CN106407838A - A memo information management method and device - Google Patents
A memo information management method and device Download PDFInfo
- Publication number
- CN106407838A CN106407838A CN201610839185.4A CN201610839185A CN106407838A CN 106407838 A CN106407838 A CN 106407838A CN 201610839185 A CN201610839185 A CN 201610839185A CN 106407838 A CN106407838 A CN 106407838A
- Authority
- CN
- China
- Prior art keywords
- note
- privacy
- information
- content
- stored
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The embodiments of the invention provide a memo information management method and device and relates to the technical field of information processing. The method comprises the steps of according to a memo content view request corresponding to a privacy memo, acquiring permission validation information corresponding to the privacy memo; if the permission validation information matches legitimate permission information correlative with the privacy memo, displaying the content of the privacy memo. The technical solution of the embodiments of the invention optimizes the conventional memo information management technology and can guarantee that the content in privacy memos does not leak out even if corresponding terminals are unlocked via various methods, and thus improve the security and privacy of the content of memos greatly.
Description
Technical field
The present embodiments relate to the information processing technology, more particularly, to a kind of note approaches to IM and device.
Background technology
With scientific and technological development, the intelligent terminal such as mobile phone, panel computer increasingly popularizes in our life, meanwhile,
In order to meet the use demand of user, mobile terminal provides various functions, and for example, people can be carried out using mobile phone
Positioning and navigation, are recorded the drop in life, and mobile phone notes function are just used to record the one of general information by mobile phone
Plant very important mode.Wherein, because the content of record in note is probably related to the privacy of user, therefore how to ensure
The safety of note content is that have a to be solved major issue.
During realizing the present invention, inventor finds:At present, mainly by adding the side of screen lock for intelligent terminal
Formula realizes the protection to note content, and the user being only successfully completed terminal screen unblock just can check the content in note.Existing
The major defect having technology is:If a terminal is shielded because the malice of user's carelessness or other users cracks
After curtain unblock, then the content recorded in the note of this terminal will be no longer safe.
Content of the invention
In view of this, the embodiment of the present invention provides a kind of note approaches to IM and device, to optimize existing note
Information management technique is it is ensured that the safety of note content and privacy.
In a first aspect, embodiments providing a kind of note approaches to IM, including:
Request is checked according to note content corresponding with privacy note, obtains Authority Verification corresponding with described privacy note
Information;
If described Authority Verification information and the lawful authority information match associated by described privacy note, will be described
The note content of privacy note is shown.
Second aspect, the embodiment of the present invention additionally provides a kind of note apparatus for management of information, including:
Authority Verification data obtaining module, for request is checked according to note content corresponding with privacy note, obtain with
The corresponding Authority Verification information of described privacy note;
Note content display module, if for described Authority Verification information and the legal power associated by described privacy note
Limit information matches, then shown the note content of described privacy note.
Note approaches to IM provided in an embodiment of the present invention and device, corresponding with a privacy note receiving
After note content checks request, be not directly the content of this privacy note to be shown, but need to obtain first with described
Privacy note corresponding Authority Verification information, only described Authority Verification information and the lawful authority associated by described privacy note
The note content of described privacy note just can be shown, be optimized existing note information management technique by information match,
Even if achieving terminal to be unlocked by various modes it is also possible to ensure that the content in privacy note is not compromised, greatly improve
The safety of note content and privacy.
Brief description
Fig. 1 is a kind of flow chart of note approaches to IM that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow chart of note approaches to IM that the embodiment of the present invention two provides;
Fig. 3 is a kind of flow chart of note approaches to IM that the embodiment of the present invention three provides;
Fig. 4 is a kind of structure chart of note apparatus for management of information that the embodiment of the present invention four provides;
Fig. 5 is a kind of structure chart of note apparatus for management of information that the embodiment of the present invention five provides.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining the present invention, rather than limitation of the invention.It also should be noted that, in order to just
Part related to the present invention rather than entire infrastructure is illustrate only in description, accompanying drawing.
It also should be noted that, for the ease of description, illustrate only in accompanying drawing part related to the present invention rather than
Full content.It should be mentioned that some exemplary embodiments are described before exemplary embodiment is discussed in greater detail
Become the process described as flow chart or method.Although operations (or step) are described as the process of order by flow chart,
It is that many of which operation can be implemented concurrently, concomitantly or simultaneously.Additionally, the order of operations can be by again
Arrange.Described process can be terminated when its operations are completed, it is also possible to have the additional step being not included in accompanying drawing.
Described process can correspond to method, function, code, subroutine, subprogram etc..
Embodiment one
A kind of flow chart of note approaches to IM that Fig. 1 provides for the embodiment of the present invention one, the method can be by just
Sign apparatus for management of information execution, this device can be realized by software and/or hardware, and typically can be integrated in note application journey is installed
In the terminal of sequence.As shown in figure 1, the method for the present embodiment specifically includes:
110th, request is checked according to note content corresponding with privacy note, obtain authority corresponding with described privacy note
Checking information.
In the present embodiment, described privacy note refers to need to carry out secret protection or privacy class is higher just
Sign.Wherein it is possible to whole notes of record in note application program are disposed as privacy note it is also possible to choosing according to user
Select and the part note (1 or several) of record in note application program is set to privacy note.
After a note is arranged to privacy note, if the note content receiving user checks request, will not
Directly the content of this note is shown, but need to obtain Authority Verification information first.
Wherein, described Authority Verification information specifically refers to check in privacy note for verifying whether active user has permission
The information held.
Accordingly, need to prestore the lawful authority information associating with privacy note, this lawful authority information is used for knowing
The accuracy of not other this Authority Verification information.
Described lawful authority information can include following at least one:Finger print information, iris information, face information, gesture
Information, setting character string information and setting pictorial information.
Wherein, described lawful authority information can identical or different from the screen locking password of terminal it is preferred that in order to
Improve the safety of described privacy note further, described lawful authority information is different from the screen locking password of terminal.
Typically, the input window of Authority Verification information can after the note content receiving user checks request, be ejected
Mouthful, to indicate this user in described input window, complete the input to described Authority Verification information.
Further, operation complexity during privacy note, described lawful authority information are checked in order to reduce validated user
Iris information or face information can be selected, now, after the note content receiving user checks request, after can passing through
Platform opens the iris information of mode this user of direct access of photographic head or face information is mated with lawful authority information,
If this user is validated user, can directly the note content of privacy note be shown.
If 120 described Authority Verification information and the lawful authority information match associated by described privacy note, will
The note content of described privacy note is shown.
Further, if described Authority Verification information and the lawful authority information not phase associated by described privacy note
Join, then can be automatically switched off note application program, prompting user re-enters new Authority Verification information and verified or directly
Connect and terminal is carried out with the operation such as screen locking, the present embodiment to this and is not limited.
Note approaches to IM provided in an embodiment of the present invention, receiving in note corresponding with privacy note
Hold after checking request, be not directly the content of this privacy note to be shown, but need to obtain first with described privacy just
Sign corresponding Authority Verification information, only described Authority Verification information and the lawful authority information phase associated by described privacy note
Coupling, just the note content of described privacy note can be shown, optimize existing note information management technique it is achieved that
Even if terminal is unlocked by various modes it is also possible to ensure that the content in privacy note is not compromised, substantially increase note
The safety of content and privacy.
Embodiment two
A kind of schematic flow sheet of note approaches to IM that Fig. 2 provides for the embodiment of the present invention two.The present embodiment with
Embodied based on above-described embodiment, in the present embodiment, please being checked according to note content corresponding with privacy note
Ask, before obtaining Authority Verification information corresponding with described privacy note, also specifically include:According to note store request, with
Identification setting identification symbol in the corresponding note content of note to be stored;If identifying described setting identification symbol, obtain and institute
State note to be stored corresponding lawful authority information;Described note to be stored is defined as privacy note, and by described legal power
Limit information is corresponding with described note to be stored to be stored;
Meanwhile, request is checked according to note content corresponding with privacy note, obtaining corresponding with described privacy note
Before Authority Verification information, also specifically include:According to note preview request, stored note list and shown.Accordingly,
The method of the present embodiment specifically includes:
210th, request is stored according to note, identification setting identification symbol in note content corresponding with note to be stored.
In the present embodiment, give a kind of implementation method of quick setting privacy note.When user is applied by note
After program have input a note content, can be inputted one or more in the stem of note content or afterbody further pre-
The identifier first setting, for example:" # ", " * ", " " or " % " etc., afterwards need not any artificial setting operation, system can be from
Move and this note is set to a privacy note.
Certainly, it will be appreciated by persons skilled in the art that described setting identification symbol can be special for one or more
Character or the middle word (for example, close) or the setting English alphabet or English word etc. that set quantity;Described setting
The identification position of identifier and can be not limited to the above for the setting position in note content, the present embodiment.
220th, judge whether to identify described setting identification symbol:If so, 230 are executed;Otherwise, 250 are executed.
230th, lawful authority information corresponding with described note to be stored, execution 240 are obtained.
Wherein, described lawful authority information can be autonomous by user by way of ejecting lawful authority information input window
Input is it is also possible to open, by backstage, iris information or the face information acquisition catching user by way of photographic head, acceptable
Directly using the screen locking password of terminal or other kinds of password set in advance as described lawful authority information, this reality
Apply example to this and to be not limited.
240th, described note to be stored is defined as privacy note, and by described lawful authority information with described to be stored just
Sign corresponding storage, execute 260.
250th, described note to be stored is defined as common note, executes 260.
In the present embodiment, if the user while when storing a note content, not adding in note content and set mark
Know symbol, then this note can be defined as common note, and receive user based on the note content of common note check please
When asking, can directly the note content of common note be shown.
260th, according to note preview request, stored note list and shown, executed 270.
Wherein, described stored note list and included described privacy note, and common note;Store just described
Sign in list, display part note content corresponding with described common note, do not show corresponding any with described privacy note
Note content.
In existing note application program, when user selects to check by note preview request and all stores note,
System can show and all store that note is corresponding to have stored note list, this has stored note list and has included each just
Sign, and with each note in part note content, typically, in note content the in short.
In order to further guarantee the privacy of privacy note, user select check described in stored note list when,
Part note content in privacy note is equally hidden, namely:Stored in note list described, do not show with
The corresponding any note content of described privacy note.
270th, request is checked according to note content corresponding with privacy note, obtain authority corresponding with described privacy note
Checking information.
If 280 described Authority Verification information and the lawful authority information match associated by described privacy note, will
The note content of described privacy note is shown.
The technical scheme of the present embodiment, by checking request according to note content corresponding with privacy note, obtains and institute
Before stating privacy note corresponding Authority Verification information, request is stored according to note, in note corresponding with note to be stored
Identification setting identification symbol in appearance;If identifying described setting identification symbol, it is corresponding legal with described note to be stored to obtain
Authority information;Described note to be stored is defined as privacy note, and by described lawful authority information and described note to be stored
The technological means of corresponding storage, it is possible to achieve technique effect that is simple, easily arranging privacy note, user is completing in note
On the basis of the input held, only pass through a very simple operation increasing setting identification symbol, you can a note is arranged
For privacy note;Pass through not showing any note content corresponding with described privacy note in storing note list simultaneously
Technological means, further ensure that safety and the privacy of privacy note.
Embodiment three
A kind of schematic flow sheet of note approaches to IM that Fig. 3 provides for the embodiment of the present invention three.The present embodiment with
Embodied based on above-described embodiment, in the present embodiment, please being checked according to note content corresponding with privacy note
Ask, before obtaining Authority Verification information corresponding with described privacy note, also specifically include:According to note CIPHERING REQUEST, obtain
The note of Choice encryption;Obtain lawful authority information corresponding with the note of described Choice encryption;By described Choice encryption just
Label are defined as privacy note, and store corresponding with the note of described Choice encryption for described lawful authority information;
Meanwhile, request is checked according to note content corresponding with privacy note, obtaining corresponding with described privacy note
After Authority Verification information, also specifically include:If described Authority Verification information and the legal power associated by described privacy note
It fails to match for limit information, then reacquire new Authority Verification information and mated;If the number of times that it fails to match exceedes setting
Threshold value, then triggering execution terminal screen lock operation.
Accordingly, the method for the present embodiment specifically includes:
310th, according to note CIPHERING REQUEST, obtain the note of Choice encryption.
In the present embodiment, give a kind of practical operation according to user to select to need the note encrypted as privacy just
The implementation method signed, the present embodiment is with the difference of embodiment two, cannot determine this just in note content memory phase
Sign in the case of whether being privacy note, flexibly a note can be set to privacy note under when machine in office.
320th, obtain lawful authority information corresponding with the note of described Choice encryption.
330th, the note of described Choice encryption is defined as privacy note, and by described lawful authority information and described selection
The corresponding storage of the note of encryption.
340th, request is checked according to note content corresponding with privacy note, obtain authority corresponding with described privacy note
Checking information.
350th, judge described Authority Verification information whether with the lawful authority information match associated by described privacy note:
If so, 360 are executed;Otherwise, 370 are executed.
360th, the note content of described privacy note is shown.
370th, judge whether the number of times that it fails to match exceedes setting threshold value, if so, execute 380, otherwise execute 390.
In the present embodiment it is contemplated that when user is based on privacy note input Authority Verification information, due to system
The presence of the factors such as the maloperation of accuracy of identification and user, the coupling of the single Authority Verification information of a possible validated user
Process is unsuccessful.At this point it is possible to require user to re-enter new Authority Verification information to be mated again.If multiple
If joining failure, then can determine that this user is not validated user, therefore, it can directly terminal be carried out screen locking to protect
Other privacy informations of user.
380th, triggering execution terminal screen lock operation.
390th, reacquire new Authority Verification information, and return execution 350.
The technical scheme of the present embodiment is passed through to obtain the note of Choice encryption according to note CIPHERING REQUEST;Obtain with described
The note corresponding lawful authority information of Choice encryption;The note of described Choice encryption is defined as privacy note, and will be described
The technological means of lawful authority information storage corresponding with the note of described Choice encryption, increased the spirit that privacy note arranges opportunity
Activity and mobility, by increased in Authority Verification information and the lawful authority information matches associated by described privacy note
Process strategy after failure, optimizes and the perfect technical scheme of the embodiment of the present invention further.
On the basis of the various embodiments described above, methods described can also include:
Obtain at least one to be synchronized note corresponding with note synchronization request;
If described note to be synchronized includes privacy note to be synchronized, by the note of described privacy note to be synchronized
Hold, privacy state and the lawful authority information associated by described privacy note to be synchronized send jointly to synchronizer.
Wherein, described synchronizer can be Cloud Server, or other kinds of terminal unit.
So setting benefit be:At present, a lot of application programs all carry high in the clouds or the work(of other-end remote synchronization
Can, if a privacy note is synchronized, the privacy state of this note synchronous and associated lawful authority simultaneously
Information, it is possible to achieve if other users want to check this privacy note in synchronizer, similarly needs to input phase
The Authority Verification information joined, with the safety of the note content of comprehensive, multi-level guarantee privacy note.
Example IV
A kind of structure chart of note apparatus for management of information that Fig. 4 provides for the embodiment of the present invention four.As shown in figure 4, it is described
Device includes:Authority Verification data obtaining module 41, and note content display module 42.
Limit checking information acquisition module 41, for request is checked according to note content corresponding with privacy note, obtain with
The corresponding Authority Verification information of described privacy note.
Note content display module 42, if for described Authority Verification information with legal associated by described privacy note
Authority information matches, then shown the note content of described privacy note.
Note apparatus for management of information provided in an embodiment of the present invention, receiving in note corresponding with privacy note
Hold after checking request, be not directly the content of this privacy note to be shown, but need to obtain first with described privacy just
Sign corresponding Authority Verification information, only described Authority Verification information and the lawful authority information phase associated by described privacy note
Coupling, just the note content of described privacy note can be shown, optimize existing note information management technique it is achieved that
Even if terminal is unlocked by various modes it is also possible to ensure that the content in privacy note is not compromised, substantially increase note
The safety of content and privacy.
Embodiment five
A kind of structure chart of note apparatus for management of information that Fig. 5 provides for the embodiment of the present invention five.The present embodiment is with above-mentioned
Embodied based on embodiment.
In the present embodiment, can also include, the first privacy note setting module 43, be used for:
Request is checked according to note content corresponding with privacy note, is obtaining authority corresponding with described privacy note and test
Before card information, request is stored according to note, identification setting identification symbol in note content corresponding with note to be stored;
If identifying described setting identification symbol, obtain lawful authority information corresponding with described note to be stored;
Described note to be stored is defined as privacy note, and by described lawful authority information and described note pair to be stored
Should store.
In the present embodiment, can also include, the second privacy note setting module 44, be used for:
Request is checked according to note content corresponding with privacy note, is obtaining authority corresponding with described privacy note and test
Before card information, according to note CIPHERING REQUEST, obtain the note of Choice encryption;
Obtain lawful authority information corresponding with the note of described Choice encryption;
The note of described Choice encryption is defined as privacy note, and by described lawful authority information and described Choice encryption
The corresponding storage of note.
In the present embodiment, described lawful authority information can include following at least one:
Finger print information, iris information, face information, gesture information, setting character string information and setting pictorial information.
In the present embodiment, can also include, note list display module 45, be used for:
Request is checked according to note content corresponding with privacy note, is obtaining authority corresponding with described privacy note and test
Before card information, according to note preview request, stored note list and shown;
Wherein, described stored note list and included described privacy note, and common note;
Stored in note list described, display part note content corresponding with described common note, do not show and
The corresponding any note content of described privacy note.
In the present embodiment, can also include, screen locking module 46, be used for:
Request is checked according to note content corresponding with privacy note, is obtaining authority corresponding with described privacy note and test
After card information, if described Authority Verification information and the lawful authority information matches failure associated by described privacy note,
Reacquire new Authority Verification information to be mated;
If the number of times that it fails to match exceedes setting threshold value, triggering execution terminal screen lock operation.
In the present embodiment, can also include, note synchronization module 47, be used for:
Obtain at least one to be synchronized note corresponding with note synchronization request;
If described note to be synchronized includes privacy note to be synchronized, by the note of described privacy note to be synchronized
Hold, privacy state and the lawful authority information associated by described privacy note to be synchronized send jointly to synchronizer.
The note apparatus for management of information that the embodiment of the present invention is provided can be used for executing what any embodiment of the present invention provided
Note approaches to IM, possesses corresponding functional module, realizes identical beneficial effect.
Note, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that
The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious changes,
Readjust and substitute without departing from protection scope of the present invention.Therefore although being carried out to the present invention by above example
It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also
Other Equivalent embodiments more can be included, and the scope of the present invention is determined by scope of the appended claims.
Claims (14)
1. a kind of note approaches to IM is it is characterised in that include:
Request is checked according to note content corresponding with privacy note, obtains Authority Verification letter corresponding with described privacy note
Breath;
If described Authority Verification information and the lawful authority information match associated by described privacy note, by described privacy
The note content of note is shown.
2. method according to claim 1 is it is characterised in that ask being checked according to note content corresponding with privacy note
Ask, before obtaining Authority Verification information corresponding with described privacy note, also include:
Request is stored according to note, identification setting identification symbol in note content corresponding with note to be stored;
If identifying described setting identification symbol, obtain lawful authority information corresponding with described note to be stored;
Described note to be stored is defined as privacy note, and deposits corresponding with described note to be stored for described lawful authority information
Storage.
3. method according to claim 1 is it is characterised in that ask being checked according to note content corresponding with privacy note
Ask, before obtaining Authority Verification information corresponding with described privacy note, also include:
According to note CIPHERING REQUEST, obtain the note of Choice encryption;
Obtain lawful authority information corresponding with the note of described Choice encryption;
The note of described Choice encryption is defined as privacy note, and by described lawful authority information with described Choice encryption just
Sign corresponding storage.
4. method according to claim 1 it is characterised in that described lawful authority information include following at least one:
Finger print information, iris information, face information, gesture information, setting character string information and setting pictorial information.
5. method according to claim 1 is it is characterised in that ask being checked according to note content corresponding with privacy note
Ask, before obtaining Authority Verification information corresponding with described privacy note, also include:
According to note preview request, stored note list and shown;
Wherein, described stored note list and included described privacy note, and common note;
Stored in note list described, display part note content corresponding with described common note, do not show with described
The corresponding any note content of privacy note.
6. method according to claim 1 is it is characterised in that ask being checked according to note content corresponding with privacy note
Ask, after obtaining Authority Verification information corresponding with described privacy note, also include:
If described Authority Verification information and the lawful authority information matches failure associated by described privacy note, reacquire
New Authority Verification information is mated;
If the number of times that it fails to match exceedes setting threshold value, triggering execution terminal screen lock operation.
7. method according to claim 1 is it is characterised in that also include:
Obtain at least one to be synchronized note corresponding with note synchronization request;
If described note to be synchronized includes privacy note to be synchronized, by the note content of described privacy note to be synchronized,
Lawful authority information associated by privacy state and described privacy note to be synchronized sends jointly to synchronizer.
8. a kind of note apparatus for management of information is it is characterised in that include:
Authority Verification data obtaining module, for request is checked according to note content corresponding with privacy note, obtain with described
Privacy note corresponding Authority Verification information;
Note content display module, if for described Authority Verification information and the lawful authority letter associated by described privacy note
Manner of breathing mates, then shown the note content of described privacy note.
9. device according to claim 8 is it is characterised in that also include, and the first privacy note setting module is used for:
Request is checked according to note content corresponding with privacy note, is obtaining Authority Verification letter corresponding with described privacy note
Before breath, request is stored according to note, identification setting identification symbol in note content corresponding with note to be stored;
If identifying described setting identification symbol, obtain lawful authority information corresponding with described note to be stored;
Described note to be stored is defined as privacy note, and deposits corresponding with described note to be stored for described lawful authority information
Storage.
10. device according to claim 8 is it is characterised in that also include, and the second privacy note setting module is used for:
Request is checked according to note content corresponding with privacy note, is obtaining Authority Verification letter corresponding with described privacy note
Before breath, according to note CIPHERING REQUEST, obtain the note of Choice encryption;
Obtain lawful authority information corresponding with the note of described Choice encryption;
The note of described Choice encryption is defined as privacy note, and by described lawful authority information with described Choice encryption just
Sign corresponding storage.
11. devices according to claim 8 it is characterised in that described lawful authority information include following at least one:
Finger print information, iris information, face information, gesture information, setting character string information and setting pictorial information.
12. devices according to claim 8 it is characterised in that also including, note list display module, be used for:
Request is checked according to note content corresponding with privacy note, is obtaining Authority Verification letter corresponding with described privacy note
Before breath, according to note preview request, stored note list and shown;
Wherein, described stored note list and included described privacy note, and common note;
Stored in note list described, display part note content corresponding with described common note, do not show with described
The corresponding any note content of privacy note.
13. devices according to claim 8 it is characterised in that also including, screen locking module, be used for:
Request is checked according to note content corresponding with privacy note, is obtaining Authority Verification letter corresponding with described privacy note
After breath, if described Authority Verification information and the lawful authority information matches failure associated by described privacy note, again
Obtain new Authority Verification information to be mated;
If the number of times that it fails to match exceedes setting threshold value, triggering execution terminal screen lock operation.
14. devices according to claim 8 it is characterised in that also including, note synchronization module, be used for:
Obtain at least one to be synchronized note corresponding with note synchronization request;
If described note to be synchronized includes privacy note to be synchronized, by the note content of described privacy note to be synchronized,
Lawful authority information associated by privacy state and described privacy note to be synchronized sends jointly to synchronizer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610839185.4A CN106407838A (en) | 2016-09-21 | 2016-09-21 | A memo information management method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610839185.4A CN106407838A (en) | 2016-09-21 | 2016-09-21 | A memo information management method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106407838A true CN106407838A (en) | 2017-02-15 |
Family
ID=57997166
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610839185.4A Pending CN106407838A (en) | 2016-09-21 | 2016-09-21 | A memo information management method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106407838A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107332973A (en) * | 2017-05-19 | 2017-11-07 | 北京安云世纪科技有限公司 | A kind of processing method of text data, device and mobile terminal |
CN109344657A (en) * | 2018-12-07 | 2019-02-15 | 百度在线网络技术(北京)有限公司 | Privacy risk appraisal procedure and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040230843A1 (en) * | 2003-08-20 | 2004-11-18 | Wayne Jansen | System and method for authenticating users using image selection |
CN101951443A (en) * | 2010-09-25 | 2011-01-19 | 宇龙计算机通信科技(深圳)有限公司 | File security method, system and mobile terminal |
CN102609634A (en) * | 2011-01-24 | 2012-07-25 | 富泰华工业(深圳)有限公司 | Electronic device and method for managing file permission |
CN104517069A (en) * | 2015-01-12 | 2015-04-15 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN105528552A (en) * | 2014-09-29 | 2016-04-27 | 北京壹人壹本信息科技有限公司 | Implementation method and apparatus for noting tool |
CN105844170A (en) * | 2015-01-16 | 2016-08-10 | 阿里巴巴集团控股有限公司 | File processing method and device |
-
2016
- 2016-09-21 CN CN201610839185.4A patent/CN106407838A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040230843A1 (en) * | 2003-08-20 | 2004-11-18 | Wayne Jansen | System and method for authenticating users using image selection |
CN101951443A (en) * | 2010-09-25 | 2011-01-19 | 宇龙计算机通信科技(深圳)有限公司 | File security method, system and mobile terminal |
CN102609634A (en) * | 2011-01-24 | 2012-07-25 | 富泰华工业(深圳)有限公司 | Electronic device and method for managing file permission |
CN105528552A (en) * | 2014-09-29 | 2016-04-27 | 北京壹人壹本信息科技有限公司 | Implementation method and apparatus for noting tool |
CN104517069A (en) * | 2015-01-12 | 2015-04-15 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN105844170A (en) * | 2015-01-16 | 2016-08-10 | 阿里巴巴集团控股有限公司 | File processing method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107332973A (en) * | 2017-05-19 | 2017-11-07 | 北京安云世纪科技有限公司 | A kind of processing method of text data, device and mobile terminal |
CN109344657A (en) * | 2018-12-07 | 2019-02-15 | 百度在线网络技术(北京)有限公司 | Privacy risk appraisal procedure and device |
CN109344657B (en) * | 2018-12-07 | 2022-09-13 | 百度在线网络技术(北京)有限公司 | Privacy risk assessment method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3320667B1 (en) | Method for mapping at least two authentication devices to a user account using an authentication server | |
JP5727008B2 (en) | Operating system unlocking method and mobile phone | |
CN105184179B (en) | Embedded encrypted mobile storage device and operation method thereof | |
CN104320389B (en) | A kind of fusion identity protection system and method based on cloud computing | |
US20150169860A1 (en) | Security key using multi-otp, security service apparatus, security system | |
CN104104672A (en) | Method for establishing dynamic authorization code based on identity authentication | |
KR101509043B1 (en) | Implementing method, system of universal card system and smart card | |
CN109151820A (en) | One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 " | |
CN106650490B (en) | The login method and device of cloud account | |
EP2821866A1 (en) | Control program management system and method for changing control program | |
EP3206329B1 (en) | Security check method, device, terminal and server | |
CN103778381A (en) | Application screen locking method and device based on Android | |
CN102647712B (en) | A kind of mobile phone data encryption method and decryption method | |
CN105915338A (en) | Key generation method and key generation system | |
CN109840435A (en) | A kind of data guard method storing equipment | |
CN106572082A (en) | Approval signature verifying method, mobile device, terminal device and system | |
CN106169052A (en) | The processing method of application program, device and mobile terminal | |
CN105809445A (en) | Password verifying and processing method, apparatus and terminal | |
CN107835162B (en) | Software digital permit server gives the method and software digital permit server that permission is signed and issued in the license of software developer's software digital | |
CN106100851A (en) | Password management system, intelligent wristwatch and cipher management method thereof | |
CN110402440A (en) | Segment key Verification System | |
CN106407838A (en) | A memo information management method and device | |
CN107580002A (en) | Double factor authentication safety management machine login system and method | |
CN105913508B (en) | A kind of Work attendance method based on intelligent NFC label | |
CN102594815B (en) | Before register system, user right is set and performs method, the device of corresponding operating |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170215 |