CN106326768B - A kind of approaches to IM, device and intelligent terminal - Google Patents
A kind of approaches to IM, device and intelligent terminal Download PDFInfo
- Publication number
- CN106326768B CN106326768B CN201610709714.9A CN201610709714A CN106326768B CN 106326768 B CN106326768 B CN 106326768B CN 201610709714 A CN201610709714 A CN 201610709714A CN 106326768 B CN106326768 B CN 106326768B
- Authority
- CN
- China
- Prior art keywords
- information
- application program
- security level
- security
- memory space
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a kind of approaches to IM, device and intelligent terminals.This method comprises: determining the security level of at least one information of application program;Determine the security classification of the associated memory space of the security level;At least one information of the application program is stored in the memory space of the security classification.Technical solution provided in an embodiment of the present invention; by in the information storage to the memory space of different security classifications by the different security levels of application program; it is pointedly protected with the information to different security levels; it is all stored in identical memory space compared to by all information of application program; the safety for improving information improves user to the usage experience of application program.
Description
Technical field
The present invention relates to technical field of information processing, especially a kind of approaches to IM, device and intelligent terminal.
Background technique
With the fast development of Internet technology, the intelligent terminal of such as smart phone and tablet computer etc is general
And and as the function of application for including in intelligent terminal is more and more, the work of people, life, amusement are all be unable to do without
Intelligent terminal.In order to meet user demand, increasingly applied to the APP (application, application program) on intelligent terminal
More, function is more and more abundant, but also derives many problems simultaneously.
Application program is related to much information, these information are stored in the corresponding memory space of application program at present, and one
The corresponding memory space of denier application program is invaded, then may cause user information leakage, so that the privacy of user or again
Want information that cannot be protected, the safety of data is poor.
Summary of the invention
The embodiment of the present invention is designed to provide a kind of approaches to IM, device and intelligent terminal, to improve application
The information security of program.
In a first aspect, the embodiment of the invention provides a kind of approaches to IM, comprising:
Determine the security level of at least one information of application program;
Determine the security classification of the associated memory space of the security level;
At least one information of the application program is stored in the memory space of the security classification.
Second aspect, the embodiment of the invention provides a kind of apparatus for management of information, comprising:
Security level determining module, the security level of at least one information for determining application program;
Security classification determining module, for determining the security classification of the associated memory space of the security level;
Information storage module is stored in the storage of the security classification at least one information by the application program
In space.
The third aspect, the embodiment of the invention provides a kind of intelligent terminal, the letter provided including any embodiment of that present invention
Cease managing device.
Technical solution provided in an embodiment of the present invention, the security level of at least one information by determining application program,
It determines the security classification of the associated memory space of security level, and at least one information of application program is stored in security classification
Memory space in, that is, by the way that the storage of the information of the different security levels of application program storage to different security classifications is empty
In, it is pointedly protected with the information to different security levels, is all stored compared to by all information of application program
In in identical memory space, the safety of information is improved, improves user to the usage experience of application program.
Detailed description of the invention
Fig. 1 is the flow diagram for the approaches to IM that the embodiment of the present invention one provides;
Fig. 2 is the flow diagram of approaches to IM provided by Embodiment 2 of the present invention;
Fig. 3 is the flow diagram for the approaches to IM that the embodiment of the present invention three provides;
Fig. 4 is the structural schematic diagram for the apparatus for management of information that the embodiment of the present invention four provides;
Fig. 5 is the structural schematic diagram for the intelligent terminal that the embodiment of the present invention five provides.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just
Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
Embodiment one
Fig. 1 is the flow diagram for the approaches to IM that the embodiment of the present invention one provides, and this method can be by message tube
It manages device to execute, wherein the device can be by software and or hardware realization, and a part that can be used as intelligent terminal is built in intelligence
It can terminal inner.As shown in Figure 1, the implementation process includes:
Step 11, determine application program at least one information security level.
In the present embodiment, application program can be mounted application program in intelligent terminal, be also possible to need to pacify
The application program of dress.The information of application program is referred to using information needed for application program, alternatively, using application program process
The information of generation, for example, application program information can be account user name information, account password information, communications records information with
And use information etc..By taking application program is the application of instant messaging class as an example, communications records can be the chat record of user, use
Information can be information issue record and game records of user etc..Wherein, security level can according to information leakage to
The severity that family causes damages determines.
Illustratively, the security level for determining at least one information of application program may include: the setting according to user
Operate the security level for determining at least one information of application program.Specifically, during security application, Yong Huke
Artificially to set the security level of the variety classes information of application program according to self-demand, such as user can will apply journey
The account password information of sequence is set as high security level, the browsing of application program can be recorded and be set as low security level etc..
The security level that user artificially sets the information of application program can satisfy different user to of application information safety
Property demand, to a certain extent promoted user experience satisfaction.It should be noted that the safety level of information in the present embodiment
Other method of determination is not especially limited, such as the peace of the information of application program can also be determined according to the type of application program
Full rank.
Step 12, the security classification for determining the associated memory space of the security level.
In the present embodiment, intelligent terminal provides the memory space with different security classifications, i.e., different memory spaces
Secure fashion it is different so that user is different to the access right of different memory spaces, to reach to different security classifications
The content stored in memory space does different degrees of protection.Specifically, storage associated by the higher information of security level is empty
Between security classification it is higher, in order to protect the higher information of security level;Storage associated by the lower information of security level
The security classification in space is lower, in order to which user uses the lower information of security level.
Specifically, being directed to each information of application program, memory space associated by the security level of the information is determined
Security classification.
At least one information of the application program is stored in the memory space of the security classification by step 13.
Specifically, being directed to each information of application program, the storage for storing the information into corresponding security classification is empty
In.
Due to being not that all information of application program all refer to the privacy of user, if all letters of shielding application program
Breath, i.e., store all information of application program into the higher memory space of security classification, will bring to the use of user
Trouble, has lost the convenience of application program.Technical solution provided in this embodiment, by the information to different security levels into
Row is pointedly protected, and is not only increased the safety of the information of application program, has also been taken into account the convenience of application program.
Technical solution provided in this embodiment, the security level of at least one information by determining application program, determines
The security classification of the associated memory space of security level, and at least one information of application program is stored in depositing for security classification
It stores up in space, that is, by storing the information of the different security levels of application program into the memory space of different security classifications,
It is pointedly protected with the information to different security levels, it is identical compared to being all stored in all information of application program
Memory space in, improve the safety of information.Also, it is corresponding to improve user for the convenience for also having taken into account application program
With the usage experience of program.
Embodiment two
The present embodiment on the basis of the above embodiment 1, provides a kind of new approaches to IM.Fig. 2 is the present invention
The flow diagram for the approaches to IM that embodiment two provides, as shown in Fig. 2, the implementation process includes:
Step 21, according to application program attribute information determine the application program at least one information safety level
Not.
Wherein, the attribute information of application program may include the type of application program, thus the attribute according to application program
Information can determine the security level of the variety classes information of application program.For example, the account name of financial category application program, account
The information such as password, record of transferring accounts, Investment & Financing record are high security level, the payment record of financial category application program, payment note
The information such as record, information are low security levels etc.;The account password and address list of instant messaging class application program are high security levels,
Chat record is low security level etc.;The account modification logging and payment cipher of game class application are high security level, game note
Record is low security level etc..
Wherein, the attribute information of application program can also directly include the safety level of the variety classes information of application program
Not.As application program provider presets the security level of variety classes information in the application in advance.
Step 22, the security classification for determining the associated memory space of the security level.
In the present embodiment, intelligent terminal provides the memory space with different security classifications, i.e., different memory spaces
Secure fashion it is different so that user is different to the access right of different memory spaces, to reach to different security classifications
The content stored in memory space does different degrees of protection.Specifically, storage associated by the higher information of security level is empty
Between security classification it is higher, in order to protect the higher information of security level;Storage associated by the lower information of security level
The security classification in space is lower, in order to which user uses the lower information of security level.
At least one information of the application program is stored in the memory space of the security classification by step 23.
Technical solution provided in this embodiment determines at least the one of application program by the attribute information according to application program
The security level of kind of information, determines the security classification of the associated memory space of security level, and by at least one of application program
Information is stored in the memory space of security classification.Attribute information of this method according to application program, by the difference of application program
In the information storage to the memory space of different security classifications of security level, the personalization protection to application program is realized, is mentioned
The high safety of application program.
Embodiment three
The present embodiment provides a kind of new approaches to IM on the basis of above-described embodiment one and embodiment two.
Fig. 3 is the flow diagram for the approaches to IM that the embodiment of the present invention three provides, as shown in figure 3, the implementation process includes:
Step 31, the security level for determining the account information of the application program are secrets.
In the present embodiment, account information may include in account user name, Account Logon password and bill payment password
At least one.
Step 32, the security level for determining the communication record information of the application program are secret.
In the present embodiment, communication record information can be the chat record information of instant messaging class application program, forum
Class application program post or money order receipt to be signed and returned to the sender record information etc..
Step 33, the security level for determining the usage record information of the application program are common.
In the present embodiment, usage record information refers to the other application in addition to account information and communication record information
The data of program.
Step 34 determines that security level be the security classification of memory space of the information association of secret is that top secret forbids visiting
It asks.
Step 35 determines that security level be the security classification of the memory space of secret information association is that secret forbids writing
Enter.
Step 36, determine security level be the security classification of the memory space of common information association be allow access write
Enter.
At least one information of the application program is stored in the memory space of the security classification by step 37.
In memory space in the program by the way that the account information storage of application program to be forbidden to access to top secret, it can keep away
Exempt from the leakage of account information;It, can in the memory space that the communication record information storage of application program is forbidden to write-in to secret
Communication record information is avoided to be tampered;By the not high usage record information storage of safety to the memory space for allowing to access write-in
It is interior, it can be improved the convenience of usage record information.
Also, it is secret memory space that intelligent terminal, which can also be provided with security classification, and memory space differentiation can visit
Ask user.It is wherein top-secret to forbid access, secret that write-in, secret is forbidden to distinguish user and allow to access the security classification being written successively
It reduces.
Technical solution provided in this embodiment sets the memory space of multiple and different security classifications in an intelligent terminal, point
Different security levels are not corresponded to, and the information that all application programs are related to is classified according to security level;By similar safety level
Other information is stored in the memory space of corresponding security classification;The memory space of different security classifications, security mechanism
It is different.I.e. the program improves the safety of information by being managed collectively after being classified by the information of application program.
Example IV
Fig. 4 is the structural schematic diagram for the apparatus for management of information that the embodiment of the present invention four provides, which can be configured at intelligence
In energy terminal.As shown in figure 4, the specific structure of the apparatus for management of information may include:
Security level determining module 41, the security level of at least one information for determining application program;
Security classification determining module 42, for determining the security classification of the associated memory space of the security level;
Information storage module 43, at least one information of the application program to be stored in depositing for the security classification
It stores up in space.
Illustratively, the security level determining module 41 specifically can be used for:
Setting operation according to user determines the security level of at least one information of application program.
Illustratively, the security level determining module 41 specifically can be used for:
Attribute information according to application program determines the security level of at least one information of the application program.
Illustratively, the security level determining module 41 may include:
Secret level units, for determining that the security level of account information of the application program is secret;
Secret classifications unit, for determining that the security level of communication record information of the application program is secret;
Common grade unit, for determining that the security level of usage record information of the application program is common.
Illustratively, the security classification determining module 42 may include:
Forbid access unit, for determine security level be secret information association memory space security classification be prohibit
Only access;
Forbid writing unit, for determining that security level be the security classification of the memory space of secret information association is to prohibit
Only be written;
Allow access unit, for determining that security level be the security classification of the memory space of common information association is fair
Perhaps access write-in.
Apparatus for management of information provided in this embodiment belongs to approaches to IM provided by any embodiment of the invention
Approaches to IM provided by any embodiment of the invention can be performed in same inventive concept, has execution information management method
Corresponding functional module and beneficial effect.The not technical detail of detailed description in the present embodiment, reference can be made to the present invention is arbitrarily real
The approaches to IM of example offer is provided.
Embodiment five
A kind of intelligent terminal is present embodiments provided, which may include the letter that any embodiment of that present invention provides
Cease managing device.Fig. 5 is the structural schematic diagram for the intelligent terminal that the embodiment of the present invention five provides, as shown in figure 5, illustrating intelligent hand
Machine 500 may include: memory 501, central processing unit (Central Processing Unit, hereinafter referred to as CPU) 502, outer
If interface 503, RF circuit 505, voicefrequency circuit 506, loudspeaker 511, power management chip 508, input/output (I/O) subsystem
System 509, other input/control devicess 510 and outside port 504, these components pass through one or more communication bus or letter
Number line 507 communicates.
It should be understood that an example of diagram smart phone 500 only intelligent terminal, and smart phone 500 can
To have than shown in the drawings more or less component, two or more components can be combined, or can have
There is different component configurations.Various parts shown in the drawings can include one or more signal processings and/or dedicated collection
It is realized in combination at hardware, software or hardware and software including circuit.
Just the smart phone provided in this embodiment for information management is described in detail below.
Memory 501: the memory 501 can be accessed by CPU502, Peripheral Interface 503 etc., and the memory 501 can
It can also include nonvolatile memory to include high-speed random access memory, such as one or more disk memory,
Flush memory device or other volatile solid-state parts.
The peripheral hardware that outputs and inputs of equipment can be connected to CPU502 and storage by Peripheral Interface 503, the Peripheral Interface
Device 501.
I/O subsystem 509: the I/O subsystem 509 can be by the input/output peripheral in equipment, such as touch screen 502
(being equivalent to the display in above-described embodiment) and other input/control devicess 510, are connected to Peripheral Interface 503.I/O subsystem
System 509 may include display controller 5091 and one or more input controls for controlling other input/control devicess 510
Device 5092.Wherein, one or more input controllers 5092 from other input/control devicess 510 receive electric signal or to its
He sends electric signal at input/control devices 510, other input/control devicess 510 may include that physical button (shake by push button
Arm button etc.), dial, slide switch, control stick, click idler wheel.It is worth noting that input controller 5092 can with
Any one lower connection: the indicating equipment of keyboard, infrared port, USB interface and such as mouse.
Touch screen 512: the touch screen 512 is the input interface and output interface between user terminal and user, can
It is shown to user depending on output, visual output may include figure, text, icon, video etc..
Display controller 5091 in I/O subsystem 509 receives electric signal from touch screen 512 or sends out to touch screen 512
Electric signals.Touch screen 512 detects the contact on touch screen, and the contact that display controller 5091 will test is converted to and is shown
The interaction of user interface object on touch screen 512, i.e. realization human-computer interaction, the user interface being shown on touch screen 512
Object can be the icon of running game, the icon for being networked to corresponding network etc..It is worth noting that equipment can also include light
Mouse, light mouse are the extensions for the touch sensitive surface for not showing the touch sensitive surface visually exported, or formed by touch screen.
RF circuit 505 is mainly used for establishing the communication of mobile phone Yu wireless network (i.e. network side), realizes mobile phone and wireless network
The data receiver of network and transmission.Such as transmitting-receiving short message, Email etc..Specifically, RF circuit 505 receives and sends RF letter
Number, RF signal is also referred to as electromagnetic signal, and RF circuit 505 converts electrical signals to electromagnetic signal or electromagnetic signal is converted to telecommunications
Number, and communicated by the electromagnetic signal with communication network and other equipment.RF circuit 505 may include for executing
The known circuit of these functions comprising but it is not limited to antenna system, RF transceiver, one or more amplifiers, tuner, one
A or multiple oscillators, digital signal processor, CODEC chipset, Subscriber Identity Module (Subscriber Identity
Module, SIM) etc..
Voicefrequency circuit 506 is mainly used for receiving audio data from Peripheral Interface 503, which is converted to telecommunications
Number, and the electric signal is sent to loudspeaker 511.
Loudspeaker 511 is reduced to sound for mobile phone to be passed through RF circuit 505 from the received voice signal of wireless network
And the sound is played to user.
Power management chip 508, the hardware for being connected by CPU502, I/O subsystem and Peripheral Interface are powered
And power management.
The executable following operation of CPU502 provided in an embodiment of the present invention:
Determine the security level of at least one information of application program;
Determine the security classification of the associated memory space of the security level;
At least one information of the application program is stored in the memory space of the security classification.
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that
The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation,
It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention
It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also
It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.
Claims (11)
1. a kind of approaches to IM characterized by comprising
Determine the security level of at least one information of application program, wherein different types of information of the application program has
Standby different security level, the information of the application program are using information needed for the application program, alternatively, described in use
The information that application program process generates;
Determine the security classification of the associated memory space of the security level;
At least one information of the application program is stored in the memory space of the security classification.
2. approaches to IM according to claim 1, which is characterized in that determine at least one information of application program
Security level, comprising:
Setting operation according to user determines the security level of at least one information of application program.
3. approaches to IM according to claim 1, which is characterized in that determine at least one information of application program
Security level, comprising:
Attribute information according to application program determines the security level of at least one information of the application program.
4. approaches to IM according to claim 1-3, which is characterized in that determine at least the one of application program
The security level of kind information, comprising:
The security level for determining the account information of the application program is secret;
Determine that the security level of the communication record information of the application program is secret;
Determine that the security level of the usage record information of the application program is common.
5. approaches to IM according to claim 4, which is characterized in that determine that the associated storage of the security level is empty
Between security classification, comprising:
Determine that security level be the security classification of memory space of the information association of secret is that top secret forbids accessing;
Determine that security level be the security classification of the memory space of secret information association is that secret forbids being written;
Determine security level be the security classification of the memory space of common information association be allow access be written.
6. a kind of apparatus for management of information characterized by comprising
Security level determining module, the security level of at least one information for determining application program, wherein described to apply journey
Different types of information of sequence has different security levels, and the information of the application program is using needed for the application program
Information, alternatively, use the application program process generate information;
Security classification determining module, for determining the security classification of the associated memory space of the security level;
Information storage module is stored in the memory space of the security classification at least one information by the application program
It is interior.
7. apparatus for management of information according to claim 6, which is characterized in that the security level determining module is specifically used
In:
Setting operation according to user determines the security level of at least one information of application program.
8. apparatus for management of information according to claim 6, which is characterized in that the security level determining module is specifically used
In:
Attribute information according to application program determines the security level of at least one information of the application program.
9. according to the described in any item apparatus for management of information of claim 6-8, which is characterized in that the security level determining module
Include:
Secret level units, for determining that the security level of account information of the application program is secret;
Secret classifications unit, for determining that the security level of communication record information of the application program is secret;
Common grade unit, for determining that the security level of usage record information of the application program is common.
10. apparatus for management of information according to claim 9, which is characterized in that the security classification determining module includes:
Forbid access unit, for determining that security level be the security classification of memory space of the information association of secret is to forbid visiting
It asks;
Forbid writing unit, for determining that security level be the security classification of the memory space of secret information association is to forbid writing
Enter;
Allow access unit, for determining that security level be the security classification of the memory space of common information association is to allow to visit
Ask write-in.
11. a kind of intelligent terminal, which is characterized in that including the described in any item apparatus for management of information of claim 6-10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610709714.9A CN106326768B (en) | 2016-08-23 | 2016-08-23 | A kind of approaches to IM, device and intelligent terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610709714.9A CN106326768B (en) | 2016-08-23 | 2016-08-23 | A kind of approaches to IM, device and intelligent terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106326768A CN106326768A (en) | 2017-01-11 |
CN106326768B true CN106326768B (en) | 2019-05-07 |
Family
ID=57742184
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610709714.9A Active CN106326768B (en) | 2016-08-23 | 2016-08-23 | A kind of approaches to IM, device and intelligent terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106326768B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109933994B (en) * | 2017-12-18 | 2024-03-29 | 北京三快在线科技有限公司 | Data hierarchical storage method and device and computing equipment |
US11321471B2 (en) | 2017-12-18 | 2022-05-03 | Beijing Sankuai Online Technology Co., Ltd | Encrypted storage of data |
CN108647527B (en) | 2018-04-17 | 2020-11-17 | 创新先进技术有限公司 | File packing method, file packing device, file unpacking device and network equipment |
CN108614977A (en) * | 2018-04-28 | 2018-10-02 | 惠州市德赛西威汽车电子股份有限公司 | A kind of vehicle-mounted sensitive data method for secure storing and its system for supporting HSM |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6662020B1 (en) * | 1999-08-27 | 2003-12-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Arrangement for effecting secure transactions in a communication device |
CN101072414A (en) * | 2007-07-09 | 2007-11-14 | 华为技术有限公司 | Method and device for managing and protecting mobile terminal device information |
CN102006358A (en) * | 2010-11-02 | 2011-04-06 | 深圳市金立通信设备有限公司 | Mobile phone private communication management system and method |
CN103369525A (en) * | 2013-07-30 | 2013-10-23 | 东莞宇龙通信科技有限公司 | Terminal and data processing method |
CN104038613A (en) * | 2013-03-07 | 2014-09-10 | 腾讯科技(深圳)有限公司 | Method and apparatus for information security management |
CN104517069A (en) * | 2015-01-12 | 2015-04-15 | 联想(北京)有限公司 | Information processing method and electronic equipment |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102467462B (en) * | 2010-11-17 | 2015-03-11 | 中国移动通信集团公司 | Method for protecting data stored in device and corresponding device |
-
2016
- 2016-08-23 CN CN201610709714.9A patent/CN106326768B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6662020B1 (en) * | 1999-08-27 | 2003-12-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Arrangement for effecting secure transactions in a communication device |
CN101072414A (en) * | 2007-07-09 | 2007-11-14 | 华为技术有限公司 | Method and device for managing and protecting mobile terminal device information |
CN102006358A (en) * | 2010-11-02 | 2011-04-06 | 深圳市金立通信设备有限公司 | Mobile phone private communication management system and method |
CN104038613A (en) * | 2013-03-07 | 2014-09-10 | 腾讯科技(深圳)有限公司 | Method and apparatus for information security management |
CN103369525A (en) * | 2013-07-30 | 2013-10-23 | 东莞宇龙通信科技有限公司 | Terminal and data processing method |
CN104517069A (en) * | 2015-01-12 | 2015-04-15 | 联想(北京)有限公司 | Information processing method and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106326768A (en) | 2017-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106326768B (en) | A kind of approaches to IM, device and intelligent terminal | |
US11258810B2 (en) | Identity authentication method, apparatus, and system | |
CN106534572A (en) | Information display method and device and terminal | |
CN107862194B (en) | A kind of method, device and mobile terminal of safety verification | |
CN104346560B (en) | A kind of safe verification method and device | |
CN104966005A (en) | Access control method and terminal apparatus | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN106657589A (en) | Message alert method and message alert device for multi-open applications, and mobile terminal | |
CN108960839B (en) | Payment method and device | |
CN106709034A (en) | File protection method and apparatus, and terminal | |
CN106529310A (en) | Method and device for inhibiting screen capture | |
CN107395880A (en) | Method for information display, device and terminal | |
CN106453802A (en) | Cipher verification method and device, and terminal | |
CN106484547A (en) | A kind of management method, device and terminal for opening application more | |
CN109219003B (en) | Information encryption method and device, storage medium and electronic equipment | |
CN104967593A (en) | Identity verification method, apparatus and system | |
CN107666583A (en) | Call handling method and terminal | |
CN108718271A (en) | Processing method, device, storage medium and the terminal of good friend's request | |
CN106485136A (en) | The authority configuring method of application program, device and mobile terminal | |
CN108537027A (en) | Resource allocation methods and device, terminal, computer readable storage medium | |
CN105577375A (en) | Identity authentication method and device | |
CN106294027A (en) | A kind of data back up method, device, carrier server and mobile terminal | |
CN103812996A (en) | Information prompting method and apparatus, and terminal | |
CN106937258A (en) | A kind of control method of broadcast, device and mobile terminal | |
CN105488678A (en) | Payment behavior information acquisition method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: OPPO Guangdong Mobile Communications Co., Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: Guangdong OPPO Mobile Communications Co., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |