CN106372518A - Information protection method and mobile terminal - Google Patents
Information protection method and mobile terminal Download PDFInfo
- Publication number
- CN106372518A CN106372518A CN201610794986.3A CN201610794986A CN106372518A CN 106372518 A CN106372518 A CN 106372518A CN 201610794986 A CN201610794986 A CN 201610794986A CN 106372518 A CN106372518 A CN 106372518A
- Authority
- CN
- China
- Prior art keywords
- communication account
- information
- viewed
- target communication
- default
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
The invention provides an information protection method and a mobile terminal. The method comprises the following steps: receiving information to be checked transmitted by a target communication account; judging whether the target communication account is a preset communication account or not; if the target communication account is the preset communication account, encrypting the information to be checked by a preset encryption password; if a user needs to check the information to be checked, matching an input decryption password with the preset encryption password in the information to be checked to decrypt the information to be checked. By adopting the information protection method, the information to be checked which involves privacy can be encrypted automatically when a user receives the information to be checked, and the information to be checked can only be acquired integrally after decryption, so that the privacy and security of information are enhanced.
Description
Technical field
The present invention relates to the communications field, more particularly, to a kind of information protecting method and mobile terminal.
Background technology
With the development of communication technology, the communication mode such as Email, note is increasingly becoming the weight exchanging letter between people
Want means.The extensive application of the communication modes such as Email, note also causes user that privacy is increasingly paid close attention to, the safety of information
Problem is increasingly taken seriously.But in the middle of daily life and work, the content of the information such as Email, note is easy to careless
Between be seen by a third party.It can be seen that, the privacy of the information such as current email or short message cannot be protected, and safety is very low.
Content of the invention
The embodiment of the present invention provides a kind of information protecting method and mobile terminal, to solve the Information Security of mobile terminal
Low problem.
In a first aspect, embodiments providing a kind of information protecting method, comprising:
Receive the information to be viewed that target communication account sends;
Judge whether described target communication account is default communication account;
If described treat that target communication account is described default communication account, using predetermined encryption password to described to be viewed
Information is encrypted;
If user needs to check described information to be viewed, will be pre- in clear crytpographic key and the described information to be viewed of input
If Crypted password is mated to be decrypted to described information to be viewed.
Second aspect, the embodiment of the present invention also provides a kind of mobile terminal, comprising:
Receiver module, for receiving the information to be viewed of target communication account transmission;
First judge module, for judging whether described target communication account is default communication account;
Encrypting module, if being described default communication account for described target communication account, utilizes predetermined encryption password
Described information to be viewed is encrypted;
Deciphering module, if needing to check described information to be viewed for user, the clear crytpographic key of input is treated with described
Check that the predetermined encryption password in information is mated to be decrypted to described information to be viewed.
So, a kind of information protecting method and mobile terminal are provided in the embodiment of the present invention, the method includes: receive target
The information to be viewed that communication account sends;Judge whether described target communication account is default communication account;If described treat target
Communication account is described default communication account, then using predetermined encryption password, described information to be viewed is encrypted;If user
Need to check described information to be viewed, then the clear crytpographic key of input is carried out with the predetermined encryption password in described information to be viewed
Coupling is to be decrypted to described information to be viewed.So user, can be by being related to privacy when receiving information to be viewed
The information to be viewed of property is encrypted it is necessary to could completely obtain this information to be viewed after deciphering, automatically to improve the private of information
Close property and safety.
Brief description
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below will be to required in embodiment of the present invention description
Accompanying drawing to be used be briefly described it should be apparent that, drawings in the following description are only some embodiments of the present invention,
For those of ordinary skill in the art, without having to pay creative labor, can also be obtained according to these accompanying drawings
Obtain other accompanying drawings.
Fig. 1 is the flow chart of the information protecting method that first embodiment of the invention provides;
Fig. 2 is the flow chart of the information protecting method that second embodiment of the invention provides;
Fig. 3 is one of structure chart of mobile terminal that third embodiment of the invention provides;
Fig. 4 is one of structure chart of the first judge module in the mobile terminal that third embodiment of the invention provides;
Fig. 5 is two of the structure chart of the first judge module in the mobile terminal that third embodiment of the invention provides;
Fig. 6 is the two of the mobile terminal structure figure that third embodiment of the invention provides;
Fig. 7 is the structure chart of the mobile terminal that fourth embodiment of the invention provides.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation description is it is clear that described embodiment a part of embodiment that is the present invention, rather than whole embodiments.Based on this
Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under the premise of not making creative work
Example, broadly falls into the scope of protection of the invention.
First embodiment
Referring to Fig. 1, Fig. 1 is the flow chart of information protecting method provided in an embodiment of the present invention, as shown in figure 1, include with
Lower step:
The information to be viewed that step 101, reception target communication account send.
In the embodiment of the present invention, target communication account is the communication account sending information to be viewed to user, including mobile phone
Number, e-mail address, qq number or wechat number etc..Described information to be viewed is to be transmitted across by target communication account
The information come, can be short message, Email accordingly, qq message or wechat message etc..
Step 102, judge that whether described target communication account is default communication account.
By user, default communication account can judge which communication account may relate to information security issue according to demand, will
It is selected and preserves.In general, communication account has feature identification, and user can be by communicating account by different data separations
Come.For example, user typically will be considered that bank information is related to individual privacy and property safety it is undesirable to relevant information is by other people
Know, then can be judged by communication number, the communication number of all about bank is carried out being summarized in certain set
Stored, that is, formed default communication account, so that target communication account is judged.
If step 103 described target communication account is described default communication account, using predetermined encryption password to described
Information to be viewed is encrypted.
When the target communication account sending information to be viewed is default communication account, user can utilize predetermined encryption password
Described information to be viewed is encrypted, so that the privacy of information can be protected well, improves information
Crypticity and safety.
If step 104 user needs to check described information to be viewed, by the clear crytpographic key of input and described letter to be viewed
Predetermined encryption password in breath is mated to be decrypted to described information to be viewed.
If user needs to check described information to be viewed, input clear crytpographic key, be allowed to carry out with predetermined encryption password
Join.If the match is successful, described information to be viewed is decrypted to obtain described information to be viewed.In general, for ensureing solution
Close success, clear crytpographic key and predetermined encryption password need to be mutually matched in form and content and correspond.
In the embodiment of the present invention, above-mentioned mobile terminal can be with any type of mobile terminal, such as: mobile phone, panel computer
(tablet personal computer), kneetop computer (laptop computer), personal digital assistant (personal
Digital assistant, abbreviation pda), mobile Internet access device (mobile internet device, mid) or wearable
Equipment (wearable device) etc..
The information protecting method of the embodiment of the present invention, including the information to be viewed receiving the transmission of target communication account;Judge
Whether described target communication account is default communication account;If described treat that target communication account is described default communication account,
Using predetermined encryption password, described information to be viewed is encrypted;If user needs to check described information to be viewed, will be defeated
The clear crytpographic key entering is mated with the predetermined encryption password in described information to be viewed to solve to described information to be viewed
Close.So user, can be by being encrypted to the information to be viewed being related to privacy automatically when receiving information to be viewed, must
This information to be viewed could must be completely obtained, to improve privacy and the safety of information after deciphering.
Second embodiment
Referring to Fig. 2, Fig. 2 is the flow chart of another kind information protecting method provided in an embodiment of the present invention, as shown in Fig. 2
Comprise the following steps:
The information to be viewed that step 201, reception target communication account send.
In the embodiment of the present invention, target communication account is the communication account sending information to be viewed to user, including mobile phone
Number, e-mail address, qq number or wechat number etc..Described information to be viewed is to be led to by target to select account to be transmitted across
The information come, can be short message, Email accordingly, qq message or wechat message etc..
Step 202, judge that whether described target communication account is default communication account.
By user, default communication account can judge which communication account may relate to information security issue according to demand, will
It is selected and preserves.In general, communication account has feature identification, and user can be by communicating account by different data separations
Come.For example, user typically will be considered that bank information is related to individual privacy and property safety it is undesirable to relevant information is by other people
Know, then can be judged by communication number, the communication number of all about bank is carried out being summarized in certain set
Stored, that is, formed default communication account, so that target communication account is judged.
If step 203 described target communication account is described default communication account, whether judge described information to be viewed
For presetting privacy information.
When the target communication account sending information to be viewed is default communication account, need to judge that information content to be viewed is
No it is related to privacy.Although communication account may determine that whether information to be viewed has privacy to a great extent, sometimes with
The information that default communication account identical target communication account sends is not necessarily referring to privacy.For example, bank is transmitted across sometimes
Not related to the individual subscriber information of next information, but the card of bank's aspect.Now, then unnecessary to be checked to this
The information of seeing is encrypted protection.Specific information content judge process, can be by judging the sensitive word whether occurring in information
If " remaining sum ", " identity information " or " certificate number " etc. is it is also possible to take other guide judgment mode.The category of default privacy information
Can be adjusted according to user's request.
If the described information to be viewed of step 204 is default privacy information, using predetermined encryption password to described to be viewed
Information is encrypted.
When described information content to be viewed is related to privacy, then user can be using predetermined encryption password to described information to be viewed
It is encrypted, so that the privacy of information can be protected well, improve crypticity and the safety of information.
If step 205 user needs to check described information to be viewed, by the clear crytpographic key of input and described letter to be viewed
Predetermined encryption password in breath is mated to be decrypted to described information to be viewed.
If user needs to check described information to be viewed, input clear crytpographic key, be allowed to carry out with predetermined encryption password
Join.If the match is successful, described information to be viewed is decrypted to obtain described information to be viewed.In general, for ensureing solution
Close success, clear crytpographic key and predetermined encryption password need to be mutually matched in form and content and correspond.
The information protecting method of the embodiment of the present invention, comprising: receive the information to be viewed that target communication account sends;Judge
Whether described target communication account is default communication account;If described information to be viewed is described default communication account, judge
Whether described information to be viewed is default privacy information;If described information to be viewed is default privacy information, added using default
Password is encrypted to described information to be viewed;If user needs to check described information to be viewed, will be close for the deciphering of input
Code is mated with the predetermined encryption password in described information to be viewed to be decrypted to described information to be viewed.So user
When receiving information to be viewed, can be by automatically being encrypted it is necessary to after deciphering just to the information to be viewed being related to privacy
This information to be viewed can completely be obtained, to improve privacy and the safety of information.
Optionally, described judge that whether described target communication account is the step of default communication account, comprising:
Search described target communication account in locally presetting communication account set;
If finding described target communication account, described target communication account is described default communication account.
By locally presetting communication account set, can achieve and judge whether target communication account is default communication account
Agility.
Optionally, described judge that whether described target communication account is the step of default communication account, comprising:
Described target communication account is sent to remote server;
Receive the indication signal being sent by described remote server;
If described indication signal represents that described remote server finds described target in default communication account set and leads to
News account, then described target communication account is described default communication account.
Default communication account set is arranged in remote server, it is possible to resolve locally stored confinement problems.Remotely
After server receives target communication account, make a look up in default communication account set, and lookup result is returned, thus
Judge whether target communication account is default communication account.
Optionally, described predetermined encryption password and clear crytpographic key are included in finger-print cipher, character password and iris password
One kind or combination in any.
As described above, predetermined encryption password and clear crytpographic key have form and content is consistent or the feature of coupling, can adopt
Any type of cryptographic means, including one of finger-print cipher, character password and iris password or combination in any.
Information protecting method provided in an embodiment of the present invention, comprising: receive the information to be viewed that target communication account sends;
Judge whether described target communication account is default communication account;If described target communication account is described default communication account,
Then judge whether described information to be viewed is default privacy information;If described information to be viewed is default privacy information, utilize
Predetermined encryption password is encrypted to described information to be viewed;If user needs to check described information to be viewed, by input
Clear crytpographic key is mated with the predetermined encryption password in described information to be viewed to be decrypted to described information to be viewed.This
Sample user, can be by being encrypted it is necessary to solve to the information to be viewed being related to privacy automatically when receiving information to be viewed
This information to be viewed could completely be obtained, to improve privacy and the safety of information after close.
3rd embodiment
Referring to Fig. 3, Fig. 3 is the structure chart of the mobile terminal that the present invention implements to provide, as shown in figure 3, mobile terminal 300,
Including:
Receiver module 301, for receiving the information to be viewed of target communication account transmission;
First judge module 302, for judging whether described target communication account is default communication account;
Encrypting module 303, if being described default communication account for described target communication account, close using predetermined encryption
Code is encrypted to described information to be viewed;
Deciphering module 304, if needing to check described information to be viewed for user, by input clear crytpographic key with described
Predetermined encryption password in information to be viewed is mated to be decrypted to described information to be viewed.
Optionally, as shown in figure 4, described first judge module 302 includes:
Searching unit 3021, for searching described target communication account in locally default communication account set;
First determining unit 3022, if for finding described target communication account, described target communication account is institute
State default communication account.
Optionally, as shown in figure 5, described first judge module 302 includes:
Transmitting element 3023, for sending described target communication account to remote server;
Receiving unit 3024, for receiving the indication signal being sent by described remote server;
Second determining unit 3025, if represent described remote server in default communication account collection for described indication signal
Described target communication account is found, then described target communication account is described default communication account in conjunction.
Optionally, as shown in fig. 6, described mobile terminal 300 also includes:
Second judge module 305, if being described default communication account for described information to be viewed, judges described to be checked
See whether information is default privacy information;
Described encrypting module 303, if being additionally operable to described information to be viewed is default privacy information, close using predetermined encryption
Code is encrypted to described information to be viewed.
Optionally, described predetermined encryption password and clear crytpographic key are included in finger-print cipher, character password and iris password
One kind or combination in any.Mobile terminal 300 is capable of each that mobile terminal in the embodiment of the method for Fig. 1 to Fig. 2 realizes
Process, for avoiding repeating, repeats no more here.
The mobile terminal 300 of the embodiment of the present invention, comprising: receiver module, for receiving treating of target communication account transmission
Check information;First judge module, for judging whether described target communication account is default communication account;Encrypting module, uses
If being described default communication account in described target communication account, using predetermined encryption password, described information to be viewed is carried out
Encryption;Deciphering module, if needing to check described information to be viewed for user, will be to be viewed with described for the clear crytpographic key of input
Predetermined encryption password in information is mated to be decrypted to described information to be viewed.So user receive to be viewed
During information, can be treated it is necessary to could completely obtain this after deciphering by automatically encrypting to the information to be viewed being related to privacy
Check information, to improve privacy and the safety of information.
Fourth embodiment
Referring to Fig. 7, Fig. 7 is the structure chart of the mobile terminal that the present invention implements to provide, as shown in fig. 7, mobile terminal 700 wraps
Include: at least one processor 701, memorizer 702, at least one network interface 704 and user interface 703.In mobile terminal 700
Each assembly be coupled by bus system 705.It is understood that bus system 705 is used for realizing between these assemblies
Connection communication.Bus system 705, in addition to including data/address bus, also includes power bus, controlling bus and status signal bus in addition.
But for the sake of clear explanation, in the figure 7 various buses are all designated as bus system 705.
Wherein, user interface 703 can include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memorizer 702 in the embodiment of the present invention can be volatile memory or nonvolatile memory,
Or may include volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read only memory (read-
Onlymemory, rom), programmable read only memory (programmablerom, prom), Erasable Programmable Read Only Memory EPROM
(erasableprom, eprom), Electrically Erasable Read Only Memory (electricallyeprom, eeprom) or sudden strain of a muscle
Deposit.Volatile memory can be random access memory (randomaccessmemory, ram), and it is used as outside slow at a high speed
Deposit.By exemplary but be not restricted explanation, the ram of many forms can use, such as static RAM
(staticram, sram), dynamic random access memory (dynamicram, dram), Synchronous Dynamic Random Access Memory
(synchronousdram, sdram), double data speed synchronous dynamic RAM (doubledatarate
Sdram, ddrsdram), enhancement mode Synchronous Dynamic Random Access Memory (enhanced sdram, esdram), synchronized links
Dynamic random access memory (synchlinkdram, sldram) and direct rambus random access memory
(directrambusram, drram).The memorizer 702 of system and method described herein be intended to including but not limited to these and
The memorizer of any other suitable type.
In some embodiments, memorizer 702 stores following element, executable module or data structure, or
Their subset of person, or their superset: operating system 7021 and application program 7022.
Wherein, operating system 7021, comprise various system programs, such as ccf layer, core library layer, driving layer etc., are used for
Realize various basic businesses and process hardware based task.Application program 7022, comprises various application programs, such as media
Player (mediaplayer), browser (browser) etc., are used for realizing various applied business.Realize embodiment of the present invention side
The program of method may be embodied in application program 7022.
In embodiments of the present invention, can be by calling program or the instruction of memorizer 702 storage, specifically, application
The program of storage or instruction in program 7022, processor 701 is used for:
Receive the information to be viewed that target communication account sends;
Judge whether described target communication account is default communication account;
If described treat that target communication account is described default communication account, using predetermined encryption password to described to be viewed
Information is encrypted;
If user needs to check described information to be viewed, will be pre- in clear crytpographic key and the described information to be viewed of input
If Crypted password is mated to be decrypted to described information to be viewed.
The method that the embodiments of the present invention disclose can apply in processor 701, or is realized by processor 701.
Processor 701 is probably a kind of IC chip, has the disposal ability of signal.Realize during, said method each
Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 701 or software form.Above-mentioned process
Device 701 can be general processor, digital signal processor (digitalsignalprocessor, dsp), special IC
(applicationspecific integratedcircuit, asic), ready-made programmable gate array
(fieldprogrammablegatearray, fpga) or other PLDs, discrete gate or transistor logic
Device, discrete hardware components.Can realize or execute disclosed each method in the embodiment of the present invention, step and box
Figure.General processor can be microprocessor or this processor can also be any conventional processor etc..In conjunction with the present invention
The step of the method disclosed in embodiment can be embodied directly in hardware decoding processor execution and complete, or uses decoding processor
In hardware and software module combination execution complete.Software module may be located at random access memory, and flash memory, read only memory can
In the ripe storage medium in this area such as program read-only memory or electrically erasable programmable memory, depositor.This storage
Medium is located at memorizer 702, and processor 701 reads the information in memorizer 702, completes the step of said method in conjunction with its hardware
Suddenly.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its
Combine and to realize.Hardware is realized, processing unit can be implemented in one or more special ICs
(applicationspecificintegratedcircuits, asic), digital signal processor
(digitalsignalprocessing, dsp), digital signal processing appts (dspdevice, dspd), programmable logic device
(programmablelogicdevice, pld), field programmable gate array (field-programmablegatearray,
Fpga), general processor, controller, microcontroller, microprocessor, the other electronics lists for executing herein described function
In unit or a combination thereof.
Software is realized, can be realized herein by executing the module (such as process, function etc.) of function described herein
Described technology.Software code is storable in memorizer and passes through computing device.Memorizer can within a processor or
Realize outside processor.
Optionally, the described of processor 701 execution judges whether described target communication account is the default step communicating account
Suddenly, comprising:
Search described target communication account in locally presetting communication account set;
If finding described target communication account, described target communication account is described default communication account.
Optionally, the described of processor 701 execution judges whether described target communication account is the default step communicating account
Suddenly, comprising:
Described target communication account is sent to remote server;
Receive the indication signal being sent by described remote server;
If described indication signal represents that described remote server finds described target in default communication account set and leads to
News account, then described target communication account is described default communication account.
Optionally, the described of processor 701 execution judges whether described target communication account is the default step communicating account
After rapid, also include:
If described information to be viewed is described default communication account, judge whether described information to be viewed is default privacy
Information;
The described step described information to be viewed being encrypted using predetermined encryption password, comprising:
If described information to be viewed is default privacy information, using predetermined encryption password, described information to be viewed is carried out
Encryption.
Optionally, described in the step of processor 701 execution, predetermined encryption password and clear crytpographic key include finger-print cipher, word
Symbol one of password and iris password or combination in any.
Mobile terminal 700 is capable of each process that in previous embodiment, mobile terminal is realized, for avoiding repeating, here
Repeat no more.
The mobile terminal 700 of the embodiment of the present invention, receives the information to be viewed that target communication account sends;Judge described mesh
Whether mark communication account is default communication account;If described target communication account is described default communication account, using default
Crypted password is encrypted to described information to be viewed;If user needs to check described information to be viewed, by the deciphering of input
Password is mated with the predetermined encryption password in described information to be viewed to be decrypted to described information to be viewed.So use
Family, can be after being encrypted it is necessary to decipher to the information to be viewed being related to privacy automatically when receiving information to be viewed
This information to be viewed could completely be obtained, to improve privacy and the safety of information.
Those of ordinary skill in the art are it is to be appreciated that combine the list of each example of the embodiments described herein description
Unit and algorithm steps, being capable of being implemented in combination in electronic hardware or computer software and electronic hardware.These functions are actually
To be executed with hardware or software mode, the application-specific depending on technical scheme and design constraint.Professional and technical personnel
Each specific application can be used different methods to realize described function, but this realization is it is not considered that exceed
The scope of the present invention.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description,
Device and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
It should be understood that disclosed apparatus and method in embodiment provided herein, can pass through other
Mode is realized.For example, device embodiment described above is only schematically, for example, the division of described unit, it is only
A kind of division of logic function, actual can have other dividing mode when realizing, for example multiple units or assembly can in conjunction with or
Person is desirably integrated into another system, or some features can be ignored, or does not execute.Another, shown or discussed is mutual
Between coupling or direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING of device or unit or communication link
Connect, can be electrical, mechanical or other forms.
The described unit illustrating as separating component can be or may not be physically separate, show as unit
The part showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize embodiment of the present invention scheme
Purpose.
In addition, can be integrated in a processing unit in each functional unit in each embodiment of the present invention it is also possible to
It is that unit is individually physically present it is also possible to two or more units are integrated in a unit.
If described function realized using in the form of SFU software functional unit and as independent production marketing or use when, permissible
It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words
Partly being embodied in the form of software product of part that prior art is contributed or this technical scheme, this meter
Calculation machine software product is stored in a storage medium, including some instructions with so that a computer equipment (can be individual
People's computer, server, or network equipment etc.) execution each embodiment methods described of the present invention all or part of step.
And aforesaid storage medium includes: u disk, portable hard drive, rom, ram, magnetic disc or CD etc. are various can be with store program codes
Medium.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, and any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, all should contain
Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.
Claims (10)
1. a kind of information protecting method is it is characterised in that include:
Receive the information to be viewed that target communication account sends;
Judge whether described target communication account is default communication account;
If described target communication account is described default communication account, using predetermined encryption password, described information to be viewed is entered
Row encryption;
If user needs to check described information to be viewed, presetting in the clear crytpographic key of input and described information to be viewed is added
Password is mated to be decrypted to described information to be viewed.
2. method according to claim 1 is it is characterised in that described judge whether described target communication account is default logical
The step of news account, comprising:
Search described target communication account in locally presetting communication account set;
If finding described target communication account, described target communication account is described default communication account.
3. method according to claim 1 is it is characterised in that described judge whether described target communication account is default logical
The step of news account, comprising:
Described target communication account is sent to remote server;
Receive the indication signal being sent by described remote server;
If described indication signal represents that described remote server finds described target communication account in default communication account set
Number, then described target communication account is described default communication account.
4. according to the arbitrary described method of claim 1-3 it is characterised in that whether judging described target communication account described
After step for default communication account, also include:
If described target communication account is described default communication account, judge whether described information to be viewed is default privacy letter
Breath,
The described step described information to be viewed being encrypted using predetermined encryption password, comprising:
If described information to be viewed is default privacy information, described information to be viewed is carried out add using predetermined encryption password
Close.
5. according to the arbitrary described method of claim 1-3 it is characterised in that described predetermined encryption password and clear crytpographic key include
One of finger-print cipher, character password and iris password or combination in any.
6. a kind of mobile terminal is it is characterised in that include:
Receiver module, for receiving the information to be viewed of target communication account transmission;
First judge module, for judging whether described target communication account is default communication account;
Encrypting module, if being described default communication account for described target communication account, using predetermined encryption password to institute
State information to be viewed to be encrypted;
Deciphering module, if needing to check described information to be viewed for user, will be to be viewed with described for the clear crytpographic key of input
Predetermined encryption password in information is mated to be decrypted to described information to be viewed.
7. mobile terminal according to claim 6 is it is characterised in that described first judge module includes:
Searching unit, for searching described target communication account in locally default communication account set;
First determining unit, if for finding described target communication account, described target communication account is described default logical
News account.
8. mobile terminal according to claim 6 is it is characterised in that described first judge module includes:
Transmitting element, for sending described communication account to remote server;
Receiving unit, for receiving the indication signal being sent by described remote server;
For described indication signal, second determining unit, if represent that described remote server is searched in default communication account set
To described target communication account, then described target communication account is described default communication account.
9. according to the arbitrary described mobile terminal of claim 6-8 it is characterised in that described mobile terminal also includes:
Second judge module, if being described default communication account for described information to be viewed, judges described information to be viewed
Whether it is default privacy information;
Described encrypting module, if being additionally operable to described information to be viewed is default privacy information, using predetermined encryption password to institute
State information to be viewed to be encrypted.
10. according to the arbitrary described mobile terminal of claim 6-8 it is characterised in that described predetermined encryption password and deciphering are close
Code includes one of finger-print cipher, character password and iris password or combination in any.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610794986.3A CN106372518A (en) | 2016-08-31 | 2016-08-31 | Information protection method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610794986.3A CN106372518A (en) | 2016-08-31 | 2016-08-31 | Information protection method and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106372518A true CN106372518A (en) | 2017-02-01 |
Family
ID=57898853
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610794986.3A Pending CN106372518A (en) | 2016-08-31 | 2016-08-31 | Information protection method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106372518A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102067103A (en) * | 2008-04-14 | 2011-05-18 | 隐私数据系统公司 | Improved certified email messages and attachments |
CN103559451A (en) * | 2013-10-21 | 2014-02-05 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting and displaying privacy information |
CN103678962A (en) * | 2012-08-30 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Personal information management method and device and terminal |
CN105207900A (en) * | 2015-10-28 | 2015-12-30 | 上海季诺金融信息服务有限公司 | Secret information transmission method based on instant messaging platform |
CN105809042A (en) * | 2014-12-31 | 2016-07-27 | 中兴通讯股份有限公司 | Information protection method and device, information display method and device, and terminal |
CN105893826A (en) * | 2016-04-25 | 2016-08-24 | 北京奇虎科技有限公司 | Message display method and intelligent terminal based on fingerprint information |
-
2016
- 2016-08-31 CN CN201610794986.3A patent/CN106372518A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102067103A (en) * | 2008-04-14 | 2011-05-18 | 隐私数据系统公司 | Improved certified email messages and attachments |
CN103678962A (en) * | 2012-08-30 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Personal information management method and device and terminal |
CN103559451A (en) * | 2013-10-21 | 2014-02-05 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting and displaying privacy information |
CN105809042A (en) * | 2014-12-31 | 2016-07-27 | 中兴通讯股份有限公司 | Information protection method and device, information display method and device, and terminal |
CN105207900A (en) * | 2015-10-28 | 2015-12-30 | 上海季诺金融信息服务有限公司 | Secret information transmission method based on instant messaging platform |
CN105893826A (en) * | 2016-04-25 | 2016-08-24 | 北京奇虎科技有限公司 | Message display method and intelligent terminal based on fingerprint information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8024559B2 (en) | Security authentication system and method | |
US8572394B2 (en) | OTP generation using a camouflaged key | |
US8924724B2 (en) | Document encryption and decryption | |
US20110113245A1 (en) | One time pin generation | |
CN106534570A (en) | Privacy protection method and device | |
US11444952B2 (en) | Synthetic identification protocol apparatus and method | |
EP2690840B1 (en) | Internet based security information interaction apparatus and method | |
CN102638447A (en) | Method and device for system login based on autonomously generated password of user | |
JP2022533193A (en) | Mitigating ransomware damage in integrated and isolated applications | |
US20140172741A1 (en) | Method and system for security information interaction based on internet | |
KR20100096090A (en) | Mobile smartcard based authentication | |
US11023620B2 (en) | Cryptography chip with identity verification | |
US20100243736A1 (en) | Storage device management systems and methods | |
CN105162804A (en) | Communication information protection method and apparatus | |
US20190354697A1 (en) | System and method for securing data in a storage medium | |
US20110170689A1 (en) | Terminal and method for processing encrypted message | |
CN106648370B (en) | A kind of encryption method and mobile terminal of sectional drawing | |
US10845990B2 (en) | Method for executing of security keyboard, apparatus and system for executing the method | |
CN105072136A (en) | Method and system for security authentication between devices based on virtual drive | |
CN106372518A (en) | Information protection method and mobile terminal | |
US20090287939A1 (en) | Secure device, information processing terminal, server, and authentication method | |
Schürmann et al. | Openkeychain: an architecture for cryptography with smart cards and nfc rings on android | |
JP2002055961A (en) | Ic card device and proxy device, and card terminal device | |
CN102902903A (en) | Electronic commerce intelligent password key with button and implementation method for electronic commerce intelligent password key | |
Riebe et al. | US Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170201 |