CN103067612A - Private information viewing method and system based on mobile terminal equipment - Google Patents
Private information viewing method and system based on mobile terminal equipment Download PDFInfo
- Publication number
- CN103067612A CN103067612A CN2013100367266A CN201310036726A CN103067612A CN 103067612 A CN103067612 A CN 103067612A CN 2013100367266 A CN2013100367266 A CN 2013100367266A CN 201310036726 A CN201310036726 A CN 201310036726A CN 103067612 A CN103067612 A CN 103067612A
- Authority
- CN
- China
- Prior art keywords
- private
- access
- private information
- answer
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention is suitable for the field of communication and provides a private information viewing method. The private information viewing method comprises the following steps of: establishing a private space database of the mobile terminal equipment, wherein the private space database comprises private linkmen and private information thereof, access problems of private information and access answers of access problems; judging whether to enter a private space of the mobile terminal equipment; if entering the private space of the mobile terminal equipment, propping out an access problem of private information; receiving an answer of the input problem; judging whether the answer of the input problem is matched with the access answer corresponding to the access problem of the private information; and if so, only displaying the private information of the private linkmen corresponding to the access answer. The invention also provides a private information viewing system based on the mobile terminal equipment. The private information viewing method and system based on the mobile terminal equipment, provided by the invention, can be used for better protecting the private information of the private linkmen of the users.
Description
Technical field
The present invention relates to the communications field, relate in particular to a kind of private information inspection method and system thereof of movement-based terminal equipment.
Background technology
At present; fast development along with smart mobile phone; the problem of information security also increases thereupon; although some smart mobile phone is provided with the function of private contact at present; make us be unwilling some to allow the contact person's that others sees relevant private information all stash; but these smart mobile phones are all less than the further measure of these private informations of protection at present; as long as will just can see the relevant private information of all private contacts behind the unlocking screen of smart mobile phone; so; if smart mobile phone stolen or lose after; others just can obtain the relevant private information of all set private contacts of user easily behind unlocking screen, and then causes private information to be revealed.
Therefore, need the measure of a kind of novel protection private information of design badly, and then reduce the risk that private information is revealed, further strengthen information security.
Summary of the invention
In view of this, the purpose of the embodiment of the invention is to provide a kind of private information inspection method and system thereof of movement-based terminal equipment, is intended to solve the problem that the private information on the mobile terminal device is revealed easily in the prior art.
The embodiment of the invention is achieved in that a kind of private information inspection method of movement-based terminal equipment, and described method comprises:
Set up the private space database of described mobile terminal device, wherein, described private space database comprises access problem and the access answer thereof of private contact and private information thereof, private information;
Judge whether to enter the private space of described mobile terminal device;
If enter the private space of described mobile terminal device, then eject the access problem of private information;
Receive the answer of input problem;
The answer of the judging described input problem whether access answer corresponding with the access problem that ejects private information is complementary;
If be complementary, then only show the private information of the private contact corresponding with the access answer.
Preferably, the described step of setting up the private space database of described mobile terminal device specifically comprises:
Choose a plurality of contact persons of user as one group of private contact group;
Check access problem and the corresponding access answer of private information for each the private contact setting in the described private contact group;
In described private space database, set up the access problem of private contact and private information thereof, private information and the corresponding relation of access answer thereof.
Preferably, also comprise after the step of the described private space that judges whether to enter described mobile terminal device:
If do not enter the private space of described mobile terminal device, then according to the operation of normal mode response on described mobile terminal device.
Preferably, the step of the access problem of described ejection private information specifically comprises:
Eject the access problem of all private informations with the form of problem list.
Preferably, also comprise after the described answer of the judging described input problem step whether the access answer corresponding with the access problem that ejects private information is complementary:
If do not mate, then forbid checking the private information of the private contact corresponding with accessing answer.
On the other hand, the present invention also provides a kind of private information of movement-based terminal equipment to check system, comprising:
The Database module is used for setting up the private space database of described mobile terminal device, and wherein, described private space database comprises access problem and the access answer thereof of private contact and private information thereof, private information;
The first judge module is for the private space that judges whether to enter described mobile terminal device;
The problem display module if be used for entering the private space of described mobile terminal device, then ejects the access problem of private information;
The problem receiver module is used for receiving the answer of input problem;
The second judge module, whether the access answer corresponding with the access problem that ejects private information is complementary for the answer of judging described input problem;
The information inspection module if be used for being complementary, then only shows the private information of the private contact corresponding with the access answer.
Preferably, the described private space database of setting up described mobile terminal device specifically comprises:
Choose a plurality of contact persons of user as one group of private contact group;
Check access problem and the corresponding access answer of private information for each the private contact setting in the described private contact group;
In described private space database, set up the access problem of private contact and private information thereof, private information and the corresponding relation of access answer thereof.
Preferably, described system also comprises:
The normal response module is if be used for not entering the private space of described mobile terminal device, then according to the operation of normal mode response on described mobile terminal device.
Preferably, the access problem of described ejection private information specifically comprises:
Eject the access problem of all private informations with the form of problem list.
Preferably, described system also comprises:
Forbid checking module, if be used for judging that the answer access answer corresponding with the access problem that ejects private information of described input problem is not complementary, then forbid checking the private information of the private contact corresponding with accessing answer.
In embodiments of the present invention, technical scheme provided by the invention can better be protected the private information of the set private contact of user, and then reduce the risk that private information is revealed, and further strengthens information security.
Description of drawings
Fig. 1 is the private information inspection method flow chart of movement-based terminal equipment in an embodiment of the present invention;
Fig. 2 is the schematic diagram of concrete corresponding relation in the private space database in an embodiment of the present invention;
Fig. 3 is the structural representation that the private information of movement-based terminal equipment in an embodiment of the present invention is checked system.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
The specific embodiment of the invention provides a kind of private information inspection method of movement-based terminal equipment, and as shown in Figure 1, the method is finished by mobile terminal device, mainly comprises the steps:
S101, set up the private space database of described mobile terminal device, wherein, described private space database comprises access problem and the access answer thereof of private contact and private information thereof, private information;
S102, judge whether to enter the private space of described mobile terminal device;
If S103 enters the private space of described mobile terminal device, then eject the access problem of private information;
The answer of S104, reception input problem;
S105, judge described input problem answer whether the access answer corresponding with the access problem that ejects private information be complementary;
If S106 is complementary, then only show the private information of the private contact corresponding with the access answer.
The private information inspection method of a kind of movement-based terminal equipment provided by the present invention can better be protected the private information of the set private contact of user, and then reduce the risk that private information is revealed, and further strengthens information security.
Below will the private information inspection method of a kind of movement-based terminal equipment provided by the present invention be elaborated.
See also Fig. 1, be the private information inspection method flow chart of movement-based terminal equipment in an embodiment of the present invention.In the present embodiment, the method is realized by mobile terminal device.
In step S101, set up the private space database of mobile terminal device, wherein, described private space database comprises access problem and the access answer thereof of private contact and private information thereof, private information.
In the present embodiment, the step of setting up the private space database of mobile terminal device specifically comprises following three steps: (1) chooses a plurality of contact persons of user as one group of private contact group; (2) check the access problem of private information and the access answer of correspondence for each the private contact setting in the described private contact group; (3) in described private space database, set up the access problem of private contact and private information thereof, private information and the corresponding relation of access answer thereof.
In more detail, at first, choose a plurality of contact persons of user as one group of private contact group, be that the user can form one group as the private contact group with some contact person according to the demand of oneself or with the intimate degree that oneself concerns, wherein, private contact listed in the private contact group is not wished what others saw for the user, for example user's household or relatives can be put into the private contact group as private contact.
Secondly, check access problem and the corresponding access answer of private information for each the private contact setting in the private contact group, if namely comprise A in this private contact group, B, C, four private contacts of D, then be respectively A, B, C, access problem and the corresponding access answer of private information checked in four private contact settings of D, for example can access problem A and the corresponding access answer A that check private information be set for private contact A, can access problem B and the corresponding access answer B that check private information be set for private contact B, can for private contact C arranges access problem C and the corresponding access answer C that checks private information, can access problem D and the corresponding access answer D that check private information be set for private contact D.
At last, in the private space database, set up the access problem of private contact and private information thereof, private information and the corresponding relation of access answer thereof, wherein, the private information of private contact comprises telephone number, addresses of items of mail, home address, with user's close relationship etc., the concrete corresponding relation in the private space database is as shown in Figure 2.
See also Fig. 2, be the schematic diagram of concrete corresponding relation in the private space database in an embodiment of the present invention.Wherein, Fig. 2 is to comprise A in the private contact group, B, C, four private contacts of D are that example is illustrated explanation, in the private space database, private contact A respectively with the access problem A of private information, the access answer A of private information and the private information of private contact A are corresponding one by one, private contact B respectively with the access problem B of private information, the access answer B of private information and the private information of private contact B are corresponding one by one, private contact C respectively with the access problem C of private information, the access answer C of private information and the private information of private contact C are corresponding one by one, private contact D respectively with the access problem D of private information, the access answer D of private information and the private information of private contact D are corresponding one by one, certainly, in other embodiments, also can be arranged to the access problem of a private contact and a plurality of private informations and the corresponding relation of one-to-many of access answer thereof, just not do restriction at this.
Please continue to consult Fig. 1, in step S102, judge whether to enter the private space of mobile terminal device.In the present embodiment, the user can arrange the relevant private information that private space is used for some private contacts of storage in mobile terminal device, if want to check the relevant private information of private contact, just must be introduced into the private space of mobile terminal device, therefore, just need to judge whether to enter the private space of mobile terminal device at this.
In step S103, if enter the private space of mobile terminal device, then eject the access problem of private information.In the present embodiment, when detecting the private space that enters mobile terminal device, can eject the access problem of single private information, perhaps eject the access problem of all private informations with the form of problem list, bright for instance, when detecting the private space that enters mobile terminal device, for example can eject the access problem A(of private information or the access problem B of private information, the perhaps access problem C of private information, the perhaps access problem D of private information), also or eject access problem (the access problem A that comprises private information of all private informations with the form of problem list, the access problem B of private information, the access problem C of private information and the access problem D of private information).
In step S104, receive the answer of input problem.In the present embodiment, if step S103 is the access problem that ejects all private informations with the form of problem list, will select so the access problem of one of them private information to answer.
In step S105, the answer of the judging the input problem whether access answer corresponding with the access problem that ejects private information is complementary.In the present embodiment, if step S103 is the access problem that ejects all private informations with the form of problem list, step S105 judges the answer of input problem whether the access answer corresponding with the access problem of selected one of them private information is complementary so.
In step S106, if the answer of the input problem access answer corresponding with the access problem that ejects private information is complementary, then only show the private information of the private contact corresponding with the access answer.Bright for instance; if the access problem A answer of user selection private information; and the answer of the problem of the inputting access answer A corresponding with the access problem A that ejects private information is complementary; the private information A that then only shows the private contact corresponding with access answer A; so; owing to only show the private information A of the private contact corresponding with access answer A; and the secret contact details of other private contacts will be hidden; therefore; this mode can better be protected the private information of the set private contact of user; and then reduce the risk that private information is revealed, further strengthen information security.
In the present embodiment, after step S102, also comprise step S107.
In step S107, if step S102 judges the private space that does not enter mobile terminal device, then according to the operation of normal mode response on mobile terminal device.In the present embodiment, because the private space that arranges in the mobile terminal device is the relevant private information for some private contacts of storage, therefore, if judge the private space that does not enter mobile terminal device, then show to be general operation, at this moment only need to get final product according to the operation of normal mode response on mobile terminal device.
In the present embodiment, after step S105, also comprise step S108.
In step S108, the access answer corresponding with the access problem that ejects private information is not complementary if step S105 judges the answer of input problem, then forbids checking the private information of the private contact corresponding with accessing answer.In the present embodiment, the access answer corresponding with the access problem that ejects private information is not complementary if step S105 judges the answer of input problem, the condition that then shows the private information that allows to check private contact is false, at this moment then need to forbid checking the private information of the private contact corresponding with accessing answer, the risk of being revealed to reduce private information is so further strengthened information security.
The private information inspection method of a kind of movement-based terminal equipment provided by the present invention can better be protected the private information of the set private contact of user, and then reduce the risk that private information is revealed, and further strengthens information security.
The specific embodiment of the invention also provides a kind of private information of movement-based terminal equipment to check system 10, as shown in Figure 3, mainly comprises:
The first judge module 102 is for the private space that judges whether to enter described mobile terminal device;
The second judge module 105, whether the access answer corresponding with the access problem that ejects private information is complementary for the answer of judging described input problem;
The private information of a kind of movement-based terminal equipment provided by the present invention is checked system 10, can better protect the private information of the set private contact of user, and then reduces the risk that private information is revealed, and further strengthens information security.
Below will check that system 10 is elaborated to the private information of a kind of movement-based terminal equipment provided by the present invention.
See also Fig. 3, the private information that is depicted as movement-based terminal equipment in an embodiment of the present invention is checked the structural representation of system 10.In the present embodiment, the private information of movement-based terminal equipment checks that system 10 comprises Database module 101, the first judge module 102, problem display module 103, problem receiver module 104, the second judge module 105, information inspection module 106, normal response module 107, forbids checking module 108, processor 109 and storage medium 110.Wherein, module 101 ~ 108 is for being stored in the executable program in the storage medium 110, and processor 109 is carried out these executable programs, to realize its separately function.In the present embodiment, mobile terminal device can for mobile phone, personal digital assistant (Personal Digital Assistant, PDA) etc., not done restriction at this.
In the present embodiment, the private space database of setting up mobile terminal device specifically comprises following three steps: (1) chooses a plurality of contact persons of user as one group of private contact group; (2) check the access problem of private information and the access answer of correspondence for each the private contact setting in the described private contact group; (3) in described private space database, set up the access problem of private contact and private information thereof, private information and the corresponding relation of access answer thereof.
In more detail, at first, choose a plurality of contact persons of user as one group of private contact group, be that the user can form one group as the private contact group with some contact person according to the demand of oneself or with the intimate degree that oneself concerns, wherein, private contact listed in the private contact group is not wished what others saw for the user, for example user's household or relatives can be put into the private contact group as private contact.
Secondly, check access problem and the corresponding access answer of private information for each the private contact setting in the private contact group, if namely comprise A in this private contact group, B, C, four private contacts of D, then be respectively A, B, C, access problem and the corresponding access answer of private information checked in four private contact settings of D, for example can access problem A and the corresponding access answer A that check private information be set for private contact A, can access problem B and the corresponding access answer B that check private information be set for private contact B, can for private contact C arranges access problem C and the corresponding access answer C that checks private information, can access problem D and the corresponding access answer D that check private information be set for private contact D.
At last, in the private space database, set up the access problem of private contact and private information thereof, private information and the corresponding relation of access answer thereof, wherein, the private information of private contact comprises telephone number, addresses of items of mail, home address, with user's close relationship etc., the concrete corresponding relation in the private space database is as shown in Figure 2.
See also Fig. 2, be the schematic diagram of concrete corresponding relation in the private space database in an embodiment of the present invention.Wherein, Fig. 2 is to comprise A in the private contact group, B, C, four private contacts of D are that example is illustrated explanation, in the private space database, private contact A respectively with the access problem A of private information, the access answer A of private information and the private information of private contact A are corresponding one by one, private contact B respectively with the access problem B of private information, the access answer B of private information and the private information of private contact B are corresponding one by one, private contact C respectively with the access problem C of private information, the access answer C of private information and the private information of private contact C are corresponding one by one, private contact D respectively with the access problem D of private information, the access answer D of private information and the private information of private contact D are corresponding one by one, certainly, in other embodiments, also can be arranged to the access problem of a private contact and a plurality of private informations and the corresponding relation of one-to-many of access answer thereof, just not do restriction at this.
Please continue to consult Fig. 3, the first judge module 102 is for the private space that judges whether to enter mobile terminal device.In the present embodiment, the user can arrange the relevant private information that private space is used for some private contacts of storage in mobile terminal device, if want to check the relevant private information of private contact, just must be introduced into the private space of mobile terminal device, therefore, just need the first judge module 102 to judge whether to enter the private space of mobile terminal device at this.
The second judge module 105, whether the access answer corresponding with the access problem that ejects private information is complementary for the answer of judging the input problem.In the present embodiment, if problem receiver module 104 is the access problems that eject all private informations with the form of problem list, the second judge module 105 is exactly to judge the answer of input problem whether the access answer corresponding with the access problem of selected one of them private information is complementary so.
Forbid checking module 108, judge that the answer access answer corresponding with the access problem that ejects private information of input problem is not complementary, and then forbids checking the private information of the private contact corresponding with accessing answer if be used for the second judge module 105.In the present embodiment, if the second judge module 105 is judged the answer access answer corresponding with the access problem that ejects private information of input problem and is not complementary, the condition that then shows the private information that allows to check private contact is false, at this moment forbid checking that 108 needs of module forbid checking the private information of the private contact corresponding with accessing answer, the risk of being revealed to reduce private information is so further strengthened information security.
The private information of a kind of movement-based terminal equipment provided by the present invention is checked system 10, can better protect the private information of the set private contact of user, and then reduces the risk that private information is revealed, and further strengthens information security.
In embodiments of the present invention, technical scheme provided by the invention can better be protected the private information of the set private contact of user, and then reduce the risk that private information is revealed, and further strengthens information security.
It should be noted that in above-described embodiment that included unit is just divided according to function logic, but is not limited to above-mentioned division, as long as can realize corresponding function; In addition, the concrete title of each functional unit also just for the ease of mutual differentiation, is not limited to protection scope of the present invention.
In addition, one of ordinary skill in the art will appreciate that all or part of step that realizes in the various embodiments described above method is to come the relevant hardware of instruction to finish by program, corresponding program can be stored in the computer read/write memory medium, described storage medium is such as ROM/RAM, disk or CD etc.
The above only is preferred embodiment of the present invention, not in order to limiting the present invention, all any modifications of doing within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. the private information inspection method of a movement-based terminal equipment is characterized in that, described method comprises:
Set up the private space database of described mobile terminal device, wherein, described private space database comprises access problem and the access answer thereof of private contact and private information thereof, private information;
Judge whether to enter the private space of described mobile terminal device;
If enter the private space of described mobile terminal device, then eject the access problem of private information;
Receive the answer of input problem;
The answer of the judging described input problem whether access answer corresponding with the access problem that ejects private information is complementary;
If be complementary, then only show the private information of the private contact corresponding with the access answer.
2. the private information inspection method of movement-based terminal equipment as claimed in claim 1 is characterized in that, the described step of setting up the private space database of described mobile terminal device specifically comprises:
Choose a plurality of contact persons of user as one group of private contact group;
Check access problem and the corresponding access answer of private information for each the private contact setting in the described private contact group;
In described private space database, set up the access problem of private contact and private information thereof, private information and the corresponding relation of access answer thereof.
3. the private information inspection method of movement-based terminal equipment as claimed in claim 1 is characterized in that, also comprises after the step of the described private space that judges whether to enter described mobile terminal device:
If do not enter the private space of described mobile terminal device, then according to the operation of normal mode response on described mobile terminal device.
4. the private information inspection method of movement-based terminal equipment as claimed in claim 1 is characterized in that, the step of the access problem of described ejection private information specifically comprises:
Eject the access problem of all private informations with the form of problem list.
5. the private information inspection method of movement-based terminal equipment as claimed in claim 1 is characterized in that, also comprises after the described answer of the judging described input problem step whether the access answer corresponding with the access problem that ejects private information is complementary:
If do not mate, then forbid checking the private information of the private contact corresponding with accessing answer.
6. the private information of a movement-based terminal equipment is checked system, it is characterized in that, described system comprises:
The Database module is used for setting up the private space database of described mobile terminal device, and wherein, described private space database comprises access problem and the access answer thereof of private contact and private information thereof, private information;
The first judge module is for the private space that judges whether to enter described mobile terminal device;
The problem display module if be used for entering the private space of described mobile terminal device, then ejects the access problem of private information;
The problem receiver module is used for receiving the answer of input problem;
The second judge module, whether the access answer corresponding with the access problem that ejects private information is complementary for the answer of judging described input problem;
The information inspection module if be used for being complementary, then only shows the private information of the private contact corresponding with the access answer.
7. the private information of movement-based terminal equipment as claimed in claim 6 is checked system, it is characterized in that, the described private space database of setting up described mobile terminal device specifically comprises:
Choose a plurality of contact persons of user as one group of private contact group;
Check access problem and the corresponding access answer of private information for each the private contact setting in the described private contact group;
In described private space database, set up the access problem of private contact and private information thereof, private information and the corresponding relation of access answer thereof.
8. the private information of movement-based terminal equipment as claimed in claim 6 is checked system, it is characterized in that, described system also comprises:
The normal response module is if be used for not entering the private space of described mobile terminal device, then according to the operation of normal mode response on described mobile terminal device.
9. the private information of movement-based terminal equipment as claimed in claim 6 is checked system, it is characterized in that, the access problem of described ejection private information specifically comprises:
Eject the access problem of all private informations with the form of problem list.
10. the private information of movement-based terminal equipment as claimed in claim 6 is checked system, it is characterized in that, described system also comprises:
Forbid checking module, if be used for judging that the answer access answer corresponding with the access problem that ejects private information of described input problem is not complementary, then forbid checking the private information of the private contact corresponding with accessing answer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013100367266A CN103067612A (en) | 2013-01-30 | 2013-01-30 | Private information viewing method and system based on mobile terminal equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013100367266A CN103067612A (en) | 2013-01-30 | 2013-01-30 | Private information viewing method and system based on mobile terminal equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103067612A true CN103067612A (en) | 2013-04-24 |
Family
ID=48110062
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013100367266A Pending CN103067612A (en) | 2013-01-30 | 2013-01-30 | Private information viewing method and system based on mobile terminal equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103067612A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103634446A (en) * | 2013-11-29 | 2014-03-12 | 深圳市朗司科技有限公司 | Calling display method without displaying private information |
CN103795862A (en) * | 2014-01-24 | 2014-05-14 | 宇龙计算机通信科技(深圳)有限公司 | Looking-up method and device of private contact persons |
CN104348944A (en) * | 2014-08-04 | 2015-02-11 | 腾讯科技(深圳)有限公司 | Caller identification method and caller identification terminal |
CN104517069A (en) * | 2015-01-12 | 2015-04-15 | 联想(北京)有限公司 | Information processing method and electronic equipment |
WO2015184776A1 (en) * | 2014-10-22 | 2015-12-10 | 中兴通讯股份有限公司 | Method and device for storing private information of linkman |
CN105898054A (en) * | 2016-04-08 | 2016-08-24 | 惠州Tcl移动通信有限公司 | Verification-based message display method and communication terminal |
CN106156562A (en) * | 2016-06-28 | 2016-11-23 | 努比亚技术有限公司 | A kind of private space protection device, mobile terminal and method |
CN106357866A (en) * | 2016-09-27 | 2017-01-25 | 维沃移动通信有限公司 | Contact list management method and mobile intelligent terminal |
CN106412202A (en) * | 2016-11-04 | 2017-02-15 | 上海传英信息技术有限公司 | Contact person hiding method and user terminal |
CN107609361A (en) * | 2017-08-24 | 2018-01-19 | 深圳双创科技发展有限公司 | Identity logic verification method and terminal |
CN107633161A (en) * | 2017-08-24 | 2018-01-26 | 深圳双创科技发展有限公司 | The terminal and Related product of the access control of protected data |
WO2019037003A1 (en) * | 2017-08-24 | 2019-02-28 | 深圳双创科技发展有限公司 | Identity logic verification method and terminal |
WO2019037004A1 (en) * | 2017-08-24 | 2019-02-28 | 深圳双创科技发展有限公司 | Access control terminal for protected data, and related product |
CN111049978A (en) * | 2014-12-30 | 2020-04-21 | 小米科技有限责任公司 | Notification information display method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1881228A (en) * | 2005-06-14 | 2006-12-20 | 华为技术有限公司 | Method for controlling system account right |
CN102521539A (en) * | 2011-12-08 | 2012-06-27 | 广东步步高电子工业有限公司 | Reliable password protection method of mobile device |
CN102571734A (en) * | 2011-01-04 | 2012-07-11 | 腾讯科技(深圳)有限公司 | Password authentication method and device based on multilevel catalogue |
CN102883230A (en) * | 2012-09-26 | 2013-01-16 | 深圳市九洲电器有限公司 | Method and device for controlling program broadcasting |
-
2013
- 2013-01-30 CN CN2013100367266A patent/CN103067612A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1881228A (en) * | 2005-06-14 | 2006-12-20 | 华为技术有限公司 | Method for controlling system account right |
CN102571734A (en) * | 2011-01-04 | 2012-07-11 | 腾讯科技(深圳)有限公司 | Password authentication method and device based on multilevel catalogue |
CN102521539A (en) * | 2011-12-08 | 2012-06-27 | 广东步步高电子工业有限公司 | Reliable password protection method of mobile device |
CN102883230A (en) * | 2012-09-26 | 2013-01-16 | 深圳市九洲电器有限公司 | Method and device for controlling program broadcasting |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103634446A (en) * | 2013-11-29 | 2014-03-12 | 深圳市朗司科技有限公司 | Calling display method without displaying private information |
CN103795862A (en) * | 2014-01-24 | 2014-05-14 | 宇龙计算机通信科技(深圳)有限公司 | Looking-up method and device of private contact persons |
CN103795862B (en) * | 2014-01-24 | 2016-02-10 | 宇龙计算机通信科技(深圳)有限公司 | The lookup method of private contact and device |
CN104348944A (en) * | 2014-08-04 | 2015-02-11 | 腾讯科技(深圳)有限公司 | Caller identification method and caller identification terminal |
WO2015184776A1 (en) * | 2014-10-22 | 2015-12-10 | 中兴通讯股份有限公司 | Method and device for storing private information of linkman |
CN111049978B (en) * | 2014-12-30 | 2021-03-30 | 小米科技有限责任公司 | Notification information display method and device |
CN111049978A (en) * | 2014-12-30 | 2020-04-21 | 小米科技有限责任公司 | Notification information display method and device |
CN104517069A (en) * | 2015-01-12 | 2015-04-15 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN105898054A (en) * | 2016-04-08 | 2016-08-24 | 惠州Tcl移动通信有限公司 | Verification-based message display method and communication terminal |
US10461934B2 (en) | 2016-04-08 | 2019-10-29 | Huizhou TCL Mobile Communications Co., Ltd | Authentication-based message display method and communication terminal thereof |
CN106156562B (en) * | 2016-06-28 | 2019-01-15 | 努比亚技术有限公司 | A kind of private space protective device, mobile terminal and method |
CN106156562A (en) * | 2016-06-28 | 2016-11-23 | 努比亚技术有限公司 | A kind of private space protection device, mobile terminal and method |
CN106357866A (en) * | 2016-09-27 | 2017-01-25 | 维沃移动通信有限公司 | Contact list management method and mobile intelligent terminal |
CN106412202A (en) * | 2016-11-04 | 2017-02-15 | 上海传英信息技术有限公司 | Contact person hiding method and user terminal |
CN107633161A (en) * | 2017-08-24 | 2018-01-26 | 深圳双创科技发展有限公司 | The terminal and Related product of the access control of protected data |
CN107609361A (en) * | 2017-08-24 | 2018-01-19 | 深圳双创科技发展有限公司 | Identity logic verification method and terminal |
WO2019037003A1 (en) * | 2017-08-24 | 2019-02-28 | 深圳双创科技发展有限公司 | Identity logic verification method and terminal |
WO2019037004A1 (en) * | 2017-08-24 | 2019-02-28 | 深圳双创科技发展有限公司 | Access control terminal for protected data, and related product |
CN107633161B (en) * | 2017-08-24 | 2020-11-06 | 徐州政源信息科技有限公司 | Terminal for access control of protected data and related product |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103067612A (en) | Private information viewing method and system based on mobile terminal equipment | |
CN102467462B (en) | Method for protecting data stored in device and corresponding device | |
CN104657674B (en) | The insulation blocking system and method for private data in a kind of mobile phone | |
CN103002124B (en) | A kind of processing method of communication data, device | |
US11394555B2 (en) | Mobile terminal privacy protection method and protection apparatus, and mobile terminal | |
CN102573107B (en) | Apparatus and method for connecting an access point in portable terminal | |
KR100754433B1 (en) | Method for information sharing using near radio communication in mobile terminal | |
CN106534572A (en) | Information display method and device and terminal | |
US20150089666A1 (en) | Apparatus and method for protecting privacy in terminal | |
CN105138874B (en) | Unlocking screen control device and method | |
CN103037062A (en) | Method and terminal and server used for intercepting crank calls | |
CN105068974A (en) | Information processing method and electronic device | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN101951425A (en) | Processing method and system of contact information and mobile terminal | |
CN103488940A (en) | Password protection system and method for application programs of intelligent equipment | |
CN106203035A (en) | A kind of data access control method and mobile terminal | |
CN103780731A (en) | Method and device for obtaining privacy contacts | |
US20160088151A1 (en) | Communication method, apparatus, and system | |
CN104243155A (en) | Safety verification method and device | |
CN101969507A (en) | Method, system and mobile terminal for rapidly communicating with contact person | |
CN101834935A (en) | Method and system for promoting private data and a mobile terminal | |
CN102946475A (en) | Information security control method and terminal | |
CN103034417A (en) | Unlocking method for touch screen and terminal equipment | |
CN104967593A (en) | Identity verification method, apparatus and system | |
CN106453802A (en) | Cipher verification method and device, and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130424 |