CN106453783A - Method and device for deleting contact from address book - Google Patents
Method and device for deleting contact from address book Download PDFInfo
- Publication number
- CN106453783A CN106453783A CN201610936662.9A CN201610936662A CN106453783A CN 106453783 A CN106453783 A CN 106453783A CN 201610936662 A CN201610936662 A CN 201610936662A CN 106453783 A CN106453783 A CN 106453783A
- Authority
- CN
- China
- Prior art keywords
- address list
- password
- recycle bin
- contact person
- deleted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/27453—Directories allowing storage of additional subscriber data, e.g. metadata
- H04M1/27457—Management thereof, e.g. manual editing of data
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Library & Information Science (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention provides a method and a device for deleting a contact from an address book. The method comprises the following steps: deleting a selected contact from the address book in response to an operation of deleting the selected contact from the address book, and adding the deleted contact into an address book recycle bin; and when presence of at least one piece of information of the deleted contact in the address book recycle bin is detected, setting an address book recycle bin password required for entering the address book recycle bin. Through adoption of the method and the device, the privacy of the address book recycle bin of a user is protected; the technical problem of privacy leakage since information of contacts deleted into the recycle bin by the user is easy to be seen by other people is solved; and the user experience is improved.
Description
Technical field
The present invention relates to address list field, more particularly to a kind of method and apparatus for deleting contact person in address list.
Background technology
Address list is the higher One function of frequency used in mobile phone, and therefore the design optimization of address list compares for user
More important.Some current mobile phones are configured with address list recycle bin for address list, and address list recycle bin is deleted for depositing
Contact person, to avoid user from deleting situation about cannot recover after contact person by mistake.
At least there is following technical problem in prior art:After the contact person in address list is deleted by user, cell phone system
The contact person is added to address list recycle bin, when other people beyond the user are using the mobile phone, can be appreciated that phase in recycle bin
The associated person information of pass, causes privacy of user to be revealed.
Content of the invention
The present invention proposes a kind of method and apparatus for deleting contact person in address list, can solve the problem that and is deleted to recovery by user
Associated person information in standing easily is seen by other people, causes the technical problem of privacy leakage.
On the one hand, the present invention proposes a kind of method for deleting contact person in address list, including:
In response to deleting the operation of selected contact person in address list, by the selected contact person from the communication
Delete in record, and the contact person being deleted is added to address list recycle bin;
When detect have in the address list recycle bin described at least one be deleted the associated person information when, if
Put the address list recycle bin password for entering needed for the address list recycle bin.
Additionally, the address list recycle bin password for entering needed for the address list recycle bin that arranges includes:Eject and arrange
Cryptographic interface, the setting cryptographic interface is used for the password of receiving user's input;
In response to user, the operation that password is input in cryptographic interface being set described, will connect from the setting cryptographic interface
The password of receipts is set to the address list recycle bin password.
Additionally, described arrange, described, the operation for being input into password in cryptographic interface in response to user, will be close from the setting
The password for receiving in code interface is set to the address list recycle bin password to be included:
At least one operational order of receive user at least one position on the setting cryptographic interface, and according to described
At least one operational order is set to the address list recycle bin password by the input sequence of at least one operational order;Or
Person,
Receive user described continuously slipping will instruct corresponding rail in the continuously slipping instruction for arranging on cryptographic interface
Mark is set to the address list recycle bin password.
Additionally, the address list recycle bin password for entering needed for the address list recycle bin that arranges includes:Obtain described
The program password of mounted application program in the screen-lock password or the terminal of address list place terminal, by the screen-lock password
Or described program password is set to the address list recycle bin password.
Additionally, the operation in response to deleting selected contact person in address list, by the selected contact person
Deleting from the address list, and the contact person being deleted is added to address list recycle bin includes:Logical in response to deleting
The operation of selected contact person in news record, if the selected contact person is located at the communication of the first subclass in the address list
In record, then the selected contact person is deleted from the address list, the contact person being deleted is added to described
Address list recycle bin.
Additionally, after the address list recycle bin password for arranging and entering needed for the address list recycle bin, the side
Method also includes:
The display icon of the address list recycle bin is changed, so that described show icon and be not provided with the address list before
Display icon difference during recycle bin password.
On the other hand, the embodiment of the present invention proposes a kind of device for deleting contact person in address list, including:
Respond module, for the operation in response to deleting selected contact person in address list, will be selected described
It is that people is deleted from the address list, and the contact person being deleted is added to address list recycle bin;
Setup module, for when detect have in the address list recycle bin described at least one be deleted described
When being people's information, the address list recycle bin password for entering needed for the address list recycle bin is set.
Additionally, the address list recycle bin password for entering needed for the address list recycle bin that arranges includes:Eject and arrange
Cryptographic interface, the setting cryptographic interface is used for the password of receiving user's input;
In response to user, the operation that password is input in cryptographic interface being set described, will connect from the setting cryptographic interface
The password of receipts is set to the address list recycle bin password.
Additionally, described arrange, described, the operation for being input into password in cryptographic interface in response to user, will be close from the setting
The password for receiving in code interface is set to the address list recycle bin password to be included:
At least one operational order of receive user at least one position on the setting cryptographic interface, and according to described
At least one operational order is set to the address list recycle bin password by the input sequence of at least one operational order;Or
Person,
Receive user described continuously slipping will instruct corresponding rail in the continuously slipping instruction for arranging on cryptographic interface
Mark is set to the address list recycle bin password.
Additionally, the address list recycle bin password for entering needed for the address list recycle bin that arranges includes:Obtain described
The program password of mounted application program in the screen-lock password or the terminal of address list place terminal, by the screen-lock password
Or described program password is set to the address list recycle bin password.
Additionally, the operation in response to deleting selected contact person in address list, by the selected contact person
Deleting from the address list, and the contact person being deleted is added to address list recycle bin includes:Logical in response to deleting
The operation of selected contact person in news record, if the selected contact person is located at the communication of the first subclass in the address list
In record, then the selected contact person is deleted from the address list, the contact person being deleted is added to described
Address list recycle bin.
Additionally, after the address list recycle bin password for arranging and entering needed for the address list recycle bin, the dress
Putting also includes:
Modified module, for changing the display icon of the address list recycle bin so that described display icon with before not
Display icon difference during the address list recycle bin password is set.
Using technique scheme, have the advantages that:
The operation deleted by detecting contact person in address list, the contact person being deleted is added to address list recovery
Stand, when detect have in address list recycle bin at least one be deleted associated person information when, arrange entry communication record reclaim
The mode of the address list recycle bin password needed for standing is protected the privacy of the address list recycle bin of user, solve by with
The associated person information that family is deleted in recycle bin is easily seen by other people, causes the technical problem of privacy leakage, improves user's body
Test.
Description of the drawings
Fig. 1 is the flow chart of the method for deleting contact person in address list according to an embodiment of the invention;
Fig. 2 is the flow chart of the method for deleting contact person in address list in accordance with another embodiment of the present invention;
Fig. 3 is the block diagram of the device for deleting contact person in address list in accordance with another embodiment of the present invention.
Specific embodiment
Purpose, technical scheme and advantage for making the embodiment of the present invention is clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
The a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment for being obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
With reference to Fig. 1, the present invention proposes a kind of method for deleting contact person in address list, including:
Step S001, in response to deleting the operation of selected contact person in address list, by selected contact person from logical
Delete in news record, and the contact person being deleted is added to address list recycle bin;
Step S002, when detect have in address list recycle bin at least one be deleted associated person information when, arrange
Address list recycle bin password needed for entry communication record recycle bin.Illustrated with the terminal that address list is located as mobile phone.
In step S001, after user deletes contact person in the address list of mobile phone, now cell phone system can be automatic
The contact person is added to address list recycle bin, because adding deleted contact person in address list recycle bin, this
When need to arrange address list recycle bin password to address list recycle bin, in order to avoid seen in the address list recycle bin of user by other people
The content in face.
Address list includes:Chat communication record in telephonic communication record, chat software etc..
Address list recycle bin includes:Telephonic communication is recorded corresponding telephonic communication record recycle bin, Chat communication and records corresponding chatting
Its address list recycle bin etc..
In step S002, when detect have in address list recycle bin at least one be deleted associated person information when,
Address list recycle bin password needed for entry communication record recycle bin is set.
Citing:After cell phone system detects the contact person in telephonic communication record and is deleted, automatically the contact person can be added
Enter to telephonic communication and record recycle bin.Only detect and in telephonic communication record recycle bin, have at least one contact person's letter being deleted
During breath, then cell phone system arranges the address list recycle bin password needed for entry communication record recycle bin.When cell phone system is merely detected
After contact person in its address list is deleted, automatically the contact person can be added to Chat communication and recycle bin is recorded, as long as mobile phone system
System is detected when there is, in Chat communication record, the associated person information that at least one is deleted, then cell phone system is recorded back for Chat communication
Receive station and the Chat communication record recycle bin password for entering needed for Chat communication record recycle bin is set.
The action that contact person in Chat communication record is deleted includes:Contact person is drawn into blacklist, contact person and is added into
Strange roster or contact person are provided with checking public message of user's issue etc..
The mode that cell phone system arranges address list recycle bin password for address list recycle bin can have multiple:
First kind of way:Cell phone system ejects the interface that incoming traffic records recycle bin password, allows user to be input into word
Password or finger-print cipher are encrypted to address list recycle bin.The interface of incoming traffic record recycle bin password can be Password Input frame
Or fingerprint input frame.
The second way:Cell phone system obtains automatically the screen-lock password of mobile phone and as address list recycle bin password and arranges.
The third mode:The other application programs of screen-lock password or mobile phone that cell phone system obtains mobile phone automatically are set
Program password, then eject confirm using password default interface, if user have selected "Yes", cell phone system is arranged automatically
The screen-lock password of mobile phone or program password are that cell phone system is ejected address list recycle bin password, if user have selected "No"
The interface of incoming traffic record recycle bin password, voluntarily arranges address list recycle bin password for user.
The operation deleted by detecting contact person in address list, the contact person being deleted is added to address list recovery
Stand, when detect have in address list recycle bin at least one be deleted associated person information when, arrange entry communication record reclaim
The mode of the address list recycle bin password needed for standing is protected the privacy of the address list recycle bin of user, solve by with
The associated person information that family is deleted in recycle bin is easily seen by other people, causes the technical problem of privacy leakage, improves user's body
Test.
In one of which embodiment, arranging the address list recycle bin password needed for entry communication record recycle bin includes:
Eject and cryptographic interface is set, arranging cryptographic interface is used for the password of receiving user's input;
The operation that password is input in cryptographic interface is being set in response to user, by from the password for arranging reception in cryptographic interface
It is set to address list recycle bin password.
In the present embodiment, after cell phone system detects the operation that user deletes contact person in address list, can automatic spring
Cryptographic interface is set, for the address list recycle bin password needed for arranging entry communication record recycle bin for address list recycle bin, will
User is set to address list recycle bin password in the password for arranging cryptographic interface input.Make user carry out the setting dish of mobile phone
In list, address list recycle bin password is arranged to address list recycle bin, what user can be convenient is configured leading in current screen
The operation of news record recycle bin password, the step of save user operation and the time.
In one of which embodiment, the operation that password is input in cryptographic interface is being set in response to user, will be from setting
Put the password for receiving in cryptographic interface to be set to address list recycle bin password and include:
At least one operational order of receive user at least one position on cryptographic interface is set, and according at least one
At least one operational order is set to address list recycle bin password by the input sequence of operational order;Or,
Continuously slipping instruction of the receive user on cryptographic interface is arranged, corresponding for continuously slipping instruction track is set to
Address list recycle bin password.
The present embodiment arranges communication by receive user in the operational order for arranging on cryptographic interface or continuously slipping instruction
Record recycle bin password, the setting for alloing user convenient and replacing address list recycle bin password.
In one of which embodiment, arranging the address list recycle bin password needed for entry communication record recycle bin includes:
The program password of mounted application program in the screen-lock password or terminal of acquisition address list place terminal, by screen-lock password or journey
Sequence password is set to address list recycle bin password.
When the password that user needs setting in mobile phone is more, user is often difficult to remember multiple passwords, or
To multiple passwords using position produce and obscure, using other application journey in the screen-lock password of mobile phone or mobile phone in the present embodiment
The program password that sequence is set makes user record multiple passwords as address list recycle bin password, and alleviating user makes
Burden with mobile phone.
Password of the program password needed for for when enter application program.
Password of the screen-lock password needed for for when make mobile phone unblock.
In one of which embodiment, in response to deleting the operation of selected contact person in address list, will be selected
Contact person delete from address list, and the contact person being deleted is added to address list recycle bin and includes:Logical in response to deleting
The operation of selected contact person in news record, if selected contact person is located in the first subclass address list in address list,
Selected contact person is deleted from address list, the contact person being deleted is added to address list recycle bin.
User would generally classify to address list, such as be provided with multiple address list subclass " friends ", " colleague " or " tennis
Team ", if the contact person for detecting in address list subclass " friend " is deleted, the contact person being deleted is deleted from address list
Remove, the contact person being deleted is added to address list recycle bin, and address list recycle bin password is set for address list recycle bin.Logical
Contact person in the first subclass address list that crosses in detection address list is deleted, and then arranges address list to address list recycle bin and returns
The mode of station password is received, makes just to set address list recycle bin only when user deletes the contact person in specific directory subclass
Address list recycle bin password is put, has more met the original intention of user setup address list recycle bin password, it is not in embarrassment to make user
Situation.
In one of which embodiment, arrange entry communication record recycle bin needed for address list recycle bin password it
Afterwards, method also includes:The display icon of modification address list recycle bin, so as to show icon and be not provided with address list recycle bin before
Display icon difference during password.
After address list recycle bin is provided with address list recycle bin password, the display icon of address list recycle bin is carried out
Modification or replacement, make address list recycle bin shows that icon is returned with the address list that address list recycle bin password is not set before
Receive the display icon difference at station, show pattern of the icon plus lock as being provided with communication such as to address list recycle bin before
The display icon of the address list recycle bin of record recycle bin password, allows user to have learnt address list recycle bin by showing icon
Through being provided with address list recycle bin password.
With reference to Fig. 2, the flow process of one embodiment of the present of invention is described by taking mobile phone as an example below.
Step S201, if detecting user to delete contact person in address list in the first subclass address list " friend ",
The contact person being deleted is added address list recycle bin by cell phone system;
Step S202, when detect have in address list recycle bin at least one be deleted associated person information when, mobile phone
System obtains the screen-lock password of mobile phone;
Step S203, cell phone system ejects the interface for confirming using password default in current page, if user have selected making
With password default, then screen-lock password is set to address list recycle bin password by cell phone system automatically;If user have selected not using
Password default, then the interface of cell phone system ejection incoming traffic record recycle bin password, voluntarily arranges address list recycle bin for user
Password;
Step S204, obtains password of the user in the interface input of incoming traffic record recycle bin password, is set to address list
Recycle bin password;
Step S205, changes the display icon of address list recycle bin and shows.
With reference to Fig. 3, the present invention also proposes a kind of device for deleting contact person in address list, including:
Respond module 301, for the operation in response to deleting selected contact person in address list, by selected contact
People is deleted from address list, and the contact person being deleted is added to address list recycle bin;
Setup module 302, has at least one associated person information being deleted for working as to detect in address list recycle bin
When, the address list recycle bin password needed for entry communication record recycle bin is set.
The operation deleted by detecting contact person in address list, the contact person being deleted is added to address list recovery
Stand, when detect have in address list recycle bin at least one be deleted associated person information when, arrange entry communication record reclaim
The mode of the address list recycle bin password needed for standing is protected the privacy of the address list recycle bin of user, solve by with
The associated person information that family is deleted in recycle bin is easily seen by other people, causes the technical problem of privacy leakage, improves user's body
Test.
In one of which embodiment, arranging the address list recycle bin password needed for entry communication record recycle bin includes:
Eject and cryptographic interface is set, arranging cryptographic interface is used for the password of receiving user's input;
The operation that password is input in cryptographic interface is being set in response to user, by from the password for arranging reception in cryptographic interface
It is set to address list recycle bin password.
In one of which embodiment, the operation that password is input in cryptographic interface is being set in response to user, will be from setting
Put the password for receiving in cryptographic interface to be set to address list recycle bin password and include:
At least one operational order of receive user at least one position on cryptographic interface is set, and according at least one
At least one operational order is set to address list recycle bin password by the input sequence of operational order;Or,
Continuously slipping instruction of the receive user on cryptographic interface is arranged, corresponding for continuously slipping instruction track is set to
Address list recycle bin password.
In one of which embodiment, arranging the address list recycle bin password needed for entry communication record recycle bin includes:
The program password of mounted application program in the screen-lock password or terminal of acquisition address list place terminal, by screen-lock password or journey
Sequence password is set to address list recycle bin password.
In one of which embodiment, in response to deleting the operation of selected contact person in address list, will be selected
Contact person delete from address list, and the contact person being deleted is added to address list recycle bin and includes:Logical in response to deleting
The operation of selected contact person in news record, if selected contact person is located in the first subclass address list in address list,
Selected contact person is deleted from address list, the contact person being deleted is added to address list recycle bin.
In one of which embodiment, arrange entry communication record recycle bin needed for address list recycle bin password it
Afterwards, device also includes:
Modified module, for changing the display icon of address list recycle bin, so as to show icon and be not provided with communication before
Display icon difference during record recycle bin password.
The embodiment of the present invention also proposes a kind of electronic equipment, including:
At least one processor;And,
The memorizer being connected with least one processor communication;Wherein,
The memory storage can be by the instruction of one computing device, and the instruction is processed by described at least one
Device is executed, so that at least one processor can:
In response to deleting the operation of selected contact person in address list, by the selected contact person from the communication
Delete in record, and the contact person being deleted is added to address list recycle bin;
When detect have in the address list recycle bin described at least one be deleted the associated person information when, if
Put the address list recycle bin password for entering needed for the address list recycle bin.
The embodiment of the present invention also proposes a kind of non-transient computer readable storage medium storing program for executing, and the non-transient computer is readable to deposit
Storage media stores computer instruction, when computer executes the computer instruction, for executing:
In response to deleting the operation of selected contact person in address list, by the selected contact person from the communication
Delete in record, and the contact person being deleted is added to address list recycle bin;
When detect have in the address list recycle bin described at least one be deleted the associated person information when, if
Put the address list recycle bin password for entering needed for the address list recycle bin.
The embodiment of the present invention also proposes a kind of computer program, and which includes computer-readable medium, the computer
Computer-readable recording medium includes:First group of code, in response to deleting the operation of selected contact person in address list, described in selected
Contact person is deleted from the address list, and the contact person being deleted is added to address list recycle bin;Second group of code,
When detect have in the address list recycle bin described at least one be deleted the associated person information when, arrange enter institute
State the address list recycle bin password needed for address list recycle bin.
Device embodiment described above is only that schematically wherein the unit for illustrating as separating component can
To be or may not be physically separate, as the part that unit shows can be or may not be physics list
Unit, you can be located at a place, or can also be distributed on multiple NEs.Which is selected according to the actual needs can
In some or all of module realizing the purpose of this embodiment scheme.Those of ordinary skill in the art are not paying creativeness
Work in the case of, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can
Mode by software plus required general hardware platform is realizing, naturally it is also possible to by hardware.Based on such understanding, on
State the part that technical scheme substantially contributes prior art in other words to embody in the form of software product, should
Computer software product can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD etc., including some fingers
Order is used so that a computer equipment (can be personal computer, server, or network equipment etc.) executes each enforcement
Method described in some parts of example or embodiment.
Finally it should be noted that:Above example only in order to technical scheme to be described, rather than a limitation;Although
With reference to the foregoing embodiments the present invention is described in detail, it will be understood by those within the art that:Which still may be used
To modify to the technical scheme described in foregoing embodiments, or equivalent is carried out to which part technical characteristic;
And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and
Scope.
Claims (12)
1. a kind of delete contact person in address list method, it is characterised in that include:
In response to deleting the operation of selected contact person in address list, by the selected contact person from the address list
Delete, and the contact person being deleted is added to address list recycle bin;
When detect have in the address list recycle bin described at least one be deleted the associated person information when, arrange into
Enter the address list recycle bin password needed for the address list recycle bin.
2. the method for deleting contact person in address list according to claim 1, it is characterised in that the setting enters described
Address list recycle bin password needed for address list recycle bin includes:Eject and cryptographic interface is set, the setting cryptographic interface is used for
The password of receiving user's input;
In response to user, the operation that password is input in cryptographic interface being set described, reception in cryptographic interface will be set from described
Password is set to the address list recycle bin password.
3. according to claim 2 delete contact person in address list method, it is characterised in that
The operation for being input into password in response to user in the setting cryptographic interface, will connect from the setting cryptographic interface
The password of receipts is set to the address list recycle bin password to be included:
Receive user described arrange cryptographic interface at least one position at least one operational order, and according to described at least
At least one operational order is set to the address list recycle bin password by the input sequence of one operational order;Or,
The corresponding track of the continuously slipping instruction is set by receive user in the continuously slipping instruction for arranging on cryptographic interface
It is set to the address list recycle bin password.
4. the method for deleting contact person in address list according to claim 1, it is characterised in that the setting enters described
Address list recycle bin password needed for address list recycle bin includes:Obtain the screen-lock password of address list place terminal or described
The program password of mounted application program in terminal, the screen-lock password or described program password are set to the address list
Recycle bin password.
5. the method for deleting contact person in address list according to claim 1, it is characterised in that described logical in response to deleting
In news record, the operation of selected contact person, the selected contact person is deleted from the address list, and will be deleted
The contact person be added to address list recycle bin and include:In response to deleting the operation of selected contact person in address list, if
The selected contact person be located at the address list in the first subclass address list in, then by the selected contact person from
Delete in the address list, the contact person being deleted is added to the address list recycle bin.
6. according to any one of claim 1 to 5 deletion contact person in address list method, it is characterised in that described
After arranging the address list recycle bin password for entering needed for the address list recycle bin, methods described also includes:
The display icon of the address list recycle bin is changed, so that the display icon is reclaimed with the address list is not provided with before
Stand password when display icon difference.
7. a kind of delete contact person in address list device, it is characterised in that include:
Respond module, for the operation in response to deleting selected contact person in address list, by the selected contact person
Delete from the address list, and the contact person being deleted is added to address list recycle bin;
Setup module, has, for working as to detect, the contact person being deleted described at least one in the address list recycle bin
During information, the address list recycle bin password for entering needed for the address list recycle bin is set.
8. the device for deleting contact person in address list according to claim 7, it is characterised in that the setting enters described
Address list recycle bin password needed for address list recycle bin includes:Eject and cryptographic interface is set, the setting cryptographic interface is used for
The password of receiving user's input;
In response to user, the operation that password is input in cryptographic interface being set described, reception in cryptographic interface will be set from described
Password is set to the address list recycle bin password.
9. according to claim 8 delete contact person in address list device, it is characterised in that
The operation for being input into password in response to user in the setting cryptographic interface, will connect from the setting cryptographic interface
The password of receipts is set to the address list recycle bin password to be included:
Receive user described arrange cryptographic interface at least one position at least one operational order, and according to described at least
At least one operational order is set to the address list recycle bin password by the input sequence of one operational order;Or,
The corresponding track of the continuously slipping instruction is set by receive user in the continuously slipping instruction for arranging on cryptographic interface
It is set to the address list recycle bin password.
10. the device for deleting contact person in address list according to claim 7, it is characterised in that the setting enters institute
Stating the address list recycle bin password needed for address list recycle bin includes:Obtain screen-lock password or the institute of address list place terminal
The program password of mounted application program in terminal is stated, the screen-lock password or described program password are set to the communication
Record recycle bin password.
11. devices for deleting contact person in address list according to claim 7, it is characterised in that described in response to deleting
The operation of selected contact person in address list, the selected contact person is deleted from the address list, and will be deleted
The contact person for removing is added to address list recycle bin to be included:In response to deleting the operation of selected contact person in address list,
If the selected contact person is located in the first subclass address list in the address list, by the selected contact person
Delete from the address list, the contact person being deleted is added to the address list recycle bin.
The device of the 12. deletion contact person in address lists according to any one of claim 7 to 11, it is characterised in that
After the address list recycle bin password for arranging and entering needed for the address list recycle bin, described device also includes:
Modified module, for changing the display icon of the address list recycle bin, shows icon and is not provided with before so that described
Display icon difference during the address list recycle bin password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610936662.9A CN106453783A (en) | 2016-11-01 | 2016-11-01 | Method and device for deleting contact from address book |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610936662.9A CN106453783A (en) | 2016-11-01 | 2016-11-01 | Method and device for deleting contact from address book |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106453783A true CN106453783A (en) | 2017-02-22 |
Family
ID=58178540
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610936662.9A Pending CN106453783A (en) | 2016-11-01 | 2016-11-01 | Method and device for deleting contact from address book |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106453783A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130047032A1 (en) * | 2011-08-19 | 2013-02-21 | International Business Machines Corporation | Data set autorecovery |
CN103139264A (en) * | 2011-12-01 | 2013-06-05 | 比亚迪股份有限公司 | Processing method and processing system of deleted data |
CN105653397A (en) * | 2015-09-30 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Recovery processing method, apparatus and electronic device |
-
2016
- 2016-11-01 CN CN201610936662.9A patent/CN106453783A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130047032A1 (en) * | 2011-08-19 | 2013-02-21 | International Business Machines Corporation | Data set autorecovery |
CN103139264A (en) * | 2011-12-01 | 2013-06-05 | 比亚迪股份有限公司 | Processing method and processing system of deleted data |
CN105653397A (en) * | 2015-09-30 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Recovery processing method, apparatus and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103747147B (en) | Upgrade the method and apparatus of address list | |
CN103841261B (en) | A kind of method and communication terminal extracting communication information | |
CN105653397A (en) | Recovery processing method, apparatus and electronic device | |
CN101697107A (en) | Method and device for inputting characters in touch mobile communication terminal | |
CN105224194B (en) | A kind of data processing method and terminal | |
CN106790926A (en) | A kind of contact management method and terminal | |
CN106210238A (en) | short message storage method and device | |
CN102917098A (en) | Method and device for preventing important linkman from being wrongly deleted | |
CN108170787A (en) | A kind of image file delet method, mobile terminal and computer readable storage medium | |
CN107734489A (en) | Dial the method, apparatus, storage medium and electronic equipment of emergency numbers | |
CN105988897A (en) | Recovery method and device of backup data of mobile terminal | |
CN105554227A (en) | Method and apparatus for improving terminal information security, and terminal | |
CN108629203A (en) | Method for information display and Related product | |
CN105488372B (en) | Verification method and device | |
CN106599663A (en) | Information security protecting method and mobile terminal | |
CN106776908A (en) | Data clearing method, device and terminal | |
CN107197074A (en) | Book management method, device, storage medium and electronic equipment | |
CN105338153A (en) | Contact person information storage method and device | |
CN104363343B (en) | A kind of method and device of caller identification | |
CN107426222A (en) | Information protecting method, device, storage medium and electronic equipment | |
CN107704337A (en) | Method, mobile terminal and the device with store function of factory reset | |
CN104980335A (en) | Method and system for processing received mails of email | |
CN106453783A (en) | Method and device for deleting contact from address book | |
CN106776847A (en) | Delete the method for media file, device and move on to terminal | |
CN105809112A (en) | Fingerprint information recovering method, fingerprint information recovering apparatus and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170222 |