CN110069938A - A kind of method, equipment and storage medium for protecting contact data - Google Patents

A kind of method, equipment and storage medium for protecting contact data Download PDF

Info

Publication number
CN110069938A
CN110069938A CN201810067932.6A CN201810067932A CN110069938A CN 110069938 A CN110069938 A CN 110069938A CN 201810067932 A CN201810067932 A CN 201810067932A CN 110069938 A CN110069938 A CN 110069938A
Authority
CN
China
Prior art keywords
contact information
contact
equipment
data
parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810067932.6A
Other languages
Chinese (zh)
Inventor
寇磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201810067932.6A priority Critical patent/CN110069938A/en
Publication of CN110069938A publication Critical patent/CN110069938A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The embodiment of the invention discloses a kind of method, equipment and storage mediums for protecting contact data, wherein the described method includes: receiving the contact data that the first equipment is sent, the contact data includes at least contact information;If the contact data includes preset mark, the parameter for the control field for including in the contact data is obtained;According to the parameter of the control field, the contact information in the contact data is handled.

Description

A kind of method, equipment and storage medium for protecting contact data
Technical field
The present invention relates to Data Protection Technologies more particularly to a kind of method for protecting contact data, equipment and storage to be situated between Matter.
Background technique
There is many unsafe factors when phone directory in using smart phones, arrive external equipment for example, sharing The contact data of (for example, mobile unit) resides in for a long time is possible to that contact data is caused to reveal in external equipment, then For example, leave the contact data of some entity or individual for, the connection number that these entity or individual can will usually obtain According to the third party is given to, this has just caused the serious problems such as various harassing calls even telecommunication fraud.
Summary of the invention
To solve existing technical problem, the embodiment of the present invention provides a kind of method of protection contact data, sets Standby and storage medium can control the connection shared and arrive each electronic equipment by the way that control field is arranged in contact data in time It is personal data, and then ensure that the safety of the contact data of user.
The technical solution of the embodiment of the present invention is achieved in that
The embodiment of the present invention provides a kind of method for protecting contact data, which comprises
The contact data of the first equipment transmission is received, the contact data includes at least contact information;
If the contact data includes preset mark, the control field for including in the contact data is obtained Parameter;
According to the parameter of the control field, the contact information in the contact data is handled.
The embodiment of the present invention provides a kind of method for protecting contact data, which comprises
If receiving the control instruction for the contact information of input, is determined and controlled according to the control instruction The parameter of field;Wherein, the control instruction of the input is used to be arranged the parameter of the control field;
Preset mark is obtained according to the parameter of the control field;
The parameter of the control field, preset mark and contact information are packaged, contact data is obtained;
The contact data is sent to the second equipment.
The embodiment of the present invention provides a kind of equipment for protecting contact data, and the equipment includes at least: processor and matching It is set to the storage medium of storage executable instruction, in which:
Processor is configured to execute the executable instruction of storage, and the executable instruction is configured to execute above-mentioned protection connection It is the method for personal data;Alternatively, the executable instruction is configured to the method for executing above-mentioned protection contact data.
The embodiment of the present invention provides a kind of computer readable storage medium, is stored in the computer readable storage medium Computer executable instructions, the computer executable instructions are configured to the method for executing above-mentioned protection contact data;Alternatively, The executable instruction is configured to the method for executing above-mentioned protection contact data.
The embodiment of the invention provides a kind of method, equipment and storage mediums for protecting contact data, wherein receives the The contact data that one equipment is sent, the contact data include at least contact information;If the contact data packet Containing preset mark, the parameter for the control field for including in the contact data is obtained;According to the parameter of the control field, Contact information in the contact data is handled.In this way, by adding control field, energy in contact data It is enough that timely the contact information in contact data is controlled, ensure that the safety of contact information of customer.
Detailed description of the invention
In attached drawing (it is not necessarily drawn to scale), similar appended drawing reference can describe phase in different views As component.Similar reference numerals with different letter suffix can indicate the different examples of similar component.Attached drawing with example and Unrestricted mode generally shows each embodiment discussed herein.
Figure 1A is the implementation process schematic diagram for the method that the embodiment of the present invention protects contact data;
Figure 1B is the schematic diagram of the second device forwards of embodiment of the present invention contact information;
Fig. 1 C is the schematic diagram of the different device forwards contact information of the embodiment of the present invention;
Fig. 2 is the implementation process schematic diagram of the method for the another protection contact data of the embodiment of the present invention;
Fig. 3 is the definition format schematic diagram of control field of the embodiment of the present invention;
Fig. 4 is the structural schematic diagram for the sending device that the embodiment of the present invention protects contact data;
Fig. 5 is the form schematic diagram of the corresponding data packet of contact data of the embodiment of the present invention;
Fig. 6 is the structural schematic diagram for the reception device that the embodiment of the present invention protects contact data;
Fig. 7 is the implementation process schematic diagram for the method that the embodiment of the present invention further protects contact data;
Fig. 8 is the implementation process schematic diagram of the method for another protection contact data of the embodiment of the present invention;
Fig. 9 is the composed structure schematic diagram for the receiving device that the embodiment of the present invention protects contact data;
Figure 10 is the composed structure schematic diagram for the sending device that the embodiment of the present invention protects contact data.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Equipment can be implemented in a variety of manners.For example, equipment described in the present invention may include such as mobile phone, plate Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer etc. move The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile device as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special Except element for moving purpose, equipment that the construction of embodiment according to the present invention can also apply to fixed type.
The embodiment of the present invention provides a kind of method for protecting contact data, and this method is applied to the reception of contact information Equipment (the second equipment), Figure 1A are the implementation process schematic diagram for the method that the embodiment of the present invention protects contact data, such as Figure 1A It is shown, this method comprises:
Step S101, the second equipment receive the contact data that the first equipment is sent, and the contact data includes at least Contact information.
Here, first equipment, which can be mobile phone, tablet computer, laptop, palm PC etc., has communication function The electronic equipment of energy.The contact information includes: name of contact person, phone, address information, e-mail address, personal net The information such as page network address, photo.First equipment is by the contact data with electronic business card (Virtual Card, vCard) File format be sent to the second equipment, wherein the second equipment can be identical or different with the first equipment.
Step S102, if the contact data includes preset mark, the second equipment obtains the contact data In include control field parameter.
