CN104079721B - Terminal contact person security processing method and device - Google Patents

Terminal contact person security processing method and device Download PDF

Info

Publication number
CN104079721B
CN104079721B CN201410294331.0A CN201410294331A CN104079721B CN 104079721 B CN104079721 B CN 104079721B CN 201410294331 A CN201410294331 A CN 201410294331A CN 104079721 B CN104079721 B CN 104079721B
Authority
CN
China
Prior art keywords
information
contact person
sub
terminal
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410294331.0A
Other languages
Chinese (zh)
Other versions
CN104079721A (en
Inventor
张峰懿
毛波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Beny Wave Science and Technology Co Ltd
Original Assignee
Beijing Beny Wave Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Beny Wave Science and Technology Co Ltd filed Critical Beijing Beny Wave Science and Technology Co Ltd
Priority to CN201410294331.0A priority Critical patent/CN104079721B/en
Publication of CN104079721A publication Critical patent/CN104079721A/en
Application granted granted Critical
Publication of CN104079721B publication Critical patent/CN104079721B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a terminal contact person security processing method and device. The method comprises the steps that a terminal receives contact person information security level setting information; the terminal looks up contact person sub-information hiding strategies corresponding to the security level setting information in a preset security strategy database according to the security level setting information; the terminal hides contact person sub-information according to the contact person sub-information hiding strategies and identifies corresponding security levels on the contact person sub-information. By adopting the terminal contact person security processing method and device, classified security levels of the contact person sub-information is achieved, different hiding strategies can be flexibly taken on different contact person sub-information according to the user demands in a user-defined mode, the security of the contact person sub-information is greatly improved, information leakage is prevented, and the user experience is further improved.

