CN103095890A - Contact person information encryption method and communication terminal - Google Patents

Contact person information encryption method and communication terminal Download PDF

Info

Publication number
CN103095890A
CN103095890A CN 201210593240 CN201210593240A CN103095890A CN 103095890 A CN103095890 A CN 103095890A CN 201210593240 CN201210593240 CN 201210593240 CN 201210593240 A CN201210593240 A CN 201210593240A CN 103095890 A CN103095890 A CN 103095890A
Authority
CN
Grant status
Application
Patent type
Prior art keywords
contact
encrypted
contact information
corresponding
encryption
Prior art date
Application number
CN 201210593240
Other languages
Chinese (zh)
Other versions
CN103095890B (en )
Inventor
刘江涛
蔡胜
Original Assignee
东莞宇龙通信科技有限公司
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Abstract

The invention relates to the technical field of communications and provides a contact person information encryption method and a communication terminal. The contact person information encryption method includes the following steps: at least one contact person who needs encryption is selected; and contact person information corresponding to the contact person is partially encrypted, preferentially, partial content of the contact person information is hidden and/or replaced. The contact person information comprises the name, the contact way and/or communication logs and the like of the contact person. Therefore, the contact person information encryption method cannot be perceived by other people easily and is higher in safety. Moreover, more abundant encryption conditions can be provided for a user to choose, and only when the encryption conditions are met can the contact person information be encrypted, so that user experience is improved.

Description

联系人信息的加密方法及通信终端 Contact information of the encryption method and the communication terminal

技术领域 FIELD

[0001] 本发明涉及通信技术领域,尤其涉及一种联系人信息的加密方法及通信终端。 [0001] The present invention relates to communications technologies, and in particular relates to an encryption method and a communication terminal for contact information.

背景技术 Background technique

[0002] 联系人信息是手机等通信终端中存储的重要数据,为了保护用户的隐私,采用了对联系人信息加密的方法。 [0002] Contact information is important data stored in mobile phone and other communication terminals, in order to protect the user's privacy, using the contact information on the encryption method. 现有的联系人信息加密方法为:用户将通讯录中重要的联系人设为私密联系人或为整个通讯录添加密码保护,只有当用户输入正确的密码才能查看到相关联系人的联系人信息。 Existing contact information encryption method is: the user's address book contacts as an important private contacts, or add password protection for the entire address book, only when the user enters the correct password to view the contact information of the contact person . 但现有联系人信息的加密方式单一,造成用户体验不好。 However, a single encryption existing contact information, causing the user experience is not good. 尤其是,现有方案对联系人的加密方式是将该联系人的联系人信息完全隐藏,反而容易被人看出联系人信息已被加密处理过,一旦用户的解密方式被他人知悉后,通信终端中的所有联系人信息都被破解,从而失去了加密的作用。 In particular, the existing encryption solutions for contact is the contact information for the contact completely hidden, but easily be seen that the contact information is encrypted treated, once the user is aware of other people's way of decryption, communications All contact information terminals have been cracked, thus losing the role of encryption.

[0003] 综上可知,现有联系人信息的加密技术,在实际使用上显然存在不便与缺陷,所以有必要加以改进。 [0003] To sum up, the existing contact information encryption technology, there are clearly problems and disadvantages in practical use, it is necessary to be improved.

发明内容 SUMMARY

[0004] 针对上述的缺陷,本发明的目的在于提供一种联系人信息的加密方法及通信终端,其将联系人信息的部分内容进行隐藏和/或替换,因此不易被人发觉,安全性更好。 [0004] In view of the above drawbacks, an object of the present invention is to provide an encryption method and a communication terminal contact information, the contact information that will be part of hiding and / or replacement, so people can not easily be found, and more security it is good.

[0005] 为了实现上述目的,本发明提供一种联系人信息的加密方法,包括步骤有: [0005] To achieve the above object, the present invention provides a contact information encrypting method comprising the steps of:

[0006] 选择需要加密的至少一联系人; [0006] at least one selected contact to be encrypted;

[0007] 将所述联系人对应的联系人信息进行部分加密。 [0007] corresponding to the contact information of the contact portion is encrypted.

[0008] 根据本发明所述的加密方法,所述将联系人对应的联系人信息的部分内容进行隐藏和/或替换的步骤包括: [0008] The encryption method according to the present invention, the part of the contacts corresponding to the contact information to hide and / or the step of replacing comprises:

[0009] 将所述联系人对应的联系人信息的部分内容进行隐藏和/或替换。 [0009] The contact part of the contact information corresponding to hide and / or replacement.

[0010] 根据本发明所述的加密方法,所述联系人对应的所述联系人信息包括所有与所述联系人建立关联的数据信息。 [0010] The encryption method according to the present invention, the contact information corresponding to the contact information includes all data associated with the contact.

[0011] 根据本发明所述的加密方法,所述将联系人对应的联系人信息的部分内容进行隐藏和/或替换的步骤之前还包括: Before [0011] The encryption method according to the present invention, the contact information of the part corresponding to the contact step of hiding and / or alternative further comprising:

[0012] 设置至少一加密条件; [0012] provided at least one encrypted condition;

[0013] 所述将联系人对应的联系人信息的部分内容进行隐藏和/或替换的步骤包括: [0013] The part of the contact information of contacts corresponding to hide and / or the step of replacing comprises:

[0014] 判断是否符合所述加密条件,若是则将所述联系人对应的所述联系人信息的部分内容进行隐藏和/或替换。 [0014] It is determined whether the condition of the encrypted, hidden, and / or part replacement if the contact information corresponding to the contact will be.

[0015] 根据本发明所述的加密方法,所述设置至少一加密条件的步骤包括: [0015] The encryption method according to the present invention, said at least one encrypted condition setting step comprises:

[0016] 设置加密位置以及所述加密位置对应的第一联系人;和/或 [0016] provided, and a first contact of the encrypted position corresponding to the encrypted position; and / or

[0017] 设置加密时间段以及所述加密时间段对应的第二联系人; Corresponding to the second contact [0017] provided said encrypted crypto-period and time period;

[0018] 所述判断是否符合所述加密条件,若是则将所述联系人对应的所述联系人信息的部分内容进行隐藏和/或替换的步骤包括:[0019] 判断当前位置是否达到所述加密位置,若是则将所述第一联系人对应的第一联系人信息的部分内容进行隐藏和/或替换;和/或 [0018] The determining whether the conditions of the encrypted, hidden, and / or if the step of replacing part of the contact information will be corresponding to the contact comprises: [0019] It is determined whether the current position reaches the encrypted position, the first part if the contact information corresponding to the first contact will be hidden and / or replacement; and / or

[0020] 判断当前时间是否属于所述加密时间段,若是将所述第二联系人对应的第二联系人信息的部分内容进行隐藏和/或替换。 [0020] It is determined whether the current time belongs to the crypto-period, the second contact part if the information corresponding to the second contact to hide and / or replacement.

[0021] 本发明还提供一种通信终端,包括有: [0021] The present invention further provides a communication terminal, comprising:

[0022] 联系人选择模块,用于选择需要加密的至少一联系人; [0022] Contact selection module for selecting at least one contact to be encrypted;

[0023] 保密处理模块,用于将所述联系人对应的联系人信息进行部分加密。 [0023] confidentiality processing module, for contact information corresponding to the contact portion is encrypted.

[0024] 根据本发明所述的通信终端,所述保密处理模块用于将所述联系人对应的联系人信息的部分内容进行隐藏和/或替换。 [0024] The communication terminal according to the present invention, means for processing the secret part of the contact information of the contacts corresponding to hide and / or replacement.

[0025] 根据本发明所述的通信终端,所述联系人对应的所述联系人信息包括所有与所述联系人建立关联的数据信息。 [0025] The communication terminal according to the present invention, the contact information corresponding to the contact information includes all data associated with the contact.

[0026] 根据本发明所述的通信终端,还包括: [0026] The communication terminal according to the present invention, further comprising:

[0027] 条件设置模块,用于设置至少一加密条件; [0027] The condition setting means for setting at least one encrypted condition;

[0028] 所述保密处理模块用于判断是否符合所述加密条件,若是则将所述联系人对应的所述联系人信息的部分内容进行隐藏和/或替换。 [0028] The confidentiality processing module is configured to determine whether the condition of the encrypted, hidden, and / or part replacement if the contact information corresponding to the contact will be.

[0029] 根据本发明所述的通信终端,所述条件设置模块进一步包括: [0029] The communication terminal according to the present invention, the condition setting module further comprises:

[0030] 第一条件设置子模块,用于设置加密位置以及所述加密位置对应的第一联系人;和/或 [0030] The first sub-condition setting means for setting a first contact position and the encrypted encryption corresponding to a position; and / or

[0031] 第二条件设置子模块,用于设置加密时间段以及所述加密时间段对应的第二联系人; [0031] The second sub-condition setting means for setting a second contact and said encrypted crypto-period corresponding to the time period;

[0032] 所述保密处理模块进一步包括: [0032] The confidentiality processing module further comprises:

[0033] 第一保密处理子模块,用于判断当前位置是否达到所述加密位置,若是则将该第一联系人对应的第一联系人信息的部分内容进行隐藏和/或替换;和/或 [0033] The first security processing sub-module, configured to judge whether the current position reaches the encrypted position, if the content of the first portion of the first contact corresponding to contact information is hidden and / or replacement; and / or

[0034] 第二保密处理子模块,用于判断当前时间是否属于所述加密时间段,若是将所述第二联系人对应的第二联系人信息的部分内容进行隐藏和/或替换。 [0034] The second security processing sub-module for determining whether the encrypted current time period, the second contact part if the information corresponding to the second contact to hide and / or replacement.

[0035] 本发明通信终端在确定需要加密的联系人后,将所述联系人对应的联系人信息进行部分加密,优选将联系人信息的部分内容进行隐藏和/或替换,所述联系人信息包括联系人的名称、联系方式和/或通信记录等。 [0035] The communication terminal of the present invention, after determining the encryption is required contacts, corresponding to the contact information of the contact portion is encrypted, preferably the part of the contact information is hidden and / or alternatively, the contact information including the contact's name, contact and / or communication records. 避免了现有技术将联系人信息完全隐藏所导致的易于识破的问题,本发明只是隐藏和/或替换联系人信息的部分内容,因此不易被他人发觉,安全性更好。 Avoids the prior art problem of contact information caused completely hidden easy to see through, but the present invention is to hide and / or part replacement contact information, it is not easy to be found others, better security. 更好的是,可提供更丰富的加密条件供用户选择,例如特定的加密位置或加密时间段等;唯有当前情况符合加密条件时,才会对联系人信息进行加密处理,从而解决了现有技术加密条件单一的局限性,从而提高了用户体验。 Better yet, it can provide a richer encryption conditions for users to choose, such as a specific location or encrypted encryption and other time periods; only when consistent with current encryption conditions for contact information will be encrypted, so as to solve now there are technical limitations of a single encryption conditions, thereby improving the user experience.

附图说明 BRIEF DESCRIPTION

[0036] 图1是本发明通信终端的结构示意图; [0036] FIG. 1 is a schematic diagram of the configuration of a communication terminal according to the present invention;

[0037] 图2是本发明优选通信终端的结构示意图; [0037] FIG. 2 is a schematic diagram of the preferred communication terminal according to the present invention;

[0038] 图3是本发明联系人信息的加密方法的流程图; [0038] FIG. 3 is a flowchart of an encryption method of the present invention, the contact information;

[0039] 图4是本发明第一实施例中联系人信息的加密方法的流程图;以及 [0039] FIG. 4 is a flowchart illustrating an encryption method according to a first embodiment of the contact information of the present invention; and

[0040] 图5是本发明第二实施例中联系人信息的加密方法的流程图。 [0040] FIG. 5 is a flowchart of a method of contact information encrypted second embodiment of the present invention. 具体实施方式 Detailed ways

[0041] 为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。 [0041] To make the objectives, technical solutions and advantages of the present invention will become more apparent hereinafter in conjunction with the accompanying drawings and embodiments of the present invention will be further described in detail. 应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。 It should be understood that the specific embodiments described herein are only intended to illustrate the present invention and are not intended to limit the present invention.

[0042] 图1是本发明通信终端的结构示意图,所述通信终端100可以是手机、PDA (Personal Digital Assistant,个人数字助理)、平板电脑等,并且所述通信终端100至少包括有联系人选择模块10和保密处理模块20,其中: [0042] FIG. 1 is a schematic configuration of a communication terminal according to the present invention, the communication terminal 100 may be a mobile phone, PDA (Personal Digital Assistant, a personal digital assistant), a tablet computer, and the communication terminal 100 at least includes contact selection confidentiality processing module 10 and module 20, wherein:

[0043] 所述联系人选择模块10,用于选择需要加密的至少一联系人。 [0043] The contact selection module 10 for selecting at least one contact to be encrypted. 这里,用户可以在通讯录中选择至少一联系人进行加密处理,或者选择通讯录中所有联系人进行加密处理。 Here, the user can select at least one contact in the address book is encrypted, or select all the contacts in the address book is encrypted.

[0044] 所述保密处理模块20,用于将所选的联系人对应的联系人信息进行部分加密。 [0044] The confidentiality processing module 20, corresponding to the contact information for the selected contact portion will be encrypted. 即只是将联系人信息的部分内容进行加密处理,而其他内容则正常显示,这样不容易被察觉做过加密处理。 I.e., only the contact information part is encrypted, while everything else is normal, this is not done easily detected encrypted. 优选的是,保密处理模块20用于将所选的联系人对应的联系人信息的部分内容进行隐藏和/或替换。 Preferably, the confidential part of the processing module 20 for contact information corresponding to the selected contacts will be hidden and / or replacement. 所述联系人对应的所述联系人信息包括所有与所述联系人建立关联的数据信息,包括本地信息和社交网络信息等。 Corresponding to the contact information of the contact includes all data associated with the contact, including social networking information and the local information and the like. 所述联系人信息中的社交网络信息包括与所述联系人相关的微信、微博等;所述联系人信息中的本地信息包括联系人对应的名称、联系方式和/或通信记录等;用户可预先选择其中一种或几种联系人信息进行加密。 The social network information comprises a contact information associated with the contact of the micro-channel, micro-blog; local information of the contact information includes the name of the contact corresponding contact and / or communication records; User It may be one or several pre-selected contact information is encrypted. 所述联系方式包括电话号码、邮箱地址、即时消息账号等,用户可预先选择其中一种或几种联系方式进行加密。 The contact comprises a telephone number, email address, instant messaging accounts, etc., wherein the user may pre-select one or several contact encrypted. 优选的是,保密处理模块20用于将联系人对应的电话号码中的至少一位号码进行隐藏和/或替换。 Preferably, the confidentiality processing module 20 for the contact telephone number corresponding to at least one number to hide and / or replacement. 所述通信记录包括通话记录、短信、邮件、即时消息等,用户可预先选择其中一种或几种通信记录进行加密。 The communication record comprises call records, text messages, e-mail, instant message, etc., the user can pre-select one or several of the communication record is encrypted. 例如用户将联系人A进行加密,此时询问用户是否需将与联系人A有关的短信、通话记录、邮件等进行加密,用户可选择其中几项或不选,如果用户进行了选择,则将相应的选择项进行加密。 A user, for example, a contact is encrypted, then asks the user if need be associated with contact A text messages, call history, etc. encrypted message, wherein the user may select or deselect few, if a user is selected, the corresponding encrypted option.

[0045] 所述将联系人信息的部分内容进行隐藏是指,将联系人信息的一部分内容正常显示,而另一部分内容不显示,进行隐藏处理的对象优选是数字、文字和/或字母等文本内容。 [0045] The part of the contact information refers to hide the part of the normal display contact information, and another part does not appear, the hidden object is preferably processed numerals, characters, and / or alphabetic text content. 这样他人无法看到完整的联系人信息。 So others can not see the full contact information. 优选的是,保密处理模块20用于将联系人对应的电话号码中的至少一位号码进行隐藏。 Preferably, the confidentiality processing module 20 for the contact telephone number corresponding to at least a number of hide. 所述号码的位数和位置可以由系统默认设置或者用户预先定义。 The number and position of bits may be set default or predefined by the system user. 例如,正常的手机号码为11位,但用户选择的加密联系人信息只显示手机号码的8〜10位数字,用户可具体选择哪几位进行隐藏。 For example, a normal mobile phone number is 11, but the encrypted contact information selected by the user to display only 8~10-digit phone number, the user can select which of several specific hide. 采用隐藏处理的加密方式既简单,又不易被他人发现,从而可增加安全性。 Using encryption to hide processing is simple, and not easily discovered by others, thereby increasing safety.

[0046] 所述将联系人信息的部分内容进行替换是指,将联系人信息的一部分内容正常显示,但对另一部分内容进行替换处理并生成替换内容后显示,进行替换处理的对象优选是数字、文字和/或字母等文本内容。 Display [0046] The part of the contact information replacement means, part of the normal display contact information, but another part of the replacement process contents and generates replacement, the replacement process is preferably a digital object , and other words and / or letters text content. 这样他人无法看到准确的联系人信息。 So that others can not see accurate contact information. 优选的是,保密处理模块20用于将联系人对应的电话号码中的至少一位号码进行替换,例如电话号码的原第九位号码是5,替换后的第九位号码为3,替换内容属于虚假信息。 Preferably, the confidentiality processing module 20 for at least a number corresponding to the contact telephone number to be replaced, for example, the original phone number is the ninth bit number 5, after the replacement ninth number is 3, replace the contents to be false information. 所述号码的位数和位置可以由系统默认设置或者用户预先定义。 The number and position of bits may be set default or predefined by the system user. 例如,正常的手机号码为11位,但用户选择的加密联系人信息只正常显示手机号码的8〜10位数字,其余I〜3为进行号码替换,用户可具体选择哪几位进行替换。 For example, a normal mobile phone number is 11 bits, but the encrypted contact information of the user selected display only normal 8~10 digit phone number, the remaining number I~3 is replaced, the user can select which of several specific replacement. 采用替换处理的加密方式既简单,又不易被他人发现,从而可增加安全性。 Encryption using the replacement process is simple, and not easily discovered by others, thereby increasing safety. [0047] 本发明采用将联系人信息进行部分隐藏和/或替换、不全部显示的方式,对用户的联系人信息进行加密,其隐蔽性更强,从而有效保护了用户数据安全。 [0047] The present invention employs the contact information is at least partially hidden and / or alternatively, as not all of the display, the user's contact information is encrypted, which is more concealed, so as to effectively protect the security of user data.

[0048] 图2是本发明优选通信终端的结构示意图,所述通信终端100包括联系人选择模块10、保密处理模块20、密码设置模块30和解密处理模块40,其中: [0048] FIG. 2 is a schematic diagram of the preferred communication terminal according to the present invention, the communication terminal 100 includes a selection module contacts 10, the confidentiality processing module 20, a password setting module 30 and the decryption processing module 40, wherein:

[0049] 所述联系人选择模块10,用于选择需要加密的至少一联系人。 [0049] The contact selection module 10 for selecting at least one contact to be encrypted. 用户可以在通讯录中选择至少一联系人进行加密处理。 The user may select at least one contact in the address book is encrypted.

[0050] 所述密码设置模块30,用于设置加密密码,所述加密密码可以采用数字、字母和/或字符等形式。 [0050] The password setting module 30 is configured to set an encryption password, the encrypted password can take the form of numbers, letters and / or characters.

[0051] 所述保密处理模块20,用于将联系人对应的联系人信息的部分内容进行隐藏和/或替换。 [0051] The confidentiality processing module 20, configured to contact part of the contact information corresponding to hide and / or replacement. 所述联系人信息包括联系人对应的名称、联系方式和/或通信记录等,所述联系方式包括电话号码、邮箱地址、即时消息账号等,所述通信记录包括通话记录、短信、邮件、即时消息等。 The contact information includes a name corresponding to the contact, contact and / or communication records, the contact comprises a telephone number, email address, instant messaging accounts, etc., the communication record comprises call records, text messages, e-mail, instant messages. 优选的是,保密处理模块20用于将联系人对应的电话号码中的至少一位号码进行隐藏和/或替换。 Preferably, the confidentiality processing module 20 for the contact telephone number corresponding to at least one number to hide and / or replacement.

