WO2022161406A1 - 加密方法、装置、电子设备及介质 - Google Patents
加密方法、装置、电子设备及介质 Download PDFInfo
- Publication number
- WO2022161406A1 WO2022161406A1 PCT/CN2022/074041 CN2022074041W WO2022161406A1 WO 2022161406 A1 WO2022161406 A1 WO 2022161406A1 CN 2022074041 W CN2022074041 W CN 2022074041W WO 2022161406 A1 WO2022161406 A1 WO 2022161406A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- encryption
- input
- encrypted
- electronic device
- user
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 221
- 230000004044 response Effects 0.000 claims abstract description 58
- 238000012545 processing Methods 0.000 claims abstract description 11
- 238000012795 verification Methods 0.000 claims description 15
- 238000004891 communication Methods 0.000 claims description 8
- 238000004590 computer program Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 13
- 230000006870 function Effects 0.000 description 8
- 230000000694 effects Effects 0.000 description 3
- 241000699670 Mus sp. Species 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/0482—Interaction with lists of selectable items, e.g. menus
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04883—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04886—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Definitions
- the present application belongs to the technical field of information encryption, and specifically relates to an encryption method, device, electronic device and medium.
- the user can trigger the electronic device to browse the application program.
- encryption For example, the user can select the identifier of an application in the "App Lock” function of the "Settings” application of the electronic device, thereby triggering the electronic device to encrypt the application, so that other users cannot view the application in the application.
- Content For example, the user can select the identifier of an application in the "App Lock” function of the "Settings” application of the electronic device, thereby triggering the electronic device to encrypt the application, so that other users cannot view the application in the application. Content.
- the existing encryption method since the existing encryption method has a relatively deep setting level, when the user wants to encrypt an application, it is necessary to pass a level-by-level input to trigger the electronic device to encrypt the application. .
- the existing encryption method since the existing encryption method only encrypts the application, it may not be possible to encrypt a specific content in the application. In this way, the steps of encryption in the electronic device are cumbersome, and the encryption method is relatively rigid and not flexible enough.
- the purpose of the embodiments of the present application is to provide an encryption method, device, electronic device and medium, which can solve the problems that the encryption steps in the electronic device are cumbersome, and the encryption method is relatively rigid and inflexible.
- an embodiment of the present application provides an encryption method, the method includes: receiving a first input from a user; in response to the first input, displaying N encrypted controls, where each encrypted control in the N encrypted controls corresponds to one Encryption method; receive the second input from the user to the target object currently displayed by the electronic device and the first encryption control in the N encryption controls; in response to the second input, in the case that the first encryption method matches the target object, use the first encryption method An encryption method is used to process the target object, and the first encryption method is an encryption method corresponding to the first encryption control.
- an embodiment of the present application provides an encryption device, where the encryption device includes a receiving module, a display module, and a processing module.
- the receiving module is used to receive the first input of the user; the display module is used to display N encrypted controls in response to the first input, and each encrypted control in the N encrypted controls corresponds to an encryption method; the receiving module is also used for Receive the second input of the user to the target object currently displayed by the electronic device and the first encryption control in the N encryption controls; the processing module is used to respond to the second input, in the case that the first encryption method matches the target object, The target object is processed in a first encryption mode, and the first encryption mode is an encryption mode corresponding to the first encryption control.
- an embodiment of the present application provides an electronic device, the electronic device includes a processor, a memory, and a program or instruction stored in the memory and executable on the processor.
- the program or instruction is executed by the processor, The steps of implementing the encryption method as in the above-mentioned first aspect.
- an embodiment of the present application provides a readable storage medium, on which a program or an instruction is stored, and when the program or instruction is executed by a processor, the steps of the encryption method in the above-mentioned first aspect are implemented .
- an embodiment of the present application provides a chip, the chip includes a processor and a communication interface, the communication interface and the processor are coupled, and the processor is used to run a program or an instruction to implement the steps of the encryption method in the first aspect above .
- the first input from the user is received; in response to the first input, N encryption controls are displayed, and each encryption control in the N encryption controls corresponds to an encryption method; the target currently displayed by the user on the electronic device is received The second input of the first encryption control in the object and the N encryption controls; in response to the second input, when the first encryption method matches the target object, the target object is processed in the first encryption method, and the first encryption method is The encryption method corresponding to the first encryption control.
- N encrypted controls can be displayed, and then after receiving the second input of the first encrypted control and the target object among the N encrypted controls Then, in response to the second input, if the first encryption method corresponding to the first encryption control matches the target object, the target object can be directly processed in the first encryption method, that is, the target object can be directly processed in the first encryption method.
- Object encryption In this way, with the encryption method provided by the embodiment of the present application, the encryption method for content encryption can be flexibly selected, and the operation method for content encryption is relatively convenient.
- 1 is a schematic flowchart of an encryption method provided by an embodiment of the present application.
- FIG. 2 is one of schematic interface diagrams of an encryption method application provided by an embodiment of the present application
- FIG 3 is the second schematic diagram of the interface of the encryption method application provided by the embodiment of the present application.
- FIG. 4 is the third interface schematic diagram of the application of the encryption method provided by the embodiment of the present application.
- FIG. 5 is the fourth schematic diagram of the interface of the encryption method application provided by the embodiment of the present application.
- FIG. 6 is the fifth schematic diagram of the interface of the encryption method application provided by the embodiment of the present application.
- FIG. 7 is the sixth schematic diagram of the interface of the encryption method application provided by the embodiment of the present application.
- FIG. 8 is the seventh schematic diagram of the interface of the encryption method application provided by the embodiment of the present application.
- FIG. 9 is the eighth schematic diagram of the interface of the encryption method application provided by the embodiment of the present application.
- FIG. 10 is the ninth schematic diagram of the interface of the encryption method application provided by the embodiment of the present application.
- FIG. 11 is a schematic structural diagram of an encryption device provided by an embodiment of the present application.
- FIG. 12 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
- FIG. 13 is a schematic hardware diagram of an electronic device provided by an embodiment of the present application.
- first, second and the like in the description and claims of the present application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and distinguish between “first”, “second”, etc.
- the objects are usually of one type, and the number of objects is not limited.
- the first object may be one or more than one.
- “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the associated objects are in an "or” relationship.
