CN104796534B - A kind of information content processing method and processing device - Google Patents

A kind of information content processing method and processing device Download PDF

Info

Publication number
CN104796534B
CN104796534B CN201510115143.1A CN201510115143A CN104796534B CN 104796534 B CN104796534 B CN 104796534B CN 201510115143 A CN201510115143 A CN 201510115143A CN 104796534 B CN104796534 B CN 104796534B
Authority
CN
China
Prior art keywords
information content
transformation rule
preset transformation
conversion process
vocabulary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510115143.1A
Other languages
Chinese (zh)
Other versions
CN104796534A (en
Inventor
张小华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
XI'AN KUPAI SOFTWARE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XI'AN KUPAI SOFTWARE TECHNOLOGY Co Ltd filed Critical XI'AN KUPAI SOFTWARE TECHNOLOGY Co Ltd
Priority to CN201510115143.1A priority Critical patent/CN104796534B/en
Publication of CN104796534A publication Critical patent/CN104796534A/en
Application granted granted Critical
Publication of CN104796534B publication Critical patent/CN104796534B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of information content processing method and processing devices.Wherein, this method includes:For the interactive information of terminal and assigned number, conversion process is carried out to the information content based on preset transformation rule;Wherein, each assigned number is associated with corresponding preset transformation rule;Show transformed treated the information content.Through the invention; solving short message secret technique in the related technology, there are loopholes; lead to the ineffective problem that maintains secrecy, the short message content of assigned number can be converted (camouflage) storage, display and sent by mobile terminal, to protect the privacy of user in deeper time.

Description

A kind of information content processing method and processing device
Technical field
The present invention relates to field of mobile communication, more particularly to a kind of information content processing method and processing device.
Background technology
It is growing with terminal function, occur the mobile phone that there is hiding function to short message content currently on the market. The operating process of above-mentioned mobile phone is probably:The number for identifying the short message being currently received, judges that the number of the short message identified is It is no in prestoring secrecy note number table, when the number of the short message identified is in prestoring secrecy note number table When, store the short message.Later, the secrecy short message extraction information for receiving and verifying input, when the secrecy short message of input extracts information When consistent with pre-stored secrecy short message extraction information, extract and show the secrecy short message stored before.
Above-mentioned technical proposal can send out short message to the secret number received and maintain secrecy, and improve the guarantor of user's short message Close property, is effectively protected the privacy of user.
Although there has been the means such as short message application encryption, privacy mode and secret number setting at present, user's is hidden to protect Private, but these are only based on the secrecy provision of short message access rights, are not based on the time slot scrambling of short message content.If accessed Permission discloses to a certain extent, and the privacy of user still cannot be protected.
For short message secret technique in the related technology there are loophole, leads to the ineffective problem that maintains secrecy, not yet carry at present Go out effective solution scheme.
Invention content
For short message secret technique in the related technology there are loophole, the ineffective problem that maintains secrecy, the present invention is caused to provide A kind of information content processing method and processing device, with to solve the above technical problems.
According to an aspect of the present invention, the present invention provides a kind of information content processing methods, wherein this method packet It includes:For the interactive information of terminal and assigned number, conversion process is carried out to the information content based on preset transformation rule;Wherein, Each assigned number is associated with corresponding preset transformation rule;Show transformed treated the information content.
Preferably, the preset transformation rule includes at least:Increase, delete, replacing, out of order recombination.
Preferably, when each assigned number is associated with preset transformation rule, corresponding one or more preset changes can be associated with Change rule.If currently assigned number-associated has multinomial preset transformation rule, based on preset transformation rule to the information content into Row conversion process, including:According to the priority orders of multinomial preset transformation rule, conversion process is carried out to the information content;Alternatively, Logical process is carried out to multinomial preset transformation rule, then conversion process is carried out to the information content;Wherein, the logical process packet It includes:With or it is non-.
Preferably, if the preset transformation rule is to increase, the method further includes:Content to be increased is set, with And the insertion position of setting content to be increased;
Conversion process is carried out to the information content based on preset transformation rule, including:Described in being searched in described information content The content to be increased is inserted into insertion position at the insertion position.
Preferably, if the preset transformation rule is to delete, the method further includes:Target vocabulary is set;
Conversion process is carried out to the information content based on preset transformation rule, including:It is searched whether in described information content There are the target vocabularies, if so, then deleting the target vocabulary in described information content, are deleted if it is not, not executing Operation.
Preferably, if the preset transformation rule is to replace, the method further includes:In vocabulary to be replaced and generation, are set For vocabulary;Wherein, the vocabulary to be replaced with it is described identical instead of the number of words of vocabulary;
Conversion process is carried out to the information content based on preset transformation rule, including:It is searched whether in described information content There are the vocabulary to be replaced, if so, then vocabulary to be replaced described in exical substitution is replaced by described, if it is not, not holding Row replacement operation.
Preferably, if the preset transformation rule is out of order recombination, based on preset transformation rule to the information content into Row conversion process, including:Described information content is upset using positive-going transition mode;Alternatively, using transformation by reciprocal direction mode by institute State information content recovery.
Preferably, before carrying out conversion process to the information content based on preset transformation rule, the method further includes:If Set the incidence relation of each assigned number and corresponding preset transformation rule;To the extensive of the incidence relation and the information content Multiple operation locks;Wherein, the change of the corresponding preset transformation rule of each assigned number is both needed to realize by unlocking.
After preset transformation rule is preferably based on to information content progress conversion process, the method further includes:Pass through Transformed treated the information content is reverted to original information content by unlock;Wherein, described to unlock in the following manner extremely It is one of few to realize:Authentication, fingerprint authentication, password authentification, password authentication.
According to another aspect of the present invention, the present invention also provides a kind of information content processing units, wherein the device packet It includes:Conversion process module, for for terminal and assigned number interactive information, based on preset transformation rule to the information content into Row conversion process;Wherein, each assigned number is associated with corresponding preset transformation rule;Content display module, for showing warp The information content after conversion process.
Preferably, the preset transformation rule includes at least:Increase, delete, replacing, out of order recombination.
Preferably, described device further includes:Module is locked, is advised with corresponding preset transformation for each assigned number to be arranged Incidence relation then;The recovery operation of the incidence relation and the information content is locked;Wherein, each assigned number corresponds to Preset transformation rule change, be both needed to by unlock realize;Unlocked state, for by unlock, treated by transformed The information content reverts to original information content;Wherein, the unlock is realized at least one in the following manner:Authentication refers to Line verification, password authentification, password authentication.
The present invention has the beneficial effect that:
Through the invention, solve short message secret technique in the related technology leads to ineffective ask that maintain secrecy there are loophole Topic, the short message content of assigned number can be converted (camouflage) storage, display and be sent by mobile terminal, in deeper time On protect the privacy of user.
Above description is only the general introduction of technical solution of the present invention, in order to better understand the technical means of the present invention, And can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, below the special specific implementation mode for lifting the present invention.
Description of the drawings
Fig. 1 is the flow chart of according to embodiments of the present invention one information content processing method;
Fig. 2 is the structure diagram of according to embodiments of the present invention two information content processing unit;
Fig. 3 is according to embodiments of the present invention three information content processing system block diagram;
Fig. 4 is according to embodiments of the present invention three rule setting implementation flow chart;
Fig. 5 is according to embodiments of the present invention three lock mechanism implementation flow chart;
Fig. 6 is according to embodiments of the present invention three short message transformation implementation flow chart.
Specific implementation mode
Lead to the ineffective problem that maintains secrecy there are loophole to solve short message secret technique in the related technology, the present invention A kind of information content processing method and processing device is provided, below in conjunction with attached drawing and embodiment, the present invention is carried out further detailed It describes in detail bright.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, the present invention is not limited.
Embodiment one
A kind of information content processing method is present embodiments provided, this method can be realized in end side, shown in FIG. 1 to be The flow chart of information content processing method, as shown in Figure 1, this approach includes the following steps (step S102- step S104):
Step S102 carries out the information content based on preset transformation rule for the interactive information of terminal and assigned number Conversion process;Wherein, each assigned number is associated with corresponding preset transformation rule;
Step S104, transformed treated the information content of display.
By the above method, solve short message secret technique in the related technology causes to maintain secrecy ineffective there are loophole Problem, the short message content of assigned number can be converted (camouflage) storage, display and be sent by mobile terminal, in deeper The privacy of user is protected on secondary.
In the present embodiment, above-mentioned preset transformation rule can be arranged to include at least:Increase, delete, replacing, is out of order heavy Group.The operation corresponding to these four preset transformation rules is introduced separately below:
1) if preset transformation rule is to increase, the above method further includes:Content to be increased is set, and is arranged and waits increasing Add the insertion position of content.
Conversion process is carried out to the information content based on preset transformation rule, including:Insertion position is searched in the information content, Content to be increased is inserted at insertion position.
If 2) preset transformation rule is to delete, the above method further includes:Target vocabulary is set.
Conversion process is carried out to the information content based on preset transformation rule, including:Search whether exist in the information content Target vocabulary deletes operation if so, then deleting the target vocabulary in the information content if it is not, not executing.
3) if above-mentioned preset transformation rule is to replace, the above method further includes:Vocabulary to be replaced is set and replaces word It converges;Wherein, vocabulary to be replaced is identical with the number of words of replacement vocabulary.
Conversion process is carried out to the information content based on preset transformation rule, including:Search whether exist in the information content Vocabulary to be replaced, if so, exical substitution vocabulary to be replaced will be then replaced, if it is not, not executing replacement operation.
If 4) above-mentioned preset transformation rule is out of order recombination, the information content is converted based on preset transformation rule Processing, including:The information content is upset using positive-going transition mode;Alternatively, the information content is restored using transformation by reciprocal direction mode.
In practical operation, the one or more preset transformation rules of an assigned number association can be arranged, and (emphasis maintains secrecy Object).If currently assigned number-associated has multinomial preset transformation rule, the information content is carried out based on preset transformation rule Conversion process, including:According to the priority orders of multinomial preset transformation rule, conversion process is carried out to the information content;Alternatively, right Multinomial preset transformation rule carries out logical process, then carries out conversion process to the information content;Wherein, above-mentioned logical process includes: With or it is non-.By this preferred embodiment, to ensure orderly effective progress of information content map function.
In addition, to reinforce safety, the above method further includes:Each assigned number and corresponding preset transformation rule are set Incidence relation;The recovery operation of above-mentioned incidence relation and the information content is locked;Wherein, each assigned number is corresponding The change of preset transformation rule is both needed to realize by unlocking.Based on preset transformation rule to the information content carry out conversion process it Afterwards, if it is desired to by the information content after conversion process, revert to original information content, then need to realize by unlocking.Unlock is logical Cross the realization of at least one following manner:Authentication, fingerprint authentication, password authentification, password authentication etc..
Embodiment two
Corresponding to the information content processing method of above-described embodiment introduction, a kind of information content processing is present embodiments provided Device, which can be arranged in end side, to realize above-described embodiment.Shown in Fig. 2 is information content processing unit Structure diagram, as shown in Fig. 2, the device includes:Conversion process module 10 and content display module 20.The structure is carried out below It is discussed in detail.
Conversion process module 10, for the interactive information for terminal and assigned number, based on preset transformation rule to letter It ceases content and carries out conversion process;Wherein, each assigned number is associated with corresponding preset transformation rule;
Content display module 20, for showing transformed treated the information content.
By above-mentioned apparatus, solve short message secret technique in the related technology causes to maintain secrecy ineffective there are loophole Problem, the short message content of assigned number can be converted (camouflage) storage, display and be sent by mobile terminal, in deeper The privacy of user is protected on secondary.
In the present embodiment, above-mentioned preset transformation rule can be arranged to include at least:Increase, delete, replacing, is out of order heavy Group.For the concrete operations details corresponding to these four preset transformation rules, have been described above, details are not described herein.
To reinforce safety, above-mentioned apparatus further includes:Lock module, for be arranged each assigned number with it is corresponding preset The incidence relation of transformation rule;The recovery operation of above-mentioned incidence relation and the information content is locked;Wherein, each specified number The change of the corresponding preset transformation rule of code is both needed to realize by unlocking;Unlocked state, for passing through unlock, by transformed place The information content after reason, reverts to original information content;Wherein, the unlock is realized at least one in the following manner:Identity Verification, fingerprint authentication, password authentification, password authentication.
Embodiment three
The present embodiment provides a kind of technical solutions, to solve in the case where short message access rights are transparent, how to short Letter content carries out the problem of transformation storage and display.
Shown in Fig. 3 is information content processing system block diagram, as shown in figure 3, whole system is made of five parts:Short message Input module, core processing module, rule setting module, memory module and display module.
Short message input module is division in logic, is the pumping in the short message source handled according to present design intention As, for example specify MO (Mobile Originate, terminal are initiated) short message of contact person, the MT (Mobile of designated contact Terminated, terminal receive) short message etc..
The module is responsible for exporting original short message to core processing module.Core processing module be responsible for short message content transformation and Restore processing and the interaction with memory module and display module.Rule setting module provides transformation rule setting and locks, solution The implementation method of lock, mainly interacts with core processing module.Locking or unlock are the safeguard measures to transformation rule.Show mould Block is responsible for short message and is shown, memory module be responsible for short message storage, both with core processing module direct interaction.
The technical program is implemented as:According to system block diagram, the preset transformation rule in rule setting module is first had to, Rule include increase, delete, replacing, the method that short message content is converted such as out of order recombination, and often rule can It is associated with several contact numbers.This part, which is realized, refers to rule setting implementation flow chart shown in Fig. 4, as shown in figure 4, pre- It sets in the setting up procedure of rule change:
Increase rule, needs preset increase content and have number of words limitation, must not exceed N, specifically see realization.
Rule is deleted, preset target vocabulary is needed, because finding that having target vocabulary just can be deleted, and not had when realizing It does not just delete, so not being limited to number of words.
Substitution Rules need to distinguish instead of vocabulary and target vocabulary, and number of words wants equal, it is found that target vocabulary just uses generation It is replaced for vocabulary equivalent.
Out of order rearrangement is upset short message content with positive-going transition with a kind of method of inverible transform, will with transformation by reciprocal direction Short message content restores.
Preferably, it can specify that the number of the associated preset transformation rule of each assigned number must not exceed maximum number T, with It is cumbersome to exempt from practical realization process too complex.
Certainly for the above rule there are one protection mechanism is locked, it is responsible for that aforementioned rule is locked and unlocked, can joins Lock mechanism implementation flow chart shown in fig. 5 is examined, as shown in figure 5, the flow includes:
Step S501, into lock setting procedure, which can be arranged user's input password twice, to enhance peace Quan Xing.
Step S502, user input password for the first time.
Step S503, user input password for the second time.
Step S504 triggers lock event.
Step S505, it is determined whether lock;If so, S506 is thened follow the steps, if not, thening follow the steps S507.
Step S506, setting lock mark, hide setting rule.Step S510 is executed later.
Step S507, it is determined whether unlock;If so, S508 is thened follow the steps, if not, thening follow the steps S510.
Step S508 determines that lock identifies whether effectively;If so, S509 is thened follow the steps, if not, thening follow the steps S510。
Step S509 removes lock mark, restores former short message.
Step S510, flow terminate.
Inside lock mechanism, lock flag bit can be set, which wants to be converted for determining after locking Processing, is equivalent to a switch.If necessary to restore short message content, then need to remove lock flag bit by unlocking, to trigger Restore the process flow of short message content.The process flow for restoring short message content is similar to the transformation process flow of short message content, presses Content is accordingly converted according to reversed preset transformation rule.
If completing above-mentioned setting, if original short message is sent to core processing module by short message input module, the module Conversion process can be carried out to short message original contents according to the presetting rule of rule setting module, processing details is with reference to shown in fig. 6 Short message converts implementation flow chart, as shown in fig. 6, the flow includes:
Step S601 generates trigger event.
Step S602, it is determined whether to restore (short message content) processing;If so, S603 is thened follow the steps, if it is not, then Execute step S606.
Step S603, extracts contact number, and inquiry setting is regular (i.e. preset transformation rule).
Step S604, determines whether number matches with rule;If so, S605 is thened follow the steps, if it is not, then executing step Rapid S603.
Step S605, by positive-going transition rule process.Step S607 is executed later.
Step S606, by reciprocal transformation rule process.
Step S607 stores handling result.
Step S608, it is determined whether the handling result of storage is sent to display module;If so, thening follow the steps S609, if not, thening follow the steps S610.
Step S609, display processing is as a result, restore treated original short message content.
Step S610, flow terminate.
Short message is converted and is realized, flexibility is larger, and possible realization has very much.Shown in fig. 6 is a kind of reference realization Flow., can be as needed when realizing if finding some number-associated not only rule, several rules are carried out Logical process, for example, with or it is non-, can also according to priority sequential processes.The implementation method of positive-going transition and reciprocal transformation is very It is more, simply also complicated it can depend on implementor.Such a method can be attempted, supplement number of words is that n squares (n^2) is a, is drawn Enter a n dimension matrix, goes to handle with an inverible transform.
Result after processing can be consigned to and be deposited with original contents or transformation content (the two takes first, being set by the user) Store up module and display module.It when showing, is first had in lock protection mechanism when needing the short message of transformation reverting to original short message In unlock, going in specific rules to cancel related setting again after unlock can.
From the above description it is found that technical solution through the invention, solves short message secret technique in the related technology There are loophole, cause the ineffective problem that maintains secrecy, mobile terminal that can be converted the short message content of assigned number (camouflage) Storage, display and transmission, to protect the privacy of user in deeper time.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, all answer by the change or replacement that can be readily occurred in It is included within the scope of the present invention.Therefore, protection scope of the present invention should be with the scope of the claims It is accurate.

Claims (10)

1. a kind of information content processing method, which is characterized in that the method includes:
The incidence relation of each assigned number and corresponding preset transformation rule is set;To in the incidence relation and information The recovery operation of appearance locks;
For the interactive information of terminal and assigned number, conversion process is carried out to the information content based on preset transformation rule;
Show transformed treated the information content;
Transformed treated the information content is reverted into original information content by unlock.
2. the method as described in claim 1, which is characterized in that the preset transformation rule includes at least:
Increase, delete, replacing, out of order recombination.
3. the method as described in claim 1, which is characterized in that if currently assigned number-associated has multinomial preset transformation rule Then, then it is based on preset transformation rule and conversion process is carried out to the information content, including:
According to the priority orders of multinomial preset transformation rule, conversion process is carried out to the information content;Alternatively, to multinomial preset change It changes rule and carries out logical process, then conversion process is carried out to the information content;Wherein, the logical process includes:With or it is non-.
4. method as claimed in claim 2, which is characterized in that if the preset transformation rule is to increase, the method Further include:Content to be increased, and the insertion position of setting content to be increased are set;
Conversion process is carried out to the information content based on preset transformation rule, including:
The insertion position is searched in described information content, and the content to be increased is inserted at the insertion position.
5. method as claimed in claim 2, which is characterized in that if the preset transformation rule is to delete, the method Further include:Target vocabulary is set;
Conversion process is carried out to the information content based on preset transformation rule, including:
Search whether that there are the target vocabularies in described information content, if so, then deleting the mesh in described information content Vocabulary is marked, operation is deleted if it is not, not executing.
6. method as claimed in claim 2, which is characterized in that if the preset transformation rule is to replace, the method Further include:Vocabulary to be replaced is set and replaces vocabulary;Wherein, the vocabulary to be replaced with it is described identical instead of the number of words of vocabulary;
Conversion process is carried out to the information content based on preset transformation rule, including:
Search whether that there are the vocabulary to be replaced in described information content, if so, then replacing exical substitution institute by described Vocabulary to be replaced is stated, if it is not, not executing replacement operation.
7. method as claimed in claim 2, which is characterized in that if the preset transformation rule is out of order recombination, be based on Preset transformation rule carries out conversion process to the information content, including:
Described information content is upset using positive-going transition mode;Alternatively,
Using transformation by reciprocal direction mode by described information content recovery.
8. the method as described in claim 1, which is characterized in that the method further includes:
The change of the corresponding preset transformation rule of each assigned number is both needed to realize by unlocking.
9. method as claimed in claim 8, which is characterized in that the unlock is realized at least one in the following manner:Identity Verification, fingerprint authentication, password authentification, password authentication.
10. a kind of information content processing unit, which is characterized in that described device includes:
Conversion process module, for the interactive information for terminal and assigned number, based on preset transformation rule to the information content Carry out conversion process;Wherein, each assigned number is associated with corresponding preset transformation rule;
Content display module, for showing transformed treated the information content;
Described device further includes:
Module is locked, for before carrying out conversion process to the information content based on preset transformation rule, being arranged each specified number Code and the incidence relation of corresponding preset transformation rule;The recovery operation of the incidence relation and the information content is locked;Its In, the change of the corresponding preset transformation rule of each assigned number is both needed to realize by unlocking;
Unlocked state, will be transformed by unlock after carrying out conversion process to the information content based on preset transformation rule The information content that treated, reverts to original information content;Wherein, the unlock is realized at least one in the following manner:Body Part verification, fingerprint authentication, password authentification, password authentication.
CN201510115143.1A 2015-03-16 2015-03-16 A kind of information content processing method and processing device Active CN104796534B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510115143.1A CN104796534B (en) 2015-03-16 2015-03-16 A kind of information content processing method and processing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510115143.1A CN104796534B (en) 2015-03-16 2015-03-16 A kind of information content processing method and processing device

Publications (2)

Publication Number Publication Date
CN104796534A CN104796534A (en) 2015-07-22
CN104796534B true CN104796534B (en) 2018-07-27

Family

ID=53561039

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510115143.1A Active CN104796534B (en) 2015-03-16 2015-03-16 A kind of information content processing method and processing device

Country Status (1)

Country Link
CN (1) CN104796534B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105554745A (en) * 2016-01-27 2016-05-04 广东欧珀移动通信有限公司 Information management method and system
CN107635052A (en) * 2016-07-18 2018-01-26 中兴通讯股份有限公司 Message treatment method and device
CN107644172A (en) * 2016-07-20 2018-01-30 平安科技(深圳)有限公司 The guard method of content displaying and device
CN106228053A (en) * 2016-08-01 2016-12-14 深圳天珑无线科技有限公司 Come fast decryption and identification by fingerprint authentication mode and protected note method and system
CN106658487B (en) * 2016-09-26 2020-07-14 惠州Tcl移动通信有限公司 Short message secret communication method and system based on chaotic algorithm
CN106534570B (en) * 2016-11-30 2019-10-25 Oppo广东移动通信有限公司 A kind of method for secret protection and device
CN106599720A (en) * 2016-12-12 2017-04-26 北京小米移动软件有限公司 Message processing method and device
CN106850979A (en) * 2017-01-19 2017-06-13 上海斐讯数据通信技术有限公司 A kind of method for preventing screen session from being peeped and mobile terminal
CN108629198A (en) * 2017-03-23 2018-10-09 深圳大学 A kind of method and medical information input system of medical information typing
CN109409124A (en) * 2018-10-12 2019-03-01 广东小天才科技有限公司 Message display method, device, terminal and the storage medium of mobile terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101052152A (en) * 2006-04-04 2007-10-10 海尔集团公司 Information secret device for mobile communication terminal and relative method
CN102065392A (en) * 2010-12-02 2011-05-18 中兴通讯股份有限公司 Communication terminal and short message secret-keeping method thereof
CN102905016A (en) * 2012-09-17 2013-01-30 东莞宇龙通信科技有限公司 Information exhibition method and communication terminal
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal
CN103345606A (en) * 2013-05-31 2013-10-09 东莞宇龙通信科技有限公司 Method and device for protecting mobile terminal address list contact person information
CN104348979A (en) * 2014-11-13 2015-02-11 深圳市中兴移动通信有限公司 Display method and device for mobile terminal and short messages thereof under encryption mode

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101052152A (en) * 2006-04-04 2007-10-10 海尔集团公司 Information secret device for mobile communication terminal and relative method
CN102065392A (en) * 2010-12-02 2011-05-18 中兴通讯股份有限公司 Communication terminal and short message secret-keeping method thereof
CN102905016A (en) * 2012-09-17 2013-01-30 东莞宇龙通信科技有限公司 Information exhibition method and communication terminal
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal
CN103345606A (en) * 2013-05-31 2013-10-09 东莞宇龙通信科技有限公司 Method and device for protecting mobile terminal address list contact person information
CN104348979A (en) * 2014-11-13 2015-02-11 深圳市中兴移动通信有限公司 Display method and device for mobile terminal and short messages thereof under encryption mode

Also Published As

Publication number Publication date
CN104796534A (en) 2015-07-22

Similar Documents

Publication Publication Date Title
CN104796534B (en) A kind of information content processing method and processing device
CN106575342B (en) Kernel program including relational database and the method and apparatus for performing described program
CN104834868A (en) Electronic data protection method, device and terminal equipment
CN106506159A (en) Encryption method and equipment for key safety
CN104933793A (en) Two-dimension code electronic key implementation method based on digital signature
CN104537300A (en) Safe password setting and verifying mode
Abd Razak et al. Data anonymization using pseudonym system to preserve data privacy
CN106161006A (en) A kind of digital encryption algorithm
CN107948152A (en) Information storage means, acquisition methods, device and equipment
US20210099304A1 (en) Composite identity authentication method and composite identity authentication system using same
CN103500302A (en) System and method of safety lock hidden programs
CN106992851A (en) TrustZone-based database file password encryption and decryption method and device and terminal equipment
CN104408363A (en) Safe password system
CN106295403A (en) A kind of data safety processing method based on hbase and system
CN104660551A (en) Webservice-based database access device and method
CN107040520A (en) A kind of cloud computing data-sharing systems and method
CN110213052A (en) Data processing method and device
CN106650372A (en) open method and device of administrator authority
CN102135944A (en) Method for safe data storage in mobile communication equipment
CN105978680A (en) Implementing padding in a white-box implementation
US10623400B2 (en) Method and device for credential and data protection
CN104537539A (en) Method for activating and forbidding anti-counterfeit label based on two-dimension code recognition technology
CN106357608A (en) Method for encrypting and decrypting private data for personal healthcare data
CN109614810A (en) Data encryption and decryption method based on fingerprint
CN106357662B (en) A kind of data ciphering method based on MAC Address

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220413

Address after: 518000 floor 21, block a, Kupai building, intersection of Keyuan Avenue and Baoshen Road, north high tech Zone, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong

Patentee after: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd.

Address before: 710065 block a, No. 8, Tangyan South Road, high tech Zone, Xi'an, Shaanxi Province

Patentee before: XI'AN KUPAI SOFTWARE TECHNOLOGY Co.,Ltd.