CN110188524B - Information encryption method, information decryption method and terminal - Google Patents
Information encryption method, information decryption method and terminal Download PDFInfo
- Publication number
- CN110188524B CN110188524B CN201910433794.3A CN201910433794A CN110188524B CN 110188524 B CN110188524 B CN 110188524B CN 201910433794 A CN201910433794 A CN 201910433794A CN 110188524 B CN110188524 B CN 110188524B
- Authority
- CN
- China
- Prior art keywords
- input
- information
- group chat
- fingerprint information
- authority
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 87
- 238000012545 processing Methods 0.000 claims abstract description 12
- 230000004044 response Effects 0.000 claims description 27
- 238000004590 computer program Methods 0.000 claims description 19
- 239000003086 colorant Substances 0.000 claims description 6
- 230000000977 initiatory effect Effects 0.000 claims description 3
- 238000012905 input function Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 description 18
- 238000010586 diagram Methods 0.000 description 15
- 230000000694 effects Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000010079 rubber tapping Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000007790 scraping Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04883—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04886—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Information Transfer Between Computers (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention provides an information encryption method, an information decryption method and a terminal, wherein the method comprises the following steps: receiving a first input acting on a group chat interface; responding to the first input, acquiring input information of the first input, and encrypting the input information by using fingerprint information corresponding to the first input; receiving a second input; responding to the second input, sending the input information to carry out encryption processing to obtain encrypted information; according to the embodiment of the invention, the fingerprint information corresponding to the first input is used for directly encrypting the input information of the first input and then sending the encrypted information, the group chat user can perform the fifth input in the display area of the encrypted information, the decryption function is realized through the fingerprint information corresponding to the fifth input, the operation is simple, the compatibility is strong, and other special dependence is not needed.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an information encryption method, an information decryption method, and a terminal.
Background
With the popularization of terminals, information transmission is more and more, and a large amount of information contains personal information of people; with the increasing demand of people on privacy, but many information in the current related technologies are directly displayed, and lack of appropriate privacy protection, so that the protection of information is a problem to be solved urgently.
The input method encryption can be realized only by an input method supporting the encryption function, all members need to uniformly use the input method when the multiple parties participate in the encryption, and the decryption can be realized only by depending on the input method when the multiple parties participate in the encryption. The encryption of the input method depends on a built-in encryption library of the input method, and the participating parties can encrypt and decrypt only by using the input method and setting the encryption library in the input method; the dependency is strong, and the application is not flexible.
Disclosure of Invention
The embodiment of the invention provides an information encryption method, an information decryption method and a terminal, and aims to solve the problem that encryption input in the prior art depends on an input method and an encryption library and is inflexible in application.
In order to solve the technical problem, the invention is realized as follows: an information encryption method is applied to a first terminal and comprises the following steps:
receiving a first input acting on a group chat interface;
responding to the first input, acquiring input information of the first input, and encrypting the input information by using fingerprint information corresponding to the first input;
receiving a second input;
and responding to the second input, sending the input information to carry out encryption processing to obtain encrypted information.
The embodiment of the invention also provides an information decryption method, which is applied to a second terminal and comprises the following steps:
receiving encrypted information sent by a first terminal at a group chat interface;
receiving a fifth input to the display area of the encrypted information;
and responding to the fifth input, and if the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information, displaying the information after decrypting the encrypted information.
An embodiment of the present invention provides a terminal, where the terminal is a first terminal, and the terminal includes:
the device comprises a first receiving module, a second receiving module and a third receiving module, wherein the first receiving module is used for receiving a first input acting on a group chat interface;
the first response module is used for responding to the first input, acquiring input information of the first input and encrypting the input information by utilizing fingerprint information corresponding to the first input;
the second receiving module is used for receiving a second input;
and the second response module is used for responding to the second input and sending the input information to carry out encryption processing to obtain encrypted information.
An embodiment of the present invention provides a terminal, where the terminal is a second terminal, and the terminal includes:
the information receiving module is used for receiving encrypted information sent by a first terminal at a group chat interface;
a fifth receiving module for receiving a fifth input acting on a display area of the encrypted information;
and the fifth response module is used for responding to the fifth input, and displaying the decrypted information of the encrypted information if the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information.
The embodiment of the invention provides a terminal, which comprises a processor, a memory and a computer program which is stored on the memory and can run on the processor, wherein when the computer program is executed by the processor, the steps of the information encryption method are realized; alternatively, the computer program realizes the steps of the information decryption method as described above when executed by the processor.
An embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the information encryption method described above; alternatively, the computer program realizes the steps of the information decryption method as described above when executed by a processor.
In the embodiment of the invention, the fingerprint information corresponding to the first input is used for directly encrypting the input information of the first input and then sending the encrypted information, the group chat user can perform the fifth input in the display area of the encrypted information, the decryption function is realized by the fingerprint information corresponding to the fifth input, the operation is simple, the compatibility is strong, and other special dependence is not needed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
FIG. 1 is a flow chart illustrating steps of an information encryption method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an information encryption method according to an embodiment of the present invention;
FIG. 3 is a second schematic diagram of an information encryption method according to an embodiment of the present invention;
FIG. 4 is a third schematic diagram illustrating an information encryption method according to an embodiment of the present invention;
FIG. 5 is a fourth schematic diagram illustrating an information encryption method according to an embodiment of the present invention;
FIG. 6 is a fifth schematic diagram illustrating an information encryption method according to an embodiment of the present invention;
FIG. 7 is a sixth schematic diagram illustrating an information encryption method according to an embodiment of the present invention;
FIG. 8 is a seventh schematic diagram illustrating an information encryption method according to an embodiment of the present invention;
FIG. 9 is a diagram illustrating an eighth embodiment of an information encryption method according to the present invention;
FIG. 10 is a flow chart illustrating the steps of a method for decrypting information provided by an embodiment of the present invention;
FIG. 11 is a diagram illustrating one embodiment of a method for decrypting information;
FIG. 12 is a second schematic diagram of an information decryption method according to an embodiment of the present invention;
fig. 13 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 14 is a second schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 15 is a third schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiments of the present invention, words such as "exemplary" or "for example" are used to mean serving as examples, illustrations or descriptions. Any embodiment or design described as "exemplary" or "e.g.," an embodiment of the present invention is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
The terminal provided by the embodiment of the invention can be a Mobile phone, a tablet Computer, a notebook Computer, an Ultra-Mobile Personal Computer (UMPC), a netbook, a Wearable Device, a vehicle-mounted Device or a Personal Digital Assistant (PDA), and the like. It should be noted that the specific type of the terminal is not limited in the embodiment of the present invention. In the embodiment of the present invention, LTE and NR systems are taken as examples, but the present invention is not limited to this system, and the technical solution provided by the present invention may be applied to other systems having the same problem.
As shown in fig. 1, an embodiment of the present invention provides an information encryption method, applied to a first terminal, including:
Wherein the first input is a sliding operation or a tapping operation.
And 102, responding to the first input, acquiring input information of the first input, and encrypting the input information by using fingerprint information corresponding to the first input.
In this step, the first input information is the information to be transmitted of the first terminal, in other words, the fingerprint information corresponding to the first input is used for encrypting the information to be transmitted; specifically, the system may encrypt while inputting.
And 104, responding to the second input, sending the input information, and encrypting to obtain encrypted information.
According to the scheme provided by the embodiment of the invention, during group chat, the authority management such as encryption and decryption is carried out through the fingerprint information, the operation is simple, the compatibility is strong, and other special dependence is not required.
As shown in fig. 2, a user inputs information by tapping or sliding a keyboard with a finger in a keyboard area, and the first terminal detects fingerprint information at the same time and records and retains the current first input fingerprint information; and the fingerprint information corresponding to the first input is used for encrypting the input information of the first input to obtain encrypted information. On the group chat interface of the first terminal side, the encrypted information sent by the first terminal side can be displayed in plain text (i.e. directly displaying the first input information) or in cipher text (i.e. displaying the encrypted information of the first input information); on the other member's interface, the information sent by the first terminal is displayed by the cipher text (i.e. the encrypted information of the first input information is displayed).
Optionally, in the above embodiment of the present invention, before step 101, the method further includes:
receiving a third input;
in response to the third input, an encryption input mode is initiated.
In other words, the user may activate or deactivate the encryption input mode through the encryption input switch of the system.
As an alternative embodiment, the third input comprises:
a preset gesture input acting on the group chat interface; the preset gesture is used for starting or closing encryption input.
For example, as shown in fig. 3, in the group chat interface, when a finger of the user slides inward from an edge of the keyboard area by a preset distance, the encryption input is started or closed; alternatively, as shown in fig. 4, the first terminal may prompt the user whether the current state is to enable or disable the encryption input. After the encryption input is turned on through the preset gesture input, the background color of the input method keyboard area is changed to be gray or other dark colors, the background color of the keyboard area is restored to be the original color after the encryption input is turned off, and fig. 5 is a schematic diagram of the keyboard area with the background changed in the encryption input state.
As another alternative embodiment, the third input comprises:
clicking input of a virtual key acting on the group chat interface; the virtual key is used for starting or closing encryption input.
For example, as shown in fig. 6, a virtual key for starting or closing the encryption input is provided in the keyboard region, and the encryption input function is turned on or closed by clicking the virtual key. Likewise, the first terminal may prompt the user whether the current state is to enable or disable the encryption input. After the encryption input is opened through the virtual keys, the background color of the input method keyboard area is changed into gray or other dark colors, and the background color of the keyboard area is restored to the original color after the encryption input is closed.
