CN104796534B - A kind of information content processing method and processing device - Google Patents
A kind of information content processing method and processing device Download PDFInfo
- Publication number
- CN104796534B CN104796534B CN201510115143.1A CN201510115143A CN104796534B CN 104796534 B CN104796534 B CN 104796534B CN 201510115143 A CN201510115143 A CN 201510115143A CN 104796534 B CN104796534 B CN 104796534B
- Authority
- CN
- China
- Prior art keywords
- information content
- transformation rule
- preset transformation
- conversion process
- vocabulary
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention discloses a kind of information content processing method and processing devices.Wherein, this method includes:For the interactive information of terminal and assigned number, conversion process is carried out to the information content based on preset transformation rule;Wherein, each assigned number is associated with corresponding preset transformation rule;Show transformed treated the information content.Through the invention; solving short message secret technique in the related technology, there are loopholes; lead to the ineffective problem that maintains secrecy, the short message content of assigned number can be converted (camouflage) storage, display and sent by mobile terminal, to protect the privacy of user in deeper time.
Description
Technical field
The present invention relates to field of mobile communication, more particularly to a kind of information content processing method and processing device.
Background technology
It is growing with terminal function, occur the mobile phone that there is hiding function to short message content currently on the market.
The operating process of above-mentioned mobile phone is probably:The number for identifying the short message being currently received, judges that the number of the short message identified is
It is no in prestoring secrecy note number table, when the number of the short message identified is in prestoring secrecy note number table
When, store the short message.Later, the secrecy short message extraction information for receiving and verifying input, when the secrecy short message of input extracts information
When consistent with pre-stored secrecy short message extraction information, extract and show the secrecy short message stored before.
Above-mentioned technical proposal can send out short message to the secret number received and maintain secrecy, and improve the guarantor of user's short message
Close property, is effectively protected the privacy of user.
Although there has been the means such as short message application encryption, privacy mode and secret number setting at present, user's is hidden to protect
Private, but these are only based on the secrecy provision of short message access rights, are not based on the time slot scrambling of short message content.If accessed
Permission discloses to a certain extent, and the privacy of user still cannot be protected.
For short message secret technique in the related technology there are loophole, leads to the ineffective problem that maintains secrecy, not yet carry at present
Go out effective solution scheme.
Invention content
For short message secret technique in the related technology there are loophole, the ineffective problem that maintains secrecy, the present invention is caused to provide
A kind of information content processing method and processing device, with to solve the above technical problems.
According to an aspect of the present invention, the present invention provides a kind of information content processing methods, wherein this method packet
It includes:For the interactive information of terminal and assigned number, conversion process is carried out to the information content based on preset transformation rule;Wherein,
Each assigned number is associated with corresponding preset transformation rule;Show transformed treated the information content.
Preferably, the preset transformation rule includes at least:Increase, delete, replacing, out of order recombination.
Preferably, when each assigned number is associated with preset transformation rule, corresponding one or more preset changes can be associated with
Change rule.If currently assigned number-associated has multinomial preset transformation rule, based on preset transformation rule to the information content into
Row conversion process, including:According to the priority orders of multinomial preset transformation rule, conversion process is carried out to the information content;Alternatively,
Logical process is carried out to multinomial preset transformation rule, then conversion process is carried out to the information content;Wherein, the logical process packet
It includes:With or it is non-.
Preferably, if the preset transformation rule is to increase, the method further includes:Content to be increased is set, with
And the insertion position of setting content to be increased;
Conversion process is carried out to the information content based on preset transformation rule, including:Described in being searched in described information content
The content to be increased is inserted into insertion position at the insertion position.
Preferably, if the preset transformation rule is to delete, the method further includes:Target vocabulary is set;
Conversion process is carried out to the information content based on preset transformation rule, including:It is searched whether in described information content
There are the target vocabularies, if so, then deleting the target vocabulary in described information content, are deleted if it is not, not executing
Operation.
