CN106453783A - Method and device for deleting contact from address book - Google Patents

Method and device for deleting contact from address book Download PDF

Info

Publication number
CN106453783A
CN106453783A CN201610936662.9A CN201610936662A CN106453783A CN 106453783 A CN106453783 A CN 106453783A CN 201610936662 A CN201610936662 A CN 201610936662A CN 106453783 A CN106453783 A CN 106453783A
Authority
CN
China
Prior art keywords
address list
password
recycle bin
contact person
deleted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610936662.9A
Other languages
Chinese (zh)
Inventor
杨丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Mobile Intelligent Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610936662.9A priority Critical patent/CN106453783A/en
Publication of CN106453783A publication Critical patent/CN106453783A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/27453Directories allowing storage of additional subscriber data, e.g. metadata
    • H04M1/27457Management thereof, e.g. manual editing of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Library & Information Science (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention provides a method and a device for deleting a contact from an address book. The method comprises the following steps: deleting a selected contact from the address book in response to an operation of deleting the selected contact from the address book, and adding the deleted contact into an address book recycle bin; and when presence of at least one piece of information of the deleted contact in the address book recycle bin is detected, setting an address book recycle bin password required for entering the address book recycle bin. Through adoption of the method and the device, the privacy of the address book recycle bin of a user is protected; the technical problem of privacy leakage since information of contacts deleted into the recycle bin by the user is easy to be seen by other people is solved; and the user experience is improved.

Description

A kind of method and apparatus for deleting contact person in address list
Technical field
The present invention relates to address list field, more particularly to a kind of method and apparatus for deleting contact person in address list.
Background technology
Address list is the higher One function of frequency used in mobile phone, and therefore the design optimization of address list compares for user More important.Some current mobile phones are configured with address list recycle bin for address list, and address list recycle bin is deleted for depositing Contact person, to avoid user from deleting situation about cannot recover after contact person by mistake.
At least there is following technical problem in prior art:After the contact person in address list is deleted by user, cell phone system The contact person is added to address list recycle bin, when other people beyond the user are using the mobile phone, can be appreciated that phase in recycle bin The associated person information of pass, causes privacy of user to be revealed.
Content of the invention
The present invention proposes a kind of method and apparatus for deleting contact person in address list, can solve the problem that and is deleted to recovery by user Associated person information in standing easily is seen by other people, causes the technical problem of privacy leakage.
On the one hand, the present invention proposes a kind of method for deleting contact person in address list, including:
In response to deleting the operation of selected contact person in address list, by the selected contact person from the communication Delete in record, and the contact person being deleted is added to address list recycle bin;
When detect have in the address list recycle bin described at least one be deleted the associated person information when, if Put the address list recycle bin password for entering needed for the address list recycle bin.
Additionally, the address list recycle bin password for entering needed for the address list recycle bin that arranges includes:Eject and arrange Cryptographic interface, the setting cryptographic interface is used for the password of receiving user's input;
In response to user, the operation that password is input in cryptographic interface being set described, will connect from the setting cryptographic interface The password of receipts is set to the address list recycle bin password.
Additionally, described arrange, described, the operation for being input into password in cryptographic interface in response to user, will be close from the setting The password for receiving in code interface is set to the address list recycle bin password to be included:
At least one operational order of receive user at least one position on the setting cryptographic interface, and according to described At least one operational order is set to the address list recycle bin password by the input sequence of at least one operational order;Or Person,
Receive user described continuously slipping will instruct corresponding rail in the continuously slipping instruction for arranging on cryptographic interface Mark is set to the address list recycle bin password.
Additionally, the address list recycle bin password for entering needed for the address list recycle bin that arranges includes:Obtain described The program password of mounted application program in the screen-lock password or the terminal of address list place terminal, by the screen-lock password Or described program password is set to the address list recycle bin password.
Additionally, the operation in response to deleting selected contact person in address list, by the selected contact person Deleting from the address list, and the contact person being deleted is added to address list recycle bin includes:Logical in response to deleting The operation of selected contact person in news record, if the selected contact person is located at the communication of the first subclass in the address list In record, then the selected contact person is deleted from the address list, the contact person being deleted is added to described Address list recycle bin.
Additionally, after the address list recycle bin password for arranging and entering needed for the address list recycle bin, the side Method also includes:
The display icon of the address list recycle bin is changed, so that described show icon and be not provided with the address list before Display icon difference during recycle bin password.
On the other hand, the embodiment of the present invention proposes a kind of device for deleting contact person in address list, including:
Respond module, for the operation in response to deleting selected contact person in address list, will be selected described It is that people is deleted from the address list, and the contact person being deleted is added to address list recycle bin;
Setup module, for when detect have in the address list recycle bin described at least one be deleted described When being people's information, the address list recycle bin password for entering needed for the address list recycle bin is set.
Additionally, the address list recycle bin password for entering needed for the address list recycle bin that arranges includes:Eject and arrange Cryptographic interface, the setting cryptographic interface is used for the password of receiving user's input;
In response to user, the operation that password is input in cryptographic interface being set described, will connect from the setting cryptographic interface The password of receipts is set to the address list recycle bin password.
Additionally, described arrange, described, the operation for being input into password in cryptographic interface in response to user, will be close from the setting The password for receiving in code interface is set to the address list recycle bin password to be included:
At least one operational order of receive user at least one position on the setting cryptographic interface, and according to described At least one operational order is set to the address list recycle bin password by the input sequence of at least one operational order;Or Person,
Receive user described continuously slipping will instruct corresponding rail in the continuously slipping instruction for arranging on cryptographic interface Mark is set to the address list recycle bin password.
Additionally, the address list recycle bin password for entering needed for the address list recycle bin that arranges includes:Obtain described The program password of mounted application program in the screen-lock password or the terminal of address list place terminal, by the screen-lock password Or described program password is set to the address list recycle bin password.
Additionally, the operation in response to deleting selected contact person in address list, by the selected contact person Deleting from the address list, and the contact person being deleted is added to address list recycle bin includes:Logical in response to deleting The operation of selected contact person in news record, if the selected contact person is located at the communication of the first subclass in the address list In record, then the selected contact person is deleted from the address list, the contact person being deleted is added to described Address list recycle bin.
Additionally, after the address list recycle bin password for arranging and entering needed for the address list recycle bin, the dress Putting also includes:
Modified module, for changing the display icon of the address list recycle bin so that described display icon with before not Display icon difference during the address list recycle bin password is set.
Using technique scheme, have the advantages that:
The operation deleted by detecting contact person in address list, the contact person being deleted is added to address list recovery Stand, when detect have in address list recycle bin at least one be deleted associated person information when, arrange entry communication record reclaim The mode of the address list recycle bin password needed for standing is protected the privacy of the address list recycle bin of user, solve by with The associated person information that family is deleted in recycle bin is easily seen by other people, causes the technical problem of privacy leakage, improves user's body Test.
Description of the drawings
Fig. 1 is the flow chart of the method for deleting contact person in address list according to an embodiment of the invention;
Fig. 2 is the flow chart of the method for deleting contact person in address list in accordance with another embodiment of the present invention;
Fig. 3 is the block diagram of the device for deleting contact person in address list in accordance with another embodiment of the present invention.
Specific embodiment
Purpose, technical scheme and advantage for making the embodiment of the present invention is clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is The a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment for being obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
With reference to Fig. 1, the present invention proposes a kind of method for deleting contact person in address list, including:
Step S001, in response to deleting the operation of selected contact person in address list, by selected contact person from logical Delete in news record, and the contact person being deleted is added to address list recycle bin;
Step S002, when detect have in address list recycle bin at least one be deleted associated person information when, arrange Address list recycle bin password needed for entry communication record recycle bin.Illustrated with the terminal that address list is located as mobile phone.
In step S001, after user deletes contact person in the address list of mobile phone, now cell phone system can be automatic The contact person is added to address list recycle bin, because adding deleted contact person in address list recycle bin, this When need to arrange address list recycle bin password to address list recycle bin, in order to avoid seen in the address list recycle bin of user by other people The content in face.
Address list includes:Chat communication record in telephonic communication record, chat software etc..
Address list recycle bin includes:Telephonic communication is recorded corresponding telephonic communication record recycle bin, Chat communication and records corresponding chatting Its address list recycle bin etc..
In step S002, when detect have in address list recycle bin at least one be deleted associated person information when, Address list recycle bin password needed for entry communication record recycle bin is set.
Citing:After cell phone system detects the contact person in telephonic communication record and is deleted, automatically the contact person can be added Enter to telephonic communication and record recycle bin.Only detect and in telephonic communication record recycle bin, have at least one contact person's letter being deleted During breath, then cell phone system arranges the address list recycle bin password needed for entry communication record recycle bin.When cell phone system is merely detected After contact person in its address list is deleted, automatically the contact person can be added to Chat communication and recycle bin is recorded, as long as mobile phone system System is detected when there is, in Chat communication record, the associated person information that at least one is deleted, then cell phone system is recorded back for Chat communication Receive station and the Chat communication record recycle bin password for entering needed for Chat communication record recycle bin is set.
The action that contact person in Chat communication record is deleted includes:Contact person is drawn into blacklist, contact person and is added into Strange roster or contact person are provided with checking public message of user's issue etc..
The mode that cell phone system arranges address list recycle bin password for address list recycle bin can have multiple:
First kind of way:Cell phone system ejects the interface that incoming traffic records recycle bin password, allows user to be input into word Password or finger-print cipher are encrypted to address list recycle bin.The interface of incoming traffic record recycle bin password can be Password Input frame Or fingerprint input frame.
The second way:Cell phone system obtains automatically the screen-lock password of mobile phone and as address list recycle bin password and arranges.
The third mode:The other application programs of screen-lock password or mobile phone that cell phone system obtains mobile phone automatically are set Program password, then eject confirm using password default interface, if user have selected "Yes", cell phone system is arranged automatically The screen-lock password of mobile phone or program password are that cell phone system is ejected address list recycle bin password, if user have selected "No" The interface of incoming traffic record recycle bin password, voluntarily arranges address list recycle bin password for user.
The operation deleted by detecting contact person in address list, the contact person being deleted is added to address list recovery Stand, when detect have in address list recycle bin at least one be deleted associated person information when, arrange entry communication record reclaim The mode of the address list recycle bin password needed for standing is protected the privacy of the address list recycle bin of user, solve by with The associated person information that family is deleted in recycle bin is easily seen by other people, causes the technical problem of privacy leakage, improves user's body Test.
In one of which embodiment, arranging the address list recycle bin password needed for entry communication record recycle bin includes: Eject and cryptographic interface is set, arranging cryptographic interface is used for the password of receiving user's input;
The operation that password is input in cryptographic interface is being set in response to user, by from the password for arranging reception in cryptographic interface It is set to address list recycle bin password.
In the present embodiment, after cell phone system detects the operation that user deletes contact person in address list, can automatic spring Cryptographic interface is set, for the address list recycle bin password needed for arranging entry communication record recycle bin for address list recycle bin, will User is set to address list recycle bin password in the password for arranging cryptographic interface input.Make user carry out the setting dish of mobile phone In list, address list recycle bin password is arranged to address list recycle bin, what user can be convenient is configured leading in current screen The operation of news record recycle bin password, the step of save user operation and the time.
In one of which embodiment, the operation that password is input in cryptographic interface is being set in response to user, will be from setting Put the password for receiving in cryptographic interface to be set to address list recycle bin password and include:
At least one operational order of receive user at least one position on cryptographic interface is set, and according at least one At least one operational order is set to address list recycle bin password by the input sequence of operational order;Or,
Continuously slipping instruction of the receive user on cryptographic interface is arranged, corresponding for continuously slipping instruction track is set to Address list recycle bin password.
The present embodiment arranges communication by receive user in the operational order for arranging on cryptographic interface or continuously slipping instruction Record recycle bin password, the setting for alloing user convenient and replacing address list recycle bin password.
In one of which embodiment, arranging the address list recycle bin password needed for entry communication record recycle bin includes: The program password of mounted application program in the screen-lock password or terminal of acquisition address list place terminal, by screen-lock password or journey Sequence password is set to address list recycle bin password.
When the password that user needs setting in mobile phone is more, user is often difficult to remember multiple passwords, or To multiple passwords using position produce and obscure, using other application journey in the screen-lock password of mobile phone or mobile phone in the present embodiment The program password that sequence is set makes user record multiple passwords as address list recycle bin password, and alleviating user makes Burden with mobile phone.
Password of the program password needed for for when enter application program.
Password of the screen-lock password needed for for when make mobile phone unblock.
In one of which embodiment, in response to deleting the operation of selected contact person in address list, will be selected Contact person delete from address list, and the contact person being deleted is added to address list recycle bin and includes:Logical in response to deleting The operation of selected contact person in news record, if selected contact person is located in the first subclass address list in address list, Selected contact person is deleted from address list, the contact person being deleted is added to address list recycle bin.
User would generally classify to address list, such as be provided with multiple address list subclass " friends ", " colleague " or " tennis Team ", if the contact person for detecting in address list subclass " friend " is deleted, the contact person being deleted is deleted from address list Remove, the contact person being deleted is added to address list recycle bin, and address list recycle bin password is set for address list recycle bin.Logical Contact person in the first subclass address list that crosses in detection address list is deleted, and then arranges address list to address list recycle bin and returns The mode of station password is received, makes just to set address list recycle bin only when user deletes the contact person in specific directory subclass Address list recycle bin password is put, has more met the original intention of user setup address list recycle bin password, it is not in embarrassment to make user Situation.
In one of which embodiment, arrange entry communication record recycle bin needed for address list recycle bin password it Afterwards, method also includes:The display icon of modification address list recycle bin, so as to show icon and be not provided with address list recycle bin before Display icon difference during password.
After address list recycle bin is provided with address list recycle bin password, the display icon of address list recycle bin is carried out Modification or replacement, make address list recycle bin shows that icon is returned with the address list that address list recycle bin password is not set before Receive the display icon difference at station, show pattern of the icon plus lock as being provided with communication such as to address list recycle bin before The display icon of the address list recycle bin of record recycle bin password, allows user to have learnt address list recycle bin by showing icon Through being provided with address list recycle bin password.
With reference to Fig. 2, the flow process of one embodiment of the present of invention is described by taking mobile phone as an example below.
Step S201, if detecting user to delete contact person in address list in the first subclass address list " friend ", The contact person being deleted is added address list recycle bin by cell phone system;
Step S202, when detect have in address list recycle bin at least one be deleted associated person information when, mobile phone System obtains the screen-lock password of mobile phone;
Step S203, cell phone system ejects the interface for confirming using password default in current page, if user have selected making With password default, then screen-lock password is set to address list recycle bin password by cell phone system automatically;If user have selected not using Password default, then the interface of cell phone system ejection incoming traffic record recycle bin password, voluntarily arranges address list recycle bin for user Password;
Step S204, obtains password of the user in the interface input of incoming traffic record recycle bin password, is set to address list Recycle bin password;
Step S205, changes the display icon of address list recycle bin and shows.
With reference to Fig. 3, the present invention also proposes a kind of device for deleting contact person in address list, including:
Respond module 301, for the operation in response to deleting selected contact person in address list, by selected contact People is deleted from address list, and the contact person being deleted is added to address list recycle bin;
Setup module 302, has at least one associated person information being deleted for working as to detect in address list recycle bin When, the address list recycle bin password needed for entry communication record recycle bin is set.
The operation deleted by detecting contact person in address list, the contact person being deleted is added to address list recovery Stand, when detect have in address list recycle bin at least one be deleted associated person information when, arrange entry communication record reclaim The mode of the address list recycle bin password needed for standing is protected the privacy of the address list recycle bin of user, solve by with The associated person information that family is deleted in recycle bin is easily seen by other people, causes the technical problem of privacy leakage, improves user's body Test.
In one of which embodiment, arranging the address list recycle bin password needed for entry communication record recycle bin includes: Eject and cryptographic interface is set, arranging cryptographic interface is used for the password of receiving user's input;
The operation that password is input in cryptographic interface is being set in response to user, by from the password for arranging reception in cryptographic interface It is set to address list recycle bin password.
In one of which embodiment, the operation that password is input in cryptographic interface is being set in response to user, will be from setting Put the password for receiving in cryptographic interface to be set to address list recycle bin password and include:
At least one operational order of receive user at least one position on cryptographic interface is set, and according at least one At least one operational order is set to address list recycle bin password by the input sequence of operational order;Or,
Continuously slipping instruction of the receive user on cryptographic interface is arranged, corresponding for continuously slipping instruction track is set to Address list recycle bin password.
In one of which embodiment, arranging the address list recycle bin password needed for entry communication record recycle bin includes: The program password of mounted application program in the screen-lock password or terminal of acquisition address list place terminal, by screen-lock password or journey Sequence password is set to address list recycle bin password.
In one of which embodiment, in response to deleting the operation of selected contact person in address list, will be selected Contact person delete from address list, and the contact person being deleted is added to address list recycle bin and includes:Logical in response to deleting The operation of selected contact person in news record, if selected contact person is located in the first subclass address list in address list, Selected contact person is deleted from address list, the contact person being deleted is added to address list recycle bin.
In one of which embodiment, arrange entry communication record recycle bin needed for address list recycle bin password it Afterwards, device also includes:
Modified module, for changing the display icon of address list recycle bin, so as to show icon and be not provided with communication before Display icon difference during record recycle bin password.
The embodiment of the present invention also proposes a kind of electronic equipment, including:
At least one processor;And,
The memorizer being connected with least one processor communication;Wherein,
The memory storage can be by the instruction of one computing device, and the instruction is processed by described at least one Device is executed, so that at least one processor can:
In response to deleting the operation of selected contact person in address list, by the selected contact person from the communication Delete in record, and the contact person being deleted is added to address list recycle bin;
When detect have in the address list recycle bin described at least one be deleted the associated person information when, if Put the address list recycle bin password for entering needed for the address list recycle bin.
The embodiment of the present invention also proposes a kind of non-transient computer readable storage medium storing program for executing, and the non-transient computer is readable to deposit Storage media stores computer instruction, when computer executes the computer instruction, for executing:
In response to deleting the operation of selected contact person in address list, by the selected contact person from the communication Delete in record, and the contact person being deleted is added to address list recycle bin;
When detect have in the address list recycle bin described at least one be deleted the associated person information when, if Put the address list recycle bin password for entering needed for the address list recycle bin.
The embodiment of the present invention also proposes a kind of computer program, and which includes computer-readable medium, the computer Computer-readable recording medium includes:First group of code, in response to deleting the operation of selected contact person in address list, described in selected Contact person is deleted from the address list, and the contact person being deleted is added to address list recycle bin;Second group of code, When detect have in the address list recycle bin described at least one be deleted the associated person information when, arrange enter institute State the address list recycle bin password needed for address list recycle bin.
Device embodiment described above is only that schematically wherein the unit for illustrating as separating component can To be or may not be physically separate, as the part that unit shows can be or may not be physics list Unit, you can be located at a place, or can also be distributed on multiple NEs.Which is selected according to the actual needs can In some or all of module realizing the purpose of this embodiment scheme.Those of ordinary skill in the art are not paying creativeness Work in the case of, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can Mode by software plus required general hardware platform is realizing, naturally it is also possible to by hardware.Based on such understanding, on State the part that technical scheme substantially contributes prior art in other words to embody in the form of software product, should Computer software product can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD etc., including some fingers Order is used so that a computer equipment (can be personal computer, server, or network equipment etc.) executes each enforcement Method described in some parts of example or embodiment.
Finally it should be noted that:Above example only in order to technical scheme to be described, rather than a limitation;Although With reference to the foregoing embodiments the present invention is described in detail, it will be understood by those within the art that:Which still may be used To modify to the technical scheme described in foregoing embodiments, or equivalent is carried out to which part technical characteristic; And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and Scope.

Claims (12)

1. a kind of delete contact person in address list method, it is characterised in that include:
In response to deleting the operation of selected contact person in address list, by the selected contact person from the address list Delete, and the contact person being deleted is added to address list recycle bin;
When detect have in the address list recycle bin described at least one be deleted the associated person information when, arrange into Enter the address list recycle bin password needed for the address list recycle bin.
2. the method for deleting contact person in address list according to claim 1, it is characterised in that the setting enters described Address list recycle bin password needed for address list recycle bin includes:Eject and cryptographic interface is set, the setting cryptographic interface is used for The password of receiving user's input;
In response to user, the operation that password is input in cryptographic interface being set described, reception in cryptographic interface will be set from described Password is set to the address list recycle bin password.
3. according to claim 2 delete contact person in address list method, it is characterised in that
The operation for being input into password in response to user in the setting cryptographic interface, will connect from the setting cryptographic interface The password of receipts is set to the address list recycle bin password to be included:
Receive user described arrange cryptographic interface at least one position at least one operational order, and according to described at least At least one operational order is set to the address list recycle bin password by the input sequence of one operational order;Or,
The corresponding track of the continuously slipping instruction is set by receive user in the continuously slipping instruction for arranging on cryptographic interface It is set to the address list recycle bin password.
4. the method for deleting contact person in address list according to claim 1, it is characterised in that the setting enters described Address list recycle bin password needed for address list recycle bin includes:Obtain the screen-lock password of address list place terminal or described The program password of mounted application program in terminal, the screen-lock password or described program password are set to the address list Recycle bin password.
5. the method for deleting contact person in address list according to claim 1, it is characterised in that described logical in response to deleting In news record, the operation of selected contact person, the selected contact person is deleted from the address list, and will be deleted The contact person be added to address list recycle bin and include:In response to deleting the operation of selected contact person in address list, if The selected contact person be located at the address list in the first subclass address list in, then by the selected contact person from Delete in the address list, the contact person being deleted is added to the address list recycle bin.
6. according to any one of claim 1 to 5 deletion contact person in address list method, it is characterised in that described After arranging the address list recycle bin password for entering needed for the address list recycle bin, methods described also includes:
The display icon of the address list recycle bin is changed, so that the display icon is reclaimed with the address list is not provided with before Stand password when display icon difference.
7. a kind of delete contact person in address list device, it is characterised in that include:
Respond module, for the operation in response to deleting selected contact person in address list, by the selected contact person Delete from the address list, and the contact person being deleted is added to address list recycle bin;
Setup module, has, for working as to detect, the contact person being deleted described at least one in the address list recycle bin During information, the address list recycle bin password for entering needed for the address list recycle bin is set.
8. the device for deleting contact person in address list according to claim 7, it is characterised in that the setting enters described Address list recycle bin password needed for address list recycle bin includes:Eject and cryptographic interface is set, the setting cryptographic interface is used for The password of receiving user's input;
In response to user, the operation that password is input in cryptographic interface being set described, reception in cryptographic interface will be set from described Password is set to the address list recycle bin password.
9. according to claim 8 delete contact person in address list device, it is characterised in that
The operation for being input into password in response to user in the setting cryptographic interface, will connect from the setting cryptographic interface The password of receipts is set to the address list recycle bin password to be included:
Receive user described arrange cryptographic interface at least one position at least one operational order, and according to described at least At least one operational order is set to the address list recycle bin password by the input sequence of one operational order;Or,
The corresponding track of the continuously slipping instruction is set by receive user in the continuously slipping instruction for arranging on cryptographic interface It is set to the address list recycle bin password.
10. the device for deleting contact person in address list according to claim 7, it is characterised in that the setting enters institute Stating the address list recycle bin password needed for address list recycle bin includes:Obtain screen-lock password or the institute of address list place terminal The program password of mounted application program in terminal is stated, the screen-lock password or described program password are set to the communication Record recycle bin password.
11. devices for deleting contact person in address list according to claim 7, it is characterised in that described in response to deleting The operation of selected contact person in address list, the selected contact person is deleted from the address list, and will be deleted The contact person for removing is added to address list recycle bin to be included:In response to deleting the operation of selected contact person in address list, If the selected contact person is located in the first subclass address list in the address list, by the selected contact person Delete from the address list, the contact person being deleted is added to the address list recycle bin.
The device of the 12. deletion contact person in address lists according to any one of claim 7 to 11, it is characterised in that
After the address list recycle bin password for arranging and entering needed for the address list recycle bin, described device also includes:
Modified module, for changing the display icon of the address list recycle bin, shows icon and is not provided with before so that described Display icon difference during the address list recycle bin password.
CN201610936662.9A 2016-11-01 2016-11-01 Method and device for deleting contact from address book Pending CN106453783A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610936662.9A CN106453783A (en) 2016-11-01 2016-11-01 Method and device for deleting contact from address book

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610936662.9A CN106453783A (en) 2016-11-01 2016-11-01 Method and device for deleting contact from address book

Publications (1)

Publication Number Publication Date
CN106453783A true CN106453783A (en) 2017-02-22

Family

ID=58178540

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610936662.9A Pending CN106453783A (en) 2016-11-01 2016-11-01 Method and device for deleting contact from address book

Country Status (1)

Country Link
CN (1) CN106453783A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130047032A1 (en) * 2011-08-19 2013-02-21 International Business Machines Corporation Data set autorecovery
CN103139264A (en) * 2011-12-01 2013-06-05 比亚迪股份有限公司 Processing method and processing system of deleted data
CN105653397A (en) * 2015-09-30 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Recovery processing method, apparatus and electronic device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130047032A1 (en) * 2011-08-19 2013-02-21 International Business Machines Corporation Data set autorecovery
CN103139264A (en) * 2011-12-01 2013-06-05 比亚迪股份有限公司 Processing method and processing system of deleted data
CN105653397A (en) * 2015-09-30 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Recovery processing method, apparatus and electronic device

Similar Documents

Publication Publication Date Title
CN103747147B (en) Upgrade the method and apparatus of address list
CN103841261B (en) A kind of method and communication terminal extracting communication information
CN105653397A (en) Recovery processing method, apparatus and electronic device
CN101697107A (en) Method and device for inputting characters in touch mobile communication terminal
CN105224194B (en) A kind of data processing method and terminal
CN106790926A (en) A kind of contact management method and terminal
CN106210238A (en) short message storage method and device
CN102917098A (en) Method and device for preventing important linkman from being wrongly deleted
CN108170787A (en) A kind of image file delet method, mobile terminal and computer readable storage medium
CN107734489A (en) Dial the method, apparatus, storage medium and electronic equipment of emergency numbers
CN105988897A (en) Recovery method and device of backup data of mobile terminal
CN105554227A (en) Method and apparatus for improving terminal information security, and terminal
CN108629203A (en) Method for information display and Related product
CN105488372B (en) Verification method and device
CN106599663A (en) Information security protecting method and mobile terminal
CN106776908A (en) Data clearing method, device and terminal
CN107197074A (en) Book management method, device, storage medium and electronic equipment
CN105338153A (en) Contact person information storage method and device
CN104363343B (en) A kind of method and device of caller identification
CN107426222A (en) Information protecting method, device, storage medium and electronic equipment
CN107704337A (en) Method, mobile terminal and the device with store function of factory reset
CN104980335A (en) Method and system for processing received mails of email
CN106453783A (en) Method and device for deleting contact from address book
CN106776847A (en) Delete the method for media file, device and move on to terminal
CN105809112A (en) Fingerprint information recovering method, fingerprint information recovering apparatus and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170222