CN104579685A - Information protection method and device - Google Patents

Information protection method and device Download PDF

Info

Publication number
CN104579685A
CN104579685A CN201510003177.1A CN201510003177A CN104579685A CN 104579685 A CN104579685 A CN 104579685A CN 201510003177 A CN201510003177 A CN 201510003177A CN 104579685 A CN104579685 A CN 104579685A
Authority
CN
China
Prior art keywords
information
application
false
associated person
person information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510003177.1A
Other languages
Chinese (zh)
Inventor
赵冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510003177.1A priority Critical patent/CN104579685A/en
Publication of CN104579685A publication Critical patent/CN104579685A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides an information protection method and device. The method comprises the steps that false contact person information is generated; the trusted levels of all applications are set, the applications are at least classified to be the trusted applications and the non-trusted applications, and the authority of accessing the false contact person information is given to the non-trusted applications; whether the applications which request to access the contact person information are the non-trusted applications or not is judged; if yes, the false contact person information is provided for the non-trusted applications. The information protection device comprises a generation module, a setting module and a processing module. According to the information protection method and device, the false contact person information is provided for the non-trusted applications, the effects of confusing the public and lulling opponents are achieved, no chance of breaking is given to the opponents, and the absolute safety of privacy-sensitive information is guaranteed. The false contact person information generated by the method and device can be repeatedly used, compared with an existing encryption scheme, the system overhead is lowered to a great extent, and the maintaining problem of keys is solved.

Description

A kind of information protecting method and device
Technical field
The present invention relates to field of information security technology, particularly relate to a kind of information protecting method and device.
Background technology
Existing terminal utilizes rights management with the access rights of management and control to contact person and note, or is encrypted for contact person and short message content.
Some third party software often needs user to provide the access rights of contact person and note, if the use of even limited subscriber is experienced in the application not providing corresponding authority will affect user.Although the mode be encrypted for contact person and short message can increase the difficulty that other people obtain private information, there is following problem: the first, the cryptographic algorithm do not cracked, private information is once it is still unsafe for revealing; The second, the cryptographic algorithm being difficult to crack often needs the terminal configuration support with higher computing capability; 3rd, more new capital of any information needs re-encrypted, and this brings sizable calculating pressure to terminal.4th, all there is cipher key management difficult to a certain extent in cryptographic algorithm; 5th, the private information after encryption is too lofty, too easily causes other people attention.
Summary of the invention
The technical problem to be solved in the present invention is, provides a kind of information protecting method and device, guarantees being perfectly safe of information with less overhead.
The technical solution used in the present invention is, described information protecting method, comprising:
Generate false associated person information;
Arrange the confidence level of each application, application is divided at least following confidence level: trusted application and untrusted application, described untrusted application is awarded the false associated person information authority of access;
Judge that whether the application of request access associated person information is untrusted application;
If so, described false associated person information is provided to the application of described untrusted.
Further, described false associated person information is corresponding with the content-form of real connection people information, described false associated person information includes with the content-form of described real connection people information: contact person's code name and corresponding descriptor, or, the descriptor of local user's code name and correspondence;
Described contact person's code name comprises: the name of contact person, telephone number or instant messaging number; Described local user's code name comprises: the name of local user, telephone number or instant messaging number;
The descriptor of described contact person comprises: short message talk record, the calling record of the people that is related participation or the positional information of contact person that the people that is related participates in; The descriptor of described local user comprises: the positional information of the short message that has local user to participate in talk record, the calling record having local user to participate in or local user.
Further, when described false associated person information comprises the short message talk record of false name of contact person and correspondence, the false associated person information of described generation, comprising:
The telephone number of the false contact person of stochastic generation setting quantity in the scope of number section provided at different operators;
Under the telephone number of each false contact person, adopt the mode of asking a question and answer it oneself of artificial intelligence robot application, generate the short message talk record between this virtual contact and local user.
Further, under the telephone number of each false contact person, adopt the mode of asking a question and answer it oneself of artificial intelligence robot application, generate the short message talk record between this virtual contact and local user, comprising:
Under the telephone number of each false contact person, set the virtual short message number of carrying out between this virtual contact and local user talking;
The starting point that a setting conventional greeting is talked as short message, adopts the mode of asking a question and answer it oneself of artificial intelligence robot application, generates each short message content of talking between this virtual contact and local user successively;
According to the time point that the sequencing generated is described each short message content distribution correspondence, described time point is all chosen within the time period of setting.
Further, the false associated person information of described generation, also comprises:
According to One Hundred Family Names and the false name of contact person of common first names database stochastic generation, described false name of contact person is associated with the telephone number of described false contact person.
Further, described trusted application is awarded access real connection people information authority;
Described method also comprises: if decision request access associated person information be applied as trusted application, then real connection people information is provided to described trusted application;
Judge that whether the application of request access associated person information is untrusted application, if, then described false associated person information is provided to the application of described untrusted, otherwise decision request access associated person information be applied as trusted application, described real connection people information is provided to described trusted application, comprises:
The access request of the application of request access associated person information is tackled, to judge that the application of request access associated person information is trusted application or untrusted application, then orientation is carried out according to judged result, through directed, described false associated person information is provided to the application of described untrusted, real connection people information is provided to described trusted application.
Further, carry out orientation according to judged result, through orientation, described false associated person information be provided to the application of described untrusted, real connection people information be provided to described trusted application, comprise:
When judged result is non-trusted application, navigate to the memory space of false associated person information, read false associated person information, be supplied to untrusted application;
When judged result is trusted application, navigate to the memory space of true spurious association people information, read real connection people information, be supplied to trusted application.
Further, described described false associated person information is provided to described untrusted application, also comprise:
After false associated person information being supplied to untrusted application, upgrade according to the current time pair temporal information relevant to false associated person information.
Further, the confidence level of each application of setting also comprises: hazardous applications, and described hazardous applications is not awarded any access rights;
Described method, also comprises: whether the application judging request access associated person information is hazardous applications, if so, refuses as hazardous applications provides any information.
