles as shown in (a) in Fig. 4, mystery packaging sample Formula can be the Show Styles as shown in (b) in Fig. 4, and camouflage pack pattern can be to show sample as shown in (c) in Fig. 4 Formula, self-defined pack pattern can be the Show Styles as shown in (d) in Fig. 4.
Step 203, terminal receive second input of the user in prompt message.
In the embodiment of the present invention, user can select to prompt in prompt message according to personal like or actual use demand Encryption pattern in one or more encryption patterns target object is encrypted.And select a variety of encryption patterns in user In the case of, user can determine that it selects the sequencing of a variety of encryption patterns according to personal like or actual use demand.
Step 204 is inputted in response to second, and terminal encrypts target object using the first encryption pattern of user's selection.
Optionally, in the embodiment of the present invention, in the case where user has selected at least two encryption patterns, terminal can be by According to the sequences of at least two encryption patterns of user's selection, using at least two encryption patterns to the target pair that includes in target area As encryption;Wherein, after being encrypted to the target object, which can correspond to a variety of Show Styles, a variety of Show Styles May include at least two encryption pattern and acquiescence Show Styles, and with the input of user, the display sample of the target object Formula can switch between a variety of Show Styles.Alternatively, terminal can also according to preset encryption (packaging) sequence, such as by According to mysterious pack pattern, camouflage pack pattern, the sequence of User Defined pack pattern, to the target pair for including in target area As being encrypted.It can specifically be determined according to actual use demand, the embodiment of the present invention is not construed as limiting.
Optionally, in the embodiment of the present invention, target object can be the removable content such as application icon, file, also may be used To be the irremovable content such as text, picture, control, that is to say, that encryption method provided in an embodiment of the present invention is not limited to pair Removable content-encrypt.
Optionally, in the embodiment of the present invention, target object can be interchangeable content in target area.For example, the mesh Display can be replaced by other content by marking object.Specifically, if partial content (such as application icon, text in target area Part folder, picture or control etc.) it is interchangeable, then can be the encryption to the contents of the section to the encryption of target object; If the full content (such as text) in target area is all replaceable, can be to entire target to the encryption of target object The encryption in region.
Optionally, include multiple target objects (such as application icon, file in the target area in the embodiment of the present invention Folder, picture, control) in the case of, it can be directed to target area selection encryption pattern, so that user may be used in terminal The encryption pattern of selection is carried out at the same time encryption to multiple target object in the target area, so may be implemented to multiple The quick encryption of target object.
Optionally, encryption method provided in an embodiment of the present invention can be used for a pair target area corresponding with the first input In target object encryption;Or it is interior comprising that in the case of encrypted content, can also have been encrypted to this in the region of interest Appearance is operated, such as the encryption pattern etc. for changing the encrypted content, can specifically be determined according to actual use demand, this hair Bright embodiment is not construed as limiting.
The encryption method that inventive embodiments provide, due to being carried out to target object by using one or more encryption patterns It encrypts (packaging), the Show Styles of target object can be made to change, so that the target object is not easy to be identified, because This is by may be implemented target object packaging the Show Styles encryption to target object.Compared with prior art, the present invention is real Can directly the Show Styles of target object be encrypted by applying the encryption method of example, without changing cloth of the target object on interface Office, in this way, encryption method provided in an embodiment of the present invention is no longer limited to the encryption to moving content, the i.e. embodiment of the present invention The application range of the encryption method of offer is wider and more flexible, better user experience.
Optionally, in conjunction with Fig. 2, as shown in figure 5, after step 201, it is provided in an embodiment of the present invention before step 202 Encryption method can also include following step 205 and step 206.
Step 205, terminal determine target area.
Associated description in above-mentioned steps 202 to target area specifically may refer to for the description of target area, herein It repeats no more.
Optionally, in the embodiment of the present invention, above-mentioned steps 205 can specifically pass through following step 205a- steps 205b It realizes.
Step 205a, terminal obtains input parameter corresponding with the first input.
Wherein, which may include at least one in location information, duration information and pressure information.I.e. with The corresponding input parameter of one input may include and first inputs corresponding location information, duration information corresponding with the first input With with the first input in corresponding pressure information at least one of.
Step 205b, terminal determines target area according to input parameter.
Target object in step 206, terminal recognition target area.
Illustratively, it is assumed that input parameter includes location information and duration information, in user at the first interface of terminal In the case of carrying out the first input (such as pressing) on a certain region, terminal can obtain the location information of the region on the screen And duration information corresponding with first input, and according to the location information and the input duration information, determine target area.
