CN106529238A - Information protection method and mobile terminal - Google Patents
Information protection method and mobile terminal Download PDFInfo
- Publication number
- CN106529238A CN106529238A CN201610965287.0A CN201610965287A CN106529238A CN 106529238 A CN106529238 A CN 106529238A CN 201610965287 A CN201610965287 A CN 201610965287A CN 106529238 A CN106529238 A CN 106529238A
- Authority
- CN
- China
- Prior art keywords
- information
- user
- list
- default
- corresponding number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses an information protection method. The information protection method comprises the following steps of: receiving operation of a user on information, wherein the operation includes editing or deleting operation; obtaining a number corresponding to the information; judging whether the number corresponding to the information exists in a pre-set high-importance list or not; if the number corresponding to the information exists in the pre-set high-importance list, judging whether the user is a member in a pre-set authority list or not; if the user is the member in the pre-set authority list, generating a corresponding operation instruction according to the operation of the user; and, if the user is not the member in the pre-set authority list, not generating the operation instruction. The embodiment of the invention further provides a mobile terminal. By means of the steps in the method, the fact that important information of the user cannot be optionally edited or deleted can be ensured; furthermore, the user can conveniently check the information; flexible information protection is realized; and the experience effect is effectively improved.
Description
Technical field
The present invention relates to electronic device field, more particularly to a kind of guard method and the mobile terminal of information.
Background technology
With the progress and development of society, the species of information is more and more, application scenario is also more and more extensive.For example:Letter
Breath species generally comprises note, wechat information, QQ information etc..Information can be used as the information of bank account, conduct
Pay the information of precious account, between the sequence information of ONLINE train ticket, the announcement information of momentous conference of company and lover
Communication information etc..Above-mentioned cited information is all highly important for a user, and generally user is not
Wish that these information are edited or deleted by others.For example, in the middle of society, there is following real event:One female is big
Deposit in user's Alipay is produced by student, and the information of Alipay account is deleted, and makes user know nothing.Although
The existing mode that can be encrypted for information in prior art, but as the also no privacy of the above-mentioned information content is not to
The degree that can be checked to others so as to user, above-mentioned cipher mode can also check that these information are brought while encryption
Inconvenience, reduces the experience of user.
The content of the invention
To overcome the problems of the prior art, one aspect of the present invention to provide a kind of guard method of information, including:
Operation of the receive user to described information, wherein, the operation includes editor or deletion action;
Obtain the corresponding number of described information;
Judge the corresponding number of described information with the presence or absence of in default high importance list;
If the corresponding number of described information is present in default high importance list, judge whether the user belongs to pre-
If the member of authority list;
If the user belongs to the member of default access list, corresponding operational order is generated according to the operation of user;
If the user is not belonging to the member of default access list, operational order is not generated.
On the other hand, present invention also offers a kind of mobile terminal, including:
Operation module is received, for operation of the receive user to described information, wherein, the operation includes editing or deletes
Operation;
Numbers module is obtained, for obtaining the corresponding number of described information;
First judge module, for judging the corresponding number of described information with the presence or absence of in default high importance list;
Second judge module, if being present in default high importance list for the corresponding number of described information, judges
Whether the user belongs to the member of default access list;
Instruction module is generated, if belonging to the member of default access list for the user, is given birth to according to the operation of user
Into corresponding operational order;
Instruction module is not generated, if the member of default access list is not belonging to for the user, operation is not generated and is referred to
Order.
In the embodiment of the present invention, when mobile terminal receives user to the operation of information, corresponding number of the information is obtained
Code;And judge that the corresponding number of the information, with the presence or absence of in default high importance list, if existing, judges whether user belongs to
In the member of default access list;If user belongs to the member of default access list, generated according to the operation of user corresponding
Operational order, realizes user to information editing or deletion;If user is not belonging to the member of default access list, operation is not generated
Instruction.By above-mentioned step, it is ensured that the information important for user will not arbitrarily be edited or be deleted;Also, it is also convenient for using
Family is checked to information, realizes the flexible protection to information, effectively improve experience effect.
Description of the drawings
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to making needed for embodiment description
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, on the premise of not paying creative work, can be obtaining other according to these accompanying drawings
Accompanying drawing.
Fig. 1 is the schematic flow sheet of the first embodiment of the guard method of the information of the present invention;
Fig. 2 is the schematic flow sheet of the second embodiment of the guard method of the information of the present invention;
Schematic flow sheets of the Fig. 3 for step 23;
Schematic flow sheets of the Fig. 4 for step 24;
Fig. 5 is the structural representation of the first embodiment of the mobile terminal of the present invention;
Fig. 6 is the structural representation of the second embodiment of the mobile terminal of the present invention;
Fig. 7 is the structural representation of the 3rd embodiment of the mobile terminal of the present invention;
Fig. 8 is the structural representation of the fourth embodiment of the mobile terminal of the present invention.
Specific embodiment
In order that technical problem solved by the invention, technical scheme and beneficial effect become more apparent, below in conjunction with
Drawings and Examples, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only used
To explain the present invention, it is not intended to limit the present invention.
Fig. 1, is the schematic flow sheet of the first embodiment of the guard method of the information of the present invention, and the method includes:
Step S11, operation of the receive user to described information, wherein, the operation includes editor or deletion action.
In this step, information can be short message, wechat information, QQ information etc..
Step S12, obtains the corresponding number of described information.
In this step, correspondingly, number can be telephone number, wechat number, QQ numbers etc..
Step S13, judges the corresponding number of described information with the presence or absence of in default high importance list.
In this step, by judging that the corresponding number of information, with the presence or absence of in default high importance list, is somebody's turn to do to determine
Whether information belongs to needs information to be protected.I.e. the corresponding number of information is present in the middle of default high importance list, then really
The fixed information belongs to needs information to be protected;Otherwise, it is determined that the information is not belonging to need information to be protected.The high importance name
List can be user preset in the middle of mobile terminal.
Step S14, if the corresponding number of described information is present in default high importance list, judges that the user is
The no member for belonging to default access list.
In this step, however, it is determined that the corresponding number of information is present in the middle of default high importance list, and the information belongs to
Information to be protected is needed, then determines whether whether user belongs to the member of default access list.Authority list can be understood as
The list of edlin or deletion can be entered to the information that is protected.Wherein, the authority list can also be user preset in shifting
In the middle of dynamic terminal.
Step S15, if the user belongs to the member of default access list, generates corresponding behaviour according to the operation of user
Instruct.
In this step, if user belongs to the member of default access list, mobile terminal editor or deletion then according to user
The corresponding operational order of operation production, realizes editor or deletion of the user to protected information.
Step S16, if the user is not belonging to the member of default access list, does not generate operational order.
In this step, if user is not belonging to the member of default access list, the editor or deletion action for the user moves
Dynamic terminal does not generate operational order, it is ensured that the user can not enter edlin or deletion to shielded information, and that realizes information has
Effect protection.
In the embodiment of the present invention, when mobile terminal receives user to the operation of information, corresponding number of the information is obtained
Code;And judge that the corresponding number of the information, with the presence or absence of in default high importance list, if existing, judges whether user belongs to
In the member of default access list;If user belongs to the member of default access list, generated according to the operation of user corresponding
Operational order, realizes user to information editing or deletion;If user is not belonging to the member of default access list, operation is not generated
Instruction.By above-mentioned step, it is ensured that the information important for user will not arbitrarily be edited or be deleted;Also, it is also convenient for using
Family is checked to information, realizes the flexible protection to information, effectively improve experience effect.
Fig. 2, is the schematic flow sheet of the second embodiment of the guard method of the information of the present invention, and the method includes:
Step S21, operation of the receive user to described information, wherein, the operation includes editor or deletion action.
In this step, information can be short message, wechat information, QQ information etc..
Step S22, obtains the corresponding number of described information.
In this step, correspondingly, number can be telephone number, wechat number, QQ numbers etc..
Step S23, judges the corresponding number of described information with the presence or absence of in default high importance list.
In this step, by judging that the corresponding number of information, with the presence or absence of in default high importance list, is somebody's turn to do to determine
Whether information belongs to needs information to be protected.I.e. the corresponding number of information is present in the middle of default high importance list, then really
The fixed information belongs to needs information to be protected;Otherwise, it is determined that the information is not belonging to need information to be protected.The high importance name
List can be user preset in the middle of mobile terminal.
Further, with reference to Fig. 3, this step includes:
Step S231, obtains the list of numbers of the default high importance list.
Step S232, judges in the list of numbers with the presence or absence of the number consistent with the corresponding number of described information.
Step S233, if there is the number consistent with the corresponding number of described information in the list of numbers, judges institute
State the corresponding number of information and be present in default high importance list.
In this step, if there is the number consistent with the corresponding number of information in list of numbers, it is determined that information is corresponding
Number is present in the middle of default high importance list, and the information belongs to shielded information.If conversely, not depositing in list of numbers
In the number consistent with the corresponding number of information, it is determined that the corresponding number of information is not present in default high importance list and works as
In, the information is not belonging to shielded information.
With reference to step S231, step S232 and step S233, you can determine that user needs to edit or the information of deletion is
It is no to belong to shielded information, it is simple, convenient, beneficial to the protection of the guard method to information of the present invention.
Step S24, if the corresponding number of described information is present in default high importance list, judges that the user is
The no member for belonging to default access list.
In this step, however, it is determined that the corresponding number of information is present in the middle of default high importance list, and the information belongs to
Information to be protected is needed, then determines whether whether user belongs to the member of default access list.Authority list can be understood as
The list of edlin or deletion can be entered to the information that is protected.Wherein, the authority list can also be user preset in shifting
In the middle of dynamic terminal.
In this step, the step of whether user belongs to the member of default access list judged, specially:To the use
Family carries out identification, to judge whether the user belongs to the member of default access list.
Further, with reference to Fig. 4, the step includes:
Step S241, obtains the identity identification information of the user input.
In this step, by the identity identification information for obtaining user input, to realize that mobile terminal enters to the identity of user
Row identification, to determine whether the user belongs to the member of default access list.Wherein, identity identification information is finger print information or close
Code information or iris information.
Step S242, judges whether the identity identification information being input into is consistent with default identity identification information.
In this step, for example, judge whether the finger print information being input into is consistent with default finger print information;Or, judge defeated
Whether the encrypted message for entering is consistent with default encrypted message;Or, judge that the iris information of input is believed with default iris
Whether breath is consistent.Wherein, default identity information can be user preset in the middle of mobile terminal.
Step S243, if the identity identification information of input is consistent with default identity identification information, judges the user
Belong to the member of default access list.
In this step, if the identity identification information of input is consistent with default identity identification information, it is determined that user belongs to
The member of default access list, the user enter the authority of edlin or deletion with the information to being protected.If conversely, input
Identity identification information it is inconsistent with default identity identification information, it is determined that user is not belonging to the member of default access list,
The user does not enter the authority of edlin or deletion with the information to being protected.
With reference to step S241, step S242 and step S243, the identity of user can be efficiently identified, and be grasped
Make simple, convenient, beneficial to the protection of guard method of the invention to information.
Step S25, if the user belongs to the member of default access list, generates corresponding behaviour according to the operation of user
Instruct.
In this step, if user belongs to the member of default access list, mobile terminal editor or deletion then according to user
The corresponding operational order of operation production, realizes editor or deletion of the user to protected information.
Step S26, if the user is not belonging to the member of default access list, does not generate operational order.
In this step, if user is not belonging to the member of default access list, the editor or deletion action for the user moves
Dynamic terminal does not generate operational order, it is ensured that the user can not enter edlin or deletion to shielded information, and that realizes information has
Effect protection.
In the embodiment of the present invention, when mobile terminal receives user to the operation of information, corresponding number of the information is obtained
Code;And judge that the corresponding number of the information, with the presence or absence of in default high importance list, if existing, judges whether user belongs to
In the member of default access list;If user belongs to the member of default access list, generated according to the operation of user corresponding
Operational order, realizes user to information editing or deletion;If user is not belonging to the member of default access list, operation is not generated
Instruction.By above-mentioned step, it is ensured that the information important for user will not arbitrarily be edited or be deleted;Also, it is also convenient for using
Family is checked to information, realizes the flexible protection to information, effectively improve experience effect.
Above the embodiment of the guard method of the information of the present invention is made to be discussed in detail.Said method is will correspond to below
Device (i.e. mobile terminal) be further elaborated.Wherein, mobile terminal can be mobile phone, panel computer, MP3, MP4, notes
This computer etc..
Fig. 5, is the structural representation of the first embodiment of the mobile terminal of the present invention, and the mobile terminal 10 includes receiving to be grasped
Make module 110, obtain numbers module 120, the first judge module 130, the second judge module 140, generate instruction module 150 and
Instruction module 160 is not generated.
Operation module 110 is received, is connected with numbers module 120 is obtained, for operation of the receive user to described information, its
In, the operation includes editor or deletion action.
Numbers module 120 is obtained, is connected with the first judge module 130, for obtaining the corresponding number of described information.
First judge module 130, is connected with the second judge module 140, for whether judging the corresponding number of described information
It is present in default high importance list.
Second judge module 140, is connected with instruction module 150 is generated, if being present in for the corresponding number of described information
Default high importance list, then judge whether the user belongs to the member of default access list.
Instruction module 150 is generated, is connected with instruction module 160 is not generated, if belonging to default access name for the user
Single member, then generate corresponding operational order according to the operation of user.
Instruction module 160 is not generated, if the member of default access list is not belonging to for the user, operation is not generated
Instruction.
In the embodiment of the present invention, when mobile terminal receives user to the operation of information, corresponding number of the information is obtained
Code;And judge that the corresponding number of the information, with the presence or absence of in default high importance list, if existing, judges whether user belongs to
In the member of default access list;If user belongs to the member of default access list, generated according to the operation of user corresponding
Operational order, realizes user to information editing or deletion;If user is not belonging to the member of default access list, operation is not generated
Instruction.By above-mentioned step, it is ensured that the information important for user will not arbitrarily be edited or be deleted;Also, it is also convenient for using
Family is checked to information, realizes the flexible protection to information, effectively improve experience effect.
Fig. 6, is the structural representation of the second embodiment of the mobile terminal of the present invention, and the mobile terminal 20 includes receiving to be grasped
Make module 210, obtain numbers module 220, the first judge module 230, the second judge module 240, generate instruction module 250 and
Instruction module 260 is not generated.
Operation module 210 is received, is connected with numbers module 220 is obtained, for operation of the receive user to described information, its
In, the operation includes editor or deletion action.
Numbers module 220 is obtained, is connected with the first judge module 230, for obtaining the corresponding number of described information.
First judge module 230, is connected with the second judge module 240, for whether judging the corresponding number of described information
It is present in default high importance list.
Second judge module 240, is connected with instruction module 250 is generated, if being present in for the corresponding number of described information
Default high importance list, then judge whether the user belongs to the member of default access list;It is additionally operable to the user
Identification is carried out, to judge whether the user belongs to the member of default access list.
Instruction module 250 is generated, is connected with instruction module 260 is not generated, if belonging to default access name for the user
Single member, then generate corresponding operational order according to the operation of user.
Instruction module 260 is not generated, if the member of default access list is not belonging to for the user, operation is not generated
Instruction.
Wherein, the first judge module 230 includes:
List cell 231 is obtained, is connected with the 3rd judging unit 232, for obtaining the default high importance list
List of numbers.
3rd judging unit 232, is connected with the 4th judging unit 233, for judging to whether there is in the list of numbers
The number consistent with the corresponding number of described information.
4th judging unit 233, if for there is consistent with the corresponding number of described information number in the list of numbers
Code, then judge that the corresponding number of described information is present in default high importance list.
Wherein, the second judge module 240 includes:
Information unit 241 is obtained, is connected with the first judging unit 242, for obtaining the identification of the user input
Information.Specifically, identity identification information is finger print information or encrypted message or iris information.
First judging unit 242, is connected with the second judging unit 243, for judge input identity identification information with it is pre-
If identity identification information it is whether consistent.
Second judging unit 243, if the identity identification information for input is consistent with default identity identification information, sentences
The user of breaking belongs to the member of default access list.
In the embodiment of the present invention, when mobile terminal receives user to the operation of information, corresponding number of the information is obtained
Code;And judge that the corresponding number of the information, with the presence or absence of in default high importance list, if existing, judges whether user belongs to
In the member of default access list;If user belongs to the member of default access list, generated according to the operation of user corresponding
Operational order, realizes user to information editing or deletion;If user is not belonging to the member of default access list, operation is not generated
Instruction.By above-mentioned step, it is ensured that the information important for user will not arbitrarily be edited or be deleted;Also, it is also convenient for using
Family is checked to information, realizes the flexible protection to information, effectively improve experience effect.
Fig. 7 is the structural representation of the 3rd embodiment of the mobile terminal of the present invention.Mobile terminal 700 shown in Fig. 7 is wrapped
Include:At least one processor 701, memory 702, at least one network interface 704 and user interface 703.In mobile terminal 700
Each component be coupled by bus system 705.It is understood that bus system 705 is used to realize between these components
Connection communication.Bus system 705 except including in addition to data/address bus, also including power bus, controlling bus and status signal bus in addition.
But for the sake of for clear explanation, various buses are all designated as into bus system 705 in the figure 7.
Wherein, user interface 703 can include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or touch-screen etc..
It is appreciated that the memory 702 in the embodiment of the present invention can be volatile memory or nonvolatile memory,
Or may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage (Read-
OnlyMemory, ROM), programmable read only memory (ProgrammableROM, PROM), Erasable Programmable Read Only Memory EPROM
(ErasablePROM, EPROM), Electrically Erasable Read Only Memory (ElectricallyEPROM, EEPROM) dodge
Deposit.Volatile memory can be random access memory (RandomAccessMemory, RAM), and which is used as outside slow at a high speed
Deposit.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM
(StaticRAM, SRAM), dynamic random access memory (DynamicRAM, DRAM), Synchronous Dynamic Random Access Memory
(SynchronousDRAM, SDRAM), double data speed synchronous dynamic RAM (DoubleDataRate
SDRAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (SynchlinkDRAM, SLDRAM) and direct rambus random access memory
(DirectRambusRAM, DRRAM).The memory 702 of the system and method for embodiment of the present invention description is intended to include but does not limit
In these memories with any other suitable type.
In some embodiments, memory 702 stores following element, can perform module or data structure, or
Person their subset, or their superset:Operating system 7021 and application program 7022.
Wherein, operating system 7021, comprising various system programs, such as ccf layer, core library layer, driving layer etc., are used for
Realize various basic businesses and process hardware based task.Application program 7022, comprising various application programs, such as media
Player (MediaPlayer), browser (Browser) etc., for realizing various applied business.Realize embodiment of the present invention side
The program of method is may be embodied in application program 7022.
In embodiments of the present invention, by call memory 702 storage program or instruction, specifically, can be application
The program stored in program 7022 or instruction, processor 701 are used for operation of the receive user to described information, wherein, the behaviour
Work includes editor or deletion action;Obtain the corresponding number of described information;Judge the corresponding number of described information with the presence or absence of in
Default high importance list;If the corresponding number of described information is present in default high importance list, the use is judged
Whether family belongs to the member of default access list;If the user belongs to the member of default access list, according to the behaviour of user
Make to generate corresponding operational order;If the user is not belonging to the member of default access list, operational order is not generated.
The method that the embodiments of the present invention are disclosed is can apply in processor 701, or is realized by processor 701.
A kind of possibly IC chip of processor 701, the disposal ability with signal.During realization, said method it is each
Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 701 or software form.Above-mentioned process
Device 701 can be general processor, digital signal processor (DigitalSignalProcessor, DSP), special IC
(ApplicationSpecific IntegratedCircuit, ASIC), ready-made programmable gate array
(FieldProgrammableGateArray, FPGA) or other PLDs, discrete gate or transistor logic
Device, discrete hardware components.Can realize or perform disclosed each method in the embodiment of the present invention, step and box
Figure.General processor can be microprocessor or the processor can also be any conventional processor etc..With reference to the present invention
The step of method disclosed in embodiment, can be embodied directly in hardware decoding processor and perform and complete, or use decoding processor
In hardware and software module combination execution complete.Software module may be located at random access memory, and flash memory, read-only storage can
In the ripe storage medium in this area such as program read-only memory or electrically erasable programmable memory, register.The storage
Medium is located at memory 702, and processor 701 reads the information in memory 702, completes the step of said method with reference to its hardware
Suddenly.
It is understood that the embodiment of the present invention description these embodiments can with hardware, software, firmware, middleware,
Microcode or its combination are realizing.For hardware is realized, processing unit can be realized in one or more special ICs
(ApplicationSpecificIntegratedCircuits, ASIC), digital signal processor
(DigitalSignalProcessing, DSP), digital signal processing appts (DSPDevice, DSPD), programmable logic device
(ProgrammableLogicDevice, PLD), field programmable gate array (Field-ProgrammableGateArray,
FPGA), general processor, controller, microcontroller, microprocessor, other the electronics lists for performing herein described function
In unit or its combination.
For software realize, can pass through perform the embodiment of the present invention described in function module (such as process, function etc.) come
Realize the technology described in the embodiment of the present invention.During software code is storable in memory and by computing device.Memory can
To realize within a processor or outside the processor.
Alternatively, processor 701 is additionally operable to:Identification is carried out to the user, to judge whether the user belongs to
The member of default access list.
Alternatively, processor 701 is additionally operable to:Obtain the identity identification information of the user input;Judge the identity of input
Whether identification information is consistent with default identity identification information;If the identity identification information and default identity identification information of input
Unanimously, then judge that the user belongs to the member of default access list.
Alternatively, the identity identification information is finger print information or encrypted message or iris information.
Alternatively, processor 701 is additionally operable to:Obtain the list of numbers of the default high importance list;Judge described
With the presence or absence of the number consistent with the corresponding number of described information in list of numbers;If existing in the list of numbers and the letter
The consistent number of corresponding number is ceased, then judges that the corresponding number of described information is present in default high importance list.
Mobile terminal 700 can realize each process of mobile terminal realization in previous embodiment, to avoid repeating, here
Repeat no more.In the embodiment of the present invention, when mobile terminal receives user to the operation of information, corresponding number of the information is obtained
Code;And judge that the corresponding number of the information, with the presence or absence of in default high importance list, if existing, judges whether user belongs to
In the member of default access list;If user belongs to the member of default access list, generated according to the operation of user corresponding
Operational order, realizes user to information editing or deletion;If user is not belonging to the member of default access list, operation is not generated
Instruction.By above-mentioned step, it is ensured that the information important for user will not arbitrarily be edited or be deleted;Also, it is also convenient for using
Family is checked to information, realizes the flexible protection to information, effectively improve experience effect.
Fig. 8 is the structural representation of the fourth embodiment of the mobile terminal of the present invention.Specifically, the mobile terminal in Fig. 8
800 can be mobile phone, panel computer, personal digital assistant (PersonalDigital Assistant, PDA), or vehicle-mounted computer
Deng.
Mobile terminal 800 in Fig. 8 includes that radio frequency (RadioFrequency, RF) circuit 810, memory 820, input are single
Unit 830, display unit 840, processor 860, voicefrequency circuit 870, WiFi (WirelessFidelity) module 880 and power supply
890。
Wherein, input block 830 can be used for the numeral or character information of receiving user's input, and produce and mobile terminal
The signal input that 800 user is arranged and function control is relevant.Specifically, in the embodiment of the present invention, the input block 830 can
With including contact panel 8301.Contact panel 8301, also referred to as touch-screen, can collect user thereon or neighbouring touch operation
(such as user is using the operation of any suitable object or annex on contact panel 8301 such as finger, stylus), and according to pre-
The formula for first setting drives corresponding attachment means.Optionally, contact panel 8301 may include touch detecting apparatus and touch control
Two parts of device processed.Wherein, the touch orientation of touch detecting apparatus detection user, and the signal that touch operation brings is detected, will
Signal sends touch controller to;Touch controller receives touch information from touch detecting apparatus, and is converted into contact
Coordinate, then give the processor 860, and the order sent of receiving processor 860 can be performed.Furthermore, it is possible to using electricity
The polytypes such as resistive, condenser type, infrared ray and surface acoustic wave realize contact panel 8301.It is except contact panel 8301, defeated
Enter unit 830 can also include other input equipments 8302, other input equipments 8302 can include but is not limited to physical keyboard,
One or more in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Wherein, display unit 840 can be used for display by the information of user input or be supplied to information and the movement of user
The various menu interfaces of terminal 800.Display unit 840 may include display floater 8401, optionally, can adopt LCD or organic
The forms such as light emitting diode (OrganicLight-EmittingDiode, OLED) are configuring display floater 8401.
It should be noted that contact panel 8301 can cover display floater 8401, touch display screen is formed, when the touch display screen
Detect thereon or after neighbouring touch operation, processor 860 is sent to determine the type of touch event, with preprocessor
860 provide corresponding visual output in touch display screen according to the type of touch event.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area
And the arrangement mode of the conventional control viewing area is not limited, can be arranged above and below, left-right situs etc. can be distinguished two and show
Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with
The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area
It can also be the empty interface not comprising any content.The conventional control viewing area be used for show the higher control of utilization rate, for example,
Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein processor 860 is the control centre of mobile terminal 800, using various interfaces and connection whole mobile phone
Various pieces, by running or performing the software program and/or module being stored in first memory 8201, and call storage
Data in second memory 8202, perform the various functions and processing data of mobile terminal 800, so as to mobile terminal
800 carry out integral monitoring.Optionally, processor 860 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 8201 in software program and/or module and/
Or the data in the second memory 8202, processor 860 be used for operation of the receive user to described information, wherein, the behaviour
Work includes editor or deletion action;Obtain the corresponding number of described information;Judge the corresponding number of described information with the presence or absence of in
Default high importance list;If the corresponding number of described information is present in default high importance list, the use is judged
Whether family belongs to the member of default access list;If the user belongs to the member of default access list, according to the behaviour of user
Make to generate corresponding operational order;If the user is not belonging to the member of default access list, operational order is not generated.
Alternatively, processor 860 is additionally operable to:Identification is carried out to the user, to judge whether the user belongs to
The member of default access list.
Alternatively, processor 860 is additionally operable to:Obtain the identity identification information of the user input;Judge the identity of input
Whether identification information is consistent with default identity identification information;If the identity identification information and default identity identification information of input
Unanimously, then judge that the user belongs to the member of default access list.
Alternatively, the identity identification information is finger print information or encrypted message or iris information.
Alternatively, processor 860 is additionally operable to:Obtain the list of numbers of the default high importance list;Judge described
With the presence or absence of the number consistent with the corresponding number of described information in list of numbers;If existing in the list of numbers and the letter
The consistent number of corresponding number is ceased, then judges that the corresponding number of described information is present in default high importance list.
It can be seen that, in the embodiment of the present invention, when mobile terminal receives user to the operation of information, obtain information correspondence
Number;And judge that the corresponding number of the information, with the presence or absence of in default high importance list, if existing, judges that user is
The no member for belonging to default access list;If user belongs to the member of default access list, it is right to be generated according to the operation of user
The operational order answered, realizes user to information editing or deletion;If user is not belonging to the member of default access list, do not generate
Operational order.By above-mentioned step, it is ensured that the information important for user will not arbitrarily be edited or be deleted;Also, also just
Information is checked in user, realize the flexible protection to information, effectively improve experience effect.
Those of ordinary skill in the art it is to be appreciated that with reference to disclosed in the embodiment of the present invention embodiment description it is each
The unit and algorithm steps of example, being capable of being implemented in combination in electronic hardware or computer software and electronic hardware.These
Function actually with hardware or software mode performing, depending on the application-specific and design constraint of technical scheme.Specialty
Technical staff can use different methods to realize described function to each specific application, but this realization should not
Think beyond the scope of this invention.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can pass through other
Mode is realized.For example, device embodiment described above is only schematic, and for example, the division of the unit is only
A kind of division of logic function, can have when actually realizing other dividing mode, such as multiple units or component can with reference to or
Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual
Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit
Connect, can be electrical, mechanical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit
The part for showing can be or may not be physical location, you can local to be located at one, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function is realized using in the form of SFU software functional unit and as independent production marketing or when using, can be with
It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words
The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be individual
People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the invention.
And aforesaid storage medium includes:USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes
Medium.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained
Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.
Claims (10)
1. a kind of guard method of information, it is characterised in that include:
Operation of the receive user to described information, wherein, the operation includes editor or deletion action;
Obtain the corresponding number of described information;
Judge the corresponding number of described information with the presence or absence of in default high importance list;
If the corresponding number of described information is present in default high importance list, judge whether the user belongs to default power
The member of limit list;
If the user belongs to the member of default access list, corresponding operational order is generated according to the operation of user;
If the user is not belonging to the member of default access list, operational order is not generated.
2. the guard method of information according to claim 1, it is characterised in that described to judge whether the user belongs to pre-
If the step of member of authority list, specially:
Identification is carried out to the user, to judge whether the user belongs to the member of default access list.
3. the guard method of information according to claim 2, it is characterised in that described that identity knowledge is carried out to the user
Not, so that the step of whether user belongs to the member of default access list judged, including:
Obtain the identity identification information of the user input;
Judge whether the identity identification information being input into is consistent with default identity identification information;
If the identity identification information of input is consistent with default identity identification information, judge that the user belongs to default access name
Single member.
4. the guard method of information according to claim 3, it is characterised in that the identity identification information is finger print information
Or encrypted message or iris information.
5. the guard method of information according to claim 1, it is characterised in that the corresponding number of the judgement described information
With the presence or absence of in the default high importance list the step of, including:
Obtain the list of numbers of the default high importance list;
Judge in the list of numbers with the presence or absence of the number consistent with the corresponding number of described information;
If there is the number consistent with the corresponding number of described information in the list of numbers, corresponding number of described information is judged
Code is present in default high importance list.
6. a kind of mobile terminal, it is characterised in that include:
Operation module is received, for operation of the receive user to described information, wherein, the operation includes editing or deletes behaviour
Make;
Numbers module is obtained, for obtaining the corresponding number of described information;
First judge module, for judging the corresponding number of described information with the presence or absence of in default high importance list;
Second judge module, if being present in default high importance list for the corresponding number of described information, judges described
Whether user belongs to the member of default access list;
Instruction module is generated, if belonging to the member of default access list for the user, it is right to generate according to the operation of user
The operational order answered;
Instruction module is not generated, if the member of default access list is not belonging to for the user, operational order is not generated.
7. mobile terminal according to claim 1, it is characterised in that
Second judge module, is additionally operable to carry out identification to the user, to judge whether the user belongs to default
The member of authority list.
8. mobile terminal according to claim 7, it is characterised in that second judge module includes:
Information unit is obtained, for obtaining the identity identification information of the user input;
Whether the first judging unit, the identity identification information for judging to be input into are consistent with default identity identification information;
Second judging unit, if the identity identification information for input is consistent with default identity identification information, judges described
User belongs to the member of default access list.
9. mobile terminal according to claim 8, it is characterised in that the identity identification information is finger print information or password
Information or iris information.
10. mobile terminal according to claim 6, it is characterised in that first judge module includes:
List cell is obtained, for obtaining the list of numbers of the default high importance list;
3rd judging unit, for judging in the list of numbers with the presence or absence of consistent with the corresponding number of described information number
Code;
4th judging unit, if for there is the number consistent with the corresponding number of described information in the list of numbers, sentencing
The corresponding number of disconnected described information is present in default high importance list.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610965287.0A CN106529238A (en) | 2016-10-31 | 2016-10-31 | Information protection method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610965287.0A CN106529238A (en) | 2016-10-31 | 2016-10-31 | Information protection method and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106529238A true CN106529238A (en) | 2017-03-22 |
Family
ID=58326602
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610965287.0A Pending CN106529238A (en) | 2016-10-31 | 2016-10-31 | Information protection method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106529238A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101184264A (en) * | 2007-11-27 | 2008-05-21 | 北京网秦天下科技有限公司 | Mobile phone telephone and message anti-disturbance and private communication method and system |
CN102223447A (en) * | 2011-06-22 | 2011-10-19 | 惠州Tcl移动通信有限公司 | Method for hiding short message content and method for viewing short message and hidden short message |
CN102724361A (en) * | 2012-06-13 | 2012-10-10 | 广东步步高电子工业有限公司 | Information processing method |
CN102917098A (en) * | 2012-10-17 | 2013-02-06 | 广东欧珀移动通信有限公司 | Method and device for preventing important linkman from being wrongly deleted |
CN105447357A (en) * | 2015-12-03 | 2016-03-30 | 上海卓易科技股份有限公司 | Application processing method and terminal |
CN105631275A (en) * | 2015-04-15 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Information display method, information display device and terminal |
CN105812533A (en) * | 2016-03-08 | 2016-07-27 | 北京珠穆朗玛移动通信有限公司 | Private incoming call display method and mobile terminal |
-
2016
- 2016-10-31 CN CN201610965287.0A patent/CN106529238A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101184264A (en) * | 2007-11-27 | 2008-05-21 | 北京网秦天下科技有限公司 | Mobile phone telephone and message anti-disturbance and private communication method and system |
CN102223447A (en) * | 2011-06-22 | 2011-10-19 | 惠州Tcl移动通信有限公司 | Method for hiding short message content and method for viewing short message and hidden short message |
CN102724361A (en) * | 2012-06-13 | 2012-10-10 | 广东步步高电子工业有限公司 | Information processing method |
CN102917098A (en) * | 2012-10-17 | 2013-02-06 | 广东欧珀移动通信有限公司 | Method and device for preventing important linkman from being wrongly deleted |
CN105631275A (en) * | 2015-04-15 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Information display method, information display device and terminal |
CN105447357A (en) * | 2015-12-03 | 2016-03-30 | 上海卓易科技股份有限公司 | Application processing method and terminal |
CN105812533A (en) * | 2016-03-08 | 2016-07-27 | 北京珠穆朗玛移动通信有限公司 | Private incoming call display method and mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106126077A (en) | A kind of application program image target display control method and mobile terminal | |
CN106484303A (en) | A kind of method preventing maloperation and electronic equipment | |
CN106445392A (en) | Operating method of status bar icon and mobile terminal | |
CN106843654A (en) | The method and mobile terminal of a kind of terminal multi-job operation | |
CN106844067A (en) | The processing method and mobile terminal of a kind of content | |
CN105843525A (en) | Information displaying method based on mobile terminal and mobile terminal | |
CN105898705A (en) | Method for controlling scanning frequency of wireless local area network and mobile terminal | |
CN106127003A (en) | A kind of fingerprint recognition unlocking method and mobile terminal | |
CN106951335A (en) | A kind of process guard method and mobile terminal | |
CN107450799A (en) | The display methods and mobile terminal of a kind of message | |
CN107632870A (en) | The startup method and terminal of a kind of application | |
CN106325753A (en) | Payment interface display method and mobile terminal | |
CN106250026A (en) | The startup method of the application program of a kind of mobile terminal and mobile terminal | |
CN107391246A (en) | One kind applies startup method, mobile terminal and computer-readable recording medium | |
CN106874046A (en) | The operating method and mobile terminal of a kind of application program | |
CN106203061A (en) | The encryption method of a kind of application program and mobile terminal | |
CN106055232A (en) | Message processing method and mobile terminal | |
CN106095751A (en) | The knowledge mistake processing method of a kind of word input and mobile terminal | |
CN107479822A (en) | A kind of data inputting method and terminal | |
CN106503179A (en) | A kind of loading method of Webpage and mobile terminal | |
CN106557259A (en) | A kind of operational approach and mobile terminal of mobile terminal | |
CN106886409A (en) | A kind of method for information display and mobile terminal | |
CN106484301A (en) | A kind of method of hiden application and terminal | |
CN107508749A (en) | A kind of message method and mobile terminal | |
CN106527802A (en) | Detection method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170322 |