CN104079721B - Terminal contact person security processing method and device - Google Patents
Terminal contact person security processing method and device Download PDFInfo
- Publication number
- CN104079721B CN104079721B CN201410294331.0A CN201410294331A CN104079721B CN 104079721 B CN104079721 B CN 104079721B CN 201410294331 A CN201410294331 A CN 201410294331A CN 104079721 B CN104079721 B CN 104079721B
- Authority
- CN
- China
- Prior art keywords
- information
- contact person
- sub
- terminal
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The invention provides a terminal contact person security processing method and device. The method comprises the steps that a terminal receives contact person information security level setting information; the terminal looks up contact person sub-information hiding strategies corresponding to the security level setting information in a preset security strategy database according to the security level setting information; the terminal hides contact person sub-information according to the contact person sub-information hiding strategies and identifies corresponding security levels on the contact person sub-information. By adopting the terminal contact person security processing method and device, classified security levels of the contact person sub-information is achieved, different hiding strategies can be flexibly taken on different contact person sub-information according to the user demands in a user-defined mode, the security of the contact person sub-information is greatly improved, information leakage is prevented, and the user experience is further improved.
Description
Technical field
The present invention relates to the communication technology, more particularly, to a kind of terminal contact people's security processing and device.
Background technology
Developing rapidly with the communication technology, intelligent terminal (for example: mobile phone, panel computer etc.) is also extensively general in life
And.The information of contact person is usually stored in the intelligent terminal oneself held by user, and wherein, the information of contact person can be wrapped
Include: name, telephone number, also include some privacies of contact person, such as work unit, position, mailbox, address etc..
In prior art, as long as the contacts list of user terminal can be opened it is possible to see in contacts list
All information, so lead to each associated person information in contacts list easily to be revealed.
Content of the invention
The present invention provides a kind of terminal contact people's security processing and device, for solving contact person's letter in existing terminal
The problem that breath is easily revealed.
First aspect present invention provides a kind of terminal contact people's security processing, comprising:
Contact person's sub-information level of security configuration information of terminal receiving user's input;
Described terminal, according to described level of security configuration information, searches described safe level in preset security policy database
The corresponding contact person's sub-information hiding strategy of other configuration information;
Described terminal is hidden to described contact person's sub-information according to described contact person's sub-information hiding strategy, and in institute
State and corresponding level of security is identified on contact person's sub-information.
Second aspect present invention provides a kind of terminal contact people's safety device, comprising:
Receiver module, for contact person's sub-information level of security configuration information of receiving user's input;
Searching modul, for according to described level of security configuration information, searching described in preset security policy database
Level of security configuration information corresponding contact person sub-information hiding strategy;
Security module, for being hidden to described contact person's sub-information according to described contact person's sub-information hiding strategy,
And identify corresponding level of security in described contact person's sub-information.
In the present invention, after contact person's sub-information level of security configuration information of terminal receiving user's input, according to this safety
Rank configuration information, searches corresponding contact person's sub-information hiding strategy in preset security policy database, and adopts this connection
It is that people's sub-information hiding strategy is hidden to above-mentioned contact person's sub-information it is achieved that dividing to contact person's sub-information each in terminal
Level security protect, and can flexibly according to user's request, make by oneself free burial ground for the destitute different contact person's sub-informations are taken different
Hiding strategy, substantially increases the safety of contact person's sub-information, prevents these information leakage, also improves Consumer's Experience simultaneously.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
Have technology description in required use accompanying drawing be briefly described it should be apparent that, drawings in the following description are these
Some bright embodiments, for those of ordinary skill in the art, without having to pay creative labor, acceptable
Other accompanying drawings are obtained according to these accompanying drawings.
The schematic flow sheet of terminal contact people's security processing embodiment one that Fig. 1 provides for the present invention;
The schematic flow sheet of terminal contact people's security processing embodiment two that Fig. 2 provides for the present invention;
The structural representation of terminal contact people's secure processing device embodiment one that Fig. 3 provides for the present invention;
The structural representation of terminal contact people's secure processing device embodiment two that Fig. 4 provides for the present invention;
The structural representation of terminal contact people's secure processing device embodiment three that Fig. 5 provides for the present invention.
Specific embodiment
Purpose, technical scheme and advantage for making the embodiment of the present invention are clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described it is clear that described embodiment is
The a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment being obtained under the premise of not making creative work, broadly falls into the scope of protection of the invention.
The schematic flow sheet of terminal contact people's security processing embodiment one that Fig. 1 provides for the present invention, as Fig. 1 institute
Show, the method includes:
S101, contact person's sub-information level of security configuration information of terminal receiving user's input.
Wherein, described contact person's sub-information may include that name, the pet name, mailbox, telephone number, work unit, position,
Address etc., but be not limited thereto.
User can arrange interface by the contact person opening a terminal, and carries out the setting of contact person's sub-information level of security, tool
Body ground, can be with preset security partition of the level option in terminal, and user carries out selecting setting according to the privacy requirements of oneself.For example,
Safety status classification is 3 grades by certain terminal in advance, and 3rd level is the superlative degree, and the 1st grade is lowermost level, and wherein, user typically can be close
Hurdle is claimed to fill in the interpersonal relationships information of oneself and contact person, as the information such as " father ", " mother ", user needs to arrange these information
Level of security be highest, then user just arranges interface by the peace of " pet name " this contact person's sub-information in the contact person of terminal
Full rank is chosen as 3rd level.It is of course also possible to be configured just for certain contact person, for example, only will be corresponding to " father "
The level of security of " pet name " this contact person's sub-information is set to 3rd level.
S102, terminal, according to this level of security configuration information, search this level of security in preset security policy database
Configuration information corresponding contact person sub-information hiding strategy.
S103, terminal are hidden to above-mentioned contact person's sub-information according to contact person's sub-information hiding strategy, and in this connection
It is that corresponding level of security is identified on people's sub-information.
Level of security configuration information and contact person's sub-information hiding strategy can be prestored in Security Policy Database
Mapping relations, this mapping relations can be that terminal carries or user-defined.For user-defined feelings
Condition, can be specifically that user, on contact person's sub-information hiding strategy setting interface of terminal, selects each level of security corresponding
Contact person's sub-information hiding strategy, for example, user can select contact person's sub-information hiding strategy that level of security is 3rd level to be
This contact person's sub-information is carried out with facial characteristics identification encryption.
Afterwards, after terminal receives level of security configuration information, search corresponding in preset security policy database
Be people's sub-information hiding strategy, then this contact person's sub-information be hidden, hide finish after, only receive with
Just visible to user after the solution hiding information that this contact person's sub-information hiding strategy matches.For example, contact person's sub-information " postal
The level of security of case " is " 3rd level ", then after terminal-pair " mailbox " carries out facial characteristics identification encryption, hides and is somebody's turn to do " mailbox ", and
It is " 3rd level " in the upper level of security that identifies of this contact person's sub-information " mailbox ", when solution is hidden, terminal gets identical with when encrypting
Facial characteristics after, release hide.
In the present embodiment, after contact person's sub-information level of security configuration information of terminal receiving user's input, according to this peace
Full rank configuration information, searches corresponding contact person's sub-information hiding strategy in preset security policy database, and employing should
Contact person's sub-information hiding strategy is hidden it is achieved that to contact person's sub-information each in terminal to above-mentioned contact person's sub-information
It is classified other safeguard protection, and free burial ground for the destitute can be made by oneself difference is taken to different contact person's sub-informations flexibly according to user's request
Hiding strategy, substantially increase the safety of contact person's sub-information, prevent these information leakage, also improve user's body simultaneously
Test.
During implementing, contact person's sub-information hiding strategy can include following any one: 1) to contact person son letter
Breath carries out numerical chracter combined ciphering.So, terminal is when being hidden to contact person's sub-information according to contact person's hiding strategy,
Meeting display interface is by user input password.2) associated person information is carried out with facial characteristics identification encryption.So, terminal is according to connection
When being that people's hiding strategy is hidden to contact person's sub-information, can be used as by the facial characteristics that the camera of terminal obtains user
Password is encrypted.3) fingerprint recognition encryption is carried out to contact person's sub-information.So, terminal is according to contact person's hiding strategy pair
When contact person's sub-information is hidden, password is used as by the fingerprint that the fingerprint identification function of terminal obtains user and is encrypted.
