CN104184900B - Data processing method, system and mobile terminal - Google Patents

Data processing method, system and mobile terminal Download PDF

Info

Publication number
CN104184900B
CN104184900B CN201410431343.3A CN201410431343A CN104184900B CN 104184900 B CN104184900 B CN 104184900B CN 201410431343 A CN201410431343 A CN 201410431343A CN 104184900 B CN104184900 B CN 104184900B
Authority
CN
China
Prior art keywords
hidden object
viewed
interface
information
concealed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410431343.3A
Other languages
Chinese (zh)
Other versions
CN104184900A (en
Inventor
刘洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Shenzhen ZTE Mobile Telecom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen ZTE Mobile Telecom Co Ltd filed Critical Shenzhen ZTE Mobile Telecom Co Ltd
Priority to CN201410431343.3A priority Critical patent/CN104184900B/en
Publication of CN104184900A publication Critical patent/CN104184900A/en
Application granted granted Critical
Publication of CN104184900B publication Critical patent/CN104184900B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of data processing method, when detecting hidden object and checking instruction, generate based on the hidden object prestored and show hidden object and check interface, check that hidden object to be viewed is selected at interface for user based on described hidden object; When receiving the hidden object selection instruction to be viewed of user's input, determine corresponding hidden object to be viewed based on described selection instruction; Show the checking interface of described hidden object to be viewed, for user based on described checking interface input validation information; When described authorization information is verified, show the relevant information of described hidden object to be viewed.The invention also discloses a kind of data handling system and mobile terminal.The present invention must enter to hide Info based on corresponding instruction and check interface, and can not show hidden object in current display interface, very safe.

Description

Data processing method, system and mobile terminal
Technical field
The present invention relates to field of intelligent control, particularly relate to a kind of data processing method, system and mobile terminal.
Background technology
Along with the develop rapidly of information, intelligent terminal has become as mobile phone the instrument more and more generally used in people's life, work, often preserves a lot of userspersonal informations in this intelligent terminal, if obtained the very possible individual privacy revealing user by other people.
For preventing the leakage of individual privacy; technical scheme to needing the personal information of protection to be encrypted is proposed in existing technology; but the information of personal information encrypted in prior art is often still shown the display interface of terminal; user is based on the information that current display interface shows; may Brute Force encryption personal information, make data encryption safe not.
Summary of the invention
Main purpose of the present invention is to solve the inadequate safety related technical problems of data encryption.
For achieving the above object, a kind of data processing method provided by the invention, described data processing method comprises the following steps:
When detecting hidden object and checking instruction, generate based on the hidden object prestored and show hidden object and check interface, check that hidden object to be viewed is selected at interface for user based on described hidden object;
When receiving the hidden object selection instruction to be viewed of user's input, determine corresponding hidden object to be viewed based on described selection instruction;
Show the checking interface of described hidden object to be viewed, for user based on described checking interface input validation information;
When described authorization information is verified, show the relevant information of described hidden object to be viewed.
Preferably, described when detecting hidden object and checking instruction, check interface based on the hiding generation hidden object prestored, before checking that the step of hidden object to be viewed is selected at interface for user based on described hidden object, described data processing method comprises:
When receiving Information hiding instruction, determine object to be concealed;
Using the authorization information of the authorization information preset or the current input of user as the authorization information of described object to be concealed;
Delete the identification information of object to be concealed described in current display interface, and described Objects hide to be concealed is preserved.
Preferably, described when detecting hidden object and checking instruction, check interface based on the hiding generation hidden object prestored, before checking that the step of hidden object to be viewed is selected at interface for user based on described hidden object, described data processing method comprises:
When receiving Information hiding instruction, determine object to be concealed;
Described object to be concealed is associated with the subscriber identification card preset, and deletes the incidence relation between described object to be concealed and current user identities identification card.
Preferably, described when described authorization information is verified, after showing the step of the relevant information of described hidden object to be viewed, described data processing method also comprises:
When receiving information disclosure instruction, the authorization information of the hidden object to be viewed of the current display of described terminal deletion;
The identification information of the hidden object to be viewed of current display is added into corresponding display interface.
In addition, for achieving the above object, the present invention also proposes a kind of data handling system, and described data handling system comprises:
Display module, for when detecting hidden object and checking instruction, generates based on the hidden object prestored and shows hidden object and check interface, check that hidden object to be viewed is selected at interface for user based on described hidden object;
Determination module, for when receiving the hidden object selection instruction to be viewed of user's input, determines corresponding hidden object to be viewed based on described selection instruction;
Described display module, also for showing the checking interface of described hidden object to be viewed, for user based on described checking interface input validation information, and when described authorization information is verified, shows the relevant information of described hidden object to be viewed.
Preferably, described data handling system also comprises:
Described determination module also for when receiving Information hiding instruction, determines object to be concealed;
Processing module, for the authorization information of the authorization information that will preset or the current input of user as the authorization information of described object to be concealed;
Removing module, for deleting the identification information of object to be concealed described in current display interface, and preserves described Objects hide to be concealed.
Preferably, described data handling system also comprises:
Described determination module also for when receiving Information hiding instruction, determines object to be concealed;
Relating module, for associating described object to be concealed with the subscriber identification card preset;
Removing module, for deleting the incidence relation between described object to be concealed and current user identities identification card.
Preferably, described data handling system also comprises:
Described removing module, also for when receiving information disclosure instruction, the authorization information of the hidden object to be viewed of the current display of described terminal deletion;
Add module, the identification information for the hidden object to be viewed by current display is added into corresponding display interface.
In addition, for achieving the above object, the present invention also proposes a kind of mobile terminal, and described mobile terminal comprises data handling system as previously discussed.