- words such as “exemplary” or “for example” are used to represent examples, illustrations or illustrations. Any embodiments or designs described in the embodiments of the present application as “exemplary” or “such as” should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as “exemplary” or “such as” is intended to present the related concepts in a specific manner.
- an embodiment of the present application provides an encryption method, and the method includes the following steps 201 to 204 .
- the execution body of the encryption method provided by the embodiment of the present application may be an encryption device, or a control module in the encryption device for executing the encryption method, or an electronic device. Specifically, it can be determined according to actual use requirements, which is not limited in the embodiment of the present application.
- the encryption method provided by the embodiment of the present application will be exemplarily described below by taking an electronic device as an example.
- Step 201 the electronic device receives a first input from a user.
- Step 202 the electronic device displays N encrypted controls in response to the first input.
- each of the above-mentioned N encryption controls may correspond to an encryption method, and N is a positive integer.
- the encryption control may also be called a privacy protection card, an encryption method card, or an encryption option card, which can be specifically determined according to actual usage requirements, and is not limited in the embodiment of the present application.
- the user can trigger the electronic device to display the above-mentioned N encrypted controls through the above-mentioned first input , so that the user can select one encryption control from the N encryption controls to trigger the electronic device to encrypt the object that the user wants to encrypt by using the encryption method corresponding to the encryption control.
- the electronic device when the electronic device displays the above-mentioned N encrypted controls, the electronic device may enter the privacy protection mode. After the electronic device enters the privacy protection mode, the user can trigger the electronic device to use the encryption method corresponding to the encryption control to encrypt the object by selecting and inputting the encryption control among the N encryption controls and the object displayed by the electronic device.
- the above-mentioned first input may be a single-click input, a double-click input, a long-press input, or a re-press input of the user in a preset area, or may be a specific voice input (such as inputting the voice message "Enter. Privacy Protection Mode", etc.).
- a specific voice input such as inputting the voice message "Enter. Privacy Protection Mode", etc.
- the above-mentioned preset area may be an indicator bar area preset in the electronic device for virtual gesture navigation.
- the above-mentioned first input is the user's long-press input on the area of the indicator bar for virtual gesture navigation. Then, as shown in (a) of FIG. 2 , when the user long presses the indicator bar area 31 of the virtual gesture navigation, the electronic device enters the privacy protection mode in response to the input, and displays (b) of FIG. 2 Three encryption controls 32 are shown.
- step 202 may be specifically implemented by the following step 202a.
- Step 202a in response to the first input, the electronic device displays N encrypted controls in target order.
- the above target order may be determined according to the target matching degree, and the target matching degree may be the matching degree between the object currently displayed by the electronic device and the encryption method corresponding to each of the N encrypted controls.
- the matching degree between the object currently displayed by the electronic device and the encryption method refers to whether the object currently displayed by the electronic device can be encrypted by the encryption method.
- the matching degree between the objects currently displayed by the electronic device and the encryption method is high; when some objects currently displayed by the electronic device can be encrypted by a certain encryption method.
- the encryption method is encrypted, the matching degree of the object currently displayed by the electronic device and the encryption method is medium; when the object currently displayed by the electronic device cannot be encrypted by a certain encryption method, the matching degree of the object currently displayed by the electronic device and the encryption method is Low.
- the electronic device may sequentially display the above N encrypted controls according to the order of the degree of matching between the objects currently displayed by the electronic device and each of the above N encrypted controls from high to low.
- the electronic device in the case that the object currently displayed by the electronic device cannot be encrypted by a certain encryption method among the above N encrypted controls, the electronic device can display the encrypted control at a position behind the N encrypted controls, And gray out the encryption control.
- the above-mentioned N encrypted controls may be displayed in a target display area, and the target display area supports functions such as left and right sliding, order adjustment of the display positions of the encrypted controls, and addition of other encrypted controls.
- the user can trigger the electronic device to display the N encrypted controls by sliding input left and right in the target display area. , encrypted controls that the electronic device does not display in the target display area.
- Step 203 the electronic device receives a second input from the user to the target object currently displayed by the electronic device and the first encrypted control among the N encrypted controls.
- Step 204 in response to the second input, the electronic device processes the target object in the first encryption mode under the condition that the first encryption mode matches the target object.
- the above-mentioned first encryption method may be an encryption method corresponding to the first encryption control.
- the electronic device After the electronic device displays the above N encrypted controls, after the electronic device receives the user's second input to the target object currently displayed on the electronic device and the first encrypted control among the N encrypted controls, the electronic device It can be determined whether the first encryption method corresponding to the first encryption control matches the target object. If the first encryption method matches the target object, the electronic device can process the target object in the above-mentioned first encryption method, thereby realizing the encryption of the target object.
- the electronic device may perform any operation, or display prompt information to prompt the user that the first encryption method does not match the target object.
- whether the first encryption method matches the target object refers to whether the target object can be encrypted by the first encryption method. If the target object can be encrypted by the first encryption method, the electronic device may determine that the first encryption method matches the target object; if the target object cannot be encrypted by the first encryption method, the electronic device may determine that the first encryption method does not match the target object .
- the above-mentioned target objects may be all objects in the current display interface of the electronic device, may also be part of the objects in the current display interface of the electronic device, or may be the current display interface of the electronic device. Specifically, it can be determined according to actual use requirements, which is not limited in the embodiments of the present application.
- the above-mentioned target object may be an application icon, or may be a specific page, segment, information, picture, or video content in the application program, which may be determined according to actual usage requirements. Not limited.
- the above-mentioned second input may be an input of dragging the target object onto the first encryption control; it may also be an input of continuous clicking on the target object and the first encryption control within a preset time period. . Specifically, it can be determined according to actual use requirements, which is not limited in the embodiment of the present application.
- the target object is an application icon
- the first encrypted control is the encrypted control "Application Hide”
- the second input is the application icon 33 (that is, the target as shown in (a) in FIG. 3 ).
- object to the input on the encryption control "Apply Hide” 34 (ie the first encryption control).
- the electronic device can encrypt the application indicated by the application icon 33 , that is, when the user triggers the electronic device to display the interface of the application, identity information verification is required.
- the above-mentioned first encryption controls are the encryption control "content encryption”, the encryption control "note encryption”, the encryption control "communication content encryption”, and the encryption control "secret”.
- the above second input is dragging the object 35 (ie the target object) in the application program to the encryption control "content encryption” 36 (ie the first encryption control) as shown in (b) in FIG. 3 .
