CN106407838A - A memo information management method and device - Google Patents

A memo information management method and device Download PDF

Info

Publication number
CN106407838A
CN106407838A CN201610839185.4A CN201610839185A CN106407838A CN 106407838 A CN106407838 A CN 106407838A CN 201610839185 A CN201610839185 A CN 201610839185A CN 106407838 A CN106407838 A CN 106407838A
Authority
CN
China
Prior art keywords
note
privacy
information
content
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610839185.4A
Other languages
Chinese (zh)
Inventor
孙钰
张月川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Mobile Intelligent Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610839185.4A priority Critical patent/CN106407838A/en
Publication of CN106407838A publication Critical patent/CN106407838A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The embodiments of the invention provide a memo information management method and device and relates to the technical field of information processing. The method comprises the steps of according to a memo content view request corresponding to a privacy memo, acquiring permission validation information corresponding to the privacy memo; if the permission validation information matches legitimate permission information correlative with the privacy memo, displaying the content of the privacy memo. The technical solution of the embodiments of the invention optimizes the conventional memo information management technology and can guarantee that the content in privacy memos does not leak out even if corresponding terminals are unlocked via various methods, and thus improve the security and privacy of the content of memos greatly.

Description

Note approaches to IM and device
Technical field
The present embodiments relate to the information processing technology, more particularly, to a kind of note approaches to IM and device.
Background technology
With scientific and technological development, the intelligent terminal such as mobile phone, panel computer increasingly popularizes in our life, meanwhile, In order to meet the use demand of user, mobile terminal provides various functions, and for example, people can be carried out using mobile phone Positioning and navigation, are recorded the drop in life, and mobile phone notes function are just used to record the one of general information by mobile phone Plant very important mode.Wherein, because the content of record in note is probably related to the privacy of user, therefore how to ensure The safety of note content is that have a to be solved major issue.
During realizing the present invention, inventor finds:At present, mainly by adding the side of screen lock for intelligent terminal Formula realizes the protection to note content, and the user being only successfully completed terminal screen unblock just can check the content in note.Existing The major defect having technology is:If a terminal is shielded because the malice of user's carelessness or other users cracks After curtain unblock, then the content recorded in the note of this terminal will be no longer safe.
Content of the invention
In view of this, the embodiment of the present invention provides a kind of note approaches to IM and device, to optimize existing note Information management technique is it is ensured that the safety of note content and privacy.
In a first aspect, embodiments providing a kind of note approaches to IM, including:
Request is checked according to note content corresponding with privacy note, obtains Authority Verification corresponding with described privacy note Information;
If described Authority Verification information and the lawful authority information match associated by described privacy note, will be described The note content of privacy note is shown.
Second aspect, the embodiment of the present invention additionally provides a kind of note apparatus for management of information, including:
Authority Verification data obtaining module, for request is checked according to note content corresponding with privacy note, obtain with The corresponding Authority Verification information of described privacy note;
Note content display module, if for described Authority Verification information and the legal power associated by described privacy note Limit information matches, then shown the note content of described privacy note.
Note approaches to IM provided in an embodiment of the present invention and device, corresponding with a privacy note receiving After note content checks request, be not directly the content of this privacy note to be shown, but need to obtain first with described Privacy note corresponding Authority Verification information, only described Authority Verification information and the lawful authority associated by described privacy note The note content of described privacy note just can be shown, be optimized existing note information management technique by information match, Even if achieving terminal to be unlocked by various modes it is also possible to ensure that the content in privacy note is not compromised, greatly improve The safety of note content and privacy.
Brief description
Fig. 1 is a kind of flow chart of note approaches to IM that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow chart of note approaches to IM that the embodiment of the present invention two provides;
Fig. 3 is a kind of flow chart of note approaches to IM that the embodiment of the present invention three provides;
Fig. 4 is a kind of structure chart of note apparatus for management of information that the embodiment of the present invention four provides;
Fig. 5 is a kind of structure chart of note apparatus for management of information that the embodiment of the present invention five provides.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention, rather than limitation of the invention.It also should be noted that, in order to just Part related to the present invention rather than entire infrastructure is illustrate only in description, accompanying drawing.
It also should be noted that, for the ease of description, illustrate only in accompanying drawing part related to the present invention rather than Full content.It should be mentioned that some exemplary embodiments are described before exemplary embodiment is discussed in greater detail Become the process described as flow chart or method.Although operations (or step) are described as the process of order by flow chart, It is that many of which operation can be implemented concurrently, concomitantly or simultaneously.Additionally, the order of operations can be by again Arrange.Described process can be terminated when its operations are completed, it is also possible to have the additional step being not included in accompanying drawing. Described process can correspond to method, function, code, subroutine, subprogram etc..
Embodiment one
A kind of flow chart of note approaches to IM that Fig. 1 provides for the embodiment of the present invention one, the method can be by just Sign apparatus for management of information execution, this device can be realized by software and/or hardware, and typically can be integrated in note application journey is installed In the terminal of sequence.As shown in figure 1, the method for the present embodiment specifically includes:
110th, request is checked according to note content corresponding with privacy note, obtain authority corresponding with described privacy note Checking information.
In the present embodiment, described privacy note refers to need to carry out secret protection or privacy class is higher just Sign.Wherein it is possible to whole notes of record in note application program are disposed as privacy note it is also possible to choosing according to user Select and the part note (1 or several) of record in note application program is set to privacy note.
After a note is arranged to privacy note, if the note content receiving user checks request, will not Directly the content of this note is shown, but need to obtain Authority Verification information first.
Wherein, described Authority Verification information specifically refers to check in privacy note for verifying whether active user has permission The information held.
Accordingly, need to prestore the lawful authority information associating with privacy note, this lawful authority information is used for knowing The accuracy of not other this Authority Verification information.
Described lawful authority information can include following at least one:Finger print information, iris information, face information, gesture Information, setting character string information and setting pictorial information.
Wherein, described lawful authority information can identical or different from the screen locking password of terminal it is preferred that in order to Improve the safety of described privacy note further, described lawful authority information is different from the screen locking password of terminal.
Typically, the input window of Authority Verification information can after the note content receiving user checks request, be ejected Mouthful, to indicate this user in described input window, complete the input to described Authority Verification information.
Further, operation complexity during privacy note, described lawful authority information are checked in order to reduce validated user Iris information or face information can be selected, now, after the note content receiving user checks request, after can passing through Platform opens the iris information of mode this user of direct access of photographic head or face information is mated with lawful authority information, If this user is validated user, can directly the note content of privacy note be shown.
If 120 described Authority Verification information and the lawful authority information match associated by described privacy note, will The note content of described privacy note is shown.
Further, if described Authority Verification information and the lawful authority information not phase associated by described privacy note Join, then can be automatically switched off note application program, prompting user re-enters new Authority Verification information and verified or directly Connect and terminal is carried out with the operation such as screen locking, the present embodiment to this and is not limited.
Note approaches to IM provided in an embodiment of the present invention, receiving in note corresponding with privacy note Hold after checking request, be not directly the content of this privacy note to be shown, but need to obtain first with described privacy just Sign corresponding Authority Verification information, only described Authority Verification information and the lawful authority information phase associated by described privacy note Coupling, just the note content of described privacy note can be shown, optimize existing note information management technique it is achieved that Even if terminal is unlocked by various modes it is also possible to ensure that the content in privacy note is not compromised, substantially increase note The safety of content and privacy.
Embodiment two
A kind of schematic flow sheet of note approaches to IM that Fig. 2 provides for the embodiment of the present invention two.The present embodiment with Embodied based on above-described embodiment, in the present embodiment, please being checked according to note content corresponding with privacy note Ask, before obtaining Authority Verification information corresponding with described privacy note, also specifically include:According to note store request, with Identification setting identification symbol in the corresponding note content of note to be stored;If identifying described setting identification symbol, obtain and institute State note to be stored corresponding lawful authority information;Described note to be stored is defined as privacy note, and by described legal power Limit information is corresponding with described note to be stored to be stored;
Meanwhile, request is checked according to note content corresponding with privacy note, obtaining corresponding with described privacy note Before Authority Verification information, also specifically include:According to note preview request, stored note list and shown.Accordingly, The method of the present embodiment specifically includes:
210th, request is stored according to note, identification setting identification symbol in note content corresponding with note to be stored.
In the present embodiment, give a kind of implementation method of quick setting privacy note.When user is applied by note After program have input a note content, can be inputted one or more in the stem of note content or afterbody further pre- The identifier first setting, for example:" # ", " * ", " " or " % " etc., afterwards need not any artificial setting operation, system can be from Move and this note is set to a privacy note.
Certainly, it will be appreciated by persons skilled in the art that described setting identification symbol can be special for one or more Character or the middle word (for example, close) or the setting English alphabet or English word etc. that set quantity;Described setting The identification position of identifier and can be not limited to the above for the setting position in note content, the present embodiment.
220th, judge whether to identify described setting identification symbol:If so, 230 are executed;Otherwise, 250 are executed.
230th, lawful authority information corresponding with described note to be stored, execution 240 are obtained.
Wherein, described lawful authority information can be autonomous by user by way of ejecting lawful authority information input window Input is it is also possible to open, by backstage, iris information or the face information acquisition catching user by way of photographic head, acceptable Directly using the screen locking password of terminal or other kinds of password set in advance as described lawful authority information, this reality Apply example to this and to be not limited.
240th, described note to be stored is defined as privacy note, and by described lawful authority information with described to be stored just Sign corresponding storage, execute 260.
250th, described note to be stored is defined as common note, executes 260.
In the present embodiment, if the user while when storing a note content, not adding in note content and set mark Know symbol, then this note can be defined as common note, and receive user based on the note content of common note check please When asking, can directly the note content of common note be shown.
260th, according to note preview request, stored note list and shown, executed 270.
Wherein, described stored note list and included described privacy note, and common note;Store just described Sign in list, display part note content corresponding with described common note, do not show corresponding any with described privacy note Note content.
In existing note application program, when user selects to check by note preview request and all stores note, System can show and all store that note is corresponding to have stored note list, this has stored note list and has included each just Sign, and with each note in part note content, typically, in note content the in short.
In order to further guarantee the privacy of privacy note, user select check described in stored note list when, Part note content in privacy note is equally hidden, namely:Stored in note list described, do not show with The corresponding any note content of described privacy note.
270th, request is checked according to note content corresponding with privacy note, obtain authority corresponding with described privacy note Checking information.
If 280 described Authority Verification information and the lawful authority information match associated by described privacy note, will The note content of described privacy note is shown.
The technical scheme of the present embodiment, by checking request according to note content corresponding with privacy note, obtains and institute Before stating privacy note corresponding Authority Verification information, request is stored according to note, in note corresponding with note to be stored Identification setting identification symbol in appearance;If identifying described setting identification symbol, it is corresponding legal with described note to be stored to obtain Authority information;Described note to be stored is defined as privacy note, and by described lawful authority information and described note to be stored The technological means of corresponding storage, it is possible to achieve technique effect that is simple, easily arranging privacy note, user is completing in note On the basis of the input held, only pass through a very simple operation increasing setting identification symbol, you can a note is arranged For privacy note;Pass through not showing any note content corresponding with described privacy note in storing note list simultaneously Technological means, further ensure that safety and the privacy of privacy note.
Embodiment three
A kind of schematic flow sheet of note approaches to IM that Fig. 3 provides for the embodiment of the present invention three.The present embodiment with Embodied based on above-described embodiment, in the present embodiment, please being checked according to note content corresponding with privacy note Ask, before obtaining Authority Verification information corresponding with described privacy note, also specifically include:According to note CIPHERING REQUEST, obtain The note of Choice encryption;Obtain lawful authority information corresponding with the note of described Choice encryption;By described Choice encryption just Label are defined as privacy note, and store corresponding with the note of described Choice encryption for described lawful authority information;
Meanwhile, request is checked according to note content corresponding with privacy note, obtaining corresponding with described privacy note After Authority Verification information, also specifically include:If described Authority Verification information and the legal power associated by described privacy note It fails to match for limit information, then reacquire new Authority Verification information and mated;If the number of times that it fails to match exceedes setting Threshold value, then triggering execution terminal screen lock operation.
Accordingly, the method for the present embodiment specifically includes:
310th, according to note CIPHERING REQUEST, obtain the note of Choice encryption.
In the present embodiment, give a kind of practical operation according to user to select to need the note encrypted as privacy just The implementation method signed, the present embodiment is with the difference of embodiment two, cannot determine this just in note content memory phase Sign in the case of whether being privacy note, flexibly a note can be set to privacy note under when machine in office.
320th, obtain lawful authority information corresponding with the note of described Choice encryption.
330th, the note of described Choice encryption is defined as privacy note, and by described lawful authority information and described selection The corresponding storage of the note of encryption.
340th, request is checked according to note content corresponding with privacy note, obtain authority corresponding with described privacy note Checking information.
350th, judge described Authority Verification information whether with the lawful authority information match associated by described privacy note: If so, 360 are executed;Otherwise, 370 are executed.
360th, the note content of described privacy note is shown.
370th, judge whether the number of times that it fails to match exceedes setting threshold value, if so, execute 380, otherwise execute 390.
In the present embodiment it is contemplated that when user is based on privacy note input Authority Verification information, due to system The presence of the factors such as the maloperation of accuracy of identification and user, the coupling of the single Authority Verification information of a possible validated user Process is unsuccessful.At this point it is possible to require user to re-enter new Authority Verification information to be mated again.If multiple If joining failure, then can determine that this user is not validated user, therefore, it can directly terminal be carried out screen locking to protect Other privacy informations of user.
380th, triggering execution terminal screen lock operation.
390th, reacquire new Authority Verification information, and return execution 350.
The technical scheme of the present embodiment is passed through to obtain the note of Choice encryption according to note CIPHERING REQUEST;Obtain with described The note corresponding lawful authority information of Choice encryption;The note of described Choice encryption is defined as privacy note, and will be described The technological means of lawful authority information storage corresponding with the note of described Choice encryption, increased the spirit that privacy note arranges opportunity Activity and mobility, by increased in Authority Verification information and the lawful authority information matches associated by described privacy note Process strategy after failure, optimizes and the perfect technical scheme of the embodiment of the present invention further.
On the basis of the various embodiments described above, methods described can also include:
Obtain at least one to be synchronized note corresponding with note synchronization request;
If described note to be synchronized includes privacy note to be synchronized, by the note of described privacy note to be synchronized Hold, privacy state and the lawful authority information associated by described privacy note to be synchronized send jointly to synchronizer.
Wherein, described synchronizer can be Cloud Server, or other kinds of terminal unit.
So setting benefit be:At present, a lot of application programs all carry high in the clouds or the work(of other-end remote synchronization Can, if a privacy note is synchronized, the privacy state of this note synchronous and associated lawful authority simultaneously Information, it is possible to achieve if other users want to check this privacy note in synchronizer, similarly needs to input phase The Authority Verification information joined, with the safety of the note content of comprehensive, multi-level guarantee privacy note.
Example IV
A kind of structure chart of note apparatus for management of information that Fig. 4 provides for the embodiment of the present invention four.As shown in figure 4, it is described Device includes:Authority Verification data obtaining module 41, and note content display module 42.
Limit checking information acquisition module 41, for request is checked according to note content corresponding with privacy note, obtain with The corresponding Authority Verification information of described privacy note.
Note content display module 42, if for described Authority Verification information with legal associated by described privacy note Authority information matches, then shown the note content of described privacy note.
Note apparatus for management of information provided in an embodiment of the present invention, receiving in note corresponding with privacy note Hold after checking request, be not directly the content of this privacy note to be shown, but need to obtain first with described privacy just Sign corresponding Authority Verification information, only described Authority Verification information and the lawful authority information phase associated by described privacy note Coupling, just the note content of described privacy note can be shown, optimize existing note information management technique it is achieved that Even if terminal is unlocked by various modes it is also possible to ensure that the content in privacy note is not compromised, substantially increase note The safety of content and privacy.
Embodiment five
A kind of structure chart of note apparatus for management of information that Fig. 5 provides for the embodiment of the present invention five.The present embodiment is with above-mentioned Embodied based on embodiment.
In the present embodiment, can also include, the first privacy note setting module 43, be used for:
Request is checked according to note content corresponding with privacy note, is obtaining authority corresponding with described privacy note and test Before card information, request is stored according to note, identification setting identification symbol in note content corresponding with note to be stored;
If identifying described setting identification symbol, obtain lawful authority information corresponding with described note to be stored;
Described note to be stored is defined as privacy note, and by described lawful authority information and described note pair to be stored Should store.
In the present embodiment, can also include, the second privacy note setting module 44, be used for:
Request is checked according to note content corresponding with privacy note, is obtaining authority corresponding with described privacy note and test Before card information, according to note CIPHERING REQUEST, obtain the note of Choice encryption;
Obtain lawful authority information corresponding with the note of described Choice encryption;
The note of described Choice encryption is defined as privacy note, and by described lawful authority information and described Choice encryption The corresponding storage of note.
In the present embodiment, described lawful authority information can include following at least one:
Finger print information, iris information, face information, gesture information, setting character string information and setting pictorial information.
In the present embodiment, can also include, note list display module 45, be used for:
Request is checked according to note content corresponding with privacy note, is obtaining authority corresponding with described privacy note and test Before card information, according to note preview request, stored note list and shown;
Wherein, described stored note list and included described privacy note, and common note;
Stored in note list described, display part note content corresponding with described common note, do not show and The corresponding any note content of described privacy note.
In the present embodiment, can also include, screen locking module 46, be used for:
Request is checked according to note content corresponding with privacy note, is obtaining authority corresponding with described privacy note and test After card information, if described Authority Verification information and the lawful authority information matches failure associated by described privacy note, Reacquire new Authority Verification information to be mated;
If the number of times that it fails to match exceedes setting threshold value, triggering execution terminal screen lock operation.
In the present embodiment, can also include, note synchronization module 47, be used for:
Obtain at least one to be synchronized note corresponding with note synchronization request;
If described note to be synchronized includes privacy note to be synchronized, by the note of described privacy note to be synchronized Hold, privacy state and the lawful authority information associated by described privacy note to be synchronized send jointly to synchronizer.
The note apparatus for management of information that the embodiment of the present invention is provided can be used for executing what any embodiment of the present invention provided Note approaches to IM, possesses corresponding functional module, realizes identical beneficial effect.
Note, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious changes, Readjust and substitute without departing from protection scope of the present invention.Therefore although being carried out to the present invention by above example It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also Other Equivalent embodiments more can be included, and the scope of the present invention is determined by scope of the appended claims.

Claims (14)

1. a kind of note approaches to IM is it is characterised in that include:
Request is checked according to note content corresponding with privacy note, obtains Authority Verification letter corresponding with described privacy note Breath;
If described Authority Verification information and the lawful authority information match associated by described privacy note, by described privacy The note content of note is shown.
2. method according to claim 1 is it is characterised in that ask being checked according to note content corresponding with privacy note Ask, before obtaining Authority Verification information corresponding with described privacy note, also include:
Request is stored according to note, identification setting identification symbol in note content corresponding with note to be stored;
If identifying described setting identification symbol, obtain lawful authority information corresponding with described note to be stored;
Described note to be stored is defined as privacy note, and deposits corresponding with described note to be stored for described lawful authority information Storage.
3. method according to claim 1 is it is characterised in that ask being checked according to note content corresponding with privacy note Ask, before obtaining Authority Verification information corresponding with described privacy note, also include:
According to note CIPHERING REQUEST, obtain the note of Choice encryption;
Obtain lawful authority information corresponding with the note of described Choice encryption;
The note of described Choice encryption is defined as privacy note, and by described lawful authority information with described Choice encryption just Sign corresponding storage.
4. method according to claim 1 it is characterised in that described lawful authority information include following at least one:
Finger print information, iris information, face information, gesture information, setting character string information and setting pictorial information.
5. method according to claim 1 is it is characterised in that ask being checked according to note content corresponding with privacy note Ask, before obtaining Authority Verification information corresponding with described privacy note, also include:
According to note preview request, stored note list and shown;
Wherein, described stored note list and included described privacy note, and common note;
Stored in note list described, display part note content corresponding with described common note, do not show with described The corresponding any note content of privacy note.
6. method according to claim 1 is it is characterised in that ask being checked according to note content corresponding with privacy note Ask, after obtaining Authority Verification information corresponding with described privacy note, also include:
If described Authority Verification information and the lawful authority information matches failure associated by described privacy note, reacquire New Authority Verification information is mated;
If the number of times that it fails to match exceedes setting threshold value, triggering execution terminal screen lock operation.
7. method according to claim 1 is it is characterised in that also include:
Obtain at least one to be synchronized note corresponding with note synchronization request;
If described note to be synchronized includes privacy note to be synchronized, by the note content of described privacy note to be synchronized, Lawful authority information associated by privacy state and described privacy note to be synchronized sends jointly to synchronizer.
8. a kind of note apparatus for management of information is it is characterised in that include:
Authority Verification data obtaining module, for request is checked according to note content corresponding with privacy note, obtain with described Privacy note corresponding Authority Verification information;
Note content display module, if for described Authority Verification information and the lawful authority letter associated by described privacy note Manner of breathing mates, then shown the note content of described privacy note.
9. device according to claim 8 is it is characterised in that also include, and the first privacy note setting module is used for:
Request is checked according to note content corresponding with privacy note, is obtaining Authority Verification letter corresponding with described privacy note Before breath, request is stored according to note, identification setting identification symbol in note content corresponding with note to be stored;
If identifying described setting identification symbol, obtain lawful authority information corresponding with described note to be stored;
Described note to be stored is defined as privacy note, and deposits corresponding with described note to be stored for described lawful authority information Storage.
10. device according to claim 8 is it is characterised in that also include, and the second privacy note setting module is used for:
Request is checked according to note content corresponding with privacy note, is obtaining Authority Verification letter corresponding with described privacy note Before breath, according to note CIPHERING REQUEST, obtain the note of Choice encryption;
Obtain lawful authority information corresponding with the note of described Choice encryption;
The note of described Choice encryption is defined as privacy note, and by described lawful authority information with described Choice encryption just Sign corresponding storage.
11. devices according to claim 8 it is characterised in that described lawful authority information include following at least one:
Finger print information, iris information, face information, gesture information, setting character string information and setting pictorial information.
12. devices according to claim 8 it is characterised in that also including, note list display module, be used for:
Request is checked according to note content corresponding with privacy note, is obtaining Authority Verification letter corresponding with described privacy note Before breath, according to note preview request, stored note list and shown;
Wherein, described stored note list and included described privacy note, and common note;
Stored in note list described, display part note content corresponding with described common note, do not show with described The corresponding any note content of privacy note.
13. devices according to claim 8 it is characterised in that also including, screen locking module, be used for:
Request is checked according to note content corresponding with privacy note, is obtaining Authority Verification letter corresponding with described privacy note After breath, if described Authority Verification information and the lawful authority information matches failure associated by described privacy note, again Obtain new Authority Verification information to be mated;
If the number of times that it fails to match exceedes setting threshold value, triggering execution terminal screen lock operation.
14. devices according to claim 8 it is characterised in that also including, note synchronization module, be used for:
Obtain at least one to be synchronized note corresponding with note synchronization request;
If described note to be synchronized includes privacy note to be synchronized, by the note content of described privacy note to be synchronized, Lawful authority information associated by privacy state and described privacy note to be synchronized sends jointly to synchronizer.
CN201610839185.4A 2016-09-21 2016-09-21 A memo information management method and device Pending CN106407838A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610839185.4A CN106407838A (en) 2016-09-21 2016-09-21 A memo information management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610839185.4A CN106407838A (en) 2016-09-21 2016-09-21 A memo information management method and device

Publications (1)

Publication Number Publication Date
CN106407838A true CN106407838A (en) 2017-02-15

Family

ID=57997166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610839185.4A Pending CN106407838A (en) 2016-09-21 2016-09-21 A memo information management method and device

Country Status (1)

Country Link
CN (1) CN106407838A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107332973A (en) * 2017-05-19 2017-11-07 北京安云世纪科技有限公司 A kind of processing method of text data, device and mobile terminal
CN109344657A (en) * 2018-12-07 2019-02-15 百度在线网络技术(北京)有限公司 Privacy risk appraisal procedure and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040230843A1 (en) * 2003-08-20 2004-11-18 Wayne Jansen System and method for authenticating users using image selection
CN101951443A (en) * 2010-09-25 2011-01-19 宇龙计算机通信科技(深圳)有限公司 File security method, system and mobile terminal
CN102609634A (en) * 2011-01-24 2012-07-25 富泰华工业(深圳)有限公司 Electronic device and method for managing file permission
CN104517069A (en) * 2015-01-12 2015-04-15 联想(北京)有限公司 Information processing method and electronic equipment
CN105528552A (en) * 2014-09-29 2016-04-27 北京壹人壹本信息科技有限公司 Implementation method and apparatus for noting tool
CN105844170A (en) * 2015-01-16 2016-08-10 阿里巴巴集团控股有限公司 File processing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040230843A1 (en) * 2003-08-20 2004-11-18 Wayne Jansen System and method for authenticating users using image selection
CN101951443A (en) * 2010-09-25 2011-01-19 宇龙计算机通信科技(深圳)有限公司 File security method, system and mobile terminal
CN102609634A (en) * 2011-01-24 2012-07-25 富泰华工业(深圳)有限公司 Electronic device and method for managing file permission
CN105528552A (en) * 2014-09-29 2016-04-27 北京壹人壹本信息科技有限公司 Implementation method and apparatus for noting tool
CN104517069A (en) * 2015-01-12 2015-04-15 联想(北京)有限公司 Information processing method and electronic equipment
CN105844170A (en) * 2015-01-16 2016-08-10 阿里巴巴集团控股有限公司 File processing method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107332973A (en) * 2017-05-19 2017-11-07 北京安云世纪科技有限公司 A kind of processing method of text data, device and mobile terminal
CN109344657A (en) * 2018-12-07 2019-02-15 百度在线网络技术(北京)有限公司 Privacy risk appraisal procedure and device
CN109344657B (en) * 2018-12-07 2022-09-13 百度在线网络技术(北京)有限公司 Privacy risk assessment method and device

Similar Documents

Publication Publication Date Title
EP3320667B1 (en) Method for mapping at least two authentication devices to a user account using an authentication server
JP5727008B2 (en) Operating system unlocking method and mobile phone
CN105184179B (en) Embedded encrypted mobile storage device and operation method thereof
CN104320389B (en) A kind of fusion identity protection system and method based on cloud computing
US20150169860A1 (en) Security key using multi-otp, security service apparatus, security system
CN104104672A (en) Method for establishing dynamic authorization code based on identity authentication
KR101509043B1 (en) Implementing method, system of universal card system and smart card
CN109151820A (en) One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 "
CN106650490B (en) The login method and device of cloud account
EP2821866A1 (en) Control program management system and method for changing control program
EP3206329B1 (en) Security check method, device, terminal and server
CN103778381A (en) Application screen locking method and device based on Android
CN102647712B (en) A kind of mobile phone data encryption method and decryption method
CN105915338A (en) Key generation method and key generation system
CN109840435A (en) A kind of data guard method storing equipment
CN106572082A (en) Approval signature verifying method, mobile device, terminal device and system
CN106169052A (en) The processing method of application program, device and mobile terminal
CN105809445A (en) Password verifying and processing method, apparatus and terminal
CN107835162B (en) Software digital permit server gives the method and software digital permit server that permission is signed and issued in the license of software developer's software digital
CN106100851A (en) Password management system, intelligent wristwatch and cipher management method thereof
CN110402440A (en) Segment key Verification System
CN106407838A (en) A memo information management method and device
CN107580002A (en) Double factor authentication safety management machine login system and method
CN105913508B (en) A kind of Work attendance method based on intelligent NFC label
CN102594815B (en) Before register system, user right is set and performs method, the device of corresponding operating

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170215