4) speech recognition encryption is carried out to contact person's sub-information.So, terminal according to contact person's hiding strategy to contact person's sub-information
When being hidden, password is used as by the voice mail that the speech identifying function of terminal obtains user and is encrypted.
Further, in terminal, it is hidden to above-mentioned contact person's sub-information according to contact person's sub-information hiding strategy
Afterwards, also include: above-mentioned contact person's sub-information of terminal receiving user's input check request, then, terminal is according to this contact person
Checking of sub-information asks to hide process interface to this user display solution, and this terminal receive user manages the solution that interface inputs in this place
Hiding information, if this solution hiding information contact person sub-information hiding strategy corresponding with above-mentioned contact person's sub-information matches,
This contact person's sub-information is released and hides.
Illustrate it is assumed that in contacts list, the level of security of name of contact person is minimum, visible for everyone, that is, not
It is hidden, and the level of security highest of contact person's mailbox, this contact person's mailbox is carried out with facial characteristics identification encryption, then,
When user opens contacts list and checked, the name of each contact person in this list can only be seen it is assumed that user will check
Name is the mailbox of the contact person of " Zhang San ", then select to check in the corresponding operation interface of terminal, such terminal is received by
Contact person's sub-information of user input checks request, and then displays to the user that solution hides process interface, displays to the user that in this example
Facial characteristics obtains interface, for example, being to open camera function, being mated, if obtaining after getting the facial characteristics of user
The facial characteristics got is matched with facial characteristics when encrypting before, then corresponding to " Zhang San " " mailbox " releases and hide, this
Sample user is it is seen that the mailbox message of Zhang San.
The schematic flow sheet of terminal contact people's security processing embodiment two that Fig. 2 provides for the present invention, for possessing
The terminal of voice control function, method provided in an embodiment of the present invention also includes:
S201, first contact person's phonetic dialing configured information of terminal receiving user's input, wherein, this first contact human speech
Sound dialing configured information includes: any one contact person's sub-information of this first contact person.
For example, in the contacts list of this user, name is the contact person of " Xiao Wang ", contact person's sub-information that it comprises
Including the pet name " elder brother ", when this user wants to call " Xiao Wang ", voice can be inputted by the voice control function of this terminal and " give
Elder brother makes a phone call ".And in prior art, " making a phone call to Xiao Wang " can only be inputted.
S202, terminal, according to above-mentioned first contact person's phonetic dialing configured information, find correspondence in contacts list
The first contact person.
S203, terminal initiate dialing to this first contact person.
According to the voice " making a phone call to elder brother " of user input, terminal identifies that " elder brother " is contact person's sub-information, Jin Eryong
" elder brother " makes a look up in contacts list as keyword.In concrete search procedure, can be first in acquiescence contact person's son letter
Make a look up in breath, such as, with name contact person's sub-information by default, first " name " item in contacts list is carried out
Search, because " elder brother " is the pet name of " Xiao Wang ", therefore find in " name " Xiang Wei, then further in other contact persons son letter
Make a look up in breath, be above-mentioned first contact person until finding " elder brother " in " pet name " item, then initiate to this first contact person
Dialing.
It should be noted that said method is equally applicable to user and note etc. is transmitted by voice control function being directed to
The operation that contact person is carried out, is not limited with above-described embodiment.
In prior art, when user is dialled by voice control function, name of contact person can only be inputted, if input
Contact person's pet name then cannot find contact person.In the present embodiment, user, can be according to oneself when using voice control function
Custom input contact person's sub-information it is possible to find corresponding contact person, and the contact person's sub-information specified need not be inputted,
Substantially increase Consumer's Experience.
The structural representation of terminal contact people's secure processing device embodiment one that Fig. 3 provides for the present invention, this device can
To be integrated in terminal, as shown in figure 3, this device includes: receiver module 301, searching modul 302 and security module 303.Its
In:
Receiver module 301, for contact person's sub-information level of security configuration information of receiving user's input.
Searching modul 302, for according to described level of security configuration information, searching institute in preset security policy database
State level of security configuration information corresponding contact person sub-information hiding strategy.
Security module 303, hidden for being carried out to described contact person's sub-information according to described contact person's sub-information hiding strategy
Hide, and identify corresponding level of security in described contact person's sub-information.
The structural representation of terminal contact people's secure processing device embodiment two that Fig. 4 provides for the present invention, as Fig. 4 institute
Show, on the basis of Fig. 3, this device can also include: display module 401 and deciphering module 402, specifically, in the present embodiment:
Above-mentioned receiver module 301, be additionally operable to receiving user's input described contact person's sub-information check request.
Display module 401, for asking to show solution covert to described user according to checking of described contact person's sub-information
Reason interface.
Deciphering module 402, the solution hiding information inputting at described process interface for receive user, if described solution hides letter
Cease contact person sub-information hiding strategy corresponding with described contact person's sub-information to match, then described contact person's sub-information is released
Hide.
Need explanation, described contact person's sub-information may include that name, the pet name, mailbox, telephone number, work unit,
Position, address etc..
Contact person's sub-information hiding strategy can include following any one: 1) numerical chracter group is carried out to contact person's sub-information
Close encryption.So, terminal is when being hidden to contact person's sub-information according to contact person's hiding strategy, can allow user by display interface
Input password.2) associated person information is carried out with facial characteristics identification encryption.So, terminal is according to contact person's hiding strategy distich
When being that people's sub-information is hidden, password can be used as by the facial characteristics that the camera of terminal obtains user and be encrypted.3)
Fingerprint recognition encryption is carried out to contact person's sub-information.So, terminal is being entered to contact person's sub-information according to contact person's hiding strategy
When row is hidden, password is used as by the fingerprint that the fingerprint identification function of terminal obtains user and is encrypted.4) to contact person's son letter
Breath carries out speech recognition encryption.So, terminal, when being hidden to contact person's sub-information according to contact person's hiding strategy, is passed through
The voice mail that the speech identifying function of terminal obtains user is encrypted as password.
The structural representation of terminal contact people's secure processing device embodiment three that Fig. 5 provides for the present invention, as Fig. 5 institute
Show, on the basis of Fig. 4, this device can also include: processing module 501.Specifically, in the present embodiment,
Receiver module 301, is additionally operable to first contact person's phonetic dialing configured information of receiving user's input, wherein, described
First contact person's phonetic dialing configured information includes: any one contact person's sub-information of described first contact person.
Searching modul 302, is additionally operable to, according to described first contact person's phonetic dialing configured information, look in contacts list
Find corresponding described first contact person.
Processing module 501, for initiating dialing to described first contact person.
This device is used for executing preceding method embodiment, and it is similar with technique effect that it realizes principle, will not be described here.
One of ordinary skill in the art will appreciate that: all or part of step realizing above-mentioned each method embodiment can be led to
Cross the related hardware of programmed instruction to complete.Aforesaid program can be stored in a computer read/write memory medium.This journey
Sequence upon execution, executes the step including above-mentioned each method embodiment;And aforesaid storage medium includes: rom, ram, magnetic disc or
Person's CD etc. is various can be with the medium of store program codes.
Finally it is noted that various embodiments above, only in order to technical scheme to be described, is not intended to limit;To the greatest extent
Pipe has been described in detail to the present invention with reference to foregoing embodiments, it will be understood by those within the art that: its according to
So the technical scheme described in foregoing embodiments can be modified, or wherein some or all of technical characteristic is entered
Row equivalent;And these modifications or replacement, do not make the essence of appropriate technical solution depart from various embodiments of the present invention technology
The scope of scheme.
Claims (4)
1. a kind of terminal contact people's security processing is it is characterised in that include:
Contact person's sub-information level of security configuration information of terminal receiving user's input;
Described terminal, according to described level of security configuration information, is searched described level of security in preset security policy database and is set
Confidence ceases corresponding contact person's sub-information hiding strategy;
Described terminal is hidden to described contact person's sub-information according to described contact person's sub-information hiding strategy, and described
It is that corresponding level of security is identified on people's sub-information;
Described contact person's sub-information of described terminal receiving user's input check request;
Described terminal asks to hide process interface to described user display solution according to checking of described contact person's sub-information;
The solution hiding information that described terminal receive user inputs at described process interface, if described solution hiding information is contacted with described
People's sub-information corresponding contact person sub-information hiding strategy matches, then described contact person's sub-information is released and hide;Described
It is that people's sub-information includes: name, the pet name, mailbox, telephone number, work unit, position, address;
Also include:
First contact person's phonetic dialing configured information of described terminal receiving user's input, wherein, described first contact person's voice
Dialing configured information includes: any one contact person's sub-information of described first contact person;
Described terminal, according to described first contact person's phonetic dialing configured information, finds corresponding described in contacts list
First contact person;
Described terminal initiates dialing to described first contact person.
2. method according to claim 1 it is characterised in that described contact person's sub-information hiding strategy include following arbitrary
Kind:
Numerical chracter combined ciphering is carried out to described contact person's sub-information;Or,
Described contact person's sub-information is carried out with facial characteristics identification encryption;Or,
Fingerprint recognition encryption is carried out to described contact person's sub-information;Or,
Speech recognition encryption is carried out to described contact person's sub-information.
3. a kind of terminal contact people's secure processing device is it is characterised in that include:
Receiver module, for contact person's sub-information level of security configuration information of receiving user's input;
Searching modul, for according to described level of security configuration information, searching described safety in preset security policy database
Rank configuration information corresponding contact person sub-information hiding strategy;
Security module, for being hidden to described contact person's sub-information according to described contact person's sub-information hiding strategy, and
Corresponding level of security is identified in described contact person's sub-information;
Also include: display module and deciphering module;
Described receiver module, be additionally operable to receiving user's input described contact person's sub-information check request;
Described display module, for asking to hide process circle to described user display solution according to checking of described contact person's sub-information
Face;
Described deciphering module, the solution hiding information inputting at described process interface for receive user, if described solution hiding information
Contact person sub-information hiding strategy corresponding with described contact person's sub-information matches, then described contact person's sub-information is released hidden
Hide;Described contact person's sub-information includes: name, the pet name, mailbox, telephone number, work unit, position, address;
Also include: processing module;
Described receiver module, is additionally operable to first contact person's phonetic dialing configured information of receiving user's input, wherein, described first
Contact person's phonetic dialing configured information includes: any one contact person's sub-information of described first contact person;
Described searching modul, is additionally operable to according to described first contact person's phonetic dialing configured information, searches in contacts list
To corresponding described first contact person;
Described processing module, for initiating dialing to described first contact person.
4. device according to claim 3 it is characterised in that described contact person's sub-information hiding strategy include following arbitrary
Kind:
Numerical chracter combined ciphering is carried out to described contact person's sub-information;Or,
Described contact person's sub-information is carried out with facial characteristics identification encryption;Or,
Fingerprint recognition encryption is carried out to described contact person's sub-information;Or,
Speech recognition encryption is carried out to described contact person's sub-information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410294331.0A CN104079721B (en) | 2014-06-26 | 2014-06-26 | Terminal contact person security processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410294331.0A CN104079721B (en) | 2014-06-26 | 2014-06-26 | Terminal contact person security processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104079721A CN104079721A (en) | 2014-10-01 |
CN104079721B true CN104079721B (en) | 2017-01-18 |
Family
ID=51600759
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410294331.0A Expired - Fee Related CN104079721B (en) | 2014-06-26 | 2014-06-26 | Terminal contact person security processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104079721B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104333662A (en) * | 2014-11-14 | 2015-02-04 | 深圳市中兴移动通信有限公司 | Mobile terminal and encrypting method and device for telephone answering of mobile terminal |
CN104486372A (en) * | 2014-11-21 | 2015-04-01 | 深圳市中兴移动通信有限公司 | Contact displaying method, device and terminal |
CN104618227B (en) * | 2015-03-05 | 2018-09-04 | 浙江翼信科技有限公司 | A kind of method and apparatus of protection instant communication contacts relevant information |
CN105611040B (en) * | 2015-09-23 | 2019-10-11 | 宇龙计算机通信科技(深圳)有限公司 | Information display method, information display device and terminal |
CN106682524A (en) * | 2016-11-23 | 2017-05-17 | 张伟彬 | Data privacy protection method of mobile terminal |
CN106941565B (en) * | 2017-03-22 | 2019-11-15 | 努比亚技术有限公司 | Address list display method and mobile terminal |
CN107426420A (en) * | 2017-07-06 | 2017-12-01 | 努比亚技术有限公司 | A kind of method, apparatus and computer-readable recording medium for protecting associated person information |
CN107766736A (en) * | 2017-09-27 | 2018-03-06 | 维沃移动通信有限公司 | A kind of information disguising method and mobile terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101553051A (en) * | 2008-03-31 | 2009-10-07 | 富士通株式会社 | Portable device and information management method |
CN103095890A (en) * | 2012-12-31 | 2013-05-08 | 东莞宇龙通信科技有限公司 | Contact person information encryption method and communication terminal |
CN103631822A (en) * | 2012-08-27 | 2014-03-12 | 联想(北京)有限公司 | Query method and electronic equipment |
CN103795849A (en) * | 2012-11-01 | 2014-05-14 | 广州三星通信技术研究有限公司 | Device and method for executing operation on private contact person in portable terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006303701A (en) * | 2005-04-18 | 2006-11-02 | Fujitsu Ltd | Electronic equipment, and method and program of controlling operation suppression thereof |
-
2014
- 2014-06-26 CN CN201410294331.0A patent/CN104079721B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101553051A (en) * | 2008-03-31 | 2009-10-07 | 富士通株式会社 | Portable device and information management method |
CN103631822A (en) * | 2012-08-27 | 2014-03-12 | 联想(北京)有限公司 | Query method and electronic equipment |
CN103795849A (en) * | 2012-11-01 | 2014-05-14 | 广州三星通信技术研究有限公司 | Device and method for executing operation on private contact person in portable terminal |
CN103095890A (en) * | 2012-12-31 | 2013-05-08 | 东莞宇龙通信科技有限公司 | Contact person information encryption method and communication terminal |
Also Published As
Publication number | Publication date |
---|---|
CN104079721A (en) | 2014-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104079721B (en) | Terminal contact person security processing method and device | |
EP2830296B1 (en) | Method and apparatus for processing data and message | |
EP3428819A1 (en) | Mobile security countermeasures | |
CN103617382B (en) | Method for secret protection and its device | |
US10812485B1 (en) | Wearable device-based user authentication | |
EP3147768A1 (en) | Screen interface unlocking method and screen interface unlocking device | |
US20190087554A1 (en) | A mobile device and method providing secure data access, management and storage of mass personal data | |
KR20190111329A (en) | An electronic device and authentication method thereof | |
US20150142439A1 (en) | System and method of speaker recognition | |
CN105164970A (en) | Adaptive authentication systems and methods | |
WO2016165245A1 (en) | User interface control method and terminal | |
US10558826B2 (en) | Method and apparatus for providing security mode to user device | |
CN104346550B (en) | A kind of information processing method and a kind of electronic equipment | |
CN105847303A (en) | Verification method and system of intelligent access control unit | |
CN105512532A (en) | Mobile terminal screen control processing method and system based on iris recognition | |
CN103974249B (en) | Method and its equipment based on checking information communication | |
CN105915544A (en) | Intelligent entrance guard management method and intelligent entrance guard system | |
US10242214B2 (en) | Dynamic change in plurality of security layers based on projected risk | |
CN106055941A (en) | Terminal method and apparatus | |
US10419876B2 (en) | Secure mobile device recovery | |
CN107256367A (en) | A kind of information processing method and device, terminal device and computer-readable recording medium | |
WO2018209918A1 (en) | Method and system for performing verification using voice input | |
CN106407825B (en) | USB flash disk encryption method and system based on bracelet and terminal | |
CN105162804A (en) | Communication information protection method and apparatus | |
CN105306691A (en) | Personal information protection method and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170118 Termination date: 20210626 |
|
CF01 | Termination of patent right due to non-payment of annual fee |