- the electronic device can replace the target object with masked characters (for example, the character "*", the character " ⁇ "), and if the user wants to view the target object, the electronic device can prompt the user Input the identity information, and the electronic device can display the target object under the condition of successful authentication of the identity information.
- masked characters for example, the character "*", the character " ⁇ "
- the above-mentioned first encrypted control is the encrypted control "Screen Fix”
- the above-mentioned second input is to drag the page of the application (that is, the target object) to the encryption-only control "Screen Fix” (ie the first encryption control). Then, after the electronic device receives the above-mentioned second input, the electronic device may keep displaying the page. If the user wants to trigger the electronic device to display other pages, the electronic device may prompt the user to input identity information, and if the authentication of the identity information is successful, the electronic device may display other pages.
- the embodiment of the present application provides an encryption method, because after receiving the first input, in response to the first input, N encrypted controls can be displayed, and then after receiving the first encrypted control and the N encrypted controls in the N encrypted controls After the second input of the target object, in response to the second input, if the first encryption method corresponding to the first encryption control matches the target object, the target object can be directly processed in the first encryption method, that is, directly using the encryption method.
- the first encryption method encrypts the target object.
- the encryption method can be flexibly selected, and the operation method of encrypting the object is more convenient.
- the user can trigger the electronic device through a specific input (such as the third input in the embodiment of the present application).
- the device displays an encryption mode setting interface, thereby triggering the electronic device to display an encryption control corresponding to the encryption mode in the electronic device (for example, at least one encryption control in the embodiment of the present application).
- the user can trigger the electronic device to display the shortcut startup method of the encryption method in a specific area (for example, the preset area in the embodiment of the present application) by inputting the encryption control corresponding to the encryption method (for example, in the embodiment of the present application). target shortcut startup).
- the encryption method provided in this embodiment of the present application may further include the following steps 205-208.
- Step 205 the electronic device receives a third input from the user.
- Step 206 the electronic device displays an encryption mode setting interface in response to the third input.
- the above-mentioned encryption mode setting interface may include at least one encryption control, and the at least one encryption control may be an encryption control corresponding to an encryption mode in the electronic device.
- the user can trigger the electronic device to display the encryption mode setting interface through the third input, so that the user can set a shortcut startup mode of the encryption mode in the encryption mode setting interface.
- the encryption mode setting interface may be an interface in the electronic device for setting the encryption mode in the electronic device.
- the user can trigger the electronic device to perform the following operations through input in the encryption method setting interface: setting a shortcut startup method of the encryption method, creating or deleting an encryption method, and the like.
- the above-mentioned third input may be a user's sliding-up input or sliding-down input to the indicator bar area of the virtual gesture navigation. Specifically, it can be determined according to actual use requirements, which is not limited in the embodiment of the present application.
- Encryption mode setting interface this interface can include seven encryption controls, namely encryption control "Apply Encryption”, encryption control "Application Hide”, encryption control “Safe Cabinet”, encryption control "Fixed Screen”, encryption control "Content Encryption” , the encryption control "Note Encryption” and the encryption control "Bill Encryption”.
- Step 207 the electronic device receives a fourth input from the user to the second encryption control in the at least one encryption control.
- Step 208 the electronic device creates a target shortcut startup mode of the second encryption mode in response to the fourth input.
- the above-mentioned second encryption method may be an encryption method corresponding to the second encryption control.
- the user can trigger the electronic device to create the target shortcut start of the second encryption mode through a fourth input to the second encryption control in the at least one encryption control. Way.
- the electronic device may create the above-mentioned target shortcut startup method in a preset area on the screen of the electronic device.
- the user can trigger the electronic device to display the object encryption interface corresponding to the second encryption mode by inputting in the preset area.
- the above-mentioned preset area may be any possible area such as the upper left corner, the upper right corner, the lower left corner or the lower right corner of the screen of the electronic device, which may be determined according to actual use requirements. Not limited.
- the fourth input may be an input of dragging the second encryption control to the preset area; the fourth input may also include a first sub-input and a second sub-input, the first The sub-input may be a long-press input on the second encryption control, and the second sub-input may be an input of dragging the second encryption control to a preset area.
- the electronic device when the user presses the second encryption control for a long time, the electronic device can enter the editing mode in response to the input, and then the user can drag the second encryption control to the preset area, thereby triggering the electronic device to create the first encryption control.
- the target shortcut startup mode of the second encryption mode so that the user can directly trigger the electronic device to display the object encryption interface corresponding to the second encryption mode by inputting in the preset area.
- the above-mentioned fourth input includes the above-mentioned first sub-input and the above-mentioned second sub-input
- the above-mentioned second encryption control is the "content encryption” encryption control
- the electronic device can enter the editing mode in response to the input, and then as shown in (b) of FIG. 5, when the user drags the encryption control 41 “content encryption” to the screen of the electronic device In the upper left corner 42, the electronic device, in response to the input, can create a target shortcut startup mode of the encryption mode "content encryption” in the upper left corner 42 of the screen of the electronic device.
- the electronic device can cancel the display of the second encryption control in the encryption mode setting interface, or the electronic device can also set the second encryption mode.
- the encryption control is displayed on the last display position of the encryption mode setting interface, or the electronic device may keep displaying the second encryption control on the display position where the second encryption control is located before the fourth input is received. Specifically, it can be determined according to actual use requirements, which is not limited in the embodiment of the present application.
- the user can trigger the electronic device to create a shortcut startup method of the encryption method in the encryption method setting interface, the user can trigger the electronic device to create the shortcut startup method of the encryption method commonly used.
- the user can directly trigger the object processed by the encryption method in the electronic device through the input of the shortcut startup method, which can simplify the operation of the user in the electronic device.
- the user can trigger the electronic device to cancel the target shortcut startup method through a specific input (for example, the fifth input in the embodiment of the present application), and in the The first display bit in the encryption mode setting interface displays the second encryption control.
- a specific input for example, the fifth input in the embodiment of the present application
- the encryption method provided by the embodiment of the present application may further include the following steps 209 and 210.
- Step 209 the electronic device receives a fifth input from the user.
- Step 210 in response to the fifth input, the electronic device cancels the target shortcut startup mode, and displays the second encryption control in the first display position in the encryption mode setting interface.
- the user can trigger the electronic device to cancel the target shortcut startup mode through the fifth input, and the electronic device can set the encryption mode setting interface on the first page.
- a display bit shows the second encryption control described above.
- the electronic device displays the encryption mode setting interface, and the logo of the second encryption mode is displayed in the above-mentioned preset area
- the user can drag the logo from the preset area to the outside of the preset area by dragging the logo.
- the input ie, the fifth input above
- the user can trigger the electronic device to cancel the target shortcut startup by sliding from the outside to the inside or from the inside to the outside (that is, the fifth input) in the above-mentioned preset area. Way.
- the user can trigger the electronic device to display the identifier of the object processed by the encryption method (for example, K in the embodiment of the present application) by inputting the identifier indicating the encryption method (for example, the first object in the embodiment of the present application). an encrypted object identifier), and then the user can trigger the electronic device to cancel the encrypted object identifier indicated by the encrypted object identifier (for example, the first encrypted object identifier in the embodiment of the present application) by inputting Encryption of encrypted objects.
- the encryption method for example, K in the embodiment of the present application
- the user can trigger the electronic device to cancel the encrypted object identifier indicated by the encrypted object identifier (for example, the first encrypted object identifier in the embodiment of the present application) by inputting Encryption of encrypted objects.
- the encryption method provided in this embodiment of the present application may further include the following steps 211-214.
- Step 211 the electronic device receives a sixth input to the first object.
- the above-mentioned first object may be used to indicate the third encryption method in the electronic device.
- Step 212 the electronic device displays K encrypted object identifiers in response to the sixth input.
- the encrypted object indicated by the K encrypted object identifiers may be the object processed by the third encryption method, and K is a positive integer.
- the user can trigger the electronic device to display the identifiers of the K encrypted objects processed by the third encryption method (ie, the above K encrypted object identifiers) through the sixth input of the first object.
- the third encryption method ie, the above K encrypted object identifiers
- each encrypted object identifier in the above K encrypted object identifiers respectively indicates an encrypted object.
- the above-mentioned first object may be a third encryption control corresponding to the third encryption mode, or may be an identifier of a shortcut startup mode of the third encryption mode, which may be specifically determined according to actual usage requirements, which is not limited in this embodiment of the present application.
- the above-mentioned sixth input may be any possible input such as a single-click input, a double-click input, a long-press input, or a re-press input to the above-mentioned first object. .
- the above-mentioned first object is the "content encryption” encryption control
- the above-mentioned sixth input is a click input
- the electronic device may display an object encryption page in response to the input, and the object encryption page may include three encrypted object identifiers (ie, the above K encrypted object identifiers) as shown in (b) of FIG. 6 .
- Step 213 the electronic device receives a seventh input from the user for the first encrypted object identifier among the K encrypted object identifiers.
- Step 214 in response to the seventh input, the electronic device cancels the encryption of the encrypted object indicated by the first encrypted object identifier.
- the user can trigger the electronic device to cancel the encryption of the encrypted object indicated by the first encrypted object identifier through the seventh input of the first encrypted object identifier.
- the first encrypted object identifier may be one encrypted object identifier among the K encrypted object identifiers, or may be multiple encrypted object identifiers among the K encrypted object identifiers. Specifically, it can be determined according to actual use requirements, which is not limited in the embodiments of the present application.
- the electronic device may display a "cancel encryption" control at the bottom of the screen of the electronic device in response to the sixth input.
- the above-mentioned seventh input may be an input of dragging the above-mentioned first encryption object identifier onto the "cancel encryption" control.
- the electronic device when the user drags the encrypted object identifier 44 to the “cancel encryption” control 45, the electronic device can cancel the encryption of the encrypted object indicated by the encrypted object identifier 44, thereby The user can directly trigger the electronic device to display the object.
- the electronic device when the user drags the encrypted object identifier 46 to the “cancel encryption” control 45, the electronic device can cancel the encryption of the encrypted object indicated by the encrypted object identifier 46, so that the user can The electronic device is directly triggered to display the interface of the application indicated by the application icon.
- the above-mentioned seventh input may include a third sub-input and a fourth sub-input
- the third sub-input may be a long-press input on the first encrypted object identifier.
- the electronic device may display a delete control on the first encrypted object identifier
- the fourth sub-input may be a click input on the delete control.
- the electronic device responds to the input, The encryption of the encrypted object indicated by the first encrypted object identifier may be canceled.
- the user may pass an identifier (for example, the second object in the embodiment of the present application) indicating a certain encryption method in the electronic device (for example, the fourth encryption method in the embodiment of the present application). input, trigger the electronic device to display the identity information verification interface, and then when the identity information input by the user (for example, the target identity information in the embodiment of the present application) matches the preset identity information in the electronic device, the electronic device can display the The objects processed by the encryption method (for example, the M encrypted objects in the implementation of this application), so that the user can view the objects processed by these encryption methods.
- an identifier for example, the second object in the embodiment of the present application
- the electronic device for example, the fourth encryption method in the embodiment of the present application.
- the encryption method provided in this embodiment of the present application may further include the following steps 215-218.
- Step 215 the electronic device receives an eighth input of the second object by the user.
- the above-mentioned second object may be used to indicate the fourth encryption method in the electronic device.
- Step 216 the electronic device displays an identity information verification interface in response to the eighth input.
- the user can trigger the electronic device to display the above-mentioned identity information verification interface through the eighth input to the above-mentioned second object, so that the user can input identity information in the interface to perform identity information verification.
- the above-mentioned second object may be a fourth encryption control corresponding to the above-mentioned fourth encryption method, or may be a shortcut startup method of the fourth encryption method.
- the embodiment is not limited.
- the above-mentioned eighth input may be any possible input such as a single-click input, a double-click input, a drag input, or a sliding input to the above-mentioned second object, which may be specifically determined according to actual usage requirements.
- the embodiments of the present application are not limited.
- the above-mentioned second object is a shortcut startup method corresponding to the fourth encryption method, and the shortcut startup method is created in the upper left corner of the screen of the electronic device; then as shown in (a) in FIG. Swipe from the outside to the inside at the upper left corner of the screen of the electronic device to trigger the electronic device to display the identity information verification interface as shown in (b) in FIG. 8 .
- the user can trigger the electronic device to display an encrypted control interface (for example, the interface shown in (a) in FIG. 51), the encryption control interface can include a plurality of encryption controls, so that the user can trigger the electronic device to display the identity information verification interface by inputting the fourth encryption control (such as the encryption control 52 shown in (a) in FIG. 9 ). (For example, the interface 53 shown in (b) in FIG. 9 ).
