CN106529238A - Information protection method and mobile terminal - Google Patents

Information protection method and mobile terminal Download PDF

Info

Publication number
CN106529238A
CN106529238A CN201610965287.0A CN201610965287A CN106529238A CN 106529238 A CN106529238 A CN 106529238A CN 201610965287 A CN201610965287 A CN 201610965287A CN 106529238 A CN106529238 A CN 106529238A
Authority
CN
China
Prior art keywords
information
user
list
default
corresponding number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610965287.0A
Other languages
Chinese (zh)
Inventor
吴斌杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610965287.0A priority Critical patent/CN106529238A/en
Publication of CN106529238A publication Critical patent/CN106529238A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses an information protection method. The information protection method comprises the following steps of: receiving operation of a user on information, wherein the operation includes editing or deleting operation; obtaining a number corresponding to the information; judging whether the number corresponding to the information exists in a pre-set high-importance list or not; if the number corresponding to the information exists in the pre-set high-importance list, judging whether the user is a member in a pre-set authority list or not; if the user is the member in the pre-set authority list, generating a corresponding operation instruction according to the operation of the user; and, if the user is not the member in the pre-set authority list, not generating the operation instruction. The embodiment of the invention further provides a mobile terminal. By means of the steps in the method, the fact that important information of the user cannot be optionally edited or deleted can be ensured; furthermore, the user can conveniently check the information; flexible information protection is realized; and the experience effect is effectively improved.

