CN106559575A - Information privacy protection method - Google Patents
Information privacy protection method Download PDFInfo
- Publication number
- CN106559575A CN106559575A CN201611043250.9A CN201611043250A CN106559575A CN 106559575 A CN106559575 A CN 106559575A CN 201611043250 A CN201611043250 A CN 201611043250A CN 106559575 A CN106559575 A CN 106559575A
- Authority
- CN
- China
- Prior art keywords
- information
- identification
- contacts
- described information
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000013507 mapping Methods 0.000 claims abstract description 36
- 238000001514 detection method Methods 0.000 claims abstract description 8
- 238000005516 engineering process Methods 0.000 abstract description 8
- 238000004891 communication Methods 0.000 description 9
- 230000008569 process Effects 0.000 description 8
- 238000007726 management method Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000000712 assembly Effects 0.000 description 3
- 238000000429 assembly Methods 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 235000012054 meals Nutrition 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000004807 localization Effects 0.000 description 1
- 239000012092 media component Substances 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/27453—Directories allowing storage of additional subscriber data, e.g. metadata
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
- H04M1/72436—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. short messaging services [SMS] or e-mails
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2242/00—Special services or facilities
- H04M2242/10—Secret communications
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Library & Information Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention belongs to field of computer technology with regard to a kind of information privacy protection method.The method includes:The identification of contacts of information when receiving information, is obtained, determines whether information is protected information according to identification of contacts;If it is determined that information is protected information, then the corresponding ciphertext content of identification of contacts is determined from default mapping library;Screen of the information in mobile terminal is pointed out;If receiving the reading order for information, the initial text content of information is shown as into ciphertext content;If receiving the encrypted message that user is input on the information input hurdle of information, detection encrypted message whether with preset password match;If detecting encrypted message and preset password match, the initial text content of display information.During the present invention solves the problems, such as mobile terminal, encryption information is easily cracked, and by snugly protecting to information, the decryption channel of information is hidden, reduces the effect of the probability that encrypted content information is cracked.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of information privacy protection method.
Background technology
Mobile terminal has been a requisite part in people's daily life, and people carry out voice by mobile terminal
The forms such as call, information transmission carry out transmission of news, exchange.
When people carry out transmission of news by way of sending information, as the mobile terminal of one side of receive information can
Can be obtained by the other users of non-owner user, so as to cause the information of owner user to be obtained by other users, especially by one
After a little delinquenent elements are obtained so that the leakage of private information of owner user, great psychology, property and individual are brought to owner user
People's security threat.
In order to avoid the information leakage of owner user, owner user can carry out numerical ciphers encryption to inbox, so as to
So that after inbox receives information, other users are when numerical ciphers are not known by, it is impossible to read the information in inbox.So
And, the mode that numerical ciphers encryption is arranged to inbox needs for Password Input window to be shown in mobile terminal, and other users are very
The password of the information shredder primary users such as birthday easy according to user, usual password, number, and in Password Input window
Carry out test input successfully to read the information in inbox.
The content of the invention
To solve the relevant issues that prior art is present, the invention provides a kind of information privacy protection method.
A kind of one side according to embodiments of the present invention, there is provided information privacy protection method, including:
The identification of contacts of described information when receiving information, is obtained, whether described information is determined according to the identification of contacts
For protected information;
If it is determined that described information is protected information, then the corresponding encryption of the identification of contacts is determined from default mapping library
Content of text, the correspondence pass of the default mapping library corresponding prestored at least one pair of identification of contacts and ciphertext content
System;
Screen of the described information in the mobile terminal is pointed out;
If receiving the reading order for described information, the initial text content of described information is shown as into the encryption text
This content;
If receiving the encrypted message that user is input on the information input hurdle of described information, detect the encrypted message whether with
Preset password match;
If detecting the encrypted message and the preset password match, the initial text content of described information is shown.
Optionally, methods described, also includes:
If detecting, the encrypted message is mismatched with the preset password, and the encrypted message is sent to described information pair
The contact person for answering.
Optionally, it is described to determine whether described information is protected information according to the identification of contacts, including:
Detect the identification of contacts with the presence or absence of in the default mapping library;
If detecting, the identification of contacts is present in the default mapping library, it is determined that described information is protected information;
If detecting, the identification of contacts does not exist in the default mapping library, it is determined that the not protected letter of described information
Breath.
Optionally, methods described also includes:
Privacy settings instruction of the management user at least one contact person in address list is received, is instructed according to the privacy settings
The contact person corresponding identification of contacts is added into into the default mapping library;
For each identification of contacts in the default mapping library, receive the management user and set for the identification of contacts
The ciphertext content put, and the default mapping is stored in by the identification of contacts corresponding with the ciphertext content
Storehouse.
Optionally, it is described determine whether described information be protected information according to the identification of contacts before, also include:
Whether detection described information carries protection and releases mark;
If detecting, the fileinfo carries the protection and releases mark, orders the reading for described information is received
When making, directly the initial text content of described information is shown.
The technical scheme that embodiments of the invention are provided can include following beneficial effect:
The identification of contacts of information by receiving during information, is obtained, determines whether information is protected according to identification of contacts
Information;If it is determined that information is protected information, then determine in the corresponding ciphertext of identification of contacts from default mapping library
Hold, preset the corresponding relation of mapping library corresponding prestored at least one pair of identification of contacts and ciphertext content;Information is existed
The screen of mobile terminal is pointed out;If receiving the reading order for information, the initial text content of information is shown
For ciphertext content;If receiving the encrypted message that user is input on the information input hurdle of information, detection encrypted message is
No and preset password match;If detecting encrypted message and preset password match, the initial text content of display information so that
Mobile terminal snugly can be protected to the information content that other mobile terminals send, and the decryption channel to information is carried out
Hide, reduce the probability that encrypted content information is cracked.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary, this can not be limited
Invention.
Description of the drawings
During accompanying drawing herein is merged in description and the part of this specification is constituted, show the enforcement for meeting the present invention
Example, and be used for together explaining the principle of the present invention in description.
Fig. 1 is a kind of flow chart of the information privacy protection method according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of the information privacy protection method for implementing to exemplify according to another exemplary.
Fig. 3 is a kind of flow chart of the information privacy protection method according to another exemplary embodiment.
Fig. 4 is a kind of block diagram of the device for information privacy protection method according to an exemplary embodiment.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to embodiment party of the present invention
Formula is described in further detail.
Fig. 1 is a kind of flow chart of the information privacy protection method according to an exemplary embodiment.As shown in figure 1, the letter
Breath method for secret protection is comprised the following steps.
In a step 101, the identification of contacts of information when receiving information, is obtained, information is determined according to identification of contacts
Whether it is protected information.
It is " holt " that the information being such as connected to is the identification of contacts that " tonight goes to supermarket to do shopping " obtains.
In a step 102, however, it is determined that it is protected information to go out information, then determine identification of contacts pair from default mapping library
The ciphertext content answered.
The corresponding relation of default mapping library corresponding prestored at least one pair of identification of contacts and ciphertext content.
Such as, the identification of contacts for prestoring in default mapping library and the corresponding relation of ciphertext content are:" contact person
Mark:Holt;Ciphertext content:Have a meal today and do not had "
In step 103, the screen by information in mobile terminal is pointed out.
Mobile terminal can remind user to have information to receive in screen in the form of pop-up.
At step 104, if receiving the reading order for information, the initial text content of information is shown as adding
Close content of text.
When protection information is defined as, mobile terminal when the reading order for information is received, according to default mapping
In the display interface of information, storehouse shows that identification of contacts is " holt " corresponding ciphertext content " today has had a meal and do not had "
In step 105, if receiving the encrypted message that user is input on the information input hurdle of information, detection encrypted message is
No and preset password match.
User can in the information input hurdle of information input encrypted message, by mobile terminal detect the encrypted message whether with
Preset password match.
In step 106, if detecting encrypted message and preset password match, the initial text content of display information.
Such as, the encrypted message of user input is " 112233 ", and preset password is also " 112233 ", then mobile terminal is in letter
Previous ciphertext content is replaced with the display interface of breath the initial text content " tonight goes to supermarket to do shopping " of information.
In sum, a kind of information privacy protection method that the present invention is provided, by receiving during information, obtains information
According to identification of contacts, identification of contacts, determines whether information is protected information;If it is determined that information is protected information, then
The corresponding ciphertext content of identification of contacts is determined from default mapping library, default mapping library correspondence has prestored, and at least one pair of joins
It is the corresponding relation of people's mark and ciphertext content;Screen of the information in mobile terminal is pointed out;If receiving pin
Reading order to information, then be shown as ciphertext content by the initial text content of information;If receiving user in information
The input of information input hurdle encrypted message, then detect encrypted message whether with preset password match;If detecting encrypted message
With preset password match, the then initial text content of display information so that mobile terminal can snugly to other mobile terminals
The information content of transmission is protected, and the decryption channel to information is hidden, and reduces encrypted content information and is cracked
Probability.
Fig. 2 is a kind of flow chart of the information privacy protection method for implementing to exemplify according to another exemplary.As shown in Fig. 2 should
Information privacy protection method is comprised the following steps.