Preferably, if the preset transformation rule is to replace, the method further includes:In vocabulary to be replaced and generation, are set
For vocabulary;Wherein, the vocabulary to be replaced with it is described identical instead of the number of words of vocabulary;
Conversion process is carried out to the information content based on preset transformation rule, including:It is searched whether in described information content
There are the vocabulary to be replaced, if so, then vocabulary to be replaced described in exical substitution is replaced by described, if it is not, not holding
Row replacement operation.
Preferably, if the preset transformation rule is out of order recombination, based on preset transformation rule to the information content into
Row conversion process, including:Described information content is upset using positive-going transition mode;Alternatively, using transformation by reciprocal direction mode by institute
State information content recovery.
Preferably, before carrying out conversion process to the information content based on preset transformation rule, the method further includes:If
Set the incidence relation of each assigned number and corresponding preset transformation rule;To the extensive of the incidence relation and the information content
Multiple operation locks;Wherein, the change of the corresponding preset transformation rule of each assigned number is both needed to realize by unlocking.
After preset transformation rule is preferably based on to information content progress conversion process, the method further includes:Pass through
Transformed treated the information content is reverted to original information content by unlock;Wherein, described to unlock in the following manner extremely
It is one of few to realize:Authentication, fingerprint authentication, password authentification, password authentication.
According to another aspect of the present invention, the present invention also provides a kind of information content processing units, wherein the device packet
It includes:Conversion process module, for for terminal and assigned number interactive information, based on preset transformation rule to the information content into
Row conversion process;Wherein, each assigned number is associated with corresponding preset transformation rule;Content display module, for showing warp
The information content after conversion process.
Preferably, the preset transformation rule includes at least:Increase, delete, replacing, out of order recombination.
Preferably, described device further includes:Module is locked, is advised with corresponding preset transformation for each assigned number to be arranged
Incidence relation then;The recovery operation of the incidence relation and the information content is locked;Wherein, each assigned number corresponds to
Preset transformation rule change, be both needed to by unlock realize;Unlocked state, for by unlock, treated by transformed
The information content reverts to original information content;Wherein, the unlock is realized at least one in the following manner:Authentication refers to
Line verification, password authentification, password authentication.
The present invention has the beneficial effect that:
Through the invention, solve short message secret technique in the related technology leads to ineffective ask that maintain secrecy there are loophole
Topic, the short message content of assigned number can be converted (camouflage) storage, display and be sent by mobile terminal, in deeper time
On protect the privacy of user.
Above description is only the general introduction of technical solution of the present invention, in order to better understand the technical means of the present invention,
And can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, below the special specific implementation mode for lifting the present invention.
Description of the drawings
Fig. 1 is the flow chart of according to embodiments of the present invention one information content processing method;
Fig. 2 is the structure diagram of according to embodiments of the present invention two information content processing unit;
Fig. 3 is according to embodiments of the present invention three information content processing system block diagram;
Fig. 4 is according to embodiments of the present invention three rule setting implementation flow chart;
Fig. 5 is according to embodiments of the present invention three lock mechanism implementation flow chart;
Fig. 6 is according to embodiments of the present invention three short message transformation implementation flow chart.
Specific implementation mode
Lead to the ineffective problem that maintains secrecy there are loophole to solve short message secret technique in the related technology, the present invention
A kind of information content processing method and processing device is provided, below in conjunction with attached drawing and embodiment, the present invention is carried out further detailed
It describes in detail bright.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, the present invention is not limited.
Embodiment one
A kind of information content processing method is present embodiments provided, this method can be realized in end side, shown in FIG. 1 to be
The flow chart of information content processing method, as shown in Figure 1, this approach includes the following steps (step S102- step S104):
Step S102 carries out the information content based on preset transformation rule for the interactive information of terminal and assigned number
Conversion process;Wherein, each assigned number is associated with corresponding preset transformation rule;
Step S104, transformed treated the information content of display.
By the above method, solve short message secret technique in the related technology causes to maintain secrecy ineffective there are loophole
Problem, the short message content of assigned number can be converted (camouflage) storage, display and be sent by mobile terminal, in deeper
The privacy of user is protected on secondary.
