CN106231115A - A kind of information protecting method and terminal - Google Patents

A kind of information protecting method and terminal Download PDF

Info

Publication number
CN106231115A
CN106231115A CN201610753526.6A CN201610753526A CN106231115A CN 106231115 A CN106231115 A CN 106231115A CN 201610753526 A CN201610753526 A CN 201610753526A CN 106231115 A CN106231115 A CN 106231115A
Authority
CN
China
Prior art keywords
information
user
terminal
authentication
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610753526.6A
Other languages
Chinese (zh)
Inventor
袁旦
李韧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201610753526.6A priority Critical patent/CN106231115A/en
Publication of CN106231115A publication Critical patent/CN106231115A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72436User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. SMS or e-mail
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions

Abstract

Embodiments providing a kind of information protecting method and terminal, wherein method includes: if terminal needs display information, identifies information type, and every kind of information type is designated different key contents;According to key content identification information the need of encryption;If desired encrypt, information is encrypted with hiding information and user identity is verified;If authentication success, obtain needing display information and showing to adding confidential information deciphering.By being whether that the content needing encryption judges to the information content received; the information that the contact person or band needing encryption there is a need to encrypted content just can be encrypted; thus well the privacy of all information is carried out anticipation; guarantee that the information of the privacy received all can be protected to; ensure the information security of user; avoid user directly or indirectly to be lost, the most also avoid the information without encryption encrypted, also use upper band to serve to user convenient.

Description

A kind of information protecting method and terminal
Technical field
The present invention relates to electronic technology field, particularly relate to a kind of information protecting method and terminal.
Background technology
At present, many communication traffics bring great advantage to the user, such as the electronics name of cellphone information, specification definition Sheet and Email etc., the daily life that can be convenient for people to.
Information security is more and more important now, but information security in some scenarios can not get well protecting.Such as: During meeting, everybody mobile phone is all put on the table, and wage information and prompting message in caller ID and name, information are all easy to Seen by the people of periphery, additionally as, on elevator or bus, all there is problems in that.In prior art, bulk information is mutual It is all to carry out with form in plain text, when you receive information, can be seen even not had by some by the people of surrounding is casual People diligently spies on, and thus can damage or the interests of potential damage user.
Summary of the invention
The embodiment of the present invention provides a kind of information protecting method, and important information can be avoided to be spied on by other people, it is ensured that information is pacified Entirely.
First aspect, embodiments provides a kind of information protecting method, and the method includes:
If terminal needs display information, identifying information type, every kind of information type is designated different key contents;
According to information described in described key content identification the need of encryption;
If desired encrypt, be encrypted described information to hide described information and start Authentication mechanism with to user Identity is verified;
If authentication success, add confidential information deciphering obtain described needing display information and showing to described.
On the other hand, embodiments providing a kind of terminal, this terminal includes:
Recognition unit, if needing display information for terminal, identifies information type, and every kind of information type is specified difference Key content;
Judging unit, is used for according to information described in described key content identification the need of encryption;
Ciphering unit, for being encrypted described information to hide described information;
Authentication unit, for verifying user identity information when adding confidential information described in needs are opened.
Whether the information protecting method of the embodiment of the present invention and terminal, by encrypting for needs the information content received Content judge, the contact person or band needing encryption be there is a need to the information of encrypted content and just can be encrypted, Thus well the privacy of all information being carried out anticipation, it is ensured that the information of the privacy received all can be protected to, and protects Hinder the information security of user, it is to avoid user is directly or indirectly lost, the most also avoid the information without encryption Encrypted, also use upper band to serve to user convenient.
Accompanying drawing explanation
In order to be illustrated more clearly that embodiment of the present invention technical scheme, required use in embodiment being described below Accompanying drawing is briefly described, it should be apparent that, the accompanying drawing in describing below is some embodiments of the present invention, general for this area From the point of view of logical technical staff, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
The schematic flow diagram of a kind of information protecting method that Fig. 1 provides for the embodiment of the present invention one;
The schematic flow diagram of a kind of information protecting method that Fig. 2 provides for the embodiment of the present invention two;
The schematic flow diagram of a kind of information protecting method that Fig. 3 provides for the embodiment of the present invention three;
The schematic flow diagram of a kind of information protecting method that Fig. 4 provides for the embodiment of the present invention four;
The schematic block diagram of the terminal that Fig. 5 provides for the embodiment of the present invention one;
The schematic block diagram of the terminal that Fig. 6 provides for the embodiment of the present invention two;
The schematic block diagram of the terminal that Fig. 7 provides for the embodiment of the present invention three;
The schematic block diagram of the terminal that Fig. 8 provides for the embodiment of the present invention four;
The structure composition schematic diagram of the terminal that Fig. 9 provides for the embodiment of the present invention five.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is a part of embodiment of the present invention rather than whole embodiments wholely.Based on this Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise Example, broadly falls into the scope of protection of the invention.
Should be appreciated that when using in this specification and in the appended claims, term " includes " and " comprising " instruction Described feature, entirety, step, operation, element and/or the existence of assembly, but it is not precluded from one or more further feature, whole Body, step, operation, element, assembly and/or the existence of its set or interpolation.
In implementing, the terminal described in the embodiment of the present invention includes but not limited to such as have touch sensitive surface Mobile phone, laptop computer or the tablet PC of (such as, touch-screen display and/or touch pad) etc other just Portable device.It is to be further understood that in certain embodiments, equipment not portable communication device, but it is quick to have touch The desk computer of sense surface (such as, touch-screen display and/or touch pad).
In discussion below, describe the terminal including display and touch sensitive surface.It is, however, to be understood that It is that terminal can include such as physical keyboard, mouse and/or control other physical user-interface device one or more of bar.
Terminal supports various application programs, such as following in one or more: drawing application program, demonstration application journey Sequence, word-processing application, website create application program, dish imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support the application of application program, photo management application program, digital camera application program, digital camera application program, web-browsing Program, digital music player application and/or video frequency player application program.
The various application programs that can perform in terminal can use at least one of such as touch sensitive surface public Physical user-interface device.Among applications and/or can adjust in corresponding application programs and/or change and touch sensitive table The corresponding information of display in one or more functions in face and terminal.So, the public physical structure of terminal (such as, touches Sensing surface) the various application programs with the most directly perceived and transparent user interface can be supported.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to be that two or more unit are integrated in a unit.Above-mentioned integrated Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
See Fig. 1, be the schematic flow diagram of a kind of information protecting method that the embodiment of the present invention one provides, as it can be seen, The method comprising the steps of S11~S14.
Step S11: if terminal needs display information, identifies information type, and every kind of information type is designated different passes Key content.
Specifically, this key content includes sender, sends number or the content of concrete text related to and text Key word.When receiving the information needing display, the content of information is identified, such as, to the sender of information, sends out Send number or the content of concrete text and the key word etc. of text that relate to carry out feature identification, facilitate subsequent step to this A little features are compared.
Step S12: according to key content identification information the need of encryption.
Specifically, compared with the content that the needs of the key content and setting that receive information are encrypted, if related to Information there is a need to encryption content, then just this information is encrypted, such as, in advance by certain some key word setting For needing the word of encryption, if the information received occurs this key word, then this information is judged to need the letter of encryption Breath, if number set in advance needs encryption, then the number sending information is identical with encrypted number, then be judged to this information need Information to be encrypted, the most directly shows without being found to have identical content, it is not necessary to encryption.
Step S13: if desired encrypt, is encrypted information with hiding information and starts Authentication mechanism with to user Identity is verified.
Specifically, need the information of encryption to be encrypted by being judged as, and start Authentication mechanism, it is desirable to User checking identity information, allow user can not learn before not over authentication this add confidential information any in Hold.
Step S14: if authentication success, obtain needing display information and showing to adding confidential information deciphering.
Specifically, user attempts when having learnt information access learning information content, then need by checking identity information, After identity information is verified, only just can send the instruction of decryption information so that encrypted information shows can be by User learns its content.
Specifically, receiving information when, whether the content receiving information can be encrypted by user terminal for needs Content judge, the contact person or band needing encryption be there is a need to the information of encrypted content and just can be encrypted, Thus well the privacy of all information being carried out anticipation, it is ensured that the information of the privacy received all can be protected to, and protects Hinder the privacy of important information;Meanwhile, user is when receiving the information needing encryption, and terminal inner is encrypted place to information Reason, the display window of user terminal does not has to show about the plaintext of this information content so that not through authentication In the case of, anyone the most not can know that the content of wherein information, and and if only if, and user carries out authentication, and has passed through checking The plaintext of visiting information could be shown, thus learn the content of information.Since so, user would not be unwitting Information content is spied on by people or some malicious persons of surrounding, it is to avoid directly or indirectly lose under situation, Ensure the safety of information.
Especially, described herein information refers to that Word message, voice messaging, video information etc. are all can be to user The mode general name of transmission content.
See Fig. 2, be the schematic flow diagram of a kind of information protecting method that the embodiment of the present invention two provides, as it can be seen, The method comprises the steps S21~S25.
Step S21: if terminal needs display information, identifies information type, and every kind of information type is designated different passes Key content.
Specifically, when receiving the information needing display, the content of information is identified, such as, information is sent out Make a gift to someone, send number or the content of concrete text and the key word etc. of text that relate to carry out feature identification, facilitate follow-up These features are compared by step.
Step S22: according to key content identification information the need of encryption.
Specifically, compared with the content encrypt the needs of the key content and setting that receive information, information is judged The need of encryption, for example, it is possible to set a private communication record in terminal, user will need the contact person encrypted true at the beginning Reserve, be stored in private communication record, can add in private communication is recorded or delete the contact person needing encryption, these are contacted The information that people sends is marked, if number set in advance needs encryption, and the number of the information of transmission is identical with encrypted number, This information is then judged to need the information of encryption, the most directly shows without being found to have identical content, it is not necessary to add Close.
Step S23: if desired encrypt, is encrypted information with hiding information and starts Authentication mechanism with to user Identity is verified.
Specifically, need the information of encryption to be encrypted by being judged as, and start Authentication mechanism, it is desirable to User checking identity information, allow user can not learn before not over authentication this add confidential information any in Hold.
Step S24: if authentication success, obtain needing display information and showing to adding confidential information deciphering.
Specifically, user attempts when having learnt information access learning information content, then need by checking identity information, After identity information is verified, only just can send the instruction of decryption information so that encrypted information shows can be by User learns its content.
Step S25: if authentication is unsuccessful, carries out unsuccessful checking information retaining and showing after being proved to be successful Out.
Specifically, when user authentication information of use when carrying out authentication is incorrect, when verifying unsuccessful, This authentication information used will be retained by terminal, such as, by user when inputting incorrect checking information Finger print information is recorded, follow-up after by successful authentication, incorrect authentication information and the mistake to record By mistake the number of times of checking shows, so have privacy divulge a secret relevant dispute time can be relevant as follow-up legal procedure etc. Evidence, can also let the user know that the incorrect verification operation that specifically who is carried out simultaneously.
Specifically, during user uses, contact person is distinguished and treats, the contact person of some secrets is transferred into private In close address list, private communication the information that the contact person in recording sends just can be encrypted, and normal between other contact person Carry out routine information exchange, user so can be avoided to need each information to receiving to verify, thus improve and make The service efficiency of user.
Especially, when user receives some information that unknown contacts in contacts list is not sent, user The information first that unknown contacts is sent by terminal is encrypted, and after user verifies identity, freely can select according to information content Whether select and add in private communication record by this contact person, without adding in private communication record, this contact person's second time is sent Information will not be encrypted, even if this contact person is not added to user terminal, again send information display the unknown connection It is Crinis Carbonisatus when carrying out information, also will not be encrypted.
See Fig. 3, be the schematic flow diagram of a kind of information protecting method that the embodiment of the present invention three provides, as it can be seen, The method comprises the steps S31~S36:
Step S31: if terminal needs display information, identifies information type, and every kind of information type is designated different passes Key content.
Specifically, when receiving the information needing display, the content of information is identified, such as, information is sent out Make a gift to someone, send number or the content of concrete text and the key word etc. of text that relate to carry out feature identification, facilitate follow-up These features are compared by step.
Step S32: according to key content identification information the need of encryption.
Specifically, compared with the content that the needs of the key content and setting that receive information are encrypted, if related to Information there is a need to encryption content, then just this information is encrypted, such as, in advance by certain some key word setting For needing the word of encryption, if the information received occurs this key word, then this information is judged to need the letter of encryption Breath, if number set in advance needs encryption, then the number sending information is identical with encrypted number, then be judged to this information need Information to be encrypted, the most directly shows without being found to have identical content, it is not necessary to encryption.
Step S33: if desired encrypt, is encrypted information with hiding information and starts Authentication mechanism with to user Identity is verified.
Specifically, need the information of encryption to be encrypted by being judged as, and start Authentication mechanism, it is desirable to User checking identity information, allow user can not learn before not over authentication this add confidential information any in Hold.
Step S34: send information alert to remind input proof of identity code to carry out authentication.
Specifically, specifically, user receive add confidential information when, add confidential information and can incidentally produce an identity school Test code, open add confidential information time, automatically prompting needs input validation code, after user correctly enters check code, terminal just meeting Produce decryption instructions, show information content.
Step S35: if authentication success, obtain needing display information and showing to adding confidential information deciphering.
Specifically, user attempts when having learnt information access learning information content, then need by checking identity information, After identity information is verified, only just can send the instruction of decryption information so that encrypted information shows can be by User learns its content.
Step S36: if authentication is unsuccessful and the information of required display is associated person information during current talking, in Disconnected current talking.
Specifically, can be provided with encryption space in user terminal, encryption space is for received by centralized stores user Adding confidential information, when user terminal receives and adds confidential information, user is sent prompting, during user operation, user terminal needs making The identity of user is verified, if checking is not passed through, the apersistence information that user terminal can interrupt accessing automatically is (such as language Sound call, video calling requirement etc.), or, the information (such as word, pictorial information etc.) finished receiving is transferred to encryption Space store, to be verified by after show information content just now, alternatively, terminal sends one to this contact person simultaneously and sets in advance The feedback information put is to inform the non-operation in person of the other side.
Specifically, if receiving when add confidential information, user fails the checking by identity information, user terminal The information accessing persistence takes the process of interrupting information, sends simultaneously and pre-set feeds back to contact person, allows Contact person knows the reason that interrupting information accesses, and also avoids contact person again by information access simultaneously;For having finished receiving Information, user terminal will add confidential information and deliver to encrypt space and store, after correctly by the checking of checking information just now Can check, confidential information will be added and be all gathered in same encryption space, and user can be facilitated to search and add confidential information, it is not necessary in institute Searching in having information, it is more convenient to use.
See Fig. 4, be the schematic flow diagram of a kind of information protecting method that the embodiment of the present invention four provides, as it can be seen, The method comprises the steps S41~S46:
Step S41: if terminal needs display information, identifies information type, and every kind of information type is designated different passes Key content.
Specifically, when receiving the information needing display, the content of information is identified, such as, information is sent out Make a gift to someone, send number or the content of concrete text and the key word etc. of text that relate to carry out feature identification, facilitate follow-up These features are compared by step.
Step S42: according to key content identification information the need of encryption.
Specifically, compared with the content that the needs of the key content and setting that receive information are encrypted, if related to Information there is a need to encryption content, then just this information is encrypted, such as, in advance by certain some key word setting For needing the word of encryption, if the information received occurs this key word, then this information is judged to need the letter of encryption Breath, if number set in advance needs encryption, then the number sending information is identical with encrypted number, then be judged to this information need Information to be encrypted, the most directly shows without being found to have identical content, it is not necessary to encryption.
Step S43: if desired encrypt, is encrypted information with hiding information and starts Authentication mechanism with to user Identity is verified.
Specifically, need the information of encryption to be encrypted by being judged as, and start Authentication mechanism, it is desirable to User checking identity information, allow user can not learn before not over authentication this add confidential information any in Hold.
Step S44: send information alert to remind input proof of identity code to carry out authentication.
Specifically, specifically, user receive add confidential information when, produce a proof of identity code, add opening During confidential information, prompting needs input validation code automatically, and after user correctly enters check code, terminal just can produce decryption instructions, Display information content.
Step S45: if authentication success, obtain needing display information and showing to adding confidential information deciphering.
Specifically, user attempts when having learnt information access learning information content, then need by checking identity information, After identity information is verified, only just can send the instruction of decryption information so that encrypted information shows can be by User learns its content.
Step S46: if user carries out the successful number of times of authentication reach the identical confidential information that adds in Preset Time The number of times preset, to adding confidential information deciphering.
Specifically, when user input validation information, terminal can be united by the correct number of times of checking continuous to user Meter, for example, it is possible within a time the shortest (in such as 5 seconds), terminal receives user and provides the secondary of correct verification information Number, if number of times is 1, adds confidential information to this and carries out showing in plain text, decipher normally and check action, after checking end, Continuation is kept encrypted state by this information, if (such as when being verified as fingerprint authentication, finger is continuous when number of times is no less than 2 times Touch the correct verification carried out no less than 2 times), terminal can receive the decryption processing letter that this information needs to carry out releasing encryption Number, send to this add confidential information release encryption order.
Specifically, being decrypted process to adding confidential information, this information does not re-encrypts, and non-user can also directly be looked into See that information is in plain text.After cancellation adds the encryption of confidential information, this information will become common information, can not tested by identity Check in the case of card.
Specifically, user terminal is encrypted after receiving the information that private contact is sent, and this adds confidential information and looks into every time See be required to verify identity, if but follow-up to this add confidential information carry out repeatedly continuous print checking time (be such as carried out continuously two Secondary checking identity), it will unlock this encryption adding confidential information so that this add confidential information become common can be by anyone The information checked, but come into force only for the confidential information that adds carrying out this operation, send for sending the contact person of this encryption message Other any information, it is encrypted by user terminal by continuation.
Further, the verification mode adding confidential information in above-mentioned each embodiment can be any attainable for verifying The method of user identity, such as, user fingerprint (is verified to mating by fingerprint matching with the fingerprint of storage in client terminal User identity), password authentification (user input password with in client terminal record password compared with relatively verify identity) or Person's face identification system (by user face wholly or partially with the information prestored to contrast to verify identity) etc., Can be one or several combination therein, concrete condition can according to user need it is configured.
See Fig. 5, be the schematic block diagram of a kind of terminal that the embodiment of the present invention one provides, as it can be seen, this terminal bag Include:
Recognition unit 10, if needing display information for terminal, identifies information type, specifies every kind of information type not Same key content;
Judging unit 20, is used for according to key content identification information the need of encryption;
Ciphering unit 30, for being encrypted information with hiding information;
Authentication unit 40, for verifying user identity information when needs are opened and added confidential information.
Specifically, after recognition unit 10 receives information, information type is identified, every kind of information type is specified not With key content, it is judged that whether unit 20 can be that the information needing encryption judges to information according to key content, if Need the information of encryption, to this information, ciphering unit 30 does not show that encryption of plaintext processes, and user needs by checking The plaintext adding confidential information can be checked after the checking of unit 40 just now, learn content therein.If user fails by testing The checking of card unit 40, it is impossible to check information content.
So, user the most just will not worry the access due to information, occurs that the plaintext of information is pointed out and quilt Other people are spied on, thus ensured the safety of information, it is to avoid some directly or indirectly lose.
See Fig. 6, be the schematic block diagram of a kind of terminal that the embodiment of the present invention two provides, as it can be seen, this terminal bag Include:
Recognition unit 10, if needing display information for terminal, identifies information type, specifies every kind of information type not Same key content;
Judging unit 20, is used for according to key content identification information the need of encryption;
Ciphering unit 30, for being encrypted information with hiding information;
Authentication unit 40, for verifying user identity information when needs are opened and added confidential information;
Record unit 50, for when authentication is unsuccessful, carries out unsuccessful checking information retaining and in checking Show after success.
Specifically, after the information of receiving is identified after classification by recognition unit 10, it is judged that the unit 20 transmission to information Person judges, if needing the information of encryption, the information received by recognition unit 10 is not shown by ciphering unit 20 Show the encryption of literary composition, check that when adding confidential information, user needs the checking through authentication unit 40, by authentication unit 40 Checking after can check the plaintext adding confidential information just now, learn therein in.If not the information of needs encryption, identify single Information content can directly be learnt without authentication unit 40, user after receiving information by unit 10.For adding confidential information, if used Person fails the checking by authentication unit 40, it is impossible to check information content, and by record unit 50 by authentication unit 40 The incorrect checking information carried out retains, can be from record unit 50 after user is correctly by the checking of authentication unit 40 The incorrect verification operation of mistake made above is learnt at place, so have privacy divulge a secret relevant dispute time can be as follow-up legal The evidence that program etc. are relevant, can also let the user know that the incorrect verification operation that specifically who is carried out simultaneously.
Specifically, terminal is also provided with memory element 90, and being used at key content is the associated person information pre-set Time, storing contact information;During user uses, contact person is distinguished and treats, the contact person of some secrets is shifted Entering in memory element 90, the contact person in memory element 90 can be arranged interpolation voluntarily or delete, by memory element 90 by user The information that interior contact person sends just can be encrypted, and carries out routine information exchange between other contact person normally, so User can be avoided to need each information to receiving to verify, thus improve the service efficiency of user.
See Fig. 7, be the schematic block diagram of a kind of terminal that the embodiment of the present invention three provides, as it can be seen, this terminal bag Include:
Recognition unit 10, if needing display information for terminal, identifies information type, specifies every kind of information type not Same key content;
Judging unit 20, is used for according to key content identification information the need of encryption;
Ciphering unit 30, for being encrypted information with hiding information;
Authentication unit 40, for verifying user identity information when needs are opened and added confidential information;
Tip element 60, is used for sending information alert to remind input proof of identity code to carry out authentication;
Feedback unit 70, for when authentication is unsuccessful and the information of needs display is contact person's letter during current talking During breath, interrupt current talking, and send the feedback information of non-user operation.
Specifically, after recognition unit 10 is identified classification to the information received, it is judged that whether unit 20 judges information For needing the information of encryption, if needing the information of encryption, ciphering unit 30 does not show encryption of plaintext to this information Process, meanwhile, user receive add confidential information when, add confidential information and can incidentally produce a proof of identity code, should Proof of identity code incidentally sends when can be produced and can also be by terminal inner and be sent information by sender, is opening encryption During information, Tip element 60 sends prompting, has let the user know that information arrives, and issues the user with the prompting needing checking, uses Family can check the plaintext adding confidential information after the checking by authentication unit 40 just now, learns content therein.If sent Be to add confidential information, when verifying through authentication unit 40, user fail by checking, when recognition unit 10 identify is to hold During information (such as voice call, the video calling requests etc.) that continued access enters, feedback unit 70 carries out interrupt processing to the information accessed, And pre-set feedback information is sent to contact person, when recognition unit 10 identify be the information finished receiving Time (such as word, pictorial information etc.), add in confidential information goes to terminal and store.
Specifically, if receiving when add confidential information, user fails the checking by authentication unit 40, to continuing Property the information that accesses, feedback unit 70 takes the access of interrupting information, sends simultaneously and pre-set feeds back to contact People, allows contact person know the reason that hook information accesses, also avoids contact person again by information access simultaneously;For being received The information completed, goes to tag memory storage, can check just now after correctly by the checking of authentication unit 40, especially, and can All it is gathered in same encryption space so that confidential information will be added, user can be facilitated to search and add confidential information, it is not necessary in all information Interior search, it is more convenient to use.
See Fig. 8, be the schematic block diagram of a kind of terminal that the embodiment of the present invention four provides, as it can be seen, this terminal bag Include:
Recognition unit 10, if needing display information for terminal, identifies information type, specifies every kind of information type not Same key content;
Judging unit 20, is used for according to key content identification information the need of encryption;
Ciphering unit 30, for being encrypted information with hiding information;
Authentication unit 40, for verifying user identity information when needs are opened and added confidential information;
Tip element 60, is used for sending information alert to remind input proof of identity code to carry out authentication;
Decryption unit 80, for adding confidential information to carry out authentication the most secondary identical as user in Preset Time When number reaches default number of times, to adding confidential information deciphering.
Specifically, after recognition unit 10 identifies information and classifies, it is judged that unit 20 judges whether information encrypts for needs Information, if needing the information of encryption, ciphering unit 30 does not show that to information encryption of plaintext processes, with this together Time, Tip element 60 sends prompting, has let the user know that information arrives, and issues the user with the prompting needing checking, Yong Hu By the plaintext adding confidential information can be checked after the checking of authentication unit 40 just now, learn content therein;If user needs Can check an encryption information sharing to other people, then can be to adding checking behavior that confidential information consults repeatedly (not no Less than 2 times) continuous print repeats, and decryption unit 80 adds confidential information to this and is decrypted, and allows this information become letter by ordinary Breath, can be checked by other people.Now unlock is only that this adds confidential information, and other sending identical encryption contact person add secret letter Breath not impact, other add confidential information and remain in that encrypted state.
Specifically, can optionally some be need not encryption behavior information deciphering, for other people share information, for Family provides convenient.
Especially, can arrange a decryption verification to adding confidential information, decryption verification can also pass through authentication unit 40 phase Same verification mode is carried out, and selects to enter decryption verification state, then to encrypt this through decryption verification within adding confidential information Information is decrypted operation.
Further, in above-described embodiment, Tip element 60 is to allow user know by the way of for routine have information to be connect Receiving, such as, vibrations equipment produces vibrations, jingle bell equipment sends sound or controls to show that module sends light and shows, permissible It is one or several combination therein, such as, can shake and jingle bell, particular situation needing it according to user simultaneously It is configured.
Further, in above-described embodiment, authentication unit 40 is by entering the checking information of user with the information of storage Row contrast judges, such as, by fingerprint verification system by user fingerprint with the fingerprint stored in client terminal to mating Verify user identity, allow user input password relatively test compared with the password of record in client terminal by password authentification Card identity, or face identification system wholly or partially verifying user face to contrast with the information prestored Identity etc., can be one or several combinations therein, such as, and need to be by fingerprint authentication and password to be inputted by close Code checking, concrete condition can according to user need it is configured.
Fig. 9 is the structure composition schematic diagram of the embodiment five of the terminal of the present invention.As it is shown in figure 9, it comprises the steps that at least one Individual input equipment 101, at least one outut device 102, bus 103, transceiver 104, memorizer 105 and processor 100, Above-mentioned input equipment 101, outut device 102, transceiver 104, memorizer 105 and processor 100 are connected by bus 103, Wherein:
Input equipment 101, for receiving the input data of outside input terminal 99.In implementing, the embodiment of the present invention Input equipment 101 can include keyboard, mouse, opto-electronic input device, audio input device, touch input device, scanner Deng.
Outut device 102, for the output data of external output terminal.In implementing, the output of the embodiment of the present invention Equipment 102 can include display, speaker, printer etc..
Bus 103, for carrying out communication with other equipment.In implementing, the bus 103 of the embodiment of the present invention passes Broadcast an example of medium.Propagation medium typically can be by computer-readable instruction, data structure, program module or other modulation Other data materializations of data signal (such as carrier wave or other transfer mechanisms) form, for example, propagation medium can include Wired media, such as priority network or straight line connect, and propagation medium may also include wireless medium, such as sound wave, radio frequency, infrared ray Deng.In implementing, the bus 103 of the embodiment of the present invention can be used for receiving the access request accessing terminal.
Transceiver 104, is used for by bus 103 to other equipment sending datas or from other equipment receiving datas. In implementing, the transceiver 104 of the embodiment of the present invention can include the transceiving devices such as radio-frequency antenna.
Memorizer 105, for storing the routine data with various functions.In the embodiment of the present invention, memorizer 105 stores Packet include Internet Service Provider's data available and the unavailable data of Internet Service Provider, and other can call and transport The routine data of row.In implementing, the memorizer 105 of the embodiment of the present invention can be system storage, such as, volatile (such as RAM), non-volatile (such as ROM, flash memory etc.), or both combinations.In implementing, the embodiment of the present invention Memorizer 105 can also is that the external memory storage outside system, such as, disk, CD, tape etc..
Processor 100, such as CPU, for calling the routine data of storage in memorizer 105, and perform following operation:
If terminal 99 needs display information, identifying information type, every kind of information type is designated different key contents; According to key content identification information the need of encryption;If desired encrypt, information is encrypted and is encrypted with hiding information Information also starts Authentication mechanism to verify user identity;If authentication success, show adding confidential information.
Specifically, whether processor 100 is that the content needing encryption judges, to needs to the content receiving information The contact person of encryption or band there is a need to the information of encrypted content and just can be encrypted, and needs encryption when information is confirmed to be Information time, thus well the privacy of all information is carried out anticipation, it is ensured that the information of the privacy received all can be by Protection is arrived, and has ensured the privacy of important information;Meanwhile, user receive need encryption information time, the output of user terminal Equipment 102 does not has to show about the plaintext of this information content, can only know have information to be accepted from outut device 102 so that Not in the case of authentication, anyone the most not can know that the content of wherein information;When user needs awareness information During content, it is desirable to user uses input equipment 101 and sends authentication information to processor 100, processor 100 will be to user The authentication information of input is compared with the information in memorizer 105, only just can learn visiting information after comparison success Content.Since so, user would not be spied on by people or some malicious persons of surrounding under unwitting situation To information content, it is to avoid directly or indirectly lose, ensure the safety of information.
If terminal 99 needs display information, identifying information type, every kind of information type is designated different key contents, Key content is the associated person information pre-set, and according to key content identification information the need of encryption, if desired encrypts, right Information is encrypted and obtains adding confidential information with hiding information and start Authentication mechanism to verify user identity, arranges Proof of identity code, and send information alert with remind input proof of identity code, if authentication success, show adding confidential information Show.
Specifically, in memorizer 105, it is previously provided with needing the associated person information of encryption, when transceiver 104 receives When adding confidential information, the associated person information that transceiver 104 is received by processor 100 and contact person's letter of storage in memorizer 105 Manner of breathing comparison, outut device 102 can send prompting to user, if adding confidential information, user inputs authentication information, when When user needs awareness information content, it is desirable to user uses input equipment 101 and sends authentication information to processor 100, place The identity information prestored in authentication information and the memorizer 105 of user's input will be compared by reason device 100, only than To just learning the content of visiting information after success, during user uses, contact person is distinguished and treats, by private communication The information that contact person in record sends just can be encrypted, and carries out routine information exchange between other contact person normally, as This can be avoided user to need each information to receiving to verify, thus improves the service efficiency of user.
If terminal 99 needs display information, identifying information type, every kind of information type is designated different key contents; According to key content identification information the need of encryption;If desired encrypt, information is encrypted and is encrypted with hiding information Information also starts Authentication mechanism to verify user identity;If authentication success, show adding confidential information; If authentication is unsuccessful and the information of required display is associated person information during current talking, interrupt current talking, concurrently Send the feedback information that non-user operates.
Specifically, in memorizer 105, it is previously provided with needing the associated person information of encryption, when transceiver 104 receives When adding confidential information, the associated person information that transceiver 104 is received by processor 100 and contact person's letter of storage in memorizer 105 Manner of breathing comparison, outut device 102 can send prompting to user, if adding confidential information, user inputs authentication information, when When user needs awareness information content, it is desirable to user uses input equipment 101 and sends authentication information to processor 100, place The identity information prestored in authentication information and the memorizer 105 of user's input will be compared, if tested by reason device 100 Card does not passes through, and processor 100 requires that apersistence information that transceiver 104 interrupts accessing is (such as voice call, video calling Require) and in memorizer 105, extract a feedback message pre-set, issue this contact by transceiver 104 People informs the non-operation in person of the other side, or, transceiver 104 is complete the information of reception (such as word, pictorial information Deng) be transferred in the encryption space of memorizer 105 store, to be verified by after show information content just now.
Specifically, if receiving when adding confidential information, user fails the checking by identity information, and user terminal 99 is right The information that persistence accesses takes the process of interrupting information, sends simultaneously and pre-set feeds back to contact person, allows connection It is people's reason of knowing that interrupting information accesses, also avoids contact person again by information access simultaneously;For finished receiving Information, user terminal will add confidential information and deliver to encrypt space and store, and just now may be used after correctly checking by checking information To check, confidential information will be added and be all gathered in same encryption space, and user can be facilitated to search and add confidential information, it is not necessary to all Searching in information, it is more convenient to use.
If terminal 99 needs display information, identifying information type, every kind of information type is designated different key contents; According to key content identification information the need of encryption;If desired encrypt, information is encrypted and is encrypted with hiding information Information also starts Authentication mechanism to verify user identity;If authentication success, show adding confidential information, If user carries out the number of times that the successful number of times of authentication reaches default, to encryption to the identical confidential information that adds in Preset Time Information is deciphered.
Specifically, receiving after adding confidential information, when user input validation information, processor 100 can to user even The correct number of times of continuous checking is added up, for example, it is possible within a time the shortest (in such as 5 seconds), user sets in input At standby 101, the number of times of the correct verification information of input, if the number of times that processor receives is 1, adds confidential information to this and carries out Display, deciphers normally and checks action in plain text, and after checking end, continuation is kept encrypted state by this information, if number of times During no less than 2 times, (such as when input equipment 104 is verified as fingerprint authentication, finger touches carry out no less than 2 times correct continuously Checking), processor 100 produces and this is added confidential information releases the order of encryption, follow-up checks this information to need not to pass through again Authentication, but this most only releases the encryption of this information, adds confidential information for other and continuation is retained encryption, such as phase The information sent with encryption contact person, a deciphering wherein encryption adding confidential information, this checking this encryption contact person adds Confidential information need not again through authentication, but other information of this encryption contact person (before with follow-up send) all continue to protect Stay encryption.
In several embodiments provided herein, it should be understood that disclosed method, it is only schematically, Can realize by another way.
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit in embodiment of the present invention terminal can merge according to actual needs, divides and delete
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited thereto, and any Those familiar with the art, in the technical scope that the invention discloses, can readily occur in the amendment of various equivalence or replace Changing, these amendments or replacement all should be contained within protection scope of the present invention.Therefore, protection scope of the present invention should be with right The protection domain required is as the criterion.

Claims (10)

1. an information protecting method, it is characterised in that including:
If terminal needs display information, identifying information type, every kind of information type is designated different key contents;
According to information described in described key content identification the need of encryption;
If desired encrypt, be encrypted described information to hide described information and start Authentication mechanism with to user identity Verify;
If authentication success, add confidential information deciphering obtain described needing display information and showing to described.
Method the most according to claim 1, it is characterised in that if desired encrypt, hides described information and obtains adding confidential information And start Authentication mechanism after user identity to be verified, also include:
Send information alert to remind input proof of identity code to carry out authentication.
Method the most according to claim 1, it is characterised in that described method also includes:
If authentication is unsuccessful, carry out retaining and showing after being proved to be successful by unsuccessful checking information.
Method the most according to claim 1, it is characterised in that described method also includes:
If the unsuccessful and described associated person information that information is current talking needing display of authentication, interrupt current talking.
5. according to the method described in any one in claim 1-4, it is characterised in that described method also includes:
If user carries out, to the identical confidential information that adds, the number of times that the successful number of times of authentication reaches default in Preset Time, right The described confidential information that adds is deciphered.
6. a terminal, it is characterised in that including:
Recognition unit, if needing display information for terminal, identifies information type, and every kind of information type is specified different passes Key content;
Judging unit, is used for according to information described in described key content identification the need of encryption;
Ciphering unit, for being encrypted described information to hide described information;
Authentication unit, for verifying user identity information when adding confidential information described in needs are opened.
Terminal the most according to claim 6, it is characterised in that described terminal also includes:
Tip element, is used for sending information alert to remind input proof of identity code to carry out authentication.
Terminal the most according to claim 6, it is characterised in that described terminal also includes:
Record unit, for when authentication is unsuccessful, carries out retaining and after being proved to be successful by unsuccessful checking information Show.
Terminal the most according to claim 6, it is characterised in that described terminal also includes:
Feedback unit, for when authentication is unsuccessful and the information of required display is associated person information during current talking Time, interrupt current talking.
10. according to the terminal according to any one of claim 6-9, it is characterised in that described terminal also includes:
Decryption unit, for carrying out the successful number of times of authentication and reach the identical confidential information that adds as user in Preset Time During the number of times preset, add confidential information deciphering to described.
CN201610753526.6A 2016-08-29 2016-08-29 A kind of information protecting method and terminal Withdrawn CN106231115A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610753526.6A CN106231115A (en) 2016-08-29 2016-08-29 A kind of information protecting method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610753526.6A CN106231115A (en) 2016-08-29 2016-08-29 A kind of information protecting method and terminal

Publications (1)

Publication Number Publication Date
CN106231115A true CN106231115A (en) 2016-12-14

Family

ID=58071233

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610753526.6A Withdrawn CN106231115A (en) 2016-08-29 2016-08-29 A kind of information protecting method and terminal

Country Status (1)

Country Link
CN (1) CN106231115A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107105324A (en) * 2017-03-31 2017-08-29 武汉斗鱼网络科技有限公司 A kind of method and client of protection barrage information
CN107155113A (en) * 2017-03-31 2017-09-12 武汉斗鱼网络科技有限公司 The method and server of a kind of protection barrage information
CN107332973A (en) * 2017-05-19 2017-11-07 北京安云世纪科技有限公司 A kind of processing method of text data, device and mobile terminal
CN107395865A (en) * 2017-06-28 2017-11-24 广东欧珀移动通信有限公司 Pushed information processing method and electronic installation
CN107426410A (en) * 2017-05-26 2017-12-01 上海与德科技有限公司 Private information display methods and device
CN108629203A (en) * 2018-05-10 2018-10-09 Oppo广东移动通信有限公司 Method for information display and Related product
CN111224971A (en) * 2019-12-31 2020-06-02 陕西医链区块链集团有限公司 Block chain data encryption and decryption method and encryption and decryption system
CN111859423A (en) * 2020-07-17 2020-10-30 山东广鹏信息科技有限公司 Information security encryption method and device
CN112487474A (en) * 2020-11-26 2021-03-12 冉令峻 Private information protection system based on big data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1738453A (en) * 2004-08-20 2006-02-22 英业达股份有限公司 Information encryption system and method
CN101754209A (en) * 2010-01-20 2010-06-23 中兴通讯股份有限公司 Method for protecting contents of mobile phone
CN102316214A (en) * 2011-07-26 2012-01-11 上海优思通信科技有限公司 Privacy method for personal information and system
CN104573548A (en) * 2014-12-22 2015-04-29 宇龙计算机通信科技(深圳)有限公司 Information encryption and decryption methods and devices and terminal
CN105554745A (en) * 2016-01-27 2016-05-04 广东欧珀移动通信有限公司 Information management method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1738453A (en) * 2004-08-20 2006-02-22 英业达股份有限公司 Information encryption system and method
CN101754209A (en) * 2010-01-20 2010-06-23 中兴通讯股份有限公司 Method for protecting contents of mobile phone
CN102316214A (en) * 2011-07-26 2012-01-11 上海优思通信科技有限公司 Privacy method for personal information and system
CN104573548A (en) * 2014-12-22 2015-04-29 宇龙计算机通信科技(深圳)有限公司 Information encryption and decryption methods and devices and terminal
CN105554745A (en) * 2016-01-27 2016-05-04 广东欧珀移动通信有限公司 Information management method and system

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107105324A (en) * 2017-03-31 2017-08-29 武汉斗鱼网络科技有限公司 A kind of method and client of protection barrage information
CN107155113A (en) * 2017-03-31 2017-09-12 武汉斗鱼网络科技有限公司 The method and server of a kind of protection barrage information
CN107155113B (en) * 2017-03-31 2021-03-16 武汉斗鱼网络科技有限公司 Method and server for protecting bullet screen information
CN107332973A (en) * 2017-05-19 2017-11-07 北京安云世纪科技有限公司 A kind of processing method of text data, device and mobile terminal
CN107332973B (en) * 2017-05-19 2020-09-25 北京安云世纪科技有限公司 Text data processing method and device and mobile terminal
CN107426410A (en) * 2017-05-26 2017-12-01 上海与德科技有限公司 Private information display methods and device
CN107395865A (en) * 2017-06-28 2017-11-24 广东欧珀移动通信有限公司 Pushed information processing method and electronic installation
CN108629203A (en) * 2018-05-10 2018-10-09 Oppo广东移动通信有限公司 Method for information display and Related product
CN111224971A (en) * 2019-12-31 2020-06-02 陕西医链区块链集团有限公司 Block chain data encryption and decryption method and encryption and decryption system
CN111859423A (en) * 2020-07-17 2020-10-30 山东广鹏信息科技有限公司 Information security encryption method and device
CN112487474A (en) * 2020-11-26 2021-03-12 冉令峻 Private information protection system based on big data
CN112487474B (en) * 2020-11-26 2024-02-02 宁波英派尔科技有限公司 Secret information protection system based on big data

Similar Documents

Publication Publication Date Title
CN106231115A (en) A kind of information protecting method and terminal
US11494754B2 (en) Methods for locating an antenna within an electronic device
CN105848134B (en) Virtual SIM card management device, communication terminal, access control method and management method
EP2742710B1 (en) Method and apparatus for providing a secure virtual environment on a mobile device
JP4733167B2 (en) Information processing apparatus, information processing method, information processing program, and information processing system
US20140075493A1 (en) System and method for location-based protection of mobile data
US9621344B2 (en) Method and system for recovering a security credential
JP2005196776A (en) Safe data communication method and its system between communication terminal and communication equipment
CN105610671A (en) Terminal data protection method and device
WO2015019821A1 (en) Information processing device, information processing method, and computer program
KR100954841B1 (en) Method and Apparatus of managing unity data on mobile device and Recording medium using this
JP2012248198A (en) Safe operation method of computer device
CN105915336A (en) Object cooperative decryption method and device thereof
US20110154436A1 (en) Provider Management Methods and Systems for a Portable Device Running Android Platform
US20110170689A1 (en) Terminal and method for processing encrypted message
JP2007036562A (en) Telephone number registration/authentication system, method, authentication server, and program
US20150264048A1 (en) Information processing apparatus, information processing method, and recording medium
JP2004206258A (en) Multiple authentication system, computer program, and multiple authentication method
KR101971428B1 (en) Contents exchange method based on interaction between users and system performing the same
WO2016030832A1 (en) Method and system for mobile data and communication security
Grinberg End-to-End Authentication: A First Amendment Hook to the Encryption Debate
CN110362976A (en) Biometric security device
KR102383050B1 (en) Device for changing caller indentification using encryption algorithm
CN116204895A (en) Method and terminal for accessing specific data
KR101644070B1 (en) Email service method and system for mobile

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20161214