[0052] 解密处理模块40,用于收到用户输入的加密密码后,将已被隐藏和/或替换的联系人信息进行正常显示。 [0052] The decryption processing module 40, after receiving the encrypted password for the user input that has been hidden for the normal display and / or alternative contact information. 当用户想查看完整的联系人信息时,只需输入正确的加密密码,即可看到联系人信息的完整数据。 When a user wants to view the complete contact information, just enter the correct encryption password, you can see the full data contact information.

[0053] 更好的是,所述通信终端还包括条件设置模块50,用于设置至少一加密条件,只有当前情况符合所述加密条件时才能对联系人信息进行加密处理。 [0053] More preferably, said communication terminal further comprises a pair of contacts in order to encrypt the information processing condition setting module 50 for setting at least an encrypted condition, only the current, subject to the encryption condition. 所述加密条件可以是特定的加密位置和/或加密时间段等,即保密处理具有一定的地域性和/或时效性,用户可选择上述至少一种加密条件对联系人信息进行加密。 The condition may be a particular encryption encrypted position and / or encryption time range, i.e., a certain regional confidential and / or timeliness, the user may select at least one of the above-described conditions contacts encryption information is encrypted.

[0054] 优选的是,所述条件设置模块50进一步包括: [0054] Preferably, the condition setting module 50 further comprising:

[0055] 第一条件设置子模块51,用于设置加密位置以及所述加密位置对应的第一联系人,例如用户将加密位置设置为“深圳市南山区科技园”,将需要加密的第一联系人设置为“小张”、“小王”等;和/或 [0055] The first condition setting sub-module 51, provided for encrypting the encrypted first contact position and a position corresponding to, for example, the encrypted user location "Science Park Nanshan District, Shenzhen", will first need to encrypt contacts as "Zhang", "Wang" and the like; and / or

[0056] 第二条件设置子模块52,用于设置加密时间段以及所述加密时间段对应的第二联系人。 [0056] The second condition setting sub-module 52, a second contact set and said encrypted crypto-period corresponds to a time period. 例如,用户将加密时间段设置为“18:00〜24:00”,将需要加密的第二联系人设置为“小刘”、“小陈”等。 For example, the user crypto-period is set to "18: 00~24: 00 ', the need to encrypt the second contacts as" Liu "," Chen "and the like.

[0057] 所述保密处理模块20,用于判断是否符合加密条件,若是则将联系人对应的联系人信息的部分内容进行隐藏和/或替换。 [0057] The confidentiality processing module 20 for determining whether the encryption condition, if the contact information part corresponding to the contact will be hidden and / or replacement. 当然,所述保密处理模块20也可以通过其他方式将联系人对应的联系人信息进行部分加密。 Of course, the secure processing module 20 may also contact information corresponding to the contact is partially encrypted by other means. 优选的是,所述保密处理模块20进一步包括: Preferably, said security processing module 20 further comprises:

[0058] 第一保密处理子模块21,用于判断当前位置是否达到加密位置,若是则将该第一联系人对应的第一联系人信息的部分内容进行隐藏和/或替换,否则可正常显示所述联系人信息。 [0058] The first security processing sub-module 21, configured to judge whether the current position of the encrypted position, if the content of the first portion of the first contact corresponding to contact information is hidden and / or replacement, or can be displayed properly the contact information. 本实施例中,若用户携带通信终端100到达“深圳市南山区科技园”这个加密位置,则对“小张”、“小王”等第一联系人的第一联系人信息进行加密处理,而当通信终端100离开该加密位置后,第一联系人信息又可以正常显示;和/或, In this embodiment, when the user carrying the communication terminal 100 to the "Science and Technology Park Nanshan District, Shenzhen," the encrypted position, the first contact of the first contact information, "Sally", "Wang" and the like is encrypted, and when the communication terminal 100 leaves the encrypted position, the first contact information and can display normal; and / or,

[0059] 第二保密处理子模块22,用于判断当前时间是否属于加密时间段,若是将第二联系人对应的第二联系人信息的部分内容进行隐藏和/或替换。 [0059] Confidential second processing sub-module 22, configured to determine whether the current time belongs to the crypto-period, if the second contact part corresponding to the second contact information to hide and / or replacement. 本实施例中,若通信终端100判断出当前时间“ 19:00 ”属于“ 18:00〜24:00 ”这个加密时间段,则对“小刘”、“小陈”等第二联系人的第二联系人信息进行加密处理,而该加密时间段过后,第二联系人信息又可以正常显示。 In this embodiment, the communication terminal 100 determines if the current time "19:00" are "18: 00~24: 00" The crypto-period, then the "Liu", "Chen" and the second contact second contact information is encrypted, and the encrypted time period after, and the second contact information can be displayed properly.

[0060] 本发明解决了现有联系人信息加密方法中对用户数据全部加密,容易被他人发觉异常的问题,本发明只隐藏部分信息,因此不易引起他人注意,可使用户的隐私受到最大限度的保护,提高用户数据的安全性。 [0060] The present invention solves the contact information for the user data encryption method encrypts all easily be found abnormal others, the present invention is only partially hidden information, thus easily attract attention, the user's privacy can be maximum protection, improve the security of user data. 另外,本发明解决了现有联系人信息加密方法中加密条件单一的局限性的问题,本发明提供更丰富的加密条件供用户选择,用户可针对特定的时间、地域等进行加密,该加密方式方便、灵活并且实用。 Further, the present invention solves the contact information in a single encryption method of the encrypted condition limitations, the present invention provides a richer user encryption condition for selection, the user may be encrypted for a specific time, place, etc., the encryption convenient, flexible and practical.

[0061] 图3是本发明联系人信息的加密方法的流程图,其可以通过如图1或图2所示的通信终端100实现,包括步骤有: [0061] FIG. 3 is a flowchart of an encryption method of the present invention, contact information, which can be realized by the communication terminal 100 in FIG. 1 or FIG. 2, comprising the steps of:

[0062] 步骤S301,选择需要加密的至少一联系人。 [0062] step S301, the encryption select at least one contact. 这里,用户可以在通讯录中选择至少一联系人进行加密处理,或者选择通讯录中所有联系人进行加密处理。 Here, the user can select at least one contact in the address book is encrypted, or select all the contacts in the address book is encrypted.

[0063] 步骤S302,将所选的联系人对应的联系人信息进行部分加密。 [0063] step S302, the contact information corresponding to the selected contacts partially encrypted. 即只是将联系人信息的部分内容进行加密处理,而其他内容则正常显示,这样不容易被察觉做过加密处理。 I.e., only the contact information part is encrypted, while everything else is normal, this is not done easily detected encrypted. 本步骤优选的是,将联系人对应的联系人信息的部分内容进行隐藏和/或替换。 This step is preferably that the contact part of the contact information corresponding to hide and / or replacement. 所述联系人对应的所述联系人信息包括所有与所述联系人建立关联的数据信息,包括本地信息和社交网络信息等。 Corresponding to the contact information of the contact includes all data associated with the contact, including social networking information and the local information and the like. 所述联系人信息中的社交网络信息包括与所述联系人相关的微信、微博等;所述联系人信息中的本地信息包括联系人对应的名称、联系方式和/或通信记录等;用户可预先选择其中一种或几种联系人信息进行加密。 The social network information comprises a contact information associated with the contact of the micro-channel, micro-blog; local information of the contact information includes the name of the contact corresponding contact and / or communication records; User It may be one or several pre-selected contact information is encrypted. 优选的是,本步骤将联系人对应的电话号码中的至少一位号码进行隐藏和/或替换。 Preferably, this step of the at least one contact telephone number corresponding to the number of the hide and / or replacement. 所述通信记录包括通话记录、短信、邮件、即时消息等,用户可预先选择其中一种或几种通信记录进行加密。 The communication record comprises call records, text messages, e-mail, instant message, etc., the user can pre-select one or several of the communication record is encrypted. 例如用户将联系人A进行加密,此时询问用户是否需将与联系人A有关的短信、通话记录、邮件等进行加密,用户可选择其中几项或不选,如果用户进行了选择,则将相应的选择项进行加密。 A user, for example, a contact is encrypted, then asks the user if need be associated with contact A text messages, call history, etc. encrypted message, wherein the user may select or deselect few, if a user is selected, the corresponding encrypted option.

[0064] 所述将联系人信息的部分内容进行隐藏是指,将联系人信息的一部分内容正常显示,而另一部分内容不显示,进行隐藏处理的对象优选是数字、文字和/或字母等文本内容。 [0064] The part of the contact information refers to hide the part of the normal display contact information, and another part does not appear, the hidden object is preferably processed numerals, characters, and / or alphabetic text content. 这样他人无法看到完整的联系人信息。 So others can not see the full contact information. 优选的是,本步骤将联系人对应的电话号码中的至少一位号码进行隐藏。 Preferably, this step corresponding to the contact telephone number to hide at least one number. 所述号码的位数和位置可以由系统默认设置或者用户预先定义。 The number and position of bits may be set default or predefined by the system user. 例如,正常的手机号码为11位,但用户选择的加密联系人信息只显示手机号码的8〜10位数字,用户可具体选择哪几位进行隐藏。 For example, a normal mobile phone number is 11, but the encrypted contact information selected by the user to display only 8~10-digit phone number, the user can select which of several specific hide.

[0065] 所述将联系人信息的部分内容进行替换是指,将联系人信息的一部分内容正常显示,但对另一部分内容进行替换处理并生成替换内容后显示,进行替换处理的对象优选是数字、文字和/或字母等文本内容。 Display [0065] The part of the contact information replacement means, part of the normal display contact information, but another part of the replacement process contents and generates replacement, the replacement process is preferably a digital object , and other words and / or letters text content. 这样他人无法看到准确的联系人信息。 So that others can not see accurate contact information. 优选的是,本步骤将将联系人对应的电话号码中的至少一位号码进行替换,例如电话号码的原第九位号码是5,替换后的第九位号码为3。 Preferably, this step corresponding to the contact telephone number of at least a number of replacements, such ninth original phone number is the number 5, after the replacement ninth number is 3. 所述号码的位数和位置可以由系统默认设置或者用户预先定义。 The number and position of bits may be set default or predefined by the system user. 例如,正常的手机号码为11位,但用户选择的加密联系人信息只正常显示手机号码的8〜10位数字,其余I〜3为进行号码替换,用户可具体选择哪几位进行替换。 For example, a normal mobile phone number is 11 bits, but the encrypted contact information of the user selected display only normal 8~10 digit phone number, the remaining number I~3 is replaced, the user can select which of several specific replacement.

[0066] 图4是本发明第一实施例中联系人信息的加密方法的流程图,其可以通过如图2所示的通信终端100实现,包括步骤有: [0066] FIG. 4 is a flowchart illustrating an encryption method according to a first embodiment of the contact information of the present invention, which may be implemented by communication terminal 100 shown in FIG. 2, comprising the steps of:

[0067] 步骤S401,选择需要加密的至少一联系人。 [0067] step S401, the encryption select at least one contact. 这里,用户可以在通讯录中选择至少一联系人进行加密处理,或者选择通讯录中所有联系人进行加密处理。 Here, the user can select at least one contact in the address book is encrypted, or select all the contacts in the address book is encrypted.

[0068] 步骤S402,设置加密密码,所述加密密码可以采用数字、字母和/或字符等形式。 [0068] step S402, the set encryption password, the encrypted password can take the form of numbers, letters and / or characters. [0069] 需指出的是,所述步骤S401和S402之间没有顺序之分。 [0069] Note that it is not divided between the order of the steps S401 and S402.

[0070] 步骤S403,将联系人对应的联系人信息的部分内容进行隐藏和/或替换。 [0070] step S403, the contact part of the contact information corresponding to hide and / or replacement. 当然,本步骤也可以通过其他方式将联系人对应的联系人信息进行部分加密。 Of course, this step may be performed corresponding to the contact information of the contact portion encrypted by other means. 所述联系人信息包括联系人对应的名称、联系方式和/或通信记录等,所述联系方式包括电话号码、邮箱地址、即时消息账号等,所述通信记录包括通话记录、短信、邮件、即时消息等。 The contact information includes a name corresponding to the contact, contact and / or communication records, the contact comprises a telephone number, email address, instant messaging accounts, etc., the communication record comprises call records, text messages, e-mail, instant messages. 优选的是,保密处理模块20用于将联系人对应的电话号码中的至少一位号码进行隐藏和/或替换。 Preferably, the confidentiality processing module 20 for the contact telephone number corresponding to at least one number to hide and / or replacement.

[0071] 步骤S404,收到用户输入的加密密码后,将联系人信息进行正常显示。 After the [0071] step S404, the received encrypted password input by the user, the contact information is normally displayed. 当用户想查看完整的联系人信息时,只需输入正确的加密密码,即可看到联系人信息的完整数据。 When a user wants to view the complete contact information, just enter the correct encryption password, you can see the full data contact information.

[0072] 图5是本发明第二实施例中联系人信息的加密方法的流程图,其可以通过如图2所示的通信终端100实现,包括步骤有: [0072] FIG. 5 is a flowchart illustrating an encryption method according to a second embodiment of the contact information of the present invention, which may be implemented by communication terminal 100 shown in FIG. 2, comprising the steps of:

[0073] 步骤S501,设置加密密码。 [0073] step S501, the set encryption password.

[0074] 步骤S502,选择需要加密的至少一联系人。 [0074] step S502, the selected at least one contact to be encrypted. 这里,用户可以在通讯录中选择至少一联系人进行加密处理,或者选择通讯录中所有联系人进行加密处理。 Here, the user can select at least one contact in the address book is encrypted, or select all the contacts in the address book is encrypted.

[0075] 步骤S503,设置至少一加密条件。 [0075] step S503, the encrypted at least one condition. 用于设置至少一加密条件,只有当前情况符合所述加密条件时才能对联系人信息进行加密处理。 For setting at least an encrypted condition, only the current situation in order to comply with the contact information when encrypting the encrypted condition. 所述加密条件可以是特定的加密位置和/或加密时间段等,用户可选择上述至少一种加密条件对联系人信息进行加密。 The condition may be a particular encryption encrypted position and / or encryption time range, the user may select at least one of the above-described conditions contacts encryption information is encrypted.

[0076] 本步骤优选的是,设置加密位置以及所述加密位置对应的第一联系人,例如用户将加密位置设置为“深圳市南山区科技园”,将需要加密的第一联系人设置为“小张”、“小王”等;和/或,设置加密时间段以及所述加密时间段对应的第二联系人,例如,用户将加密时间段设置为“18:00〜24:00”,将需要加密的第二联系人设置为“小刘”、“小陈”等。 [0076] This step is preferably provided a first contact position, and the encryption position corresponding to the encrypted, such as user location encrypted to "Science and Technology Park Nanshan District, Shenzhen", will need to encrypt the first contact set "Sally", "Wang" and the like; and / or a second contact set and said encrypted crypto-period period corresponding to, e.g., the user crypto-period is set to "18: 00~24: 00 ' You will require encryption second contacts as "Liu", "Chen" and so on.

[0077] 需指出的是,所述步骤S501、S502以及S503之间没有顺序之分。 [0077] Note that it is not divided between the order of the steps S501, S502 and S503.

[0078] 步骤S504,判断是否符合所述加密条件,若是则执行步骤S505,否则执行步骤S506。 [0078] step S504, the encryption is determined whether the condition is executed if step S505, otherwise step S506. 本步骤优选的是,判断当前位置是否达到加密位置和/或判断当前时间是否属于加密时间段,若是则执行步骤S505,否则执行步骤S506。 Preferably this step is determined whether the current position of the encrypted position and / or whether the current time belongs to the crypto-period, if yes, perform step S505, otherwise step S506.

[0079] 步骤S505,将所述联系人对应的联系人信息的部分内容进行隐藏和/或替换。 [0079] step S505, the contact part of the contact information corresponding to hide and / or replacement. 当然,本步骤也可以通过其他方式将联系人对应的联系人信息进行部分加密。 Of course, this step may be performed corresponding to the contact information of the contact portion encrypted by other means. 优选的是,将联系人对应的电话号码中的至少一位号码进行隐藏和/或替换。 Preferably, the at least one contact telephone number corresponding to the number of the hide and / or replacement. 本步骤优选的是,若当前位置达到加密位置,则将第一联系人对应的第一联系人信息的部分内容进行隐藏和/或替换。 Preferably this step is, if the current position reaches the first contact part of the encrypted position information, corresponding to the first contact will be hidden and / or replacement. 本实施例中,若用户携带通信终端100到达“深圳市南山区科技园”这个加密位置,则对“小张”、“小王”等第一联系人的第一联系人信息进行加密处理,本实施例中,若用户携带通信终端100到达“深圳市南山区科技园”这个加密位置,则对“小张”、“小王”等第一联系人的第一联系人信息进行加密处理,而当通信终端100离开该加密位置后,第一联系人信息又可以正常显示;和/或,若当前时间属于加密时间段,则将第二联系人对应的第二联系人信息的部分内容进行隐藏和/或替换。 In this embodiment, when the user carrying the communication terminal 100 to the "Science and Technology Park Nanshan District, Shenzhen," the encrypted position, the first contact of the first contact information, "Sally", "Wang" and the like is encrypted, in this embodiment, when the user carrying the communication terminal 100 to the "Science and Technology Park Nanshan District, Shenzhen," the encrypted position, the first contact of the first contact information, "Sally", "Wang" and the like is encrypted, and when the communication terminal 100 leaves the encrypted position, and the first contact information may be displayed normally; for and / or, if the current time is in part encrypted second contact time period, then the corresponding second contact hide and / or replacement. 本实施例中,若通信终端100判断出当前时间“19:00”属于“18:00〜24:00”这个加密时间段,则对“小刘”、“小陈”等第二联系人的第二联系人信息进行加密处理,而当前时间超过该加密时间段后,第二联系人信息又可以正常显示。 In this embodiment, the communication terminal 100 determines if the current time "19:00" are "18: 00~24: 00" The crypto-period, then the "Liu", "Chen" and the second contact second contact information is encrypted, and the encryption after the current time exceeds the time period, the second contact information and can be displayed properly.

[0080] 步骤S506,将联系人对应的联系人信息进行正常显示。 [0080] step S506, the contact information corresponding to the contact normal display.

[0081] 步骤S507,判断是否收到用户输入的正确的加密密码,若是则返回步骤S506,这样用户可以查看到完整而正确的联系人信息;否则,返回步骤S505。 [0081] step S507, determines whether or not the correct encryption password entered by the user, if step S506 returns, so that the user can view the complete and accurate contact information; otherwise, returns to step S505. [0082] 综上所述,本发明通信终端在确定需要加密的联系人后,将所述联系人对应的联系人信息进行部分加密,优选将联系人信息的部分内容进行隐藏和/或替换,所述联系人信息包括联系人的名称、联系方式和/或通信记录等。 [0082] In summary, the communication terminal of the present invention, after determining the encryption is required contacts, corresponding to the contact information of the contact portion is encrypted, preferably the part of the contact information is hidden and / or replacement, the contact information includes the name of the contact, contact and / or communication records. 避免了现有技术将联系人信息完全隐藏所导致的易于识破的问题,本发明只是隐藏和/或替换联系人信息的部分内容,因此不易被他人发觉,安全性更好。 Avoids the prior art problem of contact information caused completely hidden easy to see through, but the present invention is to hide and / or part replacement contact information, it is not easy to be found others, better security. 更好的是,可提供更丰富的加密条件供用户选择,例如特定的加密位置或加密时间段等;唯有当前情况符合加密条件时,才会对联系人信息进行加密处理,从而解决了现有技术加密条件单一的局限性,从而提高了用户体验。 Better yet, it can provide a richer encryption conditions for users to choose, such as a specific location or encrypted encryption and other time periods; only when consistent with current encryption conditions for contact information will be encrypted, so as to solve now there are technical limitations of a single encryption conditions, thereby improving the user experience.

