CN106231115A - A kind of information protecting method and terminal - Google Patents
A kind of information protecting method and terminal Download PDFInfo
- Publication number
- CN106231115A CN106231115A CN201610753526.6A CN201610753526A CN106231115A CN 106231115 A CN106231115 A CN 106231115A CN 201610753526 A CN201610753526 A CN 201610753526A CN 106231115 A CN106231115 A CN 106231115A
- Authority
- CN
- China
- Prior art keywords
- information
- user
- terminal
- authentication
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
- H04M1/72436—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. SMS or e-mail
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
Abstract
Embodiments providing a kind of information protecting method and terminal, wherein method includes: if terminal needs display information, identifies information type, and every kind of information type is designated different key contents;According to key content identification information the need of encryption;If desired encrypt, information is encrypted with hiding information and user identity is verified;If authentication success, obtain needing display information and showing to adding confidential information deciphering.By being whether that the content needing encryption judges to the information content received; the information that the contact person or band needing encryption there is a need to encrypted content just can be encrypted; thus well the privacy of all information is carried out anticipation; guarantee that the information of the privacy received all can be protected to; ensure the information security of user; avoid user directly or indirectly to be lost, the most also avoid the information without encryption encrypted, also use upper band to serve to user convenient.
Description
Technical field
The present invention relates to electronic technology field, particularly relate to a kind of information protecting method and terminal.
Background technology
At present, many communication traffics bring great advantage to the user, such as the electronics name of cellphone information, specification definition
Sheet and Email etc., the daily life that can be convenient for people to.
Information security is more and more important now, but information security in some scenarios can not get well protecting.Such as:
During meeting, everybody mobile phone is all put on the table, and wage information and prompting message in caller ID and name, information are all easy to
Seen by the people of periphery, additionally as, on elevator or bus, all there is problems in that.In prior art, bulk information is mutual
It is all to carry out with form in plain text, when you receive information, can be seen even not had by some by the people of surrounding is casual
People diligently spies on, and thus can damage or the interests of potential damage user.
Summary of the invention
The embodiment of the present invention provides a kind of information protecting method, and important information can be avoided to be spied on by other people, it is ensured that information is pacified
Entirely.
First aspect, embodiments provides a kind of information protecting method, and the method includes:
If terminal needs display information, identifying information type, every kind of information type is designated different key contents;
According to information described in described key content identification the need of encryption;
If desired encrypt, be encrypted described information to hide described information and start Authentication mechanism with to user
Identity is verified;
If authentication success, add confidential information deciphering obtain described needing display information and showing to described.
On the other hand, embodiments providing a kind of terminal, this terminal includes:
Recognition unit, if needing display information for terminal, identifies information type, and every kind of information type is specified difference
Key content;
Judging unit, is used for according to information described in described key content identification the need of encryption;
Ciphering unit, for being encrypted described information to hide described information;
Authentication unit, for verifying user identity information when adding confidential information described in needs are opened.
Whether the information protecting method of the embodiment of the present invention and terminal, by encrypting for needs the information content received
Content judge, the contact person or band needing encryption be there is a need to the information of encrypted content and just can be encrypted,
Thus well the privacy of all information being carried out anticipation, it is ensured that the information of the privacy received all can be protected to, and protects
Hinder the information security of user, it is to avoid user is directly or indirectly lost, the most also avoid the information without encryption
Encrypted, also use upper band to serve to user convenient.
Accompanying drawing explanation
In order to be illustrated more clearly that embodiment of the present invention technical scheme, required use in embodiment being described below
Accompanying drawing is briefly described, it should be apparent that, the accompanying drawing in describing below is some embodiments of the present invention, general for this area
From the point of view of logical technical staff, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
The schematic flow diagram of a kind of information protecting method that Fig. 1 provides for the embodiment of the present invention one;
The schematic flow diagram of a kind of information protecting method that Fig. 2 provides for the embodiment of the present invention two;
The schematic flow diagram of a kind of information protecting method that Fig. 3 provides for the embodiment of the present invention three;
The schematic flow diagram of a kind of information protecting method that Fig. 4 provides for the embodiment of the present invention four;
The schematic block diagram of the terminal that Fig. 5 provides for the embodiment of the present invention one;
The schematic block diagram of the terminal that Fig. 6 provides for the embodiment of the present invention two;
The schematic block diagram of the terminal that Fig. 7 provides for the embodiment of the present invention three;
The schematic block diagram of the terminal that Fig. 8 provides for the embodiment of the present invention four;
The structure composition schematic diagram of the terminal that Fig. 9 provides for the embodiment of the present invention five.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is a part of embodiment of the present invention rather than whole embodiments wholely.Based on this
Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise
Example, broadly falls into the scope of protection of the invention.
Should be appreciated that when using in this specification and in the appended claims, term " includes " and " comprising " instruction
Described feature, entirety, step, operation, element and/or the existence of assembly, but it is not precluded from one or more further feature, whole
Body, step, operation, element, assembly and/or the existence of its set or interpolation.
In implementing, the terminal described in the embodiment of the present invention includes but not limited to such as have touch sensitive surface
Mobile phone, laptop computer or the tablet PC of (such as, touch-screen display and/or touch pad) etc other just
Portable device.It is to be further understood that in certain embodiments, equipment not portable communication device, but it is quick to have touch
The desk computer of sense surface (such as, touch-screen display and/or touch pad).
In discussion below, describe the terminal including display and touch sensitive surface.It is, however, to be understood that
It is that terminal can include such as physical keyboard, mouse and/or control other physical user-interface device one or more of bar.
Terminal supports various application programs, such as following in one or more: drawing application program, demonstration application journey
Sequence, word-processing application, website create application program, dish imprinting application program, spreadsheet applications, game application
Program, telephony application, videoconference application, email application, instant messaging applications, exercise
Support the application of application program, photo management application program, digital camera application program, digital camera application program, web-browsing
Program, digital music player application and/or video frequency player application program.
The various application programs that can perform in terminal can use at least one of such as touch sensitive surface public
Physical user-interface device.Among applications and/or can adjust in corresponding application programs and/or change and touch sensitive table
The corresponding information of display in one or more functions in face and terminal.So, the public physical structure of terminal (such as, touches
Sensing surface) the various application programs with the most directly perceived and transparent user interface can be supported.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to be that two or more unit are integrated in a unit.Above-mentioned integrated
Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
See Fig. 1, be the schematic flow diagram of a kind of information protecting method that the embodiment of the present invention one provides, as it can be seen,
The method comprising the steps of S11~S14.
Step S11: if terminal needs display information, identifies information type, and every kind of information type is designated different passes
Key content.
Specifically, this key content includes sender, sends number or the content of concrete text related to and text
Key word.When receiving the information needing display, the content of information is identified, such as, to the sender of information, sends out
Send number or the content of concrete text and the key word etc. of text that relate to carry out feature identification, facilitate subsequent step to this
A little features are compared.
Step S12: according to key content identification information the need of encryption.
Specifically, compared with the content that the needs of the key content and setting that receive information are encrypted, if related to
Information there is a need to encryption content, then just this information is encrypted, such as, in advance by certain some key word setting
For needing the word of encryption, if the information received occurs this key word, then this information is judged to need the letter of encryption
Breath, if number set in advance needs encryption, then the number sending information is identical with encrypted number, then be judged to this information need
Information to be encrypted, the most directly shows without being found to have identical content, it is not necessary to encryption.
Step S13: if desired encrypt, is encrypted information with hiding information and starts Authentication mechanism with to user
Identity is verified.
Specifically, need the information of encryption to be encrypted by being judged as, and start Authentication mechanism, it is desirable to
User checking identity information, allow user can not learn before not over authentication this add confidential information any in
Hold.
Step S14: if authentication success, obtain needing display information and showing to adding confidential information deciphering.
Specifically, user attempts when having learnt information access learning information content, then need by checking identity information,
After identity information is verified, only just can send the instruction of decryption information so that encrypted information shows can be by
User learns its content.
Specifically, receiving information when, whether the content receiving information can be encrypted by user terminal for needs
Content judge, the contact person or band needing encryption be there is a need to the information of encrypted content and just can be encrypted,
Thus well the privacy of all information being carried out anticipation, it is ensured that the information of the privacy received all can be protected to, and protects
Hinder the privacy of important information;Meanwhile, user is when receiving the information needing encryption, and terminal inner is encrypted place to information
Reason, the display window of user terminal does not has to show about the plaintext of this information content so that not through authentication
In the case of, anyone the most not can know that the content of wherein information, and and if only if, and user carries out authentication, and has passed through checking
The plaintext of visiting information could be shown, thus learn the content of information.Since so, user would not be unwitting
Information content is spied on by people or some malicious persons of surrounding, it is to avoid directly or indirectly lose under situation,
Ensure the safety of information.
Especially, described herein information refers to that Word message, voice messaging, video information etc. are all can be to user
The mode general name of transmission content.
See Fig. 2, be the schematic flow diagram of a kind of information protecting method that the embodiment of the present invention two provides, as it can be seen,
The method comprises the steps S21~S25.
Step S21: if terminal needs display information, identifies information type, and every kind of information type is designated different passes
Key content.
Specifically, when receiving the information needing display, the content of information is identified, such as, information is sent out
Make a gift to someone, send number or the content of concrete text and the key word etc. of text that relate to carry out feature identification, facilitate follow-up
These features are compared by step.
Step S22: according to key content identification information the need of encryption.
Specifically, compared with the content encrypt the needs of the key content and setting that receive information, information is judged
The need of encryption, for example, it is possible to set a private communication record in terminal, user will need the contact person encrypted true at the beginning
Reserve, be stored in private communication record, can add in private communication is recorded or delete the contact person needing encryption, these are contacted
The information that people sends is marked, if number set in advance needs encryption, and the number of the information of transmission is identical with encrypted number,
This information is then judged to need the information of encryption, the most directly shows without being found to have identical content, it is not necessary to add
Close.
Step S23: if desired encrypt, is encrypted information with hiding information and starts Authentication mechanism with to user
Identity is verified.
Specifically, need the information of encryption to be encrypted by being judged as, and start Authentication mechanism, it is desirable to
User checking identity information, allow user can not learn before not over authentication this add confidential information any in
Hold.
Step S24: if authentication success, obtain needing display information and showing to adding confidential information deciphering.
Specifically, user attempts when having learnt information access learning information content, then need by checking identity information,
After identity information is verified, only just can send the instruction of decryption information so that encrypted information shows can be by
User learns its content.
Step S25: if authentication is unsuccessful, carries out unsuccessful checking information retaining and showing after being proved to be successful
Out.
Specifically, when user authentication information of use when carrying out authentication is incorrect, when verifying unsuccessful,
This authentication information used will be retained by terminal, such as, by user when inputting incorrect checking information
Finger print information is recorded, follow-up after by successful authentication, incorrect authentication information and the mistake to record
By mistake the number of times of checking shows, so have privacy divulge a secret relevant dispute time can be relevant as follow-up legal procedure etc.
Evidence, can also let the user know that the incorrect verification operation that specifically who is carried out simultaneously.
Specifically, during user uses, contact person is distinguished and treats, the contact person of some secrets is transferred into private
In close address list, private communication the information that the contact person in recording sends just can be encrypted, and normal between other contact person
Carry out routine information exchange, user so can be avoided to need each information to receiving to verify, thus improve and make
The service efficiency of user.
Especially, when user receives some information that unknown contacts in contacts list is not sent, user
The information first that unknown contacts is sent by terminal is encrypted, and after user verifies identity, freely can select according to information content
Whether select and add in private communication record by this contact person, without adding in private communication record, this contact person's second time is sent
Information will not be encrypted, even if this contact person is not added to user terminal, again send information display the unknown connection
It is Crinis Carbonisatus when carrying out information, also will not be encrypted.
See Fig. 3, be the schematic flow diagram of a kind of information protecting method that the embodiment of the present invention three provides, as it can be seen,
The method comprises the steps S31~S36:
Step S31: if terminal needs display information, identifies information type, and every kind of information type is designated different passes
Key content.
Specifically, when receiving the information needing display, the content of information is identified, such as, information is sent out
Make a gift to someone, send number or the content of concrete text and the key word etc. of text that relate to carry out feature identification, facilitate follow-up
These features are compared by step.
Step S32: according to key content identification information the need of encryption.
Specifically, compared with the content that the needs of the key content and setting that receive information are encrypted, if related to
Information there is a need to encryption content, then just this information is encrypted, such as, in advance by certain some key word setting
For needing the word of encryption, if the information received occurs this key word, then this information is judged to need the letter of encryption
Breath, if number set in advance needs encryption, then the number sending information is identical with encrypted number, then be judged to this information need
Information to be encrypted, the most directly shows without being found to have identical content, it is not necessary to encryption.
Step S33: if desired encrypt, is encrypted information with hiding information and starts Authentication mechanism with to user
Identity is verified.
Specifically, need the information of encryption to be encrypted by being judged as, and start Authentication mechanism, it is desirable to
User checking identity information, allow user can not learn before not over authentication this add confidential information any in
Hold.
Step S34: send information alert to remind input proof of identity code to carry out authentication.
Specifically, specifically, user receive add confidential information when, add confidential information and can incidentally produce an identity school
Test code, open add confidential information time, automatically prompting needs input validation code, after user correctly enters check code, terminal just meeting
Produce decryption instructions, show information content.
Step S35: if authentication success, obtain needing display information and showing to adding confidential information deciphering.
Specifically, user attempts when having learnt information access learning information content, then need by checking identity information,
After identity information is verified, only just can send the instruction of decryption information so that encrypted information shows can be by
User learns its content.
Step S36: if authentication is unsuccessful and the information of required display is associated person information during current talking, in
Disconnected current talking.
Specifically, can be provided with encryption space in user terminal, encryption space is for received by centralized stores user
Adding confidential information, when user terminal receives and adds confidential information, user is sent prompting, during user operation, user terminal needs making
The identity of user is verified, if checking is not passed through, the apersistence information that user terminal can interrupt accessing automatically is (such as language
Sound call, video calling requirement etc.), or, the information (such as word, pictorial information etc.) finished receiving is transferred to encryption
Space store, to be verified by after show information content just now, alternatively, terminal sends one to this contact person simultaneously and sets in advance
The feedback information put is to inform the non-operation in person of the other side.
Specifically, if receiving when add confidential information, user fails the checking by identity information, user terminal
The information accessing persistence takes the process of interrupting information, sends simultaneously and pre-set feeds back to contact person, allows
Contact person knows the reason that interrupting information accesses, and also avoids contact person again by information access simultaneously;For having finished receiving
Information, user terminal will add confidential information and deliver to encrypt space and store, after correctly by the checking of checking information just now
Can check, confidential information will be added and be all gathered in same encryption space, and user can be facilitated to search and add confidential information, it is not necessary in institute
Searching in having information, it is more convenient to use.
See Fig. 4, be the schematic flow diagram of a kind of information protecting method that the embodiment of the present invention four provides, as it can be seen,
The method comprises the steps S41~S46:
Step S41: if terminal needs display information, identifies information type, and every kind of information type is designated different passes
Key content.
Specifically, when receiving the information needing display, the content of information is identified, such as, information is sent out
Make a gift to someone, send number or the content of concrete text and the key word etc. of text that relate to carry out feature identification, facilitate follow-up
These features are compared by step.
Step S42: according to key content identification information the need of encryption.
Specifically, compared with the content that the needs of the key content and setting that receive information are encrypted, if related to
Information there is a need to encryption content, then just this information is encrypted, such as, in advance by certain some key word setting
For needing the word of encryption, if the information received occurs this key word, then this information is judged to need the letter of encryption
Breath, if number set in advance needs encryption, then the number sending information is identical with encrypted number, then be judged to this information need
Information to be encrypted, the most directly shows without being found to have identical content, it is not necessary to encryption.
Step S43: if desired encrypt, is encrypted information with hiding information and starts Authentication mechanism with to user
Identity is verified.
Specifically, need the information of encryption to be encrypted by being judged as, and start Authentication mechanism, it is desirable to
User checking identity information, allow user can not learn before not over authentication this add confidential information any in
Hold.
Step S44: send information alert to remind input proof of identity code to carry out authentication.
Specifically, specifically, user receive add confidential information when, produce a proof of identity code, add opening
During confidential information, prompting needs input validation code automatically, and after user correctly enters check code, terminal just can produce decryption instructions,
Display information content.
Step S45: if authentication success, obtain needing display information and showing to adding confidential information deciphering.
Specifically, user attempts when having learnt information access learning information content, then need by checking identity information,
After identity information is verified, only just can send the instruction of decryption information so that encrypted information shows can be by
User learns its content.
Step S46: if user carries out the successful number of times of authentication reach the identical confidential information that adds in Preset Time
The number of times preset, to adding confidential information deciphering.
Specifically, when user input validation information, terminal can be united by the correct number of times of checking continuous to user
Meter, for example, it is possible within a time the shortest (in such as 5 seconds), terminal receives user and provides the secondary of correct verification information
Number, if number of times is 1, adds confidential information to this and carries out showing in plain text, decipher normally and check action, after checking end,
Continuation is kept encrypted state by this information, if (such as when being verified as fingerprint authentication, finger is continuous when number of times is no less than 2 times
Touch the correct verification carried out no less than 2 times), terminal can receive the decryption processing letter that this information needs to carry out releasing encryption
Number, send to this add confidential information release encryption order.
Specifically, being decrypted process to adding confidential information, this information does not re-encrypts, and non-user can also directly be looked into
See that information is in plain text.After cancellation adds the encryption of confidential information, this information will become common information, can not tested by identity
Check in the case of card.
Specifically, user terminal is encrypted after receiving the information that private contact is sent, and this adds confidential information and looks into every time
See be required to verify identity, if but follow-up to this add confidential information carry out repeatedly continuous print checking time (be such as carried out continuously two
Secondary checking identity), it will unlock this encryption adding confidential information so that this add confidential information become common can be by anyone
The information checked, but come into force only for the confidential information that adds carrying out this operation, send for sending the contact person of this encryption message
Other any information, it is encrypted by user terminal by continuation.
Further, the verification mode adding confidential information in above-mentioned each embodiment can be any attainable for verifying
The method of user identity, such as, user fingerprint (is verified to mating by fingerprint matching with the fingerprint of storage in client terminal
User identity), password authentification (user input password with in client terminal record password compared with relatively verify identity) or
Person's face identification system (by user face wholly or partially with the information prestored to contrast to verify identity) etc.,
Can be one or several combination therein, concrete condition can according to user need it is configured.
See Fig. 5, be the schematic block diagram of a kind of terminal that the embodiment of the present invention one provides, as it can be seen, this terminal bag
Include:
Recognition unit 10, if needing display information for terminal, identifies information type, specifies every kind of information type not
Same key content;
Judging unit 20, is used for according to key content identification information the need of encryption;
Ciphering unit 30, for being encrypted information with hiding information;
Authentication unit 40, for verifying user identity information when needs are opened and added confidential information.
Specifically, after recognition unit 10 receives information, information type is identified, every kind of information type is specified not
With key content, it is judged that whether unit 20 can be that the information needing encryption judges to information according to key content, if
Need the information of encryption, to this information, ciphering unit 30 does not show that encryption of plaintext processes, and user needs by checking
The plaintext adding confidential information can be checked after the checking of unit 40 just now, learn content therein.If user fails by testing
The checking of card unit 40, it is impossible to check information content.
So, user the most just will not worry the access due to information, occurs that the plaintext of information is pointed out and quilt
Other people are spied on, thus ensured the safety of information, it is to avoid some directly or indirectly lose.
See Fig. 6, be the schematic block diagram of a kind of terminal that the embodiment of the present invention two provides, as it can be seen, this terminal bag
Include:
Recognition unit 10, if needing display information for terminal, identifies information type, specifies every kind of information type not
Same key content;
Judging unit 20, is used for according to key content identification information the need of encryption;
Ciphering unit 30, for being encrypted information with hiding information;
Authentication unit 40, for verifying user identity information when needs are opened and added confidential information;
Record unit 50, for when authentication is unsuccessful, carries out unsuccessful checking information retaining and in checking
Show after success.
Specifically, after the information of receiving is identified after classification by recognition unit 10, it is judged that the unit 20 transmission to information
Person judges, if needing the information of encryption, the information received by recognition unit 10 is not shown by ciphering unit 20
Show the encryption of literary composition, check that when adding confidential information, user needs the checking through authentication unit 40, by authentication unit 40
Checking after can check the plaintext adding confidential information just now, learn therein in.If not the information of needs encryption, identify single
Information content can directly be learnt without authentication unit 40, user after receiving information by unit 10.For adding confidential information, if used
Person fails the checking by authentication unit 40, it is impossible to check information content, and by record unit 50 by authentication unit 40
The incorrect checking information carried out retains, can be from record unit 50 after user is correctly by the checking of authentication unit 40
The incorrect verification operation of mistake made above is learnt at place, so have privacy divulge a secret relevant dispute time can be as follow-up legal
The evidence that program etc. are relevant, can also let the user know that the incorrect verification operation that specifically who is carried out simultaneously.
Specifically, terminal is also provided with memory element 90, and being used at key content is the associated person information pre-set
Time, storing contact information;During user uses, contact person is distinguished and treats, the contact person of some secrets is shifted
Entering in memory element 90, the contact person in memory element 90 can be arranged interpolation voluntarily or delete, by memory element 90 by user
The information that interior contact person sends just can be encrypted, and carries out routine information exchange between other contact person normally, so
User can be avoided to need each information to receiving to verify, thus improve the service efficiency of user.
See Fig. 7, be the schematic block diagram of a kind of terminal that the embodiment of the present invention three provides, as it can be seen, this terminal bag
Include:
Recognition unit 10, if needing display information for terminal, identifies information type, specifies every kind of information type not
Same key content;
Judging unit 20, is used for according to key content identification information the need of encryption;
Ciphering unit 30, for being encrypted information with hiding information;
Authentication unit 40, for verifying user identity information when needs are opened and added confidential information;
Tip element 60, is used for sending information alert to remind input proof of identity code to carry out authentication;
Feedback unit 70, for when authentication is unsuccessful and the information of needs display is contact person's letter during current talking
During breath, interrupt current talking, and send the feedback information of non-user operation.
Specifically, after recognition unit 10 is identified classification to the information received, it is judged that whether unit 20 judges information
For needing the information of encryption, if needing the information of encryption, ciphering unit 30 does not show encryption of plaintext to this information
Process, meanwhile, user receive add confidential information when, add confidential information and can incidentally produce a proof of identity code, should
Proof of identity code incidentally sends when can be produced and can also be by terminal inner and be sent information by sender, is opening encryption
During information, Tip element 60 sends prompting, has let the user know that information arrives, and issues the user with the prompting needing checking, uses
Family can check the plaintext adding confidential information after the checking by authentication unit 40 just now, learns content therein.If sent
Be to add confidential information, when verifying through authentication unit 40, user fail by checking, when recognition unit 10 identify is to hold
During information (such as voice call, the video calling requests etc.) that continued access enters, feedback unit 70 carries out interrupt processing to the information accessed,
And pre-set feedback information is sent to contact person, when recognition unit 10 identify be the information finished receiving
Time (such as word, pictorial information etc.), add in confidential information goes to terminal and store.
Specifically, if receiving when add confidential information, user fails the checking by authentication unit 40, to continuing
Property the information that accesses, feedback unit 70 takes the access of interrupting information, sends simultaneously and pre-set feeds back to contact
People, allows contact person know the reason that hook information accesses, also avoids contact person again by information access simultaneously;For being received
The information completed, goes to tag memory storage, can check just now after correctly by the checking of authentication unit 40, especially, and can
All it is gathered in same encryption space so that confidential information will be added, user can be facilitated to search and add confidential information, it is not necessary in all information
Interior search, it is more convenient to use.
See Fig. 8, be the schematic block diagram of a kind of terminal that the embodiment of the present invention four provides, as it can be seen, this terminal bag
Include:
Recognition unit 10, if needing display information for terminal, identifies information type, specifies every kind of information type not
Same key content;
Judging unit 20, is used for according to key content identification information the need of encryption;
Ciphering unit 30, for being encrypted information with hiding information;
Authentication unit 40, for verifying user identity information when needs are opened and added confidential information;
Tip element 60, is used for sending information alert to remind input proof of identity code to carry out authentication;
Decryption unit 80, for adding confidential information to carry out authentication the most secondary identical as user in Preset Time
When number reaches default number of times, to adding confidential information deciphering.
Specifically, after recognition unit 10 identifies information and classifies, it is judged that unit 20 judges whether information encrypts for needs
Information, if needing the information of encryption, ciphering unit 30 does not show that to information encryption of plaintext processes, with this together
Time, Tip element 60 sends prompting, has let the user know that information arrives, and issues the user with the prompting needing checking, Yong Hu
By the plaintext adding confidential information can be checked after the checking of authentication unit 40 just now, learn content therein;If user needs
Can check an encryption information sharing to other people, then can be to adding checking behavior that confidential information consults repeatedly (not no
Less than 2 times) continuous print repeats, and decryption unit 80 adds confidential information to this and is decrypted, and allows this information become letter by ordinary
Breath, can be checked by other people.Now unlock is only that this adds confidential information, and other sending identical encryption contact person add secret letter
Breath not impact, other add confidential information and remain in that encrypted state.
Specifically, can optionally some be need not encryption behavior information deciphering, for other people share information, for
Family provides convenient.
Especially, can arrange a decryption verification to adding confidential information, decryption verification can also pass through authentication unit 40 phase
Same verification mode is carried out, and selects to enter decryption verification state, then to encrypt this through decryption verification within adding confidential information
Information is decrypted operation.
Further, in above-described embodiment, Tip element 60 is to allow user know by the way of for routine have information to be connect
Receiving, such as, vibrations equipment produces vibrations, jingle bell equipment sends sound or controls to show that module sends light and shows, permissible
It is one or several combination therein, such as, can shake and jingle bell, particular situation needing it according to user simultaneously
It is configured.
Further, in above-described embodiment, authentication unit 40 is by entering the checking information of user with the information of storage
Row contrast judges, such as, by fingerprint verification system by user fingerprint with the fingerprint stored in client terminal to mating
Verify user identity, allow user input password relatively test compared with the password of record in client terminal by password authentification
Card identity, or face identification system wholly or partially verifying user face to contrast with the information prestored
Identity etc., can be one or several combinations therein, such as, and need to be by fingerprint authentication and password to be inputted by close
Code checking, concrete condition can according to user need it is configured.
Fig. 9 is the structure composition schematic diagram of the embodiment five of the terminal of the present invention.As it is shown in figure 9, it comprises the steps that at least one
Individual input equipment 101, at least one outut device 102, bus 103, transceiver 104, memorizer 105 and processor 100,
Above-mentioned input equipment 101, outut device 102, transceiver 104, memorizer 105 and processor 100 are connected by bus 103,
Wherein:
Input equipment 101, for receiving the input data of outside input terminal 99.In implementing, the embodiment of the present invention
Input equipment 101 can include keyboard, mouse, opto-electronic input device, audio input device, touch input device, scanner
Deng.
Outut device 102, for the output data of external output terminal.In implementing, the output of the embodiment of the present invention
Equipment 102 can include display, speaker, printer etc..
Bus 103, for carrying out communication with other equipment.In implementing, the bus 103 of the embodiment of the present invention passes
Broadcast an example of medium.Propagation medium typically can be by computer-readable instruction, data structure, program module or other modulation
Other data materializations of data signal (such as carrier wave or other transfer mechanisms) form, for example, propagation medium can include
Wired media, such as priority network or straight line connect, and propagation medium may also include wireless medium, such as sound wave, radio frequency, infrared ray
Deng.In implementing, the bus 103 of the embodiment of the present invention can be used for receiving the access request accessing terminal.
Transceiver 104, is used for by bus 103 to other equipment sending datas or from other equipment receiving datas.
In implementing, the transceiver 104 of the embodiment of the present invention can include the transceiving devices such as radio-frequency antenna.
Memorizer 105, for storing the routine data with various functions.In the embodiment of the present invention, memorizer 105 stores
Packet include Internet Service Provider's data available and the unavailable data of Internet Service Provider, and other can call and transport
The routine data of row.In implementing, the memorizer 105 of the embodiment of the present invention can be system storage, such as, volatile
(such as RAM), non-volatile (such as ROM, flash memory etc.), or both combinations.In implementing, the embodiment of the present invention
Memorizer 105 can also is that the external memory storage outside system, such as, disk, CD, tape etc..
Processor 100, such as CPU, for calling the routine data of storage in memorizer 105, and perform following operation:
If terminal 99 needs display information, identifying information type, every kind of information type is designated different key contents;
According to key content identification information the need of encryption;If desired encrypt, information is encrypted and is encrypted with hiding information
Information also starts Authentication mechanism to verify user identity;If authentication success, show adding confidential information.
Specifically, whether processor 100 is that the content needing encryption judges, to needs to the content receiving information
The contact person of encryption or band there is a need to the information of encrypted content and just can be encrypted, and needs encryption when information is confirmed to be
Information time, thus well the privacy of all information is carried out anticipation, it is ensured that the information of the privacy received all can be by
Protection is arrived, and has ensured the privacy of important information;Meanwhile, user receive need encryption information time, the output of user terminal
Equipment 102 does not has to show about the plaintext of this information content, can only know have information to be accepted from outut device 102 so that
Not in the case of authentication, anyone the most not can know that the content of wherein information;When user needs awareness information
During content, it is desirable to user uses input equipment 101 and sends authentication information to processor 100, processor 100 will be to user
The authentication information of input is compared with the information in memorizer 105, only just can learn visiting information after comparison success
Content.Since so, user would not be spied on by people or some malicious persons of surrounding under unwitting situation
To information content, it is to avoid directly or indirectly lose, ensure the safety of information.
If terminal 99 needs display information, identifying information type, every kind of information type is designated different key contents,
Key content is the associated person information pre-set, and according to key content identification information the need of encryption, if desired encrypts, right
Information is encrypted and obtains adding confidential information with hiding information and start Authentication mechanism to verify user identity, arranges
Proof of identity code, and send information alert with remind input proof of identity code, if authentication success, show adding confidential information
Show.
Specifically, in memorizer 105, it is previously provided with needing the associated person information of encryption, when transceiver 104 receives
When adding confidential information, the associated person information that transceiver 104 is received by processor 100 and contact person's letter of storage in memorizer 105
Manner of breathing comparison, outut device 102 can send prompting to user, if adding confidential information, user inputs authentication information, when
When user needs awareness information content, it is desirable to user uses input equipment 101 and sends authentication information to processor 100, place
The identity information prestored in authentication information and the memorizer 105 of user's input will be compared by reason device 100, only than
To just learning the content of visiting information after success, during user uses, contact person is distinguished and treats, by private communication
The information that contact person in record sends just can be encrypted, and carries out routine information exchange between other contact person normally, as
This can be avoided user to need each information to receiving to verify, thus improves the service efficiency of user.
If terminal 99 needs display information, identifying information type, every kind of information type is designated different key contents;
According to key content identification information the need of encryption;If desired encrypt, information is encrypted and is encrypted with hiding information
Information also starts Authentication mechanism to verify user identity;If authentication success, show adding confidential information;
If authentication is unsuccessful and the information of required display is associated person information during current talking, interrupt current talking, concurrently
Send the feedback information that non-user operates.
Specifically, in memorizer 105, it is previously provided with needing the associated person information of encryption, when transceiver 104 receives
When adding confidential information, the associated person information that transceiver 104 is received by processor 100 and contact person's letter of storage in memorizer 105
Manner of breathing comparison, outut device 102 can send prompting to user, if adding confidential information, user inputs authentication information, when
When user needs awareness information content, it is desirable to user uses input equipment 101 and sends authentication information to processor 100, place
The identity information prestored in authentication information and the memorizer 105 of user's input will be compared, if tested by reason device 100
Card does not passes through, and processor 100 requires that apersistence information that transceiver 104 interrupts accessing is (such as voice call, video calling
Require) and in memorizer 105, extract a feedback message pre-set, issue this contact by transceiver 104
People informs the non-operation in person of the other side, or, transceiver 104 is complete the information of reception (such as word, pictorial information
Deng) be transferred in the encryption space of memorizer 105 store, to be verified by after show information content just now.
Specifically, if receiving when adding confidential information, user fails the checking by identity information, and user terminal 99 is right
The information that persistence accesses takes the process of interrupting information, sends simultaneously and pre-set feeds back to contact person, allows connection
It is people's reason of knowing that interrupting information accesses, also avoids contact person again by information access simultaneously;For finished receiving
Information, user terminal will add confidential information and deliver to encrypt space and store, and just now may be used after correctly checking by checking information
To check, confidential information will be added and be all gathered in same encryption space, and user can be facilitated to search and add confidential information, it is not necessary to all
Searching in information, it is more convenient to use.
If terminal 99 needs display information, identifying information type, every kind of information type is designated different key contents;
According to key content identification information the need of encryption;If desired encrypt, information is encrypted and is encrypted with hiding information
Information also starts Authentication mechanism to verify user identity;If authentication success, show adding confidential information,
If user carries out the number of times that the successful number of times of authentication reaches default, to encryption to the identical confidential information that adds in Preset Time
Information is deciphered.
Specifically, receiving after adding confidential information, when user input validation information, processor 100 can to user even
The correct number of times of continuous checking is added up, for example, it is possible within a time the shortest (in such as 5 seconds), user sets in input
At standby 101, the number of times of the correct verification information of input, if the number of times that processor receives is 1, adds confidential information to this and carries out
Display, deciphers normally and checks action in plain text, and after checking end, continuation is kept encrypted state by this information, if number of times
During no less than 2 times, (such as when input equipment 104 is verified as fingerprint authentication, finger touches carry out no less than 2 times correct continuously
Checking), processor 100 produces and this is added confidential information releases the order of encryption, follow-up checks this information to need not to pass through again
Authentication, but this most only releases the encryption of this information, adds confidential information for other and continuation is retained encryption, such as phase
The information sent with encryption contact person, a deciphering wherein encryption adding confidential information, this checking this encryption contact person adds
Confidential information need not again through authentication, but other information of this encryption contact person (before with follow-up send) all continue to protect
Stay encryption.
In several embodiments provided herein, it should be understood that disclosed method, it is only schematically,
Can realize by another way.
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit in embodiment of the present invention terminal can merge according to actual needs, divides and delete
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited thereto, and any
Those familiar with the art, in the technical scope that the invention discloses, can readily occur in the amendment of various equivalence or replace
Changing, these amendments or replacement all should be contained within protection scope of the present invention.Therefore, protection scope of the present invention should be with right
The protection domain required is as the criterion.
Claims (10)
1. an information protecting method, it is characterised in that including:
If terminal needs display information, identifying information type, every kind of information type is designated different key contents;
According to information described in described key content identification the need of encryption;
If desired encrypt, be encrypted described information to hide described information and start Authentication mechanism with to user identity
Verify;
If authentication success, add confidential information deciphering obtain described needing display information and showing to described.
Method the most according to claim 1, it is characterised in that if desired encrypt, hides described information and obtains adding confidential information
And start Authentication mechanism after user identity to be verified, also include:
Send information alert to remind input proof of identity code to carry out authentication.
Method the most according to claim 1, it is characterised in that described method also includes:
If authentication is unsuccessful, carry out retaining and showing after being proved to be successful by unsuccessful checking information.
Method the most according to claim 1, it is characterised in that described method also includes:
If the unsuccessful and described associated person information that information is current talking needing display of authentication, interrupt current talking.
5. according to the method described in any one in claim 1-4, it is characterised in that described method also includes:
If user carries out, to the identical confidential information that adds, the number of times that the successful number of times of authentication reaches default in Preset Time, right
The described confidential information that adds is deciphered.
6. a terminal, it is characterised in that including:
Recognition unit, if needing display information for terminal, identifies information type, and every kind of information type is specified different passes
Key content;
Judging unit, is used for according to information described in described key content identification the need of encryption;
Ciphering unit, for being encrypted described information to hide described information;
Authentication unit, for verifying user identity information when adding confidential information described in needs are opened.
Terminal the most according to claim 6, it is characterised in that described terminal also includes:
Tip element, is used for sending information alert to remind input proof of identity code to carry out authentication.
Terminal the most according to claim 6, it is characterised in that described terminal also includes:
Record unit, for when authentication is unsuccessful, carries out retaining and after being proved to be successful by unsuccessful checking information
Show.
Terminal the most according to claim 6, it is characterised in that described terminal also includes:
Feedback unit, for when authentication is unsuccessful and the information of required display is associated person information during current talking
Time, interrupt current talking.
10. according to the terminal according to any one of claim 6-9, it is characterised in that described terminal also includes:
Decryption unit, for carrying out the successful number of times of authentication and reach the identical confidential information that adds as user in Preset Time
During the number of times preset, add confidential information deciphering to described.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610753526.6A CN106231115A (en) | 2016-08-29 | 2016-08-29 | A kind of information protecting method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610753526.6A CN106231115A (en) | 2016-08-29 | 2016-08-29 | A kind of information protecting method and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106231115A true CN106231115A (en) | 2016-12-14 |
Family
ID=58071233
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610753526.6A Withdrawn CN106231115A (en) | 2016-08-29 | 2016-08-29 | A kind of information protecting method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106231115A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107105324A (en) * | 2017-03-31 | 2017-08-29 | 武汉斗鱼网络科技有限公司 | A kind of method and client of protection barrage information |
CN107155113A (en) * | 2017-03-31 | 2017-09-12 | 武汉斗鱼网络科技有限公司 | The method and server of a kind of protection barrage information |
CN107332973A (en) * | 2017-05-19 | 2017-11-07 | 北京安云世纪科技有限公司 | A kind of processing method of text data, device and mobile terminal |
CN107395865A (en) * | 2017-06-28 | 2017-11-24 | 广东欧珀移动通信有限公司 | Pushed information processing method and electronic installation |
CN107426410A (en) * | 2017-05-26 | 2017-12-01 | 上海与德科技有限公司 | Private information display methods and device |
CN108629203A (en) * | 2018-05-10 | 2018-10-09 | Oppo广东移动通信有限公司 | Method for information display and Related product |
CN111224971A (en) * | 2019-12-31 | 2020-06-02 | 陕西医链区块链集团有限公司 | Block chain data encryption and decryption method and encryption and decryption system |
CN111859423A (en) * | 2020-07-17 | 2020-10-30 | 山东广鹏信息科技有限公司 | Information security encryption method and device |
CN112487474A (en) * | 2020-11-26 | 2021-03-12 | 冉令峻 | Private information protection system based on big data |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1738453A (en) * | 2004-08-20 | 2006-02-22 | 英业达股份有限公司 | Information encryption system and method |
CN101754209A (en) * | 2010-01-20 | 2010-06-23 | 中兴通讯股份有限公司 | Method for protecting contents of mobile phone |
CN102316214A (en) * | 2011-07-26 | 2012-01-11 | 上海优思通信科技有限公司 | Privacy method for personal information and system |
CN104573548A (en) * | 2014-12-22 | 2015-04-29 | 宇龙计算机通信科技(深圳)有限公司 | Information encryption and decryption methods and devices and terminal |
CN105554745A (en) * | 2016-01-27 | 2016-05-04 | 广东欧珀移动通信有限公司 | Information management method and system |
-
2016
- 2016-08-29 CN CN201610753526.6A patent/CN106231115A/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1738453A (en) * | 2004-08-20 | 2006-02-22 | 英业达股份有限公司 | Information encryption system and method |
CN101754209A (en) * | 2010-01-20 | 2010-06-23 | 中兴通讯股份有限公司 | Method for protecting contents of mobile phone |
CN102316214A (en) * | 2011-07-26 | 2012-01-11 | 上海优思通信科技有限公司 | Privacy method for personal information and system |
CN104573548A (en) * | 2014-12-22 | 2015-04-29 | 宇龙计算机通信科技(深圳)有限公司 | Information encryption and decryption methods and devices and terminal |
CN105554745A (en) * | 2016-01-27 | 2016-05-04 | 广东欧珀移动通信有限公司 | Information management method and system |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107105324A (en) * | 2017-03-31 | 2017-08-29 | 武汉斗鱼网络科技有限公司 | A kind of method and client of protection barrage information |
CN107155113A (en) * | 2017-03-31 | 2017-09-12 | 武汉斗鱼网络科技有限公司 | The method and server of a kind of protection barrage information |
CN107155113B (en) * | 2017-03-31 | 2021-03-16 | 武汉斗鱼网络科技有限公司 | Method and server for protecting bullet screen information |
CN107332973A (en) * | 2017-05-19 | 2017-11-07 | 北京安云世纪科技有限公司 | A kind of processing method of text data, device and mobile terminal |
CN107332973B (en) * | 2017-05-19 | 2020-09-25 | 北京安云世纪科技有限公司 | Text data processing method and device and mobile terminal |
CN107426410A (en) * | 2017-05-26 | 2017-12-01 | 上海与德科技有限公司 | Private information display methods and device |
CN107395865A (en) * | 2017-06-28 | 2017-11-24 | 广东欧珀移动通信有限公司 | Pushed information processing method and electronic installation |
CN108629203A (en) * | 2018-05-10 | 2018-10-09 | Oppo广东移动通信有限公司 | Method for information display and Related product |
CN111224971A (en) * | 2019-12-31 | 2020-06-02 | 陕西医链区块链集团有限公司 | Block chain data encryption and decryption method and encryption and decryption system |
CN111859423A (en) * | 2020-07-17 | 2020-10-30 | 山东广鹏信息科技有限公司 | Information security encryption method and device |
CN112487474A (en) * | 2020-11-26 | 2021-03-12 | 冉令峻 | Private information protection system based on big data |
CN112487474B (en) * | 2020-11-26 | 2024-02-02 | 宁波英派尔科技有限公司 | Secret information protection system based on big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106231115A (en) | A kind of information protecting method and terminal | |
US11494754B2 (en) | Methods for locating an antenna within an electronic device | |
CN105848134B (en) | Virtual SIM card management device, communication terminal, access control method and management method | |
EP2742710B1 (en) | Method and apparatus for providing a secure virtual environment on a mobile device | |
JP4733167B2 (en) | Information processing apparatus, information processing method, information processing program, and information processing system | |
US20140075493A1 (en) | System and method for location-based protection of mobile data | |
US9621344B2 (en) | Method and system for recovering a security credential | |
JP2005196776A (en) | Safe data communication method and its system between communication terminal and communication equipment | |
CN105610671A (en) | Terminal data protection method and device | |
WO2015019821A1 (en) | Information processing device, information processing method, and computer program | |
KR100954841B1 (en) | Method and Apparatus of managing unity data on mobile device and Recording medium using this | |
JP2012248198A (en) | Safe operation method of computer device | |
CN105915336A (en) | Object cooperative decryption method and device thereof | |
US20110154436A1 (en) | Provider Management Methods and Systems for a Portable Device Running Android Platform | |
US20110170689A1 (en) | Terminal and method for processing encrypted message | |
JP2007036562A (en) | Telephone number registration/authentication system, method, authentication server, and program | |
US20150264048A1 (en) | Information processing apparatus, information processing method, and recording medium | |
JP2004206258A (en) | Multiple authentication system, computer program, and multiple authentication method | |
KR101971428B1 (en) | Contents exchange method based on interaction between users and system performing the same | |
WO2016030832A1 (en) | Method and system for mobile data and communication security | |
Grinberg | End-to-End Authentication: A First Amendment Hook to the Encryption Debate | |
CN110362976A (en) | Biometric security device | |
KR102383050B1 (en) | Device for changing caller indentification using encryption algorithm | |
CN116204895A (en) | Method and terminal for accessing specific data | |
KR101644070B1 (en) | Email service method and system for mobile |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20161214 |