In the present embodiment, above-mentioned preset transformation rule can be arranged to include at least:Increase, delete, replacing, is out of order heavy
Group.The operation corresponding to these four preset transformation rules is introduced separately below:
1) if preset transformation rule is to increase, the above method further includes:Content to be increased is set, and is arranged and waits increasing
Add the insertion position of content.
Conversion process is carried out to the information content based on preset transformation rule, including:Insertion position is searched in the information content,
Content to be increased is inserted at insertion position.
If 2) preset transformation rule is to delete, the above method further includes:Target vocabulary is set.
Conversion process is carried out to the information content based on preset transformation rule, including:Search whether exist in the information content
Target vocabulary deletes operation if so, then deleting the target vocabulary in the information content if it is not, not executing.
3) if above-mentioned preset transformation rule is to replace, the above method further includes:Vocabulary to be replaced is set and replaces word
It converges;Wherein, vocabulary to be replaced is identical with the number of words of replacement vocabulary.
Conversion process is carried out to the information content based on preset transformation rule, including:Search whether exist in the information content
Vocabulary to be replaced, if so, exical substitution vocabulary to be replaced will be then replaced, if it is not, not executing replacement operation.
If 4) above-mentioned preset transformation rule is out of order recombination, the information content is converted based on preset transformation rule
Processing, including:The information content is upset using positive-going transition mode;Alternatively, the information content is restored using transformation by reciprocal direction mode.
In practical operation, the one or more preset transformation rules of an assigned number association can be arranged, and (emphasis maintains secrecy
Object).If currently assigned number-associated has multinomial preset transformation rule, the information content is carried out based on preset transformation rule
Conversion process, including:According to the priority orders of multinomial preset transformation rule, conversion process is carried out to the information content;Alternatively, right
Multinomial preset transformation rule carries out logical process, then carries out conversion process to the information content;Wherein, above-mentioned logical process includes:
With or it is non-.By this preferred embodiment, to ensure orderly effective progress of information content map function.
In addition, to reinforce safety, the above method further includes:Each assigned number and corresponding preset transformation rule are set
Incidence relation;The recovery operation of above-mentioned incidence relation and the information content is locked;Wherein, each assigned number is corresponding
The change of preset transformation rule is both needed to realize by unlocking.Based on preset transformation rule to the information content carry out conversion process it
Afterwards, if it is desired to by the information content after conversion process, revert to original information content, then need to realize by unlocking.Unlock is logical
Cross the realization of at least one following manner:Authentication, fingerprint authentication, password authentification, password authentication etc..
Embodiment two
Corresponding to the information content processing method of above-described embodiment introduction, a kind of information content processing is present embodiments provided
Device, which can be arranged in end side, to realize above-described embodiment.Shown in Fig. 2 is information content processing unit
Structure diagram, as shown in Fig. 2, the device includes:Conversion process module 10 and content display module 20.The structure is carried out below
It is discussed in detail.
Conversion process module 10, for the interactive information for terminal and assigned number, based on preset transformation rule to letter
It ceases content and carries out conversion process;Wherein, each assigned number is associated with corresponding preset transformation rule;
Content display module 20, for showing transformed treated the information content.
By above-mentioned apparatus, solve short message secret technique in the related technology causes to maintain secrecy ineffective there are loophole
Problem, the short message content of assigned number can be converted (camouflage) storage, display and be sent by mobile terminal, in deeper
The privacy of user is protected on secondary.
In the present embodiment, above-mentioned preset transformation rule can be arranged to include at least:Increase, delete, replacing, is out of order heavy
Group.For the concrete operations details corresponding to these four preset transformation rules, have been described above, details are not described herein.
To reinforce safety, above-mentioned apparatus further includes:Lock module, for be arranged each assigned number with it is corresponding preset
The incidence relation of transformation rule;The recovery operation of above-mentioned incidence relation and the information content is locked;Wherein, each specified number
The change of the corresponding preset transformation rule of code is both needed to realize by unlocking;Unlocked state, for passing through unlock, by transformed place
The information content after reason, reverts to original information content;Wherein, the unlock is realized at least one in the following manner:Identity
Verification, fingerprint authentication, password authentification, password authentication.
Embodiment three
The present embodiment provides a kind of technical solutions, to solve in the case where short message access rights are transparent, how to short
Letter content carries out the problem of transformation storage and display.
Shown in Fig. 3 is information content processing system block diagram, as shown in figure 3, whole system is made of five parts:Short message
Input module, core processing module, rule setting module, memory module and display module.
Short message input module is division in logic, is the pumping in the short message source handled according to present design intention
As, for example specify MO (Mobile Originate, terminal are initiated) short message of contact person, the MT (Mobile of designated contact
Terminated, terminal receive) short message etc..
The module is responsible for exporting original short message to core processing module.Core processing module be responsible for short message content transformation and
Restore processing and the interaction with memory module and display module.Rule setting module provides transformation rule setting and locks, solution
The implementation method of lock, mainly interacts with core processing module.Locking or unlock are the safeguard measures to transformation rule.Show mould
Block is responsible for short message and is shown, memory module be responsible for short message storage, both with core processing module direct interaction.
The technical program is implemented as:According to system block diagram, the preset transformation rule in rule setting module is first had to,
Rule include increase, delete, replacing, the method that short message content is converted such as out of order recombination, and often rule can
It is associated with several contact numbers.This part, which is realized, refers to rule setting implementation flow chart shown in Fig. 4, as shown in figure 4, pre-
It sets in the setting up procedure of rule change:
Increase rule, needs preset increase content and have number of words limitation, must not exceed N, specifically see realization.
Rule is deleted, preset target vocabulary is needed, because finding that having target vocabulary just can be deleted, and not had when realizing
It does not just delete, so not being limited to number of words.
Substitution Rules need to distinguish instead of vocabulary and target vocabulary, and number of words wants equal, it is found that target vocabulary just uses generation
It is replaced for vocabulary equivalent.
Out of order rearrangement is upset short message content with positive-going transition with a kind of method of inverible transform, will with transformation by reciprocal direction
Short message content restores.
Preferably, it can specify that the number of the associated preset transformation rule of each assigned number must not exceed maximum number T, with
It is cumbersome to exempt from practical realization process too complex.
Certainly for the above rule there are one protection mechanism is locked, it is responsible for that aforementioned rule is locked and unlocked, can joins
Lock mechanism implementation flow chart shown in fig. 5 is examined, as shown in figure 5, the flow includes:
Step S501, into lock setting procedure, which can be arranged user's input password twice, to enhance peace
Quan Xing.
Step S502, user input password for the first time.
Step S503, user input password for the second time.
Step S504 triggers lock event.
Step S505, it is determined whether lock;If so, S506 is thened follow the steps, if not, thening follow the steps S507.
Step S506, setting lock mark, hide setting rule.Step S510 is executed later.
Step S507, it is determined whether unlock;If so, S508 is thened follow the steps, if not, thening follow the steps S510.
Step S508 determines that lock identifies whether effectively;If so, S509 is thened follow the steps, if not, thening follow the steps
S510。
Step S509 removes lock mark, restores former short message.
Step S510, flow terminate.
Inside lock mechanism, lock flag bit can be set, which wants to be converted for determining after locking
Processing, is equivalent to a switch.If necessary to restore short message content, then need to remove lock flag bit by unlocking, to trigger
Restore the process flow of short message content.The process flow for restoring short message content is similar to the transformation process flow of short message content, presses
Content is accordingly converted according to reversed preset transformation rule.
If completing above-mentioned setting, if original short message is sent to core processing module by short message input module, the module
Conversion process can be carried out to short message original contents according to the presetting rule of rule setting module, processing details is with reference to shown in fig. 6
Short message converts implementation flow chart, as shown in fig. 6, the flow includes:
Step S601 generates trigger event.
Step S602, it is determined whether to restore (short message content) processing;If so, S603 is thened follow the steps, if it is not, then
Execute step S606.
Step S603, extracts contact number, and inquiry setting is regular (i.e. preset transformation rule).
Step S604, determines whether number matches with rule;If so, S605 is thened follow the steps, if it is not, then executing step
Rapid S603.
Step S605, by positive-going transition rule process.Step S607 is executed later.
Step S606, by reciprocal transformation rule process.
Step S607 stores handling result.
Step S608, it is determined whether the handling result of storage is sent to display module;If so, thening follow the steps
S609, if not, thening follow the steps S610.
Step S609, display processing is as a result, restore treated original short message content.
Step S610, flow terminate.
Short message is converted and is realized, flexibility is larger, and possible realization has very much.Shown in fig. 6 is a kind of reference realization
Flow., can be as needed when realizing if finding some number-associated not only rule, several rules are carried out
Logical process, for example, with or it is non-, can also according to priority sequential processes.The implementation method of positive-going transition and reciprocal transformation is very
It is more, simply also complicated it can depend on implementor.Such a method can be attempted, supplement number of words is that n squares (n^2) is a, is drawn
Enter a n dimension matrix, goes to handle with an inverible transform.
Result after processing can be consigned to and be deposited with original contents or transformation content (the two takes first, being set by the user)
Store up module and display module.It when showing, is first had in lock protection mechanism when needing the short message of transformation reverting to original short message
In unlock, going in specific rules to cancel related setting again after unlock can.
From the above description it is found that technical solution through the invention, solves short message secret technique in the related technology
There are loophole, cause the ineffective problem that maintains secrecy, mobile terminal that can be converted the short message content of assigned number (camouflage)
Storage, display and transmission, to protect the privacy of user in deeper time.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, all answer by the change or replacement that can be readily occurred in
It is included within the scope of the present invention.Therefore, protection scope of the present invention should be with the scope of the claims
It is accurate.
Claims (10)
1. a kind of information content processing method, which is characterized in that the method includes:
The incidence relation of each assigned number and corresponding preset transformation rule is set;To in the incidence relation and information
The recovery operation of appearance locks;
For the interactive information of terminal and assigned number, conversion process is carried out to the information content based on preset transformation rule;
Show transformed treated the information content;
Transformed treated the information content is reverted into original information content by unlock.
2. the method as described in claim 1, which is characterized in that the preset transformation rule includes at least:
Increase, delete, replacing, out of order recombination.
3. the method as described in claim 1, which is characterized in that if currently assigned number-associated has multinomial preset transformation rule
Then, then it is based on preset transformation rule and conversion process is carried out to the information content, including:
According to the priority orders of multinomial preset transformation rule, conversion process is carried out to the information content;Alternatively, to multinomial preset change
It changes rule and carries out logical process, then conversion process is carried out to the information content;Wherein, the logical process includes:With or it is non-.
4. method as claimed in claim 2, which is characterized in that if the preset transformation rule is to increase, the method
Further include:Content to be increased, and the insertion position of setting content to be increased are set;
Conversion process is carried out to the information content based on preset transformation rule, including:
The insertion position is searched in described information content, and the content to be increased is inserted at the insertion position.
5. method as claimed in claim 2, which is characterized in that if the preset transformation rule is to delete, the method
Further include:Target vocabulary is set;
Conversion process is carried out to the information content based on preset transformation rule, including:
Search whether that there are the target vocabularies in described information content, if so, then deleting the mesh in described information content
Vocabulary is marked, operation is deleted if it is not, not executing.
6. method as claimed in claim 2, which is characterized in that if the preset transformation rule is to replace, the method
Further include:Vocabulary to be replaced is set and replaces vocabulary;Wherein, the vocabulary to be replaced with it is described identical instead of the number of words of vocabulary;
Conversion process is carried out to the information content based on preset transformation rule, including:
Search whether that there are the vocabulary to be replaced in described information content, if so, then replacing exical substitution institute by described
Vocabulary to be replaced is stated, if it is not, not executing replacement operation.
7. method as claimed in claim 2, which is characterized in that if the preset transformation rule is out of order recombination, be based on
Preset transformation rule carries out conversion process to the information content, including:
Described information content is upset using positive-going transition mode;Alternatively,
Using transformation by reciprocal direction mode by described information content recovery.
8. the method as described in claim 1, which is characterized in that the method further includes:
The change of the corresponding preset transformation rule of each assigned number is both needed to realize by unlocking.
9. method as claimed in claim 8, which is characterized in that the unlock is realized at least one in the following manner:Identity
Verification, fingerprint authentication, password authentification, password authentication.
10. a kind of information content processing unit, which is characterized in that described device includes:
Conversion process module, for the interactive information for terminal and assigned number, based on preset transformation rule to the information content
Carry out conversion process;Wherein, each assigned number is associated with corresponding preset transformation rule;
Content display module, for showing transformed treated the information content;
Described device further includes:
Module is locked, for before carrying out conversion process to the information content based on preset transformation rule, being arranged each specified number
Code and the incidence relation of corresponding preset transformation rule;The recovery operation of the incidence relation and the information content is locked;Its
In, the change of the corresponding preset transformation rule of each assigned number is both needed to realize by unlocking;
Unlocked state, will be transformed by unlock after carrying out conversion process to the information content based on preset transformation rule
The information content that treated, reverts to original information content;Wherein, the unlock is realized at least one in the following manner:Body
Part verification, fingerprint authentication, password authentification, password authentication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510115143.1A CN104796534B (en) | 2015-03-16 | 2015-03-16 | A kind of information content processing method and processing device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510115143.1A CN104796534B (en) | 2015-03-16 | 2015-03-16 | A kind of information content processing method and processing device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104796534A CN104796534A (en) | 2015-07-22 |
CN104796534B true CN104796534B (en) | 2018-07-27 |
Family
ID=53561039
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510115143.1A Active CN104796534B (en) | 2015-03-16 | 2015-03-16 | A kind of information content processing method and processing device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104796534B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105554745A (en) * | 2016-01-27 | 2016-05-04 | 广东欧珀移动通信有限公司 | Information management method and system |
CN107635052A (en) * | 2016-07-18 | 2018-01-26 | 中兴通讯股份有限公司 | Message treatment method and device |
CN107644172A (en) * | 2016-07-20 | 2018-01-30 | 平安科技(深圳)有限公司 | The guard method of content displaying and device |
CN106228053A (en) * | 2016-08-01 | 2016-12-14 | 深圳天珑无线科技有限公司 | Come fast decryption and identification by fingerprint authentication mode and protected note method and system |
CN106658487B (en) * | 2016-09-26 | 2020-07-14 | 惠州Tcl移动通信有限公司 | Short message secret communication method and system based on chaotic algorithm |
CN106534570B (en) * | 2016-11-30 | 2019-10-25 | Oppo广东移动通信有限公司 | A kind of method for secret protection and device |
CN106599720A (en) * | 2016-12-12 | 2017-04-26 | 北京小米移动软件有限公司 | Message processing method and device |
CN106850979A (en) * | 2017-01-19 | 2017-06-13 | 上海斐讯数据通信技术有限公司 | A kind of method for preventing screen session from being peeped and mobile terminal |
CN108629198A (en) * | 2017-03-23 | 2018-10-09 | 深圳大学 | A kind of method and medical information input system of medical information typing |
CN109409124A (en) * | 2018-10-12 | 2019-03-01 | 广东小天才科技有限公司 | Message display method, device, terminal and the storage medium of mobile terminal |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101052152A (en) * | 2006-04-04 | 2007-10-10 | 海尔集团公司 | Information secret device for mobile communication terminal and relative method |
CN102065392A (en) * | 2010-12-02 | 2011-05-18 | 中兴通讯股份有限公司 | Communication terminal and short message secret-keeping method thereof |
CN102905016A (en) * | 2012-09-17 | 2013-01-30 | 东莞宇龙通信科技有限公司 | Information exhibition method and communication terminal |
CN103095890A (en) * | 2012-12-31 | 2013-05-08 | 东莞宇龙通信科技有限公司 | Contact person information encryption method and communication terminal |
CN103345606A (en) * | 2013-05-31 | 2013-10-09 | 东莞宇龙通信科技有限公司 | Method and device for protecting mobile terminal address list contact person information |
CN104348979A (en) * | 2014-11-13 | 2015-02-11 | 深圳市中兴移动通信有限公司 | Display method and device for mobile terminal and short messages thereof under encryption mode |
-
2015
- 2015-03-16 CN CN201510115143.1A patent/CN104796534B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101052152A (en) * | 2006-04-04 | 2007-10-10 | 海尔集团公司 | Information secret device for mobile communication terminal and relative method |
CN102065392A (en) * | 2010-12-02 | 2011-05-18 | 中兴通讯股份有限公司 | Communication terminal and short message secret-keeping method thereof |
CN102905016A (en) * | 2012-09-17 | 2013-01-30 | 东莞宇龙通信科技有限公司 | Information exhibition method and communication terminal |
CN103095890A (en) * | 2012-12-31 | 2013-05-08 | 东莞宇龙通信科技有限公司 | Contact person information encryption method and communication terminal |
CN103345606A (en) * | 2013-05-31 | 2013-10-09 | 东莞宇龙通信科技有限公司 | Method and device for protecting mobile terminal address list contact person information |
CN104348979A (en) * | 2014-11-13 | 2015-02-11 | 深圳市中兴移动通信有限公司 | Display method and device for mobile terminal and short messages thereof under encryption mode |
Also Published As
Publication number | Publication date |
---|---|
CN104796534A (en) | 2015-07-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104796534B (en) | A kind of information content processing method and processing device | |
CN106575342B (en) | Kernel program including relational database and the method and apparatus for performing described program | |
CN104834868A (en) | Electronic data protection method, device and terminal equipment | |
CN106506159A (en) | Encryption method and equipment for key safety | |
CN104933793A (en) | Two-dimension code electronic key implementation method based on digital signature | |
CN104537300A (en) | Safe password setting and verifying mode | |
Abd Razak et al. | Data anonymization using pseudonym system to preserve data privacy | |
CN106161006A (en) | A kind of digital encryption algorithm | |
CN107948152A (en) | Information storage means, acquisition methods, device and equipment | |
US20210099304A1 (en) | Composite identity authentication method and composite identity authentication system using same | |
CN103500302A (en) | System and method of safety lock hidden programs | |
CN106992851A (en) | TrustZone-based database file password encryption and decryption method and device and terminal equipment | |
CN104408363A (en) | Safe password system | |
CN106295403A (en) | A kind of data safety processing method based on hbase and system | |
CN104660551A (en) | Webservice-based database access device and method | |
CN107040520A (en) | A kind of cloud computing data-sharing systems and method | |
CN110213052A (en) | Data processing method and device | |
CN106650372A (en) | open method and device of administrator authority | |
CN102135944A (en) | Method for safe data storage in mobile communication equipment | |
CN105978680A (en) | Implementing padding in a white-box implementation | |
US10623400B2 (en) | Method and device for credential and data protection | |
CN104537539A (en) | Method for activating and forbidding anti-counterfeit label based on two-dimension code recognition technology | |
CN106357608A (en) | Method for encrypting and decrypting private data for personal healthcare data | |
CN109614810A (en) | Data encryption and decryption method based on fingerprint | |
CN106357662B (en) | A kind of data ciphering method based on MAC Address |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220413 Address after: 518000 floor 21, block a, Kupai building, intersection of Keyuan Avenue and Baoshen Road, north high tech Zone, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong Patentee after: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd. Address before: 710065 block a, No. 8, Tangyan South Road, high tech Zone, Xi'an, Shaanxi Province Patentee before: XI'AN KUPAI SOFTWARE TECHNOLOGY Co.,Ltd. |