[0083]当然,本发明还可有其它多种实施例,在不背离本发明精神及其实质的情况下,熟悉本领域的技术人员当可根据本发明作出各种相应的改变和变形,但这些相应的改变和变形都应属于本发明所附的权利要求的保护范围。 [0083] Of course, the present invention may have a variety of other embodiments, without departing from the spirit and essence of the present invention, those skilled in the art can make various corresponding modifications and variations according to the present invention, but these corresponding changes and variations should fall within the scope of the appended claims.

Claims (10)

1.一种联系人信息的加密方法,其特征在于,包括步骤有: 选择需要加密的至少一联系人; 将所述联系人对应的联系人信息进行部分加密。 1. A method of encryption contact information, characterized by comprising the step of: selecting at least one contact to be encrypted; contact information of contacts corresponding to the partial encryption.
2.根据权利要求1所述的加密方法,其特征在于,所述将联系人对应的联系人信息进行部分加密的步骤包括: 将所述联系人对应的联系人信息的部分内容进行隐藏和/或替换。 The encryption method according to claim 1, wherein the contact information corresponding to the contact portion is the step of encrypting comprises: a contact part corresponding to the contact information of the hide and / or replaced.
3.根据权利要求1所述的加密方法,其特征在于,所述联系人对应的所述联系人信息包括所有与所述联系人建立关联的数据信息。 3. The encryption method according to claim 1, wherein the contact information corresponding to the contact information includes all data associated with the contact.
4.根据权利要求2或3所述的加密方法,其特征在于,所述将联系人对应的联系人信息的部分内容进行隐藏和/或替换的步骤之前还包括: 设置至少一加密条件; 所述将联系人对应的联系人信息的部分内容进行隐藏和/或替换的步骤包括: 判断是否符合所述加密条件,若是则将所述联系人对应的所述联系人信息的部分内容进行隐藏和/或替换。 The encryption method of claim 2 or claim 3, characterized in that the part of the contact information corresponding to the contact step of hiding and / or replaced before further comprises: encrypting at least one condition; the said step of the contact part of the contact information corresponding to hide and / or replacement comprising: determining whether the conditions of the encryption, if part of the contact information corresponding to the contact will be hidden and / or replacement.
5.根据权利要求4所述的加密方法,其特征在于,所述设置至少一加密条件的步骤包括: 设置加密位置以及所述加密位置对应的第一联系人;和/或设置加密时间段以及所述加密时间段对应的第二联系人; 所述判断是否符合所述加密条件,若是则将所述联系人对应的所述联系人信息的部分内容进行隐藏和/或替换的步骤包括: 判断当前位置是否达到所述加密位置,若是则将所述第一联系人对应的第一联系人信息的部分内容进行隐藏和/或替换;和/或判断当前时间是否属于所述加密时间段,若是将所述第二联系人对应的第二联系人信息的部分内容进行隐藏和/或替换。 The encryption method according to claim 4, wherein said at least one encrypted condition setting step comprises: setting a first contact, and the encrypted position corresponding to the encrypted position; and / or set encryption period and the crypto-period corresponding to a second contact; determining whether the encryption conforms to the conditions, hide and / or alternative steps if part of the contact information will be corresponding to the contact comprises: determining whether the current position reaches the encrypted position, the first part if the contact information corresponding to the first contact will be hidden and / or replacement; and / or whether the current time belongs to the crypto-period, if part of the second contact to the second contact information corresponding to hide and / or replacement.
6.一种通信终端,其特征在于,包括有: 联系人选择模块,用于选择需要加密的至少一联系人; 保密处理模块,用于将所述联系人对应的联系人信息进行部分加密。 A communication terminal, characterized by, comprising: a contact selection module for selecting at least one contact to be encrypted; confidentiality processing module, configured to contact the contact information corresponding to the partial encryption.
7.根据权利要求6所述的通信终端,其特征在于,所述保密处理模块用于将所述联系人对应的联系人信息的部分内容进行隐藏和/或替换。 The communication terminal according to claim 6, characterized in that the confidentiality processing module is configured to contact part of the contact information corresponding to hide and / or replacement.
8.根据权利要求6所述的通信终端,其特征在于,所述联系人对应的所述联系人信息包括所有与所述联系人建立关联的数据信息。 8. The communication terminal according to claim 6, wherein the contact information corresponding to the contact information includes all data associated with the contact.
9.根据权利要求6或7所述的通通信终端,其特征在于,还包括: 条件设置模块,用于设置至少一加密条件; 所述保密处理模块用于判断是否符合所述加密条件,若是则将所述联系人对应的所述联系人信息的部分内容进行隐藏和/或替换。 9. The communication terminal through 6 or claim 7, characterized in that, further comprising: condition setting means for setting at least one encrypted condition; the confidentiality processing module is configured to determine whether the condition of the encryption, if part of the contact information corresponding to the contact will be hidden and / or replacement.
10.根据权利要求9所述的通信终端,其特征在于,所述条件设置模块进一步包括: 第一条件设置子模块,用于设置加密位置以及所述加密位置对应的第一联系人;和/或第二条件设置子模块,用于设置加密时间段以及所述加密时间段对应的第二联系人;所述保密处理模块进一步包括: 第一保密处理子模块,用于判断当前位置是否达到所述加密位置,若是则将该第一联系人对应的第一联系人信息的部分内容进行隐藏和/或替换;和/或第二保密处理子模块,用于判断当前时间是否属于所述加密时间段,若是将所述第二联系人对应的第二联系人信息的部分内容进行隐藏和/或替换。 The communication terminal according to claim 9, wherein said condition setting module further comprises: a first sub-condition setting means for setting a first contact position, and encrypting the encrypted position corresponding to; and / or the second sub-condition setting means for setting a second contact and said encrypted crypto-period corresponding to the time period; the secret processing module further comprises: a first confidential sub-module for determining whether the current position said encrypted position, if the content of the first portion of the first contact corresponding to contact information is hidden and / or replacement; and / or the second security processing sub-module, configured to determine whether the current time belongs to the encrypted time segment, the second contact part if the information corresponding to the second contact to hide and / or replacement.
CN 201210593240 2012-12-31 2012-12-31 Contact information of the encryption method and the communication terminal CN103095890B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201210593240 CN103095890B (en) 2012-12-31 2012-12-31 Contact information of the encryption method and the communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201210593240 CN103095890B (en) 2012-12-31 2012-12-31 Contact information of the encryption method and the communication terminal

Publications (2)

Publication Number Publication Date
CN103095890A true true CN103095890A (en) 2013-05-08
CN103095890B CN103095890B (en) 2016-09-21

Family

ID=48208008

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201210593240 CN103095890B (en) 2012-12-31 2012-12-31 Contact information of the encryption method and the communication terminal

Country Status (1)

Country Link
CN (1) CN103095890B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104079721A (en) * 2014-06-26 2014-10-01 北京百纳威尔科技有限公司 Terminal contact person security processing method and device
CN104301543A (en) * 2014-10-30 2015-01-21 西安酷派软件科技有限公司 Information processing method, information processing device and terminal
CN104378503A (en) * 2014-10-31 2015-02-25 东莞宇龙通信科技有限公司 Method, device and terminal avoiding information display leakage
CN104376011A (en) * 2013-08-14 2015-02-25 华为终端有限公司 Privacy protection implementing method and device
CN104768148A (en) * 2015-03-11 2015-07-08 浙江翼信科技有限公司 Message encryption method and device
CN104796534A (en) * 2015-03-16 2015-07-22 西安酷派软件科技有限公司 Method and device for processing information contents
WO2015143827A1 (en) * 2014-03-24 2015-10-01 中兴通讯股份有限公司 Method, apparatus and communication system for address book protection
CN105320892A (en) * 2014-06-16 2016-02-10 腾讯科技(深圳)有限公司 Method for communication record storage of social communication application and related system
CN105373742A (en) * 2015-10-23 2016-03-02 广东欧珀移动通信有限公司 Method and device for automatically deleting information in mobile terminal
CN106027490A (en) * 2016-04-29 2016-10-12 乐视控股(北京)有限公司 Nickname generating system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101304453A (en) * 2008-06-17 2008-11-12 宇龙计算机通信科技(深圳)有限公司 Mobile terminal as well as method and system for data privacy
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 Method and system for protecting individual privacy in mobile phone
CN101854418A (en) * 2010-01-27 2010-10-06 江苏华安高技术安防产业有限公司 Short message content handwriting encryption and decryption realization method based on address list
CN101917279A (en) * 2010-08-09 2010-12-15 广州客多软件科技有限公司 Broadcast information transmission system and method for transmitting broadcast information by using same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101304453A (en) * 2008-06-17 2008-11-12 宇龙计算机通信科技(深圳)有限公司 Mobile terminal as well as method and system for data privacy
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 Method and system for protecting individual privacy in mobile phone
CN101854418A (en) * 2010-01-27 2010-10-06 江苏华安高技术安防产业有限公司 Short message content handwriting encryption and decryption realization method based on address list
CN101917279A (en) * 2010-08-09 2010-12-15 广州客多软件科技有限公司 Broadcast information transmission system and method for transmitting broadcast information by using same

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104376011B (en) * 2013-08-14 2018-08-17 华为终端(东莞)有限公司 Implement privacy protection method and device
CN104376011A (en) * 2013-08-14 2015-02-25 华为终端有限公司 Privacy protection implementing method and device
WO2015143827A1 (en) * 2014-03-24 2015-10-01 中兴通讯股份有限公司 Method, apparatus and communication system for address book protection
JP2017516343A (en) * 2014-03-24 2017-06-15 ゼットティーイー コーポレーションZte Corporation Address book protection method, apparatus and communication system
CN105320892A (en) * 2014-06-16 2016-02-10 腾讯科技(深圳)有限公司 Method for communication record storage of social communication application and related system
CN104079721B (en) * 2014-06-26 2017-01-18 北京百纳威尔科技有限公司 Safety contact terminal apparatus and processing method
CN104079721A (en) * 2014-06-26 2014-10-01 北京百纳威尔科技有限公司 Terminal contact person security processing method and device
CN104301543A (en) * 2014-10-30 2015-01-21 西安酷派软件科技有限公司 Information processing method, information processing device and terminal
CN104378503A (en) * 2014-10-31 2015-02-25 东莞宇龙通信科技有限公司 Method, device and terminal avoiding information display leakage
CN104768148A (en) * 2015-03-11 2015-07-08 浙江翼信科技有限公司 Message encryption method and device
CN104796534B (en) * 2015-03-16 2018-07-27 西安酷派软件科技有限公司 Species content processing method and apparatus
CN104796534A (en) * 2015-03-16 2015-07-22 西安酷派软件科技有限公司 Method and device for processing information contents
CN105373742A (en) * 2015-10-23 2016-03-02 广东欧珀移动通信有限公司 Method and device for automatically deleting information in mobile terminal
CN105373742B (en) * 2015-10-23 2018-09-04 广东欧珀移动通信有限公司 The method of mobile terminal automatically deleted kinds of information and means
CN106027490A (en) * 2016-04-29 2016-10-12 乐视控股(北京)有限公司 Nickname generating system and method

Also Published As

Publication number Publication date Type
CN103095890B (en) 2016-09-21 grant

Similar Documents

Publication Publication Date Title
US8412675B2 (en) Context aware data presentation
Soghoian Caught in the cloud: Privacy, encryption, and government back doors in the web 2.0 era
US20110113109A1 (en) Secure Electronic Mail System
US8126456B2 (en) Mobile communication device monitoring systems and methods
US20110072499A1 (en) Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password
US20130061307A1 (en) Method and Apparatus for Accessing Corporate Data from a Mobile Device
Bønes et al. Risk analysis of information security in a mobile instant messaging and presence system for healthcare
US20140208405A1 (en) Simplified and Safe User Authentication
CN101035335A (en) Mobile phone privacy protection method
US20110276638A1 (en) Certified email messages and attachments
CN101815119A (en) Method and system for processing information of private contact person and mobile communication terminal
US20140304508A1 (en) Confidential message exchange using benign, context-aware cover message generation
CN101252748A (en) System and method for realizing privacy SMS on mobile terminal
US20090328165A1 (en) Method and apparatus for generating one-time passwords
US20140378099A1 (en) Method and Apparatus for Processing Data and Message
CN102006358A (en) Mobile phone private communication management system and method
CN103457991A (en) Terminal safety protection method and system
CN101645971A (en) Method for establishing classification rule of short messages of mobile phone
CN101895607A (en) Method and terminal for protecting user privacy information
US20110213974A1 (en) Identifying relationships between users of a communications domain
US20120115435A1 (en) Privacy in Mobile Device Communications
US20080170689A1 (en) Systems and methods for conducting secure wired and wireless networked telephony
US20140214668A1 (en) Mobile communication device monitoring systems and methods
CN101304453A (en) Mobile terminal as well as method and system for data privacy
CN103002124A (en) Method, device and equipment for processing communication data

Legal Events

Date Code Title Description
C06 Publication
C10 Entry into substantive examination
C14 Grant of patent or utility model