WO2020233218A1 - 信息加密方法、信息解密方法及终端 - Google Patents
信息加密方法、信息解密方法及终端 Download PDFInfo
- Publication number
- WO2020233218A1 WO2020233218A1 PCT/CN2020/080688 CN2020080688W WO2020233218A1 WO 2020233218 A1 WO2020233218 A1 WO 2020233218A1 CN 2020080688 W CN2020080688 W CN 2020080688W WO 2020233218 A1 WO2020233218 A1 WO 2020233218A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- input
- information
- encrypted
- fingerprint information
- terminal
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04883—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04886—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Definitions
- the present disclosure relates to the field of communication technology, in particular to an information encryption method, an information decryption method, and a terminal.
- the input method encryption depends on the input method that supports the encryption function. When multiple parties participate, all members need to use the input method uniformly.
- the decryption also depends on the input method to decrypt.
- the input method encryption relies on the built-in encryption library of the input method, which requires all participants to use the input method and the input method has the built-in encryption library to perform encryption and decryption; its dependence is strong and the application is not flexible.
- the embodiments of the present disclosure provide an information encryption method, an information decryption method, and a terminal, so as to solve the problem that the encrypted input of the related technology depends on the input method and the encryption library, and the application is not flexible.
- an information encryption method applied to the first terminal, includes:
- the embodiment of the present disclosure also provides an information decryption method applied to a second terminal, including:
- An embodiment of the present disclosure provides a terminal, where the terminal is a first terminal and includes:
- the first receiving module is used to receive the first input acting on the group chat interface
- the first response module is configured to obtain input information of the first input in response to the first input, and encrypt the input information by using fingerprint information corresponding to the first input;
- the second receiving module is used to receive the second input
- the second response module is configured to send the input information to perform encryption processing to obtain encrypted information in response to the second input.
- An embodiment of the present disclosure provides a terminal, where the terminal is a second terminal and includes:
- the information receiving module receives the encrypted information sent by the first terminal on the group chat interface
- a fifth receiving module configured to receive a fifth input acting on the display area of the encrypted information
- the fifth response module is configured to respond to the fifth input, and if the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information, display the information after decrypting the encrypted information.
- the embodiment of the present disclosure provides a terminal, including a processor, a memory, and a computer program stored on the memory and capable of running on the processor.
- a terminal including a processor, a memory, and a computer program stored on the memory and capable of running on the processor.
- the embodiment of the present disclosure provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the steps of the information encryption method described above are implemented; or, the When the computer program is executed by the processor, the steps of the information decryption method described above are realized.
- the first input input information is directly encrypted through the fingerprint information corresponding to the first input, and then the encrypted information is sent.
- the group chat user can make a fifth input in the display area of the encrypted information through the fifth input.
- the corresponding fingerprint information realizes the decryption function, the operation is simple and the compatibility is strong, without other special dependencies.
- Figure 1 shows a flowchart of the steps of an information encryption method provided by an embodiment of the present disclosure
- Figure 2 shows one of the schematic diagrams of an information encryption method provided by an embodiment of the present disclosure
- Figure 3 shows the second schematic diagram of an information encryption method provided by an embodiment of the present disclosure
- Figure 4 shows the third schematic diagram of an information encryption method provided by an embodiment of the present disclosure
- Figure 5 shows the fourth schematic diagram of an information encryption method provided by an embodiment of the present disclosure
- Figure 6 shows the fifth schematic diagram of the information encryption method provided by the embodiments of the present disclosure.
- FIG. 7 shows the sixth schematic diagram of the information encryption method provided by the embodiments of the present disclosure.
- FIG. 8 shows the seventh schematic diagram of an information encryption method provided by an embodiment of the present disclosure
- Figure 9 shows the eighth schematic diagram of an information encryption method provided by an embodiment of the present disclosure.
- FIG. 10 shows a flowchart of steps of an information decryption method provided by an embodiment of the present disclosure
- Figure 11 shows one of the schematic diagrams of an information decryption method provided by an embodiment of the present disclosure
- Figure 12 shows the second schematic diagram of an information decryption method provided by an embodiment of the present disclosure
- FIG. 13 shows one of the schematic structural diagrams of a terminal provided by an embodiment of the present disclosure
- FIG. 14 shows the second structural diagram of a terminal provided by an embodiment of the present disclosure
- FIG. 15 shows the third structural diagram of a terminal provided by an embodiment of the present disclosure.
- words such as “exemplary” or “for example” are used as examples, illustrations, or illustrations. Any embodiment or design solution described as “exemplary” or “for example” in the embodiments of the present disclosure should not be construed as being more preferable or advantageous than other embodiments or design solutions. To be precise, words such as “exemplary” or “for example” are used to present related concepts in a specific manner.
- the terminal provided by the embodiments of the present disclosure may be a mobile phone, a tablet computer, a notebook computer, an Ultra-Mobile Personal Computer (UMPC), a netbook, a wearable device (Wearable Device), a vehicle-mounted device, or a personal digital assistant (Personal Digital Assistant). Digital Assistant, PDA) etc.
- UMPC Ultra-Mobile Personal Computer
- netbook a wearable device
- Vehicle-mounted device or a personal digital assistant (Personal Digital Assistant).
- PDA Personal Digital Assistant
- an embodiment of the present disclosure provides an information encryption method applied to a first terminal, including:
- Step 101 Receive a first input acting on a group chat interface.
- the first input is a sliding operation or a tap operation.
- Step 102 In response to the first input, obtain input information of the first input, and encrypt the input information using fingerprint information corresponding to the first input.
- the first input input information is the information to be sent from the first terminal.
- the fingerprint information corresponding to the first input is used to encrypt the information to be sent; specifically, the system encrypts the information while input .
- Step 103 Receive a second input; the second input is an input that triggers a sending operation, such as clicking a sending button.
- Step 104 In response to the second input, send the input information for encryption processing to obtain encrypted information.
- fingerprint information is used to perform authorization management such as encryption and decryption, which is simple to operate and has strong compatibility without other special dependencies.
- the user enters information by tapping or sliding the keyboard in the keyboard area.
- the first terminal detects fingerprint information at the same time, records and retains the current fingerprint information of the first input; and uses the fingerprint information corresponding to the first input to An inputted input information is encrypted to obtain encrypted information.
- the encrypted information sent by itself can be displayed in plain text (that is, the input information of the first input is directly displayed), or displayed in cipher text (that is, the first input is displayed).
- the information sent by the first terminal is displayed in cipher text (that is, the encrypted information of the first input input information is displayed).
- the method before step 101, the method further includes:
- the encrypted input mode is activated.
- the user can activate or deactivate the encrypted input mode through the encrypted input switch of the system.
- the third input includes:
- the preset gesture input acting on the group chat interface is used to activate or deactivate the encrypted input.
- the encrypted input is activated or closed; optionally, as shown in Figure 4, the first The terminal can prompt the user whether the current state is to start encrypted input or close encrypted input.
- the background color of the keyboard area of the input method is changed to gray or other dark colors.
- the background color of the keyboard area is restored to the original color.
- Figure 5 shows the state of encrypted input Schematic diagram of the keyboard area background being replaced.
- the third input includes:
- the virtual keys are used to activate or deactivate encrypted input.
- a virtual key for enabling or disabling encrypted input is set in the keyboard area, and the encrypted input function is turned on or off by clicking the virtual method.
- the first terminal may prompt the user whether the current state is to start encrypted input or close encrypted input.
- the background color of the keyboard area of the input method is changed to gray or other dark colors, and the background color of the keyboard area is restored to the original color after the encrypted input is turned off.
- the encrypted information is displayed as a processed character string; or, the encrypted information is displayed as multiple target symbols; or, the encrypted information is displayed as a mosaic obfuscated information.
- member A ie, the first terminal
- sends encrypted information and the encrypted information is displayed as a processed string.
- the specific processing method may be to display the information as XXXX, or through mosaic blur processing.
- the method before step 103 further includes:
- the first terminal When the first terminal sends encrypted information, it directly selects which group chat members’ fingerprints can view the encrypted information; specifically, the specific group chat member is designated through the fourth input, and the fingerprint information assigned to the specified group chat member by the system is decrypted The authority of this encrypted message. For example, as shown in Figure 8, after clicking the "+" button shown in Figure 8, the group chat member list shown in Figure 9 pops up, and the user can check the group chat members shown in Figure 9 to view this bar. Group chat members with encrypted messages.
- the above-mentioned embodiment of the present disclosure directly encrypts the first input input information through the fingerprint information corresponding to the first input, and then sends the encrypted information.
- the group chat user can perform the fifth input in the display area of the encrypted information. Input the corresponding fingerprint information to realize the decryption function, the operation is simple and the compatibility is strong, without other special dependencies.
- an embodiment of the present disclosure also provides an information decryption method applied to a second terminal, including:
- Step 201 Receive encrypted information sent by the first terminal on the group chat interface
- Step 202 Receive a fifth input acting on the display area of the encrypted information
- Step 203 In response to the fifth input, if the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information, display the information after decrypting the encrypted information.
- the fifth input may specifically be a sliding operation input of a user's finger, a scraping operation input, or other input that can be read by fingerprints and acts on the display area of the encrypted information, which is not specifically limited herein.
- group chat members can swipe their fingers to the display area where the encrypted information is located.
- the system detects whether the fingerprint information of the current finger is authorized to decrypt the current encrypted information; when the authorized fingerprint information is detected, slide When the area is scratched, the encrypted information is displayed.
- the method further includes:
- a prompt message is displayed, and the prompt message is used to indicate that the current user has no right to view the encrypted information.
- the method further includes:
- the embodiments of the present disclosure provide multiple ways to determine whether the current fingerprint information has authority, which are as follows:
- Manner 1 The judging whether the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information includes:
- the contact methods include: phone numbers, social accounts, instant messaging tool accounts, etc., which are not specifically limited here.
- whether the fingerprint information corresponding to the fifth input and the fingerprint information used for the encryption information are stored with each other's contact information to determine whether there is authority. For example, it can be determined based on the relationship between members A, B, C and the current producer D of encrypted information. For example, if the relationship between A and D is that the two parties are friends, or relatives, or friends, then A is allowed to view the message through fingerprint verification. B and C have no such relationship, so the fingerprint information of B and C will not be able to view the encrypted information sent by D.
- Manner 2 The judging whether the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information includes:
- the time for the user who input the fingerprint information corresponding to the fifth input to join the current group chat is greater than the preset value, and the time for the user who input the fingerprint information corresponding to the fifth input to join the current group chat is greater than the time for the fingerprint information used to encrypt the information
- the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information; otherwise, it is determined that the fingerprint information corresponding to the fifth input does not have the authority to decrypt the encrypted information.
- the judging whether the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information includes:
- the user of the fingerprint information corresponding to the fifth input is a group manager of the current group chat, it is determined that the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information.
- member C is a group administrator, so C's fingerprint information has super authority, and C's fingerprint information can also be used to view the encrypted information issued by the encrypted information producer D.
- the judging whether the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information includes:
- the fingerprint information corresponding to the fifth input is the fingerprint information of a group chat member selected by the first terminal who has the right to decrypt the encrypted information, it is determined that the fingerprint information corresponding to the fifth input has the ability to decrypt the encrypted information Otherwise, it is determined that the fingerprint information corresponding to the fifth input does not have the authority to decrypt the encrypted information.
- the first terminal when the first terminal sends encrypted information, it directly selects which group chat members’ fingerprints can view the encrypted information; specifically, the specific group chat member is designated through the fourth input, and the system gives the specified group chat member the The fingerprint information has the authority to decrypt the encrypted information.
- the second terminal determines whether it has the authority according to whether the current fingerprint information is the fingerprint information of the group chat member selected by the first terminal who has the authority to decrypt the encrypted information. For example, if member B is a group chat member selected by the encrypted information inputter D who can view the encrypted information, the fingerprint of B can decrypt the encrypted information of the encrypted information inputter D; the fingerprint information of other members cannot decrypt the encrypted information. Encrypt information.
- the above-mentioned embodiment of the present disclosure directly encrypts the first input input information through the fingerprint information corresponding to the first input, and then sends the encrypted information.
- the group chat user can perform the fifth input in the display area of the encrypted information. Input the corresponding fingerprint information to realize the decryption function, the operation is simple and the compatibility is strong, no other special reliance is needed; the reading authority management of the public information can be directly carried out according to the fingerprint information, and the user operation is simple and effectively improves the information security.
- an embodiment of the present disclosure further provides a terminal 300.
- the terminal is a first terminal and includes:
- the first receiving module 301 is configured to receive the first input acting on the group chat interface
- the first response module 302 is configured to obtain input information of the first input in response to the first input, and encrypt the input information by using fingerprint information corresponding to the first input;
- the second receiving module 303 is configured to receive a second input
- the second response module 304 is configured to send the input information for encryption processing to obtain encrypted information in response to the second input.
- the terminal further includes:
- the third receiving module is used to receive the third input
- the third response module is used to start the encrypted input mode in response to the third input.
- the third input includes:
- the preset gesture input acting on the group chat interface is used to activate or deactivate the encrypted input;
- the virtual keys are used to activate or deactivate encrypted input.
- the terminal further includes:
- a fourth receiving module configured to receive a fourth input, where the fourth input is used to select at least one group chat member in the group chat member list;
- the fourth response module is configured to, in response to the fourth input, determine that the fingerprint information of the group chat member selected by the fourth input has the authority to decrypt the encrypted information.
- the terminal provided by the embodiment of the present disclosure can implement the various processes implemented by the terminal in the method embodiments of FIG. 1 to FIG. 9. To avoid repetition, details are not described herein again.
- the above-mentioned embodiment of the present disclosure directly encrypts the first input input information through the fingerprint information corresponding to the first input, and then sends the encrypted information.
- the group chat user can perform the fifth input in the display area of the encrypted information. Input the corresponding fingerprint information to realize the decryption function, the operation is simple and the compatibility is strong, no other special reliance is needed; the reading authority management of the public information can be directly carried out according to the fingerprint information, and the user operation is simple and effectively improves the information security.
- the terminal provided in the embodiments of the present disclosure is a terminal capable of executing the above-mentioned information encryption method, and all the embodiments of the above-mentioned information encryption method are applicable to the terminal, and can achieve the same or similar beneficial effects.
- an embodiment of the present disclosure further provides a terminal 400, where the terminal is a second terminal, and includes:
- the information receiving module 401 receives encrypted information sent by the first terminal on the group chat interface
- the fifth receiving module 402 is configured to receive the fifth input acting on the display area of the encrypted information
- the fifth response module 403 is configured to respond to the fifth input, and if the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information, display the information after decrypting the encrypted information.
- the terminal further includes:
- the sixth response module is configured to respond to the fifth input, and if the fingerprint information corresponding to the fifth input does not have the authority to decrypt the encrypted information, display a prompt message, which is used to indicate that the current user is not authorized View the encrypted information.
- the terminal further includes:
- the judgment module is used to judge whether the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information.
- the judgment module includes:
- the first judging sub-module is used for determining that the fingerprint information corresponding to the fifth input has decryption if the user of the fingerprint information corresponding to the fifth input and the user of the fingerprint information used in the encrypted information store each other’s contact information.
- the authority of the encrypted information otherwise, it is determined that the fingerprint information corresponding to the fifth input does not have the authority to decrypt the encrypted information;
- the second judging sub-module is configured to: if the time for the user with the fingerprint information corresponding to the fifth input to join the current group chat is greater than the preset value, and the time for the user with the fingerprint information corresponding to the fifth input to join the current group chat is greater than
- the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information; otherwise, it is determined that the fingerprint information corresponding to the fifth input does not have the decryption authority The authority of the encrypted information;
- the third judgment sub-module is configured to determine that the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information if the user whose fingerprint information corresponds to the fifth input is the group manager of the current group chat;
- the fourth judgment sub-module is configured to determine the fingerprint information corresponding to the fifth input if the fingerprint information corresponding to the fifth input is the fingerprint information of the group chat member selected by the first terminal who has the right to decrypt the encrypted information.
- the fingerprint information has the authority to decrypt the encrypted information; otherwise, it is determined that the fingerprint information corresponding to the fifth input does not have the authority to decrypt the encrypted information.
- the terminal provided by the embodiment of the present disclosure can implement each process implemented by the terminal in the method embodiments of FIG. 10 to FIG. 12, and to avoid repetition, details are not described herein again.
- the above-mentioned embodiment of the present disclosure directly encrypts the first input input information through the fingerprint information corresponding to the first input, and then sends the encrypted information.
- the group chat user can perform the fifth input in the display area of the encrypted information. Input the corresponding fingerprint information to realize the decryption function, the operation is simple and the compatibility is strong, no other special reliance is needed; the reading authority management of the public information can be directly carried out according to the fingerprint information, and the user operation is simple and effectively improves the information security.
- the terminal provided in the embodiments of the present disclosure is a terminal capable of executing the above-mentioned information decryption method, and all embodiments of the above-mentioned information decryption method are applicable to the terminal, and can achieve the same or similar beneficial effects.
- the terminal 500 includes but is not limited to: a radio frequency unit 501, a network module 502, an audio output unit 503, an input unit 504, a sensor 505, a display unit 506, User input unit 507, interface unit 508, memory 509, processor 510, power supply 511 and other components.
- a radio frequency unit 501 includes but is not limited to: a radio frequency unit 501, a network module 502, an audio output unit 503, an input unit 504, a sensor 505, a display unit 506, User input unit 507, interface unit 508, memory 509, processor 510, power supply 511 and other components.
- terminal structure shown in FIG. 15 does not constitute a limitation on the terminal, and the terminal may include more or fewer components than shown in the figure, or combine some components, or arrange different components.
- terminals include, but are not limited to, mobile phones, tablet computers, notebook computers, palmtop computers, vehicle-mounted terminals, wearable devices, and pedometers.
- the radio frequency unit 501 is used to receive the first input acting on the group chat interface
- the processor 510 is configured to obtain input information of the first input in response to the first input, and use fingerprint information corresponding to the first input to encrypt the input information;
- the radio frequency unit 501 is used to receive the second input
- the processor 510 is configured to send the input information for encryption processing to obtain encrypted information in response to the second input.
- the radio frequency unit 501 is configured to receive encrypted information sent by the first terminal on the group chat interface; receive the fifth input acting on the display area of the encrypted information;
- the processor 510 is configured to respond to the fifth input, and if the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information, display the information after decrypting the encrypted information.
- the above-mentioned embodiment of the present disclosure directly encrypts the first input input information through the fingerprint information corresponding to the first input, and then sends the encrypted information.
- the group chat user can perform the fifth input in the display area of the encrypted information. Input the corresponding fingerprint information to realize the decryption function, the operation is simple and the compatibility is strong, no other special reliance is needed; the reading authority management of the public information can be directly carried out according to the fingerprint information, and the user operation is simple and effectively improves the information security.
- the radio frequency unit 501 can be used for receiving and sending signals in the process of sending and receiving information or talking. Specifically, the downlink data from the base station is received and processed by the processor 510; Uplink data is sent to the base station.
- the radio frequency unit 501 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
- the radio frequency unit 501 can also communicate with the network and other devices through a wireless communication system.
- the terminal provides users with wireless broadband Internet access through the network module 502, such as helping users to send and receive emails, browse web pages, and access streaming media.
- the audio output unit 503 may convert the audio data received by the radio frequency unit 501 or the network module 502 or stored in the memory 509 into an audio signal and output it as sound. Moreover, the audio output unit 503 may also provide audio output related to a specific function performed by the terminal 500 (for example, call signal reception sound, message reception sound, etc.).
- the audio output unit 503 includes a speaker, a buzzer, a receiver, and the like.
- the input unit 504 is used to receive audio or video signals.
- the input unit 504 may include a graphics processing unit (GPU) 5041 and a microphone 5042.
- the graphics processor 5041 is configured to monitor images of still pictures or videos obtained by an image capture device (such as a camera) in the video capture mode or the image capture mode. Data is processed.
- the processed image frame may be displayed on the display unit 506.
- the image frame processed by the graphics processor 5041 may be stored in the memory 509 (or other storage medium) or sent via the radio frequency unit 501 or the network module 502.
- the microphone 5042 can receive sound, and can process such sound into audio data.
- the processed audio data can be converted into a format that can be sent to the mobile communication base station via the radio frequency unit 501 for output in the case of a telephone call mode.
- the terminal 500 also includes at least one sensor 505, such as a light sensor, a motion sensor, and other sensors.
- the light sensor includes an ambient light sensor and a proximity sensor.
- the ambient light sensor can adjust the brightness of the display panel 5061 according to the brightness of the ambient light.
- the proximity sensor can close the display panel 5061 and/or when the terminal 500 is moved to the ear. Or backlight.
- the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three-axis), and can detect the magnitude and direction of gravity when stationary, and can be used to identify terminal posture (such as horizontal and vertical screen switching, related games, Magnetometer attitude calibration), vibration recognition related functions (such as pedometer, percussion), etc.; sensor 505 can also include fingerprint sensor, pressure sensor, iris sensor, molecular sensor, gyroscope, barometer, hygrometer, thermometer, infrared Sensors, etc., will not be repeated here.
- the display unit 506 is used to display information input by the user or information provided to the user.
- the display unit 506 may include a display panel 5061, and the display panel 5061 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), etc.
- LCD liquid crystal display
- OLED organic light-emitting diode
- the user input unit 507 may be used to receive inputted numeric or character information, and generate key signal input related to user settings and function control of the terminal.
- the user input unit 507 includes a touch panel 5071 and other input devices 5072.
- the touch panel 5071 also called a touch screen, can collect user touch operations on or near it (for example, the user uses any suitable objects or accessories such as fingers, stylus, etc.) on the touch panel 5071 or near the touch panel 5071. operating).
- the touch panel 5071 may include two parts: a touch detection device and a touch controller.
- the touch detection device detects the user's touch position, detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it To the processor 510, the command sent by the processor 510 is received and executed.
- the touch panel 5071 can be implemented in multiple types such as resistive, capacitive, infrared, and surface acoustic wave.
- the user input unit 507 may also include other input devices 5072.
- other input devices 5072 may include, but are not limited to, a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackball, mouse, and joystick, which will not be repeated here.
- the touch panel 5071 can cover the display panel 5061.
- the touch panel 5071 detects a touch operation on or near it, it transmits it to the processor 510 to determine the type of the touch event, and then the processor 510 responds to the touch The type of event provides corresponding visual output on the display panel 5061.
- the touch panel 5071 and the display panel 5061 are used as two independent components to realize the input and output functions of the terminal, in some embodiments, the touch panel 5071 and the display panel 5061 can be integrated. Realize the input and output functions of the terminal, which are not limited here.
- the interface unit 508 is an interface for connecting an external device with the terminal 500.
- the external device may include a wired or wireless headset port, an external power source (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device with an identification module, audio input/output (I/O) port, video I/O port, headphone port, etc.
- the interface unit 508 may be used to receive input (for example, data information, power, etc.) from an external device and transmit the received input to one or more elements in the terminal 500 or may be used to communicate between the terminal 500 and the external device. Transfer data between.
- the memory 509 can be used to store software programs and various data.
- the memory 509 may mainly include a program storage area and a data storage area.
- the program storage area may store an operating system, an application program required by at least one function (such as a sound playback function, an image playback function, etc.), etc.; Data (such as audio data, phone book, etc.) created by the use of mobile phones.
- the memory 509 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
- the processor 510 is the control center of the terminal. It uses various interfaces and lines to connect the various parts of the entire terminal. It executes by running or executing software programs and/or modules stored in the memory 509, and calling data stored in the memory 509. Various functions of the terminal and processing data, so as to monitor the terminal as a whole.
- the processor 510 may include one or more processing units; optionally, the processor 510 may integrate an application processor and a modem processor, where the application processor mainly processes the operating system, user interface, and application programs, etc.
- the adjustment processor mainly deals with wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 510.
- the terminal 500 may also include a power source 511 (such as a battery) for supplying power to various components.
- a power source 511 such as a battery
- the power source 511 may be logically connected to the processor 510 through a power management system, so as to manage charging, discharging, and power consumption management through the power management system. And other functions.
- the terminal 500 includes some functional modules not shown, which will not be repeated here.
- an embodiment of the present disclosure further provides a terminal, including a processor, a memory, and a computer program stored in the memory and running on the processor.
- the computer program is executed by the processor to implement the above-mentioned information encryption method
- the embodiments of the present disclosure also provide a computer-readable storage medium on which a computer program is stored.
- a computer program When the computer program is executed by a processor, each process of the above-mentioned information encryption method embodiment is realized, and the same technology can be achieved. The effect, in order to avoid repetition, will not be repeated here.
- the computer-readable storage medium such as read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk, etc.
- an embodiment of the present disclosure further provides a terminal, including a processor, a memory, and a computer program stored in the memory and capable of running on the processor.
- the computer program is executed by the processor to implement the foregoing information decryption method
- the embodiments of the present disclosure also provide a computer-readable storage medium on which a computer program is stored.
- a computer program When the computer program is executed by a processor, each process of the above-mentioned information decryption method embodiment is realized, and the same technology can be achieved. The effect, in order to avoid repetition, will not be repeated here.
- the computer-readable storage medium such as read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk, etc.
- the technical solution of the present disclosure essentially or the part that contributes to the existing technology can be embodied in the form of a software product, and the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, The optical disc) includes several instructions to make a terminal (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in the various embodiments of the present disclosure.
- a terminal which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Information Transfer Between Computers (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
一种信息加密方法、信息解密方法及终端。该加密方法包括:接收作用于群聊界面的第一输入(101);响应于所述第一输入,获取所述第一输入的输入信息,并利用所述第一输入对应的指纹信息对所述输入信息进行加密(102);接收第二输入(103);响应于所述第二输入,发送所述输入信息进行加密处理得到加密信息(104)。
Description
相关申请的交叉引用
本申请主张在2019年5月23日在中国提交的中国专利申请No.201910433794.3的优先权,其全部内容通过引用包含于此。
本公开涉及通信技术领域,尤其是指一种信息加密方法、信息解密方法及终端。
随着终端的普及,信息传递也越来越多,信息中大量包含人们的私人信息;随着人们对隐私的要求越来越高,但是当前的相关技术中许多的信息都是直接展示出来的,其缺乏适当的隐私保护,因此对信息进行保护是当前亟待解决的问题。
输入法加密依赖支持该加密功能的输入法才能实现,多方参与时需要所有成员都统一使用该输入法,解密时同样依赖于该输入法才能解密。且输入法加密依赖于输入法的内置加密库,需要参与方都使用该输入法并且该输入法都内置该加密库才能进行加密解密;其依赖性较强,应用不灵活。
发明内容
本公开实施例提供一种信息加密方法、信息解密方法及终端,以解决相关技术的加密输入依赖输入法和加密库,应用不灵活的问题。
为了解决上述技术问题,本公开是这样实现的:一种信息加密方法,应用于第一终端,包括:
接收作用于群聊界面的第一输入;
响应于所述第一输入,获取所述第一输入的输入信息,并利用所述第一输入对应的指纹信息对所述输入信息进行加密;
接收第二输入;
响应于所述第二输入,发送所述输入信息进行加密处理得到加密信息。
本公开实施例还提供了一种信息解密方法,应用于第二终端,包括:
在群聊界面接收第一终端发送的加密信息;
接收作用于所述加密信息的显示区域的第五输入;
响应于所述第五输入,若所述第五输入对应的指纹信息具有解密所述加密信息的权限,显示对所述加密信息进行解密后的信息。
本公开实施例提供了一种终端,所述终端为第一终端,包括:
第一接收模块,用于接收作用于群聊界面的第一输入;
第一响应模块,用于响应于所述第一输入,获取所述第一输入的输入信息,并利用所述第一输入对应的指纹信息对所述输入信息进行加密;
第二接收模块,用于接收第二输入;
第二响应模块,用于响应于所述第二输入,发送所述输入信息进行加密处理得到加密信息。
本公开实施例提供了一种终端,所述终端为第二终端,包括:
信息接收模块,在群聊界面接收第一终端发送的加密信息;
第五接收模块,用于接收作用于所述加密信息的显示区域的第五输入;
第五响应模块,用于响应于所述第五输入,若所述第五输入对应的指纹信息具有解密所述加密信息的权限,显示对所述加密信息进行解密后的信息。
本公开实施例提供了一种终端,包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如上所述的信息加密方法的步骤;或者,所述计算机程序被所述处理器执行时实现如上所述的信息解密方法的步骤。
本公开实施例提供了一种计算机可读存储介质,所述计算机可读存储介质上存储计算机程序,所述计算机程序被处理器执行时实现如上所述的信息加密方法的步骤;或者,所述计算机程序被处理器执行时实现如上所述的信息解密方法的步骤。
在本公开实施例中,通过第一输入对应的指纹信息直接对第一输入的输入信息进行加密之后再发送加密信息,群聊用户可以在加密信息的显示区域进行第五输入,通过第五输入对应的指纹信息实现解密功能,操作简单且兼 容性较强,无需其他特殊依赖。
为了更清楚地说明本公开实施例的技术方案,下面将对本公开实施例的描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本公开的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1表示本公开实施例提供的信息加密方法的步骤流程图;
图2表示本公开实施例提供的信息加密方法的示意图之一;
图3表示本公开实施例提供的信息加密方法的示意图之二;
图4表示本公开实施例提供的信息加密方法的示意图之三;
图5表示本公开实施例提供的信息加密方法的示意图之四;
图6表示本公开实施例提供的信息加密方法的示意图之五;
图7表示本公开实施例提供的信息加密方法的示意图之六;
图8表示本公开实施例提供的信息加密方法的示意图之七;
图9表示本公开实施例提供的信息加密方法的示意图之八;
图10表示本公开实施例提供的信息解密方法的步骤流程图;
图11表示本公开实施例提供的信息解密方法的示意图之一;
图12表示本公开实施例提供的信息解密方法的示意图之二;
图13表示本公开实施例提供的终端的结构示意图之一;
图14表示本公开实施例提供的终端的结构示意图之二;
图15表示本公开实施例提供的终端的结构示意图之三。
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。
在本公开实施例中,“示例性的”或者“例如”等词用于表示作例子、例证 或说明。本公开实施例中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。
本公开实施例提供的终端可以为手机、平板电脑、笔记本电脑、超级移动个人计算机(Ultra-Mobile Personal Computer,UMPC)、上网本、可穿戴式设备(Wearable Device)、车载设备或者个人数字助理(Personal Digital Assistant,PDA)等。需要说明的是,在本公开实施例中并不限定终端的具体类型。本公开实施例中以LTE以及NR系统为例,然不限于此系统,本公开提供的技术方案可以应用于存在相同问题的其他系统。
如图1所示,本公开实施例提供一种信息加密方法,应用于第一终端,包括:
步骤101,接收作用于群聊界面的第一输入。
其中,第一输入为滑动操作或敲击操作。
步骤102,响应于所述第一输入,获取所述第一输入的输入信息,并利用所述第一输入对应的指纹信息对所述输入信息进行加密。
本步骤中,第一输入的输入信息为所述第一终端的待发送信息,换言之,利用所述第一输入对应的指纹信息对待发送信息进行加密;具体的,可以是输入的同时系统进行加密。
步骤103,接收第二输入;该第二输入为触发发送操作的输入,例如点击发送按键等。
步骤104,响应于所述第二输入,发送所述输入信息进行加密处理得到加密信息。
本公开实施例提供的方案中,在群聊时,通过指纹信息进行加密、解密等权限管理,操作简单且兼容性较强,无需其他特殊依赖。
如图2所示,用户在键盘区通过手指敲击或者滑动键盘输入信息,第一终端同时检测指纹信息,记录保留当前的第一输入的指纹信息;并利用第一输入对应的指纹信息对第一输入的输入信息进行加密处理得到加密信息。需要说明的是,在第一终端侧的群聊界面上,其自身发送的加密信息可以通过明文显示(即直接显示第一输入的输入信息),也可以通过密文显示(即显示 第一输入的输入信息的加密信息);而在群聊的其他成员的群聊界面上,第一终端发送的信息通过密文显示(即显示第一输入的输入信息的加密信息)。
可选地,本公开的上述实施例中,步骤101之前,所述方法还包括:
接收第三输入;
响应于所述第三输入,启动加密输入模式。
换言之,用户可以通过系统的加密输入开关来启动或关闭加密输入模式。
作为一个可选实施例,所述第三输入包括:
作用于群聊界面的预设手势输入;所述预设手势用于启动或关闭加密输入。
例如,如图3所示,在群聊界面,当用户的手指从键盘区的边缘往内滑动预设距离后,启动加密输入或关闭加密输入;可选地,如图4所示,第一终端可提示用户当前状态是启动加密输入还是关闭加密输入。在通过预设手势输入打开加密输入后,此时输入法键盘区的背景色更换为灰色或者其他深色,在关闭加密输入后键盘区背景颜色恢复为原来的颜色,图5为加密输入状态下的键盘区背景被更换的示意图。
作为另一个可选实施例,所述第三输入包括:
作用于群聊界面的虚拟按键的点击输入;所述虚拟按键用于启动或关闭加密输入。
例如,如图6所示,在键盘区设置启动或关闭加密输入的虚拟按键,通过点击该虚拟的方式打开或关闭加密输入功能。同样的,第一终端可提示用户当前状态是启动加密输入还是关闭加密输入。在通过虚拟按键打开加密输入后,此时输入法键盘区的背景色更换为灰色或者其他深色,在关闭加密输入后键盘区背景颜色恢复为原来的颜色。
可选地,本公开的上述实施例中,所述加密信息显示为经过处理的字符串;或者,所述加密信息显示为多个目标符号;或者,所述加密信息显示为经过马赛克模糊处理的信息。
例如,如图7所示,成员A(即第一终端)发送加密信息,加密信息显示为经过处理的字符串。具体的处理方式可以是将该信息显示为XXXX,或者通过马赛克模糊处理等方式。
进一步地,本公开的上述实施例中,步骤103之前所述方法还包括:
接收第四输入,所述第四输入用于选择群聊成员列表中至少一个群聊成员;
响应于所述第四输入,确定所述第四输入选择的群聊成员的指纹信息具有解密所述加密信息的权限。
第一终端在发送加密信息的时候,直接选择哪些群聊成员的指纹可以查看该条加密信息;具体为通过第四输入指定具体的群聊成员,系统赋予指定的群聊成员的指纹信息具有解密该条加密信息的权限。例如,如图8所示,在点击图8中所示的“+”按钮后,弹出图9所示的群聊成员列表,用户可在图9显示的群聊成员中勾选可以查看该条加密信息的群聊成员。
或者,根据系统预定义的规则来确定可以查看该条加密信息的群聊成员。
综上,本公开上述实施例通过第一输入对应的指纹信息直接对第一输入的输入信息进行加密之后再发送加密信息,群聊用户可以在加密信息的显示区域进行第五输入,通过第五输入对应的指纹信息实现解密功能,操作简单且兼容性较强,无需其他特殊依赖。
如图10所示,本公开实施例还提供一种信息解密方法,应用于第二终端,包括:
步骤201,在群聊界面接收第一终端发送的加密信息;
步骤202,接收作用于所述加密信息的显示区域的第五输入;
步骤203,响应于所述第五输入,若所述第五输入对应的指纹信息具有解密所述加密信息的权限,显示对所述加密信息进行解密后的信息。
本公开实施例中,第五输入具体可以为用户手指的滑动操作输入、刮擦操作输入或则其他指纹能够被读取的作用于加密信息的显示区域的输入,在此不做具体限定。
如图11所示,群聊成员可以通过手指滑动刮擦,加密信息所在的显示区域,系统检测当前手指的指纹信息是否有权限可以解密显示当前加密信息;当检测到有权限的指纹信息进行滑动刮擦该区域时,显示该加密信息。
可选地,所述方法还包括:
响应于所述第五输入,若所述第五输入对应的指纹信息不具有解密所述 加密信息的权限,显示提示信息,所述提示信息用于指示当前用户无权查看该加密信息。
如图12所示,当检测到当前指纹信息无权限解密时,提示用户当前无权查看该信息。
作为一个可选实施例,所述方法还包括:
判断所述第五输入对应的指纹信息是否具有解密所述加密信息的权限。
本公开实施例提供多种判断当前指纹信息是否有权限的方式,分别为:
方式一:所述判断所述第五输入对应的指纹信息是否具有解密所述加密信息的权限,包括:
若所述第五输入对应的指纹信息的用户和加密信息所使用的指纹信息的用户互相存储有对方的联系方式,确定所述第五输入对应的指纹信息具有解密所述加密信息的权限;否则,确定所述第五输入对应的指纹信息不具有解密所述加密信息的权限。其中,联系方式包括:电话号码、社交账号、即时通讯工具账号等,在此不做具体限定。
换言之,根据第五输入对应的指纹信息和加密信息所使用的指纹信息是否为互相存储有对方的联系方式,来确定是否有权限。例如,可以根据成员A、B、C和当前的加密信息产生者D的关系来确定。比如A和D的关系是双方互为好友、或者互为亲人、或者互为朋友,那么允许A可以通过指纹验证查看该消息。B、C没有该关系,因此B、C的指纹信息将不能查看D所发的加密信息。
方式二:所述判断所述第五输入对应的指纹信息是否具有解密所述加密信息的权限,包括:
若所述第五输入对应的指纹信息的用户加入当前群聊的时间大于预设值,且所述第五输入对应的指纹信息的用户加入当前群聊的时间大于加密信息所使用的指纹信息的用户加入当前群聊的时间,确定所述第五输入对应的指纹信息具有解密所述加密信息的权限;否则,确定所述第五输入对应的指纹信息不具有解密所述加密信息的权限。
换言之,可以根据入群时间,来确定是否有权限。例如,成员B是入群时间较长,达到了阈值K,且比加密信息输入者D更长,因此B的指纹可以 解密该加密信息输入者D的加密信息。
方式三:所述判断所述第五输入对应的指纹信息是否具有解密所述加密信息的权限,包括:
若所述第五输入对应的指纹信息的用户为当前群聊的群管理者,确定所述第五输入对应的指纹信息具有解密所述加密信息的权限。
例如,成员C是群管理员,因此C的指纹信息具有超级权限,用C的指纹信息同样可以查看加密信息产生者D发布的加密信息。
方式四:所述判断所述第五输入对应的指纹信息是否具有解密所述加密信息的权限,包括:
若所述第五输入对应的指纹信息为所述第一终端选择的具有解密所述加密信息的权限的群聊成员的指纹信息,确定所述第五输入对应的指纹信息具有解密所述加密信息的权限;否则,确定所述第五输入对应的指纹信息不具有解密所述加密信息的权限。
简言之,第一终端在发送加密信息的时候,直接选择哪些群聊成员的指纹可以查看该条加密信息;具体为通过第四输入指定具体的群聊成员,系统赋予指定的群聊成员的指纹信息具有解密该条加密信息的权限。相应的,第二终端根据当前的指纹信息是否为第一终端选择的具有解密所述加密信息的权限的群聊成员的指纹信息,来确定是否有权限。例如,成员B是加密信息输入者D选择的可以查看该条加密信息的群聊成员,则B的指纹可以解密该加密信息输入者D的加密信息;其他的成员的指纹信息均不可以解密该加密信息。
综上,本公开上述实施例通过第一输入对应的指纹信息直接对第一输入的输入信息进行加密之后再发送加密信息,群聊用户可以在加密信息的显示区域进行第五输入,通过第五输入对应的指纹信息实现解密功能,操作简单且兼容性较强,无需其他特殊依赖;可以根据指纹信息直接对公共信息进行阅读权限管理,用户操作简便,有效的提高信息安全。
如图13所示,本公开实施例还提供一种终端300,所述终端为第一终端,包括:
第一接收模块301,用于接收作用于群聊界面的第一输入;
第一响应模块302,用于响应于所述第一输入,获取所述第一输入的输入信息,并利用所述第一输入对应的指纹信息对所述输入信息进行加密;
第二接收模块303,用于接收第二输入;
第二响应模块304,用于响应于所述第二输入,发送所述输入信息进行加密处理得到加密信息。
可选地,本公开的上述实施例中,所述终端还包括:
第三接收模块,用于接收第三输入;
第三响应模块,用于响应于所述第三输入,启动加密输入模式。
可选地,本公开的上述实施例中,所述第三输入包括:
作用于群聊界面的预设手势输入;所述预设手势用于启动或关闭加密输入;
或者,
作用于群聊界面的虚拟按键的点击输入;所述虚拟按键用于启动或关闭加密输入。
可选地,本公开的上述实施例中,所述终端还包括:
第四接收模块,用于接收第四输入,所述第四输入用于选择群聊成员列表中至少一个群聊成员;
第四响应模块,用于响应于所述第四输入,确定所述第四输入选择的群聊成员的指纹信息具有解密所述加密信息的权限。
本公开实施例提供的终端能够实现图1至图9的方法实施例中终端实现的各个过程,为避免重复,这里不再赘述。
综上,本公开上述实施例通过第一输入对应的指纹信息直接对第一输入的输入信息进行加密之后再发送加密信息,群聊用户可以在加密信息的显示区域进行第五输入,通过第五输入对应的指纹信息实现解密功能,操作简单且兼容性较强,无需其他特殊依赖;可以根据指纹信息直接对公共信息进行阅读权限管理,用户操作简便,有效的提高信息安全。
需要说明的是,本公开实施例提供的终端是能够执行上述信息加密方法的终端,则上述信息加密方法的所有实施例均适用于该终端,且均能达到相同或相似的有益效果。
如图14所示,本公开实施例还提供一种终端400,所述终端为第二终端,包括:
信息接收模块401,在群聊界面接收第一终端发送的加密信息;
第五接收模块402,用于接收作用于所述加密信息的显示区域的第五输入;
第五响应模块403,用于响应于所述第五输入,若所述第五输入对应的指纹信息具有解密所述加密信息的权限,显示对所述加密信息进行解密后的信息。
可选地,本公开的上述实施例中,所述终端还包括:
第六响应模块,用于响应于所述第五输入,若所述第五输入对应的指纹信息不具有解密所述加密信息的权限,显示提示信息,所述提示信息用于指示当前用户无权查看该加密信息。
可选地,本公开的上述实施例中,所述终端还包括:
判断模块,用于判断所述第五输入对应的指纹信息是否具有解密所述加密信息的权限。
可选地,本公开的上述实施例中,所述判断模块包括:
第一判断子模块,用于若所述第五输入对应的指纹信息的用户和加密信息所使用的指纹信息的用户互相存储有对方的联系方式,确定所述第五输入对应的指纹信息具有解密所述加密信息的权限;否则,确定所述第五输入对应的指纹信息不具有解密所述加密信息的权限;
和/或,
第二判断子模块,用于若所述第五输入对应的指纹信息的用户加入当前群聊的时间大于预设值,且所述第五输入对应的指纹信息的用户加入当前群聊的时间大于加密信息所使用的指纹信息的用户加入当前群聊的时间,确定所述第五输入对应的指纹信息具有解密所述加密信息的权限;否则,确定所述第五输入对应的指纹信息不具有解密所述加密信息的权限;
和/或,
第三判断子模块,用于若所述第五输入对应的指纹信息的用户为当前群聊的群管理者,确定所述第五输入对应的指纹信息具有解密所述加密信息的 权限;
和/或,
第四判断子模块,用于若所述第五输入对应的指纹信息为所述第一终端选择的具有解密所述加密信息的权限的群聊成员的指纹信息,确定所述第五输入对应的指纹信息具有解密所述加密信息的权限;否则,确定所述第五输入对应的指纹信息不具有解密所述加密信息的权限。
本公开实施例提供的终端能够实现图10至图12的方法实施例中终端实现的各个过程,为避免重复,这里不再赘述。
综上,本公开上述实施例通过第一输入对应的指纹信息直接对第一输入的输入信息进行加密之后再发送加密信息,群聊用户可以在加密信息的显示区域进行第五输入,通过第五输入对应的指纹信息实现解密功能,操作简单且兼容性较强,无需其他特殊依赖;可以根据指纹信息直接对公共信息进行阅读权限管理,用户操作简便,有效的提高信息安全。
需要说明的是,本公开实施例提供的终端是能够执行上述信息解密方法的终端,则上述信息解密方法的所有实施例均适用于该终端,且均能达到相同或相似的有益效果。
图15为实现本公开各个实施例的一种终端的硬件结构示意图,该终端500包括但不限于:射频单元501、网络模块502、音频输出单元503、输入单元504、传感器505、显示单元506、用户输入单元507、接口单元508、存储器509、处理器510、以及电源511等部件。本领域技术人员可以理解,图15中示出的终端结构并不构成对终端的限定,终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。在本公开实施例中,终端包括但不限于手机、平板电脑、笔记本电脑、掌上电脑、车载终端、可穿戴设备、以及计步器等。
其中,射频单元501,用于接收作用于群聊界面的第一输入;
处理器510,用于响应于所述第一输入,获取所述第一输入的输入信息,并利用所述第一输入对应的指纹信息对所述输入信息进行加密;
射频单元501,用于接收第二输入;
处理器510,用于响应于所述第二输入,发送所述输入信息进行加密处 理得到加密信息。
或者,射频单元501,用于在群聊界面接收第一终端发送的加密信息;接收作用于所述加密信息的显示区域的第五输入;
处理器510,用于响应于所述第五输入,若所述第五输入对应的指纹信息具有解密所述加密信息的权限,显示对所述加密信息进行解密后的信息。
综上,本公开上述实施例通过第一输入对应的指纹信息直接对第一输入的输入信息进行加密之后再发送加密信息,群聊用户可以在加密信息的显示区域进行第五输入,通过第五输入对应的指纹信息实现解密功能,操作简单且兼容性较强,无需其他特殊依赖;可以根据指纹信息直接对公共信息进行阅读权限管理,用户操作简便,有效的提高信息安全。
应理解的是,本公开实施例中,射频单元501可用于收发信息或通话过程中,信号的接收和发送,具体的,将来自基站的下行数据接收后,给处理器510处理;另外,将上行的数据发送给基站。通常,射频单元501包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。此外,射频单元501还可以通过无线通信系统与网络和其他设备通信。
终端通过网络模块502为用户提供了无线的宽带互联网访问,如帮助用户收发电子邮件、浏览网页和访问流式媒体等。
音频输出单元503可以将射频单元501或网络模块502接收的或者在存储器509中存储的音频数据转换成音频信号并且输出为声音。而且,音频输出单元503还可以提供与终端500执行的特定功能相关的音频输出(例如,呼叫信号接收声音、消息接收声音等等)。音频输出单元503包括扬声器、蜂鸣器以及受话器等。
输入单元504用于接收音频或视频信号。输入单元504可以包括图形处理器(Graphics Processing Unit,GPU)5041和麦克风5042,图形处理器5041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。处理后的图像帧可以显示在显示单元506上。经图形处理器5041处理后的图像帧可以存储在存储器509(或其它存储介质)中或者经由射频单元501或网络模块502进行发送。麦克风5042可以接收声音,并且能够将这样的声音处理为音频数据。处理后的音频数据可以 在电话通话模式的情况下转换为可经由射频单元501发送到移动通信基站的格式输出。
终端500还包括至少一种传感器505,比如光传感器、运动传感器以及其他传感器。具体地,光传感器包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板5061的亮度,接近传感器可在终端500移动到耳边时,关闭显示面板5061和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别终端姿态(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;传感器505还可以包括指纹传感器、压力传感器、虹膜传感器、分子传感器、陀螺仪、气压计、湿度计、温度计、红外线传感器等,在此不再赘述。
显示单元506用于显示由用户输入的信息或提供给用户的信息。显示单元506可包括显示面板5061,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板5061。
用户输入单元507可用于接收输入的数字或字符信息,以及产生与终端的用户设置以及功能控制有关的键信号输入。具体地,用户输入单元507包括触控面板5071以及其他输入设备5072。触控面板5071,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板5071上或在触控面板5071附近的操作)。触控面板5071可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器510,接收处理器510发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板5071。除了触控面板5071,用户输入单元507还可以包括其他输入设备5072。具体地,其他输入设备5072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
进一步地,触控面板5071可覆盖在显示面板5061上,当触控面板5071 检测到在其上或附近的触摸操作后,传送给处理器510以确定触摸事件的类型,随后处理器510根据触摸事件的类型在显示面板5061上提供相应的视觉输出。虽然在图15中,触控面板5071与显示面板5061是作为两个独立的部件来实现终端的输入和输出功能,但是在某些实施例中,可以将触控面板5071与显示面板5061集成而实现终端的输入和输出功能,具体此处不做限定。
接口单元508为外部装置与终端500连接的接口。例如,外部装置可以包括有线或无线头戴式耳机端口、外部电源(或电池充电器)端口、有线或无线数据端口、存储卡端口、用于连接具有识别模块的装置的端口、音频输入/输出(I/O)端口、视频I/O端口、耳机端口等等。接口单元508可以用于接收来自外部装置的输入(例如,数据信息、电力等等)并且将接收到的输入传输到终端500内的一个或多个元件或者可以用于在终端500和外部装置之间传输数据。
存储器509可用于存储软件程序以及各种数据。存储器509可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器509可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
处理器510是终端的控制中心,利用各种接口和线路连接整个终端的各个部分,通过运行或执行存储在存储器509内的软件程序和/或模块,以及调用存储在存储器509内的数据,执行终端的各种功能和处理数据,从而对终端进行整体监控。处理器510可包括一个或多个处理单元;可选地,处理器510可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器510中。
终端500还可以包括给各个部件供电的电源511(比如电池),可选地,电源511可以通过电源管理系统与处理器510逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
另外,终端500包括一些未示出的功能模块,在此不再赘述。
可选地,本公开实施例还提供一种终端,包括处理器,存储器,存储在存储器上并可在所述处理器上运行的计算机程序,该计算机程序被处理器执行时实现上述信息加密方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本公开实施例还提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现上述信息加密方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。其中,所述的计算机可读存储介质,如只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等。
可选地,本公开实施例还提供一种终端,包括处理器,存储器,存储在存储器上并可在所述处理器上运行的计算机程序,该计算机程序被处理器执行时实现上述信息解密方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本公开实施例还提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现上述信息解密方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。其中,所述的计算机可读存储介质,如只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本公开的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光 盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本公开各个实施例所述的方法。
上面结合附图对本公开的实施例进行了描述,但是本公开并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本公开的启示下,在不脱离本公开宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本公开的保护之内。
以上所述,仅为本公开的具体实施方式,但本公开的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本公开揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本公开的保护范围之内。因此,本公开的保护范围应以权利要求的保护范围为准。
Claims (18)
- 一种信息加密方法,应用于第一终端,所述信息加密方法包括:接收作用于群聊界面的第一输入;响应于所述第一输入,获取所述第一输入的输入信息,并利用所述第一输入对应的指纹信息对所述输入信息进行加密;接收第二输入;响应于所述第二输入,发送所述输入信息进行加密处理得到加密信息。
- 根据权利要求1所述的方法,其中,接收作用于群聊界面的第一输入之前,所述方法还包括:接收第三输入;响应于所述第三输入,启动加密输入模式。
- 根据权利要求2所述的方法,其中,所述第三输入包括:作用于群聊界面的预设手势输入;所述预设手势用于启动或关闭加密输入;或者,作用于群聊界面的虚拟按键的点击输入;所述虚拟按键用于启动或关闭加密输入。
- 根据权利要求1所述的方法,其中,所述接收第二输入之前,所述方法还包括:接收第四输入,所述第四输入用于选择群聊成员列表中至少一个群聊成员;响应于所述第四输入,确定所述第四输入选择的群聊成员的指纹信息具有解密所述加密信息的权限。
- 一种信息解密方法,应用于第二终端,所述信息解密方法包括:在群聊界面接收第一终端发送的加密信息;接收作用于所述加密信息的显示区域的第五输入;响应于所述第五输入,若所述第五输入对应的指纹信息具有解密所述加密信息的权限,显示对所述加密信息进行解密后的信息。
- 根据权利要求5所述的方法,还包括:响应于所述第五输入,若所述第五输入对应的指纹信息不具有解密所述加密信息的权限,显示提示信息,所述提示信息用于指示当前用户无权查看该加密信息。
- 根据权利要求5或6所述的方法,还包括:判断所述第五输入对应的指纹信息是否具有解密所述加密信息的权限。
- 根据权利要求7所述的方法,其中,所述判断所述第五输入对应的指纹是否具有解密所述加密信息的权限,包括:若所述第五输入对应的指纹信息的用户和加密信息所使用的指纹信息的用户互相存储有对方的联系方式,确定所述第五输入对应的指纹信息具有解密所述加密信息的权限;否则,确定所述第五输入对应的指纹信息不具有解密所述加密信息的权限;或者,若所述第五输入对应的指纹信息的用户加入当前群聊的时间大于预设值,且所述第五输入对应的指纹信息的用户加入当前群聊的时间大于加密信息所使用的指纹信息的用户加入当前群聊的时间,确定所述第五输入对应的指纹信息具有解密所述加密信息的权限;否则,确定所述第五输入对应的指纹信息不具有解密所述加密信息的权限;或者,若所述第五输入对应的指纹信息的用户为当前群聊的群管理者,确定所述第五输入对应的指纹信息具有解密所述加密信息的权限;或者,若所述第五输入对应的指纹信息为所述第一终端选择的具有解密所述加密信息的权限的群聊成员的指纹信息,确定所述第五输入对应的指纹信息具有解密所述加密信息的权限;否则,确定所述第五输入对应的指纹信息不具有解密所述加密信息的权限。
- 一种终端,所述终端为第一终端,并且所述终端包括:第一接收模块,用于接收作用于群聊界面的第一输入;第一响应模块,用于响应于所述第一输入,获取所述第一输入的输入信 息,并利用所述第一输入对应的指纹信息对所述输入信息进行加密;第二接收模块,用于接收第二输入;第二响应模块,用于响应于所述第二输入,发送所述输入信息进行加密处理得到加密信息。
- 根据权利要求9所述的终端,还包括:第三接收模块,用于接收第三输入;第三响应模块,用于响应于所述第三输入,启动加密输入模式。
- 根据权利要求10所述的终端,其中,所述第三输入包括:作用于群聊界面的预设手势输入;所述预设手势用于启动或关闭加密输入;或者,作用于群聊界面的虚拟按键的点击输入;所述虚拟按键用于启动或关闭加密输入。
- 根据权利要求9所述的终端,还包括:第四接收模块,用于接收第四输入,所述第四输入用于选择群聊成员列表中至少一个群聊成员;第四响应模块,用于响应于所述第四输入,确定所述第四输入选择的群聊成员的指纹信息具有解密所述加密信息的权限。
- 一种终端,所述终端为第二终端,并且所述终端包括:信息接收模块,在群聊界面接收第一终端发送的加密信息;第五接收模块,用于接收作用于所述加密信息的显示区域的第五输入;第五响应模块,用于响应于所述第五输入,若所述第五输入对应的指纹信息具有解密所述加密信息的权限,显示对所述加密信息进行解密后的信息。
- 根据权利要求13所述的终端,还包括:第六响应模块,用于响应于所述第五输入,若所述第五输入对应的指纹信息不具有解密所述加密信息的权限,显示提示信息,所述提示信息用于指示当前用户无权查看该加密信息。
- 根据权利要求13或14所述的终端,还包括:判断模块,用于判断所述第五输入对应的指纹信息是否具有解密所述加 密信息的权限。
- 根据权利要求15所述的终端,其中,所述判断模块包括:第一判断子模块,用于若所述第五输入对应的指纹信息的用户和加密信息所使用的指纹信息的用户互相存储有对方的联系方式,确定所述第五输入对应的指纹信息具有解密所述加密信息的权限;否则,确定所述第五输入对应的指纹信息不具有解密所述加密信息的权限;和/或,第二判断子模块,用于若所述第五输入对应的指纹信息的用户加入当前群聊的时间大于预设值,且所述第五输入对应的指纹信息的用户加入当前群聊的时间大于加密信息所使用的指纹信息的用户加入当前群聊的时间,确定所述第五输入对应的指纹信息具有解密所述加密信息的权限;否则,确定所述第五输入对应的指纹信息不具有解密所述加密信息的权限;和/或,第三判断子模块,用于若所述第五输入对应的指纹信息的用户为当前群聊的群管理者,确定所述第五输入对应的指纹信息具有解密所述加密信息的权限;和/或,第四判断子模块,用于若所述第五输入对应的指纹信息为所述第一终端选择的具有解密所述加密信息的权限的群聊成员的指纹信息,确定所述第五输入对应的指纹信息具有解密所述加密信息的权限;否则,确定所述第五输入对应的指纹信息不具有解密所述加密信息的权限。
- 一种终端,包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如权利要求1至4中任一项所述的信息加密方法的步骤;或者,所述计算机程序被所述处理器执行时实现如权利要求5至8中任一项所述的信息解密方法的步骤。
- 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1至4中任一项所述的信息加密方法的步骤;或者,所述计算机程序被处理器执行时实现如权利 要求5至8中任一项所述的信息解密方法的步骤。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910433794.3A CN110188524B (zh) | 2019-05-23 | 2019-05-23 | 信息加密方法、信息解密方法及终端 |
CN201910433794.3 | 2019-05-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020233218A1 true WO2020233218A1 (zh) | 2020-11-26 |
Family
ID=67717413
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/080688 WO2020233218A1 (zh) | 2019-05-23 | 2020-03-23 | 信息加密方法、信息解密方法及终端 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110188524B (zh) |
WO (1) | WO2020233218A1 (zh) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110188524B (zh) * | 2019-05-23 | 2021-07-27 | 维沃移动通信有限公司 | 信息加密方法、信息解密方法及终端 |
CN111431795B (zh) * | 2020-03-19 | 2022-05-03 | 维沃移动通信有限公司 | 一种共享内容显示方法及电子设备 |
CN111581622A (zh) * | 2020-05-09 | 2020-08-25 | 维沃移动通信有限公司 | 信息处理方法、装置及电子设备 |
CN112163239A (zh) * | 2020-09-29 | 2021-01-01 | 维沃移动通信有限公司 | 隐私信息保护方法、装置及电子设备 |
CN113343321B (zh) * | 2021-06-29 | 2022-09-13 | 维沃移动通信有限公司 | 信息显示方法、信息显示装置、电子设备和可读存储介质 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1941748A (zh) * | 2005-09-30 | 2007-04-04 | 腾讯科技(深圳)有限公司 | 一种群组消息发送方法及发送客户端和系统 |
CN102833243A (zh) * | 2012-08-21 | 2012-12-19 | 鹤山世达光电科技有限公司 | 一种利用指纹信息的通信系统及其用途 |
CN107453975A (zh) * | 2016-05-31 | 2017-12-08 | 北京北信源软件股份有限公司 | 一种即时通信群内密聊方法 |
CN107666395A (zh) * | 2016-07-28 | 2018-02-06 | 中兴通讯股份有限公司 | 一种群文件管理方法、用户终端、群聊系统 |
US20180139213A1 (en) * | 2016-11-11 | 2018-05-17 | Samsung Electronics Co., Ltd. | Method and terminal device for encrypting message |
CN109088810A (zh) * | 2017-06-14 | 2018-12-25 | 北京信威通信技术股份有限公司 | 群组消息的通信方法、装置、相应设备、系统及存储介质 |
CN110188524A (zh) * | 2019-05-23 | 2019-08-30 | 维沃移动通信有限公司 | 信息加密方法、信息解密方法及终端 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102970659A (zh) * | 2012-11-12 | 2013-03-13 | 广东欧珀移动通信有限公司 | 一种短信加密传输的方法 |
US10200345B2 (en) * | 2013-10-29 | 2019-02-05 | Uniloc 2017 Llc | Electronic mail sender verification |
GB2540138A (en) * | 2015-07-02 | 2017-01-11 | Ketheeswaran Gopalan | Method of exchanging digital content |
CN107066891B (zh) * | 2017-05-10 | 2023-04-07 | 维沃移动通信有限公司 | 一种拍摄方法及移动终端 |
CN107920017A (zh) * | 2017-11-27 | 2018-04-17 | 唐佐 | 一种聊天记录与内容保密方法 |
-
2019
- 2019-05-23 CN CN201910433794.3A patent/CN110188524B/zh active Active
-
2020
- 2020-03-23 WO PCT/CN2020/080688 patent/WO2020233218A1/zh active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1941748A (zh) * | 2005-09-30 | 2007-04-04 | 腾讯科技(深圳)有限公司 | 一种群组消息发送方法及发送客户端和系统 |
CN102833243A (zh) * | 2012-08-21 | 2012-12-19 | 鹤山世达光电科技有限公司 | 一种利用指纹信息的通信系统及其用途 |
CN107453975A (zh) * | 2016-05-31 | 2017-12-08 | 北京北信源软件股份有限公司 | 一种即时通信群内密聊方法 |
CN107666395A (zh) * | 2016-07-28 | 2018-02-06 | 中兴通讯股份有限公司 | 一种群文件管理方法、用户终端、群聊系统 |
US20180139213A1 (en) * | 2016-11-11 | 2018-05-17 | Samsung Electronics Co., Ltd. | Method and terminal device for encrypting message |
CN109088810A (zh) * | 2017-06-14 | 2018-12-25 | 北京信威通信技术股份有限公司 | 群组消息的通信方法、装置、相应设备、系统及存储介质 |
CN110188524A (zh) * | 2019-05-23 | 2019-08-30 | 维沃移动通信有限公司 | 信息加密方法、信息解密方法及终端 |
Also Published As
Publication number | Publication date |
---|---|
CN110188524A (zh) | 2019-08-30 |
CN110188524B (zh) | 2021-07-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10643000B2 (en) | Access control method and terminal device | |
WO2021098678A1 (zh) | 投屏控制方法及电子设备 | |
WO2020233218A1 (zh) | 信息加密方法、信息解密方法及终端 | |
US11934505B2 (en) | Information content viewing method and terminal | |
WO2021036566A1 (zh) | 信息处理方法、装置、电子设备及介质 | |
WO2020020126A1 (zh) | 信息处理方法及终端 | |
WO2021077927A1 (zh) | 显示控制方法及电子设备 | |
WO2021110053A1 (zh) | 文件发送方法及终端设备 | |
WO2020258968A1 (zh) | 信息传输方法、服务器、终端设备及介质 | |
WO2020063107A1 (zh) | 截屏方法和终端 | |
WO2019206039A1 (zh) | 未读消息处理方法及终端 | |
CN110149628B (zh) | 一种信息处理方法及终端设备 | |
WO2020199987A1 (zh) | 信息显示方法及移动终端 | |
CN107861669A (zh) | 一种用户系统的切换方法和移动终端 | |
WO2020238448A1 (zh) | 权限管理方法及终端 | |
WO2020156440A1 (zh) | 应用控制方法及终端设备 | |
WO2019095156A1 (zh) | 一种信息搜索的方法、终端、网络设备和系统 | |
TW201826158A (zh) | 顯示資料的方法、裝置和終端 | |
CN109446794B (zh) | 一种密码输入方法及其移动终端 | |
WO2021057243A1 (zh) | 便签信息显示方法、便签信息发送方法及电子设备 | |
WO2020258961A1 (zh) | 权限处理方法及终端设备 | |
CN110781488B (zh) | 密码提示方法和终端设备 | |
CN109800583B (zh) | 包括显示器的电子设备以及加密信息的方法 | |
CN111310250A (zh) | 应用分享方法及电子设备 | |
WO2021180005A1 (zh) | 信息处理方法及电子设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20808911 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20808911 Country of ref document: EP Kind code of ref document: A1 |