- the electronic device can first display the identity information verification interface (for example, the interface 55 shown in (b) in FIG. 10 ), and when the identity information input by the user matches the preset identity information in the electronic device, the electronic device can display The above encryption control interface. In this way, multiple layers of encryption protection can be performed, thereby improving privacy protection.
- Step 217 the electronic device determines whether the input target identity information matches the preset identity information.
- the user can input the above-mentioned target identity information in the identity information verification interface, so that the electronic device can determine that the target identity information matches the preset identity information in the electronic device . If the target identity information does not match the preset identity information, the electronic device may prompt the user that the inputted identity information is incorrect; if the target identity information matches the preset identity information, the electronic device may display the object processed by the fourth encryption method (for example, M encrypted objects in the embodiment of the present application), that is, in the case that the input target identity information matches the preset identity information, the electronic device executes the following step 218.
- the fourth encryption method For example, M encrypted objects in the embodiment of the present application
- Step 218 the electronic device displays the M encrypted objects in plaintext.
- the above-mentioned M encrypted objects may be objects processed by the fourth encryption method, and M is a positive integer.
- the electronic device when the target identity information input by the user matches the preset identity information, the electronic device can display the above-mentioned M encrypted objects in plaintext, so that the user can directly view all the objects processed by the fourth encryption method. .
- the electronic device may first display the identifiers of the M encrypted objects. If the user wants to view a certain encrypted object in the M encrypted objects When the user can input the identity of the encrypted object, the electronic device can display the identity information verification interface in response to the input. When the identity information input by the user matches the preset identity information, the electronic device displays the encrypted object. In this way, multi-layer encryption protection can be performed on encrypted objects, thereby improving privacy protection.
- the encryption device provided by the embodiment of the present application will be described below by taking the encryption method performed by the encryption device in the embodiment of the present application as an example.
- an embodiment of the present application provides an encryption device 600 .
- the encryption device 600 includes a receiving module 601 , a display module 602 and a processing module 603 .
- the receiving module 601 is used to receive the first input of the user;
- the display module 602 is used to display N encrypted controls in response to the first input, and each encrypted control in the N encrypted controls corresponds to an encryption method;
- the receiving module 601 It is also used to receive the second input from the user to the target object currently displayed by the electronic device and the first encryption control in the N encryption controls;
- the processing module 603 is also used to respond to the second input, in the first encryption method and the described When the target objects match, the target objects are processed in the first encryption mode, and the first encryption mode is the encryption mode corresponding to the first encryption control.
- the display module is specifically configured to display N encrypted controls according to the target order; wherein, the target order is determined according to the target matching degree, and the target matching degree is the object currently displayed by the electronic device and each of the N encrypted controls.
- the encryption device further includes a setting module; the receiving module is further configured to receive a third input from the user; the display module is further configured to display an encryption mode setting interface in response to the third input, and the encryption mode setting interface includes at least one encryption method.
- a control the at least one encryption control is an encryption control corresponding to an encryption method in the electronic device; the receiving module is also used for receiving the fourth input from the user to the second encryption control in the at least one encryption control; the setting module is used for responding to the The fourth input is to create a target shortcut startup mode of the second encryption mode, and the second encryption mode is the encryption mode corresponding to the second encryption control.
- the receiving module is also used for receiving the fifth input of the user; the setting module is also used for canceling the target shortcut startup mode in response to the fifth input; the display module is also used for the first input in the encryption mode setting interface. display bit, showing the second encryption control.
- the receiving module is further configured to receive an eighth input from the user to the second object, where the second object is used to indicate the fourth encryption method in the electronic device; the display module is further configured to respond to the eighth input received by the receiving module.
- the identity information verification interface is displayed; and when the input target identity information matches the preset identity information, M encrypted objects are displayed in plaintext, and the M encrypted objects are objects processed by the fourth encryption method, and M is a positive integer.
- the embodiment of the present application provides an encryption device, because after receiving the first input, in response to the first input, N encrypted controls can be displayed, and then after receiving the first encrypted control and the N encrypted controls in the N encrypted controls After the second input of the target object, in response to the second input, if the first encryption method corresponding to the first encryption control matches the target object, the target object can be directly processed in the first encryption method, that is, directly using the encryption method.
- the first encryption method encrypts the target object.
- the encryption mode can be selected flexibly, and the operation mode of encrypting the object is more convenient.
- the encryption device in this embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in an electronic device.
- the apparatus may be a mobile electronic device or a non-mobile electronic device.
- the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palmtop computer, an in-vehicle electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook, or a personal digital assistant (personal digital assistant).
- UMPC ultra-mobile personal computer
- assistant, PDA personal digital assistant
- the non-mobile electronic device may be a personal computer (personal computer, PC), a television (television, TV), a teller machine or a self-service machine, etc., which are not specifically limited in the embodiments of the present application.
- the encryption device in this embodiment of the present application may be a device with an operating system.
- the operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, which are not specifically limited in the embodiments of the present application.
- the encryption device provided in the embodiment of the present application can implement each process implemented by the foregoing method embodiment, which is not repeated here to avoid repetition.
- an embodiment of the present application further provides an electronic device 700, including a processor 701, a memory 702, a program or instruction stored in the memory 702 and executable on the processor 701, the program Or, when the instruction is executed by the processor 701, each process of the foregoing encryption method embodiment is implemented, and the same technical effect can be achieved. To avoid repetition, details are not repeated here.
- the electronic devices in the embodiments of the present application include the above-mentioned mobile electronic devices and non-mobile electronic devices.
- FIG. 13 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
- the electronic device 100 includes but is not limited to: a radio frequency unit 101, a network module 102, an audio output unit 103, an input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, and a processor 110, etc. part.
- the electronic device 100 may also include a power supply 111 (such as a battery) for supplying power to various components, and the power supply may be logically connected to the processor 110 through a power management system, so as to manage charging, discharging, and Power management and other functions.
- a power supply 111 such as a battery
- the structure of the electronic device shown in FIG. 13 does not constitute a limitation on the electronic device.
- the electronic device may include more or less components than the one shown, or combine some components, or arrange different components, which will not be repeated here. .
- the user input unit 107 is used to receive the first input of the user; the display unit 106 is used to display N encryption controls in response to the first input, and each encryption control in the N encryption controls corresponds to an encryption method; the user The input unit 107 is further configured to receive a second input from the user to the target object currently displayed by the electronic device and the first encrypted control among the N encrypted controls; the display unit 106 is also configured to respond to the second input, in the first encrypted control If the method matches the target object, the target object is processed and displayed in the first encryption method, and the first encryption method is the encryption method corresponding to the first encryption control.
- the display unit 106 is specifically configured to display N encrypted controls according to the target order; wherein, the target order is determined according to the target matching degree, and the target matching degree is the object currently displayed by the electronic device and each of the N encrypted controls.
- the user input unit 107 is further configured to receive a third input from the user; the display unit 106 is further configured to display an encryption mode setting interface in response to the third input, and the encryption mode setting interface includes at least one encryption control, at least one The encryption control is an encryption control corresponding to the encryption method in the electronic device; the user input unit 107 is further configured to receive a fourth input from the user to the second encryption control in the at least one encryption control; the processor 110 is used to respond to the fourth input Input to create a target shortcut startup mode of the second encryption mode, where the second encryption mode is the encryption mode corresponding to the second encryption control.
- the user input unit 107 is further configured to receive a fifth input from the user; the processor 110 is further configured to cancel the target shortcut startup mode in response to the fifth input; the display unit 106 is further configured to display the encryption mode setting interface The first display bit in , displays the second encryption control.
- the user input unit 107 is further configured to receive a sixth input from the user to the first object, where the first object is used to indicate a third encryption method in the electronic device; the display unit 106 is further configured to respond to the sixth input , display K encrypted object identifiers, the encrypted objects indicated by the K encrypted object identifiers are the objects processed by the third encryption method, and K is a positive integer; the user input unit 107 is also used to receive the user's input to the K encrypted object identifiers.
- the seventh input of the first encrypted object identifier; the processor 110 is configured to cancel the encryption of the encrypted object indicated by the first encrypted object identifier in response to the seventh input.
- the user input unit 107 is further configured to receive an eighth input from the user to the second object, where the second object is used to indicate the fourth encryption method in the electronic device; the display unit 106 is further configured to respond to the eighth input , the identity information verification interface is displayed, and when the input target identity information matches the preset identity information, M encrypted objects are displayed in plaintext, where the M encrypted objects are the objects processed by the fourth encryption method, and M is the positive integer.
- the embodiment of the present application provides an electronic device, because after receiving the first input, in response to the first input, N encrypted controls can be displayed, and then after receiving the first encrypted control and the N encrypted controls in the N encrypted controls After the second input of the target object, in response to the second input, if the first encryption method corresponding to the first encryption control matches the target object, the target object can be directly processed in the first encryption method, that is, directly using the encryption method.
- the first encryption method encrypts the target object. In this way, the encryption mode can be flexibly selected in the electronic device, and the operation mode of encrypting the object through the electronic device is more convenient.
- the receiving module in the encryption device may be implemented by the user input unit 107; the display module in the encryption device may be implemented by the display unit 106; the processing module in the encryption device and
- the setting modules can all be implemented by the above-mentioned processor 110 .
- the radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
- the electronic device provides the user with wireless broadband Internet access through the network module 102, such as helping the user to send and receive emails, browse web pages, access streaming media, and the like.
- the audio output unit 103 may include a speaker, a buzzer, a receiver, and the like.
- the input unit 104 may include a graphics processor (Graphics Processing Unit, GPU) 1041 and a microphone 1042, and the graphics processor 1041 captures images of still pictures or videos obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode data is processed.
- the display unit 106 may include a display panel 1061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
- the user input unit 107 includes a touch panel 1071 and other input devices 1072 .
- the touch panel 1071 is also called a touch screen.
- the touch panel 1071 may include two parts, a touch detection device and a touch controller.
- Other input devices 1072 may include, but are not limited to, physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be repeated here.
- Memory 109 may be used to store software programs as well as various data including, but not limited to, application programs and operating systems.
- the processor 110 may integrate an application processor and a modem processor, wherein the application processor mainly processes the operating system, user interface, and application programs, and the like, and the modem processor mainly processes wireless communication. It can be understood that, the above-mentioned modulation and demodulation processor may not be integrated into the processor 110 .
- Embodiments of the present application further provide a readable storage medium, where a program or an instruction is stored on the readable storage medium.
- a program or an instruction is stored on the readable storage medium.
- the above-mentioned processor is the processor in the electronic device in the above-mentioned embodiment.
- the readable storage medium may include a computer-readable storage medium, such as a computer read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
- An embodiment of the present application further provides a chip, the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is used for running a program or an instruction, implementing each process of the foregoing encryption method embodiment, and can achieve the same The technical effect, in order to avoid repetition, will not be repeated here.
- the chip mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip, a system-on-a-chip, or a system-on-a-chip, or the like.
- the methods of the above embodiments can be implemented by means of software plus a necessary general hardware platform, and of course hardware can also be used, but in many cases the former is better implementation.
- the technical solution of the present application can be embodied in the form of a software product in essence or in a part that contributes to the prior art, and the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, CD-ROM), including several instructions to make an electronic device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the methods described in the various embodiments of the present application.