Optionally, in the embodiment of the present invention, the size of target area can be according to corresponding defeated with the first of user the input Enter parameter determination.Illustratively, the size of target area can be according to duration information corresponding with the first of user the input, pressure Information etc. determines.For example, longer with the first corresponding duration of input, the target area is bigger, and (i.e. the area of target area is got over Greatly);Bigger with the first corresponding pressure of input, the target area is bigger.
Optionally, in the embodiment of the present invention, above-mentioned target object is shown with the first pattern, i.e., target object is with the first pattern It is shown in the first interface.
In conjunction with Fig. 2, as shown in fig. 6, after step 204, encryption method provided in an embodiment of the present invention can also include Following steps 207 and step 208.
Step 207, terminal receive third input of the user on target object.
Step 208 is inputted in response to third, and inputting corresponding first finger print information in third meets the first preset fingerprint letter In the case of breath, terminal is with the second pattern display target object.
Wherein, the first pattern can be the acquiescence Show Styles of target object, and the second pattern can be the first encryption pattern; Or first pattern can be first encryption pattern, the second pattern can be target object acquiescence Show Styles.It specifically can be with Determine that the embodiment of the present invention is not construed as limiting according to actual use demand.
Optionally, it is a kind of encryption sample in the first encryption pattern that user is target object setting in the embodiment of the present invention In the case of formula, terminal in response to the input of user, can realize the Show Styles of target object in this encryption pattern and write from memory Recognize the switching between Show Styles.The case where the first encryption pattern that user is target object setting includes a variety of encryption patterns Under, terminal in response to the input of user, can realize that the Show Styles of target object is shown in a variety of encryption patterns and acquiescence Switching between pattern.
Illustratively, as shown in fig. 7, in the icon and the icon that target object is chat application with a kind of encryption pattern In the case of (being illustrated as mysterious encryption pattern in Fig. 7) display, if (i.e. above-mentioned third is defeated for input of the user on the icon Entering) corresponding first finger print information meets the first preset fingerprint information, then and terminal is to give tacit consent to Show Styles display target object, i.e., The Show Styles of target object is switched to acquiescence Show Styles by terminal from mystery encryption pattern.If user continues in the icon Upper input (i.e. third inputs), then terminal encrypts pattern display target object with the mystery again, i.e. terminal can be by target object Show Styles be switched to mysterious encryption pattern from acquiescence Show Styles.
Illustratively, as shown in figure 8, in the icon and the icon that target object is chat application with a variety of pack patterns In the case of (being illustrated as mysterious encryption pattern, camouflage encryption pattern in Fig. 8) display, if input of the user on the icon (i.e. above-mentioned third input) corresponding first finger print information meets the first preset fingerprint information, then terminal can make target object Show Styles is switched to camouflage pack pattern from mystery encryption pattern.If user continues the input on the icon, (i.e. third is defeated Enter), then terminal can make the Show Styles of target object be switched to the Show Styles of acquiescence from camouflage pack pattern.If user Continue input (i.e. third inputs) on the icon, then terminal encrypts pattern display target object with the mystery again, i.e. terminal can With by the Show Styles of target object mysterious encryption pattern, camouflage encryption pattern, acquiescence Show Styles between switch over.
Optionally, in conjunction with Fig. 2, as shown in figure 9, encryption method provided in an embodiment of the present invention can also include following step Rapid 209 and step 210.
Step 209, terminal receive fourth input of the user on target object.
Step 210 is inputted in response to the 4th, meets the second preset fingerprint letter in corresponding second finger print information of the 4th input In the case of breath, the content of terminal display target object.
Optionally, in the embodiment of the present invention, terminal can be directed to the target object shown with a certain encryption pattern after encryption, In the case where corresponding second finger print information of input (i.e. above-mentioned 4th input) of user meets the second preset fingerprint information, show Show the content of target object.
Illustratively, as shown in Figure 10, terminal judges user after receiving user to the input of the icon of chat application Corresponding second finger print information of input (i.e. above-mentioned 4th input) whether meet the second preset fingerprint information, in second fingerprint In the case that information meets the second preset fingerprint information, terminal can show the interface of the chat application, can so to use Family conveniently and efficiently triggering terminal show chat application interface.
