CN104079721A - Terminal contact person security processing method and device - Google Patents

Terminal contact person security processing method and device Download PDF

Info

Publication number
CN104079721A
CN104079721A CN201410294331.0A CN201410294331A CN104079721A CN 104079721 A CN104079721 A CN 104079721A CN 201410294331 A CN201410294331 A CN 201410294331A CN 104079721 A CN104079721 A CN 104079721A
Authority
CN
China
Prior art keywords
contact person
information
sub
security
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410294331.0A
Other languages
Chinese (zh)
Other versions
CN104079721B (en
Inventor
张峰懿
毛波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Beny Wave Science and Technology Co Ltd
Original Assignee
Beijing Beny Wave Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Beny Wave Science and Technology Co Ltd filed Critical Beijing Beny Wave Science and Technology Co Ltd
Priority to CN201410294331.0A priority Critical patent/CN104079721B/en
Publication of CN104079721A publication Critical patent/CN104079721A/en
Application granted granted Critical
Publication of CN104079721B publication Critical patent/CN104079721B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a terminal contact person security processing method and device. The method comprises the steps that a terminal receives contact person information security level setting information; the terminal looks up contact person sub-information hiding strategies corresponding to the security level setting information in a preset security strategy database according to the security level setting information; the terminal hides contact person sub-information according to the contact person sub-information hiding strategies and identifies corresponding security levels on the contact person sub-information. By adopting the terminal contact person security processing method and device, classified security levels of the contact person sub-information is achieved, different hiding strategies can be flexibly taken on different contact person sub-information according to the user demands in a user-defined mode, the security of the contact person sub-information is greatly improved, information leakage is prevented, and the user experience is further improved.

Description

Terminal contact person's security processing and device
Technical field
The present invention relates to the communication technology, relate in particular to a kind of terminal contact person's security processing and device.
Background technology
Along with the develop rapidly of the communication technology, and intelligent terminal (such as: mobile phone, panel computer etc.) also extensively universal in life.User is usually stored in contact person's information in the intelligent terminal of oneself holding, and wherein, contact person's information can comprise: name, telephone number, also comprise some privacies of contact person, such as work unit, position, mailbox, address etc.
In prior art, as long as can open the contacts list of user terminal, just can see all information in contacts list, cause like this each associated person information in contacts list easily to be revealed.
Summary of the invention
The invention provides a kind of terminal contact person's security processing and device, the problem of easily revealing for solving existing terminal associated person information.
First aspect present invention provides a kind of terminal contact person's security processing, comprising:
Terminal receives the sub-information security rank of the contact person configuration information of user's input;
Described terminal, according to described level of security configuration information, is searched the sub-Information hiding strategy of contact person corresponding to described level of security configuration information in default Security Policy Database;
Described terminal is hidden the sub-information of described contact person according to the sub-Information hiding strategy of described contact person, and identifies corresponding level of security in the sub-information of described contact person.
Second aspect present invention provides a kind of terminal contact person's safety device, comprising:
Receiver module, for receiving the sub-information security rank of the contact person configuration information of user's input;
Search module, for according to described level of security configuration information, in default Security Policy Database, search the sub-Information hiding strategy of contact person corresponding to described level of security configuration information;
Security module for according to the sub-Information hiding strategy of described contact person, the sub-information of described contact person being hidden, and identifies corresponding level of security in the sub-information of described contact person.
In the present invention, terminal receives after the sub-information security rank of the contact person configuration information of user's input, according to this level of security configuration information, in default Security Policy Database, search the sub-Information hiding strategy of corresponding contact person, and adopt the sub-Information hiding strategy of this contact person to hide the sub-information of above-mentioned contact person, realized minute rank safeguard protection to the sub-information of each contact person in terminal, and can be flexibly according to user's request, make free burial ground for the destitute by oneself the sub-information of different contact persons is taked to different hiding strategies, greatly improved the safety of the sub-information of contact person, prevent these information leakage, also improved user's experience simultaneously.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the schematic flow sheet of terminal contact person's security processing embodiment mono-provided by the invention;
Fig. 2 is the schematic flow sheet of terminal contact person's security processing embodiment bis-provided by the invention;
Fig. 3 is the structural representation of terminal contact person's secure processing device embodiment mono-provided by the invention;
Fig. 4 is the structural representation of terminal contact person's secure processing device embodiment bis-provided by the invention;
Fig. 5 is the structural representation of terminal contact person's secure processing device embodiment tri-provided by the invention.
Embodiment
For making object, technical scheme and the advantage of the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
Fig. 1 is the schematic flow sheet of terminal contact person's security processing embodiment mono-provided by the invention, and as shown in Figure 1, the method comprises:
S101, terminal receive the sub-information security rank of the contact person configuration information of user's input.
Wherein, the sub-information of described contact person can comprise: name, the pet name, mailbox, telephone number, work unit, position, address etc., but not as limit.
User can arrange interface by the contact person who opens a terminal, and carries out the setting of the sub-information security rank of contact person, particularly, in terminal, can preset security classification option, and user selects to arrange according to the privacy demand of oneself.For example, certain terminal is divided into safe class 3 grades in advance, 3rd level is highest, the 1st grade is lowermost level, wherein, user generally can fill on the pet name hurdle interpersonal relationships information own and contact person, as information such as " father ", " mothers ", user need to arrange the level of security of these information for the highest, and user just arranges interface the contact person of terminal the level of security of the sub-information of " pet name " this contact person is chosen as to 3rd level so.Certainly, also can only for certain contact person, arrange, for example, only the level of security of the sub-information of " pet name " this contact person of " father " correspondence is set to 3rd level.
S102, terminal, according to this level of security configuration information, are searched the sub-Information hiding strategy of contact person corresponding to this level of security configuration information in default Security Policy Database.
S103, terminal are hidden the sub-information of above-mentioned contact person according to the sub-Information hiding strategy of contact person, and identify corresponding level of security in the sub-information of this contact person.
Can pre-stored level of security configuration information in Security Policy Database and the mapping relations of the sub-Information hiding strategy of contact person, these mapping relations can be that terminal carries, and can be also user-defined.For user-defined situation, can be specifically, user arranges on interface at the sub-Information hiding strategy of contact person of terminal, select the sub-Information hiding strategy of contact person that each level of security is corresponding, for example, user can to select level of security be that the sub-Information hiding strategy of contact person of 3rd level is encrypted for the sub-information of this contact person being carried out to facial characteristics identification.
Afterwards, terminal receives after level of security configuration information, in default Security Policy Database, search the sub-Information hiding strategy of corresponding contact person, then the sub-information of this contact person is hidden, after hiding, only just visible to user after receiving the solution matching with the sub-Information hiding strategy of this contact person and hiding Info.For example, the level of security of the sub-information of contact person " mailbox " is " 3rd level ", terminal is carried out after facial characteristics identification encryption " mailbox " so, hide and be somebody's turn to do " mailbox ", and be " 3rd level " at the upper sign of the sub-information of this contact person " mailbox " level of security, while separate hiding, terminal gets after facial characteristics identical when encrypting, and removes and hides.
In the present embodiment, terminal receives after the sub-information security rank of the contact person configuration information of user's input, according to this level of security configuration information, in default Security Policy Database, search the sub-Information hiding strategy of corresponding contact person, and adopt the sub-Information hiding strategy of this contact person to hide the sub-information of above-mentioned contact person, realized minute rank safeguard protection to the sub-information of each contact person in terminal, and can be flexibly according to user's request, make free burial ground for the destitute by oneself the sub-information of different contact persons is taked to different hiding strategies, greatly improved the safety of the sub-information of contact person, prevent these information leakage, also improved user's experience simultaneously.
In specific implementation process, the sub-Information hiding strategy of contact person can comprise following any: 1) the sub-information of contact person is carried out to numerical chracter combined ciphering.Like this, terminal, when the sub-information of contact person being hidden according to contact person's hiding strategy, can allow user input password by display interface.2) associated person information being carried out to facial characteristics identification encrypts.Like this, terminal is when hiding the sub-information of contact person according to contact person's hiding strategy, and the facial characteristics that can obtain by the camera of terminal user is encrypted as password.3) the sub-information of contact person is carried out to fingerprint recognition encryption.Like this, terminal is when hiding the sub-information of contact person according to contact person's hiding strategy, and the fingerprint that the fingerprint identification function by terminal obtains user is encrypted as password.4) the sub-information of contact person is carried out to speech recognition encryption.Like this, terminal is when hiding the sub-information of contact person according to contact person's hiding strategy, and the voice mail that the speech identifying function by terminal obtains user is encrypted as password.
Further, after in terminal, according to contact person, sub-Information hiding strategy is hidden the sub-information of above-mentioned contact person, also comprise: terminal receives the request of checking of the sub-information of above-mentioned contact person of user's input, then, terminal shows to separate to hide to this user according to the request of checking of the sub-information of this contact person processes interface, this terminal receives user and hides Info in the solution of this processing interface input, if this solution hides Info the contact person corresponding with the sub-information of above-mentioned contact person, sub-Information hiding strategy matches, and the sub-information of this contact person is removed and is hidden.
Illustrate, suppose in contacts list, the level of security of name of contact person is minimum, for everyone is visible, do not hide, and the level of security of contact person's mailbox is the highest, this contact person's mailbox is carried out to facial characteristics identification to be encrypted, so, when user opens contacts list and checks, can only see the name of each contact person in this list, suppose that user will check that name is the contact person's of " Zhang San " mailbox, on the corresponding operation interface of terminal, select to check, terminal just receives the sub-information inspection request of contact person of user's input like this, and then show and separate the hiding interface of processing to user, in this example, to user, show that facial characteristics obtains interface, can be for example to open camera function, after getting user's facial characteristics, mate, if the facial characteristics of the facial characteristics getting when encrypting before matches, " Zhang San " corresponding " mailbox " removed and hidden, user just can see Zhang San's mailbox message like this.
Fig. 2 is the schematic flow sheet of terminal contact person's security processing embodiment bis-provided by the invention, and for the terminal that possesses voice control function, the method that the embodiment of the present invention provides also comprises:
S201, terminal receive first contact person's phonetic dialing indication information of user's input, and wherein, this first contact person phonetic dialing indication information comprises: this first contact person's the sub-information of any one contact person.
For example, in this user's contacts list, name is the contact person of " Xiao Wang ", and the sub-information of its contact person who comprises comprises the pet name " elder brother ", when this user wants to call out " Xiao Wang ", can by the voice control function input voice of this terminal, " to elder brother, make a phone call ".And in prior art, can only input " to Xiao Wang, making a phone call ".
S202, terminal, according to above-mentioned first contact person's phonetic dialing indication information, find the first corresponding contact person in contacts list.
S203, terminal are initiated dialing to this first contact person.
Terminal " makes a phone call " to identify " elder brother " for the sub-information of contact person according to the voice of user's input to elder brother, and then in contacts list, searches as keyword with " elder brother ".In concrete search procedure, can first in the sub-information of acquiescence contact person, search, for example, with the name information of contact person by default, with regard to first " name " in contacts list, search, because " elder brother " is the pet name of " Xiao Wang ", therefore at " name " Xiang Wei, find, further in the sub-information of other contact person, search, until find " elder brother " for above-mentioned the first contact person at " pet name " item, to this first contact person, initiate dialing.
It should be noted that, said method is equally applicable to user and sends by voice control function the operation that note etc. is carried out for contact person, with above-described embodiment, is not limited.
In prior art, when user dials by voice control function, can only input name of contact person, if the input contact person pet name cannot find contact person.In the present embodiment, user, when using voice control function, can, according to the sub-information of custom input contact person of oneself, just can find corresponding contact person, and without the sub-information of contact person of inputting appointment, greatly improve user's experience.
Fig. 3 is the structural representation of terminal contact person's secure processing device embodiment mono-provided by the invention, and this device can be integrated in terminal, and as shown in Figure 3, this device comprises: receiver module 301, search module 302 and security module 303.Wherein:
Receiver module 301, for receiving the sub-information security rank of the contact person configuration information of user's input.
Search module 302, for according to described level of security configuration information, in default Security Policy Database, search the sub-Information hiding strategy of contact person corresponding to described level of security configuration information.
Security module 303 for according to the sub-Information hiding strategy of described contact person, the sub-information of described contact person being hidden, and identifies corresponding level of security in the sub-information of described contact person.
Fig. 4 is the structural representation of terminal contact person's secure processing device embodiment bis-provided by the invention, and as shown in Figure 4, on the basis of Fig. 3, this device can also comprise: display module 401 and deciphering module 402, particularly, in the present embodiment:
Above-mentioned receiver module 301, also for receiving the request of checking of the sub-information of described contact person of user's input.
Display module 401, processes interface for showing to separate to hide to described user according to the request of checking of the sub-information of described contact person.
Deciphering module 402, hides Info in the solution of described processing interface input for receiving user, if described solution hides Info the contact person corresponding with the sub-information of described contact person, sub-Information hiding strategy matches, and the sub-information of described contact person is removed and is hidden.
Need to illustrate, the sub-information of described contact person can comprise: name, the pet name, mailbox, telephone number, work unit, position, address etc.
The sub-Information hiding strategy of contact person can comprise following any: 1) the sub-information of contact person is carried out to numerical chracter combined ciphering.Like this, terminal, when the sub-information of contact person being hidden according to contact person's hiding strategy, can allow user input password by display interface.2) associated person information being carried out to facial characteristics identification encrypts.Like this, terminal is when hiding the sub-information of contact person according to contact person's hiding strategy, and the facial characteristics that can obtain by the camera of terminal user is encrypted as password.3) the sub-information of contact person is carried out to fingerprint recognition encryption.Like this, terminal is when hiding the sub-information of contact person according to contact person's hiding strategy, and the fingerprint that the fingerprint identification function by terminal obtains user is encrypted as password.4) the sub-information of contact person is carried out to speech recognition encryption.Like this, terminal is when hiding the sub-information of contact person according to contact person's hiding strategy, and the voice mail that the speech identifying function by terminal obtains user is encrypted as password.
Fig. 5 is the structural representation of terminal contact person's secure processing device embodiment tri-provided by the invention, and as shown in Figure 5, on the basis of Fig. 4, this device can also comprise: processing module 501.Particularly, in the present embodiment,
Receiver module 301, also, for receiving first contact person's phonetic dialing indication information of user's input, wherein, described first contact person's phonetic dialing indication information comprises: described the first contact person's the sub-information of any one contact person.
Search module 302, also, for according to described first contact person's phonetic dialing indication information, in contacts list, find corresponding described the first contact person.
Processing module 501, for initiating dialing to described the first contact person.
This device is used for carrying out preceding method embodiment, and it realizes principle and technique effect is similar, does not repeat them here.
One of ordinary skill in the art will appreciate that: all or part of step that realizes above-mentioned each embodiment of the method can complete by the relevant hardware of program command.Aforesaid program can be stored in a computer read/write memory medium.This program, when carrying out, is carried out the step that comprises above-mentioned each embodiment of the method; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CDs.
Finally it should be noted that: each embodiment, only in order to technical scheme of the present invention to be described, is not intended to limit above; Although the present invention is had been described in detail with reference to aforementioned each embodiment, those of ordinary skill in the art is to be understood that: its technical scheme that still can record aforementioned each embodiment is modified, or some or all of technical characterictic is wherein equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution depart from the scope of various embodiments of the present invention technical scheme.

Claims (10)

1. a terminal contact person security processing, is characterized in that, comprising:
Terminal receives the sub-information security rank of the contact person configuration information of user's input;
Described terminal, according to described level of security configuration information, is searched the sub-Information hiding strategy of contact person corresponding to described level of security configuration information in default Security Policy Database;
Described terminal is hidden the sub-information of described contact person according to the sub-Information hiding strategy of described contact person, and identifies corresponding level of security in the sub-information of described contact person.
2. method according to claim 1, is characterized in that, described terminal also comprises after the sub-information of described contact person being hidden according to the sub-Information hiding strategy of described contact person:
Described terminal receives the request of checking of the sub-information of described contact person of user's input;
Described terminal shows to separate to hide to described user according to the request of checking of the sub-information of described contact person processes interface;
Described terminal receives user and hides Info in the solution of described processing interface input, if described solution hides Info the contact person corresponding with the sub-information of described contact person, sub-Information hiding strategy matches, and the sub-information of described contact person is removed and is hidden.
3. method according to claim 2, is characterized in that, the sub-information of described contact person comprises: name, the pet name, mailbox, telephone number, work unit, position, address.
4. method according to claim 2, is characterized in that, the sub-Information hiding strategy of described contact person comprise following any:
The sub-information of described contact person is carried out to numerical chracter combined ciphering; Or,
The sub-information of described contact person is carried out to facial characteristics identification encrypts; Or,
The sub-information of described contact person is carried out to fingerprint recognition encryption; Or,
The sub-information of described contact person is carried out to speech recognition encryption.
5. according to the method described in claim 3 or 4, it is characterized in that, also comprise:
Described terminal receives first contact person's phonetic dialing indication information of user's input, and wherein, described first contact person's phonetic dialing indication information comprises: described the first contact person's the sub-information of any one contact person;
Described terminal, according to described first contact person's phonetic dialing indication information, finds corresponding described the first contact person in contacts list;
Described terminal is initiated dialing to described the first contact person.
6. a terminal contact person secure processing device, is characterized in that, comprising:
Receiver module, for receiving the sub-information security rank of the contact person configuration information of user's input;
Search module, for according to described level of security configuration information, in default Security Policy Database, search the sub-Information hiding strategy of contact person corresponding to described level of security configuration information;
Security module for according to the sub-Information hiding strategy of described contact person, the sub-information of described contact person being hidden, and identifies corresponding level of security in the sub-information of described contact person.
7. device according to claim 6, is characterized in that, also comprises:
Display module and deciphering module;
Described receiver module, also for receiving the request of checking of the sub-information of described contact person of user's input;
Described display module, processes interface for showing to separate to hide to described user according to the request of checking of the sub-information of described contact person;
Described deciphering module, hides Info in the solution of described processing interface input for receiving user, if described solution hides Info the contact person corresponding with the sub-information of described contact person, sub-Information hiding strategy matches, and the sub-information of described contact person is removed and is hidden.
8. device according to claim 7, is characterized in that, the sub-information of described contact person comprises: name, the pet name, mailbox, telephone number, work unit, position, address.
9. device according to claim 7, is characterized in that, the sub-Information hiding strategy of described contact person comprise following any:
The sub-information of described contact person is carried out to numerical chracter combined ciphering; Or,
The sub-information of described contact person is carried out to facial characteristics identification encrypts; Or,
The sub-information of described contact person is carried out to fingerprint recognition encryption; Or,
The sub-information of described contact person is carried out to speech recognition encryption.
10. device according to claim 8 or claim 9, is characterized in that, also comprises:
Processing module;
Described receiver module, also, for receiving first contact person's phonetic dialing indication information of user's input, wherein, described first contact person's phonetic dialing indication information comprises: described the first contact person's the sub-information of any one contact person;
The described module of searching also, for according to described first contact person's phonetic dialing indication information, finds corresponding described the first contact person in contacts list;
Described processing module, for initiating dialing to described the first contact person.
CN201410294331.0A 2014-06-26 2014-06-26 Terminal contact person security processing method and device Expired - Fee Related CN104079721B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410294331.0A CN104079721B (en) 2014-06-26 2014-06-26 Terminal contact person security processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410294331.0A CN104079721B (en) 2014-06-26 2014-06-26 Terminal contact person security processing method and device

Publications (2)

Publication Number Publication Date
CN104079721A true CN104079721A (en) 2014-10-01
CN104079721B CN104079721B (en) 2017-01-18

Family

ID=51600759

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410294331.0A Expired - Fee Related CN104079721B (en) 2014-06-26 2014-06-26 Terminal contact person security processing method and device

Country Status (1)

Country Link
CN (1) CN104079721B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104333662A (en) * 2014-11-14 2015-02-04 深圳市中兴移动通信有限公司 Mobile terminal and encrypting method and device for telephone answering of mobile terminal
CN104486372A (en) * 2014-11-21 2015-04-01 深圳市中兴移动通信有限公司 Contact displaying method, device and terminal
CN104618227A (en) * 2015-03-05 2015-05-13 浙江翼信科技有限公司 Method and device for protecting relevant information of instant message contact
CN105611040A (en) * 2015-09-23 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Information display method, information display device and terminal
CN106682524A (en) * 2016-11-23 2017-05-17 张伟彬 Data privacy protection method of mobile terminal
CN106941565A (en) * 2017-03-22 2017-07-11 努比亚技术有限公司 Address list display method and mobile terminal
CN107426420A (en) * 2017-07-06 2017-12-01 努比亚技术有限公司 A kind of method, apparatus and computer-readable recording medium for protecting associated person information
CN107766736A (en) * 2017-09-27 2018-03-06 维沃移动通信有限公司 A kind of information disguising method and mobile terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060234764A1 (en) * 2005-04-18 2006-10-19 Fujitsu Limited Electronic device, operational restriction control method thereof and operational restriction control program thereof
CN101553051A (en) * 2008-03-31 2009-10-07 富士通株式会社 Portable device and information management method
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal
CN103631822A (en) * 2012-08-27 2014-03-12 联想(北京)有限公司 Query method and electronic equipment
CN103795849A (en) * 2012-11-01 2014-05-14 广州三星通信技术研究有限公司 Device and method for executing operation on private contact person in portable terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060234764A1 (en) * 2005-04-18 2006-10-19 Fujitsu Limited Electronic device, operational restriction control method thereof and operational restriction control program thereof
CN101553051A (en) * 2008-03-31 2009-10-07 富士通株式会社 Portable device and information management method
CN103631822A (en) * 2012-08-27 2014-03-12 联想(北京)有限公司 Query method and electronic equipment
CN103795849A (en) * 2012-11-01 2014-05-14 广州三星通信技术研究有限公司 Device and method for executing operation on private contact person in portable terminal
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104333662A (en) * 2014-11-14 2015-02-04 深圳市中兴移动通信有限公司 Mobile terminal and encrypting method and device for telephone answering of mobile terminal
CN104486372A (en) * 2014-11-21 2015-04-01 深圳市中兴移动通信有限公司 Contact displaying method, device and terminal
CN104618227A (en) * 2015-03-05 2015-05-13 浙江翼信科技有限公司 Method and device for protecting relevant information of instant message contact
CN104618227B (en) * 2015-03-05 2018-09-04 浙江翼信科技有限公司 A kind of method and apparatus of protection instant communication contacts relevant information
CN105611040A (en) * 2015-09-23 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Information display method, information display device and terminal
WO2017049723A1 (en) * 2015-09-23 2017-03-30 宇龙计算机通信科技(深圳)有限公司 Information display method, device and terminal
CN105611040B (en) * 2015-09-23 2019-10-11 宇龙计算机通信科技(深圳)有限公司 Information display method, information display device and terminal
CN106682524A (en) * 2016-11-23 2017-05-17 张伟彬 Data privacy protection method of mobile terminal
CN106941565A (en) * 2017-03-22 2017-07-11 努比亚技术有限公司 Address list display method and mobile terminal
CN107426420A (en) * 2017-07-06 2017-12-01 努比亚技术有限公司 A kind of method, apparatus and computer-readable recording medium for protecting associated person information
CN107766736A (en) * 2017-09-27 2018-03-06 维沃移动通信有限公司 A kind of information disguising method and mobile terminal

Also Published As

Publication number Publication date
CN104079721B (en) 2017-01-18

Similar Documents

Publication Publication Date Title
CN104079721A (en) Terminal contact person security processing method and device
US11882221B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
US9532212B2 (en) Method and apparatus for processing data and message
US10623959B1 (en) Augmented reality security access
CN103916233B (en) A kind of information ciphering method and device
US11288107B2 (en) Selective obfuscation of notifications
US9058813B1 (en) Automated removal of personally identifiable information
CN107103245B (en) File authority management method and device
WO2016045191A1 (en) Information processing method and information processing device
WO2016074551A1 (en) Mobile terminal and method and device for displaying notification message thereof, and computer storage medium
KR20130088171A (en) Method and device for protecting stored data in device
CN105335642B (en) The processing method and processing system of picture
CN103577761A (en) Method and device for processing privacy data in mobile equipment
US20130157715A1 (en) Mobile phone for authenticating sim card and method thereof
US10511742B2 (en) Private information management system and methods
US20190347441A1 (en) Patient privacy de-identification in firewall switches forming VLAN segregation
WO2016119341A1 (en) Method and device for implementing multi-user login mode, and computer storage medium
CN105162804A (en) Communication information protection method and apparatus
WO2015196642A1 (en) Data encryption method, decryption method and device
CN105630855A (en) File sharing method, file sharing system and terminal
CN107391977A (en) Control, automatic switching method, device and the equipment of authority
CN105306691A (en) Personal information protection method and terminal
US20150358769A1 (en) Securing a mobile device by binding to an itinerary
CN106295423A (en) A kind of method for exhibiting data and client
CN104796531A (en) Method and system for protecting information privacy

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170118

Termination date: 20210626

CF01 Termination of patent right due to non-payment of annual fee