The data processing method that the present invention proposes, system and mobile terminal, when detecting hidden object and checking instruction, generate based on the hidden object prestored and show hidden object and check interface, check that hidden object to be viewed is selected at interface for user based on described hidden object; When receiving the hidden object selection instruction to be viewed of user's input, determine corresponding hidden object to be viewed based on described selection instruction; Show the checking interface of described hidden object to be viewed, for user based on described checking interface input validation information; When described authorization information is verified, show the relevant information of described hidden object to be viewed, the program must enter to hide Info based on corresponding instruction checks interface, and can not show hidden object in current display interface, very safe.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of data processing method first embodiment of the present invention;
Fig. 2 is the schematic flow sheet that the present invention treats the first embodiment that hidden object carries out hiding;
Fig. 3 is the schematic flow sheet that the present invention treats the second embodiment that hidden object carries out hiding;
Fig. 4 is the schematic flow sheet of data processing method second embodiment of the present invention;
Fig. 5 is the high-level schematic functional block diagram of data handling system preferred embodiment of the present invention.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further with reference to accompanying drawing.
Embodiment
Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
The invention provides a kind of data processing method.
With reference to the schematic flow sheet that Fig. 1, Fig. 1 are data processing method first embodiment of the present invention.
The present embodiment proposes a kind of data processing method, and described data processing method comprises:
Step S10, when detecting hidden object and checking instruction, generates based on the hidden object prestored and shows hidden object and check interface, check that hidden object to be viewed is selected at interface for user based on described hidden object;
In the present embodiment, described hidden object checks that instruction triggers by various ways, as gesture motion track, the phonetic control command preset or send hidden object by third party's terminal and check instruction, also or hidden object can be triggered based on the touch slide (such as slide to display screen a direction) of display screen and check instruction based on the control on display interface.
It will be appreciated by persons skilled in the art that the fail safe for improving hidden object, step S10 comprises: when detecting hidden object and checking instruction, checks that instruction is verified to described hidden object; When being verified, generating based on the hidden object prestored and showing hidden object and checking interface, checking that hidden object to be viewed is selected at interface for user based on described hidden object.This verification mode comprises multiple, as password authentification and fingerprint authentication etc.
Step S20, when receiving the hidden object selection instruction to be viewed of user's input, determines corresponding hidden object to be viewed based on described selection instruction;
Step S30, shows the checking interface of described hidden object to be viewed, for user based on described checking interface input validation information;
User can based on hidden object to be viewed corresponding to the way selection such as touch operation or third party's terminal, and described hidden object to be viewed can be the individual subscriber such as video, picture data, also can be the communication data such as short message and incoming information, does not limit at this.
In the present embodiment, the authorization information of user's input can be encrypted message, finger print information or Quick Response Code etc. can carry out the information verified.
Step S40, when described authorization information is verified, shows the relevant information of described hidden object to be viewed.
The relevant information preferred version of this hidden object is the particular content of hidden object.
The data processing method that the present embodiment proposes, when detecting hidden object and checking instruction, generates based on the hidden object prestored and shows hidden object and check interface, check that hidden object to be viewed is selected at interface for user based on described hidden object; When receiving the hidden object selection instruction to be viewed of user's input, determine corresponding hidden object to be viewed based on described selection instruction; Show the checking interface of described hidden object to be viewed, for user based on described checking interface input validation information; When described authorization information is verified, show the relevant information of described hidden object to be viewed, the program must enter to hide Info based on corresponding instruction checks interface, and can not show hidden object in current display interface, very safe.
Treating the mode that hidden object carries out hiding has multiple, and concrete Stealth Modus is exemplified below:
A, the first embodiment, with reference to Fig. 2, also comprise before described step S10:
Step S50, when receiving Information hiding instruction, determines object to be concealed;
In the present embodiment, described Information hiding instruction can be triggered by various ways, as gesture motion track, the phonetic control command preset or send Information hiding instruction by third party's terminal, also instruction can be hidden based on the control on display interface or based on touch slide (such as sliding to the display screen a direction) trigger message of display screen.
Step S60, using the authorization information of the authorization information preset or the current input of user as the authorization information of described object to be concealed;
In the present embodiment, this authorization information preset can be arranged by user, or display authorization information inputting interface, and input corresponding authorization information for user based on this authorization information inputting interface, this authorization information can be encrypted message or finger print information etc.
Step S70, deletes the identification information of object to be concealed described in current display interface, and described Objects hide to be concealed is preserved.