- a storage medium such as ROM/RAM, magnetic disk, CD-ROM
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
Claims (17)
- 一种加密方法,包括:接收用户的第一输入;响应于所述第一输入,显示N个加密控件,所述N个加密控件中的每个加密控件对应一个加密方式;接收用户对电子设备当前显示的目标对象和所述N个加密控件中的第一加密控件的第二输入;响应于所述第二输入,在第一加密方式与所述目标对象匹配的情况下,以所述第一加密方式处理所述目标对象,所述第一加密方式为所述第一加密控件对应的加密方式。
- 根据权利要求1所述的方法,其中,所述显示N个加密控件,包括:按照目标顺序显示所述N个加密控件;其中,所述目标顺序是根据目标匹配程度确定的,所述目标匹配程度为所述电子设备当前显示的对象与所述N个加密控件中的每个加密控件对应的加密方式的匹配程度。
- 根据权利要求1所述的方法,其中,所述方法还包括:接收用户的第三输入;响应于所述第三输入,显示加密方式设置界面,所述加密方式设置界面包括至少一个加密控件;接收用户对所述至少一个加密控件中的第二加密控件的第四输入;响应于所述第四输入,创建第二加密方式的目标快捷启动方式,所述第二加密方式为所述第二加密控件对应的加密方式。
- 根据权利要求3所述的方法,其中,所述创建第二加密方式的目标快捷启动方式之后,所述方法还包括:接收用户的第五输入;响应于所述第五输入,取消所述目标快捷启动方式,并在所述加密方式设置界面中的第一个显示位显示所述第二加密控件。
- 根据权利要求1所述的方法,其中,所述方法还包括:接收用户对第一对象的第六输入,所述第一对象用于指示电子设备中的第三加密方式;响应于所述第六输入,显示K个加密对象标识,所述K个加密对象标识指示的加密对象为采用所述第三加密方式处理的对象,K为正整数;接收用户对所述K个加密对象标识中的第一加密对象标识的第七输入;响应于所述第七输入,取消对所述第一加密对象标识指示的加密对象的加密。
- 根据权利要求1所述的方法,其中,所述方法还包括:接收用户对第二对象的第八输入,所述第二对象用于指示电子设备中的第四加密方式;响应于所述第八输入,显示身份信息验证界面;在输入的目标身份信息与预设身份信息匹配的情况下,以明文的形式显示M个加密对象,所述M个加密对象为采用所述第四加密方式处理的对象,M为正整数。
- 一种加密装置,所述加密装置包括接收模块、显示模块和处理模块;所述接收模块,用于接收用户的第一输入;所述显示模块,用于响应于所述第一输入,显示N个加密控件,所述N个加密控件中的每个加密控件对应一个加密方式;所述接收模块,还用于接收用户对电子设备当前显示的目标对象和所述N个加密控件中的第一加密控件的第二输入;所述处理模块,用于响应于所述第二输入,在第一加密方式与所述目标对象匹配的情况下,以所述第一加密方式处理所述目标对象,所述第一加密方式为所述第一加密控件对应的加密方式。
- 根据权利要求7所述的装置,其中,所述显示模块,具体用于按照目标顺序显示所述N个加密控件;其中,所述目标顺序是根据目标匹配程度确定的,所述目标匹配程度为所述电子设备当前显示的对象与所述N个加密控件中的每个加密控件对应的加密方式的匹配程度。
- 根据权利要求7所述的加密装置,其中,所述加密装置还包括设置模块;所述接收模块,还用于接收用户的第三输入;所述显示模块,还用于响应于所述第三输入,显示加密方式设置界面,所述加密方式设置界面包括至少一个加密控件;所述接收模块,还用于接收用户对所述至少一个加密控件中的第二加密控件的第四输入;所述设置模块,用于响应于所述第四输入,创建第二加密方式的目标快捷启动方式,所述第二加密方式为所述第二加密控件对应的加密方式。
- 根据权利要求9所述的加密装置,其中,所述接收模块,还用于接收用户的第五输入;所述设置模块,还用于响应于所述第五输入,取消所述目标快捷启动方式;所述显示模块,还用于在所述加密方式设置界面中的第一个显示位显示所述第二加密控件。
- 根据权利要求7所述的加密装置,其中,所述接收模块,还用于接收用户对第一对象的第六输入,所述第一对象用于指示电子设备中的第三加密方式;所述显示模块,还用于响应于所述第六输入,显示K个加密对象标识,所述K个加密对象标识指示的加密对象为采用所述第三加密方式处理的对象,K为正整数;所述接收模块,还用于接收用户对所述K个加密对象标识中的第一加密对象标识的第七输入;所述处理模块,还用于响应于所述第七输入,取消对所述第一加密对象标识指示的加密对象的加密。
- 根据权利要求7所述的加密装置,其中,所述接收模块,还用于接收用户对第二对象的第八输入,所述第二对象用于指示电子设备中的第四加密方式;所述显示模块,还用于响应于所述第八输入,显示身份信息验证界面,并在输入的目标身份信息与预设身份信息匹配的情况下,以明文的形式显示M个加密对象,所述M个加密对象为采用所述第四加密方式处理的对象,M为正整数。
- 一种电子设备,包括处理器,存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或所述指令被所述处理器执行时实现如权利要求1-6任一项所述的加密方法的步骤。
- 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或所述指令被处理器执行时实现如权利要求1-6任一项所述的加密方法的步骤。
- 一种计算机程序产品,所述计算机程序产品被至少一个处理器执行以实现如权利要求1-6任一项所述的加密方法的步骤。
- 一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如权利要求1-6任一项所述的加密方法的步骤。
- 一种电子设备,所述电子设备被配置成用于执行如权利要求1-6任一项所述的加密方法的步骤。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP22745279.4A EP4276667A1 (en) | 2021-01-27 | 2022-01-26 | Encryption method and apparatus, electronic device, and medium |
KR1020237028962A KR20230136185A (ko) | 2021-01-27 | 2022-01-26 | 암호화 방법, 암호화 장치, 전자 장치 및 매체 |
US18/226,430 US20230385426A1 (en) | 2021-01-27 | 2023-07-26 | Encryption Method and Apparatus, Electronic Device, and Medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110112722.6 | 2021-01-27 | ||
CN202110112722.6A CN112948843B (zh) | 2021-01-27 | 2021-01-27 | 加密方法、装置、电子设备及介质 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/226,430 Continuation US20230385426A1 (en) | 2021-01-27 | 2023-07-26 | Encryption Method and Apparatus, Electronic Device, and Medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022161406A1 true WO2022161406A1 (zh) | 2022-08-04 |
Family
ID=76238013
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/074041 WO2022161406A1 (zh) | 2021-01-27 | 2022-01-26 | 加密方法、装置、电子设备及介质 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20230385426A1 (zh) |
EP (1) | EP4276667A1 (zh) |
KR (1) | KR20230136185A (zh) |
CN (1) | CN112948843B (zh) |
WO (1) | WO2022161406A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115757191A (zh) * | 2023-01-05 | 2023-03-07 | 广州市千钧网络科技有限公司 | 一种数据处理方法和装置 |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112948843B (zh) * | 2021-01-27 | 2022-07-15 | 维沃移动通信有限公司 | 加密方法、装置、电子设备及介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106599723A (zh) * | 2016-12-19 | 2017-04-26 | 武汉斗鱼网络科技有限公司 | 一种文件加密方法及装置、文件解密方法及装置 |
CN107103247A (zh) * | 2017-03-13 | 2017-08-29 | 宇龙计算机通信科技(深圳)有限公司 | 一种应用加密方法及装置 |
CN108509105A (zh) * | 2018-03-16 | 2018-09-07 | 维沃移动通信有限公司 | 一种应用程序管理方法和终端 |
CN111371773A (zh) * | 2020-02-28 | 2020-07-03 | 北京百度网讯科技有限公司 | 一种信息发送和显示方法、装置、设备及存储介质 |
CN111428223A (zh) * | 2020-03-19 | 2020-07-17 | 上海传英信息技术有限公司 | 一种加密方法、加密装置、终端及计算机可读存储介质 |
CN112948843A (zh) * | 2021-01-27 | 2021-06-11 | 维沃移动通信有限公司 | 加密方法、装置、电子设备及介质 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9165128B1 (en) * | 2012-05-10 | 2015-10-20 | Isaac S. Daniel | System and method of securing content from public display on a mobile communication device |
CN104700001B (zh) * | 2013-12-04 | 2020-01-10 | 腾讯科技(深圳)有限公司 | 应用程序的信息加密方法及装置 |
CN105808238B (zh) * | 2016-02-26 | 2019-03-22 | 四川效率源信息安全技术股份有限公司 | 一种安全Dock及其应用方法 |
CN106203061B (zh) * | 2016-06-27 | 2020-03-06 | 维沃移动通信有限公司 | 一种应用程序的加密方法及移动终端 |
CN106203176A (zh) * | 2016-07-29 | 2016-12-07 | 乐视控股(北京)有限公司 | 一种应用加密方法及装置 |
CN108491133B (zh) * | 2018-03-28 | 2020-09-11 | 维沃移动通信有限公司 | 一种应用程序控制方法及终端 |
CN109886047B (zh) * | 2019-03-21 | 2021-01-15 | 腾讯科技(深圳)有限公司 | 文件加密处理方法和装置 |
CN110457879A (zh) * | 2019-06-26 | 2019-11-15 | 维沃移动通信有限公司 | 对象显示方法及终端设备 |
-
2021
- 2021-01-27 CN CN202110112722.6A patent/CN112948843B/zh active Active
-
2022
- 2022-01-26 WO PCT/CN2022/074041 patent/WO2022161406A1/zh active Application Filing
- 2022-01-26 EP EP22745279.4A patent/EP4276667A1/en active Pending
- 2022-01-26 KR KR1020237028962A patent/KR20230136185A/ko active Search and Examination
-
2023
- 2023-07-26 US US18/226,430 patent/US20230385426A1/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106599723A (zh) * | 2016-12-19 | 2017-04-26 | 武汉斗鱼网络科技有限公司 | 一种文件加密方法及装置、文件解密方法及装置 |
CN107103247A (zh) * | 2017-03-13 | 2017-08-29 | 宇龙计算机通信科技(深圳)有限公司 | 一种应用加密方法及装置 |
CN108509105A (zh) * | 2018-03-16 | 2018-09-07 | 维沃移动通信有限公司 | 一种应用程序管理方法和终端 |
CN111371773A (zh) * | 2020-02-28 | 2020-07-03 | 北京百度网讯科技有限公司 | 一种信息发送和显示方法、装置、设备及存储介质 |
CN111428223A (zh) * | 2020-03-19 | 2020-07-17 | 上海传英信息技术有限公司 | 一种加密方法、加密装置、终端及计算机可读存储介质 |
CN112948843A (zh) * | 2021-01-27 | 2021-06-11 | 维沃移动通信有限公司 | 加密方法、装置、电子设备及介质 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115757191A (zh) * | 2023-01-05 | 2023-03-07 | 广州市千钧网络科技有限公司 | 一种数据处理方法和装置 |
CN115757191B (zh) * | 2023-01-05 | 2023-05-16 | 广州市千钧网络科技有限公司 | 一种数据处理方法和装置 |
Also Published As
Publication number | Publication date |
---|---|
KR20230136185A (ko) | 2023-09-26 |
CN112948843B (zh) | 2022-07-15 |
US20230385426A1 (en) | 2023-11-30 |
EP4276667A1 (en) | 2023-11-15 |
CN112948843A (zh) | 2021-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2022161406A1 (zh) | 加密方法、装置、电子设备及介质 | |
WO2021077927A1 (zh) | 显示控制方法及电子设备 | |
WO2022111394A1 (zh) | 信息处理方法、装置和电子设备 | |
WO2022089409A1 (zh) | 文件发送方法、装置及电子设备 | |
WO2022012614A1 (zh) | 数据处理方法、装置和电子设备 | |
WO2022143336A1 (zh) | 图形码识别方法、装置及电子设备 | |
WO2022156665A1 (zh) | 一种数据隔离方法和电子设备 | |
WO2022135290A1 (zh) | 截屏方法、装置及电子设备 | |
WO2022063164A1 (zh) | 界面显示方法、装置和电子设备 | |
WO2022143660A1 (zh) | 图标显示方法、装置及电子设备 | |
CN112929494B (zh) | 信息处理方法、装置、介质和电子设备 | |
CN108540645B (zh) | 一种移动终端的操作方法及移动终端 | |
WO2022247866A1 (zh) | 应用图标管理方法、装置及电子设备 | |
WO2023103901A1 (zh) | 应用管理方法、装置和电子设备 | |
WO2023186011A1 (zh) | 图像显示方法、装置及电子设备 | |
WO2023093719A1 (zh) | 应用管理方法、装置、电子设备和介质 | |
WO2022247865A1 (zh) | 显示控制方法、装置、电子设备及介质 | |
WO2022199615A1 (zh) | 信息显示方法、装置和电子设备 | |
WO2022171057A1 (zh) | 显示控制方法、装置、电子设备及介质 | |
WO2022247784A1 (zh) | 控制方法、装置、电子设备和可读存储介质 | |
WO2022068720A1 (zh) | 图标显示控制方法、装置及电子设备 | |
CN113807831A (zh) | 支付方法和装置 | |
CN108763905B (zh) | 一种对象处理方法和终端设备 | |
CN112596645A (zh) | 应用标识隐藏方法、装置和电子设备 | |
CN112182673A (zh) | 信息共享方法、装置及设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22745279 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2022745279 Country of ref document: EP Effective date: 20230809 |
|
ENP | Entry into the national phase |
Ref document number: 20237028962 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020237028962 Country of ref document: KR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |