CN104579685A - Information protection method and device - Google Patents
Information protection method and device Download PDFInfo
- Publication number
- CN104579685A CN104579685A CN201510003177.1A CN201510003177A CN104579685A CN 104579685 A CN104579685 A CN 104579685A CN 201510003177 A CN201510003177 A CN 201510003177A CN 104579685 A CN104579685 A CN 104579685A
- Authority
- CN
- China
- Prior art keywords
- information
- application
- false
- associated person
- person information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides an information protection method and device. The method comprises the steps that false contact person information is generated; the trusted levels of all applications are set, the applications are at least classified to be the trusted applications and the non-trusted applications, and the authority of accessing the false contact person information is given to the non-trusted applications; whether the applications which request to access the contact person information are the non-trusted applications or not is judged; if yes, the false contact person information is provided for the non-trusted applications. The information protection device comprises a generation module, a setting module and a processing module. According to the information protection method and device, the false contact person information is provided for the non-trusted applications, the effects of confusing the public and lulling opponents are achieved, no chance of breaking is given to the opponents, and the absolute safety of privacy-sensitive information is guaranteed. The false contact person information generated by the method and device can be repeatedly used, compared with an existing encryption scheme, the system overhead is lowered to a great extent, and the maintaining problem of keys is solved.
Description
Technical field
The present invention relates to field of information security technology, particularly relate to a kind of information protecting method and device.
Background technology
Existing terminal utilizes rights management with the access rights of management and control to contact person and note, or is encrypted for contact person and short message content.
Some third party software often needs user to provide the access rights of contact person and note, if the use of even limited subscriber is experienced in the application not providing corresponding authority will affect user.Although the mode be encrypted for contact person and short message can increase the difficulty that other people obtain private information, there is following problem: the first, the cryptographic algorithm do not cracked, private information is once it is still unsafe for revealing; The second, the cryptographic algorithm being difficult to crack often needs the terminal configuration support with higher computing capability; 3rd, more new capital of any information needs re-encrypted, and this brings sizable calculating pressure to terminal.4th, all there is cipher key management difficult to a certain extent in cryptographic algorithm; 5th, the private information after encryption is too lofty, too easily causes other people attention.
Summary of the invention
The technical problem to be solved in the present invention is, provides a kind of information protecting method and device, guarantees being perfectly safe of information with less overhead.
The technical solution used in the present invention is, described information protecting method, comprising:
Generate false associated person information;
Arrange the confidence level of each application, application is divided at least following confidence level: trusted application and untrusted application, described untrusted application is awarded the false associated person information authority of access;
Judge that whether the application of request access associated person information is untrusted application;
If so, described false associated person information is provided to the application of described untrusted.
Further, described false associated person information is corresponding with the content-form of real connection people information, described false associated person information includes with the content-form of described real connection people information: contact person's code name and corresponding descriptor, or, the descriptor of local user's code name and correspondence;
Described contact person's code name comprises: the name of contact person, telephone number or instant messaging number; Described local user's code name comprises: the name of local user, telephone number or instant messaging number;
The descriptor of described contact person comprises: short message talk record, the calling record of the people that is related participation or the positional information of contact person that the people that is related participates in; The descriptor of described local user comprises: the positional information of the short message that has local user to participate in talk record, the calling record having local user to participate in or local user.
Further, when described false associated person information comprises the short message talk record of false name of contact person and correspondence, the false associated person information of described generation, comprising:
The telephone number of the false contact person of stochastic generation setting quantity in the scope of number section provided at different operators;
Under the telephone number of each false contact person, adopt the mode of asking a question and answer it oneself of artificial intelligence robot application, generate the short message talk record between this virtual contact and local user.
Further, under the telephone number of each false contact person, adopt the mode of asking a question and answer it oneself of artificial intelligence robot application, generate the short message talk record between this virtual contact and local user, comprising:
Under the telephone number of each false contact person, set the virtual short message number of carrying out between this virtual contact and local user talking;
The starting point that a setting conventional greeting is talked as short message, adopts the mode of asking a question and answer it oneself of artificial intelligence robot application, generates each short message content of talking between this virtual contact and local user successively;
According to the time point that the sequencing generated is described each short message content distribution correspondence, described time point is all chosen within the time period of setting.
Further, the false associated person information of described generation, also comprises:
According to One Hundred Family Names and the false name of contact person of common first names database stochastic generation, described false name of contact person is associated with the telephone number of described false contact person.
Further, described trusted application is awarded access real connection people information authority;
Described method also comprises: if decision request access associated person information be applied as trusted application, then real connection people information is provided to described trusted application;
Judge that whether the application of request access associated person information is untrusted application, if, then described false associated person information is provided to the application of described untrusted, otherwise decision request access associated person information be applied as trusted application, described real connection people information is provided to described trusted application, comprises:
The access request of the application of request access associated person information is tackled, to judge that the application of request access associated person information is trusted application or untrusted application, then orientation is carried out according to judged result, through directed, described false associated person information is provided to the application of described untrusted, real connection people information is provided to described trusted application.
Further, carry out orientation according to judged result, through orientation, described false associated person information be provided to the application of described untrusted, real connection people information be provided to described trusted application, comprise:
When judged result is non-trusted application, navigate to the memory space of false associated person information, read false associated person information, be supplied to untrusted application;
When judged result is trusted application, navigate to the memory space of true spurious association people information, read real connection people information, be supplied to trusted application.
Further, described described false associated person information is provided to described untrusted application, also comprise:
After false associated person information being supplied to untrusted application, upgrade according to the current time pair temporal information relevant to false associated person information.
Further, the confidence level of each application of setting also comprises: hazardous applications, and described hazardous applications is not awarded any access rights;
Described method, also comprises: whether the application judging request access associated person information is hazardous applications, if so, refuses as hazardous applications provides any information.
The present invention also provides a kind of information protection device, comprising:
Generation module, for generating false associated person information;
Arranging module, for arranging the confidence level of each application, application being divided at least following confidence level: trusted application and untrusted application, described untrusted application is awarded the false associated person information authority of access;
Processing module, for judging whether the application of request access associated person information is untrusted application; If so, described false associated person information is provided to the application of described untrusted.
Adopt technique scheme, the present invention at least has following advantages:
Information protecting method of the present invention and device, be supplied to third-party application by false associated person information, not only can play the effect of the opponent that misleads the public, benumbs, and do not give any chance cracked of the other side, ensure that being perfectly safe of private information.The false associated person information that the present invention generates can be reused, and not only reduces overhead to a great extent compared with existing encipherment scheme, and there is not the maintenance issues of key.
Accompanying drawing explanation
Fig. 1 is the information protecting method flow chart of first embodiment of the invention;
Fig. 2 is the flow chart generating false associated person information in first embodiment of the invention when false associated person information comprises the short message talk record of false name of contact person and correspondence;
Fig. 3 is the flow chart of the steps A 2 of first embodiment of the invention;
Fig. 4 is the information protection device composition schematic diagram of third embodiment of the invention;
Fig. 5 is the realization flow schematic diagram of the generation module of fourth embodiment of the invention;
Fig. 6 is the realization flow schematic diagram of the processing module of fourth embodiment of the invention.
Embodiment
For further setting forth the present invention for the technological means reaching predetermined object and take and effect, below in conjunction with accompanying drawing and preferred embodiment, the present invention is described in detail as after.
First embodiment of the invention provides a kind of information protecting method, and as shown in Figure 1, described information protecting method comprises following concrete steps:
Step S101, generates false associated person information.
Concrete, the false associated person information generated is corresponding with the content of real connection people information, and include: the descriptor of contact person's code name and correspondence, or, the descriptor of local user's code name and correspondence, wherein, described code name, comprising: name, telephone number or instant messaging number.Described descriptor, comprising: short message talk record, calling record or positional information.
Preferably, when described false associated person information comprises the short message talk record of false name of contact person and correspondence, the false associated person information of described generation, as shown in Figure 2, comprising:
A1: the telephone number of the false contact person of stochastic generation setting quantity in the scope of number section provided at different operators; The setting quantity of the telephone number of false contact person can be arranged according to actual needs flexibly.
A2: under the telephone number of each false contact person, adopts the mode of asking a question and answer it oneself of artificial intelligence robot application, generates the short message talk record between this virtual contact and local user.
Further, as shown in Figure 3, steps A 2 comprises:
A21: under the telephone number of each false contact person, sets the virtual short message number of carrying out between this virtual contact and local user talking;
Concrete, when arranging the described virtual short message number relevant to this virtual contact for arbitrary virtual contact, the scope of a virtual short message number first can be set, then random selecting numerical value in the scope of this virtual short message number, as described virtual short message number.
A22: the starting point that a setting conventional greeting is talked as short message, adopts the mode of asking a question and answer it oneself of artificial intelligence robot application, generates each short message content of talking between this virtual contact and local user successively;
A23: the time point according to the sequencing generated being described each short message content distribution correspondence, described time point is all chosen according to time order and function within the time period of setting.
Preferably, in step S101, generate false associated person information, also comprise:
According to One Hundred Family Names and the false name of contact person of common first names database stochastic generation, described false name of contact person is associated with the telephone number of described false contact person.Because be common user habit for each telephone number arranges corresponding name of contact person, so in order to allow false associated person information look truer, also for the telephone number of corresponding false contact person sets a false name of contact person.
Step S102, arranges the confidence level of each application, application is divided at least following confidence level: trusted application and untrusted application, and described untrusted application is awarded the false associated person information authority of access.
Concrete, in step s 102, described trusted application is awarded access real connection people information authority.
Step S103, judges whether the application of request access associated person information is untrusted application, if so, then described false associated person information is provided to the application of described untrusted.
Concrete, step S103 also comprises: if decision request access associated person information be applied as trusted application, then described real connection people information is provided to described trusted application.
Further, in step s 103, the access request of the application of request access associated person information is tackled, to judge that the application of request access associated person information is trusted application or untrusted application, then orientation is carried out according to judged result, through directed, described false associated person information is provided to the application of described untrusted, real connection people information is provided to described trusted application.
Carry out orientation according to judged result, through orientation, described false associated person information be provided to the application of described untrusted, real connection people information be provided to described trusted application, comprise:
When judged result is non-trusted application, navigate to the memory space of false associated person information, read false associated person information, be supplied to untrusted application;
When judged result is trusted application, navigate to the memory space of true spurious association people information, read real connection people information, be supplied to trusted application.
Preferably, after false associated person information being supplied to untrusted application, then upgrade according to the current time pair temporal information relevant to false associated person information.
Second embodiment of the invention, a kind of information protecting method, method described in the present embodiment is roughly the same with the first embodiment; difference is; in the step S101 of the present embodiment, the confidence level of each application of setting also comprises: hazardous applications, and described hazardous applications is not awarded any access rights.
Method described in the present embodiment, also comprises in step S103:
Whether the application judging request access associated person information is hazardous applications, if so, refuses as hazardous applications provides any information.
Third embodiment of the invention, corresponding with the first embodiment or the second embodiment, the present embodiment introduces a kind of information protection device, as shown in Figure 4, comprises following part:
Generation module 100, for generating false associated person information.
Arranging module 200, for arranging the confidence level of each application, application being divided at least following confidence level: trusted application and untrusted application, described untrusted application is awarded the false associated person information authority of access.
Processing module 300, for judging whether the application of request access associated person information is untrusted application, if so, described false associated person information is provided to the application of described untrusted.
Concrete, with false associated person information for the short message talk of false name of contact person and correspondence is recorded as example, 5 ~ 6 application examples introducing the information protection device that the 4th embodiment provides by reference to the accompanying drawings.Specific as follows:
Described generation module is used for generation and the renewal of deceptive information.Concrete, when user selects to authorize third-party application deceptive information access rights first time, this module will start automatically, for generating permanent effective false associated person information, comprising: false contact person and false note.
As shown in Figure 5, this module can be realized by two kinds of modes: a kind of is utilize network from being pre-stored in the magnanimity information in high in the clouds to the data importing some random (i.e. the short message of virtual contact and correspondence thereof).Another kind is local generation.The generating mode of local false contact person mainly according to One Hundred Family Names and common first names database stochastic generation name of contact person, stochastic generation 11 phone numbers in the scope of number section then provided according to different operators.There are reliable mapping relations in false note and false contact person.
The generation of false note utilizes asking a question and answer it oneself of terminal artificial intelligence robot to realize.First, specify a respective different conventional greeting as the starting point of note respectively for different false contact persons; Then, be initial with respective greeting, the short message content that artificial intelligence robot completes respective contacts by the mode of asking a question and answer it oneself is filled.Finally, according to the deceptive information number stochastic generation time point sequentially for each false contact person's setting, time point is all positioned within nearest one week, and is mated with note by time point.
Module is set for arranging the confidence level of each application, application is divided at least following confidence level: the application of trusted application, untrusted and hazardous applications, described untrusted application is awarded the false associated person information authority of access, described trusted application is awarded access real connection people information authority, and described hazardous applications is not awarded any access rights.
Processing module starts when terminal authorizes virtual information access rights at every turn, for realizing the replacement of false associated person information to real connection people information, and upgrades the temporal information relevant to false associated person information according to the time instantly.
The specific implementation of processing module is tackled based on the API towards API and is redirected interface (being similar to the interception based on API of the first embodiment and redirected interface).Terminal maintenance two overlaps same format, the contact person of different identification and short message data, respectively for the application access possessing different access authority.An API interception is set outside the application of preserving associated person information and is redirected interface, for when there being application request to access real connection people's information, tackle this access request message, judge that described application is trusted application, untrusted application or hazardous applications according to the access rights of the application initiating request.
Such as, as shown in Figure 6, certain third-party application does not possess access real connection people information weight in limited time, API interception be redirected interface tackle under the access request for real connection people information initiated of this third-party application, and be redirected to the memory space of false associated person information.Meanwhile, another trusted application possesses accesses real connection people information authority, and API tackles and is redirected interface and can pass through to tackle this access request lower and the storage sky being redirected to real connection people information.If also have a hazardous applications not possess the authority of accessing any associated person information, then refuse its access request.So just achieve the different access authority that different application arranges according to user and concurrent access is carried out to real connection people information and false associated person information.The mode that user can also be arranged to add preference avoids repeat queries when at every turn starting application program.
The present embodiment solve following technological difficulties: the first, how to generate false associated person information, comprise false contact person and false short message.The second, when receiving authority access intention, how to apply false associated person information and replacing real connection people information.3rd, when normally accessing, how to hide false associated person information and recovering real connection people information.
Information protecting method of the present invention and terminal, guarantee the fail safe of private information while using third party software.The deceptive information that the present invention generates can be reused, and not only reduces system overhead to a great extent, and there is not the maintenance issues of key compared with encipherment scheme.Deceptive information is supplied to third party, not only can plays the effect of the opponent that misleads the public, benumbs, and do not give any chance cracked of the other side, ensure that being perfectly safe of private information.
By the explanation of embodiment, should to the present invention for the technological means reaching predetermined object and take and effect be able to more deeply and concrete understanding, but appended diagram be only to provide with reference to and the use of explanation, be not used for being limited the present invention.
Claims (10)
1. an information protecting method, is characterized in that, comprising:
Generate false associated person information;
Arrange the confidence level of each application, application is divided at least following confidence level: trusted application and untrusted application, described untrusted application is awarded the false associated person information authority of access;
Judge that whether the application of request access associated person information is untrusted application;
If so, described false associated person information is provided to the application of described untrusted.
2. information protecting method according to claim 1, it is characterized in that, described false associated person information is corresponding with the content-form of real connection people information, described false associated person information includes with the content-form of described real connection people information: contact person's code name and corresponding descriptor, or, the descriptor of local user's code name and correspondence;
Described contact person's code name comprises: the name of contact person, telephone number or instant messaging number; Described local user's code name comprises: the name of local user, telephone number or instant messaging number;
The descriptor of described contact person comprises: short message talk record, the calling record of the people that is related participation or the positional information of contact person that the people that is related participates in; The descriptor of described local user comprises: the positional information of the short message that has local user to participate in talk record, the calling record having local user to participate in or local user.
3. information protecting method according to claim 2, is characterized in that, when described false associated person information comprises the short message talk record of false name of contact person and correspondence, the false associated person information of described generation, comprising:
The telephone number of the false contact person of stochastic generation setting quantity in the scope of number section provided at different operators;
Under the telephone number of each false contact person, adopt the mode of asking a question and answer it oneself of artificial intelligence robot application, generate the short message talk record between this virtual contact and local user.
4. information protecting method according to claim 3; it is characterized in that, under the telephone number of each false contact person, adopt the mode of asking a question and answer it oneself of artificial intelligence robot application; generate the short message talk record between this virtual contact and local user, comprising:
Under the telephone number of each false contact person, set the virtual short message number of carrying out between this virtual contact and local user talking;
The starting point that a setting conventional greeting is talked as short message, adopts the mode of asking a question and answer it oneself of artificial intelligence robot application, generates each short message content of talking between this virtual contact and local user successively;
According to the time point that the sequencing generated is described each short message content distribution correspondence, described time point is all chosen within the time period of setting.
5. information protecting method according to claim 3, is characterized in that, the false associated person information of described generation, also comprises:
According to One Hundred Family Names and the false name of contact person of common first names database stochastic generation, described false name of contact person is associated with the telephone number of described false contact person.
6. the information protecting method according to any one of Claims 1 to 5, is characterized in that, described trusted application is awarded access real connection people information authority;
Described method also comprises: if decision request access associated person information be applied as trusted application, then real connection people information is provided to described trusted application;
Judge that whether the application of request access associated person information is untrusted application, if, then described false associated person information is provided to the application of described untrusted, otherwise decision request access associated person information be applied as trusted application, described real connection people information is provided to described trusted application, comprises:
The access request of the application of request access associated person information is tackled, to judge that the application of request access associated person information is trusted application or untrusted application, then orientation is carried out according to judged result, through directed, described false associated person information is provided to the application of described untrusted, real connection people information is provided to described trusted application.
7. information protecting method according to claim 6, is characterized in that, carries out orientation according to judged result, through orientation, described false associated person information is provided to the application of described untrusted, real connection people information is provided to described trusted application, comprises:
When judged result is non-trusted application, navigate to the memory space of false associated person information, read false associated person information, be supplied to untrusted application;
When judged result is trusted application, navigate to the memory space of true spurious association people information, read real connection people information, be supplied to trusted application.
8. information protecting method according to claim 7, is characterized in that, described described false associated person information is provided to described untrusted application, also comprise:
After false associated person information being supplied to untrusted application, upgrade according to the current time pair temporal information relevant to false associated person information.
9. information protecting method according to claim 1, is characterized in that, the confidence level of each application of setting also comprises: hazardous applications, and described hazardous applications is not awarded any access rights;
Described method, also comprises: whether the application judging request access associated person information is hazardous applications, if so, refuses as hazardous applications provides any information.
10. an information protection device, is characterized in that, comprising:
Generation module, for generating false associated person information;
Arranging module, for arranging the confidence level of each application, application being divided at least following confidence level: trusted application and untrusted application, described untrusted application is awarded the false associated person information authority of access;
Processing module, for judging whether the application of request access associated person information is untrusted application, if so, described false associated person information is provided to the application of described untrusted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510003177.1A CN104579685A (en) | 2015-01-04 | 2015-01-04 | Information protection method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510003177.1A CN104579685A (en) | 2015-01-04 | 2015-01-04 | Information protection method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104579685A true CN104579685A (en) | 2015-04-29 |
Family
ID=53094964
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510003177.1A Pending CN104579685A (en) | 2015-01-04 | 2015-01-04 | Information protection method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104579685A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106210316A (en) * | 2016-07-12 | 2016-12-07 | 深圳市中易通安全芯科技有限公司 | A kind of anti-localization method of mobile terminal based on virtual address and system thereof |
CN106485163A (en) * | 2016-09-22 | 2017-03-08 | 努比亚技术有限公司 | Control method and control device that mobile terminal data storehouse accesses |
CN106790931A (en) * | 2016-12-19 | 2017-05-31 | 北京奇虎科技有限公司 | Mobile terminal and its incoming display method and device |
CN107451488A (en) * | 2017-07-21 | 2017-12-08 | 珠海格力电器股份有限公司 | A kind of method, device and mobile terminal that personal information is provided |
CN107908971A (en) * | 2017-11-09 | 2018-04-13 | 维沃移动通信有限公司 | A kind of information processing method and mobile terminal |
CN108932435A (en) * | 2018-07-05 | 2018-12-04 | 宇龙计算机通信科技(深圳)有限公司 | A kind of information security management method, terminal device and computer readable storage medium |
WO2019196721A1 (en) * | 2018-04-11 | 2019-10-17 | Beijing Didi Infinity Technology And Development Co., Ltd. | Methods and apparatuses for processing data requests and data protection |
CN114037467A (en) * | 2015-10-20 | 2022-02-11 | 索尼公司 | Information processing system, information processing method, and computer-readable storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030208694A1 (en) * | 2002-05-03 | 2003-11-06 | Ko-Cheng Fang | Network security system and method |
CN101159778A (en) * | 2007-09-10 | 2008-04-09 | 汤淼 | System for multimedia communication based on virtual number |
CN102801688A (en) * | 2011-05-23 | 2012-11-28 | 联想(北京)有限公司 | Data access method, device and terminal supporting data access |
-
2015
- 2015-01-04 CN CN201510003177.1A patent/CN104579685A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030208694A1 (en) * | 2002-05-03 | 2003-11-06 | Ko-Cheng Fang | Network security system and method |
CN101159778A (en) * | 2007-09-10 | 2008-04-09 | 汤淼 | System for multimedia communication based on virtual number |
CN102801688A (en) * | 2011-05-23 | 2012-11-28 | 联想(北京)有限公司 | Data access method, device and terminal supporting data access |
Non-Patent Citations (1)
Title |
---|
王鹏等: "一种提供虚拟数据增强Android安全性的方法", 《信息通信技术》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114037467A (en) * | 2015-10-20 | 2022-02-11 | 索尼公司 | Information processing system, information processing method, and computer-readable storage medium |
CN106210316A (en) * | 2016-07-12 | 2016-12-07 | 深圳市中易通安全芯科技有限公司 | A kind of anti-localization method of mobile terminal based on virtual address and system thereof |
CN106485163A (en) * | 2016-09-22 | 2017-03-08 | 努比亚技术有限公司 | Control method and control device that mobile terminal data storehouse accesses |
CN106790931A (en) * | 2016-12-19 | 2017-05-31 | 北京奇虎科技有限公司 | Mobile terminal and its incoming display method and device |
CN107451488A (en) * | 2017-07-21 | 2017-12-08 | 珠海格力电器股份有限公司 | A kind of method, device and mobile terminal that personal information is provided |
CN107451488B (en) * | 2017-07-21 | 2021-01-05 | 珠海格力电器股份有限公司 | Method and device for providing personal information and mobile terminal |
CN107908971A (en) * | 2017-11-09 | 2018-04-13 | 维沃移动通信有限公司 | A kind of information processing method and mobile terminal |
WO2019196721A1 (en) * | 2018-04-11 | 2019-10-17 | Beijing Didi Infinity Technology And Development Co., Ltd. | Methods and apparatuses for processing data requests and data protection |
CN108932435A (en) * | 2018-07-05 | 2018-12-04 | 宇龙计算机通信科技(深圳)有限公司 | A kind of information security management method, terminal device and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104579685A (en) | Information protection method and device | |
CN106453330B (en) | A kind of identity authentication method and system | |
CN103763319B (en) | Method for safely sharing mobile cloud storage light-level data | |
CN104008313A (en) | Protecting method and device of privacy information | |
CN109587101B (en) | Digital certificate management method, device and storage medium | |
CN101853533B (en) | Password setting method and device used for building gate control system | |
CN105574437B (en) | Method and device for protecting privacy information and electronic equipment | |
CN105978917A (en) | System and method for trusted application security authentication | |
CN105812332A (en) | Data protection method | |
JP2019505941A (en) | One-time dynamic location authentication method and system, and one-time dynamic password change method | |
CN101827148A (en) | Fingerprint identification system applied to mobile phone and operating method thereof | |
US10447673B2 (en) | Information processing apparatus, information processing method, and computer program | |
CN103685266B (en) | The guard method of business data and device | |
CN104038613A (en) | Method and apparatus for information security management | |
CN107040520A (en) | A kind of cloud computing data-sharing systems and method | |
CN104994095A (en) | Equipment authentication method, clients, server and system | |
CN106027530A (en) | Instant message encryption system based on smartphone and implementation method thereof | |
CN106550357A (en) | A kind of note method for managing security, device and terminal | |
CN104796530A (en) | Phone conversation privacy protection method and system | |
CN104883341A (en) | Application management device, terminal and application management method | |
CN105323254A (en) | A mail encryption system based on a domestic commercial cipher code chip and an implementation method thereof | |
CN106332011B (en) | Short message encryption communication method and terminal | |
CN105471711A (en) | Mail encryption system based on intelligent mobile phone and realization method thereof | |
CN107249001B (en) | A kind of information processing method, apparatus and system | |
JP4708377B2 (en) | Automatic password update system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150429 |