It should be noted that in the embodiment of the present invention, above-mentioned method as shown in FIG. 6 can be applied in target object Show Styles encryption (such as target object is application icon, the encryption pattern that user's selection may be used shows application icon Sample formula is encrypted) in the case of, to the decryption of the Show Styles of target object (such as in the acquiescence Show Styles of application icon and right Application icon it is encrypted encryption pattern between switch) scene in.Above-mentioned method as shown in Figure 9 can be applied in target pair In the case of the content-encrypt (such as being encrypted to the application of application icon instruction) of elephant, to the decryption of the content of target object (such as Show application icon instruction application interface) scene in.
Optionally, in the embodiment of the present invention, before executing step 201, encryption method provided in an embodiment of the present invention is also May include the default condition for entering encryption space and preset fingerprint information (including the first above-mentioned preset fingerprint information and the Two preset fingerprint information).Wherein, encrypt space in may include the corresponding encipherment scheme in all encryption sections (i.e. plus Close pattern) between correspondence, further include region to be encrypted, i.e., fixed but unencryption target area.Optionally, add Above- mentioned information in close space can be preserved and be shown in the form of a list.
Illustratively, the above-mentioned condition for entering encryption space can be at least one in password, fingerprint or face recognition etc. , to ensure that the safety of operation is encrypted in user.For example, if the condition that user preset enters encryption space is fingerprint Information, then terminal can on the first interface of the user in terminal input (such as long-press) in the case of acquisition user fingerprint letter Breath, if the finger print information of acquisition meets for the encryption preset finger print information in space, terminal can show encryption space In encryption section and region to be encrypted, thus user can select to the encipherment scheme of encryption section (encryption pattern) into Row modification, or can select to determine its encipherment scheme for region to be encrypted.
Wherein, the first preset fingerprint information and the second preset fingerprint information are different two finger print informations, respectively can be with Decryption for carrying out different purposes to encrypted target object.Illustratively, in the corresponding finger print information of the input of user In the case of meeting the first preset fingerprint information, the Show Styles of encrypted target object can be cut with triggering terminal It changes;For example, can with triggering terminal to the Show Styles of encrypted target object user setting encryption pattern and target pair It is switched between the acquiescence Show Styles of elephant, the decryption to the Show Styles of target object so may be implemented.User's It inputs in the case that corresponding finger print information meets the second preset fingerprint information, encrypted target pair can be shown with triggering terminal The decryption to the content of target object so may be implemented in the content of elephant.
Optionally, the above-mentioned preset finger print information for entering encryption space can be believed with the first finger print information and the second fingerprint A finger print information in breath is identical, can also be different from the first finger print information and the second finger print information, specifically can basis Actual use demand determines that the embodiment of the present invention is not construed as limiting.
As shown in figure 11, the embodiment of the present invention provides a kind of decryption method, which can be applied to terminal, the solution Decryption method may include following step 301 and step 302.
Step 301, with the first pattern display target object, terminal receives the of user on target object One target inputs.
Step 302 is inputted in response to first object, and inputting corresponding first finger print information in first object meets first in advance If in the case of finger print information, terminal is with the second pattern display target object.
Wherein, the first pattern can be the acquiescence Show Styles of target object, and the second pattern can be that user is target pair As the first encryption pattern of setting, the first encryption pattern is used to encrypt target object;Or first pattern can be first plus Close pattern, the second pattern can be the acquiescence Show Styles of target object.
The description of step 301 and step 302 specifically may refer in above-mentioned embodiment of the method as shown in FIG. 6 to step Rapid 207 and step 208 associated description, details are not described herein again.
Optionally, in conjunction with Figure 11, as shown in figure 12, decryption method provided in an embodiment of the present invention can also include following Step 303 and step 304.
Step 303, terminal receive the of user on target object with the first pattern display target object Two targets input.
Step 304 is inputted in response to the second target, and inputting corresponding second finger print information in the second target meets second in advance If in the case of finger print information, the content of terminal display target object.
The description of step 303 and step 304 specifically may refer in above-mentioned embodiment of the method as shown in Figure 9 to step Rapid 209 and step 210 associated description, details are not described herein again.
Decryption method provided in an embodiment of the present invention, after being encrypted to the Show Styles of target object, due to that can touch The Show Styles for sending out target object encrypted switches between the first encryption pattern and acquiescence Show Styles, therefore may be implemented Directly to the decryption of the Show Styles of target object after encryption.Compared with prior art, the decryption method of the embodiment of the present invention can Directly encrypted target object to be decrypted, without again in individual private space to encrypted target object Decryption, therefore decryption method provided in an embodiment of the present invention is no longer limited in individual private space carry out target object Decryption, i.e., the application range of decryption method provided in an embodiment of the present invention is wider and more flexible, better user experience.
As shown in figure 13, the embodiment of the present invention provides a kind of encryption device 13, which may include receiving mould Block 131, display module 132 and encrypting module 133.
Receiving module 131, for receiving the first input of user on the first interface;Display module 132, in response to The first input that receiving module 131 receives, shows target area corresponding with first input and prompt on first interface Information, for the prompt message for prompting user's selection to the encrypted encryption pattern of target object, which is the target area Object in domain;Receiving module 131 is additionally operable to receive second input of the user in the prompt message;Encrypting module 133 is used In the second input received in response to receiving module 131, the target object is encrypted using the first encryption pattern of user's selection.
Optionally, in conjunction with Figure 13, as shown in figure 14, encryption device 13 provided in an embodiment of the present invention can also include determining Module 134 and identification module 135.Determining module 134, for receiving first of user on the first interface in receiving module 131 After input, display module 132 shown on first interface target area corresponding with first input and prompt message it Before, determine the target area;Identification module 135, for identification determining module 134 determine the target area in the target pair As.
Optionally, in the embodiment of the present invention, the first encryption pattern includes at least two encryption patterns.Encrypting module 133, tool Body is used for the sequence according at least two encryption pattern of user's selection, is added to the target object using at least two encryption patterns It is close;Wherein, after being encrypted to the target object, which can correspond to a variety of Show Styles, which can be with Including at least two encryption pattern and acquiescence Show Styles, and with the input of user, the Show Styles of the target object can To switch between a variety of Show Styles.
Optionally, in the embodiment of the present invention, which is shown with the first pattern.Receiving module 131, can be also used for After encrypting module 133 encrypts the target object using the first encryption pattern of user's selection, user is received in the target pair As upper third inputs;Display module 132 is additionally operable to the third input received in response to receiving module 131, is inputted in the third In the case that corresponding first finger print information meets the first preset fingerprint information, which is shown with the second pattern.Wherein, First pattern is the acquiescence Show Styles of the target object, which is the first encryption pattern;Or first sample Formula is the first encryption pattern, which is the acquiescence Show Styles of the target object.
Optionally, in the embodiment of the present invention, receiving module 131 can be also used for receiving the of user on the target object Four inputs;Display module 132 can be also used for the 4th input received in response to receiving module 131, be corresponded in the 4th input The second finger print information meet the second preset fingerprint information in the case of, show the content of the target object.
Optionally, in the embodiment of the present invention, determining module 134 is specifically used for obtaining input corresponding with first input Parameter, and according to the input parameter, determine the target area;The input parameter may include location information, duration information and pressure At least one of in force information.
The embodiment of the present invention provides a kind of encryption device, since encryption device is by using one or more encryption patterns pair (packaging) is encrypted in target object, and the Show Styles of target object can be made to change, so that the target object It is not easy to be identified, therefore encryption device to target object packaging by may be implemented to encrypt the Show Styles of target object.With The prior art is compared, and encryption device provided in an embodiment of the present invention can directly encrypt the Show Styles of target object, and nothing Layout of the target object on interface need to be changed, in this way, encryption device provided in an embodiment of the present invention is no longer limited to removable The application range of the encryption of dynamic content, i.e., encryption device provided in an embodiment of the present invention is wider and more flexible, user experience compared with It is good.
As shown in figure 15, the embodiment of the present invention provides a kind of decryption device 15, which includes receiving module 151 With display module 152.
Receiving module 151, in the case where target object is shown with the first pattern, receiving user in the target object On first object input;Display module 152, the first object input for receiving in response to receiving module 151, this first In the case that corresponding first finger print information of target input meets the first preset fingerprint information, which is shown with the second pattern As.Wherein, which can be the acquiescence Show Styles of the target object, which can be that user is the target First encryption pattern of object setting, the first encryption pattern are used to encrypt the target object;Or first pattern can be with For the first encryption pattern, which can be the acquiescence Show Styles of the target object.
Optionally, in the embodiment of the present invention, receiving module 151 is additionally operable to the feelings of the first pattern display target object Under condition, second target input of the user on the target object is received;Display module 152 is additionally operable in response to receiving module 151 The the second target input received, the feelings that corresponding second finger print information meets the second preset fingerprint information are inputted in second target Under condition, the content of the target object is shown.
The embodiment of the present invention provides a kind of decryption device, after being encrypted to the Show Styles of target object, due to the solution The Show Styles that close device can trigger encrypted target object switches between the first encryption pattern and acquiescence Show Styles, Therefore the decryption directly to the Show Styles of target object after encryption may be implemented in decryption device.Compared with prior art, this hair The decryption device of bright embodiment can directly be decrypted encrypted target object, without again in individual private space In encrypted target object is decrypted, therefore decryption device provided in an embodiment of the present invention is no longer limited in individual privacy Target object is decrypted in space, i.e., the application range of decryption device provided in an embodiment of the present invention is wider and more flexible, Better user experience.
A kind of hardware architecture diagram of Figure 16 terminals of each embodiment to realize the present invention.As shown in figure 16, the end End 100 includes but not limited to:Radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110 and power supply 111 etc. Component.It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Figure 16, terminal can be with Including than illustrating more or fewer components, either combining certain components or different components arrangement.In the embodiment of the present invention In, terminal include but not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and Pedometer etc..
In the case of one kind, correspond to encryption method provided in an embodiment of the present invention:
User input unit 107, for receiving the first input of user on the first interface;Display unit 106, for ringing Should in the first input that user input unit 107 receives, show on the first interface corresponding with the first input target area and Prompt message, for the prompt message for prompting user's selection to the encrypted encryption pattern of target object, which is the mesh Mark the object in region;User input unit 107 is additionally operable to receive second input of the user in the prompt message;Processor 110, the second input for being received in response to user input unit 107, using the first encryption pattern of user's selection to the mesh Mark object encryption.
The embodiment of the present invention provides a kind of terminal, due to terminal by using one or more encryption patterns to target object (packaging) is encrypted, the Show Styles of target object can be made to change, so that the target object is not easy to be distinguished Know, therefore terminal to target object packaging by may be implemented to encrypt the Show Styles of target object.Compared with prior art, Terminal provided in an embodiment of the present invention can directly encrypt the Show Styles of target object, without changing target object on boundary Layout on face, in this way, terminal provided in an embodiment of the present invention is no longer limited to the encryption to moving content, i.e. the present invention is real Apply the terminal of example offer application range is wider and more flexible, better user experience.
In another case, corresponding to decryption method provided in an embodiment of the present invention:
User input unit 107, in the case where target object is shown with the first pattern, receiving user in the target First object input on object;Display unit 106, the first object for being received in response to user input unit 107 input, In the case where the first object inputs corresponding first finger print information and meets the first preset fingerprint information, shown with the second pattern The target object.Wherein, the first pattern is the acquiescence Show Styles of target object, and the second pattern is that user is target object setting First encryption pattern, first encryption pattern be used for target object encrypt;Or first pattern be first encryption pattern, second Pattern is the acquiescence Show Styles of target object.
The embodiment of the present invention provides a kind of terminal, and terminal is after encrypting the Show Styles of target object, due to can be with The Show Styles for triggering encrypted target object switches between the first encryption pattern and acquiescence Show Styles, therefore terminal can To realize the decryption directly to the Show Styles of target object after encryption.Compared with prior art, the terminal of the embodiment of the present invention Directly encrypted target object can be decrypted, without again in individual private space to encrypted target pair As decryption, therefore terminal provided in an embodiment of the present invention is no longer limited to solve target object in individual private space Close, i.e., the application range of terminal provided in an embodiment of the present invention is wider and more flexible, better user experience.
It should be understood that the embodiment of the present invention in, radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 110 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 101 includes but not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by radio communication system and network and other set Standby communication.
Terminal has provided wireless broadband internet to the user by network module 102 and has accessed, and such as user is helped to receive and dispatch electricity Sub- mail, browsing webpage and access streaming video etc..
It is that audio output unit 103 can receive radio frequency unit 101 or network module 102 or in memory 109 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 103 can also provide and end The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that end 100 executes.Sound Frequency output unit 103 includes loud speaker, buzzer and receiver etc..
Input unit 104 is for receiving audio or video signal.Input unit 104 may include graphics processor (graphics processing unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained by image capture apparatus (such as camera) in image capture mode carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or network module 102.Mike Wind 1042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output of mobile communication base station can be sent to via radio frequency unit 101 by being converted in the case of telephone calling model.
Terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjusts the brightness of display panel 1061, and proximity sensor can close display panel when terminal 100 is moved in one's ear 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add The size of speed can detect that size and the direction of gravity when static, can be used to identify terminal posture (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 105 can be with Including fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, thermometer, Infrared sensor etc., details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (liquid crystal display, LCD), Organic Light Emitting Diode may be used Forms such as (organic light-emitting diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generates and set with the user of terminal It sets and the related key signals of function control inputs.Specifically, user input unit 107 include touch panel 1071 and other Input equipment 1072.Touch panel 1071, also referred to as touch screen, collect user on it or neighbouring touch operation (such as User is using any suitable objects or attachment such as finger, stylus on touch panel 1071 or near touch panel 1071 Operation).Touch panel 1071 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined The touch orientation of user is surveyed, and detects the signal that touch operation is brought, transmits a signal to touch controller;Touch controller from Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 110, receives processor 110 The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves Realize touch panel 1071.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072. Specifically, other input equipments 1072 can include but is not limited to physical keyboard, function key (such as volume control button, switch Button etc.), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 1071 can be covered on display panel 1061, when touch panel 1071 is detected at it On or near touch operation after, send processor 110 to determine the type of touch event, be followed by subsequent processing device 110 according to touch The type for touching event provides corresponding visual output on display panel 1061.Although in figure 16, touch panel 1071 with it is aobvious Show that panel 1061 is to realize the function that outputs and inputs of terminal as two independent components, but in certain embodiments, The function that outputs and inputs that can touch panel 1071 and display panel 1061 be integrated and be realized terminal, does not limit specifically herein It is fixed.
Interface unit 108 is the interface that external device (ED) is connect with terminal 100.For example, external device (ED) may include it is wired or Wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, memory card port, For connecting the port of device with identification module, the port audio input/output (I/O), video i/o port, ear port Etc..Interface unit 108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and will One or more elements that the input received is transferred in terminal 100 or can be used for terminal 100 and external device (ED) it Between transmission data.
Memory 109 can be used for storing software program and various data.Memory 109 can include mainly storing program area And storage data field, wherein storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to It crosses operation or executes the software program and/or module being stored in memory 109, and call and be stored in memory 109 Data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 110 may include one Or multiple processing units;Optionally, processor 110 can integrate application processor and modem processor, wherein application processing The main processing operation system of device, user interface and application program etc., modem processor mainly handles wireless communication.It can manage Solution, above-mentioned modem processor can not also be integrated into processor 110.
Terminal 100 can also include the power supply 111 (such as battery) powered to all parts, and optionally, power supply 111 can be with It is logically contiguous by power-supply management system and processor 110, to by power-supply management system realize management charging, electric discharge, with And the functions such as power managed.
In addition, terminal 100 includes some unshowned function modules, details are not described herein.
Optionally, the embodiment of the present invention also provides a kind of terminal, including processor 110 as shown in figure 16, memory 109, it is stored in the computer program that can be run on memory 109 and on the processor 110, which is handled It realizes that terminal executes each process of encryption and decryption approaches in above method embodiment when device 110 executes, and can reach identical Technique effect, to avoid repeating, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program realizes that terminal executes encryption and decryption approaches in above method embodiment when the computer program is executed by processor Each process, and identical technique effect can be reached, to avoid repeating, which is not described herein again.Wherein, this computer-readable is deposited Storage media may include read-only memory (read-only memory, ROM), random access memory (random access Memory, RAM), magnetic disc or CD etc..
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within the protection of the present invention.

Claims (12)

1. a kind of encryption method is applied to terminal, which is characterized in that the method includes:
Receive the first input of user on the first interface;
In response to first input, target area corresponding with first input and prompt are shown on first interface Information, for the prompt message for prompting user's selection to the encrypted encryption pattern of target object, the target object is described Object in target area;
Receive second input of the user in the prompt message;
In response to second input, the target object is encrypted using the first encryption pattern of user's selection.
2. encryption method according to claim 1, which is characterized in that described to receive user's on the first interface first defeated After entering, before the display target area corresponding with first input on first interface and prompt message, institute The method of stating further includes:
Determine the target area;
Identify the target object in the target area.
3. encryption method according to claim 1 or 2, which is characterized in that the first encryption pattern includes at least two Encrypt pattern;
It is described that the target object is encrypted using the first encryption pattern of user's selection, including:
The sequence that at least two encryptions pattern is selected according to user encrypts pattern to the target using described at least two Object encryption;
Wherein, after being encrypted to the target object, the target object corresponds to a variety of Show Styles, a variety of Show Styles packets At least two encryption pattern and acquiescence Show Styles are included, and with the input of user, the Show Styles of the target object Switch between a variety of Show Styles.
4. encryption method according to claim 1, which is characterized in that the target object is shown with the first pattern;
After the first encryption pattern using user's selection encrypts the target object, the method further includes:
Receive third input of the user on the target object;
It is inputted in response to the third, inputs corresponding first finger print information in the third and meet the first preset fingerprint information In the case of, the target object is shown with the second pattern;
Wherein, first pattern is the acquiescence Show Styles of the target object, and second pattern is first encryption Pattern;Or first pattern is the first encryption pattern, second pattern is that the acquiescence of the target object is shown Pattern.
5. encryption method according to claim 1 or 4, which is characterized in that the method further includes:
Receive fourth input of the user on the target object;
In response to the 4th input, meet the second preset fingerprint information in corresponding second finger print information of the 4th input In the case of, show the content of the target object.
6. encryption method according to claim 2, which is characterized in that the determination target area, including:
Input parameter corresponding with first input is obtained, the input parameter includes location information, duration information and pressure At least one of in information;
According to the input parameter, the target area is determined.
7. a kind of encryption device, which is characterized in that including receiving module, display module and encrypting module;
The receiving module, for receiving the first input of user on the first interface;
The display module, first input for being received in response to the receiving module, shows on first interface Show target area corresponding with first input and prompt message, the prompt message is for prompting user's selection to target pair As encrypted encryption pattern, the target object is the object in the target area;
The receiving module is additionally operable to receive second input of the user in the prompt message;
The encrypting module, second input for being received in response to the receiving module, using the first of user's selection Encryption pattern encrypts the target object.
8. encryption device according to claim 7, which is characterized in that the encryption device further includes determining module and identification Module;
The determining module, it is described aobvious after receiving the first input of user on the first interface in the receiving module Before showing that module shows target area corresponding with first input and prompt message on first interface, described in determination Target area;
The identification module, the target object in the target area that the determining module determines for identification.
9. encryption device according to claim 7 or 8, which is characterized in that the first encryption pattern includes at least two Encrypt pattern;
The encrypting module, specifically for according to user select it is described at least two encryption pattern sequences, using it is described at least Two kinds of encryption patterns encrypt the target object;
Wherein, after being encrypted to the target object, the target object corresponds to a variety of Show Styles, a variety of Show Styles packets At least two encryption pattern and acquiescence Show Styles are included, and with the input of user, the Show Styles of the target object Switch between a variety of Show Styles.
10. encryption device according to claim 7, which is characterized in that the target object is shown with the first pattern;
The receiving module is additionally operable to the encrypting module and is added to the target object using the first encryption pattern of user's selection After close, third input of the user on the target object is received;
The display module is additionally operable to the third input received in response to the receiving module, in third input pair In the case that the first finger print information answered meets the first preset fingerprint information, the target object is shown with the second pattern;
Wherein, first pattern is the acquiescence Show Styles of the target object, and second pattern is first encryption Pattern;Or first pattern is the first encryption pattern, second pattern is that the acquiescence of the target object is shown Pattern.
11. the encryption device according to claim 7 or 10, which is characterized in that
The receiving module is additionally operable to receive fourth input of the user on the target object;
The display module is additionally operable to the 4th input received in response to the receiving module, in the 4th input pair In the case that the second finger print information answered meets the second preset fingerprint information, the content of the target object is shown.
12. encryption device according to claim 8, which is characterized in that
The determining module, is specifically used for obtaining corresponding with first input input parameter, and according to the input parameter, Determine that the target area, the input parameter include at least one in location information, duration information and pressure information.
CN201810524964.4A 2018-05-28 2018-05-28 Encryption method and device Active CN108681664B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810524964.4A CN108681664B (en) 2018-05-28 2018-05-28 Encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810524964.4A CN108681664B (en) 2018-05-28 2018-05-28 Encryption method and device

Publications (2)

Publication Number Publication Date
CN108681664A true CN108681664A (en) 2018-10-19
CN108681664B CN108681664B (en) 2020-05-19

Family

ID=63808922

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810524964.4A Active CN108681664B (en) 2018-05-28 2018-05-28 Encryption method and device

Country Status (1)

Country Link
CN (1) CN108681664B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109740312A (en) * 2019-01-28 2019-05-10 维沃移动通信有限公司 A kind of application control method and terminal device
CN109828908A (en) * 2018-12-15 2019-05-31 中国平安人寿保险股份有限公司 Interface testing parameter encryption method, device, electronic equipment and storage medium
CN109886000A (en) * 2019-02-01 2019-06-14 维沃移动通信有限公司 A kind of image encryption method and mobile terminal
CN109918882A (en) * 2019-02-01 2019-06-21 维沃移动通信有限公司 A kind of image encryption method and mobile terminal
CN109993010A (en) * 2019-03-29 2019-07-09 维沃移动通信有限公司 A kind of information display method and mobile terminal
CN112149064A (en) * 2019-06-28 2020-12-29 Oppo广东移动通信有限公司 Encryption and decryption method, electronic device and non-volatile computer-readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103763091A (en) * 2014-01-09 2014-04-30 深圳市欧珀通信软件有限公司 Encrypting method, decrypting method, encrypting device and decrypting device of application program
CN105184183A (en) * 2015-07-30 2015-12-23 努比亚技术有限公司 Chatting record encryption method and mobile terminal
CN106228085A (en) * 2016-07-27 2016-12-14 维沃移动通信有限公司 The method for secret protection of application program and mobile terminal
CN106453052A (en) * 2016-10-14 2017-02-22 北京小米移动软件有限公司 Message interaction method and apparatus thereof
CN106548082A (en) * 2016-11-08 2017-03-29 深圳市万普拉斯科技有限公司 Message treatment method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103763091A (en) * 2014-01-09 2014-04-30 深圳市欧珀通信软件有限公司 Encrypting method, decrypting method, encrypting device and decrypting device of application program
CN105184183A (en) * 2015-07-30 2015-12-23 努比亚技术有限公司 Chatting record encryption method and mobile terminal
CN106228085A (en) * 2016-07-27 2016-12-14 维沃移动通信有限公司 The method for secret protection of application program and mobile terminal
CN106453052A (en) * 2016-10-14 2017-02-22 北京小米移动软件有限公司 Message interaction method and apparatus thereof
CN106548082A (en) * 2016-11-08 2017-03-29 深圳市万普拉斯科技有限公司 Message treatment method and device

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109828908A (en) * 2018-12-15 2019-05-31 中国平安人寿保险股份有限公司 Interface testing parameter encryption method, device, electronic equipment and storage medium
CN109740312A (en) * 2019-01-28 2019-05-10 维沃移动通信有限公司 A kind of application control method and terminal device
WO2020156440A1 (en) * 2019-01-28 2020-08-06 维沃移动通信有限公司 Application control method and terminal device
CN109886000A (en) * 2019-02-01 2019-06-14 维沃移动通信有限公司 A kind of image encryption method and mobile terminal
CN109918882A (en) * 2019-02-01 2019-06-21 维沃移动通信有限公司 A kind of image encryption method and mobile terminal
CN109918882B (en) * 2019-02-01 2023-11-21 维沃移动通信有限公司 Image encryption method and mobile terminal
CN109886000B (en) * 2019-02-01 2024-03-01 维沃移动通信有限公司 Image encryption method and mobile terminal
CN109993010A (en) * 2019-03-29 2019-07-09 维沃移动通信有限公司 A kind of information display method and mobile terminal
CN112149064A (en) * 2019-06-28 2020-12-29 Oppo广东移动通信有限公司 Encryption and decryption method, electronic device and non-volatile computer-readable storage medium

Also Published As

Publication number Publication date
CN108681664B (en) 2020-05-19

Similar Documents

Publication Publication Date Title
CN108681664A (en) A kind of encryption method and device
CN108491133A (en) A kind of application control method and terminal
CN109525874A (en) A kind of screenshotss method and terminal device
CN110188524B (en) Information encryption method, information decryption method and terminal
CN109002340A (en) A kind of screen locking method and electronic equipment
CN109871164A (en) A kind of message method and terminal device
CN108595946A (en) A kind of method and terminal of protection privacy
CN109656437A (en) A kind of information display method and terminal device
CN109886000B (en) Image encryption method and mobile terminal
CN108459788A (en) A kind of image display method and terminal
CN108391123A (en) A kind of method and terminal generating video
CN109145552A (en) Information ciphering method and terminal device
CN108600078A (en) A kind of method and terminal of communication
CN109407948A (en) A kind of interface display method and mobile terminal
CN110308838A (en) A kind of application interaction processing method and terminal device
CN109117054A (en) A kind of display control method and terminal
CN109471524A (en) A kind of method and mobile terminal controlling motor vibrations
CN108153460A (en) A kind of icon hiding method and terminal
CN107992770A (en) A kind of photograph album processing method and mobile terminal
CN109871177A (en) Display control method and mobile terminal
CN109766156A (en) A kind of conversation establishing method and terminal device
CN109672845A (en) A kind of method, apparatus and mobile terminal of video calling
CN109740312A (en) A kind of application control method and terminal device
CN108446153A (en) A kind of method and terminal of control e-sourcing
CN108109188A (en) A kind of image processing method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant