CN106559575A - Information privacy protection method - Google Patents

Information privacy protection method Download PDF

Info

Publication number
CN106559575A
CN106559575A CN201611043250.9A CN201611043250A CN106559575A CN 106559575 A CN106559575 A CN 106559575A CN 201611043250 A CN201611043250 A CN 201611043250A CN 106559575 A CN106559575 A CN 106559575A
Authority
CN
China
Prior art keywords
information
identification
contacts
described information
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611043250.9A
Other languages
Chinese (zh)
Inventor
梁梅芹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201611043250.9A priority Critical patent/CN106559575A/en
Publication of CN106559575A publication Critical patent/CN106559575A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/27453Directories allowing storage of additional subscriber data, e.g. metadata
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72436User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. short messaging services [SMS] or e-mails
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2242/00Special services or facilities
    • H04M2242/10Secret communications

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Library & Information Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention belongs to field of computer technology with regard to a kind of information privacy protection method.The method includes:The identification of contacts of information when receiving information, is obtained, determines whether information is protected information according to identification of contacts;If it is determined that information is protected information, then the corresponding ciphertext content of identification of contacts is determined from default mapping library;Screen of the information in mobile terminal is pointed out;If receiving the reading order for information, the initial text content of information is shown as into ciphertext content;If receiving the encrypted message that user is input on the information input hurdle of information, detection encrypted message whether with preset password match;If detecting encrypted message and preset password match, the initial text content of display information.During the present invention solves the problems, such as mobile terminal, encryption information is easily cracked, and by snugly protecting to information, the decryption channel of information is hidden, reduces the effect of the probability that encrypted content information is cracked.

Description

Information privacy protection method
Technical field
The present invention relates to field of computer technology, more particularly to a kind of information privacy protection method.
Background technology
Mobile terminal has been a requisite part in people's daily life, and people carry out voice by mobile terminal The forms such as call, information transmission carry out transmission of news, exchange.
When people carry out transmission of news by way of sending information, as the mobile terminal of one side of receive information can Can be obtained by the other users of non-owner user, so as to cause the information of owner user to be obtained by other users, especially by one After a little delinquenent elements are obtained so that the leakage of private information of owner user, great psychology, property and individual are brought to owner user People's security threat.
In order to avoid the information leakage of owner user, owner user can carry out numerical ciphers encryption to inbox, so as to So that after inbox receives information, other users are when numerical ciphers are not known by, it is impossible to read the information in inbox.So And, the mode that numerical ciphers encryption is arranged to inbox needs for Password Input window to be shown in mobile terminal, and other users are very The password of the information shredder primary users such as birthday easy according to user, usual password, number, and in Password Input window Carry out test input successfully to read the information in inbox.
The content of the invention
To solve the relevant issues that prior art is present, the invention provides a kind of information privacy protection method.
A kind of one side according to embodiments of the present invention, there is provided information privacy protection method, including:
The identification of contacts of described information when receiving information, is obtained, whether described information is determined according to the identification of contacts For protected information;
If it is determined that described information is protected information, then the corresponding encryption of the identification of contacts is determined from default mapping library Content of text, the correspondence pass of the default mapping library corresponding prestored at least one pair of identification of contacts and ciphertext content System;
Screen of the described information in the mobile terminal is pointed out;
If receiving the reading order for described information, the initial text content of described information is shown as into the encryption text This content;
If receiving the encrypted message that user is input on the information input hurdle of described information, detect the encrypted message whether with Preset password match;
If detecting the encrypted message and the preset password match, the initial text content of described information is shown.
Optionally, methods described, also includes:
If detecting, the encrypted message is mismatched with the preset password, and the encrypted message is sent to described information pair The contact person for answering.
Optionally, it is described to determine whether described information is protected information according to the identification of contacts, including:
Detect the identification of contacts with the presence or absence of in the default mapping library;
If detecting, the identification of contacts is present in the default mapping library, it is determined that described information is protected information;
If detecting, the identification of contacts does not exist in the default mapping library, it is determined that the not protected letter of described information Breath.
Optionally, methods described also includes:
Privacy settings instruction of the management user at least one contact person in address list is received, is instructed according to the privacy settings The contact person corresponding identification of contacts is added into into the default mapping library;
For each identification of contacts in the default mapping library, receive the management user and set for the identification of contacts The ciphertext content put, and the default mapping is stored in by the identification of contacts corresponding with the ciphertext content Storehouse.
Optionally, it is described determine whether described information be protected information according to the identification of contacts before, also include:
Whether detection described information carries protection and releases mark;
If detecting, the fileinfo carries the protection and releases mark, orders the reading for described information is received When making, directly the initial text content of described information is shown.
The technical scheme that embodiments of the invention are provided can include following beneficial effect:
The identification of contacts of information by receiving during information, is obtained, determines whether information is protected according to identification of contacts Information;If it is determined that information is protected information, then determine in the corresponding ciphertext of identification of contacts from default mapping library Hold, preset the corresponding relation of mapping library corresponding prestored at least one pair of identification of contacts and ciphertext content;Information is existed The screen of mobile terminal is pointed out;If receiving the reading order for information, the initial text content of information is shown For ciphertext content;If receiving the encrypted message that user is input on the information input hurdle of information, detection encrypted message is No and preset password match;If detecting encrypted message and preset password match, the initial text content of display information so that Mobile terminal snugly can be protected to the information content that other mobile terminals send, and the decryption channel to information is carried out Hide, reduce the probability that encrypted content information is cracked.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary, this can not be limited Invention.
Description of the drawings
During accompanying drawing herein is merged in description and the part of this specification is constituted, show the enforcement for meeting the present invention Example, and be used for together explaining the principle of the present invention in description.
Fig. 1 is a kind of flow chart of the information privacy protection method according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of the information privacy protection method for implementing to exemplify according to another exemplary.
Fig. 3 is a kind of flow chart of the information privacy protection method according to another exemplary embodiment.
Fig. 4 is a kind of block diagram of the device for information privacy protection method according to an exemplary embodiment.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to embodiment party of the present invention Formula is described in further detail.
Fig. 1 is a kind of flow chart of the information privacy protection method according to an exemplary embodiment.As shown in figure 1, the letter Breath method for secret protection is comprised the following steps.
In a step 101, the identification of contacts of information when receiving information, is obtained, information is determined according to identification of contacts Whether it is protected information.
It is " holt " that the information being such as connected to is the identification of contacts that " tonight goes to supermarket to do shopping " obtains.
In a step 102, however, it is determined that it is protected information to go out information, then determine identification of contacts pair from default mapping library The ciphertext content answered.
The corresponding relation of default mapping library corresponding prestored at least one pair of identification of contacts and ciphertext content.
Such as, the identification of contacts for prestoring in default mapping library and the corresponding relation of ciphertext content are:" contact person Mark:Holt;Ciphertext content:Have a meal today and do not had "
In step 103, the screen by information in mobile terminal is pointed out.
Mobile terminal can remind user to have information to receive in screen in the form of pop-up.
At step 104, if receiving the reading order for information, the initial text content of information is shown as adding Close content of text.
When protection information is defined as, mobile terminal when the reading order for information is received, according to default mapping In the display interface of information, storehouse shows that identification of contacts is " holt " corresponding ciphertext content " today has had a meal and do not had "
In step 105, if receiving the encrypted message that user is input on the information input hurdle of information, detection encrypted message is No and preset password match.
User can in the information input hurdle of information input encrypted message, by mobile terminal detect the encrypted message whether with Preset password match.
In step 106, if detecting encrypted message and preset password match, the initial text content of display information.
Such as, the encrypted message of user input is " 112233 ", and preset password is also " 112233 ", then mobile terminal is in letter Previous ciphertext content is replaced with the display interface of breath the initial text content " tonight goes to supermarket to do shopping " of information.
In sum, a kind of information privacy protection method that the present invention is provided, by receiving during information, obtains information According to identification of contacts, identification of contacts, determines whether information is protected information;If it is determined that information is protected information, then The corresponding ciphertext content of identification of contacts is determined from default mapping library, default mapping library correspondence has prestored, and at least one pair of joins It is the corresponding relation of people's mark and ciphertext content;Screen of the information in mobile terminal is pointed out;If receiving pin Reading order to information, then be shown as ciphertext content by the initial text content of information;If receiving user in information The input of information input hurdle encrypted message, then detect encrypted message whether with preset password match;If detecting encrypted message With preset password match, the then initial text content of display information so that mobile terminal can snugly to other mobile terminals The information content of transmission is protected, and the decryption channel to information is hidden, and reduces encrypted content information and is cracked Probability.
Fig. 2 is a kind of flow chart of the information privacy protection method for implementing to exemplify according to another exemplary.As shown in Fig. 2 should Information privacy protection method is comprised the following steps.
In step 201, privacy settings instruction of the management user at least one contact person in address list is received, according to Contact person corresponding identification of contacts is added into default mapping library by privacy settings instruction.
In step 202., for each identification of contacts in default mapping library, receive management user and mark for contact person Know the ciphertext content for arranging, and default mapping library is stored in by identification of contacts corresponding with ciphertext content.
In step 203, the identification of contacts of information when receiving information, is obtained, detection identification of contacts whether there is In default mapping library.
The corresponding relation of default mapping library corresponding prestored at least one pair of identification of contacts and ciphertext content.
In step 204, if detecting, identification of contacts is present in default mapping library, it is determined that information is protected letter Breath.
In step 205, if detecting, identification of contacts does not exist in default mapping library, it is determined that information is not protected Information.
In step 206, however, it is determined that it is protected information to go out information, then determine identification of contacts pair from default mapping library The ciphertext content answered.
In step 207, the screen by information in mobile terminal is pointed out.
In a step 208, if receiving the reading order for information, the initial text content of information is shown as adding Close content of text.
In step 209, if receiving the encrypted message that user is input on the information input hurdle of information, detect message in cipher Breath whether with preset password match.
In step 210, if detecting encrypted message and preset password match, the initial text content of display information.
In step 211, if detecting, encrypted message is mismatched with preset password, and encrypted message is sent to information pair The contact person for answering.
In sum, a kind of information privacy protection method that the present invention is provided, by receiving during information, obtains information According to identification of contacts, identification of contacts, determines whether information is protected information;If it is determined that information is protected information, then The corresponding ciphertext content of identification of contacts is determined from default mapping library, default mapping library correspondence has prestored, and at least one pair of joins It is the corresponding relation of people's mark and ciphertext content;Screen of the information in mobile terminal is pointed out;If receiving pin Reading order to information, then be shown as ciphertext content by the initial text content of information;If receiving user in information The input of information input hurdle encrypted message, then detect encrypted message whether with preset password match;If detecting encrypted message With preset password match, the then initial text content of display information so that mobile terminal can snugly to other mobile terminals The information content of transmission is protected, and the decryption channel to information is hidden, and reduces encrypted content information and is cracked Probability.
In actual life, Jing often also occurs that the mobile terminal of user does not carry situation at one's side, works as other users When having information extremely important and that not there is privacy to be badly in need of informing user, if the identification of contacts of other users is set by user The object for being maintained secrecy is needed in being set to default mapping library, then other users cannot know the information when the mobile terminal is held True content, cannot more understand the emergency of the information, so as to inform the reception of user's information in time, so as to cause to use Miss some important information in family.In order to avoid there is said circumstances, the present invention after step 202, additionally provides step 212 With the method shown in step 213, such as Fig. 3.
In the step 212, when information is received, whether detection information carries protection and releases mark.
In step 213, if detecting, fileinfo carries protection and releases mark, is receiving the reading for information When taking order, directly the initial text content of information is shown.
By step 212 and step 213, the user of other mobile terminals can be by the addition protection in the information for sending Release mark to avoid being protected by privacy content during the mobile terminal of information delivery user, so that the emergency of the information Can obtain for other users with true content, and pass on to user.
Fig. 4 is a kind of block diagram of the device for protection information privacy according to an exemplary embodiment.
With reference to Fig. 4, device 500 can include following one or more assemblies:Process assembly 502, memorizer 504, power supply Component 506, multimedia groupware 508, audio-frequency assembly 510, input/output(I/ O)Interface 512, sensor cluster 514, and Communication component 516.
The integrated operation of 502 usual control device 500 of process assembly, such as with display, call, data communication, phase Machine operates and records the associated operation of operation.Process assembly 502 can refer to perform including one or more processors 518 Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 502 can include one or more modules, just Interaction between process assembly 502 and other assemblies.For example, process assembly 502 can include multi-media module, many to facilitate Interaction between media component 508 and process assembly 502.
Memorizer 504 is configured to store various types of data to support the operation in device 500.These data are shown Example includes the instruction of any application program or method for operating on device 500, and contact data, telephone book data disappear Breath, picture, video etc..Memorizer 504 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as static RAM(SRAM), Electrically Erasable Read Only Memory(EEPROM), it is erasable to compile Journey read only memory(EPROM), programmable read only memory(PROM), read only memory(ROM), magnetic memory, flash Device, disk or CD.
Power supply module 506 provides electric power for the various assemblies of device 500.Power supply module 506 can include power management system System, one or more power supplys, and other generate, manage and distribute the component that electric power is associated with for device 500.
Multimedia groupware 508 is included in the screen of one output interface of offer between described device 500 and user.One In a little embodiments, screen can include liquid crystal display(LCD)And touch panel(TP).If screen includes touch panel, screen Curtain may be implemented as touch screen, to receive the input signal from user.Touch panel includes one or more touch sensings Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action Border, but also detect and the touch or slide related persistent period and pressure.In certain embodiments, many matchmakers Body component 508 includes a front-facing camera and/or post-positioned pick-up head.When device 500 be in operator scheme, such as screening-mode or During video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and Post-positioned pick-up head can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio-frequency assembly 510 is configured to output and/or input audio signal.For example, audio-frequency assembly 510 includes a Mike Wind(MIC), when device 500 is in operator scheme, such as call model, logging mode and speech recognition mode, mike is matched somebody with somebody It is set to reception external audio signal.The audio signal for being received can be further stored in memorizer 504 or via communication set Part 516 sends.In certain embodiments, audio-frequency assembly 510 also includes a speaker, for exports audio signal.
, for interface is provided between process assembly 502 and peripheral interface module, above-mentioned peripheral interface module can for I/ O Interfaces 512 To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 514 includes one or more sensors, and the state for various aspects are provided for device 500 is commented Estimate.For example, sensor cluster 514 can detect the opening/closed mode of device 500, and the relative localization of component is for example described Display and keypad of the component for device 500, sensor cluster 514 can be with 500 1 components of detection means 500 or device Position change, user is presence or absence of with what device 500 was contacted, 500 orientation of device or acceleration/deceleration and device 500 Temperature change.Sensor cluster 514 can include proximity transducer, be configured to detect when not having any physical contact The presence of object nearby.Sensor cluster 514 can also include optical sensor, such as CMOS or ccd image sensor, for into As used in application.In certain embodiments, the sensor cluster 514 can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure transducer or temperature sensor.
Communication component 516 is configured to facilitate the communication of wired or wireless way between device 500 and other equipment.Device 500 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary enforcement In example, communication component 516 receives the broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 516 also includes near-field communication(NFC)Module, to promote junction service.Example Such as, RF identification can be based in NFC module(RFID)Technology, Infrared Data Association(IrDA)Technology, ultra broadband(UWB)Technology, Bluetooth(BT)Technology and other technologies are realizing.
In the exemplary embodiment, device 500 can be by one or more application specific integrated circuits(ASIC), numeral letter Number processor(DSP), digital signal processing appts(DSPD), PLD(PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realize, for performing said method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided Such as include the memorizer 504 of instruction, above-mentioned instruction can be performed to complete said method by the processor 518 of device 500.For example, The non-transitorycomputer readable storage medium can be ROM, random access memory(RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..
It should be noted that mobile terminal can be mobile phone, and computer, digital broadcast terminal, messaging devices, Game console, tablet device, armarium, body-building equipment, personal digital assistant etc..
The foregoing is only presently preferred embodiments of the present invention, not to limit the present invention, all spirit in the present invention and Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.

Claims (5)

1. a kind of information privacy protection method, it is characterised in that include:
The identification of contacts of described information when receiving information, is obtained, whether described information is determined according to the identification of contacts For protected information;
If it is determined that described information is protected information, then the corresponding encryption of the identification of contacts is determined from default mapping library Content of text, the correspondence pass of the default mapping library corresponding prestored at least one pair of identification of contacts and ciphertext content System;
Screen of the described information in the mobile terminal is pointed out;
If receiving the reading order for described information, the initial text content of described information is shown as into the encryption text This content;
If receiving the encrypted message that user is input on the information input hurdle of described information, detect the encrypted message whether with Preset password match;
If detecting the encrypted message and the preset password match, the initial text content of described information is shown.
2. method according to claim 1, it is characterised in that methods described, also includes:
If detecting, the encrypted message is mismatched with the preset password, and the encrypted message is sent to described information pair The contact person for answering.
3. method according to claim 1, it is characterised in that described to determine that described information is according to the identification of contacts It is no for protected information, including:
Detect the identification of contacts with the presence or absence of in the default mapping library;
If detecting, the identification of contacts is present in the default mapping library, it is determined that described information is protected information;
If detecting, the identification of contacts does not exist in the default mapping library, it is determined that the not protected letter of described information Breath.
4. method according to claim 1, it is characterised in that methods described also includes:
Privacy settings instruction of the management user at least one contact person in address list is received, is instructed according to the privacy settings The contact person corresponding identification of contacts is added into into the default mapping library;
For each identification of contacts in the default mapping library, receive the management user and set for the identification of contacts The ciphertext content put, and the default mapping is stored in by the identification of contacts corresponding with the ciphertext content Storehouse.
5. method according to claim 1, it is characterised in that described to determine that described information is according to the identification of contacts It is no for protected information before, also include:
Whether detection described information carries protection and releases mark;
If detecting, the fileinfo carries the protection and releases mark, orders the reading for described information is received When making, directly the initial text content of described information is shown.
CN201611043250.9A 2016-11-24 2016-11-24 Information privacy protection method Pending CN106559575A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611043250.9A CN106559575A (en) 2016-11-24 2016-11-24 Information privacy protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611043250.9A CN106559575A (en) 2016-11-24 2016-11-24 Information privacy protection method

Publications (1)

Publication Number Publication Date
CN106559575A true CN106559575A (en) 2017-04-05

Family

ID=58444932

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611043250.9A Pending CN106559575A (en) 2016-11-24 2016-11-24 Information privacy protection method

Country Status (1)

Country Link
CN (1) CN106559575A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107426410A (en) * 2017-05-26 2017-12-01 上海与德科技有限公司 Private information display methods and device
CN107483738A (en) * 2017-08-24 2017-12-15 北京珠穆朗玛移动通信有限公司 Communication message processing method, mobile terminal and storage medium based on dual system
CN115001799A (en) * 2022-05-30 2022-09-02 上海华客信息科技有限公司 Page interaction method, system, equipment and storage medium based on check-in information

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1643403A1 (en) * 2004-10-01 2006-04-05 Hiromi Fukaya Encryption system using device authentication keys
CN103559451A (en) * 2013-10-21 2014-02-05 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting and displaying privacy information
CN105068974A (en) * 2015-06-30 2015-11-18 联想(北京)有限公司 Information processing method and electronic device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1643403A1 (en) * 2004-10-01 2006-04-05 Hiromi Fukaya Encryption system using device authentication keys
CN103559451A (en) * 2013-10-21 2014-02-05 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting and displaying privacy information
CN105068974A (en) * 2015-06-30 2015-11-18 联想(北京)有限公司 Information processing method and electronic device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107426410A (en) * 2017-05-26 2017-12-01 上海与德科技有限公司 Private information display methods and device
CN107483738A (en) * 2017-08-24 2017-12-15 北京珠穆朗玛移动通信有限公司 Communication message processing method, mobile terminal and storage medium based on dual system
CN107483738B (en) * 2017-08-24 2020-05-22 北京珠穆朗玛移动通信有限公司 Communication information processing method based on dual systems, mobile terminal and storage medium
CN115001799A (en) * 2022-05-30 2022-09-02 上海华客信息科技有限公司 Page interaction method, system, equipment and storage medium based on check-in information

Similar Documents

Publication Publication Date Title
CN103916233B (en) A kind of information ciphering method and device
CN105260673A (en) Short message reading method and apparatus
CN104503688A (en) Intelligent hardware device control achieving method and device
CN105307137A (en) Short message reading method and device
CN106097494A (en) The method for unlocking of smart lock and device
CN105120122A (en) Alarm method and device
CN104159230B (en) Call recognition methods and device
CN104486083A (en) Supervisory video processing method and device
CN105407098A (en) Identity verification method and device
CN106453052A (en) Message interaction method and apparatus thereof
CN105786609A (en) Control method and device of terminal
CN105260247A (en) Method and device for controlling terminal application
CN105187629A (en) Event reminding method and device
TW202101392A (en) Access control method and device, electronic device and storage medium
CN107682538A (en) The display methods and device of application interface
CN104219053A (en) Information displaying method, information concealing method and information concealing device
CN107147815A (en) Based on the call handling method and device called a taxi
CN108111667A (en) A kind of communication information encryption method, device and electronic equipment
CN106559575A (en) Information privacy protection method
CN105681365B (en) Method and apparatus for file transmission
CN106534551A (en) Information display method and apparatus
CN106682524A (en) Data privacy protection method of mobile terminal
CN105681261A (en) Security authentication method and apparatus
CN106372943A (en) Message processing method and device
CN106789070A (en) The decryption method of data, device and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170405

RJ01 Rejection of invention patent application after publication