Optionally, in the foregoing embodiment of the present invention, the encrypted information is displayed as a processed character string; or, the encrypted information is displayed as a plurality of target symbols; or, the encrypted information is displayed as information subjected to mosaic blurring processing.
For example, as shown in fig. 7, member a (i.e., the first terminal) transmits encrypted information, which is displayed as a processed character string. A specific processing method may be to display the information as XXXX, or to perform mosaic blurring processing or the like.
Further, in the foregoing embodiment of the present invention, before step 103, the method further includes:
receiving a fourth input for selecting at least one group chat member in the group chat member list;
in response to the fourth input, determining that fingerprint information of the group chat member selected by the fourth input has the authority to decrypt the encrypted information.
When the first terminal sends the encrypted information, the first terminal directly selects fingerprints of group chat members which can view the encrypted information; specifically, a specific group chat member is designated through the fourth input, and the fingerprint information of the designated group chat member is endowed with the authority of decrypting the encrypted information by the system. For example, as shown in fig. 8, after clicking the "+" button shown in fig. 8, a list of group chat members shown in fig. 9 pops up, and the user can check the group chat members who can view the piece of encrypted information among the group chat members shown in fig. 9.
Or, the group chat members who can view the piece of encrypted information are determined according to rules predefined by the system.
In summary, in the above embodiments of the present invention, the fingerprint information corresponding to the first input directly encrypts the first input information and then sends the encrypted information, so that the group chat user can perform the fifth input in the display area of the encrypted information, and the fingerprint information corresponding to the fifth input realizes the decryption function, and the operation is simple, the compatibility is strong, and no other special dependence is required.
As shown in fig. 10, an embodiment of the present invention further provides an information decryption method, which is applied to a second terminal, and includes:
In this embodiment of the present invention, the fifth input may specifically be a sliding operation input of a finger of a user, a scraping operation input, or an input of a display area where other fingerprints can be read and act on encrypted information, which is not specifically limited herein.
As shown in fig. 11, the group chat members may scrape the display area where the encrypted information is located by sliding the fingers, and the system detects whether the fingerprint information of the current finger has permission to decrypt and display the current encrypted information; and when detecting that the fingerprint information with the authority is subjected to sliding scraping on the area, displaying the encrypted information.
Optionally, the method further includes:
responding to the fifth input, and if the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information, displaying prompt information, wherein the prompt information is used for indicating that the current user does not have the authority of viewing the encrypted information.
As shown in fig. 12, when it is detected that the current fingerprint information is not authorized to be decrypted, the user is prompted that the information is not currently authorized to be viewed.
As an alternative embodiment, the method further comprises:
and judging whether the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information.
The embodiment of the invention provides various ways for judging whether the current fingerprint information has the authority, which are respectively as follows:
the first method is as follows: the judging whether the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information includes:
if the contact information of the opposite side is stored between the user of the fingerprint information corresponding to the fifth input and the user of the fingerprint information used by the encrypted information, determining that the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information; otherwise, determining that the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information. Wherein, the contact means includes: a phone number, a social account number, an instant messenger account number, etc., which are not specifically limited herein.
In other words, whether or not there is an authority is determined based on whether or not the fingerprint information corresponding to the fifth input and the fingerprint information used for the encryption information are contact addresses in which the other party is stored. For example, it may be determined from the relationship of the member A, B, C and the current encryption information producer D. For example, if a and D are related to each other as friends, relatives, or friends, then a is allowed to view the message by fingerprint verification. B. C has no such relationship and therefore the fingerprint information of B, C will not be able to view the encrypted information sent by D.
The second method comprises the following steps: the judging whether the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information includes:
if the time for the user who inputs the corresponding fingerprint information to join the current group chat is longer than a preset value, and the time for the user who inputs the corresponding fingerprint information to join the current group chat is longer than the time for the user who uses the fingerprint information used by the encrypted information to join the current group chat, determining that the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information; otherwise, determining that the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information.
In other words, whether or not there is a right can be determined according to the grouping time. For example, member B is in group for a longer time, reaches the threshold K, and is longer than the encryption information input person D, so the fingerprint of B can decrypt the encryption information of the encryption information input person D.
The third method comprises the following steps: the judging whether the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information includes:
and if the user of the fifth input corresponding fingerprint information is a group manager of the current group chat, determining that the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information.
For example, the member C is a group administrator, so that the fingerprint information of C has super authority, and the encrypted information issued by the encrypted information generator D can be viewed by using the fingerprint information of C as well.
The method is as follows: the judging whether the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information includes:
if the fingerprint information corresponding to the fifth input is the fingerprint information of the group chat member selected by the first terminal and having the authority of decrypting the encrypted information, determining that the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information; otherwise, determining that the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information.
In short, when the first terminal sends the encrypted information, the first terminal directly selects which fingerprints of the group chat members can view the encrypted information; specifically, a specific group chat member is designated through the fourth input, and the fingerprint information of the designated group chat member is endowed with the authority of decrypting the encrypted information by the system. Correspondingly, the second terminal determines whether the authority is available according to whether the current fingerprint information is the fingerprint information of the group chat member selected by the first terminal and having the authority to decrypt the encrypted information. For example, if member B is a group chat member selected by the encrypted information inputter D to view the piece of encrypted information, the fingerprint of B may decrypt the encrypted information of the encrypted information inputter D; the fingerprint information of other members cannot decrypt the encrypted information.
In summary, in the above embodiments of the present invention, the fingerprint information corresponding to the first input directly encrypts the first input information and then sends the encrypted information, so that the group chat user can perform the fifth input in the display area of the encrypted information, and the decryption function is realized by the fingerprint information corresponding to the fifth input, so that the operation is simple, the compatibility is strong, and no other special dependence is required; the public information can be directly subjected to reading authority management according to the fingerprint information, the user operation is simple and convenient, and the information safety is effectively improved.
As shown in fig. 13, an embodiment of the present invention further provides a terminal 300, where the terminal is a first terminal, and the terminal includes:
a first receiving module 301, configured to receive a first input acting on the group chat interface;
a first response module 302, configured to, in response to the first input, obtain input information of the first input, and encrypt the input information by using fingerprint information corresponding to the first input;
a second receiving module 303, configured to receive a second input;
a second response module 304, configured to send the input information to perform encryption processing in response to the second input, so as to obtain encrypted information.
Optionally, in the foregoing embodiment of the present invention, the terminal further includes:
a third receiving module for receiving a third input;
a third response module for initiating an encryption input mode in response to the third input.
Optionally, in the above embodiment of the present invention, the third input includes:
a preset gesture input acting on the group chat interface; the preset gesture is used for starting or closing encryption input;
or,
clicking input of a virtual key acting on the group chat interface; the virtual key is used for starting or closing encryption input.
Optionally, in the foregoing embodiment of the present invention, the terminal further includes:
a fourth receiving module, configured to receive a fourth input, where the fourth input is used to select at least one group chat member in the group chat member list;
a fourth response module, configured to determine, in response to the fourth input, that fingerprint information of the group chat member selected by the fourth input has a right to decrypt the encrypted information.
The terminal provided by the embodiment of the present invention can implement each process implemented by the terminal in the method embodiments of fig. 1 to fig. 9, and is not described herein again to avoid repetition.
In summary, in the above embodiments of the present invention, the fingerprint information corresponding to the first input directly encrypts the first input information and then sends the encrypted information, so that the group chat user can perform the fifth input in the display area of the encrypted information, and the decryption function is realized by the fingerprint information corresponding to the fifth input, so that the operation is simple, the compatibility is strong, and no other special dependence is required; the public information can be directly subjected to reading authority management according to the fingerprint information, the user operation is simple and convenient, and the information safety is effectively improved.
It should be noted that, the terminal provided in the embodiments of the present invention is a terminal capable of executing the information encryption method, and all embodiments of the information encryption method are applicable to the terminal, and can achieve the same or similar beneficial effects.
As shown in fig. 14, an embodiment of the present invention further provides a terminal 400, where the terminal is a second terminal, and the terminal includes:
the information receiving module 401 receives encrypted information sent by a first terminal at a group chat interface;
a fifth receiving module 402, configured to receive a fifth input acting on the display area of the encrypted information;
a fifth response module 403, configured to respond to the fifth input, and if the fingerprint information corresponding to the fifth input has a right to decrypt the encrypted information, display information obtained by decrypting the encrypted information.
Optionally, in the foregoing embodiment of the present invention, the terminal further includes:
and the sixth response module is used for responding to the fifth input, and displaying prompt information if the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information, wherein the prompt information is used for indicating that the current user does not have the authority of viewing the encrypted information.
Optionally, in the foregoing embodiment of the present invention, the terminal further includes:
and the judging module is used for judging whether the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information.
Optionally, in the foregoing embodiment of the present invention, the determining module includes:
the first judgment sub-module is used for determining that the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information if the contact information of the opposite party is mutually stored by the user of the fingerprint information corresponding to the fifth input and the user of the fingerprint information used by the encrypted information; otherwise, determining that the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information;
and/or the presence of a gas in the gas,
a second determining sub-module, configured to determine that the fingerprint information corresponding to the fifth input has an authority to decrypt the encrypted information, if a time for the user of the fingerprint information corresponding to the fifth input to join the current group chat is greater than a preset value, and the time for the user of the fingerprint information corresponding to the fifth input to join the current group chat is greater than a time for the user of the fingerprint information used by the encrypted information to join the current group chat; otherwise, determining that the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information;
and/or the presence of a gas in the gas,
a third determining sub-module, configured to determine that the fingerprint information corresponding to the fifth input has an authority to decrypt the encrypted information if the user of the fifth input corresponding fingerprint information is a group administrator of the current group chat;
and/or the presence of a gas in the gas,
a fourth determining sub-module, configured to determine that the fingerprint information corresponding to the fifth input has an authority to decrypt the encrypted information if the fingerprint information corresponding to the fifth input is the fingerprint information of the group chat member selected by the first terminal and having the authority to decrypt the encrypted information; otherwise, determining that the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information.
The terminal provided in the embodiment of the present invention can implement each process implemented by the terminal in the method embodiments of fig. 10 to fig. 12, and is not described herein again to avoid repetition.
In summary, in the above embodiments of the present invention, the fingerprint information corresponding to the first input directly encrypts the first input information and then sends the encrypted information, so that the group chat user can perform the fifth input in the display area of the encrypted information, and the decryption function is realized by the fingerprint information corresponding to the fifth input, so that the operation is simple, the compatibility is strong, and no other special dependence is required; the public information can be directly subjected to reading authority management according to the fingerprint information, the user operation is simple and convenient, and the information safety is effectively improved.
It should be noted that, the terminal provided in the embodiment of the present invention is a terminal capable of executing the information decryption method, and all embodiments of the information decryption method are applicable to the terminal and can achieve the same or similar beneficial effects.
Fig. 15 is a schematic hardware structure diagram of a terminal for implementing various embodiments of the present invention, where the terminal 500 includes, but is not limited to: a radio frequency unit 501, a network module 502, an audio output unit 503, an input unit 504, a sensor 505, a display unit 506, a user input unit 507, an interface unit 508, a memory 509, a processor 510, and a power supply 511. Those skilled in the art will appreciate that the terminal configuration shown in fig. 15 is not intended to be limiting, and that the terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The radio frequency unit 501 is configured to receive a first input acting on a group chat interface;
a processor 510, configured to, in response to the first input, obtain input information of the first input, and encrypt the input information using fingerprint information corresponding to the first input;
a radio frequency unit 501, configured to receive a second input;
and a processor 510, configured to send the input information to perform encryption processing in response to the second input to obtain encrypted information.
Or, the radio frequency unit 501 is configured to receive, at the group chat interface, encrypted information sent by the first terminal; receiving a fifth input to the display area of the encrypted information;
and the processor 510 is configured to respond to the fifth input, and if the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information, display information obtained by decrypting the encrypted information.
In summary, in the above embodiments of the present invention, the fingerprint information corresponding to the first input directly encrypts the first input information and then sends the encrypted information, so that the group chat user can perform the fifth input in the display area of the encrypted information, and the decryption function is realized by the fingerprint information corresponding to the fifth input, so that the operation is simple, the compatibility is strong, and no other special dependence is required; the public information can be directly subjected to reading authority management according to the fingerprint information, the user operation is simple and convenient, and the information safety is effectively improved.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 501 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 510; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 501 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 501 can also communicate with a network and other devices through a wireless communication system.
The terminal provides wireless broadband internet access to the user through the network module 502, such as helping the user send and receive e-mails, browse web pages, access streaming media, and the like.
The audio output unit 503 may convert audio data received by the radio frequency unit 501 or the network module 502 or stored in the memory 509 into an audio signal and output as sound. Also, the audio output unit 503 may also provide audio output related to a specific function performed by the terminal 500 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 503 includes a speaker, a buzzer, a receiver, and the like.
The input unit 504 is used to receive an audio or video signal. The input Unit 504 may include a Graphics Processing Unit (GPU) 5041 and a microphone 5042, and the Graphics processor 5041 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 506. The image frames processed by the graphic processor 5041 may be stored in the memory 509 (or other storage medium) or transmitted via the radio frequency unit 501 or the network module 502. The microphone 5042 may receive sounds and may be capable of processing such sounds into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 501 in case of the phone call mode.
The terminal 500 also includes at least one sensor 505, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor includes an ambient light sensor that adjusts the brightness of the display panel 5061 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 5061 and/or a backlight when the terminal 500 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 505 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 506 is used to display information input by the user or information provided to the user. The Display unit 506 may include a Display panel 5061, and the Display panel 5061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 507 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal. Specifically, the user input unit 507 includes a touch panel 5071 and other input devices 5072. Touch panel 5071, also referred to as a touch screen, may collect touch operations by a user on or near it (e.g., operations by a user on or near touch panel 5071 using a finger, stylus, or any suitable object or attachment). The touch panel 5071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 510, and receives and executes commands sent by the processor 510. In addition, the touch panel 5071 may be implemented in various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 5071, the user input unit 507 may include other input devices 5072. In particular, other input devices 5072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 5071 may be overlaid on the display panel 5061, and when the touch panel 5071 detects a touch operation thereon or nearby, the touch operation is transmitted to the processor 510 to determine the type of the touch event, and then the processor 510 provides a corresponding visual output on the display panel 5061 according to the type of the touch event. Although in fig. 15, the touch panel 5071 and the display panel 5061 are two independent components to implement the input and output functions of the terminal, in some embodiments, the touch panel 5071 and the display panel 5061 may be integrated to implement the input and output functions of the terminal, and is not limited herein.
The interface unit 508 is an interface for connecting an external device to the terminal 500. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 508 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the terminal 500 or may be used to transmit data between the terminal 500 and external devices.
The memory 509 may be used to store software programs as well as various data. The memory 509 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 509 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 510 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by operating or executing software programs and/or modules stored in the memory 509 and calling data stored in the memory 509, thereby performing overall monitoring of the terminal. Processor 510 may include one or more processing units; preferably, the processor 510 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 510.
The terminal 500 may further include a power supply 511 (e.g., a battery) for supplying power to various components, and preferably, the power supply 511 may be logically connected to the processor 510 through a power management system, so that functions of managing charging, discharging, and power consumption are performed through the power management system.
In addition, the terminal 500 includes some functional modules that are not shown, and are not described in detail herein.
Preferably, an embodiment of the present invention further provides a terminal, including a processor, a memory, and a computer program stored in the memory and capable of running on the processor, where the computer program, when executed by the processor, implements each process of the above-mentioned information encryption method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned information encryption method embodiment, and can achieve the same technical effect, and in order to avoid repetition, the detailed description is omitted here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
Preferably, an embodiment of the present invention further provides a terminal, which includes a processor, a memory, and a computer program stored in the memory and capable of running on the processor, where the computer program, when executed by the processor, implements each process of the above-mentioned information decryption method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned information decryption method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (7)
1. An information encryption method applied to a first terminal is characterized by comprising the following steps:
receiving a first input acting on a group chat interface;
responding to the first input, acquiring input information of the first input, and encrypting the input information by using fingerprint information corresponding to the first input;
receiving a second input;
responding to the second input, sending the input information to carry out encryption processing to obtain encrypted information;
before receiving the first input acting on the group chat interface, the method further comprises:
receiving a third input;
initiating an encrypted input mode in response to the third input;
the third input comprises:
a preset gesture input acting on the group chat interface; the preset gesture is used for starting or closing encryption input;
or,
clicking input of a virtual key acting on the group chat interface; the virtual key is used for starting or closing encryption input;
the third input specifically includes:
in the group chat interface, acting on a preset sliding distance input from the edge of the keyboard area to the inside, starting encryption input or closing encryption input;
after the encryption input is started through the preset gesture input, the background color of the keyboard area is changed into gray or other dark colors, and after the encryption input is closed, the background color of the keyboard area is restored to the original color;
or,
setting a virtual key for starting or closing encryption input in a keyboard area in the group chat interface, acting on click input of the virtual key, and starting or closing an encryption input function;
after the encryption input is started through the click input of the virtual key, the background color of the keyboard area is changed into gray or other dark colors, and after the encryption input is closed, the background color of the keyboard area is restored to the original color;
prior to the receiving the second input, the method further comprises:
receiving a fourth input for selecting at least one group chat member in the group chat member list;
in response to the fourth input, determining that fingerprint information of the group chat member selected by the fourth input has the authority to decrypt the encrypted information.
2. An information decryption method applied to a second terminal is characterized by comprising the following steps:
receiving encrypted information sent by a first terminal at a group chat interface;
receiving a fifth input to the display area of the encrypted information;
responding to the fifth input, and if the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information, displaying the information after decrypting the encrypted information;
the method further comprises the following steps:
judging whether the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information;
the determining whether the fingerprint corresponding to the fifth input has the right to decrypt the encrypted information includes:
if the contact information of the opposite side is stored between the user of the fingerprint information corresponding to the fifth input and the user of the fingerprint information used by the encrypted information, determining that the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information; otherwise, determining that the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information;
or,
if the time for the user who inputs the corresponding fingerprint information to join the current group chat is longer than a preset value, and the time for the user who inputs the corresponding fingerprint information to join the current group chat is longer than the time for the user who uses the fingerprint information used by the encrypted information to join the current group chat, determining that the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information; otherwise, determining that the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information;
or,
if the user of the fifth input corresponding fingerprint information is a group manager of the current group chat, determining that the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information;
or,
if the fingerprint information corresponding to the fifth input is the fingerprint information of the group chat member selected by the first terminal and having the authority of decrypting the encrypted information, determining that the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information; otherwise, determining that the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information.
3. The method of claim 2, further comprising:
responding to the fifth input, and if the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information, displaying prompt information, wherein the prompt information is used for indicating that the current user does not have the authority of viewing the encrypted information.
4. A terminal, the terminal being a first terminal, comprising:
the device comprises a first receiving module, a second receiving module and a third receiving module, wherein the first receiving module is used for receiving a first input acting on a group chat interface;
the first response module is used for responding to the first input, acquiring input information of the first input and encrypting the input information by utilizing fingerprint information corresponding to the first input;
the second receiving module is used for receiving a second input;
the second response module is used for responding to the second input and sending the input information to carry out encryption processing to obtain encrypted information;
the terminal further comprises:
a third receiving module for receiving a third input;
a third response module for initiating an encrypted input mode in response to the third input;
the third input comprises:
a preset gesture input acting on the group chat interface; the preset gesture is used for starting or closing encryption input;
or,
clicking input of a virtual key acting on the group chat interface; the virtual key is used for starting or closing encryption input;
the third input specifically includes:
in the group chat interface, acting on a preset sliding distance input from the edge of the keyboard area to the inside, starting encryption input or closing encryption input;
after the encryption input is started through the preset gesture input, the background color of the keyboard area is changed into gray or other dark colors, and after the encryption input is closed, the background color of the keyboard area is restored to the original color;
or,
setting a virtual key for starting or closing encryption input in a keyboard area in the group chat interface, acting on click input of the virtual key, and starting or closing an encryption input function;
after the encryption input is started through the click input of the virtual key, the background color of the keyboard area is changed into gray or other dark colors, and after the encryption input is closed, the background color of the keyboard area is restored to the original color;
the terminal further comprises:
a fourth receiving module, configured to receive a fourth input, where the fourth input is used to select at least one group chat member in the group chat member list;
a fourth response module, configured to determine, in response to the fourth input, that fingerprint information of the group chat member selected by the fourth input has a right to decrypt the encrypted information.
5. A terminal, the terminal being a second terminal, comprising:
the information receiving module is used for receiving encrypted information sent by a first terminal at a group chat interface;
a fifth receiving module for receiving a fifth input acting on a display area of the encrypted information;
a fifth response module, configured to respond to the fifth input, and if fingerprint information corresponding to the fifth input has a right to decrypt the encrypted information, display information obtained by decrypting the encrypted information;
the terminal further comprises:
the judging module is used for judging whether the fingerprint information corresponding to the fifth input has the authority of decrypting the encrypted information;
the judging module comprises:
the first judgment sub-module is used for determining that the fingerprint information corresponding to the fifth input has the authority to decrypt the encrypted information if the contact information of the opposite party is mutually stored by the user of the fingerprint information corresponding to the fifth input and the user of the fingerprint information used by the encrypted information; otherwise, determining that the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information;
and/or the presence of a gas in the gas,
a second determining sub-module, configured to determine that the fingerprint information corresponding to the fifth input has an authority to decrypt the encrypted information, if a time for the user of the fingerprint information corresponding to the fifth input to join the current group chat is greater than a preset value, and the time for the user of the fingerprint information corresponding to the fifth input to join the current group chat is greater than a time for the user of the fingerprint information used by the encrypted information to join the current group chat; otherwise, determining that the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information;
and/or the presence of a gas in the gas,
a third determining sub-module, configured to determine that the fingerprint information corresponding to the fifth input has an authority to decrypt the encrypted information if the user of the fifth input corresponding fingerprint information is a group administrator of the current group chat;
and/or the presence of a gas in the gas,
a fourth determining sub-module, configured to determine that the fingerprint information corresponding to the fifth input has an authority to decrypt the encrypted information if the fingerprint information corresponding to the fifth input is the fingerprint information of the group chat member selected by the first terminal and having the authority to decrypt the encrypted information; otherwise, determining that the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information.
6. The terminal of claim 5, further comprising:
and the sixth response module is used for responding to the fifth input, and displaying prompt information if the fingerprint information corresponding to the fifth input does not have the authority of decrypting the encrypted information, wherein the prompt information is used for indicating that the current user does not have the authority of viewing the encrypted information.
7. A terminal comprising a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the information encryption method of claim 1; alternatively, the computer program realizes the steps of the information decryption method according to any one of claims 2 to 3 when executed by the processor.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910433794.3A CN110188524B (en) | 2019-05-23 | 2019-05-23 | Information encryption method, information decryption method and terminal |
PCT/CN2020/080688 WO2020233218A1 (en) | 2019-05-23 | 2020-03-23 | Information encryption method, information decryption method, and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910433794.3A CN110188524B (en) | 2019-05-23 | 2019-05-23 | Information encryption method, information decryption method and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110188524A CN110188524A (en) | 2019-08-30 |
CN110188524B true CN110188524B (en) | 2021-07-27 |
Family
ID=67717413
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910433794.3A Active CN110188524B (en) | 2019-05-23 | 2019-05-23 | Information encryption method, information decryption method and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110188524B (en) |
WO (1) | WO2020233218A1 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110188524B (en) * | 2019-05-23 | 2021-07-27 | 维沃移动通信有限公司 | Information encryption method, information decryption method and terminal |
CN111431795B (en) * | 2020-03-19 | 2022-05-03 | 维沃移动通信有限公司 | Shared content display method and electronic equipment |
CN111581622A (en) * | 2020-05-09 | 2020-08-25 | 维沃移动通信有限公司 | Information processing method and device and electronic equipment |
CN112163239A (en) * | 2020-09-29 | 2021-01-01 | 维沃移动通信有限公司 | Privacy information protection method and device and electronic equipment |
CN113343321B (en) * | 2021-06-29 | 2022-09-13 | 维沃移动通信有限公司 | Information display method, information display device, electronic apparatus, and readable storage medium |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100493045C (en) * | 2005-09-30 | 2009-05-27 | 腾讯科技(深圳)有限公司 | Group message transmitting method, transmitting client and system |
CN102833243B (en) * | 2012-08-21 | 2016-02-03 | 鹤山世达光电科技有限公司 | A kind of communication means utilizing finger print information |
CN102970659A (en) * | 2012-11-12 | 2013-03-13 | 广东欧珀移动通信有限公司 | Method for encryption transmission of short message |
US10200345B2 (en) * | 2013-10-29 | 2019-02-05 | Uniloc 2017 Llc | Electronic mail sender verification |
GB2540138A (en) * | 2015-07-02 | 2017-01-11 | Ketheeswaran Gopalan | Method of exchanging digital content |
CN107453975A (en) * | 2016-05-31 | 2017-12-08 | 北京北信源软件股份有限公司 | It is close in a kind of instant messaging group to chat method |
CN107666395A (en) * | 2016-07-28 | 2018-02-06 | 中兴通讯股份有限公司 | One population file management method, user terminal, group chat system |
KR102666331B1 (en) * | 2016-11-11 | 2024-05-17 | 삼성전자주식회사 | A method and terminal device for encrypting a message |
CN107066891B (en) * | 2017-05-10 | 2023-04-07 | 维沃移动通信有限公司 | Shooting method and mobile terminal |
CN109088810A (en) * | 2017-06-14 | 2018-12-25 | 北京信威通信技术股份有限公司 | Communication means, device, relevant device, system and the storage medium of group message |
CN107920017A (en) * | 2017-11-27 | 2018-04-17 | 唐佐 | A kind of chat record and content time slot scrambling |
CN110188524B (en) * | 2019-05-23 | 2021-07-27 | 维沃移动通信有限公司 | Information encryption method, information decryption method and terminal |
-
2019
- 2019-05-23 CN CN201910433794.3A patent/CN110188524B/en active Active
-
2020
- 2020-03-23 WO PCT/CN2020/080688 patent/WO2020233218A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
CN110188524A (en) | 2019-08-30 |
WO2020233218A1 (en) | 2020-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110188524B (en) | Information encryption method, information decryption method and terminal | |
CN107145795B (en) | Screenshot method and device and computer equipment | |
CN109194818B (en) | Information processing method and terminal | |
CN108595946B (en) | Privacy protection method and terminal | |
CN107784089B (en) | Multimedia data storage method, processing method and mobile terminal | |
CN109241775B (en) | Privacy protection method and terminal | |
CN109145552B (en) | Information encryption method and terminal equipment | |
CN108629171B (en) | Unread message processing method and terminal | |
CN111125770A (en) | Privacy protection method and electronic equipment | |
CN110990849A (en) | Encryption and decryption method for private data and terminal | |
CN110149628B (en) | Information processing method and terminal equipment | |
CN110035183B (en) | Information sharing method and terminal | |
CN109446794B (en) | Password input method and mobile terminal thereof | |
CN111125680A (en) | Permission setting method and terminal equipment | |
CN108540645B (en) | Mobile terminal operation method and mobile terminal | |
CN110795746B (en) | Information processing method and electronic equipment | |
CN109753776B (en) | Information processing method and device and mobile terminal | |
CN110225192B (en) | Message display method and mobile terminal | |
CN111310250A (en) | Application sharing method and electronic equipment | |
CN115174758B (en) | Picture encryption method and device, electronic equipment and storage medium | |
WO2019206224A1 (en) | Screen unlocking method and mobile terminal | |
CN110191106A (en) | A kind of data transmission method for uplink, terminal and communication system | |
CN106529335B (en) | Method and device for limiting screenshot and portable mobile terminal | |
CN110717163B (en) | Interaction method and terminal equipment | |
CN111475067B (en) | Message indication method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |