CN115600229A - Information display method and device - Google Patents

Information display method and device Download PDF

Info

Publication number
CN115600229A
CN115600229A CN202211309704.8A CN202211309704A CN115600229A CN 115600229 A CN115600229 A CN 115600229A CN 202211309704 A CN202211309704 A CN 202211309704A CN 115600229 A CN115600229 A CN 115600229A
Authority
CN
China
Prior art keywords
information
input
application
decryption algorithm
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211309704.8A
Other languages
Chinese (zh)
Inventor
吴健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202211309704.8A priority Critical patent/CN115600229A/en
Publication of CN115600229A publication Critical patent/CN115600229A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses an information display method and device, and belongs to the technical field of communication. Wherein, the method comprises the following steps: receiving a first input of first information in a first application; responding to the first input, and encrypting the first information based on a preset encryption algorithm to obtain second information; receiving a second input to a second application, the second application comprising at least one decryption algorithm; and responding to the second input, and displaying third information, wherein the third information is obtained by decrypting the second information according to at least one decryption algorithm.

Description

Information display method and device
Technical Field
The application belongs to the technical field of communication, and particularly relates to an information display method and device.
Background
There is some information that needs to be passed between different applications based on the user's usage needs. At present, the transfer of information between different applications is usually realized by a copy and paste function in the electronic device. After the first application copies the information, the user may choose to paste the information in the second application when launching the second application.
However, at present, privacy protection measures are lacked for copied information, and the information security is low.
Disclosure of Invention
The embodiment of the application aims to provide an information display method and an information display device, which can solve the problem that the privacy security of copied information cannot be protected in the process of copying and pasting information.
In a first aspect, an embodiment of the present application provides an information display method, including:
receiving a first input of first information in a first application;
responding to the first input, and encrypting the first information based on a preset encryption algorithm to obtain second information;
receiving a second input to a second application, the second application comprising at least one decryption algorithm;
and responding to the second input, and displaying third information, wherein the third information is obtained by decrypting the second information according to at least one decryption algorithm.
In a second aspect, an embodiment of the present application provides an information display apparatus, where the method includes:
the first receiving module is used for receiving first input of first information in a first application;
the encryption module is used for responding to the first input and encrypting the first information based on a preset encryption algorithm to obtain second information;
a second receiving module for receiving a second input to a second application, the second application comprising at least one decryption algorithm;
and the display module is used for responding to the second input and displaying third information, and the third information is obtained by decrypting the second information according to at least one decryption algorithm.
In a third aspect, embodiments of the present application provide an electronic device, which includes a processor and a memory, where the memory stores a program or instructions executable on the processor, and the program or instructions, when executed by the processor, implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In a sixth aspect, embodiments of the present application provide a computer program product, stored on a storage medium, for execution by at least one processor to implement the method according to the first aspect.
In the embodiment of the application, the first information in the first application is responded to, and the second information is obtained by encrypting the first information based on the preset encryption algorithm, so that the safety of the subsequent transmission of the first information between the applications can be guaranteed. Then, a second input to a second application is received, the second application including at least one decryption algorithm, and third information obtained by decrypting the second information according to the at least one decryption algorithm is displayed in response to the second input. Therefore, the second application can be prevented from directly acquiring the first information in the first application, and the second information is acquired by encrypting the first information and displaying the third information acquired by decrypting the second information, so that the requirement of a user for using the third information in the second application is met, and the privacy safety of the first information during transmission between the applications is effectively protected.
Drawings
Fig. 1 is a flowchart of an information display method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an encryption algorithm interface provided by an embodiment of the present application;
FIG. 3 is a schematic diagram of a decryption algorithm interface provided by an embodiment of the present application;
fig. 4 is a structural diagram of an information display device according to an embodiment of the present application;
fig. 5 is one of the hardware configuration diagrams of the electronic device according to the embodiment of the present application;
fig. 6 is a second schematic diagram of a hardware structure of the electronic device according to the embodiment of the present application.
Detailed Description
The technical solutions of the embodiments of the present application will be described below clearly with reference to the drawings of the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments that can be derived from the embodiments of the present application by one of ordinary skill in the art are intended to be within the scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application are capable of operation in sequences other than those illustrated or described herein, and that the terms "first," "second," etc. are generally used in a generic sense and do not limit the number of terms, e.g., a first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/", and generally means that the former and latter related objects are in an "or" relationship.
The information display method provided by the embodiment of the application can be applied to at least the following application scenarios, which are described below.
At present, on electronic equipment, after a user copies first information by a first application, when other second applications are opened, the second applications can directly acquire the first information, so that the information is unsafe, and hidden information safety hazards are more and more prominent along with the increasing demand of the user on privacy safety.
The embodiment of the application provides an information display method and device, and aims to solve the problem that in the related art, in the process of copying and pasting information, the privacy safety of the copied information cannot be protected.
The information display method provided by the embodiment of the present application is described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
Fig. 1 is a flowchart of an information display method according to an embodiment of the present application.
As shown in fig. 1, the information display method may include steps 110 to 140, and the method is applied to an information display device, and is specifically as follows:
step 110, a first input of first information in a first application is received.
Wherein, step 110 may specifically include: a first input to a first application interface of a first application is received, the first input indicating first information.
Receiving a first input to a first application interface of a first application may specifically include: the method comprises the steps of receiving a selection input of first information in a first application interface, responding to the selection input, displaying a copy identifier, receiving the selection input of the copy identifier, and responding to the selection input of the copy identifier to acquire the first information.
And 120, responding to the first input, and encrypting the first information based on a preset encryption algorithm to obtain second information.
The encryption algorithm may include: an encryption algorithm for modifying the first information, an encryption algorithm for replacing the first information, an encryption algorithm for encoding the first information, and the like. Such as: AES128, AES256, and so on.
In addition, if the first application does not have a corresponding encryption algorithm, first information is obtained in response to the first input.
In a possible embodiment, before step 120, the following steps may be further included:
receiving a third input to the first application;
in response to a third input, an encryption algorithm and a first key are determined.
Receiving a third input to the first application may specifically include: a third input to the first application in the application settings interface is received.
Receiving a third input to the first application in the application settings interface, comprising: and receiving a selection input of a 'paste information encryption' control in an application setting interface, and responding to the selection input to display a plurality of applications, wherein the plurality of applications comprise a first application. The area associated with each application is used for displaying the encryption algorithm and the decryption algorithm corresponding to the current application.
The application settings interface includes common encryption schemes that may be selected. Wherein the application settings interface may be as shown in fig. 2. The method comprises the following steps: no encryption algorithm, system default-encryption algorithm a, system default-encryption algorithm B, custom-encryption algorithm a, custom-encryption algorithm B is used. For the user to select from, the user selected encryption algorithm with the identification information, as shown in fig. 2, the system default, encryption algorithm a.
The system default encryption algorithm is used for indicating that the first information can be encrypted according to the encryption algorithm subsequently to obtain the second information. And the self-defined encryption algorithm is used for representing that the first information can be encrypted subsequently according to the encryption algorithm and the first key defined by the user to obtain second information. I.e. the user can enter the first key himself for encrypting the copied information according to the first key.
Step 130, receiving a second input to a second application, the second application comprising at least one decryption algorithm.
In a possible embodiment, the step 130 may specifically include the following steps:
receiving a second input of an application identification for a second application; alternatively, a second input to an application interface of a second application is received.
Wherein a second input to the application identification of the second application is received for subsequent display of third information in the application interface of the second application in response to the second input.
Receiving a second input to the application interface of the second application for subsequent display of the paste control in response to the second input, and displaying third information in the application interface of the second application in response to a selected input to the paste control.
Step 140, in response to the second input, displaying third information, where the third information is obtained by decrypting the second information according to at least one decryption algorithm.
Step 140 may specifically include: and in response to the second input, displaying third information obtained by decrypting the second information according to at least one decryption algorithm in a preset time period.
Here, by displaying the third information obtained by decrypting the second information according to at least one decryption algorithm, the privacy and the security of the first information acquired from the first application during transmission can be effectively protected, and the user experience can be guaranteed.
In a possible embodiment, before step 140, the following steps may be further included:
receiving a fourth input to the second application;
in response to a fourth input, a decryption algorithm and a first key are determined.
Receiving a fourth input to the second application may specifically include the following steps: a fourth input is received to a second application in the application settings interface.
Wherein the second application may comprise at least one decryption algorithm, such as 3, for decryption in turn according to the at least one decryption algorithm. And if the decryption is successful, performing decryption processing on the second information to obtain a decryption result of the third information.
The application settings interface includes an alternative common decryption scheme. Wherein the application settings interface may be as shown in fig. 3. The method comprises the following steps: no decryption algorithm, system default-decryption algorithm a, system default-decryption algorithm B, system default-decryption algorithm C, custom-decryption algorithm a, custom-decryption algorithm B, and custom-decryption algorithm C are used. For the user to select from, with the identification information, the user selected decryption algorithm, as shown in fig. 3, system default-decryption algorithm a, and system default-decryption algorithm B.
And the default decryption algorithm of the system is used for showing that the second information can be decrypted subsequently according to the decryption algorithm to obtain third information. And the user-defined decryption algorithm is used for showing that the second information can be decrypted subsequently according to the decryption algorithm and the user-defined first key to obtain third information.
In addition, the decryption algorithm may be system preset or user-defined.
In a possible embodiment, before step 140, the following steps may be further included:
and decrypting the second information according to the first key and the decryption algorithm to obtain third information.
And decrypting the second information by using at least one decryption algorithm included in the second application to obtain third information. Here, the second application can be prevented from directly acquiring the first information, and the security of the first information can be ensured.
In a possible embodiment, step 140 may specifically include the following steps:
in response to the second input, third information is displayed where the encryption algorithm and the decryption algorithm match, the first information being the same as the third information.
Since the encryption algorithm and the decryption algorithm are preset by the user, if the user allows the second application to acquire the information in the first application, the decryption algorithm set for the second application will match the encryption algorithm of the first application.
For example, the encryption algorithm includes: an encryption algorithm a; the decryption algorithm comprises: decryption algorithm a, decryption algorithm b, and decryption algorithm c. The encryption algorithm a matches the decryption algorithm a, so it is determined that the encryption algorithm matches the decryption algorithm.
Under the condition that the encryption algorithm is matched with the decryption algorithm, the user is shown to allow the second application to acquire the information in the first application, the second information can be decrypted to obtain third information, and the obtained third information is consistent with the first information copied in the first application. And after the second application acquires the third information, a paste record of the third information is left.
Here, the second application can be prevented from directly acquiring the first information, and the third information can be displayed when the encryption algorithm and the decryption algorithm are matched, so that the security of the first information can be ensured.
In a possible embodiment, step 140 may specifically include the following steps:
and responding to the second input, and displaying third information under the condition that the encryption algorithm and the decryption algorithm are not matched, wherein the third information is obtained by decrypting the historical encryption information according to the decryption algorithm.
For example, the encryption algorithm includes: an encryption algorithm a; the decryption algorithm includes: decryption algorithm d, decryption algorithm e and decryption algorithm f. There is no one of the decryption algorithms that matches the encryption algorithm, so it is determined that the encryption algorithm and the decryption algorithm do not match.
And under the condition that the encryption algorithm and the decryption algorithm are not matched, the user does not allow the second application to acquire the information in the first application, and at the moment, third information obtained by decrypting the historical encryption information according to the decryption algorithm is displayed. I.e. the paste information last decrypted by the second application.
Here, the second application can be prevented from directly acquiring the first information, and the security of the first information can be ensured.
In the embodiment of the application, the first information in the first application is responded to, and the second information is obtained by encrypting the first information based on the preset encryption algorithm, so that the safety of the subsequent transmission of the first information between the applications can be guaranteed. Then, a second input to a second application is received, the second application including at least one decryption algorithm, and third information obtained by decrypting the second information according to the at least one decryption algorithm is displayed in response to the second input. The second information is obtained by encrypting the first information, and the third information obtained by decrypting the second information is displayed, so that the requirement of a user for using the third information in the second application can be met, the privacy safety of the first information during transmission between applications can be effectively protected, and the information safety is improved.
According to the information display method provided by the embodiment of the application, the execution main body can be an information display device. In the embodiment of the present application, an information display device executing an information display method is taken as an example, and the information display device provided in the embodiment of the present application is described.
Fig. 4 is a block diagram of an information display apparatus provided in an embodiment of the present application, where the apparatus 400 includes:
a first receiving module 410, configured to receive a first input of first information in a first application.
The encryption module 420 is configured to, in response to the first input, encrypt the first information based on a preset encryption algorithm to obtain second information.
A second receiving module 430 for receiving a second input to a second application, the second application comprising at least one decryption algorithm.
The display module 440 is configured to display, in response to the second input, third information, where the third information is obtained by decrypting the second information according to at least one decryption algorithm.
In a possible embodiment, the display module 440 is specifically configured to:
in response to the second input, third information is displayed in the event that the encryption algorithm and the decryption algorithm match, the first information being the same as the third information.
In a possible embodiment, the display module 440 is specifically configured to:
and responding to the second input, and displaying third information under the condition that the encryption algorithm and the decryption algorithm are not matched, wherein the third information is obtained by decrypting the historical encryption information according to the decryption algorithm.
In one possible embodiment, the apparatus 400 may further include:
a third receiving module, configured to receive a third input to the first application;
a first determination module to determine an encryption algorithm and a first key in response to a third input.
In a possible embodiment, the apparatus 400 may further include:
a fourth receiving module, configured to receive a fourth input to the second application;
a second determining module for determining the decryption algorithm and the first key in response to a fourth input.
In the embodiment of the application, the first information in the first application is responded to, and the second information is obtained by encrypting the first information based on the preset encryption algorithm, so that the safety of the subsequent transmission of the first information between the applications can be guaranteed. Then, a second input to a second application is received, the second application including at least one decryption algorithm, and third information obtained by decrypting the second information according to the at least one decryption algorithm is displayed in response to the second input. The second information is obtained by encrypting the first information, and the third information obtained by decrypting the second information is displayed, so that the requirement of a user for using the third information in the second application can be met, the privacy safety of the first information during transmission between applications can be effectively protected, and the information safety is improved.
The information display device in the embodiment of the present application may be an electronic device, or may be a component in an electronic device, such as an integrated circuit or a chip. The electronic device may be a terminal, or may be a device other than a terminal. The electronic Device may be, for example, a Mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic Device, a Mobile Internet Device (MID), an Augmented Reality (AR)/Virtual Reality (VR) Device, a robot, a wearable Device, an ultra-Mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and may also be a server, a Network Attached Storage (Network Attached Storage, NAS), a personal computer (NAS), a Television (TV), a teller machine, a self-service machine, and the like, and the embodiments of the present application are not limited in particular.
The information display device according to the embodiment of the present application may be a device having an action system. The action system may be an Android (Android) action system, an iOS action system, or other possible action systems, and the embodiment of the present application is not limited specifically.
The information display device provided in the embodiment of the present application can implement each process implemented by the above method embodiment, and is not described here again to avoid repetition.
Optionally, as shown in fig. 5, an electronic device 510 is further provided in the embodiment of the present application, and includes a processor 511, a memory 512, and a program or an instruction stored in the memory 512 and executable on the processor 511, where the program or the instruction is executed by the processor 511 to implement each step of any one of the above embodiments of the information display method, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
It should be noted that the electronic device of the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 6 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 600 includes, but is not limited to: a radio frequency unit 601, a network module 602, an audio output unit 603, an input unit 604, a sensor 605, a display unit 606, a user input unit 607, an interface unit 608, a memory 609, a processor 610, and the like.
Those skilled in the art will appreciate that the electronic device 600 may further comprise a power source (e.g., a battery) for supplying power to the various components, and the power source may be logically connected to the processor 610 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The electronic device structure shown in fig. 6 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is omitted here.
The user input unit 607 is configured to receive a first input of first information in a first application.
The processor 610 is configured to encrypt the first information based on a preset encryption algorithm in response to the first input, so as to obtain second information.
The user input unit 607 is further adapted to receive a second input to a second application, the second application comprising at least one decryption algorithm.
And a display unit 606, configured to display, in response to the second input, third information, where the third information is obtained by performing decryption processing on the second information according to at least one decryption algorithm.
Optionally, the display unit 606 is further configured to display, in response to the second input, third information in a case where the encryption algorithm and the decryption algorithm match, the first information being the same as the third information.
Optionally, the display unit 606 is further configured to, in response to the second input, display third information in a case that the encryption algorithm and the decryption algorithm do not match, where the third information is obtained by performing decryption processing on the historical encryption information according to the decryption algorithm.
Optionally, the user input unit 607 is further configured to receive a third input to the first application;
the processor 610 is further configured to determine an encryption algorithm and a first key in response to a third input.
Optionally, the user input unit 607 is further configured to receive a fourth input to the second application;
the processor 610, further responsive to a fourth input, determines a decryption algorithm and a first key.
In the embodiment of the application, the first information in the first application is responded to, and the second information is obtained by encrypting the first information based on the preset encryption algorithm, so that the safety of the subsequent transmission of the first information between the applications can be guaranteed. Then, a second input to a second application is received, the second application including at least one decryption algorithm, and third information obtained by decrypting the second information according to the at least one decryption algorithm is displayed in response to the second input. The second information is obtained by encrypting the first information, and the third information obtained by decrypting the second information is displayed, so that the requirement of a user for using the third information in the second application can be met, the privacy safety of the first information during transmission between applications can be effectively protected, and the information safety is improved.
It is to be understood that, in the embodiment of the present application, the input Unit 604 may include a Graphics Processing Unit (GPU) 6041 and a microphone 6042, and the Graphics processor 6041 processes image data of a still picture or a video image obtained by an image capturing apparatus (such as a camera) in a video image capturing mode or an image capturing mode. The display unit 606 may include a display panel 6061, and the display panel 6061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 607 includes at least one of a touch panel 6071 and other input devices 6072. Touch panel 6071, also known as a touch screen. The touch panel 6071 may include two parts of a touch detection device and a touch controller. Other input devices 6072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, and are not described in further detail herein. The memory 609 may be used to store software programs as well as various data including, but not limited to, applications and action systems. The processor 610 may integrate an application processor, which primarily handles motion systems, user pages, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 610.
The memory 609 may be used to store software programs as well as various data. The memory 609 may mainly include a first storage area storing a program or an instruction and a second storage area storing data, wherein the first storage area may store an operating system, an application program or an instruction (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, the memory 609 may include volatile memory or nonvolatile memory, or the memory x09 may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. The volatile Memory may be a Random Access Memory (RAM), a Static Random Access Memory (Static RAM, SRAM), a Dynamic Random Access Memory (Dynamic RAM, DRAM), a Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), a Double Data Rate Synchronous Dynamic Random Access Memory (Double Data Rate SDRAM, ddr SDRAM), an Enhanced Synchronous SDRAM (ESDRAM), a Synchronous Link DRAM (SLDRAM), and a Direct bus RAM (DRRAM). The memory 609 in the embodiments of the subject application include, but are not limited to, these and any other suitable types of memory.
Processor 610 may include one or more processing units; optionally, the processor 610 integrates an application processor, which mainly handles operations related to the operating system, user interface, application programs, etc., and a modem processor, which mainly handles wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor 610.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the above-mentioned information display method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a computer read only memory ROM, a random access memory RAM, a magnetic or optical disk, and the like.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the above information display method embodiment, and can achieve the same technical effect, and is not described here again to avoid repetition.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as a system-on-chip, or a system-on-chip.
Embodiments of the present application provide a computer program product, where the program product is stored in a storage medium, and the program product is executed by at least one processor to implement the processes of the foregoing information display method embodiments, and can achieve the same technical effects, and in order to avoid repetition, details are not repeated here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one of 8230, and" comprising 8230does not exclude the presence of additional like elements in a process, method, article, or apparatus comprising the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the method of the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but in many cases, the former is a better implementation. Based on such understanding, the technical solutions of the present application or portions thereof that contribute to the prior art may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (which may be a mobile phone, a computer, a server, or a network device, etc.) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the present embodiments are not limited to those precise embodiments, which are intended to be illustrative rather than restrictive, and that various changes and modifications may be effected therein by one skilled in the art without departing from the scope of the appended claims.

Claims (10)

1. An information display method, characterized in that the method comprises:
receiving a first input of first information in a first application;
responding to the first input, and encrypting the first information based on a preset encryption algorithm to obtain second information;
receiving a second input to a second application, the second application comprising at least one decryption algorithm;
and responding to the second input, and displaying third information, wherein the third information is obtained by decrypting the second information according to the at least one decryption algorithm.
2. The method of claim 1, wherein the displaying third information in response to the second input comprises:
in response to the second input, displaying the third information if the encryption algorithm and the decryption algorithm match, the first information being the same as the third information.
3. The method of claim 1, wherein said displaying third information in response to said second input comprises:
and responding to the second input, and displaying the third information under the condition that the encryption algorithm is not matched with the decryption algorithm, wherein the third information is obtained by decrypting the historical encryption information according to the decryption algorithm.
4. The method of claim 1, wherein prior to said encrypting said first information based on an encryption algorithm in response to said first input to obtain second information, said method further comprises:
receiving a third input to the first application;
in response to the third input, the encryption algorithm and first key are determined.
5. The method of claim 4, wherein prior to said displaying the third information in response to the second input, the method further comprises:
receiving a fourth input to the second application;
in response to the fourth input, the decryption algorithm and the first key are determined.
6. An information display apparatus, characterized in that the apparatus comprises:
the first receiving module is used for receiving first input of first information in a first application;
the encryption module is used for responding to the first input, encrypting the first information based on a preset encryption algorithm and obtaining second information;
a second receiving module for receiving a second input to a second application, the second application comprising at least one decryption algorithm;
and the display module is used for responding to the second input and displaying third information, wherein the third information is obtained by decrypting the second information according to the at least one decryption algorithm.
7. The apparatus of claim 6, wherein the display module is specifically configured to:
in response to the second input, displaying the third information if the encryption algorithm and the decryption algorithm match, the first information being the same as the third information.
8. The apparatus according to claim 6, wherein the display module is specifically configured to:
responding to the second input, and displaying the third information under the condition that the encryption algorithm is not matched with the decryption algorithm, wherein the third information is obtained by decrypting historical encryption information according to the decryption algorithm.
9. The apparatus of claim 6, further comprising:
a third receiving module, configured to receive a third input to the first application;
a first determining module to determine the encryption algorithm and a first key in response to the third input.
10. The apparatus of claim 9, further comprising:
a fourth receiving module, configured to receive a fourth input to the second application;
a second determination module to determine the decryption algorithm and the first key in response to the fourth input.
CN202211309704.8A 2022-10-25 2022-10-25 Information display method and device Pending CN115600229A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211309704.8A CN115600229A (en) 2022-10-25 2022-10-25 Information display method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211309704.8A CN115600229A (en) 2022-10-25 2022-10-25 Information display method and device

Publications (1)

Publication Number Publication Date
CN115600229A true CN115600229A (en) 2023-01-13

Family

ID=84848250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211309704.8A Pending CN115600229A (en) 2022-10-25 2022-10-25 Information display method and device

Country Status (1)

Country Link
CN (1) CN115600229A (en)

Similar Documents

Publication Publication Date Title
CN109214201B (en) Data sharing method, terminal equipment and computer readable storage medium
WO2016192165A1 (en) Data encryption method and apparatus
CN106778295B (en) File storage method, file display method, file storage device, file display device and terminal
CN106203141A (en) The data processing method of a kind of application and device
WO2023202618A1 (en) Data sending method and apparatus
CN112270004B (en) Content encryption method and device and electronic equipment
CN115277670A (en) Network connection control method and device of target application and electronic equipment
CN114844853A (en) Information processing method, information processing apparatus, electronic device, and medium
CN108696355B (en) Method and system for preventing head portrait of user from being embezzled
CN115600229A (en) Information display method and device
CN113868702A (en) Object moving method and device
CN113193956B (en) Account information processing method and device
CN113010918A (en) Information processing method and device
CN113835820A (en) Graphic code display method and device
CN115134473B (en) Image encryption method and device
CN111125742A (en) File management method, intelligent terminal and device with storage function
CN113452530B (en) Information transmission method and device
CN113407959B (en) Operation execution method and device and electronic equipment
CN115982670A (en) Object encryption method and device, electronic equipment and storage medium
CN115390712A (en) Icon hiding method and device, electronic equipment and storage medium
CN116933284A (en) File processing method and device and electronic equipment
CN116975891A (en) File sharing method and electronic equipment
CN114090132A (en) Application program starting method, application program starting device and equipment
CN113704814A (en) Information management method and device
CN116308349A (en) Payment method, device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination