CN109190388A - A kind of encryption method, decryption method and terminal device - Google Patents

A kind of encryption method, decryption method and terminal device Download PDF

Info

Publication number
CN109190388A
CN109190388A CN201810862196.3A CN201810862196A CN109190388A CN 109190388 A CN109190388 A CN 109190388A CN 201810862196 A CN201810862196 A CN 201810862196A CN 109190388 A CN109190388 A CN 109190388A
Authority
CN
China
Prior art keywords
input
target
decryption
terminal device
characteristic area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810862196.3A
Other languages
Chinese (zh)
Other versions
CN109190388B (en
Inventor
黄才旺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810862196.3A priority Critical patent/CN109190388B/en
Publication of CN109190388A publication Critical patent/CN109190388A/en
Application granted granted Critical
Publication of CN109190388B publication Critical patent/CN109190388B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the invention discloses a kind of encryption method, decryption method and terminal devices, are related to field of communication technology, lower using the safety in a manner of password encryption and decryption to solve the problems, such as.This method comprises: receiving the first input of user, which is the input that user selects encrypted object;In response to first input, M characteristic area is shown in first area, and show N number of target object in second area, N number of target object is different from the encrypted object, and M and N are positive integer;The second input of user is received, which is respectively moved to S characteristic area in the M characteristic area for S target object in N number of target object for triggering terminal equipment, and S is positive integer, S≤N and S≤M;The encrypted object is encrypted using the corresponding relationship between the S target object and the S characteristic area in response to second input.This method can be applied in the content-encrypt scene to terminal device.

Description

A kind of encryption method, decryption method and terminal device
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of encryption methods, decryption method and terminal device.
Background technique
With the development of communication technology, the safety of the content in terminal device is increasingly by the attention of user.
Currently, in order to guarantee the content safety in terminal device, it can be in such a way that password be set to the content-encrypt. For example, user can be that password is arranged in the application program with triggering terminal equipment if encrypted content is some application program (such as the password can be 6 bit digitals), so when user wants using the application program, user can be by inputting password Mode triggering terminal equipment the application program is decrypted and runs the application program.
However, due to it is above-mentioned by the way of password encryption and decryption it is relatively simple, be easy to be cracked, to hold The content easily led in terminal device is leaked, i.e., the above-mentioned safety by the way of password encryption and decryption is lower.
Summary of the invention
The embodiment of the present invention provides a kind of encryption method, decryption method and terminal device, to solve using password encryption and The lower problem of the safety of the mode of decryption.
In order to solve the above-mentioned technical problem, the embodiments of the present invention are implemented as follows:
In a first aspect, being applied to terminal device, the encryption method packet the embodiment of the invention provides a kind of encryption method It includes: receiving the first input of user, which is the input that user selects encrypted object;In response to this first input, First area shows M characteristic area, and shows N number of target object in second area, N number of target object and the encrypted object Difference, M and N are positive integer;The second input of user is received, which is used for triggering terminal equipment for N number of target S target object in object is respectively moved to S characteristic area in the M characteristic area, and S is positive integer, and S≤N and S≤ M;In response to second input, using the corresponding relationship between the S target object and the S characteristic area, to the encryption pair As encryption.
Second aspect, the embodiment of the invention provides a kind of terminal device, which includes receiving module, display mould Block and encrypting module.Receiving module, for receiving the first input of user, which is that user selects the defeated of encrypted object Enter;Display module is used in response to received first input of receiving module, in M characteristic area of first area display, and Second area shows N number of target object, and N number of target object is different from the encrypted object, and M and N are positive integer;Receive mould Block is also used to receive the second input of user, and second input is a by the S in N number of target object for triggering terminal equipment Target object is respectively moved to S characteristic area in the M characteristic area, and S is positive integer, S≤N and S≤M;Encrypting module, For in response to receiving module it is received this second input, using the correspondence between the S target object and the S characteristic area Relationship encrypts the encrypted object.
The third aspect the embodiment of the invention provides a kind of terminal device, including processor, memory and is stored in this and deposits On reservoir and the computer program that can run on the processor, the computer program realize first party when being executed by the processor The step of encryption method that face provides.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage mediums Computer program is stored in matter, and the step for the encryption method that first aspect provides is realized when which is executed by processor Suddenly.
In embodiments of the present invention, can receive user first input (this first input be user select encrypted object Input);And in response to first input, M characteristic area is shown in first area, and show N number of target in second area Object (N number of target object is different from the encrypted object, and M and N are positive integer);And it receives the second input of user (this S target object in N number of target object is respectively moved in the M characteristic area by two inputs for triggering terminal equipment S characteristic area, S is positive integer, S≤N and S≤M);And in response to this second input, using the S target object with Corresponding relationship between the S characteristic area encrypts the encrypted object.With this solution, with the password encryption of the prior art Mode is easy to be cracked different, and since the target object in different terminal equipment is different, different user is from N number of target object S target object of middle selection is also different, and the S characteristic area that S target object is moved respectively to by different user is also different, Therefore, by using the corresponding relationship between the S target object and S characteristic area in N number of target object of terminal device, Encrypted object is encrypted, the complexity of cipher mode can be improved, so that cipher mode is not easy to be cracked, i.e., the present invention is implemented The safety for the encryption method that example provides is higher.
5th aspect, the embodiment of the invention provides a kind of decryption methods, are applied to terminal device, the decryption method packet It includes: receiving the first object input of user;It is inputted in response to the first object, in M characteristic area of first area display, and Second area shows that N number of target object, M and N are positive integer;Receive the second target input of user;In response to second mesh Mark input, when second target input presets input for first, to decryption object decryption, wherein when second target inputs When presetting input for first, second target input is used for triggering terminal equipment for S target object in N number of target object S characteristic area being respectively moved in the M characteristic area, N number of target object is different from the decryption object, and S is positive whole Number, S≤N and S≤M.
6th aspect, the embodiment of the invention provides a kind of terminal device, which includes receiving module, display mould Block and deciphering module.Receiving module, the first object for receiving user input;Display module, in response to receiving module Received first object input shows M characteristic area in first area, and shows N number of target object, M in second area It is positive integer with N;Receiving module is also used to receive the second target input of user;Deciphering module, in response to receiving mould Received second target input of block, when second target input presets input for first, to decryption object decryption, wherein When second target, which inputs, presets input for first, second target input is used for triggering terminal equipment for N number of target object In S target object be respectively moved to S characteristic area in the M characteristic area, N number of target object and the decryption pair As difference, S is positive integer, S≤N and S≤M.
7th aspect the embodiment of the invention provides a kind of terminal device, including processor, memory and is stored in this and deposits On reservoir and the computer program that can run on the processor, the 5th side is realized when which is executed by the processor The step of decryption method that face provides.
Eighth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage mediums Computer program is stored in matter, and the step for the decryption method that the 5th aspect provides is realized when which is executed by processor Suddenly.
In embodiments of the present invention, it can receive the first object input of user;And inputted in response to the first object, First area shows M characteristic area, and shows N number of target object (M be positive integer with N) in second area;And it receives and uses Second target at family inputs;And inputted in response to second target, it is right when second target input presets input for first Decrypting object decryption, (wherein, when second target input presets input for first, second target input is used for triggering terminal S target object in N number of target object is respectively moved to S characteristic area in the M characteristic area, the N by equipment A target object is different from the decryption object, and S is positive integer, S≤N and S≤M).With this solution, with the password of the prior art Manner of decryption is easy to be cracked different, and since the target object in different terminal equipment is different, different user is from N number of target The S target object selected in object is also different, the S characteristic area that S target object is moved respectively to by different user Therefore difference passes through S feature being respectively moved to S target object in N number of target object in M characteristic area The complexity of manner of decryption can be improved to decryption object decryption in region, so that the manner of decryption is not easy to be cracked, i.e., originally The safety for the decryption method that inventive embodiments provide is higher.
Detailed description of the invention
Fig. 1 is a kind of configuration diagram of Android operation system provided in an embodiment of the present invention;
Fig. 2 is a kind of one of schematic diagram of encryption method provided in an embodiment of the present invention;
Fig. 3 is one of the schematic diagram of target object that terminal device provided in an embodiment of the present invention is shown;
Fig. 4 is the two of the schematic diagram for the target object that terminal device provided in an embodiment of the present invention is shown;
Fig. 5 is the schematic diagram that terminal device provided in an embodiment of the present invention shows characteristic area and target object;
Fig. 6 is the schematic diagram of S target object after terminal device provided in an embodiment of the present invention display is mobile;
Fig. 7 is the schematic diagram of the encrypted object after terminal device provided in an embodiment of the present invention is concealed encrypted;
Fig. 8 is the two of a kind of schematic diagram of encryption method provided in an embodiment of the present invention;
Fig. 9 is the schematic diagram that terminal device provided in an embodiment of the present invention shows sliding trace;
Figure 10 is the schematic diagram that terminal device provided in an embodiment of the present invention shows the first prompt information;
Figure 11 is the schematic diagram that terminal device provided in an embodiment of the present invention shows the second prompt information;
Figure 12 is the three of a kind of schematic diagram of encryption method provided in an embodiment of the present invention;
Figure 13 is the schematic diagram of the decryption object after terminal device provided in an embodiment of the present invention display decryption;
Figure 14 is a kind of schematic diagram of decryption method provided in an embodiment of the present invention;
Figure 15 is one of the structural schematic diagram of terminal device provided in an embodiment of the present invention;
Figure 16 is the second structural representation of terminal device provided in an embodiment of the present invention;
Figure 17 is the third structural representation of terminal device provided in an embodiment of the present invention;
Figure 18 is the hardware schematic of terminal device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
The terms "and/or" is a kind of incidence relation for describing affiliated partner, indicates may exist three kinds of relationships, For example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.
Term " first " and " second " in description and claims of this specification etc. are for distinguishing different pairs As, rather than it is used for the particular order of description object.For example, the first input, the second input and third input etc. are for distinguishing Different inputs, rather than the particular order for describing input.
In embodiments of the present invention, " illustrative " or " such as " etc. words for indicate make example, illustration or explanation.This Be described as in inventive embodiments " illustrative " or " such as " any embodiment or design scheme be not necessarily to be construed as comparing Other embodiments or design scheme more preferably or more advantage.Specifically, use " illustrative " or " such as " etc. words purport Related notion is being presented in specific ways.
In the description of the embodiment of the present invention, unless otherwise indicated, the meaning of " plurality " is refer to two or more, For example, multiple element refers to two or more element.
The embodiment of the present invention provides a kind of encryption method and terminal device, and can receive the first input of user, (this first Input is the input that user selects encrypted object);And in response to first input, M characteristic area is shown in first area, and Show N number of target object in second area (N number of target object is different from the encrypted object, and M and N are positive integer);And it connects (second input distinguishes S target object in N number of target object for triggering terminal equipment for the second input of receipts user S characteristic area being moved in the M characteristic area, S are positive integer, S≤N and S≤M);And it is second defeated in response to this Enter, using the corresponding relationship between the S target object and the S characteristic area, which is encrypted.Pass through the party Case is easy to be cracked different, not due to the target object in different terminal equipment with the password encryption mode of the prior art Together, the S target object that different user is selected from N number of target object is also different, and different user moves S target object respectively The S characteristic area moved is also different, therefore, by using the S target object and S in N number of target object of terminal device Corresponding relationship between a characteristic area encrypts encrypted object, the complexity of cipher mode can be improved, so that cipher mode It is not easy to be cracked, i.e., the safety of encryption method provided in an embodiment of the present invention is higher.
The embodiment of the present invention provides a kind of decryption method and terminal device, can receive the first object input of user;And It is inputted in response to the first object, shows M characteristic area in first area, and show N number of target object (M in second area It is positive integer with N);And receive the second target input of user;And inputted in response to second target, when second target When input is the first default input, to the decryption of decryption object (wherein, when second target input is the first default input, should S target object in N number of target object is respectively moved to the M feature for triggering terminal equipment by the input of the second target S characteristic area in region, N number of target object is different from the decryption object, and S is positive integer, S≤N and S≤M).Pass through The program is easy to be cracked different, due to the target pair in different terminal equipment with the password manner of decryption of the prior art As difference, the S target object that different user is selected from N number of target object is also different, and different user divides S target object S characteristic area not being moved to is also different, therefore, by the way that S target object in N number of target object to be respectively moved to To decryption object decryption the complexity of manner of decryption can be improved, so that the decryption in S characteristic area in M characteristic area Mode is not easy to be cracked, i.e., the safety of decryption method provided in an embodiment of the present invention is higher.
Terminal device in the embodiment of the present invention can be the terminal device with operating system.The operating system can be Android (Android) operating system can be ios operating system, can also be other possible operating systems, and the present invention is implemented Example is not especially limited.
Below by taking Android operation system as an example, encryption method and decryption method institute provided in an embodiment of the present invention is introduced The software environment of application.
As shown in Figure 1, being a kind of configuration diagram of Android operation system provided in an embodiment of the present invention.In Fig. 1, peace The framework of tall and erect operating system includes 4 layers, is respectively as follows: application layer, application framework layer, system Runtime Library layer and inner nuclear layer (being specifically as follows Linux inner core).
Wherein, application layer includes each application program (including system application and in Android operation system Tripartite's application program).
Application framework layer is the frame of application program, and developer can be in the exploitation for the frame for abiding by application program In the case where principle, some application programs are developed based on application framework layer.
System Runtime Library layer includes library (also referred to as system library) and Android operation system running environment.Library is mainly Android behaviour As system it is provided needed for all kinds of resources.Android operation system running environment is used to provide software loop for Android operation system Border.
Inner nuclear layer is the operating system layer of Android operation system, belongs to the bottom of Android operation system software level.It is interior Stratum nucleare provides core system service and hardware-related driver based on linux kernel for Android operation system.
By taking Android operation system as an example, in the embodiment of the present invention, developer can be based on above-mentioned Android as shown in Figure 1 The software program of encryption method and decryption method provided in an embodiment of the present invention is realized in the system architecture of operating system, exploitation, from And the encryption method and decryption method are run based on Android operation system as shown in Figure 1.That is processor or end End equipment can by run in Android operation system the software program realize encryption method provided in an embodiment of the present invention and Decryption method.
Terminal device in the embodiment of the present invention can be mobile terminal device, or immobile terminal equipment.Show Example property, mobile terminal device can be mobile phone, tablet computer, laptop, palm PC, vehicle-mounted terminal equipment, can wear Wear equipment, Ultra-Mobile PC (ultra-mobile personal computer, UMPC), net book or individual Digital assistants (personal digital assistant, PDA) etc., immobile terminal equipment can be personal computer (personal computer, PC), television set (television, TV), automatic teller machine or self-service machine etc., the embodiment of the present invention It is not especially limited.
The executing subject of encryption method and decryption method provided in an embodiment of the present invention can be above-mentioned terminal device, It can be the functional module and/or functional entity that can be realized the encryption method and decryption method in the terminal device, specifically It can be determined according to actual use demand, the embodiment of the present invention is not construed as limiting.Below by taking terminal device as an example, respectively to the present invention The encryption method and decryption method that embodiment provides illustratively are illustrated.
As shown in Fig. 2, the embodiment of the present invention provides a kind of encryption method, it is applied to terminal device, which can be with Including following S100-S103.
S100, terminal device receive the first input of user.
Wherein, above-mentioned first input can select the input of encrypted object for user.
Optionally, in the embodiment of the present invention, above-mentioned encrypted object can be application icon, picture, file, text At least one of and in control etc..It can specifically be determined according to actual use demand, the embodiment of the present invention is not especially limited.
Optionally, in the embodiment of the present invention, the quantity of above-mentioned encrypted object can be one, or multiple.Specifically , when the quantity of encrypted object is one, which be may be displayed on the first interface of terminal device;In encryption pair When the quantity of elephant is multiple, which may be displayed on different interfaces (such as the first interface, second contact surface of terminal device With third interface etc.) on.It can specifically be determined according to actual use demand, the embodiment of the present invention is not especially limited.
Optionally, in the embodiment of the present invention, above-mentioned first interface, second contact surface and third interface may each be terminal device Screen on any one interface for showing.For example, any one interface can be the interface of main interface or application program Deng.It can specifically be determined according to actual use demand, the embodiment of the present invention is not especially limited.
Optionally, in the embodiment of the present invention, above-mentioned first input can be user to the length of encrypted object on terminal device By inputting, click input, double-click input or the input such as slidably input.For example, when encrypted object is application icon, it should First input can input the long-pressing of application icon for user.It can specifically be determined according to actual use demand, this hair Bright embodiment is not especially limited.
Illustratively, below using encrypted object as application icon, the quantity of encrypted object is one, and encrypted object It is shown in for the first interface of terminal device and illustrates.As shown in figure 3, can be on the first interface of terminal device Show " using 1 ", " using 2 " ... and the icon of 10 application programs such as " using 10 ".If user wants to " answering It is encrypted with 2 ", then user can receive the input of user's selection " using 2 " with long-pressing " applying 2 ", such terminal device (i.e. above-mentioned first input).
Illustratively, below using encrypted object as application icon, the quantity of encrypted object is multiple, and encrypted object It is shown in for the first interface of terminal device and illustrates.As shown in (a) in Fig. 4, the first boundary of terminal device Can be shown on face " using 1 ", " using 2 " ... and the icon of 10 application programs such as " using 10 ".If user thinks It to be encrypted to " using 2 ", then user can be " to apply 2 " shown in (a) in long-pressing such as Fig. 4, (b) in so such as Fig. 4 is shown, Terminal device can detecte the input of user's selection " using 2 ", and one selection area of Overlapping display in the first interface display Domain, and include " applying 2 " in the selection region.Then, user can be by clicking application icon or dragging application icon Mode, triggering terminal equipment " will apply 5 " and " applying 6 " is moved to the selection region, i.e. terminal device can receive user The input (i.e. above-mentioned first input) of selection " applying 2 ", " applying 5 " and " applying 6 ".
S101, terminal device show M characteristic area in first area in response to first input, and in second area Show N number of target object.
Wherein, above-mentioned N number of target object can be different from encrypted object.M and N is positive integer.
In the embodiment of the present invention, N number of target object is different objects from encrypted object.It should be noted that N number of mesh Mark object and the type of the encrypted object may be the same or different.For example, if the type of N number of target object is application Program icon, then the type of the encrypted object may be application icon;If the type of N number of target object is file Folder, then the type of the encrypted object may be file;If the type of N number of target object is picture, the encryption The type of object may be picture;If the type of N number of target object is text, the type of the encrypted object can also be with For text;If the type of N number of target object is control, the type of the encrypted object may be control.It specifically can be with Determine that the embodiment of the present invention is not especially limited according to actual use demand.
Optionally, in the embodiment of the present invention, the quantity of above-mentioned target object can be one, or multiple.Specifically It can be determined according to actual use demand, the embodiment of the present invention is not especially limited.
Optionally, in the embodiment of the present invention, what first area and second area can be different for two in an interface Region.
Optionally, in the embodiment of the present invention, it is assumed that first area and second area are that two in target interface are different Region, and encrypted object is shown on the first interface of terminal device, then the target interface and first interface can be same One interface, or different interfaces.Assuming that first area and second area are two different areas in target interface Domain, and encrypted object is shown on the first interface, second contact surface and the third interface of terminal device, then the target interface with should First interface, the second contact surface and the third interface can for different interfaces or the target interface and first interface (or Person's second contact surface or the third interface) it can be the same interface.It can specifically be determined according to actual use demand, this Inventive embodiments are not especially limited.
Illustratively, as shown in (a) in Fig. 5, for a kind of terminal device display characteristic area provided in an embodiment of the present invention The schematic diagram in domain and target object.Assuming that encrypted object is " applying 2 " as shown in Figure 3, then receiving use in terminal device After the input (the i.e. first input) of family selection " apply 2 ", as shown in (a) in Fig. 5, terminal device can in response to this first Input shows 9 (i.e. M=9) a characteristic areas in first area, and shows the N number of target different from " using 2 " in second area Object, for example, N number of target object can for " apply 1 ", " applying 3 ", " applying 4 ", " applying 5 " ... and " applying 9 " etc. 8 application icons.
Illustratively, as shown in (b) in Fig. 5, feature is shown for another terminal device provided in an embodiment of the present invention The schematic diagram in region and target object.Assuming that encrypted object is " applying 2 ", " applying 5 " as shown in (b) in Fig. 4 and " application 6 ", then terminal device receive user's selection " using 2 ", " using 5 " and " using 6 " input (i.e. first inputs) it Afterwards, as shown in (b) in Fig. 5, terminal device can show that 9 (i.e. M=9) are a in first area 01 in response to first input Characteristic area, and the N number of target object different from " applying 2 ", " applying 5 " and " applying 6 " in the display of second area 02, such as should N number of target object can be 7 application programs such as " applying 1 ", " applying 3 ", " applying 4 ", " applying 7 " ... and " applying 10 " Icon.
It should be noted that the embodiment of the present invention is not especially limited the size of M and N, for example, the quantity of characteristic area The quantity of target object can be less than, the quantity of characteristic area can also be equal to the quantity of target object, the quantity of characteristic area The quantity of target object can also be greater than.It can specifically be determined according to actual use demand.
S102, terminal device receive the second input of user.
Wherein, above-mentioned second input can be used for triggering terminal equipment for the S target object difference in N number of target object S characteristic area being moved in M characteristic area.S is positive integer, S≤N and S≤M.
Optionally, in the embodiment of the present invention, above-mentioned second input can be user in target object N number of on terminal device S target object long-pressing input, click input, double-click input or the input such as slidably input.For example, second input can Think the cunning for the S characteristic area that S target object in N number of target object is respectively moved in M characteristic area by user Dynamic input.For another example second input or user (should to the long-pressing input of S target object in N number of target object Long-pressing input can be used for triggering terminal equipment and S target object in N number of target object be respectively moved to M characteristic area In S characteristic area).It can specifically be determined according to actual use demand, the embodiment of the present invention is not especially limited.
It illustratively, is after a kind of terminal device display provided in an embodiment of the present invention is mobile as shown in (a) in Fig. 6 S target object schematic diagram.The schematic diagram that characteristic area and target object are shown with terminal device is such as (a) in Fig. 5 For illustrate, it is a that " apply 6 " in 8 (i.e. N=8) a target objects can be dragged to 9 (i.e. M=9) by user 1 (i.e. S=1) a characteristic area in characteristic area, so as shown in (a) in Fig. 6, terminal device can receive triggering terminal 1 target object in 8 target objects is moved to the input (i.e. second of 1 characteristic area in 9 characteristic areas by equipment Input), and show in 1 characteristic area " using 6 ".
Illustratively, as shown in (b) in Fig. 6, for another terminal device display movement provided in an embodiment of the present invention The schematic diagram of S target object afterwards.The schematic diagram that characteristic area and target object are shown with terminal device is as in Fig. 5 (b) it is illustrated for, user can be by " applying 1 ", " applying 4 " and " application in 7 (i.e. N=7) a target objects 9 " are dragged to 3 (i.e. S=3) a characteristic areas in 9 (i.e. M=9) a characteristic areas, so as shown in (b) in Fig. 6, terminal Equipment can receive triggering terminal equipment and 3 target objects in 7 target objects is respectively moved in 9 characteristic areas The input (the i.e. second input) of 3 characteristic areas, and " applying 1 ", " using 4 " and " using 9 " is shown in 3 characteristic areas.
S103, terminal device are in response to second input, using the correspondence between S target object and S characteristic area Relationship encrypts encrypted object.
In the embodiment of the present invention, it is respectively moved in M characteristic area by S target object in N number of target object S characteristic area after, terminal device can determine corresponding relationship (its between S target object and S characteristic area In, corresponding 1 characteristic area of 1 target object), and the corresponding relationship between S target object and S characteristic area is used, Encrypted object is encrypted.
Specifically, the first possible is achieved in that, it is assumed that before encrypting to encrypted object, which is shown At the first interface, then after encrypting to encrypted object, terminal device can show first interface, and it is concealed encrypted after (for example, when encrypted object is application icon, terminal device can hide that the application icon, this answers to encrypted object It with the store path etc. of the installation kit of program and the application program, and stores this and hides record, such user can be hidden according to this Hiding record decrypts encrypted encrypted object).Second possible to be achieved in that, it is assumed that is encrypting it to encrypted object Before, which is shown in the first interface, then terminal device can show first boundary after encrypting to encrypted object Face, and the encrypted encrypted object of the first interface display (for example, encrypted object be application icon when, terminal device Can be in the encrypted application icon of the first interface display, and hide the installation kit and the application program of the application program Store path etc., so even user clicks the encrypted application icon, and terminal device will not run and should add The corresponding application program of encrypted object after close).It is appreciated that relative to second of possible implementation, due to the first Possible implementation can be with the encrypted object after concealed encrypted, therefore the safety of the first possible implementation is higher.
Optionally, in the embodiment of the present invention, terminal device can be using at least one of following several ways mode Encrypted object is encrypted:
Mode one, after terminal device receives the second input, terminal device can in response to this second input, directly Using the corresponding relationship between S target object and S characteristic area, encrypted object is encrypted.
Mode two, after (or before terminal device receives the second input) receiving the second input in terminal device, Terminal device can receive slidably inputing for user, and in response to second input and this slidably input, using S target object Corresponding relationship and the sliding trace slidably inputed between S characteristic area encrypt encrypted object.(for mode Two specific implementation by the following embodiments S105 and S103a be described, it will not go into details herein).
Mode three, after terminal device receives the second input, terminal device can be a using S target object and S The mobile sequence of the corresponding relationship of characteristic area and S target object encrypts encrypted object.(for the specific of mode three S103b in the following embodiments is described implementation, and it will not go into details herein).
Mode four, after terminal device receives the second input, terminal device can in response to this second input, display Second prompt information, and fourth input of the user to second prompt information is received, and in response to the 4th input, using S Corresponding relationship between a target object and S characteristic area encrypts encrypted object.(for the specific implementation side of mode four S108, S109 and S103c in the following embodiments is described formula, and it will not go into details herein).
The embodiment of the present invention provides a kind of encryption method, has been easy to be cracked not with the password encryption mode of the prior art Together, since the target object in different terminal equipment is different, the S target object that different user is selected from N number of target object Also different, the S characteristic area that S target object is moved respectively to by different user is also different, therefore, sets by using terminal The corresponding relationship between S target object and S characteristic area in standby N number of target object encrypts encrypted object, can be with The complexity of cipher mode is improved, so that cipher mode is not easy to be cracked, i.e., encryption method provided in an embodiment of the present invention Safety is higher.
Optionally, in the embodiment of the present invention, before encrypting to encrypted object, which may be displayed on the first boundary Face.In this case, after above-mentioned S103, encryption method provided in an embodiment of the present invention can also include following S104.
S104, the encrypted object in the first interface, after terminal device is concealed encrypted.
It illustratively, is after a kind of terminal device provided in an embodiment of the present invention is concealed encrypted as shown in (a) in Fig. 7 Encrypted object schematic diagram.Assuming that encrypted object is " applying 2 " as shown in Figure 3, and " applying 2 " is shown in the first interface On, then after to " applying 2 " encryption, terminal device can show first interface, and hide as shown in (a) in Fig. 7 " applying 2 ".
Illustratively, concealed encrypted for another terminal device provided in an embodiment of the present invention as shown in (b) in Fig. 7 The schematic diagram of encrypted object afterwards.Assuming that encrypted object is " applying 2 ", " applying 5 " as shown in (b) in Fig. 4 and " application 6 ", and " applying 2 ", " applying 5 " and " applying 6 " display is on the first interface, then as shown in (b) in Fig. 7, to " application 2 ", after " applying 5 " and " applying 6 " encryption, terminal device can show first interface, and hide " using 2 ", " using 5 " " applying 6 ".
It should be noted that after the embodiment of the present invention is to encrypted object of the terminal device after concealed encrypted, the first interface On the display modes of other unencryption objects be not especially limited.For example, as shown in (a) in Fig. 7, after concealed encrypted After " applying 2 ", terminal device can be shown in the former display position of " applying 2 " " using 3 ", and successively be shown in other positions " applying 4 ", " applying 5 " ... and " applying 10 ";Alternatively, as shown in (b) in Fig. 7, " applying 2 " after concealed encrypted, After " applying 5 " and " applying 6 ", terminal device can not change the display position of other unencryption objects, i.e., not in " application 2 ", " 5 are applied " and the former display position of " applying 6 " shows other unencryption objects, it specifically can be true according to actual use demand It is fixed.
Encryption method provided in an embodiment of the present invention, by the first interface, it is concealed encrypted after encrypted object so that User can not have found the encrypted encrypted object in using terminal equipment, to be not easy to the encrypted encrypted object Decryption, and then improve the safety of the encrypted encrypted object.
Optionally, in conjunction with Fig. 2, as shown in figure 8, before above-mentioned S103, the embodiment of the present invention is mentioned in the embodiment of the present invention The encryption method of confession can also include following S105.Corresponding, S103 can specifically be realized by following S103a.
S105, terminal device receive slidably inputing for user.
Wherein, above-mentioned slidably input can be defeated for sliding of the user between K characteristic area in M characteristic area Enter, K is the positive integer less than or equal to M.
S103a, terminal device is inputted in response to second and this is slidably inputed, using S target object and S characteristic area Between corresponding relationship and the sliding trace slidably inputed, to encrypted object encrypt.
Wherein, above-mentioned sliding trace may include K characteristic area.
Optionally, after S105, before S103a, encryption method provided in an embodiment of the present invention can also include: root According to slidably inputing for received user, K characteristic area corresponding with the sliding trace that this is slidably inputed is determined.
Illustratively, as shown in figure 9, showing the schematic diagram of sliding trace for terminal device provided in an embodiment of the present invention. User can slide finger between K characteristic area in M characteristic area as shown in Figure 9, and such terminal device can be with User's slidably inputing between K characteristic area in M characteristic area is received, and shows the sliding rail slidably inputed Mark, and determine K characteristic area corresponding with the sliding trace slidably inputed.
It should be noted that the embodiment of the present invention receives second for slidably inputing and receiving user of user to terminal device The sequence of input is not especially limited, i.e., terminal device can first receive slidably inputing for user, then receives the second defeated of user Enter and (first carry out S105, execute S102 afterwards), terminal device can also first receive the second input of user, then receive the cunning of user Dynamic input (first carrying out S102, execute S105 afterwards).It can specifically be determined according to actual use demand, the embodiment of the present invention is not made It is specific to limit.
Encryption method provided in an embodiment of the present invention, relative to using pair between S target object and S characteristic area It should be related to, encrypted object is encrypted, since the embodiment of the present invention can be using between S target object and S characteristic area Corresponding relationship and the sliding trace slidably inputed encrypt encrypted object, therefore the complexity of Encryption Algorithm can be improved Property, and then improve the safety of encrypted object.
Optionally, in the embodiment of the present invention, above-mentioned S103 can specifically be realized by following S103b.
S103b, terminal device use the corresponding relationship and S target object of S target object and S characteristic area Mobile sequence, to encrypted object encrypt.
In the embodiment of the present invention, the mobile sequence of above-mentioned S target object can be mobile S for user's triggering terminal equipment The chronological order of target object.
It illustratively, is the mobile S target object of user (assuming that the S target object is such as in the second input of user " apply 1 " shown in (b) in Fig. 6, " applying 4 " and " applying 9 ") input when, if user successively move " applying 4 ", " apply 9 " and " applying 1 ", then terminal can determine the mobile sequence of S target object are as follows: " using 4 ", " using 9 " and " answer With 1 ".
It illustratively, is that user clicks S target object (assuming that the S target object is such as in the second input of user " apply 1 " shown in (b) in Fig. 6, " applying 4 " and " applying 9 ") input when, if user successively click " applying 9 ", " apply 1 " and " applying 4 ", then terminal can determine the mobile sequence of S target object are as follows: " using 9 ", " using 1 " and " answer With 4 ".
Encryption method provided in an embodiment of the present invention is closed relative to using S target object and S the corresponding of characteristic area System encrypts encrypted object, since the embodiment of the present invention can use the corresponding relationship of S target object and S characteristic area, And the mobile sequence of S target object, encrypted object is encrypted, therefore the complexity of Encryption Algorithm, Jin Erjia can be improved The raising safety of close object.
Optionally, in the embodiment of the present invention, " M characteristic area is shown in first area, and the in above-mentioned S101 Two regions show N number of target object " before, encryption method provided in an embodiment of the present invention can also include following S106 and S107.It is corresponding, " show M characteristic area in first area, and show N number of target object in second area " tool in S101 Body can be realized by following S101c.
S106, terminal device show the first prompt information in response to the first input.
S107, terminal device receive user and input to the third of first prompt information.
S101c, terminal device are inputted in response to the third, show M characteristic area in first area, and in second area Show N number of target object.
Optionally, in the embodiment of the present invention, above-mentioned first prompt information can be used for prompting to hide N number of target object.
It illustratively, is that a kind of terminal device provided in an embodiment of the present invention shows that first mentions as shown in (a) in Figure 10 Show the schematic diagram of information.Assuming that the encrypted object that selects of user for as shown in (a) in Figure 10 " using 2 ", if terminal is set The standby input (the i.e. first input) for receiving user's selection " using 2 ", then terminal device can be in response to the first input, display First prompt information, such as " hiding " control as shown in (a) in Figure 10.Further, if terminal device receives use Family inputs (i.e. third input) to the click of " hiding " control, then terminal device is in response to this as shown in (a) in Fig. 5 Third input shows M characteristic area in first area, and shows N number of target object in second area.
Illustratively, as shown in (b) in Figure 10, first is shown for another terminal device provided in an embodiment of the present invention The schematic diagram of prompt information.Assuming that the encrypted object that selects of user for as shown in (b) in Figure 10 " using 2 ", " using 5 " and " applying 6 ", if terminal device receives the input (the i.e. first input) of user's selection " using 2 ", " using 5 " and " using 6 ", So terminal device can show " using 2 ", " using 5 " and " using 6 " in selection region, simultaneously in response to the first input Show the first prompt information, such as " hiding " control as shown in (b) in Figure 10.Further, if terminal device receives (i.e. third input) is inputted to the click of " hiding " control to user, then as shown in (b) in Fig. 5, terminal device response It is inputted in the third, shows M characteristic area in first area, and show N number of target object in second area.
Encryption method provided in an embodiment of the present invention, since after receiving the first input of user, terminal device can To show the first prompt information, therefore user can choose triggering terminal equipment and show characteristic area and target object, with into one It walks triggering terminal to encrypt encrypted object, also can choose and show characteristic area and target object (i.e. without triggering terminal equipment Encrypted object is encrypted without triggering terminal), to improve the experience sense of user.
Optionally, in the embodiment of the present invention, in " using between S target object and S characteristic area in above-mentioned S103 Corresponding relationship, to encrypted object encrypt " before, encryption method provided in an embodiment of the present invention can also include following S108 And S109.It is corresponding, in S103 " using the corresponding relationship between S target object and S characteristic area, to encrypted object Encryption " can specifically be realized by following S103c.
In response to the second input, terminal device shows the second prompt information for S108, terminal device.
S109, terminal device receive fourth input of the user to second prompt information.
S103c, terminal device are in response to the 4th input, using the correspondence between S target object and S characteristic area Relationship encrypts encrypted object.
It illustratively, is terminal provided in an embodiment of the present invention such as (a) in Figure 11 or as shown in (b) in Figure 11 Equipment shows the schematic diagram of the second prompt information.After terminal device receives the second input of user, terminal device can be with Show the second prompt information, such as the prompt information can be for such as (a) in Figure 11 or the " guarantor as shown in (b) in Figure 11 Deposit " control.If terminal device receives click input (i.e. fourth input) of the user to " preservation " control, such as Figure 11 In (a) or as shown in (b) in Figure 11, terminal device can be in response to the 4th input, using S target object and S Corresponding relationship between a characteristic area encrypts encrypted object.
Encryption method provided in an embodiment of the present invention, since after receiving the second input of user, terminal device can To show the second prompt information, therefore user can choose triggering terminal equipment and encrypt to encrypted object, also can choose and is not necessarily to Triggering terminal encrypts encrypted object, to improve the experience sense of user.
Optionally, in conjunction with Fig. 2, as shown in figure 12, in the embodiment of the present invention, after above-mentioned S103, the embodiment of the present invention The encryption method of offer can also include following S110-S113.
S110, terminal device receive the first object input of user.
Optionally, in the embodiment of the present invention, above-mentioned first object input can be long-pressing of the user to terminal device screen It inputs, click input, double-clicking input or the input such as slidably input.For example, first object input can be any boundary of user The click of the blank space in face (such as first interface of above-mentioned S100) inputs.It can specifically be determined according to actual use demand, this Inventive embodiments are not especially limited.
S111, terminal device are inputted in response to the first object, show M characteristic area in first area, and second Region shows N number of target object.
Wherein, M and N is positive integer.
Description for first area, second area, M characteristic area and N number of target object may refer to above-mentioned implementation Description of the example S101 to first area, second area, M characteristic area and N number of target object, details are not described herein again.
S112, terminal device receive the second target input of user.
S113, terminal device are inputted in response to second target, right when second target input presets input for first Decrypt object decryption.
Wherein, when the input of the second target presets input for first, the input of the second target can be used for triggering terminal equipment S characteristic area S target object in N number of target object being respectively moved in M characteristic area.N number of target object Different from decryption object, S is positive integer, S≤N and S≤M.
It should be noted that above-mentioned decryption object can be same right with the encrypted encrypted object in above-mentioned S103 As.Such as encrypted object after encryption, when being encrypted " apply 2 ", decryption object can be encrypted " applying 2 ".
Description for S target object and S characteristic area may refer to above-described embodiment S102 to S target pair As the description with S characteristic area, details are not described herein again.
Optionally, in the embodiment of the present invention, above-mentioned second target input can be the S mesh that user shows terminal device The inputs such as the long-pressing of mark object inputs, clicks input, double-click is inputted or slidably inputed.For example, second target input can be with S target object in N number of target object is respectively moved to the sliding of S characteristic area in M characteristic area for user Input.For another example second target input or user input the long-pressing of S target object in N number of target object (long-pressing input can be used for triggering terminal equipment and S target object in N number of target object be respectively moved to M feature S characteristic area in region).It can specifically be determined according to actual use demand, the embodiment of the present invention is not especially limited.
Illustratively, it is assumed that decryption object (i.e. encrypted encrypted object) is application program, then when the second of user When target input presets input for first, terminal device can be to decryption object decryption, and shows the operating space of the application program Domain, such user can operate in the operating area of application program.
Encryption method provided in an embodiment of the present invention can also be to encrypted encryption after encrypting to encrypted object Object decryption.It is easy to be cracked with the password manner of decryption of the prior art different, due to the target in different terminal equipment Object is different, and the S target object that different user is selected from N number of target object is also different, and different user is by S target object S characteristic area being moved respectively to is also different, and therefore, the embodiment of the present invention passes through S target in N number of target object Object is respectively moved to S characteristic area in M characteristic area, and to decryption object decryption, answering for manner of decryption can be improved Miscellaneous degree, so that the manner of decryption is not easy to be cracked, i.e., the safety of manner of decryption provided in an embodiment of the present invention is higher.
Optionally, in the embodiment of the present invention, after above-mentioned S113, encryption method provided in an embodiment of the present invention can be with Including following S114.
N number of target object that second area is shown is updated the decryption object after being shown as decryption by S114, terminal device.
It illustratively, is the solution after a kind of terminal display decryption provided in an embodiment of the present invention as shown in (a) in Figure 13 The schematic diagram of close object.Assuming that decryption object is encrypted " applying 2 ", and before to encrypted " applying 2 " decryption, eventually End equipment shows characteristic area and target object as shown in (a) in Fig. 6, then after to encrypted " applying 2 ", such as Shown in (a) in Figure 13, the target object that second area is shown can be updated " the application after being shown as decryption by terminal device 2”。
Illustratively, as shown in (b) in Figure 13, after another terminal display decryption provided in an embodiment of the present invention Decrypt the schematic diagram of object.Assuming that decryption object is encrypted " applying 2 ", " applying 5 " and " applying 6 ", and after to encryption " apply 2 " decryption before, terminal device shows characteristic area and target object as shown in (b) in Fig. 6, then to adding After " applying 2 ", " applying 5 " and " applying 6 " decryption after close, as shown in (b) in Figure 13, terminal device can be by the secondth area The target object that domain is shown updates " using 2 " after being shown as decryption, " using 5 " and " using 6 ".
Encryption method provided in an embodiment of the present invention can be by the secondth area after to the decryption of encrypted encrypted object N number of target object that domain is shown updates the decryption object after being shown as decryption, so as to the solution after user-friendly decryption Close object.
Optionally, in the embodiment of the present invention, before above-mentioned S113, encryption method provided in an embodiment of the present invention can also be wrapped Include following S115.Corresponding, above-mentioned S113 can specifically be realized by following S113a.
The target that S115, terminal device receive user slidably inputs.
S113a, terminal device are inputted in response to the second target and the target slidably inputs, when second target input is the When one default input and the target slidably input as the second default input, to decryption object decryption.
Wherein, the above-mentioned second default input can be sliding of the user between K characteristic area in M characteristic area Input.K is the positive integer less than or equal to M.
Optionally, after S115, before S113a, encryption method provided in an embodiment of the present invention can also include: root It is slidably inputed according to the target of received user, determines K characteristic area corresponding with the sliding trace that the target slidably inputs.
It should be noted that the target that the embodiment of the present invention receives user to terminal device slidably inputs and receives user's The sequence of second target input is not especially limited, i.e., the target that terminal device can first receive user slidably inputs, then receives The second target of user inputs (first carrying out S105, execute S102 afterwards), and terminal device can also first receive the second mesh of user Mark input, then receive the target of user and slidably input and (first carry out S102, execute S105 afterwards).It specifically can be according to actual use Demand determines that the embodiment of the present invention is not especially limited.
Encryption method provided in an embodiment of the present invention, relative to using pair between S target object and S characteristic area It should be related to, to decryption object decryption, since the corresponding relationship between S target object and S characteristic area can be used, and To decryption object decryption, therefore the safety of decryption object can be improved in the sliding trace that the target slidably inputs.
Optionally, in the embodiment of the present invention, above-mentioned S113 can specifically be realized by following S113b.
S113b, meet default shifting when the second target inputs for the mobile sequence of the first default input and S target object When dynamic sequence, terminal device is to decryption object decryption.
In the embodiment of the present invention, the mobile sequence of above-mentioned S target object can be mobile S for user's triggering terminal equipment The chronological order of target object.
Encryption method provided in an embodiment of the present invention, relative to when the input of the second target is the first default input, to solution The decryption of close object, due to can when the input of the second target meet for the mobile sequence of the first default input and S target object it is pre- If when mobile sequence, terminal device decrypts decryption object, therefore to improve the safety of decryption object.
Optionally, in the embodiment of the present invention, after above-mentioned S114, encryption method provided in an embodiment of the present invention can be with Including following S116 and S117.
S116, display decryption after decryption object operation interface in the case where, terminal device receive user third Target input.
S117, terminal device in response to the third target input, cancel operation display interface, and cancel display decryption after Decrypt object.
Illustratively, it is assumed that decryption object is application program, then operation interface can be the operation interface of application program. After to decryption object decryption, if terminal device receives the 4th target input of user, terminal device can be rung It should be inputted in the 4th target, the operation interface of the decryption object after display decryption.Further, if terminal device receives The third target of user inputs, then terminal device can be inputted in response to the third target closes application program (the i.e. terminal Equipment can cancel operation display interface), and cancel the decryption object after display decryption.It is shown in this way, cancelling in terminal device After decryption object after decryption, if user wants the operation interface for operating the decryption object again, user needs to touch The step of hair terminal device repeats the decryption methods such as above-mentioned S110-S113.
Encryption method provided in an embodiment of the present invention, due to the case where showing the operation interface of the decryption object after decryption Under, terminal device can be inputted in response to the third target of user, cancel operation display interface, and cancel the solution after display decryption Close object, therefore can prevent other users from checking the decryption object, so as to improve the safety of decryption object.
As shown in figure 14, the embodiment of the present invention provides a kind of decryption method, is applied to terminal device, which can be with Including following S1400-S1403.
S1400, terminal device receive the first object input of user.
S1401, terminal device are inputted in response to the first object, show M characteristic area in first area, and second Region shows N number of target object.
S1402, terminal device receive the second target input of user.
S1403, terminal device are inputted in response to second target, when second target input presets input for first, To decryption object decryption.
Above-mentioned encryption method as shown in figure 12 specifically may refer to for the description of the S1400-S1403 in decryption method To the associated description of S110-S113 in embodiment, details are not described herein again.
The embodiment of the present invention provides a kind of decryption method, has been easy to be cracked not with the password manner of decryption of the prior art Together, since the target object in different terminal equipment is different, the S target object that different user is selected from N number of target object Also different, the S characteristic area that S target object is moved respectively to by different user is also different, therefore, by by N number of mesh S target object in mark object is respectively moved to S characteristic area in M characteristic area, decrypts to object is decrypted, can be with The complexity of manner of decryption is improved, so that the manner of decryption is not easy to be cracked, i.e., manner of decryption provided in an embodiment of the present invention Safety it is higher.
Optionally, in the embodiment of the present invention, after above-mentioned S1403, decryption method provided in an embodiment of the present invention may be used also To include following S1404.
N number of target object that second area is shown is updated the decryption object after being shown as decryption by S1404, terminal device.
It specifically may refer to the phase in above-mentioned encryption method embodiment to S114 for the description of the S1404 in decryption method Description is closed, details are not described herein again.
Decryption method provided in an embodiment of the present invention, after to decryption object decryption, the N that second area can be shown A target object updates the decryption object after being shown as decryption, so as to the decryption object after user-friendly decryption.
Optionally, in the embodiment of the present invention, before above-mentioned S1403, decryption method provided in an embodiment of the present invention can be with Including following S1405.Corresponding, above-mentioned S1403 can specifically be realized by following S1403a.
The target that S1405, terminal device receive user slidably inputs.
S1403a, terminal device are inputted in response to the second target and the target slidably inputs, when second target input is When first default input and the target slidably input as the second default input, to decryption object decryption.
Wherein, the above-mentioned second default input can be sliding of the user between K characteristic area in M characteristic area Input.K is the positive integer less than or equal to M.
It is right in above-mentioned encryption method embodiment that the description of S1405 and S1403a in decryption method specifically may refer to The associated description of S115 and S113a, details are not described herein again.
Decryption method provided in an embodiment of the present invention, relative to using pair between S target object and S characteristic area It should be related to, to decryption object decryption, since the corresponding relationship between S target object and S characteristic area can be used, and To decryption object decryption, therefore the safety of decryption object can be improved in the sliding trace that the target slidably inputs.
Optionally, in the embodiment of the present invention, above-mentioned S1403 can specifically be realized by following S1403b.
S1403b, meet default shifting when the second target inputs for the mobile sequence of the first default input and S target object When dynamic sequence, terminal device is to decryption object decryption.
The description of S1403b in decryption method specifically may refer in above-mentioned encryption method embodiment to S113b's Associated description, details are not described herein again.
Decryption method provided in an embodiment of the present invention, relative to when the input of the second target is the first default input, to solution The decryption of close object, due to can when the input of the second target meet for the mobile sequence of the first default input and S target object it is pre- If when mobile sequence, terminal device decrypts decryption object, therefore to improve the safety of decryption object.
Optionally, in the embodiment of the present invention, after above-mentioned S1404, decryption method provided in an embodiment of the present invention may be used also To include following S1406 and S1407.
S1406, display decryption after decryption object operation interface in the case where, terminal device receive user third Target input.
S1407, terminal device in response to the third target input, cancel operation display interface, and cancel display decryption after Decryption object.
It is right in above-mentioned encryption method embodiment that the description of S1406 and S1407 in decryption method specifically may refer to The associated description of S116 and S117, details are not described herein again.
Decryption method provided in an embodiment of the present invention, due to the case where showing the operation interface of the decryption object after decryption Under, terminal device can be inputted in response to the third target of user, cancel operation display interface, and cancel the solution after display decryption Close object, therefore can prevent other users from checking the decryption object, so as to improve the safety of decryption object.
As shown in figure 15, the embodiment of the present invention provides a kind of terminal device.The terminal device is properly termed as first eventually below End equipment 1500, the first terminal equipment 1500 may include receiving module 1501, display module 1502 and encrypting module 1503. Wherein, receiving module 1501, for receiving the first input of user, which is the input that user selects encrypted object; Display module 1502, for showing M characteristic area in first area in response to received first input of receiving module 1501 Domain, and N number of target object is shown in second area, N number of target object is different from the encrypted object, and M and N are positive integer; Receiving module 1501 is also used to receive the second input of user, which will be N number of for triggering first terminal equipment 1500 S target object in target object is respectively moved to S characteristic area in the M characteristic area, and S is positive integer, S≤N And S≤M;Encrypting module 1503 is used in response to received second input of receiving module 1501, using S target object and S Corresponding relationship between a characteristic area encrypts the encrypted object.
Optionally, in the embodiment of the present invention, before encrypting module 1503 is to encrypted object encryption, which can be with It is shown in the first interface.In conjunction with Figure 15, as shown in figure 16, first terminal equipment 1500 provided in an embodiment of the present invention can also be wrapped Include hidden module 1504.Hidden module 1504 can be used for after encrypting module 1503 is to encrypted object encryption, on the first boundary In face, it is concealed encrypted after encrypted object.
Optionally, in the embodiment of the present invention, receiving module 1501 can be also used for receiving slidably inputing for user, the cunning Dynamic input is user's slidably inputing between K characteristic area in M characteristic area, and K is just whole less than or equal to M Number;Encrypting module 1503, specifically for inputting and slidably inputing in response to receiving module 1501 received second, using S mesh The corresponding relationship and the sliding trace slidably inputed between object and S characteristic area are marked, encrypted object is encrypted, it should Sliding trace includes the K characteristic area.
Optionally, in the embodiment of the present invention, encrypting module 1503 specifically can be used for receiving in response to receiving module 1501 The second input, using the mobile sequence of the corresponding relationship and S target object of S target object and S characteristic area, Encrypted object is encrypted.
The embodiment of the present invention provides a kind of terminal device, is easy with the password encryption mode that prior art terminal equipment uses It is cracked different, since the target object in different terminal equipment is different, what different user was selected from N number of target object S target object is also different, and the S characteristic area that S target object is moved respectively to by different user is also different, therefore, eventually End equipment is by using the corresponding pass between the S target object and S characteristic area in N number of target object of terminal device System encrypts encrypted object, the complexity of the cipher mode of terminal device can be improved, so that the cipher mode is not easy to be broken Solution, i.e., the safety of terminal device provided in an embodiment of the present invention are higher.
As shown in figure 17, the embodiment of the present invention provides a kind of terminal device.The terminal device is properly termed as second eventually below End equipment 1700, the second terminal equipment 1700 may include receiving module 1701, display module 1702 and deciphering module 1703. Wherein, receiving module 1701, the first object for receiving user input;Display module 1702, in response to receiving module 1701 received first object inputs, show M characteristic area in first area, and show N number of target pair in second area As M and N are positive integer;Receiving module 1701 is also used to receive the second target input of user;Deciphering module 1703, is used for In response to received second target input of receiving module 1701, when second target input presets input for first, to solution Close object decryption, wherein when the input of the second target presets input for first, which is inputted for triggering second terminal S target object in N number of target object is respectively moved to S characteristic area in M characteristic area by equipment 1700, N number of Target object is different from decryption object, and S is positive integer, S≤N and S≤M.
Optionally, in the embodiment of the present invention, display module 1702 be can be also used in 1703 pairs of decryption objects of deciphering module After decryption, N number of target object that second area is shown is updated to the decryption object after being shown as decryption.
Optionally, in the embodiment of the present invention, receiving module 1701, the target that can be also used for receiving user is slidably inputed; Deciphering module 1703 specifically can be used for inputting in response to received second target of receiving module 1701 and target slidably input, When the input of the second target be the first default input and target slidably inputs as the second default input, decryption object is decrypted, In, which is user's slidably inputing between K characteristic area in M characteristic area, and K is to be less than or wait In the positive integer of M.
Optionally, in the embodiment of the present invention, deciphering module 1703 specifically can be used for receiving in response to receiving module 1701 The input of the second target, when second target input meet for the mobile sequence of the first default input and S target object it is default When mobile sequence, to decryption object decryption.
Optionally, in the embodiment of the present invention, receiving module 1701 be can be also used for second area in deciphering module 1703 After N number of target object of display updates the decryption object after being shown as decryption, after display module 1702 shows the decryption In the case where the operation interface for decrypting object, the third target input of user is received;Display module 1702 can be also used for responding In the received third target input of receiving module 1701, cancels and show the operation interface, and cancel the solution after showing the decryption Close object.
It should be noted that in the embodiment of the present invention, second terminal equipment 1700 and above-mentioned Figure 15 in above-mentioned Figure 17 (or First terminal equipment 1500 in Figure 16) can be same terminal device, or different terminal devices.It specifically can root Factually border use demand determines, the embodiment of the present invention is not construed as limiting.
The embodiment of the present invention provides a kind of terminal device, is easy with the password manner of decryption that prior art terminal equipment uses It is cracked different, since the target object in different terminal equipment is different, what different user was selected from N number of target object S target object is also different, and the S characteristic area that S target object is moved respectively to by different user is also different, therefore, eventually End equipment by the way that S target object in N number of target object is respectively moved to S characteristic area in M characteristic area, To decryption object decryption, the complexity of the manner of decryption of terminal device can be improved, so that the manner of decryption is not easy to be cracked, The safety of terminal device i.e. provided in an embodiment of the present invention is higher.
A kind of hardware structural diagram of Figure 18 terminal device of each embodiment to realize the present invention.As shown in figure 18, The terminal device 200 includes but is not limited to: radio frequency unit 201, network module 202, audio output unit 203, input unit 204, sensor 205, display unit 206, user input unit 207, interface unit 208, memory 209, processor 210, with And the equal components of power supply 211.It will be understood by those skilled in the art that the not structure paired terminal of terminal device structure shown in Figure 18 The restriction of equipment, terminal device may include perhaps combining certain components or different than illustrating more or fewer components Component layout.In embodiments of the present invention, terminal device includes but is not limited to mobile phone, tablet computer, laptop, palm electricity Brain, vehicle-mounted terminal equipment, wearable device and pedometer etc..
In a kind of situation, correspond to encryption method provided in an embodiment of the present invention:
User input unit 207, for receiving the first input of user, which is that user selects encrypted object Input;Display unit 206, for showing M in first area in response to received first input of user input unit 207 Characteristic area, and N number of target object is shown in second area, N number of target object is different from the encrypted object, and M and N are positive Integer;User input unit 207 is also used to receive the second input of user, and second input is for triggering first terminal equipment 1500 are respectively moved to S target object in N number of target object S characteristic area in the M characteristic area, and S is positive Integer, S≤N and S≤M;Processor 210 is used in response to received second input of user input unit 207, using S mesh The corresponding relationship between object and S characteristic area is marked, which is encrypted.
The embodiment of the present invention provides a kind of terminal device, is easy with the password encryption mode that prior art terminal equipment uses It is cracked different, since the target object in different terminal equipment is different, what different user was selected from N number of target object S target object is also different, and the S characteristic area that S target object is moved respectively to by different user is also different, therefore, eventually End equipment is by using the corresponding pass between the S target object and S characteristic area in N number of target object of terminal device System encrypts encrypted object, the complexity of the cipher mode of terminal device can be improved, so that the cipher mode is not easy to be broken Solution, i.e., the safety of terminal device provided in an embodiment of the present invention are higher.
In another case, corresponding to decryption method provided in an embodiment of the present invention:
User input unit 207, the first object for receiving user input;Display unit 206, in response to receiving The received first object input of user input unit 207 shows M characteristic area in first area, and aobvious in second area Show that N number of target object, M and N are positive integer;User input unit 207 is also used to receive the second target input of user;Place Device 210 is managed, for inputting in response to received second target of user input unit 207, when second target input is first When presetting input, to decryption object decryption, wherein when the input of the second target is the first default input, second target input S target object in N number of target object is respectively moved in M characteristic area for triggering second terminal equipment 1700 S characteristic area, N number of target object is different from decryption object, and S is positive integer, S≤N and S≤M.
The embodiment of the present invention provides a kind of terminal device, is easy with the password manner of decryption that prior art terminal equipment uses It is cracked different, since the target object in different terminal equipment is different, what different user was selected from N number of target object S target object is also different, and the S characteristic area that S target object is moved respectively to by different user is also different, therefore, eventually End equipment by the way that S target object in N number of target object is respectively moved to S characteristic area in M characteristic area, To decryption object decryption, the complexity of the manner of decryption of terminal device can be improved, so that the manner of decryption is not easy to be cracked, The safety of terminal device i.e. provided in an embodiment of the present invention is higher.
It should be understood that the embodiment of the present invention in, radio frequency unit 201 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 210 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 201 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 201 can also by wireless communication system and network and other set Standby communication.
Terminal device provides wireless broadband internet by network module 202 for user and accesses, and such as user is helped to receive It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 203 can be received by radio frequency unit 201 or network module 202 or in memory 209 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 203 can also provide and end The relevant audio output of specific function that end equipment 200 executes is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 203 includes loudspeaker, buzzer and receiver etc..
Input unit 204 is for receiving audio or video signal.Input unit 204 may include graphics processor (Graphics Processing Unit, GPU) 2041 and microphone 2042, graphics processor 2041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 206.Through graphics processor 2041, treated that picture frame can be deposited Storage is sent in memory 209 (or other storage mediums) or via radio frequency unit 201 or network module 202.Mike Wind 2042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 201 is converted in the case where telephone calling model.
Terminal device 200 further includes at least one sensor 205, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 2061, and proximity sensor can close when terminal device 200 is moved in one's ear Display panel 2061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify terminal device posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes Sensor 205 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 206 is for showing information input by user or being supplied to the information of user.Display unit 206 can wrap Display panel 2061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 2061.
User input unit 207 can be used for receiving the number or character information of input, and generate the use with terminal device Family setting and the related key signals input of function control.Specifically, user input unit 207 include touch panel 2071 and Other input equipments 2072.Touch panel 2071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 2071 or in touch panel 2071 Neighbouring operation).Touch panel 2071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 210, receiving area It manages the order that device 210 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Seed type realizes touch panel 2071.In addition to touch panel 2071, user input unit 207 can also include other input equipments 2072.Specifically, other input equipments 2072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 2071 can be covered on display panel 2061, when touch panel 2071 is detected at it On or near touch operation after, send processor 210 to determine the type of touch event, be followed by subsequent processing device 210 according to touching The type for touching event provides corresponding visual output on display panel 2061.Although in Figure 18, touch panel 2071 and aobvious Show that panel 2061 is the function that outputs and inputs of realizing terminal device as two independent components, but in some embodiments In, can be integrated by touch panel 2071 and display panel 2061 and realize the function that outputs and inputs of terminal device, it is specific this Place is without limitation.
Interface unit 208 is the interface that external device (ED) is connect with terminal device 200.For example, external device (ED) may include having Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 208 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in terminal device 200 or can be used in 200 He of terminal device Data are transmitted between external device (ED).
Memory 209 can be used for storing software program and various data.Memory 209 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 209 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 210 is the control centre of terminal device, utilizes each of various interfaces and the entire terminal device of connection A part by running or execute the software program and/or module that are stored in memory 209, and calls and is stored in storage Data in device 209 execute the various functions and processing data of terminal device, to carry out integral monitoring to terminal device.Place Managing device 210 may include one or more processing units;Optionally, processor 210 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 210.
Terminal device 200 can also include the power supply 211 (such as battery) powered to all parts, optionally, power supply 211 Can be logically contiguous by power-supply management system and processor 210, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, terminal device 200 includes some unshowned functional modules, details are not described herein.
Optionally, the embodiment of the present invention also provides a kind of terminal device, including processor 210 as shown in figure 18, storage Device 209 is stored in the computer program that can be run on memory 209 and on processor 210, and the computer program is by processor 210 realize each process of above method embodiment when executing, and can reach identical technical effect, to avoid repeating, here It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, realizes each process of above method embodiment when which is executed by processor, and can reach identical Technical effect, to avoid repeating, which is not described herein again.Wherein, computer readable storage medium, such as read-only memory (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes Business device, air conditioner or the network equipment etc.) execute the method that each embodiment of the present invention describes.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (20)

1. a kind of encryption method, it is applied to terminal device, which is characterized in that the encryption method includes:
The first input of user is received, first input is the input that user selects encrypted object;
In response to first input, M characteristic area is shown in first area, and show N number of target object in second area, N number of target object is different from the encrypted object, and M and N are positive integer;
The second input of user is received, second input is for triggering the terminal device for the S in N number of target object A target object is respectively moved to S characteristic area in the M characteristic area, and S is positive integer, S≤N and S≤M;
In response to second input, using the corresponding relationship between the S target object and S characteristic area, to described Encrypted object encryption.
2. encryption method according to claim 1, which is characterized in that before the encryption to the encrypted object, institute It states encrypted object and is shown in the first interface;
After the encryption to the encrypted object, the encryption method further include:
In first interface, it is concealed encrypted after the encrypted object.
3. encryption method according to claim 1 or 2, which is characterized in that it is described in response to second input, using institute The corresponding relationship between S target object and S characteristic area is stated, before encrypted object encryption, the encryption method Further include:
Slidably inputing for user is received, it is described to slidably input as user between K characteristic area in the M characteristic area Slidably input, K is positive integer less than or equal to M;
It is described to be inputted in response to described second, it is right using the corresponding relationship between the S target object and S characteristic area The encrypted object encryption, comprising:
It is slidably inputed in response to second input with described, using between the S target object and the S characteristic area Corresponding relationship and the sliding trace slidably inputed, the encrypted object is encrypted, the sliding trace includes described K characteristic area.
4. encryption method according to claim 1 or 2, which is characterized in that described using the S target object and S Corresponding relationship between characteristic area encrypts the encrypted object, comprising:
Using the movement of the S target object and the corresponding relationship and the S target object of the S characteristic area Sequentially, the encrypted object is encrypted.
5. a kind of decryption method, it is applied to terminal device, which is characterized in that the decryption method includes:
Receive the first object input of user;
It is inputted in response to the first object, shows M characteristic area in first area, and show N number of target in second area Object, M and N are positive integer;
Receive the second target input of user;
It inputs in response to second target, when second target, which inputs, presets input for first, decryption object is decrypted, Wherein, when second target input presets input for first, the second target input is for triggering the terminal device S target object in N number of target object is respectively moved to S characteristic area in the M characteristic area, it is described N number of target object is different from the decryption object, and S is positive integer, S≤N and S≤M.
6. decryption method according to claim 5, which is characterized in that after described pair of decryption object decryption, the decryption Method further include:
N number of target object that the second area is shown updates the decryption object after being shown as decryption.
7. decryption method according to claim 5 or 6, which is characterized in that it is described to be inputted in response to second target, when When the second target input presets input for first, before decryption object decryption, the decryption method further include:
The target for receiving user slidably inputs;
It is described to be inputted in response to second target, when second target input presets input for first, to decryption object Decryption, comprising:
In response to second target input and the target slidably input, when second target input for first preset it is defeated Enter and when the target slidably inputs as the second default input, to decryption object decryption, wherein described second preset it is defeated Enter the slidably inputing between K characteristic area in the M characteristic area for user, K is just whole less than or equal to M Number.
8. decryption method according to claim 5 or 6, which is characterized in that described when second target input is first When default input, to decryption object decryption, comprising:
When second target input meet for the mobile sequence of the described first default input and the S target object it is default When mobile sequence, the decryption object is decrypted.
9. decryption method according to claim 6, which is characterized in that it is described the second area is shown it is described N number of After target object updates the decryption object after being shown as decryption, the decryption method further include:
In the case where showing the operation interface of the decryption object after the decryption, the third target input of user is received;
It is inputted in response to the third target, cancels and show the operation interface, and cancel the solution after showing the decryption Close object.
10. a kind of terminal device, which is characterized in that the terminal device includes receiving module, display module and encrypting module;
The receiving module, for receiving the first input of user, first input is the input that user selects encrypted object;
The display module, for showing M spy in first area in response to received first input of the receiving module Region is levied, and shows N number of target object in second area, N number of target object is different from the encrypted object, and M and N are Positive integer;
The receiving module, is also used to receive the second input of user, and second input will for triggering the terminal device S target object in N number of target object is respectively moved to S characteristic area in the M characteristic area, and S is positive Integer, S≤N and S≤M;
The encrypting module, for being inputted in response to the receiving module received described second, using the S target object Corresponding relationship between S characteristic area encrypts the encrypted object.
11. terminal device according to claim 10, which is characterized in that add in the encrypting module to the encrypted object Before close, the encrypted object is shown in the first interface;The terminal device further includes hidden module;
The hidden module is used for after the encrypting module is to encrypted object encryption, hidden in first interface Hide the encrypted encrypted object.
12. terminal device described in 0 or 11 according to claim 1, which is characterized in that
The receiving module is also used to receive slidably inputing for user, described to slidably input as user in the M characteristic area In K characteristic area between slidably input, K is positive integer less than or equal to M;
The encrypting module, specifically for being slidably inputed in response to received second input of the receiving module with described, Using the corresponding relationship and the sliding rail slidably inputed between the S target object and the S characteristic area Mark encrypts the encrypted object, and the sliding trace includes the K characteristic area.
13. terminal device described in 0 or 11 according to claim 1, which is characterized in that
The encrypting module is specifically used in response to received second input of the receiving module, using the S target The mobile sequence of the corresponding relationship and the S target object of object and the S characteristic area, to the encrypted object Encryption.
14. a kind of terminal device, which is characterized in that the terminal device includes receiving module, display module and deciphering module;
The receiving module, the first object for receiving user input;
The display module shows M in first area for inputting in response to the received first object of the receiving module A characteristic area, and show that N number of target object, M and N are positive integer in second area;
The receiving module is also used to receive the second target input of user;
The deciphering module, for being inputted in response to received second target of the receiving module, when second target When input presets input for first, to decryption object decryption, wherein when second target input is the first default input, The second target input moves S target object in N number of target object for triggering the terminal device respectively To S characteristic area in the M characteristic area, N number of target object is different from the decryption object, and S is positive integer, S≤N and S≤M.
15. terminal device according to claim 14, which is characterized in that
The display module is also used to after the deciphering module is to decryption object decryption, the second area is shown The N number of target object shown updates the decryption object after being shown as decryption.
16. terminal device according to claim 14 or 15, which is characterized in that
The receiving module, the target for being also used to receive user slidably input;
The deciphering module is specifically used for sliding in response to the received second target input of the receiving module and the target Dynamic input, when second target input be the first default input and the target slidably input for second it is default input when, it is right The decryption object decryption, wherein the described second default input is K characteristic area of the user in the M characteristic area Between slidably input, K is positive integer less than or equal to M.
17. terminal device according to claim 14 or 15, which is characterized in that
The deciphering module is specifically used for inputting in response to received second target of the receiving module, when described second When target input meets default mobile sequence for the mobile sequence of the described first default input and the S target object, to institute State decryption object decryption.
18. terminal device according to claim 15, which is characterized in that
The receiving module is also used to update in N number of target object that the deciphering module shows the second area After the decryption object after being shown as decryption, the behaviour of the decryption object after the display module shows the decryption In the case where making interface, the third target input of user is received;
The display module is also used to cancel described in display in response to the received third target input of the receiving module Operation interface, and cancel the decryption object after showing the decryption.
19. a kind of terminal device, which is characterized in that including processor, memory and be stored on the memory and can be in institute The computer program run on processor is stated, such as Claims 1-4 is realized when the computer program is executed by the processor Any one of described in encryption method the step of, or the step of decryption method as described in any one of claim 5 to 9.
20. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium Sequence, the computer program realize the step of encryption method according to any one of claims 1 to 4 when being executed by processor Suddenly, the step of decryption method or as described in any one of claim 5 to 9.
CN201810862196.3A 2018-08-01 2018-08-01 Encryption method, decryption method and terminal equipment Active CN109190388B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810862196.3A CN109190388B (en) 2018-08-01 2018-08-01 Encryption method, decryption method and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810862196.3A CN109190388B (en) 2018-08-01 2018-08-01 Encryption method, decryption method and terminal equipment

Publications (2)

Publication Number Publication Date
CN109190388A true CN109190388A (en) 2019-01-11
CN109190388B CN109190388B (en) 2020-11-06

Family

ID=64937714

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810862196.3A Active CN109190388B (en) 2018-08-01 2018-08-01 Encryption method, decryption method and terminal equipment

Country Status (1)

Country Link
CN (1) CN109190388B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020151460A1 (en) * 2019-01-25 2020-07-30 维沃移动通信有限公司 Object processing method and terminal device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103235903A (en) * 2013-04-12 2013-08-07 广东欧珀移动通信有限公司 Processing method and device for hiding programs of mobile terminal
CN103616981A (en) * 2013-10-31 2014-03-05 小米科技有限责任公司 Application process method, device and mobile terminal
CN107679390A (en) * 2017-09-26 2018-02-09 维沃移动通信有限公司 A kind of screen-lock password processing method and mobile terminal
CN107908941A (en) * 2017-11-16 2018-04-13 维沃移动通信有限公司 The operating method and mobile terminal of application program
CN108153460A (en) * 2017-12-19 2018-06-12 维沃移动通信有限公司 A kind of icon hiding method and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103235903A (en) * 2013-04-12 2013-08-07 广东欧珀移动通信有限公司 Processing method and device for hiding programs of mobile terminal
CN103616981A (en) * 2013-10-31 2014-03-05 小米科技有限责任公司 Application process method, device and mobile terminal
CN107679390A (en) * 2017-09-26 2018-02-09 维沃移动通信有限公司 A kind of screen-lock password processing method and mobile terminal
CN107908941A (en) * 2017-11-16 2018-04-13 维沃移动通信有限公司 The operating method and mobile terminal of application program
CN108153460A (en) * 2017-12-19 2018-06-12 维沃移动通信有限公司 A kind of icon hiding method and terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020151460A1 (en) * 2019-01-25 2020-07-30 维沃移动通信有限公司 Object processing method and terminal device

Also Published As

Publication number Publication date
CN109190388B (en) 2020-11-06

Similar Documents

Publication Publication Date Title
CN109542282A (en) A kind of interface display method and terminal device
CN109889348A (en) A kind of images share method and device
CN109525874A (en) A kind of screenshotss method and terminal device
CN109857291A (en) A kind of icon display method and terminal device
CN109002340A (en) A kind of screen locking method and electronic equipment
CN110489029A (en) A kind of icon display method and terminal device
CN110188524A (en) Information ciphering method, information decryption method and terminal
CN109857306A (en) Screenshotss method and terminal device
CN108762634A (en) A kind of control method and terminal
CN110502878A (en) A kind of application permission setting method and terminal device
CN110058836A (en) A kind of output method and terminal device of audio signal
CN110457879A (en) Object displaying method and terminal device
CN109451141A (en) A kind of method of controlling operation thereof and associated terminal
CN108681664A (en) A kind of encryption method and device
CN110007822A (en) A kind of interface display method and terminal device
CN110209369A (en) A kind of interface display method and terminal device
CN110457935A (en) A kind of authority configuring method and terminal device
CN108171034A (en) A kind of method and terminal for protecting privacy
CN110147174A (en) A kind of control method and terminal device
CN110049187A (en) A kind of display methods and terminal device
CN110069305A (en) A kind of screen interface switching method and terminal device
CN110035183A (en) Information sharing method and terminal
CN109117054A (en) A kind of display control method and terminal
CN108153460A (en) A kind of icon hiding method and terminal
CN110213438A (en) A kind of processing method and terminal device of application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant