CN106326768B - A kind of approaches to IM, device and intelligent terminal - Google Patents

A kind of approaches to IM, device and intelligent terminal Download PDF

Info

Publication number
CN106326768B
CN106326768B CN201610709714.9A CN201610709714A CN106326768B CN 106326768 B CN106326768 B CN 106326768B CN 201610709714 A CN201610709714 A CN 201610709714A CN 106326768 B CN106326768 B CN 106326768B
Authority
CN
China
Prior art keywords
information
application program
security level
security
memory space
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610709714.9A
Other languages
Chinese (zh)
Other versions
CN106326768A (en
Inventor
黄宏用
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610709714.9A priority Critical patent/CN106326768B/en
Publication of CN106326768A publication Critical patent/CN106326768A/en
Application granted granted Critical
Publication of CN106326768B publication Critical patent/CN106326768B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of approaches to IM, device and intelligent terminals.This method comprises: determining the security level of at least one information of application program;Determine the security classification of the associated memory space of the security level;At least one information of the application program is stored in the memory space of the security classification.Technical solution provided in an embodiment of the present invention; by in the information storage to the memory space of different security classifications by the different security levels of application program; it is pointedly protected with the information to different security levels; it is all stored in identical memory space compared to by all information of application program; the safety for improving information improves user to the usage experience of application program.

Description

A kind of approaches to IM, device and intelligent terminal
Technical field
The present invention relates to technical field of information processing, especially a kind of approaches to IM, device and intelligent terminal.
Background technique
With the fast development of Internet technology, the intelligent terminal of such as smart phone and tablet computer etc is general And and as the function of application for including in intelligent terminal is more and more, the work of people, life, amusement are all be unable to do without Intelligent terminal.In order to meet user demand, increasingly applied to the APP (application, application program) on intelligent terminal More, function is more and more abundant, but also derives many problems simultaneously.
Application program is related to much information, these information are stored in the corresponding memory space of application program at present, and one The corresponding memory space of denier application program is invaded, then may cause user information leakage, so that the privacy of user or again Want information that cannot be protected, the safety of data is poor.
Summary of the invention
The embodiment of the present invention is designed to provide a kind of approaches to IM, device and intelligent terminal, to improve application The information security of program.
In a first aspect, the embodiment of the invention provides a kind of approaches to IM, comprising:
Determine the security level of at least one information of application program;
Determine the security classification of the associated memory space of the security level;
At least one information of the application program is stored in the memory space of the security classification.
Second aspect, the embodiment of the invention provides a kind of apparatus for management of information, comprising:
Security level determining module, the security level of at least one information for determining application program;
Security classification determining module, for determining the security classification of the associated memory space of the security level;
Information storage module is stored in the storage of the security classification at least one information by the application program In space.
The third aspect, the embodiment of the invention provides a kind of intelligent terminal, the letter provided including any embodiment of that present invention Cease managing device.
Technical solution provided in an embodiment of the present invention, the security level of at least one information by determining application program, It determines the security classification of the associated memory space of security level, and at least one information of application program is stored in security classification Memory space in, that is, by the way that the storage of the information of the different security levels of application program storage to different security classifications is empty In, it is pointedly protected with the information to different security levels, is all stored compared to by all information of application program In in identical memory space, the safety of information is improved, improves user to the usage experience of application program.
Detailed description of the invention
Fig. 1 is the flow diagram for the approaches to IM that the embodiment of the present invention one provides;
Fig. 2 is the flow diagram of approaches to IM provided by Embodiment 2 of the present invention;
Fig. 3 is the flow diagram for the approaches to IM that the embodiment of the present invention three provides;
Fig. 4 is the structural schematic diagram for the apparatus for management of information that the embodiment of the present invention four provides;
Fig. 5 is the structural schematic diagram for the intelligent terminal that the embodiment of the present invention five provides.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
Embodiment one
Fig. 1 is the flow diagram for the approaches to IM that the embodiment of the present invention one provides, and this method can be by message tube It manages device to execute, wherein the device can be by software and or hardware realization, and a part that can be used as intelligent terminal is built in intelligence It can terminal inner.As shown in Figure 1, the implementation process includes:
Step 11, determine application program at least one information security level.
In the present embodiment, application program can be mounted application program in intelligent terminal, be also possible to need to pacify The application program of dress.The information of application program is referred to using information needed for application program, alternatively, using application program process The information of generation, for example, application program information can be account user name information, account password information, communications records information with And use information etc..By taking application program is the application of instant messaging class as an example, communications records can be the chat record of user, use Information can be information issue record and game records of user etc..Wherein, security level can according to information leakage to The severity that family causes damages determines.
Illustratively, the security level for determining at least one information of application program may include: the setting according to user Operate the security level for determining at least one information of application program.Specifically, during security application, Yong Huke Artificially to set the security level of the variety classes information of application program according to self-demand, such as user can will apply journey The account password information of sequence is set as high security level, the browsing of application program can be recorded and be set as low security level etc.. The security level that user artificially sets the information of application program can satisfy different user to of application information safety Property demand, to a certain extent promoted user experience satisfaction.It should be noted that the safety level of information in the present embodiment Other method of determination is not especially limited, such as the peace of the information of application program can also be determined according to the type of application program Full rank.
Step 12, the security classification for determining the associated memory space of the security level.
In the present embodiment, intelligent terminal provides the memory space with different security classifications, i.e., different memory spaces Secure fashion it is different so that user is different to the access right of different memory spaces, to reach to different security classifications The content stored in memory space does different degrees of protection.Specifically, storage associated by the higher information of security level is empty Between security classification it is higher, in order to protect the higher information of security level;Storage associated by the lower information of security level The security classification in space is lower, in order to which user uses the lower information of security level.
Specifically, being directed to each information of application program, memory space associated by the security level of the information is determined Security classification.
At least one information of the application program is stored in the memory space of the security classification by step 13.
Specifically, being directed to each information of application program, the storage for storing the information into corresponding security classification is empty In.
Due to being not that all information of application program all refer to the privacy of user, if all letters of shielding application program Breath, i.e., store all information of application program into the higher memory space of security classification, will bring to the use of user Trouble, has lost the convenience of application program.Technical solution provided in this embodiment, by the information to different security levels into Row is pointedly protected, and is not only increased the safety of the information of application program, has also been taken into account the convenience of application program.
Technical solution provided in this embodiment, the security level of at least one information by determining application program, determines The security classification of the associated memory space of security level, and at least one information of application program is stored in depositing for security classification It stores up in space, that is, by storing the information of the different security levels of application program into the memory space of different security classifications, It is pointedly protected with the information to different security levels, it is identical compared to being all stored in all information of application program Memory space in, improve the safety of information.Also, it is corresponding to improve user for the convenience for also having taken into account application program With the usage experience of program.
Embodiment two
The present embodiment on the basis of the above embodiment 1, provides a kind of new approaches to IM.Fig. 2 is the present invention The flow diagram for the approaches to IM that embodiment two provides, as shown in Fig. 2, the implementation process includes:
Step 21, according to application program attribute information determine the application program at least one information safety level Not.
Wherein, the attribute information of application program may include the type of application program, thus the attribute according to application program Information can determine the security level of the variety classes information of application program.For example, the account name of financial category application program, account The information such as password, record of transferring accounts, Investment & Financing record are high security level, the payment record of financial category application program, payment note The information such as record, information are low security levels etc.;The account password and address list of instant messaging class application program are high security levels, Chat record is low security level etc.;The account modification logging and payment cipher of game class application are high security level, game note Record is low security level etc..
Wherein, the attribute information of application program can also directly include the safety level of the variety classes information of application program Not.As application program provider presets the security level of variety classes information in the application in advance.
Step 22, the security classification for determining the associated memory space of the security level.
In the present embodiment, intelligent terminal provides the memory space with different security classifications, i.e., different memory spaces Secure fashion it is different so that user is different to the access right of different memory spaces, to reach to different security classifications The content stored in memory space does different degrees of protection.Specifically, storage associated by the higher information of security level is empty Between security classification it is higher, in order to protect the higher information of security level;Storage associated by the lower information of security level The security classification in space is lower, in order to which user uses the lower information of security level.
At least one information of the application program is stored in the memory space of the security classification by step 23.
Technical solution provided in this embodiment determines at least the one of application program by the attribute information according to application program The security level of kind of information, determines the security classification of the associated memory space of security level, and by at least one of application program Information is stored in the memory space of security classification.Attribute information of this method according to application program, by the difference of application program In the information storage to the memory space of different security classifications of security level, the personalization protection to application program is realized, is mentioned The high safety of application program.
Embodiment three
The present embodiment provides a kind of new approaches to IM on the basis of above-described embodiment one and embodiment two. Fig. 3 is the flow diagram for the approaches to IM that the embodiment of the present invention three provides, as shown in figure 3, the implementation process includes:
Step 31, the security level for determining the account information of the application program are secrets.
In the present embodiment, account information may include in account user name, Account Logon password and bill payment password At least one.
Step 32, the security level for determining the communication record information of the application program are secret.
In the present embodiment, communication record information can be the chat record information of instant messaging class application program, forum Class application program post or money order receipt to be signed and returned to the sender record information etc..
Step 33, the security level for determining the usage record information of the application program are common.
In the present embodiment, usage record information refers to the other application in addition to account information and communication record information The data of program.
Step 34 determines that security level be the security classification of memory space of the information association of secret is that top secret forbids visiting It asks.
Step 35 determines that security level be the security classification of the memory space of secret information association is that secret forbids writing Enter.
Step 36, determine security level be the security classification of the memory space of common information association be allow access write Enter.
At least one information of the application program is stored in the memory space of the security classification by step 37.
In memory space in the program by the way that the account information storage of application program to be forbidden to access to top secret, it can keep away Exempt from the leakage of account information;It, can in the memory space that the communication record information storage of application program is forbidden to write-in to secret Communication record information is avoided to be tampered;By the not high usage record information storage of safety to the memory space for allowing to access write-in It is interior, it can be improved the convenience of usage record information.
Also, it is secret memory space that intelligent terminal, which can also be provided with security classification, and memory space differentiation can visit Ask user.It is wherein top-secret to forbid access, secret that write-in, secret is forbidden to distinguish user and allow to access the security classification being written successively It reduces.
Technical solution provided in this embodiment sets the memory space of multiple and different security classifications in an intelligent terminal, point Different security levels are not corresponded to, and the information that all application programs are related to is classified according to security level;By similar safety level Other information is stored in the memory space of corresponding security classification;The memory space of different security classifications, security mechanism It is different.I.e. the program improves the safety of information by being managed collectively after being classified by the information of application program.
Example IV
Fig. 4 is the structural schematic diagram for the apparatus for management of information that the embodiment of the present invention four provides, which can be configured at intelligence In energy terminal.As shown in figure 4, the specific structure of the apparatus for management of information may include:
Security level determining module 41, the security level of at least one information for determining application program;
Security classification determining module 42, for determining the security classification of the associated memory space of the security level;
Information storage module 43, at least one information of the application program to be stored in depositing for the security classification It stores up in space.
Illustratively, the security level determining module 41 specifically can be used for:
Setting operation according to user determines the security level of at least one information of application program.
Illustratively, the security level determining module 41 specifically can be used for:
Attribute information according to application program determines the security level of at least one information of the application program.
Illustratively, the security level determining module 41 may include:
Secret level units, for determining that the security level of account information of the application program is secret;
Secret classifications unit, for determining that the security level of communication record information of the application program is secret;
Common grade unit, for determining that the security level of usage record information of the application program is common.
Illustratively, the security classification determining module 42 may include:
Forbid access unit, for determine security level be secret information association memory space security classification be prohibit Only access;
Forbid writing unit, for determining that security level be the security classification of the memory space of secret information association is to prohibit Only be written;
Allow access unit, for determining that security level be the security classification of the memory space of common information association is fair Perhaps access write-in.
Apparatus for management of information provided in this embodiment belongs to approaches to IM provided by any embodiment of the invention Approaches to IM provided by any embodiment of the invention can be performed in same inventive concept, has execution information management method Corresponding functional module and beneficial effect.The not technical detail of detailed description in the present embodiment, reference can be made to the present invention is arbitrarily real The approaches to IM of example offer is provided.
Embodiment five
A kind of intelligent terminal is present embodiments provided, which may include the letter that any embodiment of that present invention provides Cease managing device.Fig. 5 is the structural schematic diagram for the intelligent terminal that the embodiment of the present invention five provides, as shown in figure 5, illustrating intelligent hand Machine 500 may include: memory 501, central processing unit (Central Processing Unit, hereinafter referred to as CPU) 502, outer If interface 503, RF circuit 505, voicefrequency circuit 506, loudspeaker 511, power management chip 508, input/output (I/O) subsystem System 509, other input/control devicess 510 and outside port 504, these components pass through one or more communication bus or letter Number line 507 communicates.
It should be understood that an example of diagram smart phone 500 only intelligent terminal, and smart phone 500 can To have than shown in the drawings more or less component, two or more components can be combined, or can have There is different component configurations.Various parts shown in the drawings can include one or more signal processings and/or dedicated collection It is realized in combination at hardware, software or hardware and software including circuit.
Just the smart phone provided in this embodiment for information management is described in detail below.
Memory 501: the memory 501 can be accessed by CPU502, Peripheral Interface 503 etc., and the memory 501 can It can also include nonvolatile memory to include high-speed random access memory, such as one or more disk memory, Flush memory device or other volatile solid-state parts.
The peripheral hardware that outputs and inputs of equipment can be connected to CPU502 and storage by Peripheral Interface 503, the Peripheral Interface Device 501.
I/O subsystem 509: the I/O subsystem 509 can be by the input/output peripheral in equipment, such as touch screen 502 (being equivalent to the display in above-described embodiment) and other input/control devicess 510, are connected to Peripheral Interface 503.I/O subsystem System 509 may include display controller 5091 and one or more input controls for controlling other input/control devicess 510 Device 5092.Wherein, one or more input controllers 5092 from other input/control devicess 510 receive electric signal or to its He sends electric signal at input/control devices 510, other input/control devicess 510 may include that physical button (shake by push button Arm button etc.), dial, slide switch, control stick, click idler wheel.It is worth noting that input controller 5092 can with Any one lower connection: the indicating equipment of keyboard, infrared port, USB interface and such as mouse.
Touch screen 512: the touch screen 512 is the input interface and output interface between user terminal and user, can It is shown to user depending on output, visual output may include figure, text, icon, video etc..
Display controller 5091 in I/O subsystem 509 receives electric signal from touch screen 512 or sends out to touch screen 512 Electric signals.Touch screen 512 detects the contact on touch screen, and the contact that display controller 5091 will test is converted to and is shown The interaction of user interface object on touch screen 512, i.e. realization human-computer interaction, the user interface being shown on touch screen 512 Object can be the icon of running game, the icon for being networked to corresponding network etc..It is worth noting that equipment can also include light Mouse, light mouse are the extensions for the touch sensitive surface for not showing the touch sensitive surface visually exported, or formed by touch screen.
RF circuit 505 is mainly used for establishing the communication of mobile phone Yu wireless network (i.e. network side), realizes mobile phone and wireless network The data receiver of network and transmission.Such as transmitting-receiving short message, Email etc..Specifically, RF circuit 505 receives and sends RF letter Number, RF signal is also referred to as electromagnetic signal, and RF circuit 505 converts electrical signals to electromagnetic signal or electromagnetic signal is converted to telecommunications Number, and communicated by the electromagnetic signal with communication network and other equipment.RF circuit 505 may include for executing The known circuit of these functions comprising but it is not limited to antenna system, RF transceiver, one or more amplifiers, tuner, one A or multiple oscillators, digital signal processor, CODEC chipset, Subscriber Identity Module (Subscriber Identity Module, SIM) etc..
Voicefrequency circuit 506 is mainly used for receiving audio data from Peripheral Interface 503, which is converted to telecommunications Number, and the electric signal is sent to loudspeaker 511.
Loudspeaker 511 is reduced to sound for mobile phone to be passed through RF circuit 505 from the received voice signal of wireless network And the sound is played to user.
Power management chip 508, the hardware for being connected by CPU502, I/O subsystem and Peripheral Interface are powered And power management.
The executable following operation of CPU502 provided in an embodiment of the present invention:
Determine the security level of at least one information of application program;
Determine the security classification of the associated memory space of the security level;
At least one information of the application program is stored in the memory space of the security classification.
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.

Claims (11)

1. a kind of approaches to IM characterized by comprising
Determine the security level of at least one information of application program, wherein different types of information of the application program has Standby different security level, the information of the application program are using information needed for the application program, alternatively, described in use The information that application program process generates;
Determine the security classification of the associated memory space of the security level;
At least one information of the application program is stored in the memory space of the security classification.
2. approaches to IM according to claim 1, which is characterized in that determine at least one information of application program Security level, comprising:
Setting operation according to user determines the security level of at least one information of application program.
3. approaches to IM according to claim 1, which is characterized in that determine at least one information of application program Security level, comprising:
Attribute information according to application program determines the security level of at least one information of the application program.
4. approaches to IM according to claim 1-3, which is characterized in that determine at least the one of application program The security level of kind information, comprising:
The security level for determining the account information of the application program is secret;
Determine that the security level of the communication record information of the application program is secret;
Determine that the security level of the usage record information of the application program is common.
5. approaches to IM according to claim 4, which is characterized in that determine that the associated storage of the security level is empty Between security classification, comprising:
Determine that security level be the security classification of memory space of the information association of secret is that top secret forbids accessing;
Determine that security level be the security classification of the memory space of secret information association is that secret forbids being written;
Determine security level be the security classification of the memory space of common information association be allow access be written.
6. a kind of apparatus for management of information characterized by comprising
Security level determining module, the security level of at least one information for determining application program, wherein described to apply journey Different types of information of sequence has different security levels, and the information of the application program is using needed for the application program Information, alternatively, use the application program process generate information;
Security classification determining module, for determining the security classification of the associated memory space of the security level;
Information storage module is stored in the memory space of the security classification at least one information by the application program It is interior.
7. apparatus for management of information according to claim 6, which is characterized in that the security level determining module is specifically used In:
Setting operation according to user determines the security level of at least one information of application program.
8. apparatus for management of information according to claim 6, which is characterized in that the security level determining module is specifically used In:
Attribute information according to application program determines the security level of at least one information of the application program.
9. according to the described in any item apparatus for management of information of claim 6-8, which is characterized in that the security level determining module Include:
Secret level units, for determining that the security level of account information of the application program is secret;
Secret classifications unit, for determining that the security level of communication record information of the application program is secret;
Common grade unit, for determining that the security level of usage record information of the application program is common.
10. apparatus for management of information according to claim 9, which is characterized in that the security classification determining module includes:
Forbid access unit, for determining that security level be the security classification of memory space of the information association of secret is to forbid visiting It asks;
Forbid writing unit, for determining that security level be the security classification of the memory space of secret information association is to forbid writing Enter;
Allow access unit, for determining that security level be the security classification of the memory space of common information association is to allow to visit Ask write-in.
11. a kind of intelligent terminal, which is characterized in that including the described in any item apparatus for management of information of claim 6-10.
CN201610709714.9A 2016-08-23 2016-08-23 A kind of approaches to IM, device and intelligent terminal Active CN106326768B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610709714.9A CN106326768B (en) 2016-08-23 2016-08-23 A kind of approaches to IM, device and intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610709714.9A CN106326768B (en) 2016-08-23 2016-08-23 A kind of approaches to IM, device and intelligent terminal

Publications (2)

Publication Number Publication Date
CN106326768A CN106326768A (en) 2017-01-11
CN106326768B true CN106326768B (en) 2019-05-07

Family

ID=57742184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610709714.9A Active CN106326768B (en) 2016-08-23 2016-08-23 A kind of approaches to IM, device and intelligent terminal

Country Status (1)

Country Link
CN (1) CN106326768B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109933994B (en) * 2017-12-18 2024-03-29 北京三快在线科技有限公司 Data hierarchical storage method and device and computing equipment
US11321471B2 (en) 2017-12-18 2022-05-03 Beijing Sankuai Online Technology Co., Ltd Encrypted storage of data
CN108647527B (en) 2018-04-17 2020-11-17 创新先进技术有限公司 File packing method, file packing device, file unpacking device and network equipment
CN108614977A (en) * 2018-04-28 2018-10-02 惠州市德赛西威汽车电子股份有限公司 A kind of vehicle-mounted sensitive data method for secure storing and its system for supporting HSM

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6662020B1 (en) * 1999-08-27 2003-12-09 Telefonaktiebolaget Lm Ericsson (Publ) Arrangement for effecting secure transactions in a communication device
CN101072414A (en) * 2007-07-09 2007-11-14 华为技术有限公司 Method and device for managing and protecting mobile terminal device information
CN102006358A (en) * 2010-11-02 2011-04-06 深圳市金立通信设备有限公司 Mobile phone private communication management system and method
CN103369525A (en) * 2013-07-30 2013-10-23 东莞宇龙通信科技有限公司 Terminal and data processing method
CN104038613A (en) * 2013-03-07 2014-09-10 腾讯科技(深圳)有限公司 Method and apparatus for information security management
CN104517069A (en) * 2015-01-12 2015-04-15 联想(北京)有限公司 Information processing method and electronic equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102467462B (en) * 2010-11-17 2015-03-11 中国移动通信集团公司 Method for protecting data stored in device and corresponding device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6662020B1 (en) * 1999-08-27 2003-12-09 Telefonaktiebolaget Lm Ericsson (Publ) Arrangement for effecting secure transactions in a communication device
CN101072414A (en) * 2007-07-09 2007-11-14 华为技术有限公司 Method and device for managing and protecting mobile terminal device information
CN102006358A (en) * 2010-11-02 2011-04-06 深圳市金立通信设备有限公司 Mobile phone private communication management system and method
CN104038613A (en) * 2013-03-07 2014-09-10 腾讯科技(深圳)有限公司 Method and apparatus for information security management
CN103369525A (en) * 2013-07-30 2013-10-23 东莞宇龙通信科技有限公司 Terminal and data processing method
CN104517069A (en) * 2015-01-12 2015-04-15 联想(北京)有限公司 Information processing method and electronic equipment

Also Published As

Publication number Publication date
CN106326768A (en) 2017-01-11

Similar Documents

Publication Publication Date Title
CN106326768B (en) A kind of approaches to IM, device and intelligent terminal
US11258810B2 (en) Identity authentication method, apparatus, and system
CN106534572A (en) Information display method and device and terminal
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN104346560B (en) A kind of safe verification method and device
CN104966005A (en) Access control method and terminal apparatus
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN106657589A (en) Message alert method and message alert device for multi-open applications, and mobile terminal
CN108960839B (en) Payment method and device
CN106709034A (en) File protection method and apparatus, and terminal
CN106529310A (en) Method and device for inhibiting screen capture
CN107395880A (en) Method for information display, device and terminal
CN106453802A (en) Cipher verification method and device, and terminal
CN106484547A (en) A kind of management method, device and terminal for opening application more
CN109219003B (en) Information encryption method and device, storage medium and electronic equipment
CN104967593A (en) Identity verification method, apparatus and system
CN107666583A (en) Call handling method and terminal
CN108718271A (en) Processing method, device, storage medium and the terminal of good friend's request
CN106485136A (en) The authority configuring method of application program, device and mobile terminal
CN108537027A (en) Resource allocation methods and device, terminal, computer readable storage medium
CN105577375A (en) Identity authentication method and device
CN106294027A (en) A kind of data back up method, device, carrier server and mobile terminal
CN103812996A (en) Information prompting method and apparatus, and terminal
CN106937258A (en) A kind of control method of broadcast, device and mobile terminal
CN105488678A (en) Payment behavior information acquisition method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: Guangdong OPPO Mobile Communications Co., Ltd.

GR01 Patent grant
GR01 Patent grant