The present invention also provides a kind of information protection device, comprising:
Generation module, for generating false associated person information;
Arranging module, for arranging the confidence level of each application, application being divided at least following confidence level: trusted application and untrusted application, described untrusted application is awarded the false associated person information authority of access;
Processing module, for judging whether the application of request access associated person information is untrusted application; If so, described false associated person information is provided to the application of described untrusted.
Adopt technique scheme, the present invention at least has following advantages:
Information protecting method of the present invention and device, be supplied to third-party application by false associated person information, not only can play the effect of the opponent that misleads the public, benumbs, and do not give any chance cracked of the other side, ensure that being perfectly safe of private information.The false associated person information that the present invention generates can be reused, and not only reduces overhead to a great extent compared with existing encipherment scheme, and there is not the maintenance issues of key.
Accompanying drawing explanation
Fig. 1 is the information protecting method flow chart of first embodiment of the invention;
Fig. 2 is the flow chart generating false associated person information in first embodiment of the invention when false associated person information comprises the short message talk record of false name of contact person and correspondence;
Fig. 3 is the flow chart of the steps A 2 of first embodiment of the invention;
Fig. 4 is the information protection device composition schematic diagram of third embodiment of the invention;
Fig. 5 is the realization flow schematic diagram of the generation module of fourth embodiment of the invention;
Fig. 6 is the realization flow schematic diagram of the processing module of fourth embodiment of the invention.
Embodiment
For further setting forth the present invention for the technological means reaching predetermined object and take and effect, below in conjunction with accompanying drawing and preferred embodiment, the present invention is described in detail as after.
First embodiment of the invention provides a kind of information protecting method, and as shown in Figure 1, described information protecting method comprises following concrete steps:
Step S101, generates false associated person information.
Concrete, the false associated person information generated is corresponding with the content of real connection people information, and include: the descriptor of contact person's code name and correspondence, or, the descriptor of local user's code name and correspondence, wherein, described code name, comprising: name, telephone number or instant messaging number.Described descriptor, comprising: short message talk record, calling record or positional information.
Preferably, when described false associated person information comprises the short message talk record of false name of contact person and correspondence, the false associated person information of described generation, as shown in Figure 2, comprising:
A1: the telephone number of the false contact person of stochastic generation setting quantity in the scope of number section provided at different operators; The setting quantity of the telephone number of false contact person can be arranged according to actual needs flexibly.
A2: under the telephone number of each false contact person, adopts the mode of asking a question and answer it oneself of artificial intelligence robot application, generates the short message talk record between this virtual contact and local user.
Further, as shown in Figure 3, steps A 2 comprises:
A21: under the telephone number of each false contact person, sets the virtual short message number of carrying out between this virtual contact and local user talking;
Concrete, when arranging the described virtual short message number relevant to this virtual contact for arbitrary virtual contact, the scope of a virtual short message number first can be set, then random selecting numerical value in the scope of this virtual short message number, as described virtual short message number.
A22: the starting point that a setting conventional greeting is talked as short message, adopts the mode of asking a question and answer it oneself of artificial intelligence robot application, generates each short message content of talking between this virtual contact and local user successively;
A23: the time point according to the sequencing generated being described each short message content distribution correspondence, described time point is all chosen according to time order and function within the time period of setting.
Preferably, in step S101, generate false associated person information, also comprise:
According to One Hundred Family Names and the false name of contact person of common first names database stochastic generation, described false name of contact person is associated with the telephone number of described false contact person.Because be common user habit for each telephone number arranges corresponding name of contact person, so in order to allow false associated person information look truer, also for the telephone number of corresponding false contact person sets a false name of contact person.
Step S102, arranges the confidence level of each application, application is divided at least following confidence level: trusted application and untrusted application, and described untrusted application is awarded the false associated person information authority of access.
Concrete, in step s 102, described trusted application is awarded access real connection people information authority.
Step S103, judges whether the application of request access associated person information is untrusted application, if so, then described false associated person information is provided to the application of described untrusted.
Concrete, step S103 also comprises: if decision request access associated person information be applied as trusted application, then described real connection people information is provided to described trusted application.
Further, in step s 103, the access request of the application of request access associated person information is tackled, to judge that the application of request access associated person information is trusted application or untrusted application, then orientation is carried out according to judged result, through directed, described false associated person information is provided to the application of described untrusted, real connection people information is provided to described trusted application.
Carry out orientation according to judged result, through orientation, described false associated person information be provided to the application of described untrusted, real connection people information be provided to described trusted application, comprise:
When judged result is non-trusted application, navigate to the memory space of false associated person information, read false associated person information, be supplied to untrusted application;
When judged result is trusted application, navigate to the memory space of true spurious association people information, read real connection people information, be supplied to trusted application.
Preferably, after false associated person information being supplied to untrusted application, then upgrade according to the current time pair temporal information relevant to false associated person information.
Second embodiment of the invention, a kind of information protecting method, method described in the present embodiment is roughly the same with the first embodiment; difference is; in the step S101 of the present embodiment, the confidence level of each application of setting also comprises: hazardous applications, and described hazardous applications is not awarded any access rights.
Method described in the present embodiment, also comprises in step S103:
Whether the application judging request access associated person information is hazardous applications, if so, refuses as hazardous applications provides any information.
Third embodiment of the invention, corresponding with the first embodiment or the second embodiment, the present embodiment introduces a kind of information protection device, as shown in Figure 4, comprises following part:
Generation module 100, for generating false associated person information.
Arranging module 200, for arranging the confidence level of each application, application being divided at least following confidence level: trusted application and untrusted application, described untrusted application is awarded the false associated person information authority of access.
Processing module 300, for judging whether the application of request access associated person information is untrusted application, if so, described false associated person information is provided to the application of described untrusted.
Concrete, with false associated person information for the short message talk of false name of contact person and correspondence is recorded as example, 5 ~ 6 application examples introducing the information protection device that the 4th embodiment provides by reference to the accompanying drawings.Specific as follows:
Described generation module is used for generation and the renewal of deceptive information.Concrete, when user selects to authorize third-party application deceptive information access rights first time, this module will start automatically, for generating permanent effective false associated person information, comprising: false contact person and false note.
As shown in Figure 5, this module can be realized by two kinds of modes: a kind of is utilize network from being pre-stored in the magnanimity information in high in the clouds to the data importing some random (i.e. the short message of virtual contact and correspondence thereof).Another kind is local generation.The generating mode of local false contact person mainly according to One Hundred Family Names and common first names database stochastic generation name of contact person, stochastic generation 11 phone numbers in the scope of number section then provided according to different operators.There are reliable mapping relations in false note and false contact person.
The generation of false note utilizes asking a question and answer it oneself of terminal artificial intelligence robot to realize.First, specify a respective different conventional greeting as the starting point of note respectively for different false contact persons; Then, be initial with respective greeting, the short message content that artificial intelligence robot completes respective contacts by the mode of asking a question and answer it oneself is filled.Finally, according to the deceptive information number stochastic generation time point sequentially for each false contact person's setting, time point is all positioned within nearest one week, and is mated with note by time point.
Module is set for arranging the confidence level of each application, application is divided at least following confidence level: the application of trusted application, untrusted and hazardous applications, described untrusted application is awarded the false associated person information authority of access, described trusted application is awarded access real connection people information authority, and described hazardous applications is not awarded any access rights.
Processing module starts when terminal authorizes virtual information access rights at every turn, for realizing the replacement of false associated person information to real connection people information, and upgrades the temporal information relevant to false associated person information according to the time instantly.
The specific implementation of processing module is tackled based on the API towards API and is redirected interface (being similar to the interception based on API of the first embodiment and redirected interface).Terminal maintenance two overlaps same format, the contact person of different identification and short message data, respectively for the application access possessing different access authority.An API interception is set outside the application of preserving associated person information and is redirected interface, for when there being application request to access real connection people's information, tackle this access request message, judge that described application is trusted application, untrusted application or hazardous applications according to the access rights of the application initiating request.
Such as, as shown in Figure 6, certain third-party application does not possess access real connection people information weight in limited time, API interception be redirected interface tackle under the access request for real connection people information initiated of this third-party application, and be redirected to the memory space of false associated person information.Meanwhile, another trusted application possesses accesses real connection people information authority, and API tackles and is redirected interface and can pass through to tackle this access request lower and the storage sky being redirected to real connection people information.If also have a hazardous applications not possess the authority of accessing any associated person information, then refuse its access request.So just achieve the different access authority that different application arranges according to user and concurrent access is carried out to real connection people information and false associated person information.The mode that user can also be arranged to add preference avoids repeat queries when at every turn starting application program.
The present embodiment solve following technological difficulties: the first, how to generate false associated person information, comprise false contact person and false short message.The second, when receiving authority access intention, how to apply false associated person information and replacing real connection people information.3rd, when normally accessing, how to hide false associated person information and recovering real connection people information.
Information protecting method of the present invention and terminal, guarantee the fail safe of private information while using third party software.The deceptive information that the present invention generates can be reused, and not only reduces system overhead to a great extent, and there is not the maintenance issues of key compared with encipherment scheme.Deceptive information is supplied to third party, not only can plays the effect of the opponent that misleads the public, benumbs, and do not give any chance cracked of the other side, ensure that being perfectly safe of private information.
By the explanation of embodiment, should to the present invention for the technological means reaching predetermined object and take and effect be able to more deeply and concrete understanding, but appended diagram be only to provide with reference to and the use of explanation, be not used for being limited the present invention.

Claims (10)

1. an information protecting method, is characterized in that, comprising:
Generate false associated person information;
Arrange the confidence level of each application, application is divided at least following confidence level: trusted application and untrusted application, described untrusted application is awarded the false associated person information authority of access;
Judge that whether the application of request access associated person information is untrusted application;
If so, described false associated person information is provided to the application of described untrusted.
2. information protecting method according to claim 1, it is characterized in that, described false associated person information is corresponding with the content-form of real connection people information, described false associated person information includes with the content-form of described real connection people information: contact person's code name and corresponding descriptor, or, the descriptor of local user's code name and correspondence;
Described contact person's code name comprises: the name of contact person, telephone number or instant messaging number; Described local user's code name comprises: the name of local user, telephone number or instant messaging number;
The descriptor of described contact person comprises: short message talk record, the calling record of the people that is related participation or the positional information of contact person that the people that is related participates in; The descriptor of described local user comprises: the positional information of the short message that has local user to participate in talk record, the calling record having local user to participate in or local user.
3. information protecting method according to claim 2, is characterized in that, when described false associated person information comprises the short message talk record of false name of contact person and correspondence, the false associated person information of described generation, comprising:
The telephone number of the false contact person of stochastic generation setting quantity in the scope of number section provided at different operators;
Under the telephone number of each false contact person, adopt the mode of asking a question and answer it oneself of artificial intelligence robot application, generate the short message talk record between this virtual contact and local user.
4. information protecting method according to claim 3; it is characterized in that, under the telephone number of each false contact person, adopt the mode of asking a question and answer it oneself of artificial intelligence robot application; generate the short message talk record between this virtual contact and local user, comprising:
Under the telephone number of each false contact person, set the virtual short message number of carrying out between this virtual contact and local user talking;
The starting point that a setting conventional greeting is talked as short message, adopts the mode of asking a question and answer it oneself of artificial intelligence robot application, generates each short message content of talking between this virtual contact and local user successively;
According to the time point that the sequencing generated is described each short message content distribution correspondence, described time point is all chosen within the time period of setting.
5. information protecting method according to claim 3, is characterized in that, the false associated person information of described generation, also comprises:
According to One Hundred Family Names and the false name of contact person of common first names database stochastic generation, described false name of contact person is associated with the telephone number of described false contact person.
6. the information protecting method according to any one of Claims 1 to 5, is characterized in that, described trusted application is awarded access real connection people information authority;
Described method also comprises: if decision request access associated person information be applied as trusted application, then real connection people information is provided to described trusted application;
Judge that whether the application of request access associated person information is untrusted application, if, then described false associated person information is provided to the application of described untrusted, otherwise decision request access associated person information be applied as trusted application, described real connection people information is provided to described trusted application, comprises:
The access request of the application of request access associated person information is tackled, to judge that the application of request access associated person information is trusted application or untrusted application, then orientation is carried out according to judged result, through directed, described false associated person information is provided to the application of described untrusted, real connection people information is provided to described trusted application.
7. information protecting method according to claim 6, is characterized in that, carries out orientation according to judged result, through orientation, described false associated person information is provided to the application of described untrusted, real connection people information is provided to described trusted application, comprises:
When judged result is non-trusted application, navigate to the memory space of false associated person information, read false associated person information, be supplied to untrusted application;
When judged result is trusted application, navigate to the memory space of true spurious association people information, read real connection people information, be supplied to trusted application.
8. information protecting method according to claim 7, is characterized in that, described described false associated person information is provided to described untrusted application, also comprise:
After false associated person information being supplied to untrusted application, upgrade according to the current time pair temporal information relevant to false associated person information.
9. information protecting method according to claim 1, is characterized in that, the confidence level of each application of setting also comprises: hazardous applications, and described hazardous applications is not awarded any access rights;
Described method, also comprises: whether the application judging request access associated person information is hazardous applications, if so, refuses as hazardous applications provides any information.
10. an information protection device, is characterized in that, comprising:
Generation module, for generating false associated person information;
Arranging module, for arranging the confidence level of each application, application being divided at least following confidence level: trusted application and untrusted application, described untrusted application is awarded the false associated person information authority of access;
Processing module, for judging whether the application of request access associated person information is untrusted application, if so, described false associated person information is provided to the application of described untrusted.
CN201510003177.1A 2015-01-04 2015-01-04 Information protection method and device Pending CN104579685A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510003177.1A CN104579685A (en) 2015-01-04 2015-01-04 Information protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510003177.1A CN104579685A (en) 2015-01-04 2015-01-04 Information protection method and device

Publications (1)

Publication Number Publication Date
CN104579685A true CN104579685A (en) 2015-04-29

Family

ID=53094964

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510003177.1A Pending CN104579685A (en) 2015-01-04 2015-01-04 Information protection method and device

Country Status (1)

Country Link
CN (1) CN104579685A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106210316A (en) * 2016-07-12 2016-12-07 深圳市中易通安全芯科技有限公司 A kind of anti-localization method of mobile terminal based on virtual address and system thereof
CN106485163A (en) * 2016-09-22 2017-03-08 努比亚技术有限公司 Control method and control device that mobile terminal data storehouse accesses
CN106790931A (en) * 2016-12-19 2017-05-31 北京奇虎科技有限公司 Mobile terminal and its incoming display method and device
CN107451488A (en) * 2017-07-21 2017-12-08 珠海格力电器股份有限公司 A kind of method, device and mobile terminal that personal information is provided
CN107908971A (en) * 2017-11-09 2018-04-13 维沃移动通信有限公司 A kind of information processing method and mobile terminal
CN108932435A (en) * 2018-07-05 2018-12-04 宇龙计算机通信科技(深圳)有限公司 A kind of information security management method, terminal device and computer readable storage medium
WO2019196721A1 (en) * 2018-04-11 2019-10-17 Beijing Didi Infinity Technology And Development Co., Ltd. Methods and apparatuses for processing data requests and data protection
CN114037467A (en) * 2015-10-20 2022-02-11 索尼公司 Information processing system, information processing method, and computer-readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030208694A1 (en) * 2002-05-03 2003-11-06 Ko-Cheng Fang Network security system and method
CN101159778A (en) * 2007-09-10 2008-04-09 汤淼 System for multimedia communication based on virtual number
CN102801688A (en) * 2011-05-23 2012-11-28 联想(北京)有限公司 Data access method, device and terminal supporting data access

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030208694A1 (en) * 2002-05-03 2003-11-06 Ko-Cheng Fang Network security system and method
CN101159778A (en) * 2007-09-10 2008-04-09 汤淼 System for multimedia communication based on virtual number
CN102801688A (en) * 2011-05-23 2012-11-28 联想(北京)有限公司 Data access method, device and terminal supporting data access

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王鹏等: "一种提供虚拟数据增强Android安全性的方法", 《信息通信技术》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114037467A (en) * 2015-10-20 2022-02-11 索尼公司 Information processing system, information processing method, and computer-readable storage medium
CN106210316A (en) * 2016-07-12 2016-12-07 深圳市中易通安全芯科技有限公司 A kind of anti-localization method of mobile terminal based on virtual address and system thereof
CN106485163A (en) * 2016-09-22 2017-03-08 努比亚技术有限公司 Control method and control device that mobile terminal data storehouse accesses
CN106790931A (en) * 2016-12-19 2017-05-31 北京奇虎科技有限公司 Mobile terminal and its incoming display method and device
CN107451488A (en) * 2017-07-21 2017-12-08 珠海格力电器股份有限公司 A kind of method, device and mobile terminal that personal information is provided
CN107451488B (en) * 2017-07-21 2021-01-05 珠海格力电器股份有限公司 Method and device for providing personal information and mobile terminal
CN107908971A (en) * 2017-11-09 2018-04-13 维沃移动通信有限公司 A kind of information processing method and mobile terminal
WO2019196721A1 (en) * 2018-04-11 2019-10-17 Beijing Didi Infinity Technology And Development Co., Ltd. Methods and apparatuses for processing data requests and data protection
CN108932435A (en) * 2018-07-05 2018-12-04 宇龙计算机通信科技(深圳)有限公司 A kind of information security management method, terminal device and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN104579685A (en) Information protection method and device
CN106453330B (en) A kind of identity authentication method and system
CN103763319B (en) Method for safely sharing mobile cloud storage light-level data
CN104008313A (en) Protecting method and device of privacy information
CN109587101B (en) Digital certificate management method, device and storage medium
CN101853533B (en) Password setting method and device used for building gate control system
CN105574437B (en) Method and device for protecting privacy information and electronic equipment
CN105978917A (en) System and method for trusted application security authentication
CN105812332A (en) Data protection method
JP2019505941A (en) One-time dynamic location authentication method and system, and one-time dynamic password change method
CN101827148A (en) Fingerprint identification system applied to mobile phone and operating method thereof
US10447673B2 (en) Information processing apparatus, information processing method, and computer program
CN103685266B (en) The guard method of business data and device
CN104038613A (en) Method and apparatus for information security management
CN107040520A (en) A kind of cloud computing data-sharing systems and method
CN104994095A (en) Equipment authentication method, clients, server and system
CN106027530A (en) Instant message encryption system based on smartphone and implementation method thereof
CN106550357A (en) A kind of note method for managing security, device and terminal
CN104796530A (en) Phone conversation privacy protection method and system
CN104883341A (en) Application management device, terminal and application management method
CN105323254A (en) A mail encryption system based on a domestic commercial cipher code chip and an implementation method thereof
CN106332011B (en) Short message encryption communication method and terminal
CN105471711A (en) Mail encryption system based on intelligent mobile phone and realization method thereof
CN107249001B (en) A kind of information processing method, apparatus and system
JP4708377B2 (en) Automatic password update system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150429