Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal encryption method and encryption device, terminal decryption method and decryption device

An encryption method and encryption device technology, applied in the field of electronic information, can solve problems such as cash loss, password guessing, and easy manipulation by others, and achieve the effects of improving efficiency, improving security, improving efficiency and convenience

Active Publication Date: 2018-09-04
HUAQIN TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of these two authentication methods is that the password is easily guessed by a peeping person through the captured decryption process
When a mobile terminal (such as a mobile phone) is lost or stolen, it is easy to be manipulated by others, resulting in the loss of important data or even the loss of cash
For example: if the mobile phone installed with Yu'E Bao or the clients of various banks is stolen, if the password is stolen by others in advance, the user's property security will be seriously threatened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal encryption method and encryption device, terminal decryption method and decryption device
  • Terminal encryption method and encryption device, terminal decryption method and decryption device
  • Terminal encryption method and encryption device, terminal decryption method and decryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the object, technical solution and advantages of the present invention clearer, various embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.

[0046] The first embodiment of the present invention relates to a terminal encryption method, specifically as figure 1 shown, including the following steps:

[0047] Step 101, providing an initial encryption interface.

[0048] The initial encryption interface in this embodiment includes a plurality of different icons, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the technical field of electronic information and discloses a terminal encryption method and apparatus and a terminal decryption method and apparatus. According to the terminal encryption method and apparatus and the terminal decryption method and apparatus, the terminal decryption method comprises the following steps that: an initial decryption interface is provided, wherein the initial decryption interface comprises a plurality of different icons; according to decryption operation of a user, shift processing is carried out on the icons in the initial decryption interface to obtain a verification decryption interface; icon information of a password position in the verification decryption interface is acquired; and when the icon information is the same as password information, decryption succeeds. Compared to the prior art, the terminal authorization security can be improved and privacy information of the user is protected.

Description

technical field [0001] The present invention relates to the technical field of electronic information, in particular to an encryption method and an encryption device for a terminal, a decryption method and a decryption device for a terminal. Background technique [0002] With the popularization of mobile terminals, users currently store a lot of private and sensitive data in the mobile terminal, which puts forward higher requirements for authentication security of the mobile terminal. Common authentication identification methods include: digital password authentication method and gesture authentication method. The disadvantage of these two authentication methods is that the password is easily guessed by voyeurs through the captured decryption process. When a mobile terminal (such as a mobile phone) is lost or stolen, it is easy to be manipulated by others to cause loss of important data or even cash. For example: if the mobile phone installed with Yu'e Bao or the clients o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/36
Inventor 李柯材宋江超赵春兰
Owner HUAQIN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products