In the present embodiment, delete the identification information of object to be concealed described in current display interface, make object to be concealed safer.The scheme that described Objects hide to be concealed is preserved be can be, be stored in default store path by described object to be concealed, this store path associates with hidden object calling interface; Or the store path of described object to be concealed is associated with hidden object calling interface.
B, the second embodiment, with reference to Fig. 3, also comprise before described step S10:
Step S80, when receiving Information hiding instruction, determines object to be concealed;
Step S90, described object to be concealed is associated with the subscriber identification card preset, and the incidence relation deleted between described object to be concealed and current user identities identification card, and using the authorization information of the authorization information preset or the current input of user as the authorization information of described object to be concealed.
In the present embodiment, trigger hidden object and check that the mode of instruction preferably enters default identification card, user can based on the gesture motion track preset, phonetic control command or the instruction sent by third party's terminal, and the hidden object entering default subscriber identification card corresponding checks interface.
User enters by the mode switching to default identification card and sees that hidden object checks interface in this scenario, very convenient.
Treat the mode that hidden object carries out hiding for two kinds that enumerate above and be only exemplary; those skilled in the art utilize technological thought of the present invention; other proposition according to its real needs treat mode that hidden object carries out hiding all in protection scope of the present invention, do not carry out exhaustive one by one at this.
Further, for improving the flexibility of data processing, with reference to Fig. 4, proposing data processing method of the present invention 4th embodiment based on the first embodiment, in the present embodiment, comprising after described step S40:
Step S100, when receiving information disclosure instruction, the authorization information of the hidden object to be viewed of the current display of described terminal deletion;
Step S110, is added into corresponding display interface by the identification information of the hidden object to be viewed of current display.
In the present embodiment, can carry out open to hidden object, this information disclosure instruction can be triggered based on modes such as the gesture motion track preset, phonetic control command or the instructions sent by third party's terminal.Openly deleting the authorization information of hidden object afterwards, and correspondence display interface (preferred version be described identification information and original display interface) show its identification information, make user very conveniently can check the information unhided.Or, the display interface of the identification information of the hidden object to be viewed of current display can be selected by user.
The present invention further provides a kind of data handling system.
With reference to the high-level schematic functional block diagram that Fig. 5, Fig. 5 are data handling system preferred embodiment of the present invention.
It is emphasized that, to one skilled in the art, functional block diagram shown in Fig. 5 is only the exemplary plot of a preferred embodiment, and those skilled in the art, around the functional module of the data handling system shown in Fig. 5, can carry out supplementing of new functional module easily; The title of each functional module is self-defined title, only for auxiliary each program function block understanding this data handling system, be not used in and limit technical scheme of the present invention, the core of technical solution of the present invention is, the function that the functional module of respective define name will be reached.
The present embodiment proposes a kind of data handling system, and described data handling system comprises:
Display module 10, for when detecting hidden object and checking instruction, generates based on the hidden object prestored and shows hidden object and check interface, check that hidden object to be viewed is selected at interface for user based on described hidden object;
In the present embodiment, described hidden object checks that instruction triggers by various ways, as gesture motion track, the phonetic control command preset or send hidden object by third party's terminal and check instruction, also or hidden object can be triggered based on the touch slide (such as slide to display screen a direction) of display screen and check instruction based on the control on display interface.
It will be appreciated by persons skilled in the art that the fail safe for improving hidden object, step S10 comprises: when detecting hidden object and checking instruction, checks that instruction is verified to described hidden object; When being verified, generating based on the hidden object prestored and showing hidden object and checking interface, checking that hidden object to be viewed is selected at interface for user based on described hidden object.This verification mode comprises multiple, as password authentification and fingerprint authentication etc.
Determination module 20, for when receiving the hidden object selection instruction to be viewed of user's input, determines corresponding hidden object to be viewed based on described selection instruction;
Described display module 10, also for showing the checking interface of described hidden object to be viewed, for user based on described checking interface input validation information, and when described authorization information is verified, shows the relevant information of described hidden object to be viewed.
User can based on hidden object to be viewed corresponding to the way selection such as touch operation or third party's terminal, and described hidden object to be viewed can be the individual subscriber such as video, picture data, also can be the communication data such as short message and incoming information, does not limit at this.
In the present embodiment, the authorization information of user's input can be encrypted message, finger print information or Quick Response Code etc. can carry out the information verified.The relevant information preferred version of this hidden object is the particular content of hidden object.
The data handling system that the present embodiment proposes, when detecting hidden object and checking instruction, generates based on the hidden object prestored and shows hidden object and check interface, check that hidden object to be viewed is selected at interface for user based on described hidden object; When receiving the hidden object selection instruction to be viewed of user's input, determine corresponding hidden object to be viewed based on described selection instruction; Show the checking interface of described hidden object to be viewed, for user based on described checking interface input validation information; When described authorization information is verified, show the relevant information of described hidden object to be viewed, the program must enter to hide Info based on corresponding instruction checks interface, and can not show hidden object in current display interface, very safe.
Treating the mode that hidden object carries out hiding has multiple, and concrete Stealth Modus is exemplified below:
A, the first embodiment, described data handling system also comprises:
Described determination module 10 also for when receiving Information hiding instruction, determines object to be concealed;
Processing module, for the authorization information of the authorization information that will preset or the current input of user as the authorization information of described object to be concealed;
Removing module, for deleting the identification information of object to be concealed described in current display interface, and preserves described Objects hide to be concealed.
In the present embodiment, described Information hiding instruction can be triggered by various ways, as gesture motion track, the phonetic control command preset or send Information hiding instruction by third party's terminal, also instruction can be hidden based on the control on display interface or based on touch slide (such as sliding to the display screen a direction) trigger message of display screen.This authorization information preset can be arranged by user, or display authorization information inputting interface, and input corresponding authorization information for user based on this authorization information inputting interface, this authorization information can be encrypted message or finger print information etc.
In the present embodiment, delete the identification information of object to be concealed described in current display interface, make object to be concealed safer.The scheme that described Objects hide to be concealed is preserved be can be, be stored in default store path by described object to be concealed, this store path associates with hidden object calling interface; Or the store path of described object to be concealed is associated with hidden object calling interface.
B, the second embodiment, described data handling system also comprises:
Described determination module 10 also for when receiving Information hiding instruction, determines object to be concealed;
Relating module, for associating described object to be concealed with the subscriber identification card preset;
Removing module, for deleting the incidence relation between described object to be concealed and current user identities identification card;
Processing module, for the authorization information of the authorization information that will preset or the current input of user as the authorization information of described object to be concealed.
In the present embodiment, trigger hidden object and check that the mode of instruction preferably enters default identification card, user can based on the gesture motion track preset, phonetic control command or the instruction sent by third party's terminal, and the hidden object entering default subscriber identification card corresponding checks interface.User enters by the mode switching to default identification card and sees that hidden object checks interface in this scenario, very convenient.
Treat the mode that hidden object carries out hiding for two kinds that enumerate above and be only exemplary; those skilled in the art utilize technological thought of the present invention; other proposition according to its real needs treat mode that hidden object carries out hiding all in protection scope of the present invention, do not carry out exhaustive one by one at this.
Further, for improving the flexibility of data processing, described data handling system also comprises:
Described removing module, also for when receiving information disclosure instruction, the authorization information of the hidden object to be viewed of the current display of described terminal deletion;
Add module, the identification information for the hidden object to be viewed by current display is added into corresponding display interface.
In the present embodiment, can carry out open to hidden object, this information disclosure instruction can be triggered based on modes such as the gesture motion track preset, phonetic control command or the instructions sent by third party's terminal.Openly deleting the authorization information of hidden object afterwards, and correspondence display interface (preferred version be described identification information and original display interface) show its identification information, make user very conveniently can check the information unhided.Or, the display interface of the identification information of the hidden object to be viewed of current display can be selected by user.
The present invention also proposes a kind of mobile terminal, and described mobile terminal comprises data handling system as described above in Example.
It should be noted that, in this article, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or system and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or system.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the system comprising this key element and also there is other identical element.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that above-described embodiment method can add required general hardware platform by software and realize, hardware can certainly be passed through, but in a lot of situation, the former is better execution mode.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product is stored in a storage medium (as ROM/RAM, magnetic disc, CD), comprising some instructions in order to make a station terminal equipment (can be mobile phone, computer, server, air conditioner, or the network equipment etc.) perform method described in each embodiment of the present invention.
These are only the preferred embodiments of the present invention; not thereby the scope of the claims of the present invention is limited; every utilize specification of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (7)

1. a data processing method, is characterized in that, described data processing method comprises the following steps:
When receiving Information hiding instruction, determine object to be concealed;
Described object to be concealed is associated with the subscriber identification card preset, and the incidence relation deleted between described object to be concealed and current user identities identification card, and using the authorization information of the authorization information preset or the current input of user as the authorization information of described object to be concealed;
When entering default identification card, generating based on the hidden object prestored and showing hidden object and checking interface, checking that hidden object to be viewed is selected at interface for user based on described hidden object;
When receiving the hidden object selection instruction to be viewed of user's input, determine corresponding hidden object to be viewed based on described selection instruction;
Show the checking interface of described hidden object to be viewed, for user based on described checking interface input validation information;
When described authorization information is verified, show the relevant information of described hidden object to be viewed.
2. data processing method as claimed in claim 1, it is characterized in that, described when detecting hidden object and checking instruction, interface is checked based on the hiding generation hidden object prestored, before checking that the step of hidden object to be viewed is selected at interface for user based on described hidden object, described data processing method comprises:
Delete the identification information of object to be concealed described in current display interface, and described Objects hide to be concealed is preserved.
3. data processing method as claimed in claim 1 or 2, it is characterized in that, described when described authorization information is verified, after showing the step of the relevant information of described hidden object to be viewed, described data processing method also comprises:
When receiving information disclosure instruction, the authorization information of the hidden object to be viewed of the current display of described terminal deletion;
The identification information of the hidden object to be viewed of current display is added into corresponding display interface.
4. a data handling system, is characterized in that, described data handling system comprises:
Display module, for when entering default identification card, generating based on the hidden object prestored and showing hidden object and checking interface, checking that hidden object to be viewed is selected at interface for user based on described hidden object;
Determination module, for when receiving the hidden object selection instruction to be viewed of user's input, determines corresponding hidden object to be viewed based on described selection instruction;
Described display module, also for showing the checking interface of described hidden object to be viewed, for user based on described checking interface input validation information, and when described authorization information is verified, shows the relevant information of described hidden object to be viewed;
Described determination module also for when receiving Information hiding instruction, determines object to be concealed;
Relating module, for associating described object to be concealed with the subscriber identification card preset;
Removing module, for deleting the incidence relation between described object to be concealed and current user identities identification card;
Processing module, for the authorization information of the authorization information that will preset or the current input of user as the authorization information of described object to be concealed
5. data handling system as claimed in claim 4, it is characterized in that, described data handling system also comprises:
Removing module, for deleting the identification information of object to be concealed described in current display interface, and preserves described Objects hide to be concealed.
6. the data handling system as described in claim 4 or 5, is characterized in that, described data handling system also comprises:
Described removing module, also for when receiving information disclosure instruction, the authorization information of the hidden object to be viewed of the current display of described terminal deletion;
Add module, the identification information for the hidden object to be viewed by current display is added into corresponding display interface.
7. a mobile terminal, is characterized in that, described mobile terminal comprises the data handling system as described in any one of claim 4-6.
CN201410431343.3A 2014-08-28 2014-08-28 Data processing method, system and mobile terminal Active CN104184900B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410431343.3A CN104184900B (en) 2014-08-28 2014-08-28 Data processing method, system and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410431343.3A CN104184900B (en) 2014-08-28 2014-08-28 Data processing method, system and mobile terminal

Publications (2)

Publication Number Publication Date
CN104184900A CN104184900A (en) 2014-12-03
CN104184900B true CN104184900B (en) 2016-03-02

Family

ID=51965619

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410431343.3A Active CN104184900B (en) 2014-08-28 2014-08-28 Data processing method, system and mobile terminal

Country Status (1)

Country Link
CN (1) CN104184900B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104598836A (en) * 2015-01-09 2015-05-06 中兴通讯股份有限公司 Method and device for managing communication content on mobile terminal as well as mobile terminal
CN105574382A (en) * 2015-03-30 2016-05-11 深圳酷派技术有限公司 Information protection method and terminal
CN104869239A (en) * 2015-04-30 2015-08-26 努比亚技术有限公司 Display control method and device for terminal information
CN105117123A (en) * 2015-07-30 2015-12-02 努比亚技术有限公司 Device and method for displaying hidden object
CN105046135A (en) * 2015-08-28 2015-11-11 宇龙计算机通信科技(深圳)有限公司 Information display method, information display apparatus and terminal
CN106778296B (en) * 2016-11-30 2020-05-12 Oppo广东移动通信有限公司 Access method, device and terminal for access object
CN106921952A (en) * 2017-01-25 2017-07-04 宇龙计算机通信科技(深圳)有限公司 Communication data method for transformation and mobile terminal
CN107015746B (en) * 2017-03-06 2020-03-17 北京潘达互娱科技有限公司 Interface element processing method and device
CN110848890B (en) * 2019-11-29 2021-12-03 广东美的制冷设备有限公司 Air conditioner control display method, air conditioner and computer readable storage medium
CN112596830A (en) * 2020-12-16 2021-04-02 广东湾区智能终端工业设计研究院有限公司 Interface display method and device
CN114117541A (en) * 2022-01-26 2022-03-01 中国民航信息网络股份有限公司 Reservation recording information protection method, related device and computer storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101494692A (en) * 2009-02-20 2009-07-29 深圳华为通信技术有限公司 Method and apparatus for triggering concealed program by communication terminal
CN103002117A (en) * 2011-09-15 2013-03-27 胡光力 Phone information encryption method and phone information encryption system
CN103634482A (en) * 2013-12-26 2014-03-12 厦门福龙天下网络技术有限公司 Safety protecting method for application software of portable intelligent equipment
CN103780756A (en) * 2014-01-06 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Customer identification card data confidentiality method and mobile terminal thereof
CN103888607A (en) * 2014-03-13 2014-06-25 惠州Tcl移动通信有限公司 Method and system for viewing privacy short message services of mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101494692A (en) * 2009-02-20 2009-07-29 深圳华为通信技术有限公司 Method and apparatus for triggering concealed program by communication terminal
CN103002117A (en) * 2011-09-15 2013-03-27 胡光力 Phone information encryption method and phone information encryption system
CN103634482A (en) * 2013-12-26 2014-03-12 厦门福龙天下网络技术有限公司 Safety protecting method for application software of portable intelligent equipment
CN103780756A (en) * 2014-01-06 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Customer identification card data confidentiality method and mobile terminal thereof
CN103888607A (en) * 2014-03-13 2014-06-25 惠州Tcl移动通信有限公司 Method and system for viewing privacy short message services of mobile terminal

Also Published As

Publication number Publication date
CN104184900A (en) 2014-12-03

Similar Documents

Publication Publication Date Title
CN104184900B (en) Data processing method, system and mobile terminal
CN104468611B (en) The data safety processing method and device switched based on dual system
CN105631275B (en) information display method, information display device and terminal
CN104732125B (en) The display methods and terminal of encryption information
CN102509055A (en) Mobile terminal and method for hiding programs of mobile terminal
CN104143068B (en) Method of password authentication and system
CN104933343A (en) Secrecy method and apparatus of application program, and electronic device
CN104657643A (en) Privacy protection method, wearable device and mobile terminal
CN104036202B (en) A kind of method and apparatus for isolating enterprise's application
CN102880560A (en) User privacy data protection method and mobile terminal using user privacy data protection method
CN104239804A (en) Data protecting method and device
CN103902862A (en) Mobile device management method and device and mobile device
CN104281794A (en) Password storing and verifying method and password storing and verifying device
CN104318183A (en) Processing method and device for communication information of terminal
CN1997188A (en) A recognition method of the user identity and its handset
CN104796534A (en) Method and device for processing information contents
CN102209137A (en) Private account system of mobile terminal private account system and realization method
CN102801731B (en) A kind of method of protected data and device
CN105809007A (en) Privacy protection method and device
CN108319865A (en) A kind of method for secret protection, storage medium and terminal device based on polygonal color
CN106603241A (en) Unlocking method, apparatus and electronic device
CN108540591B (en) Address book management method, address book management device and electronic equipment
CN107292133B (en) Artificial intelligence confusion technical method and device
CN104796885A (en) Method and system for realizing private conversation in conversation process
CN102098391B (en) Communication terminal and communication information processing method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: 518000 Guangdong province Shenzhen city Nanshan District high tech park, No. 9018 North Central Avenue, building A, floor six, Han's innovation

Patentee after: Nubian Technologies Ltd.

Address before: 518000 Guangdong province Shenzhen city Nanshan District high tech park, No. 9018 North Central Avenue, building A, floor six, Han's innovation

Patentee before: Shenzhen ZTE Mobile Tech Co., Ltd.