CN106412202A - Contact person hiding method and user terminal - Google Patents

Contact person hiding method and user terminal Download PDF

Info

Publication number
CN106412202A
CN106412202A CN201610972202.1A CN201610972202A CN106412202A CN 106412202 A CN106412202 A CN 106412202A CN 201610972202 A CN201610972202 A CN 201610972202A CN 106412202 A CN106412202 A CN 106412202A
Authority
CN
China
Prior art keywords
user
privacy
address list
contact person
user terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610972202.1A
Other languages
Chinese (zh)
Inventor
马文涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuanying Information Technology Co Ltd
Original Assignee
Shanghai Chuanying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuanying Information Technology Co Ltd filed Critical Shanghai Chuanying Information Technology Co Ltd
Priority to CN201610972202.1A priority Critical patent/CN106412202A/en
Publication of CN106412202A publication Critical patent/CN106412202A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/27453Directories allowing storage of additional subscriber data, e.g. metadata
    • H04M1/27457Management thereof, e.g. manual editing of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/017Gesture based interaction, e.g. based on a set of recognized hand gestures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/27467Methods of retrieving data
    • H04M1/27475Methods of retrieving data using interactive graphical means or pictorial representations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Abstract

The invention provides a contact person hiding method and a user terminal. The contact person hiding method comprises the steps of establishing a private address book; when a contact person is selected to be hidden, transferring information of the contact person to the private address book; receiving a gesture password which is created by a user for accessing to the private address book; receiving the gesture password inputted by the user in a system address book interface, and allowing the user to access to the private address book after the gesture password is judged to be correct. According to the contact person hiding method and the user terminal provided by the invention, a contact person selected by the user to hide is stored through setting the private address book, and the hiding trace is not obvious and difficult to be perceived by other people, so that the individual privacy of the user is well protected. In addition, the user can access to the private address book by inputting the gesture password into the system address book interface, the operation is simple and convenient, the concealment is high, and the user experience is greatly improved.

Description

Contact person's hidden method and user terminal
Technical field
The present invention relates to communication technical field, more particularly, to a kind of contact person's hidden method and user terminal.
Background technology
Constantly improve with scientific and technical continuous development and people's living standard, the user terminal such as mobile phone, flat board sets Standby increasingly popularize in the life of people.Contact with other people for the ease of user, typically set in the inside of described user terminal It is equipped with address list, the information such as the name of contact person that is stored with address list, telephone number, by address list, user can be convenient Called or sent the operation such as note with contact person.Address list brings greatly easily in the life giving people, work Meanwhile, its privacy also receives increasing concern.Some special in the case of, in order to protect individual privacy, user thinks Contact persons some in address list are hidden.In order to solve this problem, mainly adopt two ways at present:One kind is in user eventually Guest mode is set up at end, and under guest mode, other people are unable to the private application such as accessing address list, but, under guest mode, whole Individual address list all can not access, and the hiding vestige of this operation is excessively obvious, other people can be seen to be guest mode at a glance it is impossible to Reach good concealment effect, and it is complex to make the technology of guest mode;Another kind is to be set by third party software Put, the part contact person in address list is set to private contact, during use, user needs to open third party software, passes through Third party software enters the address list of user terminal, the contact person of storage in address list is selected, selected contact person It is arranged to private contact, the information of private contact could be hidden, but, set by third party software When putting, contact data needs passes, easily causes loss of data, and is not easy to importing, derivation and the data of data Backed up in synchronization.Therefore, how simply, easily hidden parts contact person, enhancing individual subscriber secret protection, is at present urgently The technical problem solving.
Content of the invention
The invention provides a kind of contact person's hidden method and user terminal, hide operation in order to solve existing contact person Complicated, the hiding obvious problem of vestige, to strengthen individual subscriber secret protection, improves Consumer's Experience.
In order to solve the above problems, the invention provides a kind of contact person's hidden method, comprise the steps:Set up one hidden Private address list;When contact person is selected and hides, associated person information is transferred to privacy address list;What receive user created is used for Access the gesture password of described privacy address list;Receive user records the gesture password of interface input in system communication, is just judging User is really allowed to access described privacy address list afterwards.
Preferably, described contact person's hidden method also comprises the steps:Privacy address list information is transmitted to network clothes Business device.
Preferably, described contact person's hidden method also comprises the steps:Receive user inputs at privacy address list interface Operational order, execution is corresponding to be operated.
Preferably, described operational order is one or more of to add, delete, changing, searching.
Preferably, the gesture password that described receive user records interface input in system communication comprises the steps:Detection system Whether system address list is opened, and if so, then allows user input gesture password.
Present invention also offers a kind of user terminal, including:Privacy module, including privacy address list, described privacy communication Employ, in storage, hiding associated person information is selected by user;Protection module, including:Password Input unit, for user be The input of system address list interface enters the gesture password of described privacy module;Judging unit, is connected with described Password Input unit, uses Whether correct in the gesture password judging described Password Input unit input;Performance element, is connected with described judging unit, is used for Decide whether to execute the operation entering described privacy module according to the judged result of described judging unit.
Preferably, described user terminal also includes transport module, and described transport module connects privacy module, for by privacy Address list information transmits to the webserver.
Preferably, described privacy module also includes input block, and described input block is used for user in privacy address list circle Face enters the operating instructions.
Preferably, described operational order is one or more of to add, delete, changing, searching.
Preferably, described protection module also includes detector unit, and whether described detector unit is used for detecting system address list Open, if so, then allow user input gesture password.
Contact person's hidden method and user terminal that the present invention provides, store user by setting privacy address list and select Hiding contact person, hiding vestige is inconspicuous, and other people are difficult to discover, and protects the individual privacy of user well, and in system Address list interface input gesture password, you can enter privacy address list, simple to operate, convenient, disguised high, greatly improve Consumer's Experience.
Brief description
Accompanying drawing 1 is contact person's hidden method flow chart of the specific embodiment of the invention;
Accompanying drawing 2 is the user terminal structural representation of the specific embodiment of the invention.
Specific embodiment
The contact person's the hidden method below in conjunction with the accompanying drawings present invention being provided and the specific embodiment of user terminal are done in detail Describe in detail bright.
The invention provides a kind of contact person's hidden method and user terminal, accompanying drawing 1 is the specific embodiment of the invention Contact person's hidden method flow chart, accompanying drawing 2 is the user terminal structural representation of the specific embodiment of the invention.As shown in figure 1, Contact person's hidden method of the present invention comprises the steps:
Step S11, sets up a privacy address list 211.Existing user terminal is communicated with other people for the ease of user, It is both provided with system communication record, be stored with described system communication record the information such as name of contact person, telephone number.The present invention provides User terminal in be provided with a privacy module 21, described privacy module 21 comprises a privacy address list 211, described privacy communication Record 211 is used for storage and is selected hiding associated person information by user.
Step S12, when contact person is selected and hides, associated person information is transferred to privacy address list 211.When user system A certain contact person in system address list is selected when hiding, and the privacy module 21 within user terminal will be by described contact person's Information is transferred in privacy address list 211, meanwhile, will no longer be shown this contact person in the system communication record within user terminal Any information.So, different from existing guest mode, part associated person information only can be transferred to privacy communication by user In record, hiding vestige is inconspicuous, other people are difficult to discover, it is to avoid user is awkward.
For the ease of user, privacy address list is operated, the flexibility increasing privacy address list is it is preferred that described It is that people's hidden method also comprises the steps:The operational order that receive user inputs at the interface of privacy address list 211, executes phase The operation answered.Wherein, described operational order is one or more of to add, delete, changing, searching.That is, user Can according to the needs of oneself, freely add in described privacy address list 211 new privacy contact, delete original hidden Private contact person, modification privacy contact information or the information searching a certain privacy contact in privacy address list.By so Setting, not only strengthen human-computer interaction, improve Consumer's Experience, and be easy to user and the information in privacy address list is carried out Operation, has provided the user great convenience.
Step S13, the gesture password for accessing described privacy address list that receive user creates.In order to protect user's Individual privacy is in addition it is also necessary to provide access to the password of described privacy address list.However, existing numerical ciphers mode needs to use Input keyboard is opened at family, then sequentially inputs password figure, and operation is relatively complicated, and disguise is not high.Due to gesture password operation Simply, user only needs to carry out simple gesture operation, and is a kind of contactless password input mode, mainly by preposition shooting Graphic process unit within user terminal for the head is combined the gesture input of identifying user, does not show interface for password input, hidden Property higher, protected effect preferably, even if other people check system communication record it is also difficult to find privacy address list, enhances privacy and leads to The disguise of news record, the present invention adopts gesture password as the password accessing privacy address list.
Step S14, receive user records the gesture password of interface input in system communication, allows user to visit after correct judgment Ask described privacy address list.Described user terminal is provided with a protection module 22, is provided with Password Input in described protection module Unit 222, judging unit 223 and performance element 224.Wherein, described Password Input unit 222, for user in system communication The input of record interface enters the gesture password of described privacy module 21;Judging unit 223, is connected with described Password Input unit 222, Whether the gesture password for judging described Password Input unit 222 input is correct;Performance element 224, with described judging unit 223 connections, for deciding whether to execute the behaviour entering described privacy module 21 according to the judged result of described judging unit 223 Make.Wherein, described Password Input unit includes a gesture induction device.So, close by recording interface input gesture in system communication Code may have access to privacy address list it is no longer necessary to the auxiliary of third party software, and described privacy address list is simply hidden in system In address list interface, any change is not made to existing data structure, data is easily guided into, derives, and facilitates data Synchronized update, backup.
Associated person information in privacy address list is checked on different terminal devices or to privacy for the ease of user Information in address list is operated it is preferred that described contact person's hidden method also comprises the steps:Privacy address list is believed Breath transmits to the webserver.It is provided with transport module 23 in described user terminal, described transport module 23 is by user terminal The privacy address list of storage inside transmits to the webserver 24.Wherein, described transport module 23 can using wireless network, 4G network, GSM network, WCDMA network etc. are by the information transfer of described privacy address list to the webserver.So, Yong Huke So that privacy address list is checked by different terminal devices, effectively prevent the loss of associated person information, and facilitate user to search, Greatly improve Consumer's Experience.
Cause the unlatching of privacy address list in order to prevent user misoperation, cause the leakage of individual subscriber privacy information, Preferably, the gesture password that described receive user records interface input in system communication comprises the steps:Detecting system address list Whether open, if so, then allow user input gesture password.It is additionally provided with a detection in the protection module 22 of described user terminal Unit 221, described detector unit 221 connects described Password Input unit 222, and described detector unit user detects described user eventually Whether the internal system communication in end is recorded and is opened, if so, just can receiving user's input gesture password.
Contact person's hidden method that the present invention provides, stores user by setting privacy address list and selectes hiding contact People, hiding vestige is inconspicuous, and other people are difficult to discover, and protects the individual privacy of user well, and records interface in system communication Input gesture password, you can enter privacy address list, simple to operate, convenient, disguised high, greatly improve Consumer's Experience.
Moreover, present invention also offers a kind of user terminal, as shown in Fig. 2 described user terminal includes privacy Module 21 and protection module 22.
Described privacy module 21 includes privacy address list 211, and it is selected hiding by user that described privacy address list is used for storage Associated person information.Existing user terminal is communicated with other people for the ease of user, is both provided with system communication record, described Be stored with system communication record the information such as name of contact person, telephone number.It is provided with one hidden in the user terminal that the present invention provides Private module 21, described privacy module 21 comprises a privacy address list 211, and described privacy address list 211 is used for storage and is selected by user The fixed associated person information hidden.
When a certain contact person in custom system address list is selected and hides, the privacy module 21 within user terminal is just The information of described contact person can be transferred in privacy address list 211, meanwhile, will in the system communication record within user terminal No longer show any information of this contact person.So, different from existing guest mode, part contact person can only be believed by user Breath is transferred in privacy address list, and hiding vestige is inconspicuous, other people are difficult to discover, it is to avoid user is awkward.
For the ease of user, privacy address list is operated, the flexibility increasing privacy address list is it is preferred that described hidden Private module 21 also includes input block 212, and described input block 212 refers in the interface input operation of privacy address list for user Order.Wherein, described operational order is one or more of to add, delete, changing, searching.That is, user can root According to the needs of oneself, in described privacy address list 211, freely add new privacy contact, delete original privacy contact People, modification privacy contact information or the information searching a certain privacy contact in privacy address list.By such setting, Not only strengthen human-computer interaction, improve Consumer's Experience, and be easy to user and the information in privacy address list is operated, be User provides a great convenience.
In order to protect the individual privacy of user in addition it is also necessary to provide access to the password of described privacy address list.However, it is existing Some numerical ciphers modes need user to open input keyboard, then sequentially input password figure, and operation is relatively complicated, and disguised Not high.Because gesture password is simple to operate, user only needs to carry out simple gesture operation, and is a kind of contactless Password Input Mode, mainly by front-facing camera with user terminal within graphic process unit be combined the gesture input of identifying user, no Display interface for password input, disguise is higher, and protected effect is preferable, even if other people check system communication record it is also difficult to find hidden Private address list, enhances the disguise of privacy address list, and the present invention adopts gesture password as the password accessing privacy address list.
Described protection module 22, user protects the information security in privacy of user address list, prevents other people from peeping or information Reveal.It is provided with Password Input unit 222, judging unit 223 and performance element 224 in described protection module 22.Wherein, described Password Input unit 222, records, in system communication, the gesture password that interface input enters described privacy module 21 for user;Judge Unit 223, is connected with described Password Input unit 222, and the gesture password for judging described Password Input unit 222 input is No correct;Performance element 224, is connected with described judging unit 223, for being determined according to the judged result of described judging unit 223 Determine whether execute the operation entering described privacy module 21.Wherein, described Password Input unit includes a gesture induction device.This Sample, by system communication record interface input gesture password may have access to privacy address list it is no longer necessary to third party software auxiliary Help, and described privacy address list is simply hidden in system communication record interface, does not do any changing to existing data structure Become, data is easily guided into, derives, and facilitates the synchronized update of data, backup.
Associated person information in privacy address list is checked on different terminal devices or to privacy for the ease of user Information in address list is operated it is preferred that being provided with transport module 23 in described user terminal, described transport module 23 The privacy address list of user terminal storage inside is transmitted to the webserver 24.Wherein, described transport module 23 can be adopted With wireless network, 4G network, GSM network, WCDMA network etc. by the information transfer of described privacy address list to the webserver. So, user can check privacy address list by different terminal devices, effectively prevent the loss of associated person information, and side Just user searches, and greatly improves Consumer's Experience.
Cause the unlatching of privacy address list in order to prevent user misoperation, cause the leakage of individual subscriber privacy information, Preferably, it is additionally provided with a detector unit 221 in the protection module 22 of described user terminal, described detector unit 221 connects institute State Password Input unit 222, described detector unit user detects whether the system communication record within described user terminal opens, if It is, just the gesture password of meeting receiving user's input.
Contact person's hidden method that the present invention provides, stores user by setting privacy address list and selectes hiding contact People, hiding vestige is inconspicuous, and other people are difficult to discover, and protects the individual privacy of user well, and records interface in system communication Input gesture password, you can enter privacy address list, simple to operate, convenient, disguised high, greatly improve Consumer's Experience.
The above is only the preferred embodiment of the present invention it is noted that ordinary skill people for the art Member, under the premise without departing from the principles of the invention, can also make some improvements and modifications, these improvements and modifications also should be regarded as Protection scope of the present invention.

Claims (10)

1. a kind of contact person's hidden method is it is characterised in that comprise the steps:
Set up a privacy address list;
When contact person is selected and hides, associated person information is transferred to privacy address list;
The gesture password for accessing described privacy address list that receive user creates;
Receive user records the gesture password of interface input in system communication, allows user to access described privacy and lead to after correct judgment News record.
2. according to power to remove contact person's hidden method described in 1 it is characterised in that described contact person's hidden method also include as Lower step:Privacy address list information is transmitted to the webserver.
3. according to power to remove contact person's hidden method described in 1 it is characterised in that described contact person's hidden method also include as Lower step:The operational order that receive user inputs at privacy address list interface, execution is corresponding to be operated.
4. the contact person's hidden method described in 3 to be gone it is characterised in that described operational order is to add, delete, repairing according to power One or more of change, search.
5. the contact person's hidden method described in 1 to be gone it is characterised in that described receive user records boundary in system communication according to power The gesture password of face input comprises the steps:Whether detecting system address list is opened, and if so, then allows user input gesture close Code.
6. a kind of user terminal is it is characterised in that include:
Privacy module, including privacy address list, described privacy address list is used for storage and is selected hiding associated person information by user;
Protection module, including:Password Input unit, records interface input for user in system communication and enters described privacy module Gesture password;Judging unit, is connected with described Password Input unit, and the gesture for judging described Password Input unit input is close Whether code is correct;Performance element, is connected with described judging unit, for being decided whether according to the judged result of described judging unit Execution enters the operation of described privacy module.
7. user terminal according to claim 6 is it is characterised in that described user terminal also includes transport module, described Transport module connects privacy module, for transmitting privacy address list information to the webserver.
8. user terminal according to claim 6 is it is characterised in that described privacy module also includes input block, described Input block enters the operating instructions at privacy address list interface for user.
9. user terminal according to claim 8 is it is characterised in that described operational order is to add, delete, changing, looking into One or more of look for.
10. user terminal according to claim 6 is it is characterised in that described protection module also includes detector unit, described Whether detector unit opens for detecting system address list, if so, then allows user input gesture password.
CN201610972202.1A 2016-11-04 2016-11-04 Contact person hiding method and user terminal Pending CN106412202A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610972202.1A CN106412202A (en) 2016-11-04 2016-11-04 Contact person hiding method and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610972202.1A CN106412202A (en) 2016-11-04 2016-11-04 Contact person hiding method and user terminal

Publications (1)

Publication Number Publication Date
CN106412202A true CN106412202A (en) 2017-02-15

Family

ID=58014664

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610972202.1A Pending CN106412202A (en) 2016-11-04 2016-11-04 Contact person hiding method and user terminal

Country Status (1)

Country Link
CN (1) CN106412202A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107016263A (en) * 2017-03-27 2017-08-04 谭宁敏 The privacy management system of mobile terminal communication software and social software
CN111556021A (en) * 2020-03-30 2020-08-18 宇龙计算机通信科技(深圳)有限公司 Data transmission method, device, storage medium and related equipment
CN112231758A (en) * 2020-11-03 2021-01-15 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification
CN113838547A (en) * 2021-09-28 2021-12-24 湖南康凯信息技术有限公司 Intelligent medical service management system based on intelligent terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090103702A1 (en) * 2005-03-17 2009-04-23 Xynk Pty Ltd. Method and System of Communication with Identity and Directory Management
CN103067612A (en) * 2013-01-30 2013-04-24 广东欧珀移动通信有限公司 Private information viewing method and system based on mobile terminal equipment
CN103780731A (en) * 2012-10-26 2014-05-07 腾讯科技(深圳)有限公司 Method and device for obtaining privacy contacts
CN103795862A (en) * 2014-01-24 2014-05-14 宇龙计算机通信科技(深圳)有限公司 Looking-up method and device of private contact persons
CN105187599A (en) * 2015-08-27 2015-12-23 魅族科技(中国)有限公司 Contact person information management method and terminal
CN105631275A (en) * 2015-04-15 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Information display method, information display device and terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090103702A1 (en) * 2005-03-17 2009-04-23 Xynk Pty Ltd. Method and System of Communication with Identity and Directory Management
CN103780731A (en) * 2012-10-26 2014-05-07 腾讯科技(深圳)有限公司 Method and device for obtaining privacy contacts
CN103067612A (en) * 2013-01-30 2013-04-24 广东欧珀移动通信有限公司 Private information viewing method and system based on mobile terminal equipment
CN103795862A (en) * 2014-01-24 2014-05-14 宇龙计算机通信科技(深圳)有限公司 Looking-up method and device of private contact persons
CN105631275A (en) * 2015-04-15 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Information display method, information display device and terminal
CN105187599A (en) * 2015-08-27 2015-12-23 魅族科技(中国)有限公司 Contact person information management method and terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107016263A (en) * 2017-03-27 2017-08-04 谭宁敏 The privacy management system of mobile terminal communication software and social software
CN111556021A (en) * 2020-03-30 2020-08-18 宇龙计算机通信科技(深圳)有限公司 Data transmission method, device, storage medium and related equipment
CN112231758A (en) * 2020-11-03 2021-01-15 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification
CN112231758B (en) * 2020-11-03 2023-11-17 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification
CN113838547A (en) * 2021-09-28 2021-12-24 湖南康凯信息技术有限公司 Intelligent medical service management system based on intelligent terminal

Similar Documents

Publication Publication Date Title
CN104199793B (en) Portable electric appts and the method and apparatus for associating other electronic device informations on it
CN103002124B (en) A kind of processing method of communication data, device
CN106412202A (en) Contact person hiding method and user terminal
CN103780731B (en) A kind of method and device for obtaining privacy contact
CN107924288A (en) Electronic equipment and its method for carrying out perform function using speech recognition
CN104200170B (en) The method for secret protection and electronic equipment of a kind of electronic equipment
CN105956444A (en) Private application display method and device and terminal equipment
CN106681717B (en) Terminal application program management method and device and electronic equipment
CN105592146A (en) Equipment control method, device and terminal
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN104038613B (en) The method and apparatus of information security management
CN107395880A (en) Method for information display, device and terminal
CN104700050A (en) Mobile terminal safety positioning method and device
CN105912954A (en) Privacy information protection method and system suitable for mobile terminal
CN106936999A (en) Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently
CN106610719A (en) Fast operation method, device and terminal equipment
CN106815509A (en) A kind of multimedia file guard method, device and electronic equipment
CN113946808A (en) Interface display method, electronic device and computer-readable storage medium
CN107343279A (en) Method for connecting network, device, terminal device and storage medium
KR20100000274A (en) Mobile terminal and operation control method thereof
CN108537058A (en) The polygonal color application method and device, computer readable storage medium, terminal of terminal
CN107506198A (en) The display methods and mobile terminal of a kind of mobile terminal
CN106952090A (en) Payment verification device and method
CN107315934A (en) Communication message processing method, mobile terminal and storage device
CN106357868A (en) Private contact person communication method and user terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170215

RJ01 Rejection of invention patent application after publication