In step 201, privacy settings instruction of the management user at least one contact person in address list is received, according to
Contact person corresponding identification of contacts is added into default mapping library by privacy settings instruction.
In step 202., for each identification of contacts in default mapping library, receive management user and mark for contact person
Know the ciphertext content for arranging, and default mapping library is stored in by identification of contacts corresponding with ciphertext content.
In step 203, the identification of contacts of information when receiving information, is obtained, detection identification of contacts whether there is
In default mapping library.
The corresponding relation of default mapping library corresponding prestored at least one pair of identification of contacts and ciphertext content.
In step 204, if detecting, identification of contacts is present in default mapping library, it is determined that information is protected letter
Breath.
In step 205, if detecting, identification of contacts does not exist in default mapping library, it is determined that information is not protected
Information.
In step 206, however, it is determined that it is protected information to go out information, then determine identification of contacts pair from default mapping library
The ciphertext content answered.
In step 207, the screen by information in mobile terminal is pointed out.
In a step 208, if receiving the reading order for information, the initial text content of information is shown as adding
Close content of text.
In step 209, if receiving the encrypted message that user is input on the information input hurdle of information, detect message in cipher
Breath whether with preset password match.
In step 210, if detecting encrypted message and preset password match, the initial text content of display information.
In step 211, if detecting, encrypted message is mismatched with preset password, and encrypted message is sent to information pair
The contact person for answering.
In sum, a kind of information privacy protection method that the present invention is provided, by receiving during information, obtains information
According to identification of contacts, identification of contacts, determines whether information is protected information;If it is determined that information is protected information, then
The corresponding ciphertext content of identification of contacts is determined from default mapping library, default mapping library correspondence has prestored, and at least one pair of joins
It is the corresponding relation of people's mark and ciphertext content;Screen of the information in mobile terminal is pointed out;If receiving pin
Reading order to information, then be shown as ciphertext content by the initial text content of information;If receiving user in information
The input of information input hurdle encrypted message, then detect encrypted message whether with preset password match;If detecting encrypted message
With preset password match, the then initial text content of display information so that mobile terminal can snugly to other mobile terminals
The information content of transmission is protected, and the decryption channel to information is hidden, and reduces encrypted content information and is cracked
Probability.
In actual life, Jing often also occurs that the mobile terminal of user does not carry situation at one's side, works as other users
When having information extremely important and that not there is privacy to be badly in need of informing user, if the identification of contacts of other users is set by user
The object for being maintained secrecy is needed in being set to default mapping library, then other users cannot know the information when the mobile terminal is held
True content, cannot more understand the emergency of the information, so as to inform the reception of user's information in time, so as to cause to use
Miss some important information in family.In order to avoid there is said circumstances, the present invention after step 202, additionally provides step 212
With the method shown in step 213, such as Fig. 3.
In the step 212, when information is received, whether detection information carries protection and releases mark.
In step 213, if detecting, fileinfo carries protection and releases mark, is receiving the reading for information
When taking order, directly the initial text content of information is shown.
By step 212 and step 213, the user of other mobile terminals can be by the addition protection in the information for sending
Release mark to avoid being protected by privacy content during the mobile terminal of information delivery user, so that the emergency of the information
Can obtain for other users with true content, and pass on to user.
Fig. 4 is a kind of block diagram of the device for protection information privacy according to an exemplary embodiment.
With reference to Fig. 4, device 500 can include following one or more assemblies:Process assembly 502, memorizer 504, power supply
Component 506, multimedia groupware 508, audio-frequency assembly 510, input/output(I/ O)Interface 512, sensor cluster 514, and
Communication component 516.
The integrated operation of 502 usual control device 500 of process assembly, such as with display, call, data communication, phase
Machine operates and records the associated operation of operation.Process assembly 502 can refer to perform including one or more processors 518
Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 502 can include one or more modules, just
Interaction between process assembly 502 and other assemblies.For example, process assembly 502 can include multi-media module, many to facilitate
Interaction between media component 508 and process assembly 502.
Memorizer 504 is configured to store various types of data to support the operation in device 500.These data are shown
Example includes the instruction of any application program or method for operating on device 500, and contact data, telephone book data disappear
Breath, picture, video etc..Memorizer 504 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, such as static RAM(SRAM), Electrically Erasable Read Only Memory(EEPROM), it is erasable to compile
Journey read only memory(EPROM), programmable read only memory(PROM), read only memory(ROM), magnetic memory, flash
Device, disk or CD.
Power supply module 506 provides electric power for the various assemblies of device 500.Power supply module 506 can include power management system
System, one or more power supplys, and other generate, manage and distribute the component that electric power is associated with for device 500.
Multimedia groupware 508 is included in the screen of one output interface of offer between described device 500 and user.One
In a little embodiments, screen can include liquid crystal display(LCD)And touch panel(TP).If screen includes touch panel, screen
Curtain may be implemented as touch screen, to receive the input signal from user.Touch panel includes one or more touch sensings
Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action
Border, but also detect and the touch or slide related persistent period and pressure.In certain embodiments, many matchmakers
Body component 508 includes a front-facing camera and/or post-positioned pick-up head.When device 500 be in operator scheme, such as screening-mode or
During video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and
Post-positioned pick-up head can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio-frequency assembly 510 is configured to output and/or input audio signal.For example, audio-frequency assembly 510 includes a Mike
Wind(MIC), when device 500 is in operator scheme, such as call model, logging mode and speech recognition mode, mike is matched somebody with somebody
It is set to reception external audio signal.The audio signal for being received can be further stored in memorizer 504 or via communication set
Part 516 sends.In certain embodiments, audio-frequency assembly 510 also includes a speaker, for exports audio signal.
, for interface is provided between process assembly 502 and peripheral interface module, above-mentioned peripheral interface module can for I/ O Interfaces 512
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor cluster 514 includes one or more sensors, and the state for various aspects are provided for device 500 is commented
Estimate.For example, sensor cluster 514 can detect the opening/closed mode of device 500, and the relative localization of component is for example described
Display and keypad of the component for device 500, sensor cluster 514 can be with 500 1 components of detection means 500 or device
Position change, user is presence or absence of with what device 500 was contacted, 500 orientation of device or acceleration/deceleration and device 500
Temperature change.Sensor cluster 514 can include proximity transducer, be configured to detect when not having any physical contact
The presence of object nearby.Sensor cluster 514 can also include optical sensor, such as CMOS or ccd image sensor, for into
As used in application.In certain embodiments, the sensor cluster 514 can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure transducer or temperature sensor.
Communication component 516 is configured to facilitate the communication of wired or wireless way between device 500 and other equipment.Device
500 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary enforcement
In example, communication component 516 receives the broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 516 also includes near-field communication(NFC)Module, to promote junction service.Example
Such as, RF identification can be based in NFC module(RFID)Technology, Infrared Data Association(IrDA)Technology, ultra broadband(UWB)Technology,
Bluetooth(BT)Technology and other technologies are realizing.
In the exemplary embodiment, device 500 can be by one or more application specific integrated circuits(ASIC), numeral letter
Number processor(DSP), digital signal processing appts(DSPD), PLD(PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realize, for performing said method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
Such as include the memorizer 504 of instruction, above-mentioned instruction can be performed to complete said method by the processor 518 of device 500.For example,
The non-transitorycomputer readable storage medium can be ROM, random access memory(RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
It should be noted that mobile terminal can be mobile phone, and computer, digital broadcast terminal, messaging devices,
Game console, tablet device, armarium, body-building equipment, personal digital assistant etc..
The foregoing is only presently preferred embodiments of the present invention, not to limit the present invention, all spirit in the present invention and
Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.
Claims (5)
1. a kind of information privacy protection method, it is characterised in that include:
The identification of contacts of described information when receiving information, is obtained, whether described information is determined according to the identification of contacts
For protected information;
If it is determined that described information is protected information, then the corresponding encryption of the identification of contacts is determined from default mapping library
Content of text, the correspondence pass of the default mapping library corresponding prestored at least one pair of identification of contacts and ciphertext content
System;
Screen of the described information in the mobile terminal is pointed out;
If receiving the reading order for described information, the initial text content of described information is shown as into the encryption text
This content;
If receiving the encrypted message that user is input on the information input hurdle of described information, detect the encrypted message whether with
Preset password match;
If detecting the encrypted message and the preset password match, the initial text content of described information is shown.
2. method according to claim 1, it is characterised in that methods described, also includes:
If detecting, the encrypted message is mismatched with the preset password, and the encrypted message is sent to described information pair
The contact person for answering.
3. method according to claim 1, it is characterised in that described to determine that described information is according to the identification of contacts
It is no for protected information, including:
Detect the identification of contacts with the presence or absence of in the default mapping library;
If detecting, the identification of contacts is present in the default mapping library, it is determined that described information is protected information;
If detecting, the identification of contacts does not exist in the default mapping library, it is determined that the not protected letter of described information
Breath.
4. method according to claim 1, it is characterised in that methods described also includes:
Privacy settings instruction of the management user at least one contact person in address list is received, is instructed according to the privacy settings
The contact person corresponding identification of contacts is added into into the default mapping library;
For each identification of contacts in the default mapping library, receive the management user and set for the identification of contacts
The ciphertext content put, and the default mapping is stored in by the identification of contacts corresponding with the ciphertext content
Storehouse.
5. method according to claim 1, it is characterised in that described to determine that described information is according to the identification of contacts
It is no for protected information before, also include:
Whether detection described information carries protection and releases mark;
If detecting, the fileinfo carries the protection and releases mark, orders the reading for described information is received
When making, directly the initial text content of described information is shown.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611043250.9A CN106559575A (en) | 2016-11-24 | 2016-11-24 | Information privacy protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611043250.9A CN106559575A (en) | 2016-11-24 | 2016-11-24 | Information privacy protection method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106559575A true CN106559575A (en) | 2017-04-05 |
Family
ID=58444932
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611043250.9A Pending CN106559575A (en) | 2016-11-24 | 2016-11-24 | Information privacy protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106559575A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107426410A (en) * | 2017-05-26 | 2017-12-01 | 上海与德科技有限公司 | Private information display methods and device |
CN107483738A (en) * | 2017-08-24 | 2017-12-15 | 北京珠穆朗玛移动通信有限公司 | Communication message processing method, mobile terminal and storage medium based on dual system |
CN115001799A (en) * | 2022-05-30 | 2022-09-02 | 上海华客信息科技有限公司 | Page interaction method, system, equipment and storage medium based on check-in information |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1643403A1 (en) * | 2004-10-01 | 2006-04-05 | Hiromi Fukaya | Encryption system using device authentication keys |
CN103559451A (en) * | 2013-10-21 | 2014-02-05 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting and displaying privacy information |
CN105068974A (en) * | 2015-06-30 | 2015-11-18 | 联想(北京)有限公司 | Information processing method and electronic device |
-
2016
- 2016-11-24 CN CN201611043250.9A patent/CN106559575A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1643403A1 (en) * | 2004-10-01 | 2006-04-05 | Hiromi Fukaya | Encryption system using device authentication keys |
CN103559451A (en) * | 2013-10-21 | 2014-02-05 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting and displaying privacy information |
CN105068974A (en) * | 2015-06-30 | 2015-11-18 | 联想(北京)有限公司 | Information processing method and electronic device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107426410A (en) * | 2017-05-26 | 2017-12-01 | 上海与德科技有限公司 | Private information display methods and device |
CN107483738A (en) * | 2017-08-24 | 2017-12-15 | 北京珠穆朗玛移动通信有限公司 | Communication message processing method, mobile terminal and storage medium based on dual system |
CN107483738B (en) * | 2017-08-24 | 2020-05-22 | 北京珠穆朗玛移动通信有限公司 | Communication information processing method based on dual systems, mobile terminal and storage medium |
CN115001799A (en) * | 2022-05-30 | 2022-09-02 | 上海华客信息科技有限公司 | Page interaction method, system, equipment and storage medium based on check-in information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103916233B (en) | A kind of information ciphering method and device | |
CN105260673A (en) | Short message reading method and apparatus | |
CN104503688A (en) | Intelligent hardware device control achieving method and device | |
CN105307137A (en) | Short message reading method and device | |
CN106097494A (en) | The method for unlocking of smart lock and device | |
CN105120122A (en) | Alarm method and device | |
CN104159230B (en) | Call recognition methods and device | |
CN104486083A (en) | Supervisory video processing method and device | |
CN105407098A (en) | Identity verification method and device | |
CN106453052A (en) | Message interaction method and apparatus thereof | |
CN105786609A (en) | Control method and device of terminal | |
CN105260247A (en) | Method and device for controlling terminal application | |
CN105187629A (en) | Event reminding method and device | |
TW202101392A (en) | Access control method and device, electronic device and storage medium | |
CN107682538A (en) | The display methods and device of application interface | |
CN104219053A (en) | Information displaying method, information concealing method and information concealing device | |
CN107147815A (en) | Based on the call handling method and device called a taxi | |
CN108111667A (en) | A kind of communication information encryption method, device and electronic equipment | |
CN106559575A (en) | Information privacy protection method | |
CN105681365B (en) | Method and apparatus for file transmission | |
CN106534551A (en) | Information display method and apparatus | |
CN106682524A (en) | Data privacy protection method of mobile terminal | |
CN105681261A (en) | Security authentication method and apparatus | |
CN106372943A (en) | Message processing method and device | |
CN106789070A (en) | The decryption method of data, device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170405 |
|
RJ01 | Rejection of invention patent application after publication |