Description

Terminal contact people's security processing and device
Technical field
The present invention relates to the communication technology, more particularly, to a kind of terminal contact people's security processing and device.
Background technology
Developing rapidly with the communication technology, intelligent terminal (for example: mobile phone, panel computer etc.) is also extensively general in life And.The information of contact person is usually stored in the intelligent terminal oneself held by user, and wherein, the information of contact person can be wrapped Include: name, telephone number, also include some privacies of contact person, such as work unit, position, mailbox, address etc..
In prior art, as long as the contacts list of user terminal can be opened it is possible to see in contacts list All information, so lead to each associated person information in contacts list easily to be revealed.
Content of the invention
The present invention provides a kind of terminal contact people's security processing and device, for solving contact person's letter in existing terminal The problem that breath is easily revealed.
First aspect present invention provides a kind of terminal contact people's security processing, comprising:
Contact person's sub-information level of security configuration information of terminal receiving user's input;
Described terminal, according to described level of security configuration information, searches described safe level in preset security policy database The corresponding contact person's sub-information hiding strategy of other configuration information;
Described terminal is hidden to described contact person's sub-information according to described contact person's sub-information hiding strategy, and in institute State and corresponding level of security is identified on contact person's sub-information.
Second aspect present invention provides a kind of terminal contact people's safety device, comprising:
Receiver module, for contact person's sub-information level of security configuration information of receiving user's input;
Searching modul, for according to described level of security configuration information, searching described in preset security policy database Level of security configuration information corresponding contact person sub-information hiding strategy;
Security module, for being hidden to described contact person's sub-information according to described contact person's sub-information hiding strategy, And identify corresponding level of security in described contact person's sub-information.
In the present invention, after contact person's sub-information level of security configuration information of terminal receiving user's input, according to this safety Rank configuration information, searches corresponding contact person's sub-information hiding strategy in preset security policy database, and adopts this connection It is that people's sub-information hiding strategy is hidden to above-mentioned contact person's sub-information it is achieved that dividing to contact person's sub-information each in terminal Level security protect, and can flexibly according to user's request, make by oneself free burial ground for the destitute different contact person's sub-informations are taken different Hiding strategy, substantially increases the safety of contact person's sub-information, prevents these information leakage, also improves Consumer's Experience simultaneously.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing Have technology description in required use accompanying drawing be briefly described it should be apparent that, drawings in the following description are these Some bright embodiments, for those of ordinary skill in the art, without having to pay creative labor, acceptable Other accompanying drawings are obtained according to these accompanying drawings.
The schematic flow sheet of terminal contact people's security processing embodiment one that Fig. 1 provides for the present invention;
The schematic flow sheet of terminal contact people's security processing embodiment two that Fig. 2 provides for the present invention;
The structural representation of terminal contact people's secure processing device embodiment one that Fig. 3 provides for the present invention;
The structural representation of terminal contact people's secure processing device embodiment two that Fig. 4 provides for the present invention;
The structural representation of terminal contact people's secure processing device embodiment three that Fig. 5 provides for the present invention.
Specific embodiment
Purpose, technical scheme and advantage for making the embodiment of the present invention are clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described it is clear that described embodiment is The a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment being obtained under the premise of not making creative work, broadly falls into the scope of protection of the invention.
The schematic flow sheet of terminal contact people's security processing embodiment one that Fig. 1 provides for the present invention, as Fig. 1 institute Show, the method includes:
S101, contact person's sub-information level of security configuration information of terminal receiving user's input.
Wherein, described contact person's sub-information may include that name, the pet name, mailbox, telephone number, work unit, position, Address etc., but be not limited thereto.
User can arrange interface by the contact person opening a terminal, and carries out the setting of contact person's sub-information level of security, tool Body ground, can be with preset security partition of the level option in terminal, and user carries out selecting setting according to the privacy requirements of oneself.For example, Safety status classification is 3 grades by certain terminal in advance, and 3rd level is the superlative degree, and the 1st grade is lowermost level, and wherein, user typically can be close Hurdle is claimed to fill in the interpersonal relationships information of oneself and contact person, as the information such as " father ", " mother ", user needs to arrange these information Level of security be highest, then user just arranges interface by the peace of " pet name " this contact person's sub-information in the contact person of terminal Full rank is chosen as 3rd level.It is of course also possible to be configured just for certain contact person, for example, only will be corresponding to " father " The level of security of " pet name " this contact person's sub-information is set to 3rd level.
S102, terminal, according to this level of security configuration information, search this level of security in preset security policy database Configuration information corresponding contact person sub-information hiding strategy.
S103, terminal are hidden to above-mentioned contact person's sub-information according to contact person's sub-information hiding strategy, and in this connection It is that corresponding level of security is identified on people's sub-information.
Level of security configuration information and contact person's sub-information hiding strategy can be prestored in Security Policy Database Mapping relations, this mapping relations can be that terminal carries or user-defined.For user-defined feelings Condition, can be specifically that user, on contact person's sub-information hiding strategy setting interface of terminal, selects each level of security corresponding Contact person's sub-information hiding strategy, for example, user can select contact person's sub-information hiding strategy that level of security is 3rd level to be This contact person's sub-information is carried out with facial characteristics identification encryption.
Afterwards, after terminal receives level of security configuration information, search corresponding in preset security policy database Be people's sub-information hiding strategy, then this contact person's sub-information be hidden, hide finish after, only receive with Just visible to user after the solution hiding information that this contact person's sub-information hiding strategy matches.For example, contact person's sub-information " postal The level of security of case " is " 3rd level ", then after terminal-pair " mailbox " carries out facial characteristics identification encryption, hides and is somebody's turn to do " mailbox ", and It is " 3rd level " in the upper level of security that identifies of this contact person's sub-information " mailbox ", when solution is hidden, terminal gets identical with when encrypting Facial characteristics after, release hide.
In the present embodiment, after contact person's sub-information level of security configuration information of terminal receiving user's input, according to this peace Full rank configuration information, searches corresponding contact person's sub-information hiding strategy in preset security policy database, and employing should Contact person's sub-information hiding strategy is hidden it is achieved that to contact person's sub-information each in terminal to above-mentioned contact person's sub-information It is classified other safeguard protection, and free burial ground for the destitute can be made by oneself difference is taken to different contact person's sub-informations flexibly according to user's request Hiding strategy, substantially increase the safety of contact person's sub-information, prevent these information leakage, also improve user's body simultaneously Test.
During implementing, contact person's sub-information hiding strategy can include following any one: 1) to contact person son letter Breath carries out numerical chracter combined ciphering.So, terminal is when being hidden to contact person's sub-information according to contact person's hiding strategy, Meeting display interface is by user input password.2) associated person information is carried out with facial characteristics identification encryption.So, terminal is according to connection When being that people's hiding strategy is hidden to contact person's sub-information, can be used as by the facial characteristics that the camera of terminal obtains user Password is encrypted.3) fingerprint recognition encryption is carried out to contact person's sub-information.So, terminal is according to contact person's hiding strategy pair When contact person's sub-information is hidden, password is used as by the fingerprint that the fingerprint identification function of terminal obtains user and is encrypted. 4) speech recognition encryption is carried out to contact person's sub-information.So, terminal according to contact person's hiding strategy to contact person's sub-information When being hidden, password is used as by the voice mail that the speech identifying function of terminal obtains user and is encrypted.
Further, in terminal, it is hidden to above-mentioned contact person's sub-information according to contact person's sub-information hiding strategy Afterwards, also include: above-mentioned contact person's sub-information of terminal receiving user's input check request, then, terminal is according to this contact person Checking of sub-information asks to hide process interface to this user display solution, and this terminal receive user manages the solution that interface inputs in this place Hiding information, if this solution hiding information contact person sub-information hiding strategy corresponding with above-mentioned contact person's sub-information matches, This contact person's sub-information is released and hides.
Illustrate it is assumed that in contacts list, the level of security of name of contact person is minimum, visible for everyone, that is, not It is hidden, and the level of security highest of contact person's mailbox, this contact person's mailbox is carried out with facial characteristics identification encryption, then, When user opens contacts list and checked, the name of each contact person in this list can only be seen it is assumed that user will check Name is the mailbox of the contact person of " Zhang San ", then select to check in the corresponding operation interface of terminal, such terminal is received by Contact person's sub-information of user input checks request, and then displays to the user that solution hides process interface, displays to the user that in this example Facial characteristics obtains interface, for example, being to open camera function, being mated, if obtaining after getting the facial characteristics of user The facial characteristics got is matched with facial characteristics when encrypting before, then corresponding to " Zhang San " " mailbox " releases and hide, this Sample user is it is seen that the mailbox message of Zhang San.
The schematic flow sheet of terminal contact people's security processing embodiment two that Fig. 2 provides for the present invention, for possessing The terminal of voice control function, method provided in an embodiment of the present invention also includes:
S201, first contact person's phonetic dialing configured information of terminal receiving user's input, wherein, this first contact human speech Sound dialing configured information includes: any one contact person's sub-information of this first contact person.
For example, in the contacts list of this user, name is the contact person of " Xiao Wang ", contact person's sub-information that it comprises Including the pet name " elder brother ", when this user wants to call " Xiao Wang ", voice can be inputted by the voice control function of this terminal and " give Elder brother makes a phone call ".And in prior art, " making a phone call to Xiao Wang " can only be inputted.
S202, terminal, according to above-mentioned first contact person's phonetic dialing configured information, find correspondence in contacts list The first contact person.
S203, terminal initiate dialing to this first contact person.
According to the voice " making a phone call to elder brother " of user input, terminal identifies that " elder brother " is contact person's sub-information, Jin Eryong " elder brother " makes a look up in contacts list as keyword.In concrete search procedure, can be first in acquiescence contact person's son letter Make a look up in breath, such as, with name contact person's sub-information by default, first " name " item in contacts list is carried out Search, because " elder brother " is the pet name of " Xiao Wang ", therefore find in " name " Xiang Wei, then further in other contact persons son letter Make a look up in breath, be above-mentioned first contact person until finding " elder brother " in " pet name " item, then initiate to this first contact person Dialing.
It should be noted that said method is equally applicable to user and note etc. is transmitted by voice control function being directed to The operation that contact person is carried out, is not limited with above-described embodiment.
In prior art, when user is dialled by voice control function, name of contact person can only be inputted, if input Contact person's pet name then cannot find contact person.In the present embodiment, user, can be according to oneself when using voice control function Custom input contact person's sub-information it is possible to find corresponding contact person, and the contact person's sub-information specified need not be inputted, Substantially increase Consumer's Experience.
The structural representation of terminal contact people's secure processing device embodiment one that Fig. 3 provides for the present invention, this device can To be integrated in terminal, as shown in figure 3, this device includes: receiver module 301, searching modul 302 and security module 303.Its In:
Receiver module 301, for contact person's sub-information level of security configuration information of receiving user's input.
Searching modul 302, for according to described level of security configuration information, searching institute in preset security policy database State level of security configuration information corresponding contact person sub-information hiding strategy.
Security module 303, hidden for being carried out to described contact person's sub-information according to described contact person's sub-information hiding strategy Hide, and identify corresponding level of security in described contact person's sub-information.
The structural representation of terminal contact people's secure processing device embodiment two that Fig. 4 provides for the present invention, as Fig. 4 institute Show, on the basis of Fig. 3, this device can also include: display module 401 and deciphering module 402, specifically, in the present embodiment:
Above-mentioned receiver module 301, be additionally operable to receiving user's input described contact person's sub-information check request.
Display module 401, for asking to show solution covert to described user according to checking of described contact person's sub-information Reason interface.
Deciphering module 402, the solution hiding information inputting at described process interface for receive user, if described solution hides letter Cease contact person sub-information hiding strategy corresponding with described contact person's sub-information to match, then described contact person's sub-information is released Hide.
Need explanation, described contact person's sub-information may include that name, the pet name, mailbox, telephone number, work unit, Position, address etc..
Contact person's sub-information hiding strategy can include following any one: 1) numerical chracter group is carried out to contact person's sub-information Close encryption.So, terminal is when being hidden to contact person's sub-information according to contact person's hiding strategy, can allow user by display interface Input password.2) associated person information is carried out with facial characteristics identification encryption.So, terminal is according to contact person's hiding strategy distich When being that people's sub-information is hidden, password can be used as by the facial characteristics that the camera of terminal obtains user and be encrypted.3) Fingerprint recognition encryption is carried out to contact person's sub-information.So, terminal is being entered to contact person's sub-information according to contact person's hiding strategy When row is hidden, password is used as by the fingerprint that the fingerprint identification function of terminal obtains user and is encrypted.4) to contact person's son letter Breath carries out speech recognition encryption.So, terminal, when being hidden to contact person's sub-information according to contact person's hiding strategy, is passed through The voice mail that the speech identifying function of terminal obtains user is encrypted as password.
The structural representation of terminal contact people's secure processing device embodiment three that Fig. 5 provides for the present invention, as Fig. 5 institute Show, on the basis of Fig. 4, this device can also include: processing module 501.Specifically, in the present embodiment,
Receiver module 301, is additionally operable to first contact person's phonetic dialing configured information of receiving user's input, wherein, described First contact person's phonetic dialing configured information includes: any one contact person's sub-information of described first contact person.
Searching modul 302, is additionally operable to, according to described first contact person's phonetic dialing configured information, look in contacts list Find corresponding described first contact person.
Processing module 501, for initiating dialing to described first contact person.
This device is used for executing preceding method embodiment, and it is similar with technique effect that it realizes principle, will not be described here.
One of ordinary skill in the art will appreciate that: all or part of step realizing above-mentioned each method embodiment can be led to Cross the related hardware of programmed instruction to complete.Aforesaid program can be stored in a computer read/write memory medium.This journey Sequence upon execution, executes the step including above-mentioned each method embodiment;And aforesaid storage medium includes: rom, ram, magnetic disc or Person's CD etc. is various can be with the medium of store program codes.
Finally it is noted that various embodiments above, only in order to technical scheme to be described, is not intended to limit;To the greatest extent Pipe has been described in detail to the present invention with reference to foregoing embodiments, it will be understood by those within the art that: its according to So the technical scheme described in foregoing embodiments can be modified, or wherein some or all of technical characteristic is entered Row equivalent;And these modifications or replacement, do not make the essence of appropriate technical solution depart from various embodiments of the present invention technology The scope of scheme.

Claims (4)

1. a kind of terminal contact people's security processing is it is characterised in that include:
Contact person's sub-information level of security configuration information of terminal receiving user's input;
Described terminal, according to described level of security configuration information, is searched described level of security in preset security policy database and is set Confidence ceases corresponding contact person's sub-information hiding strategy;
Described terminal is hidden to described contact person's sub-information according to described contact person's sub-information hiding strategy, and described It is that corresponding level of security is identified on people's sub-information;
Described contact person's sub-information of described terminal receiving user's input check request;
Described terminal asks to hide process interface to described user display solution according to checking of described contact person's sub-information;
The solution hiding information that described terminal receive user inputs at described process interface, if described solution hiding information is contacted with described People's sub-information corresponding contact person sub-information hiding strategy matches, then described contact person's sub-information is released and hide;Described It is that people's sub-information includes: name, the pet name, mailbox, telephone number, work unit, position, address;
Also include:
First contact person's phonetic dialing configured information of described terminal receiving user's input, wherein, described first contact person's voice Dialing configured information includes: any one contact person's sub-information of described first contact person;
Described terminal, according to described first contact person's phonetic dialing configured information, finds corresponding described in contacts list First contact person;
Described terminal initiates dialing to described first contact person.
2. method according to claim 1 it is characterised in that described contact person's sub-information hiding strategy include following arbitrary Kind:
Numerical chracter combined ciphering is carried out to described contact person's sub-information;Or,
Described contact person's sub-information is carried out with facial characteristics identification encryption;Or,
Fingerprint recognition encryption is carried out to described contact person's sub-information;Or,
Speech recognition encryption is carried out to described contact person's sub-information.
3. a kind of terminal contact people's secure processing device is it is characterised in that include:
Receiver module, for contact person's sub-information level of security configuration information of receiving user's input;
Searching modul, for according to described level of security configuration information, searching described safety in preset security policy database Rank configuration information corresponding contact person sub-information hiding strategy;
Security module, for being hidden to described contact person's sub-information according to described contact person's sub-information hiding strategy, and Corresponding level of security is identified in described contact person's sub-information;
Also include: display module and deciphering module;
Described receiver module, be additionally operable to receiving user's input described contact person's sub-information check request;
Described display module, for asking to hide process circle to described user display solution according to checking of described contact person's sub-information Face;
Described deciphering module, the solution hiding information inputting at described process interface for receive user, if described solution hiding information Contact person sub-information hiding strategy corresponding with described contact person's sub-information matches, then described contact person's sub-information is released hidden Hide;Described contact person's sub-information includes: name, the pet name, mailbox, telephone number, work unit, position, address;
Also include: processing module;
Described receiver module, is additionally operable to first contact person's phonetic dialing configured information of receiving user's input, wherein, described first Contact person's phonetic dialing configured information includes: any one contact person's sub-information of described first contact person;
Described searching modul, is additionally operable to according to described first contact person's phonetic dialing configured information, searches in contacts list To corresponding described first contact person;
Described processing module, for initiating dialing to described first contact person.
4. device according to claim 3 it is characterised in that described contact person's sub-information hiding strategy include following arbitrary Kind:
Numerical chracter combined ciphering is carried out to described contact person's sub-information;Or,
Described contact person's sub-information is carried out with facial characteristics identification encryption;Or,
Fingerprint recognition encryption is carried out to described contact person's sub-information;Or,
Speech recognition encryption is carried out to described contact person's sub-information.
CN201410294331.0A 2014-06-26 2014-06-26 Terminal contact person security processing method and device Expired - Fee Related CN104079721B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410294331.0A CN104079721B (en) 2014-06-26 2014-06-26 Terminal contact person security processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410294331.0A CN104079721B (en) 2014-06-26 2014-06-26 Terminal contact person security processing method and device

Publications (2)

Publication Number Publication Date
CN104079721A CN104079721A (en) 2014-10-01
CN104079721B true CN104079721B (en) 2017-01-18

Family

ID=51600759

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410294331.0A Expired - Fee Related CN104079721B (en) 2014-06-26 2014-06-26 Terminal contact person security processing method and device

Country Status (1)

Country Link
CN (1) CN104079721B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104333662A (en) * 2014-11-14 2015-02-04 深圳市中兴移动通信有限公司 Mobile terminal and encrypting method and device for telephone answering of mobile terminal
CN104486372A (en) * 2014-11-21 2015-04-01 深圳市中兴移动通信有限公司 Contact displaying method, device and terminal
CN104618227B (en) * 2015-03-05 2018-09-04 浙江翼信科技有限公司 A kind of method and apparatus of protection instant communication contacts relevant information
CN105611040B (en) * 2015-09-23 2019-10-11 宇龙计算机通信科技(深圳)有限公司 Information display method, information display device and terminal
CN106682524A (en) * 2016-11-23 2017-05-17 张伟彬 Data privacy protection method of mobile terminal
CN106941565B (en) * 2017-03-22 2019-11-15 努比亚技术有限公司 Address list display method and mobile terminal
CN107426420A (en) * 2017-07-06 2017-12-01 努比亚技术有限公司 A kind of method, apparatus and computer-readable recording medium for protecting associated person information
CN107766736A (en) * 2017-09-27 2018-03-06 维沃移动通信有限公司 A kind of information disguising method and mobile terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101553051A (en) * 2008-03-31 2009-10-07 富士通株式会社 Portable device and information management method
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal
CN103631822A (en) * 2012-08-27 2014-03-12 联想(北京)有限公司 Query method and electronic equipment
CN103795849A (en) * 2012-11-01 2014-05-14 广州三星通信技术研究有限公司 Device and method for executing operation on private contact person in portable terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006303701A (en) * 2005-04-18 2006-11-02 Fujitsu Ltd Electronic equipment, and method and program of controlling operation suppression thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101553051A (en) * 2008-03-31 2009-10-07 富士通株式会社 Portable device and information management method
CN103631822A (en) * 2012-08-27 2014-03-12 联想(北京)有限公司 Query method and electronic equipment
CN103795849A (en) * 2012-11-01 2014-05-14 广州三星通信技术研究有限公司 Device and method for executing operation on private contact person in portable terminal
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal

Also Published As

Publication number Publication date
CN104079721A (en) 2014-10-01

Similar Documents

Publication Publication Date Title
CN104079721B (en) Terminal contact person security processing method and device
EP2830296B1 (en) Method and apparatus for processing data and message
EP3428819A1 (en) Mobile security countermeasures
CN103617382B (en) Method for secret protection and its device
US10812485B1 (en) Wearable device-based user authentication
EP3147768A1 (en) Screen interface unlocking method and screen interface unlocking device
US20190087554A1 (en) A mobile device and method providing secure data access, management and storage of mass personal data
KR20190111329A (en) An electronic device and authentication method thereof
US20150142439A1 (en) System and method of speaker recognition
CN105164970A (en) Adaptive authentication systems and methods
WO2016165245A1 (en) User interface control method and terminal
US10558826B2 (en) Method and apparatus for providing security mode to user device
CN104346550B (en) A kind of information processing method and a kind of electronic equipment
CN105847303A (en) Verification method and system of intelligent access control unit
CN105512532A (en) Mobile terminal screen control processing method and system based on iris recognition
CN103974249B (en) Method and its equipment based on checking information communication
CN105915544A (en) Intelligent entrance guard management method and intelligent entrance guard system
US10242214B2 (en) Dynamic change in plurality of security layers based on projected risk
CN106055941A (en) Terminal method and apparatus
US10419876B2 (en) Secure mobile device recovery
CN107256367A (en) A kind of information processing method and device, terminal device and computer-readable recording medium
WO2018209918A1 (en) Method and system for performing verification using voice input
CN106407825B (en) USB flash disk encryption method and system based on bracelet and terminal
CN105162804A (en) Communication information protection method and apparatus
CN105306691A (en) Personal information protection method and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170118

Termination date: 20210626

CF01 Termination of patent right due to non-payment of annual fee