Here, the preset mark can be the additional letter added in the corresponding data packet of the contact data Breath, for example, the data of sub-fraction.The parameter of the control field includes at least one of following parameter: time-to-live threshold value, the One hop count threshold value and the second hop count threshold value, wherein the time-to-live threshold value is that the contact information is set second The max-thresholds of time-to-live in standby, the first hop count threshold value are the contact information by the second device forwards Time that the max-thresholds of number, the second hop count threshold value are forwarded by the contact information by variant equipment relay Several max-thresholds.
Step S103, the second equipment believe the contact person in the contact data according to the parameter of the control field Breath is handled.
Here, the step S103, i.e., " the second equipment according to the parameter of the control field, to the contact data In contact information handled ", can at least be realized by three kinds of modes:
Wherein, mode one: when the parameter of the control field is time-to-live threshold value, if the contact information exists When time-to-live in second equipment is greater than the time-to-live threshold value, contact information is deleted;If the contact information When time-to-live in the second equipment is less than or equal to the time-to-live threshold value, retain contact information.
Mode two: when parameter the first hop count threshold value of the control field, if the contact information is by The number of two device forwards is greater than the first hop count threshold value, forbids the contact information being forwarded to other equipment;If The contact information is less than or equal to the first hop count threshold value by the number of the second device forwards, by the contact information It is forwarded in corresponding equipment.
Mode three: when parameter the second hop count threshold value of the control field, if the contact information is not by Number with equipment relay forwarding is greater than the second hop count threshold value, other will be forwarded to for the contact information by, which forbidding, sets It is standby;If the number that the contact information is forwarded by distinct device relay is less than or equal to the second hop count threshold value, by institute Contact information is stated to be forwarded in corresponding equipment.
In embodiments of the present invention, firstly, receiving the contact data that the first equipment is sent, the contact data is at least Including contact information;Secondly, obtaining in the contact data if the contact data includes preset mark and including Control field parameter;Finally, according to the parameter of the control field, to the contact information in the contact data into Row processing.In this way, can timely be believed the contact person in contact data by adding control field in contact data Breath is controlled, and is ensured that the safety of contact information of customer, is greatly improved the experience sense of user.
In other embodiments, the S102, i.e., " if the contact data includes preset mark, described in acquisition The parameter for the control field for including in contact data ", comprising: if comprising pre- in the corresponding data packet of the contact data If mark, the contact data is decrypted first, obtains the control field for including in the contact data Parameter.
In other embodiments, in the step S103, i.e., " according to the parameter of the control field, to the contact person Contact information in data is handled " before, the method also includes:
Step S11 will if the contact information and any one contact information in preset database are different The contact information is stored in preset database;Wherein, the preset database includes N number of contact information;N is Natural number greater than 0;
Step S12 is not protected if the contact information is identical as any one contact information in preset database Deposit the contact information.
The embodiment of the present invention provides a kind of method for protecting contact data, and this method is applied to protection contact data Interactive system, the interactive system include the receiving device of sending device (the first equipment) and contact information of contact information (the second equipment).Fig. 2 is the implementation process schematic diagram of the method for the another protection contact data of the embodiment of the present invention, such as Fig. 2 institute Show, which comprises
Step S201, if the first equipment receives the control instruction for the contact information of input, according to institute State the parameter that control instruction determines control field.
Here, the control instruction of the input is used to be arranged the parameter of the control field.
Step S202, the first equipment obtain preset mark according to the parameter of the control field.
Here, the preset mark for distinguish include control field parameter contact data and not comprising having The contact data of the parameter of control field.
The parameter of the control field, preset mark and contact information are packaged, obtain by step S203, the first equipment The corresponding data packet of contact information.
Preset mark is placed on the head of the data packet, obtains contact data by step S204.
Step S205 encrypts the contact data, obtains encrypted contact data.
Here, it is described by the parameter of the control field, it is preset mark and contact information be packaged, show in contact person Parameter, preset mark and the contact information of control field are included at least in the corresponding data packet of data, it can be understood as will The parameter of the control field, preset mark and contact information construct the vCard file with control field.
The encrypted contact data is sent to the second equipment by step S206, the first equipment.
Step S207, the second equipment receive the contact data that the first equipment is sent.
Here, the contact data includes at least contact information.
Step S208, the judgement of the second equipment learn that the contact data includes preset mark, the contact data It is decrypted, obtains the parameter and contact information of the control field.
Wherein, the parameter of control field includes at least one of following parameter: time-to-live threshold value, the first hop count threshold value With the second hop count threshold value, wherein the time-to-live threshold value be time-to-live of the contact information in the second equipment Max-thresholds, the first hop count threshold value be the contact information by the maximum threshold of the number of the second device forwards Value, the maximum threshold for the number that the second hop count threshold value is forwarded by the contact information by variant equipment relay Value.From the definition of the first hop count threshold value as can be seen that the first hop count threshold value is the forwarding to the second equipment from range On limitation, i.e. contact information cannot be transmitted to excessive equipment by the second equipment, such as the second equipment can only be by contact person Information is transmitted to 3 equipment (assuming that the first hop count threshold value is 3), when the second equipment is want contact information being transmitted to the 4th A equipment, then the forwarding of the second equipment will be restricted, such as situations such as retransmission failure will be will appear.And it is forwarded from second Frequency threshold value definition as can be seen that the second hop count threshold value it is targeted be limitation of the contact information in depth.? In the meaning of second hop count threshold value, contact information seems the relay baton of stadium, then the connection as relay baton People's information cannot be gone down by unconfined handover (forwarding), if the second hop count threshold value is set as 2, it is preceding twice Forwarding is allowed, and subsequent forwarding will be restricted, it is assumed that contact information is forwarded to the second equipment (by the first equipment Relay baton handover, i.e. first time contact information forward), then contact information is forwarded to third equipment by the second equipment (second of relay baton handover, i.e. second of contact information forwarding);From the first equipment to the contact information of third equipment Forwarding is allowed, but if third equipment is wanted contact information being transmitted to the 4th equipment, third equipment will It is restricted, it is possible that forwarding unsuccessful situation.
Step S209, the second equipment believe the contact person in the contact data according to the parameter of the control field Breath is handled.
In other embodiments, in the step S207, i.e. the second equipment receives the contact data that the first equipment is sent Later, the method also includes following steps:
Step S271, if the contact information and any one contact information in preset database are different, The contact information is stored in preset database by the second equipment.
Here, stating preset database includes N number of contact information;N is the natural number greater than 0.
Step S272, if the contact information is identical as any one contact information in preset database, the Two equipment do not save the contact information.
Here, described " if the contact information is identical as any one contact information in preset database, no Save the contact information " show that the contact information described in the preset database is all unique, i.e., one connection Be that people's information can only correspond to a contact person, cannot multiple contact persons all save identical contact information, it is therefore prevented that Yong Hushou Unloading another contact person different at name after to the contact data with control field.
In the method for protection contact data provided in an embodiment of the present invention, by the way that control will be increased in contact data Field processed, the contact information that timely can not only be clearly retained in other equipment, can also control described in device forwards The number of contact information more comprehensively ensure that the safety of contact information, sense that the user experience is improved.
In other embodiments, for realizing the step S103, i.e., " according to the parameter of the control field, to described Contact information in contact data is handled ", or, the step S207, i.e., " the second equipment is according to the control field Parameter, the contact information in the contact data is handled ", at least three kinds of modes make the following instructions:
Mode one: when the control field is the time-to-live threshold value, the parameter according to the control field, Contact information in the contact data is handled, comprising the following steps:
Step S21, if time-to-live of the contact information in second equipment is greater than the time-to-live Threshold value deletes the contact information.
Here, the contact data is decrypted first, then, obtains control field in the contact data Parameter is the max-thresholds of time-to-live of the contact information in the second equipment.If the contact information is described Time-to-live in second equipment is greater than the max-thresholds of the time-to-live, and the second equipment deletes the contact information. For example, the max-thresholds of time-to-live of the contact information in the second equipment are 10 hours, when the contact person believes When ceasing time-to-live in second equipment and being greater than 10 hours, phone book applications in the second equipment can without with Agree to voluntarily delete the contact information in family.
Step S22, if time-to-live of the contact information in second equipment is not more than the survival Between threshold value, the contact information remains in the second equipment.
Here, if time-to-live of the contact information in second equipment is less than the time-to-live most Big threshold value, the second equipment remain in the contact information in the second equipment.For example, the contact information is second The max-thresholds of time-to-live in equipment are 10 hours, when survival of the contact information in second equipment Between less than 10 hours when, the second equipment remains in the contact information in second equipment.
Mode two: described according to the control when the parameter of the control field is the first hop count threshold value The parameter of field handles the contact information in the contact data, comprising the following steps:
Step S31, if receive input for forwarding the forwarding of the contact information to instruct, obtain the connection The number that people's information has been forwarded by the second equipment.
Here, the contact data is decrypted first, then, obtains control field in the contact data Parameter is the contact information by the max-thresholds of the number of the second device forwards.If receive user input for turn The forwarding instruction for sending out contact information described, the second equipment obtain the number that the contact information has been forwarded by the second equipment. For example, as shown in Figure 1B, before user wants the contact information being forwarded to the 5th equipment respectively from the second equipment, institute It states contact information and has already passed through and arrived third equipment and the 4th equipment by the second device forwards, comprising the following steps:
Contact information is sent the second equipment by step S311, the first equipment.
Contact information is sent third equipment by step S312, the second equipment.
Contact information is sent the 4th equipment by step S313, the second equipment.
Step S314, in advance by contact information from the second device forwards to the 5th equipment.
In fig. ib, user is used for by user interface (User Interface, UI) the interface input in the second equipment The forwarding of the contact information is forwarded to instruct, the second equipment obtains the contact information by second according to forwarding instruction The number that equipment has forwarded, for example, the contact information is forwarded to third equipment and the 5th equipment by the second equipment, that The number that the contact information has been forwarded by the second equipment is 2.
Step S32, if the number that the contact information has been forwarded by the second equipment is more than or equal to first forwarding Frequency threshold value forbids for the contact information being forwarded to the corresponding equipment of the forwarding instruction.
Here, described " the step S32, if the number that the contact information has been forwarded by the second equipment is more than or equal to institute The first hop count threshold value is stated, forbids for the contact information being forwarded to the corresponding equipment of the forwarding instruction " it is also possible that Second equipment is every to forward the primary contact information, and the first hop count threshold value subtracts 1, if forwarding the connection The threshold value after reducing before people's information less than 0, forbid for the contact information being forwarded to the forwarding instruct it is corresponding Equipment.
As shown in Figure 1B, if, the contact information is 2 by the max-thresholds of the number of the second device forwards, described Forwarding instruction is used to indicate the second equipment and the contact information is forwarded in the 5th equipment;When the second equipment is by the connection When people's information is forwarded to five equipment, the contact information is 3 by the number of the second device forwards, is greater than the contact person and believes Breath is by the max-thresholds 2 of the number of the second device forwards, then the contact information cannot be forwarded to by second equipment The forwarding instructs corresponding i.e. the 5th equipment of equipment.
The step S32, i.e., " if the number that has been forwarded by the second equipment of the contact information is more than or equal to described the One hop count threshold value forbids for the contact information being forwarded to the corresponding equipment of the forwarding instruction " if may also is that The number that the contact information has been forwarded by the second equipment is more than or equal to the first hop count threshold value, and forbidding will be described It is that people's information is forwarded to any other equipment.
Step S33, if the number that the contact information has been forwarded by the second equipment is less than first hop count The contact information is forwarded in equipment corresponding with the forwarding instruction by threshold value, and updates the contact information quilt The number of second device forwards.
Here, described " the step S33, if the number that has been forwarded by the second equipment of the contact information is less than described the The contact information is forwarded in equipment corresponding with the forwarding instruction by one hop count threshold value, and is updated described It is people's information by the number of the second device forwards " it is also possible that second equipment is every to forward the primary contact information, institute It states the first hop count threshold value and subtracts 1, it, will if the threshold value after reducing before forwarding the contact information is more than or equal to 0 The contact information is forwarded in equipment corresponding with the forwarding instruction, and updates the contact information by the second equipment The number of forwarding.
As shown in Figure 1B, if, the forwarding instruction is to indicate that the contact information is forwarded to the 4th by the second equipment In equipment, the contact information is 2 by the max-thresholds of the number of the second device forwards, when the second equipment is by the contact person When information is forwarded to four equipment, the contact information is 2 by the number of the second device forwards, is equal to the contact information By the max-thresholds 2 of the number of the second device forwards, then second equipment contact information can be forwarded to The forwarding instructs in corresponding equipment in i.e. the 4th equipment, and by the contact information by the number of the second device forwards more New is 2.
Mode three: when the parameter of the control field is the second hop count threshold value, in the contact data It further include the number that the contact data is forwarded by relay;
Accordingly, according to the parameter of the control field, the contact information in the contact data is handled, The following steps are included:
Step S41, if receive input for forwarding the forwarding of the contact information to instruct, obtain the connection The number that people's information is forwarded by relay.
Here, firstly, the contact data is decrypted, then, control field in the contact data is obtained Parameter be to state the maximum for the number that the i.e. described contact information of the second hop count threshold value is forwarded by variant equipment relay Threshold value.If receive user's input for forwarding the forwarding of the contact information to instruct, (or other set the second equipment It is standby) obtain the number that the contact information is forwarded by variant equipment relay.As shown in Figure 1 C, wanting in user will be described Contact information from the second device forwards into third equipment before, the contact information has been sent to the 4th by the first equipment The contact information will be sent to the second equipment by equipment, the 4th equipment, comprising the following steps:
Contact information is sent the 4th equipment by step S411, the first equipment.
Contact information is sent the second equipment by step S412, the 4th equipment.
Step S413, in advance by contact information from the second device forwards to third equipment.
In fig. 1 c, user is inputted by the U/I interface in the second equipment for forwarding the forwarding of the contact information to refer to It enables, the second equipment obtains the number that the contact information is forwarded by variant equipment relay according to the forwarding instruction.The When contact information described in two device forwards, the contact information is by two different device forwards, i.e. the first equipment is by institute It states contact information and has been transmitted to the 4th equipment, the contact information has been transmitted to the second equipment again by the 4th equipment, so, The number that the contact information is forwarded by variant equipment relay is 3.
Step S42, if the number that the contact information is forwarded by relay is more than or equal to the second hop count threshold Value forbids for the contact information being forwarded to the corresponding equipment of the forwarding instruction.
Here, as shown in Figure 1 C, if, the maximum for the number that the contact information is forwarded by variant equipment relay Threshold value is 2, and the forwarding instruction is used to indicate the second equipment and the contact information is forwarded in third equipment;It sets when second For the number that when contact information is forwarded to third equipment, the contact information is forwarded by variant equipment relay It is 3, greater than the contact information by the max-thresholds 2 of the number of the second device forwards, then second equipment cannot incite somebody to action The contact information is forwarded to the forwarding and instructs corresponding equipment i.e. third equipment.
The step S43, i.e., " if the number that the contact information is forwarded by relay is more than or equal to second forwarding Frequency threshold value forbids for the contact information being forwarded to the corresponding equipment of the forwarding instruction " if may also is that described It is that the number that people's information is forwarded by relay is more than or equal to the second hop count threshold value, forbids forwarding the contact information To any other equipment.
Step S44, if the number that the contact information is forwarded by relay is less than the second hop count threshold value, more The number that the new contact information is forwarded by relay.
Here, as shown in Figure 1 C, if, the forwarding instruction is that the contact information is forwarded to by the second equipment of instruction In third equipment, the max-thresholds for the number that the contact information is forwarded by variant equipment relay are 3, when the second equipment When the contact information is forwarded to third equipment, the contact information is by the number that variant equipment relay is forwarded 3, equal to the contact information by the max-thresholds 3 of the number of the second device forwards, and by the contact information by respectively not The number forwarded with equipment relay is updated to 3.
Step S45, the number that the updated contact information is forwarded by relay, preset mark, the control The parameter and contact information of field, are determined as updated contact data.
The updated contact data is forwarded in equipment corresponding with the forwarding instruction by step S46.
Here, as shown in Figure 1 C, if, it is described when the contact information is forwarded to third equipment by the second equipment The number that contact information is forwarded by variant equipment relay is 3, equal to the contact information by the second device forwards The updated contact person (is believed the updated contact data by the max-thresholds 3 of number, second equipment Breath is by the number that relay forwards, preset mark, the parameter and contact information of the control field) it is forwarded to and the forwarding It instructs in corresponding equipment (i.e. in third equipment).
In addition to above-mentioned three kinds of modes, the step S103, i.e., " according to the parameter of the control field, to the connection Contact information in personal data is handled " or, the step S207, i.e., " the second equipment is according to the ginseng of the control field Number, handles the contact information in the contact data ", it can also be accomplished by the following way:
Step S51, when the parameter of the control field is to preset the identification information of the recipient of the contact information When set, user can specify one or more fixed equipment as recipient.
Here, the recipient can be the second equipment or other equipment;The identification information can be the electricity of recipient Talk about number, preset the identification information of the recipient of the contact information set can be recipient telephone number collection It closes.
Step S52 obtains the connection if receiving the transmission instruction for sending the contact information of input The identification information of the recipient of people's information;
Step S53, if any of the identification information of the recipient of the contact information and the set identify Information is all different, and forbids sending the contact information in equipment corresponding with the transmission instruction;
Step S54, if any of the identification information of the recipient of the contact information and the set identify Information is identical, and the contact information is forwarded in equipment corresponding with the forwarding instruction.
In addition, the parameter of the control field can also be multiple, for example, time-to-live threshold value, the first hop count threshold Any two in the set of the identification information of the recipient of value, the second hop count threshold value and the preset contact information Or three.
Generally, intelligent movable equipment room forwarding contact information is with vCard file format mostly, and vCard is a kind of The Standard File Format of electronic business card, the entitled dummy contact file of the suffix of respective file (Virtual Contact File, VCF).Electronic business card can be affixed in email message, can also be shared by other modes and be propagated, and ten thousand dimensions are such as passed through Net or instant message share the electronic business card.May include in vCard file the name of user, address information, telephone number, E-mail address, network address, mark, photo, audio clips etc..
When forwarding contact information using the format of vCard file, there are some unsafe factors, for example, cannot The contact information shared to everywhere is disposed in time, can not control the number that the contact information is forwarded, and is based on this, The embodiment of the present invention provides a kind of method for protecting contact data, and sending device passes through in the corresponding vCard of contact information Increase corresponding control field in file, receiving device according to the parameter in control field to the contact data received at Reason, so that the behavior of the receiving device of vCard file (the corresponding data packet of contact data) is limited, to prevent connection number occurs According to leakage, additionally it is possible to clear up " corpse " data being dispersed in each recipient's equipment in time to remove a hidden danger.
It is whole that the embodiment of the present invention can also be applied to the intelligence with store function, sending function, editing contact's function In end equipment.To facilitate understanding of the present embodiment of the invention, first to the corresponding vCard of contact information in intelligent terminal The general format of file (i.e. the corresponding data packet of contact data) does a simple illustration, as follows:
BEGIN:VCARD//start to edit vCard file;
The version of VERSION:2.1//vCard file is vCard2.1 version;
N;CHARSET=SHIFT_JIS;ENCODING=QUOTED-PRINTABLE:=82=B5=82=B5=82 =B5=82=B5=82=B5;;;;// name of contact person in the vCard file is encoded, the mode of coding with CHARSET and ENCODING is corresponding, that is to say, that after the completion of coding, vCard file is sent to the second equipment, second sets It is standby that vCard file is decoded, name of contact person is parsed according in CHARSET and ENCODING;
FN;CHARSET=SHIFT_JIS;ENCODING=QUOTED-PRINTABLE:=82=B5=82=B5=82 =B5=82=B5=82=B5//the format name of contact person in the vCard file is encoded;
SOUND;X-IRMC-N;CHARSET=SHIFT_JIS;ENCODING=QUOTED-PRINT ABLE:=BC= BC=BC=BC=BC;;;;// IRMC customized to user is encoded;
X-PHONETIC-LAST-NAME;CHARSET=SHIFT_JIS;ENCODING=QUOTE D-PRINTABLE: =BC=BC=BC=BC=BC//PHONETIC-LAST-NAME customized to user is encoded, wherein PHONETIC- The meaning expressed by LAST-NAME is by user's self-defining;
TEL;WORK:999-001-00032//designated contact telephone number;
EMAIL;OTHER:0032@0003.com//designated contact mail address;
X-DCM-STARRED:0//with 0 indicate terminate marker character;
END:VCARD//end editor's vCard file;
VCard file listed above includes:
BEGIN:VCARD indicates beginning-of-file label;
END:VCARD indicates end mark;
VERSION:2.1 indicates the version information of vCard standard, and wherein VERSION:2.1 indicates the contact information Corresponding vCard file uses vCard2.1 version;
N indicates the name of the contact person in vCard file;
FN indicates the format name (Format Name, FN) in vCard file;
SOUND indicates the digitized audio message in vCard file;
TEL indicates the telephone number of the contact person in vCard file;
CHARSET=SHIFT_JIS indicates the character set of name coding, and the character set encoded from name can be seen that this Example is Japanese character collection;
ENCODING=QUOTED-PRINTABLE indicates that this attribute encodes to the name;
The field of X- beginning indicates custom field, such as the X-PHONETIC-LAST-NAME in vCard file above And X-DCM-STARRED, these custom fields are also different according to its different use of customized content, therefore vCard file In the structure of a field may is that attribute-name+several parameter+codings.
In embodiments of the present invention, by adding control (CONTROL) field in vCard file and cooperating respective logic It provides for user and more preferably experiences.One includes that the vCard of control field can be expressed as follows: BEGIN:VCARD//beginning Edit vCard file;
..................
X-ZZZ-CONTROL;PARAM1;PARAM2......PARAMn;ENCODE:xxxxxx-xxxxxxxx//to The customized CONTROL field in family is encoded;
...................
END:VCARD//end editor's vCard file;
Act listed above includes in the vCard file of control field, wherein X-ZZZ-CONTROL includes: that X- is opened The field of head, indicates customized field;
ZZZ indicates average information, such as the information of some such as developers etc;
CONTROL indicates field name;
ENCODE indicates encoding to the custom field;
PARAM1;PARAM2......PARAMn, expression parameter part, the number of parameters is depending on user needs.
The control field can be used for controlling the contact information that transfers out, by by the ginseng in the control field Number is set as time-to-live threshold value, hop count threshold value (including the first hop count threshold value and second hop count threshold value), connects Identification information threshold value of receipts person etc. is leaked limiting data and gives the third party (i.e. the second equipment or other equipment).
Wherein, the time-to-live threshold value is expressed as the maximum of time-to-live of the contact information in the second equipment Threshold value;That is, be available after the contact information is transmitted to other equipment in time-to-live threshold value, for example, Such as limiting time-to-live threshold value is 1 hour, then electronic equipment phone book applications can be agreed to without user after 1 hour Voluntarily delete the contact information.
The identification information threshold value of the recipient indicates the identification information of the recipient of the preset contact information Set.That is, user can specify fixed one or several recipients according to the telephone number of recipient.If institute State the set of the identification information of the recipient of contact information and the identification information of the recipient of the preset contact information In any one identification information be all different, forbid sending the contact information to set corresponding with the transmission instruction In standby;If the mark of the recipient of the identification information of the recipient of the contact information and the preset contact information Any one identification information in the set of information is identical, and the contact information is forwarded to set corresponding with the forwarding instruction In standby.
The hop count includes the first hop count threshold value and the second hop count threshold value, wherein first forwarding Frequency threshold value is that the contact information is by the max-thresholds of the number of the second device forwards, the second hop count threshold value The max-thresholds for the number that the contact information is forwarded by variant equipment relay.For example, limit hop count threshold value as 1, then for the contact information after once forwarding, the equipment for receiving the contact information cannot again will be described Contact information is given to third equipment.
When the parameter of the control field includes time-to-live threshold value and hop count threshold value, as shown in figure 3, the control Field processed can indicate are as follows: custom field name-time-to-live threshold value-hop count threshold value-recipient.
The embodiment of the present invention provides a kind of sending device for protecting contact data, which can set by first Processor in standby is realized.Fig. 4 is the structural schematic diagram for the sending device that the embodiment of the present invention protects contact data, is such as schemed Shown in 4, which includes three modules: UI interactive module 401, building vCard file module 402 and sending module 403, in which:
UI interactive module 401, for providing a user the U/I interface of the customized control field of editable.
Here, user is inputted by the U/I interface for forwarding the forwarding of the contact information to instruct or pass through institute U/I interface input is stated for the control instruction for the contact information.
Construct vCard file module 402, for the input according to user in UI interactive module 401 control instruction or Person forwards instruction, generates with control instruction or forward the parameter of the corresponding control field of instruction, and by the control field Parameter pass to and give sending module 403.
If (parameter of the control field can be with for any one or more in the user setting parameter of control field It is: time-to-live threshold value, the first hop count threshold value and the second hop count threshold value), i.e., expression user wishes to enable control function Can, the contact information is controlled.According to the control instruction or forwarding of input of the user in UI interactive module 401 It instructs and adds control field in vCard file and the parameter of control field is set, and using sending device and receiving device The parsing concerted Encryption Algorithm of vCard module encrypts the contact information, finally corresponding in the contact information Plus mark, the parsing vCard module for being identified as sending device and receiving device is concerted default on the head of data packet Mark;The vCard file eventually formed is as shown in figure 5, be preset mark on the head of the data packet of the vCard file Know, the contact information in next (vCard1, vCard2, vCard3, vCardn) i.e. expression vCard file, For example, any one of vCard1 into vCardn can indicate a contact information, wherein contact information be can wrap Include name, telephone number, home address, email address, the personal address etc. of contact person.It such as crosses user and is not provided with control field In any parameter, then do not add control field in vCard file.
Sending module 403, for making the first equipment that the contact data is sent to other equipment.
Here, first equipment can pass through WLAN (Wireless Fidelity, WiFi), bluetooth, low coverage The contact data is sent from modes such as wireless communications (Near Field Communication, NFC).
The embodiment of the present invention provides a kind of reception device for protecting contact data, which can set by second Processor in standby is realized.Fig. 6 is the structural schematic diagram for the reception device that the embodiment of the present invention protects contact data, is such as schemed Shown in 6, which includes: receiving module 601, parsing vCard module 602 and control module 603, in which:
The receiving module 601, for receiving the contact data of the first equipment transmission.
Here, receiving module 601 can receive the contact data by WiFi, bluetooth, the modes such as NFC.
The parsing vCard module 602, for judging whether the head of the corresponding data packet of contact data includes parsing VCard module 602 and the concerted preset mark of sending device, if the head of the corresponding data packet of contact data includes The preset mark then illustrates to include control field in contact data, and the parsing vCard module 602 is literary by vCard Part (i.e. contact data) parses the parameter of control field again after being first decrypted correctly with decipherment algorithm, and by the control field Parameter pass to control module 603.
The control module 603, for the parameter according to the control field for parsing vCard module 602, to described It is that personal data is handled.
Fig. 7 is the implementation process schematic diagram for the method that the embodiment of the present invention further protects contact data, as shown in fig. 7, The method may include following steps:
Step S701, the first equipment provide the U/I interface for inputting the control instruction for being directed to contact information for user.
Step S702, the first equipment judge in the control instruction whether include control field parameter.
Here, the parameter of the control field can be time-to-live threshold value, the first hop count threshold value, the second forwarding time One or more of the set of identification information of recipient of number threshold value and the preset contact information.If the control Include the parameter of control field in system instruction, then enters step S703;If not comprising control field in the control instruction Parameter then enters step S705.
Step S703 constructs the vCard file with control field, and is encrypted with the concerted Encryption Algorithm of receiving device Contact data, finally on the head of vCard file plus mark.
Here, the vCard file of the building with control field can be the parameter of the control field, preset mark Know and contact information is packaged, obtains the corresponding data packet of contact data.It is used plus mark on the head in vCard file To distinguish the volume vCard file not comprising control field and the vCard file comprising control field.
Contact data is sent to receiving device by step S704, the first equipment.
Here, the receiving device can be the second equipment or other equipment.
Step S705, if in control instruction described in step S702 do not include control field parameter, building without The vCard file of control field simultaneously passes to sending module.
Here, the building without control field vCard file and pass to sending module and can be the connection People's information package obtains the corresponding data packet of contact data without control field.
Fig. 8 is the implementation process schematic diagram of the method for another protection contact data of the embodiment of the present invention, as shown in figure 8, This method comprises:
Step S801, the second equipment receive the corresponding data packet of connection number data.
Whether step S802, the second equipment according to the judgement of the default mark of the data packet header are wrapped in the data packet Containing control field.
Here, if including control field in the data packet, S804 is entered step;If do not wrapped in the data packet Containing control field, then S803 is entered step.
Step S803, the second equipment parse the data packet not comprising control field, obtain the data packet Corresponding contact information.
Step S804, the second equipment extract the parameter of control field to the packet decryption comprising control field, Obtain the corresponding contact information of the data packet.
Step S805 stores the parameter of contact information obtained in the step 804 and the control field to pre- If database in.
Here, if the contact information and any one contact information in preset database are different, by institute Contact information is stated to be stored in preset database;Wherein, the preset database includes N number of contact information;N is big In 0 natural number;
If the contact information is identical as any one contact information in preset database, do not save described It is people's information.
That is, a contact information can only save as a contact person in the preset database, it cannot Multiple contact persons save identical telephone number, the purpose for the arrangement is that preventing user from receiving contact person's letter with control field Unloading another contact person different at name, further ensure that the safety of contact information after breath.
Step S806 is handled the contact information in contact data according to the parameter of control field.
Here, for example, if the parameter of the control field is time-to-live of the contact information in the second equipment Max-thresholds, then when the contact information is when reaching the max-thresholds of the time-to-live the second equipment time-to-live, Second equipment is automatically deleted the contact information.If the parameter of the control field is the contact information by second The max-thresholds of the number of device forwards, then by the contact information quilt before the contact information described in the second device forwards The max-thresholds of the number of second device forwards subtract 1, if obtained result is more than or equal to 0, the second equipment just can will be described Contact information is transmitted to other equipment;If the parameter of the control field is the recipient of the preset contact information Telephone number, the then recipient of the telephone number for the object contact person to be sent user to and the preset contact information Telephone number match one by one, only recipient of the telephone number of object contact person in the preset contact information Telephone number in when, just the contact information can be transmitted to other equipment.
It should be noted that in the embodiment of the present invention, if realizing above-mentioned protection connection in the form of software function module It is the method for personal data, and when sold or used as an independent product, also can store in a computer-readable storage In medium.Based on this understanding, the technical solution of the embodiment of the present invention substantially in other words contributes to the prior art Part can be embodied in the form of software products, which is stored in a storage medium, if including Dry instruction is used so that a computer equipment (can be personal computer, server or network equipment etc.) executes this hair The all or part of bright each embodiment the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory The various media that can store program code such as (Read Only Memory, ROM), magnetic or disk.In this way, the present invention is real It applies example and is not limited to any specific hardware and software combination.
The embodiment of the present invention provides a kind of receiving device (i.e. the second equipment) for protecting contact data, and Fig. 9 is the present invention Embodiment protects the composed structure schematic diagram of the receiving device of contact data, as shown in figure 9, the receiving device 900 is at least It include: controller 901 and the storage medium 902 for being configured to storage executable instruction, in which:
Controller 901 is configured to execute the executable instruction of storage, and the executable instruction is for realizing following step:
The contact data of the first equipment transmission is received, the contact data includes at least contact information;
If the contact data includes preset mark, the control field for including in the contact data is obtained Parameter;
According to the parameter of the control field, the contact information in the contact data is handled.
The embodiment of the present invention provides a kind of sending device (i.e. the first equipment) for protecting contact data again, and Figure 10 is this hair The composed structure schematic diagram of the sending device of bright embodiment protection contact data, as shown in Figure 10, the sending device 1000 to It less include: controller 1001 and the storage medium 1002 for being configured to storage executable instruction, in which:
Controller 1001 is configured to execute the executable instruction of storage, and the executable instruction is for realizing following step It is rapid:
If receiving the control instruction for the contact information of input, is determined and controlled according to the control instruction The parameter of field;Wherein, the control instruction of the input is used to be arranged the parameter of the control field;
Preset mark is obtained according to the parameter of the control field;
The parameter of the control field, preset mark and contact information are packaged, contact data is obtained;
The contact data is sent to the second equipment.
Accordingly, the embodiment of the present invention provides a kind of computer storage medium, is stored in the computer storage medium Computer executable instructions, the computer executable instructions are configured to execute the protection contact person that other embodiments of the invention provide The method of data.
It should be noted that the description of the above equipment and storage medium embodiment, the description with above method embodiment are Similar, there is with embodiment of the method similar beneficial effect.For not disclosed in present device and storage medium embodiment Technical detail, please refer to the description of embodiment of the present invention method and understand.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the present invention Formula.Moreover, the present invention, which can be used, can use storage in the computer that one or more wherein includes computer usable program code The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The equipment for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of equipment, the commander equipment realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (10)

1. a kind of method for protecting contact data, which is characterized in that the described method includes:
The contact data of the first equipment transmission is received, the contact data includes at least contact information;
If the contact data includes preset mark, the ginseng for the control field for including in the contact data is obtained Number;
According to the parameter of the control field, the contact information in the contact data is handled.
2. method according to claim 1, which is characterized in that the parameter of the control field includes at least following parameter One of: time-to-live threshold value, the first hop count threshold value and the second hop count threshold value, in which:
The time-to-live threshold value is the max-thresholds of time-to-live of the contact information in the second equipment;Described first Hop count threshold value is the contact information by the max-thresholds of the number of the second device forwards;The second hop count threshold The max-thresholds for the number that value is forwarded by the contact information by variant equipment relay.
3. method according to claim 2, which is characterized in that when the parameter of the control field is the time-to-live When threshold value, the parameter according to the control field handles the contact information in the contact data, packet It includes:
If time-to-live of the contact information in second equipment is greater than the time-to-live threshold value, described in deletion Contact data;
If time-to-live of the contact information in second equipment is not more than the time-to-live threshold value, described It is that personal data information is retained in the second equipment.
4. method according to claim 2, which is characterized in that when the parameter of the control field is first forwarding When frequency threshold value, the parameter according to the control field handles the contact information in the contact data, Include:
If receive input for forwarding the forwarding of the contact information to instruct, obtain the contact information by second The number that equipment has forwarded;
If the number that the contact information has been forwarded by the second equipment is more than or equal to the first hop count threshold value, forbid The contact information is forwarded to the forwarding and instructs corresponding equipment;
If the number that the contact information has been forwarded by the second equipment is less than the first hop count threshold value, will be described It is that people's information is forwarded in equipment corresponding with the forwarding instruction, and updates the contact data by the second device forwards Number.
5. method according to claim 2, which is characterized in that when the parameter of the control field is second forwarding It further include the number that the contact data is forwarded by relay when frequency threshold value, in the contact data;
Accordingly, according to the parameter of the control field, the contact information in the contact data is handled, is wrapped It includes:
If receive input for forwarding the forwarding of the contact information to instruct, obtain the contact information by relay The number of forwarding;
If the number that the contact information is forwarded by relay is more than or equal to the second hop count threshold value, forbidding will be described Contact information is forwarded to the forwarding and instructs corresponding equipment;
If the number that the contact information is forwarded by relay is less than the second hop count threshold value, the contact person is updated The number that information is forwarded by relay;
Number that the updated contact information is forwarded by relay, preset mark, the parameter of the control field and Contact information is determined as updated contact data;
The updated contact data is forwarded in equipment corresponding with the forwarding instruction.
6. method according to claim 1, which is characterized in that the method also includes:
If the contact information and any one contact information in preset database are different, the contact person is believed Breath is stored in preset database;Wherein, the preset database includes N number of contact information;N is the nature greater than 0 Number;
If the contact information is identical as any one contact information in preset database, the contact person is not saved Information.
7. a kind of method for protecting contact data, which is characterized in that the described method includes:
If receiving the control instruction for the contact information of input, control field is determined according to the control instruction Parameter;Wherein, the control instruction of the input is used to be arranged the parameter of the control field;
Preset mark is obtained according to the parameter of the control field;
The parameter of the control field, preset mark and contact information are packaged, contact data is obtained;
The contact data is sent to the second equipment.
8. method according to claim 7, which is characterized in that described by the parameter of the control field, preset mark Know and contact information be packaged, obtains contact data, comprising:
The parameter of the control field and contact information are packaged, the corresponding data packet of contact information is obtained;
Preset mark is placed on to the head of the data packet, obtains contact data.
9. a kind of equipment for protecting contact data, which is characterized in that the electronic equipment includes at least: processor and being configured to Store the storage medium of executable instruction, in which:
Processor is configured to execute the executable instruction of storage, and the executable instruction is configured to execute the claims 1 to 6 The method for the protection contact data that any one provides;Alternatively, alternatively, the executable instruction be configured to execute aforesaid right want The method that any one of the 7 or 8 protection contact datas provided are provided.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium Executable instruction, the computer executable instructions are configured to execute the protection contact person that any one of the claims 1 to 6 provide The method of data;Alternatively, the executable instruction is configured to execute the protection connection that any one of the claims 7 or 8 provide The method of personal data.
CN201810067932.6A 2018-01-24 2018-01-24 A kind of method, equipment and storage medium for protecting contact data Pending CN110069938A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810067932.6A CN110069938A (en) 2018-01-24 2018-01-24 A kind of method, equipment and storage medium for protecting contact data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810067932.6A CN110069938A (en) 2018-01-24 2018-01-24 A kind of method, equipment and storage medium for protecting contact data