Description

A kind of guard method of information and mobile terminal
Technical field
The present invention relates to electronic device field, more particularly to a kind of guard method and the mobile terminal of information.
Background technology
With the progress and development of society, the species of information is more and more, application scenario is also more and more extensive.For example:Letter Breath species generally comprises note, wechat information, QQ information etc..Information can be used as the information of bank account, conduct Pay the information of precious account, between the sequence information of ONLINE train ticket, the announcement information of momentous conference of company and lover Communication information etc..Above-mentioned cited information is all highly important for a user, and generally user is not Wish that these information are edited or deleted by others.For example, in the middle of society, there is following real event:One female is big Deposit in user's Alipay is produced by student, and the information of Alipay account is deleted, and makes user know nothing.Although The existing mode that can be encrypted for information in prior art, but as the also no privacy of the above-mentioned information content is not to The degree that can be checked to others so as to user, above-mentioned cipher mode can also check that these information are brought while encryption Inconvenience, reduces the experience of user.
The content of the invention
To overcome the problems of the prior art, one aspect of the present invention to provide a kind of guard method of information, including:
Operation of the receive user to described information, wherein, the operation includes editor or deletion action;
Obtain the corresponding number of described information;
Judge the corresponding number of described information with the presence or absence of in default high importance list;
If the corresponding number of described information is present in default high importance list, judge whether the user belongs to pre- If the member of authority list;
If the user belongs to the member of default access list, corresponding operational order is generated according to the operation of user;
If the user is not belonging to the member of default access list, operational order is not generated.
On the other hand, present invention also offers a kind of mobile terminal, including:
Operation module is received, for operation of the receive user to described information, wherein, the operation includes editing or deletes Operation;
Numbers module is obtained, for obtaining the corresponding number of described information;
First judge module, for judging the corresponding number of described information with the presence or absence of in default high importance list;
Second judge module, if being present in default high importance list for the corresponding number of described information, judges Whether the user belongs to the member of default access list;
Instruction module is generated, if belonging to the member of default access list for the user, is given birth to according to the operation of user Into corresponding operational order;
Instruction module is not generated, if the member of default access list is not belonging to for the user, operation is not generated and is referred to Order.
In the embodiment of the present invention, when mobile terminal receives user to the operation of information, corresponding number of the information is obtained Code;And judge that the corresponding number of the information, with the presence or absence of in default high importance list, if existing, judges whether user belongs to In the member of default access list;If user belongs to the member of default access list, generated according to the operation of user corresponding Operational order, realizes user to information editing or deletion;If user is not belonging to the member of default access list, operation is not generated Instruction.By above-mentioned step, it is ensured that the information important for user will not arbitrarily be edited or be deleted;Also, it is also convenient for using Family is checked to information, realizes the flexible protection to information, effectively improve experience effect.
Description of the drawings
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to making needed for embodiment description Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those of ordinary skill in the art, on the premise of not paying creative work, can be obtaining other according to these accompanying drawings Accompanying drawing.
Fig. 1 is the schematic flow sheet of the first embodiment of the guard method of the information of the present invention;
Fig. 2 is the schematic flow sheet of the second embodiment of the guard method of the information of the present invention;
Schematic flow sheets of the Fig. 3 for step 23;
Schematic flow sheets of the Fig. 4 for step 24;
Fig. 5 is the structural representation of the first embodiment of the mobile terminal of the present invention;
Fig. 6 is the structural representation of the second embodiment of the mobile terminal of the present invention;
Fig. 7 is the structural representation of the 3rd embodiment of the mobile terminal of the present invention;
Fig. 8 is the structural representation of the fourth embodiment of the mobile terminal of the present invention.
Specific embodiment
In order that technical problem solved by the invention, technical scheme and beneficial effect become more apparent, below in conjunction with Drawings and Examples, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only used To explain the present invention, it is not intended to limit the present invention.
Fig. 1, is the schematic flow sheet of the first embodiment of the guard method of the information of the present invention, and the method includes:
Step S11, operation of the receive user to described information, wherein, the operation includes editor or deletion action.
In this step, information can be short message, wechat information, QQ information etc..
Step S12, obtains the corresponding number of described information.
In this step, correspondingly, number can be telephone number, wechat number, QQ numbers etc..
Step S13, judges the corresponding number of described information with the presence or absence of in default high importance list.
In this step, by judging that the corresponding number of information, with the presence or absence of in default high importance list, is somebody's turn to do to determine Whether information belongs to needs information to be protected.I.e. the corresponding number of information is present in the middle of default high importance list, then really The fixed information belongs to needs information to be protected;Otherwise, it is determined that the information is not belonging to need information to be protected.The high importance name List can be user preset in the middle of mobile terminal.
Step S14, if the corresponding number of described information is present in default high importance list, judges that the user is The no member for belonging to default access list.
In this step, however, it is determined that the corresponding number of information is present in the middle of default high importance list, and the information belongs to Information to be protected is needed, then determines whether whether user belongs to the member of default access list.Authority list can be understood as The list of edlin or deletion can be entered to the information that is protected.Wherein, the authority list can also be user preset in shifting In the middle of dynamic terminal.
Step S15, if the user belongs to the member of default access list, generates corresponding behaviour according to the operation of user Instruct.
In this step, if user belongs to the member of default access list, mobile terminal editor or deletion then according to user The corresponding operational order of operation production, realizes editor or deletion of the user to protected information.
Step S16, if the user is not belonging to the member of default access list, does not generate operational order.
In this step, if user is not belonging to the member of default access list, the editor or deletion action for the user moves Dynamic terminal does not generate operational order, it is ensured that the user can not enter edlin or deletion to shielded information, and that realizes information has Effect protection.
In the embodiment of the present invention, when mobile terminal receives user to the operation of information, corresponding number of the information is obtained Code;And judge that the corresponding number of the information, with the presence or absence of in default high importance list, if existing, judges whether user belongs to In the member of default access list;If user belongs to the member of default access list, generated according to the operation of user corresponding Operational order, realizes user to information editing or deletion;If user is not belonging to the member of default access list, operation is not generated Instruction.By above-mentioned step, it is ensured that the information important for user will not arbitrarily be edited or be deleted;Also, it is also convenient for using Family is checked to information, realizes the flexible protection to information, effectively improve experience effect.
Fig. 2, is the schematic flow sheet of the second embodiment of the guard method of the information of the present invention, and the method includes:
Step S21, operation of the receive user to described information, wherein, the operation includes editor or deletion action.
In this step, information can be short message, wechat information, QQ information etc..
Step S22, obtains the corresponding number of described information.
In this step, correspondingly, number can be telephone number, wechat number, QQ numbers etc..
Step S23, judges the corresponding number of described information with the presence or absence of in default high importance list.
In this step, by judging that the corresponding number of information, with the presence or absence of in default high importance list, is somebody's turn to do to determine Whether information belongs to needs information to be protected.I.e. the corresponding number of information is present in the middle of default high importance list, then really The fixed information belongs to needs information to be protected;Otherwise, it is determined that the information is not belonging to need information to be protected.The high importance name List can be user preset in the middle of mobile terminal.
Further, with reference to Fig. 3, this step includes:
Step S231, obtains the list of numbers of the default high importance list.
Step S232, judges in the list of numbers with the presence or absence of the number consistent with the corresponding number of described information.
Step S233, if there is the number consistent with the corresponding number of described information in the list of numbers, judges institute State the corresponding number of information and be present in default high importance list.
In this step, if there is the number consistent with the corresponding number of information in list of numbers, it is determined that information is corresponding Number is present in the middle of default high importance list, and the information belongs to shielded information.If conversely, not depositing in list of numbers In the number consistent with the corresponding number of information, it is determined that the corresponding number of information is not present in default high importance list and works as In, the information is not belonging to shielded information.
With reference to step S231, step S232 and step S233, you can determine that user needs to edit or the information of deletion is It is no to belong to shielded information, it is simple, convenient, beneficial to the protection of the guard method to information of the present invention.
Step S24, if the corresponding number of described information is present in default high importance list, judges that the user is The no member for belonging to default access list.
In this step, however, it is determined that the corresponding number of information is present in the middle of default high importance list, and the information belongs to Information to be protected is needed, then determines whether whether user belongs to the member of default access list.Authority list can be understood as The list of edlin or deletion can be entered to the information that is protected.Wherein, the authority list can also be user preset in shifting In the middle of dynamic terminal.
In this step, the step of whether user belongs to the member of default access list judged, specially:To the use Family carries out identification, to judge whether the user belongs to the member of default access list.
Further, with reference to Fig. 4, the step includes:
Step S241, obtains the identity identification information of the user input.
In this step, by the identity identification information for obtaining user input, to realize that mobile terminal enters to the identity of user Row identification, to determine whether the user belongs to the member of default access list.Wherein, identity identification information is finger print information or close Code information or iris information.
Step S242, judges whether the identity identification information being input into is consistent with default identity identification information.
In this step, for example, judge whether the finger print information being input into is consistent with default finger print information;Or, judge defeated Whether the encrypted message for entering is consistent with default encrypted message;Or, judge that the iris information of input is believed with default iris Whether breath is consistent.Wherein, default identity information can be user preset in the middle of mobile terminal.
Step S243, if the identity identification information of input is consistent with default identity identification information, judges the user Belong to the member of default access list.
In this step, if the identity identification information of input is consistent with default identity identification information, it is determined that user belongs to The member of default access list, the user enter the authority of edlin or deletion with the information to being protected.If conversely, input Identity identification information it is inconsistent with default identity identification information, it is determined that user is not belonging to the member of default access list, The user does not enter the authority of edlin or deletion with the information to being protected.
With reference to step S241, step S242 and step S243, the identity of user can be efficiently identified, and be grasped Make simple, convenient, beneficial to the protection of guard method of the invention to information.
Step S25, if the user belongs to the member of default access list, generates corresponding behaviour according to the operation of user Instruct.
In this step, if user belongs to the member of default access list, mobile terminal editor or deletion then according to user The corresponding operational order of operation production, realizes editor or deletion of the user to protected information.
Step S26, if the user is not belonging to the member of default access list, does not generate operational order.
In this step, if user is not belonging to the member of default access list, the editor or deletion action for the user moves Dynamic terminal does not generate operational order, it is ensured that the user can not enter edlin or deletion to shielded information, and that realizes information has Effect protection.
In the embodiment of the present invention, when mobile terminal receives user to the operation of information, corresponding number of the information is obtained Code;And judge that the corresponding number of the information, with the presence or absence of in default high importance list, if existing, judges whether user belongs to In the member of default access list;If user belongs to the member of default access list, generated according to the operation of user corresponding Operational order, realizes user to information editing or deletion;If user is not belonging to the member of default access list, operation is not generated Instruction.By above-mentioned step, it is ensured that the information important for user will not arbitrarily be edited or be deleted;Also, it is also convenient for using Family is checked to information, realizes the flexible protection to information, effectively improve experience effect.
Above the embodiment of the guard method of the information of the present invention is made to be discussed in detail.Said method is will correspond to below Device (i.e. mobile terminal) be further elaborated.Wherein, mobile terminal can be mobile phone, panel computer, MP3, MP4, notes This computer etc..
Fig. 5, is the structural representation of the first embodiment of the mobile terminal of the present invention, and the mobile terminal 10 includes receiving to be grasped Make module 110, obtain numbers module 120, the first judge module 130, the second judge module 140, generate instruction module 150 and Instruction module 160 is not generated.
Operation module 110 is received, is connected with numbers module 120 is obtained, for operation of the receive user to described information, its In, the operation includes editor or deletion action.
Numbers module 120 is obtained, is connected with the first judge module 130, for obtaining the corresponding number of described information.
First judge module 130, is connected with the second judge module 140, for whether judging the corresponding number of described information It is present in default high importance list.
Second judge module 140, is connected with instruction module 150 is generated, if being present in for the corresponding number of described information Default high importance list, then judge whether the user belongs to the member of default access list.
Instruction module 150 is generated, is connected with instruction module 160 is not generated, if belonging to default access name for the user Single member, then generate corresponding operational order according to the operation of user.
Instruction module 160 is not generated, if the member of default access list is not belonging to for the user, operation is not generated Instruction.
In the embodiment of the present invention, when mobile terminal receives user to the operation of information, corresponding number of the information is obtained Code;And judge that the corresponding number of the information, with the presence or absence of in default high importance list, if existing, judges whether user belongs to In the member of default access list;If user belongs to the member of default access list, generated according to the operation of user corresponding Operational order, realizes user to information editing or deletion;If user is not belonging to the member of default access list, operation is not generated Instruction.By above-mentioned step, it is ensured that the information important for user will not arbitrarily be edited or be deleted;Also, it is also convenient for using Family is checked to information, realizes the flexible protection to information, effectively improve experience effect.
Fig. 6, is the structural representation of the second embodiment of the mobile terminal of the present invention, and the mobile terminal 20 includes receiving to be grasped Make module 210, obtain numbers module 220, the first judge module 230, the second judge module 240, generate instruction module 250 and Instruction module 260 is not generated.
Operation module 210 is received, is connected with numbers module 220 is obtained, for operation of the receive user to described information, its In, the operation includes editor or deletion action.
Numbers module 220 is obtained, is connected with the first judge module 230, for obtaining the corresponding number of described information.
First judge module 230, is connected with the second judge module 240, for whether judging the corresponding number of described information It is present in default high importance list.
Second judge module 240, is connected with instruction module 250 is generated, if being present in for the corresponding number of described information Default high importance list, then judge whether the user belongs to the member of default access list;It is additionally operable to the user Identification is carried out, to judge whether the user belongs to the member of default access list.
Instruction module 250 is generated, is connected with instruction module 260 is not generated, if belonging to default access name for the user Single member, then generate corresponding operational order according to the operation of user.
Instruction module 260 is not generated, if the member of default access list is not belonging to for the user, operation is not generated Instruction.
Wherein, the first judge module 230 includes:
List cell 231 is obtained, is connected with the 3rd judging unit 232, for obtaining the default high importance list List of numbers.
3rd judging unit 232, is connected with the 4th judging unit 233, for judging to whether there is in the list of numbers The number consistent with the corresponding number of described information.
4th judging unit 233, if for there is consistent with the corresponding number of described information number in the list of numbers Code, then judge that the corresponding number of described information is present in default high importance list.
Wherein, the second judge module 240 includes:
Information unit 241 is obtained, is connected with the first judging unit 242, for obtaining the identification of the user input Information.Specifically, identity identification information is finger print information or encrypted message or iris information.
First judging unit 242, is connected with the second judging unit 243, for judge input identity identification information with it is pre- If identity identification information it is whether consistent.
Second judging unit 243, if the identity identification information for input is consistent with default identity identification information, sentences The user of breaking belongs to the member of default access list.
In the embodiment of the present invention, when mobile terminal receives user to the operation of information, corresponding number of the information is obtained Code;And judge that the corresponding number of the information, with the presence or absence of in default high importance list, if existing, judges whether user belongs to In the member of default access list;If user belongs to the member of default access list, generated according to the operation of user corresponding Operational order, realizes user to information editing or deletion;If user is not belonging to the member of default access list, operation is not generated Instruction.By above-mentioned step, it is ensured that the information important for user will not arbitrarily be edited or be deleted;Also, it is also convenient for using Family is checked to information, realizes the flexible protection to information, effectively improve experience effect.
Fig. 7 is the structural representation of the 3rd embodiment of the mobile terminal of the present invention.Mobile terminal 700 shown in Fig. 7 is wrapped Include:At least one processor 701, memory 702, at least one network interface 704 and user interface 703.In mobile terminal 700 Each component be coupled by bus system 705.It is understood that bus system 705 is used to realize between these components Connection communication.Bus system 705 except including in addition to data/address bus, also including power bus, controlling bus and status signal bus in addition. But for the sake of for clear explanation, various buses are all designated as into bus system 705 in the figure 7.
Wherein, user interface 703 can include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch-screen etc..
It is appreciated that the memory 702 in the embodiment of the present invention can be volatile memory or nonvolatile memory, Or may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage (Read- OnlyMemory, ROM), programmable read only memory (ProgrammableROM, PROM), Erasable Programmable Read Only Memory EPROM (ErasablePROM, EPROM), Electrically Erasable Read Only Memory (ElectricallyEPROM, EEPROM) dodge Deposit.Volatile memory can be random access memory (RandomAccessMemory, RAM), and which is used as outside slow at a high speed Deposit.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (StaticRAM, SRAM), dynamic random access memory (DynamicRAM, DRAM), Synchronous Dynamic Random Access Memory (SynchronousDRAM, SDRAM), double data speed synchronous dynamic RAM (DoubleDataRate SDRAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (SynchlinkDRAM, SLDRAM) and direct rambus random access memory (DirectRambusRAM, DRRAM).The memory 702 of the system and method for embodiment of the present invention description is intended to include but does not limit In these memories with any other suitable type.
In some embodiments, memory 702 stores following element, can perform module or data structure, or Person their subset, or their superset:Operating system 7021 and application program 7022.
Wherein, operating system 7021, comprising various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and process hardware based task.Application program 7022, comprising various application programs, such as media Player (MediaPlayer), browser (Browser) etc., for realizing various applied business.Realize embodiment of the present invention side The program of method is may be embodied in application program 7022.
In embodiments of the present invention, by call memory 702 storage program or instruction, specifically, can be application The program stored in program 7022 or instruction, processor 701 are used for operation of the receive user to described information, wherein, the behaviour Work includes editor or deletion action;Obtain the corresponding number of described information;Judge the corresponding number of described information with the presence or absence of in Default high importance list;If the corresponding number of described information is present in default high importance list, the use is judged Whether family belongs to the member of default access list;If the user belongs to the member of default access list, according to the behaviour of user Make to generate corresponding operational order;If the user is not belonging to the member of default access list, operational order is not generated.
The method that the embodiments of the present invention are disclosed is can apply in processor 701, or is realized by processor 701. A kind of possibly IC chip of processor 701, the disposal ability with signal.During realization, said method it is each Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 701 or software form.Above-mentioned process Device 701 can be general processor, digital signal processor (DigitalSignalProcessor, DSP), special IC (ApplicationSpecific IntegratedCircuit, ASIC), ready-made programmable gate array (FieldProgrammableGateArray, FPGA) or other PLDs, discrete gate or transistor logic Device, discrete hardware components.Can realize or perform disclosed each method in the embodiment of the present invention, step and box Figure.General processor can be microprocessor or the processor can also be any conventional processor etc..With reference to the present invention The step of method disclosed in embodiment, can be embodied directly in hardware decoding processor and perform and complete, or use decoding processor In hardware and software module combination execution complete.Software module may be located at random access memory, and flash memory, read-only storage can In the ripe storage medium in this area such as program read-only memory or electrically erasable programmable memory, register.The storage Medium is located at memory 702, and processor 701 reads the information in memory 702, completes the step of said method with reference to its hardware Suddenly.
It is understood that the embodiment of the present invention description these embodiments can with hardware, software, firmware, middleware, Microcode or its combination are realizing.For hardware is realized, processing unit can be realized in one or more special ICs (ApplicationSpecificIntegratedCircuits, ASIC), digital signal processor (DigitalSignalProcessing, DSP), digital signal processing appts (DSPDevice, DSPD), programmable logic device (ProgrammableLogicDevice, PLD), field programmable gate array (Field-ProgrammableGateArray, FPGA), general processor, controller, microcontroller, microprocessor, other the electronics lists for performing herein described function In unit or its combination.
For software realize, can pass through perform the embodiment of the present invention described in function module (such as process, function etc.) come Realize the technology described in the embodiment of the present invention.During software code is storable in memory and by computing device.Memory can To realize within a processor or outside the processor.
Alternatively, processor 701 is additionally operable to:Identification is carried out to the user, to judge whether the user belongs to The member of default access list.
Alternatively, processor 701 is additionally operable to:Obtain the identity identification information of the user input;Judge the identity of input Whether identification information is consistent with default identity identification information;If the identity identification information and default identity identification information of input Unanimously, then judge that the user belongs to the member of default access list.
Alternatively, the identity identification information is finger print information or encrypted message or iris information.
Alternatively, processor 701 is additionally operable to:Obtain the list of numbers of the default high importance list;Judge described With the presence or absence of the number consistent with the corresponding number of described information in list of numbers;If existing in the list of numbers and the letter The consistent number of corresponding number is ceased, then judges that the corresponding number of described information is present in default high importance list.
Mobile terminal 700 can realize each process of mobile terminal realization in previous embodiment, to avoid repeating, here Repeat no more.In the embodiment of the present invention, when mobile terminal receives user to the operation of information, corresponding number of the information is obtained Code;And judge that the corresponding number of the information, with the presence or absence of in default high importance list, if existing, judges whether user belongs to In the member of default access list;If user belongs to the member of default access list, generated according to the operation of user corresponding Operational order, realizes user to information editing or deletion;If user is not belonging to the member of default access list, operation is not generated Instruction.By above-mentioned step, it is ensured that the information important for user will not arbitrarily be edited or be deleted;Also, it is also convenient for using Family is checked to information, realizes the flexible protection to information, effectively improve experience effect.
Fig. 8 is the structural representation of the fourth embodiment of the mobile terminal of the present invention.Specifically, the mobile terminal in Fig. 8 800 can be mobile phone, panel computer, personal digital assistant (PersonalDigital Assistant, PDA), or vehicle-mounted computer Deng.
Mobile terminal 800 in Fig. 8 includes that radio frequency (RadioFrequency, RF) circuit 810, memory 820, input are single Unit 830, display unit 840, processor 860, voicefrequency circuit 870, WiFi (WirelessFidelity) module 880 and power supply 890。
Wherein, input block 830 can be used for the numeral or character information of receiving user's input, and produce and mobile terminal The signal input that 800 user is arranged and function control is relevant.Specifically, in the embodiment of the present invention, the input block 830 can With including contact panel 8301.Contact panel 8301, also referred to as touch-screen, can collect user thereon or neighbouring touch operation (such as user is using the operation of any suitable object or annex on contact panel 8301 such as finger, stylus), and according to pre- The formula for first setting drives corresponding attachment means.Optionally, contact panel 8301 may include touch detecting apparatus and touch control Two parts of device processed.Wherein, the touch orientation of touch detecting apparatus detection user, and the signal that touch operation brings is detected, will Signal sends touch controller to;Touch controller receives touch information from touch detecting apparatus, and is converted into contact Coordinate, then give the processor 860, and the order sent of receiving processor 860 can be performed.Furthermore, it is possible to using electricity The polytypes such as resistive, condenser type, infrared ray and surface acoustic wave realize contact panel 8301.It is except contact panel 8301, defeated Enter unit 830 can also include other input equipments 8302, other input equipments 8302 can include but is not limited to physical keyboard, One or more in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Wherein, display unit 840 can be used for display by the information of user input or be supplied to information and the movement of user The various menu interfaces of terminal 800.Display unit 840 may include display floater 8401, optionally, can adopt LCD or organic The forms such as light emitting diode (OrganicLight-EmittingDiode, OLED) are configuring display floater 8401.
It should be noted that contact panel 8301 can cover display floater 8401, touch display screen is formed, when the touch display screen Detect thereon or after neighbouring touch operation, processor 860 is sent to determine the type of touch event, with preprocessor 860 provide corresponding visual output in touch display screen according to the type of touch event.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area And the arrangement mode of the conventional control viewing area is not limited, can be arranged above and below, left-right situs etc. can be distinguished two and show Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area It can also be the empty interface not comprising any content.The conventional control viewing area be used for show the higher control of utilization rate, for example, Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein processor 860 is the control centre of mobile terminal 800, using various interfaces and connection whole mobile phone Various pieces, by running or performing the software program and/or module being stored in first memory 8201, and call storage Data in second memory 8202, perform the various functions and processing data of mobile terminal 800, so as to mobile terminal 800 carry out integral monitoring.Optionally, processor 860 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 8201 in software program and/or module and/ Or the data in the second memory 8202, processor 860 be used for operation of the receive user to described information, wherein, the behaviour Work includes editor or deletion action;Obtain the corresponding number of described information;Judge the corresponding number of described information with the presence or absence of in Default high importance list;If the corresponding number of described information is present in default high importance list, the use is judged Whether family belongs to the member of default access list;If the user belongs to the member of default access list, according to the behaviour of user Make to generate corresponding operational order;If the user is not belonging to the member of default access list, operational order is not generated.
Alternatively, processor 860 is additionally operable to:Identification is carried out to the user, to judge whether the user belongs to The member of default access list.
Alternatively, processor 860 is additionally operable to:Obtain the identity identification information of the user input;Judge the identity of input Whether identification information is consistent with default identity identification information;If the identity identification information and default identity identification information of input Unanimously, then judge that the user belongs to the member of default access list.
Alternatively, the identity identification information is finger print information or encrypted message or iris information.
Alternatively, processor 860 is additionally operable to:Obtain the list of numbers of the default high importance list;Judge described With the presence or absence of the number consistent with the corresponding number of described information in list of numbers;If existing in the list of numbers and the letter The consistent number of corresponding number is ceased, then judges that the corresponding number of described information is present in default high importance list.
It can be seen that, in the embodiment of the present invention, when mobile terminal receives user to the operation of information, obtain information correspondence Number;And judge that the corresponding number of the information, with the presence or absence of in default high importance list, if existing, judges that user is The no member for belonging to default access list;If user belongs to the member of default access list, it is right to be generated according to the operation of user The operational order answered, realizes user to information editing or deletion;If user is not belonging to the member of default access list, do not generate Operational order.By above-mentioned step, it is ensured that the information important for user will not arbitrarily be edited or be deleted;Also, also just Information is checked in user, realize the flexible protection to information, effectively improve experience effect.
Those of ordinary skill in the art it is to be appreciated that with reference to disclosed in the embodiment of the present invention embodiment description it is each The unit and algorithm steps of example, being capable of being implemented in combination in electronic hardware or computer software and electronic hardware.These Function actually with hardware or software mode performing, depending on the application-specific and design constraint of technical scheme.Specialty Technical staff can use different methods to realize described function to each specific application, but this realization should not Think beyond the scope of this invention.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can pass through other Mode is realized.For example, device embodiment described above is only schematic, and for example, the division of the unit is only A kind of division of logic function, can have when actually realizing other dividing mode, such as multiple units or component can with reference to or Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit Connect, can be electrical, mechanical or other forms.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can local to be located at one, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function is realized using in the form of SFU software functional unit and as independent production marketing or when using, can be with It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be individual People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the invention. And aforesaid storage medium includes:USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes Medium.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.

Claims (10)

1. a kind of guard method of information, it is characterised in that include:
Operation of the receive user to described information, wherein, the operation includes editor or deletion action;
Obtain the corresponding number of described information;
Judge the corresponding number of described information with the presence or absence of in default high importance list;
If the corresponding number of described information is present in default high importance list, judge whether the user belongs to default power The member of limit list;
If the user belongs to the member of default access list, corresponding operational order is generated according to the operation of user;
If the user is not belonging to the member of default access list, operational order is not generated.
2. the guard method of information according to claim 1, it is characterised in that described to judge whether the user belongs to pre- If the step of member of authority list, specially:
Identification is carried out to the user, to judge whether the user belongs to the member of default access list.
3. the guard method of information according to claim 2, it is characterised in that described that identity knowledge is carried out to the user Not, so that the step of whether user belongs to the member of default access list judged, including:
Obtain the identity identification information of the user input;
Judge whether the identity identification information being input into is consistent with default identity identification information;
If the identity identification information of input is consistent with default identity identification information, judge that the user belongs to default access name Single member.
4. the guard method of information according to claim 3, it is characterised in that the identity identification information is finger print information Or encrypted message or iris information.
5. the guard method of information according to claim 1, it is characterised in that the corresponding number of the judgement described information With the presence or absence of in the default high importance list the step of, including:
Obtain the list of numbers of the default high importance list;
Judge in the list of numbers with the presence or absence of the number consistent with the corresponding number of described information;
If there is the number consistent with the corresponding number of described information in the list of numbers, corresponding number of described information is judged Code is present in default high importance list.
6. a kind of mobile terminal, it is characterised in that include:
Operation module is received, for operation of the receive user to described information, wherein, the operation includes editing or deletes behaviour Make;
Numbers module is obtained, for obtaining the corresponding number of described information;
First judge module, for judging the corresponding number of described information with the presence or absence of in default high importance list;
Second judge module, if being present in default high importance list for the corresponding number of described information, judges described Whether user belongs to the member of default access list;
Instruction module is generated, if belonging to the member of default access list for the user, it is right to generate according to the operation of user The operational order answered;
Instruction module is not generated, if the member of default access list is not belonging to for the user, operational order is not generated.
7. mobile terminal according to claim 1, it is characterised in that
Second judge module, is additionally operable to carry out identification to the user, to judge whether the user belongs to default The member of authority list.
8. mobile terminal according to claim 7, it is characterised in that second judge module includes:
Information unit is obtained, for obtaining the identity identification information of the user input;
Whether the first judging unit, the identity identification information for judging to be input into are consistent with default identity identification information;
Second judging unit, if the identity identification information for input is consistent with default identity identification information, judges described User belongs to the member of default access list.
9. mobile terminal according to claim 8, it is characterised in that the identity identification information is finger print information or password Information or iris information.
10. mobile terminal according to claim 6, it is characterised in that first judge module includes:
List cell is obtained, for obtaining the list of numbers of the default high importance list;
3rd judging unit, for judging in the list of numbers with the presence or absence of consistent with the corresponding number of described information number Code;
4th judging unit, if for there is the number consistent with the corresponding number of described information in the list of numbers, sentencing The corresponding number of disconnected described information is present in default high importance list.
CN201610965287.0A 2016-10-31 2016-10-31 Information protection method and mobile terminal Pending CN106529238A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610965287.0A CN106529238A (en) 2016-10-31 2016-10-31 Information protection method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610965287.0A CN106529238A (en) 2016-10-31 2016-10-31 Information protection method and mobile terminal

Publications (1)

Publication Number Publication Date
CN106529238A true CN106529238A (en) 2017-03-22

Family

ID=58326602

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610965287.0A Pending CN106529238A (en) 2016-10-31 2016-10-31 Information protection method and mobile terminal

Country Status (1)

Country Link
CN (1) CN106529238A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system
CN102223447A (en) * 2011-06-22 2011-10-19 惠州Tcl移动通信有限公司 Method for hiding short message content and method for viewing short message and hidden short message
CN102724361A (en) * 2012-06-13 2012-10-10 广东步步高电子工业有限公司 Information processing method
CN102917098A (en) * 2012-10-17 2013-02-06 广东欧珀移动通信有限公司 Method and device for preventing important linkman from being wrongly deleted
CN105447357A (en) * 2015-12-03 2016-03-30 上海卓易科技股份有限公司 Application processing method and terminal
CN105631275A (en) * 2015-04-15 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Information display method, information display device and terminal
CN105812533A (en) * 2016-03-08 2016-07-27 北京珠穆朗玛移动通信有限公司 Private incoming call display method and mobile terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system
CN102223447A (en) * 2011-06-22 2011-10-19 惠州Tcl移动通信有限公司 Method for hiding short message content and method for viewing short message and hidden short message
CN102724361A (en) * 2012-06-13 2012-10-10 广东步步高电子工业有限公司 Information processing method
CN102917098A (en) * 2012-10-17 2013-02-06 广东欧珀移动通信有限公司 Method and device for preventing important linkman from being wrongly deleted
CN105631275A (en) * 2015-04-15 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Information display method, information display device and terminal
CN105447357A (en) * 2015-12-03 2016-03-30 上海卓易科技股份有限公司 Application processing method and terminal
CN105812533A (en) * 2016-03-08 2016-07-27 北京珠穆朗玛移动通信有限公司 Private incoming call display method and mobile terminal

Similar Documents

Publication Publication Date Title
CN106126077A (en) A kind of application program image target display control method and mobile terminal
CN106484303A (en) A kind of method preventing maloperation and electronic equipment
CN106445392A (en) Operating method of status bar icon and mobile terminal
CN106843654A (en) The method and mobile terminal of a kind of terminal multi-job operation
CN106844067A (en) The processing method and mobile terminal of a kind of content
CN105843525A (en) Information displaying method based on mobile terminal and mobile terminal
CN105898705A (en) Method for controlling scanning frequency of wireless local area network and mobile terminal
CN106127003A (en) A kind of fingerprint recognition unlocking method and mobile terminal
CN106951335A (en) A kind of process guard method and mobile terminal
CN107450799A (en) The display methods and mobile terminal of a kind of message
CN107632870A (en) The startup method and terminal of a kind of application
CN106325753A (en) Payment interface display method and mobile terminal
CN106250026A (en) The startup method of the application program of a kind of mobile terminal and mobile terminal
CN107391246A (en) One kind applies startup method, mobile terminal and computer-readable recording medium
CN106874046A (en) The operating method and mobile terminal of a kind of application program
CN106203061A (en) The encryption method of a kind of application program and mobile terminal
CN106055232A (en) Message processing method and mobile terminal
CN106095751A (en) The knowledge mistake processing method of a kind of word input and mobile terminal
CN107479822A (en) A kind of data inputting method and terminal
CN106503179A (en) A kind of loading method of Webpage and mobile terminal
CN106557259A (en) A kind of operational approach and mobile terminal of mobile terminal
CN106886409A (en) A kind of method for information display and mobile terminal
CN106484301A (en) A kind of method of hiden application and terminal
CN107508749A (en) A kind of message method and mobile terminal
CN106527802A (en) Detection method and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170322