Publications (1)

Publication Number Publication Date
CN110069938A true CN110069938A (en) 2019-07-30

Family

ID=67365419

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810067932.6A Pending CN110069938A (en) 2018-01-24 2018-01-24 A kind of method, equipment and storage medium for protecting contact data

Country Status (1)

Country Link
CN (1) CN110069938A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111065094A (en) * 2019-12-16 2020-04-24 Oppo广东移动通信有限公司 Address book transmission method and device, storage medium and electronic equipment

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1385989A (en) * 2001-05-16 2002-12-18 华为技术有限公司 Method for conrolling short message retransmission time
CN101807944A (en) * 2010-03-03 2010-08-18 中兴通讯股份有限公司 Mobile terminal and data sharing method thereof
CN102665193A (en) * 2012-03-19 2012-09-12 信源通科技(深圳)有限公司 Mobile terminal, and method for address book remote sharing based on mobile terminal
CN103139382A (en) * 2013-01-30 2013-06-05 广东欧珀移动通信有限公司 Method and device of sharing business cards
CN103780626A (en) * 2014-01-27 2014-05-07 北京飞流九天科技有限公司 Data sharing method of cloud server and intelligent terminal
CN104462118A (en) * 2013-09-21 2015-03-25 郑建锋 Information spreading risk control method and system
CN104683961A (en) * 2013-11-29 2015-06-03 腾讯科技(深圳)有限公司 Name card interaction method and device and terminal
CN105872178A (en) * 2016-06-06 2016-08-17 北京珠穆朗玛移动通信有限公司 Contact person information sharing method and mobile terminal
CN106878537A (en) * 2015-12-14 2017-06-20 北京奇虎科技有限公司 A kind of method and apparatus for sharing associated person information
CN107222608A (en) * 2017-07-11 2017-09-29 深圳传音通讯有限公司 Contact person's sharing method and user terminal
CN107276891A (en) * 2017-08-02 2017-10-20 深圳依偎控股有限公司 Batch shares the method and device of associated person information

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1385989A (en) * 2001-05-16 2002-12-18 华为技术有限公司 Method for conrolling short message retransmission time
CN101807944A (en) * 2010-03-03 2010-08-18 中兴通讯股份有限公司 Mobile terminal and data sharing method thereof
CN102665193A (en) * 2012-03-19 2012-09-12 信源通科技(深圳)有限公司 Mobile terminal, and method for address book remote sharing based on mobile terminal
CN103139382A (en) * 2013-01-30 2013-06-05 广东欧珀移动通信有限公司 Method and device of sharing business cards
CN104462118A (en) * 2013-09-21 2015-03-25 郑建锋 Information spreading risk control method and system
CN104683961A (en) * 2013-11-29 2015-06-03 腾讯科技(深圳)有限公司 Name card interaction method and device and terminal
CN103780626A (en) * 2014-01-27 2014-05-07 北京飞流九天科技有限公司 Data sharing method of cloud server and intelligent terminal
CN106878537A (en) * 2015-12-14 2017-06-20 北京奇虎科技有限公司 A kind of method and apparatus for sharing associated person information
CN105872178A (en) * 2016-06-06 2016-08-17 北京珠穆朗玛移动通信有限公司 Contact person information sharing method and mobile terminal
CN107222608A (en) * 2017-07-11 2017-09-29 深圳传音通讯有限公司 Contact person's sharing method and user terminal
CN107276891A (en) * 2017-08-02 2017-10-20 深圳依偎控股有限公司 Batch shares the method and device of associated person information

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111065094A (en) * 2019-12-16 2020-04-24 Oppo广东移动通信有限公司 Address book transmission method and device, storage medium and electronic equipment
CN111065094B (en) * 2019-12-16 2023-08-25 Oppo广东移动通信有限公司 Address book transmission method and device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
KR100734836B1 (en) System and method for generating reproducible session keys
CN103249014B (en) Method for encrypting short message of mobile communication
JPWO2007080629A1 (en) Portable terminal device, address book transfer device, information display method in portable terminal device, address book transfer method, and computer program
CN102308562A (en) Mobile terminal and method, device, system for controlling mobile terminal
CN109992563A (en) A kind of service scripts storage method and device based on block chain
CN102202297B (en) Method and device for encrypting mobile terminals
CN108200093A (en) Transmit the encryption and decryption approaches and encryption and decryption devices of file
CN105991682A (en) Data sharing method and device
JP2014500648A (en) Method and apparatus for quickly adding recipients, and portable terminal using the same
CN107666395A (en) One population file management method, user terminal, group chat system
CN112291268A (en) Information transmission method, device, equipment and storage medium
CN102572750A (en) Method and terminal for protecting short messages
CN105791520A (en) Contact list updating method and coresponding apparatus
CN110069938A (en) A kind of method, equipment and storage medium for protecting contact data
CN101951568A (en) Short message information interception processing method and device
KR20070090770A (en) Portable telephone, and portable telephone readable recording medium having a program for sending and receiving electronic mail
US8700004B2 (en) Phone number encapsulation using token based framework
CN104598782A (en) Data packaging and analysis method and device
CN106878277A (en) A kind of method and device based on DMR standard implementation voice encryptions
Iranmanesh et al. On using emoticons and lingoes for hiding data in SMS
CN103731803A (en) Method for protecting short message contents and short message center
TWI577145B (en) Method for encrypted data transmission of near field communication device and system thereof
US9154471B2 (en) Method and apparatus for unified encrypted messaging
CN106033517A (en) An information processing method and an electronic apparatus
CN112637230A (en) Instant messaging method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190730