CN106570420B - Secret code-based intelligent equipment privacy protection implementation method and system - Google Patents

Secret code-based intelligent equipment privacy protection implementation method and system Download PDF

Info

Publication number
CN106570420B
CN106570420B CN201610979603.XA CN201610979603A CN106570420B CN 106570420 B CN106570420 B CN 106570420B CN 201610979603 A CN201610979603 A CN 201610979603A CN 106570420 B CN106570420 B CN 106570420B
Authority
CN
China
Prior art keywords
privacy
password
manager
mapping
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610979603.XA
Other languages
Chinese (zh)
Other versions
CN106570420A (en
Inventor
张锐华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou TCL Internet micro loan Co., Ltd
Original Assignee
Guangzhou Tcl Internet Micro Loan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Tcl Internet Micro Loan Co Ltd filed Critical Guangzhou Tcl Internet Micro Loan Co Ltd
Priority to CN201610979603.XA priority Critical patent/CN106570420B/en
Publication of CN106570420A publication Critical patent/CN106570420A/en
Application granted granted Critical
Publication of CN106570420B publication Critical patent/CN106570420B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a secret code-based intelligent equipment privacy protection implementation method and system, wherein the method comprises the following steps: acquiring an object password currently input by a user, and searching whether the object password is mapped with a privacy object in a privacy database; the privacy object comprises a privacy application, a privacy directory and a privacy file; and when the object password is searched to be mapped with the privacy object, opening the privacy object mapped with the object password. According to the invention, the opening and hiding of the privacy object are realized through the object password, and the privacy object cannot be directly displayed and found after the screen lock of the intelligent terminal is cracked, so that the data security of the privacy object is improved.

Description

Secret code-based intelligent equipment privacy protection implementation method and system
Technical Field
The invention relates to the technical field of information security, in particular to a secret code-based intelligent equipment privacy protection implementation method and system.
Background
With the popularization of intelligent devices, people pay more and more attention to the protection of private information. Smart phones have also advanced various screen locking functions in succession to protect users' private information. Such as password unlocking, graphical unlocking (squared figure), PIN code unlocking, fingerprint unlocking, etc. On the basis of the access restriction function, the access restriction function is added on part of the smart phones to add a layer of restriction to the specified applications, and all the specified applications need to be unlocked again to be used (all the specified applications are the same in unlocking password).
The intelligent mobile phone system is equivalent to a villa, various screen locks are equivalent to locks on a door of the villa, and the intelligent mobile phone system can enter the villa as long as the intelligent mobile phone system is opened; the access limiting function of part of smart phones is equivalent to a lock added on a door of a room (hereinafter referred to as a small vault) with valuables in a villa, and the valuables can be accessed and taken away only by opening the lock on the door of the small vault.
However, it is known in life that a villa gate is sometimes opened (colleagues lose the lock by virtue of mobile phones or without the mobile phones), once a thief enters the villa, a small vault is not locked (part of smart phones have built-in access limiting functions), and even if the small vault is locked, the thief can break the door by tools (such as axes), so that the tragic effect is high. If a method is available, a thief can not see a 'little vault', and the possibility that the thief breaks the door and steals the valuables is avoided.
Accordingly, the prior art is yet to be improved and developed.
Disclosure of Invention
In view of the above deficiencies of the prior art, an object of the present invention is to provide a secret code-based method and system for protecting privacy of an intelligent device, which are used to solve the problem in the prior art that a designated application in an intelligent terminal can still be broken by force after being locked, which results in data being stolen or lost.
The technical scheme of the invention is as follows:
a secret code-based intelligent device privacy protection implementation method comprises the following steps:
A. acquiring an object password currently input by a user, and searching whether the object password is mapped with a privacy object in a privacy database; the privacy object comprises a privacy application, a privacy directory and a privacy file;
B. and when the object password is searched to be mapped with the privacy object, opening the privacy object mapped with the object password.
The secret code-based intelligent device privacy protection implementation method comprises the following steps of:
s1, acquiring the manager starting password currently input by the user, and judging whether the manager starting password is mapped to the privacy manager;
and S2, when the manager starts the password mapping privacy manager, starting the privacy manager.
The secret code-based intelligent device privacy protection implementation method further comprises the following steps:
s3, when it is detected that an object to be set with privacy on the desktop of the intelligent terminal is added to the privacy manager, acquiring an object password input by a user, generating a mapping ID according to the object password, and storing the object password, the mapping ID and object data corresponding to the object to be set with privacy to a privacy database.
The secret code-based intelligent device privacy protection implementation method further comprises the following steps:
s4, when detecting that the privacy object is deleted from the privacy manager, obtaining the mapping ID corresponding to the privacy object, obtaining the object data of the privacy object according to the mapping ID, transmitting the object data to the specified storage path, and deleting the mapping ID in the privacy database and the object data corresponding to the mapping ID.
The secret code-based intelligent device privacy protection implementation method is characterized in that the object data comprises an application unique ID, application configuration information and a data storage path.
A secret code-based intelligent device privacy protection implementation system comprises:
the password acquiring and retrieving module is used for acquiring the object password currently input by the user and retrieving whether the object password is mapped with the privacy object in the privacy database; the privacy object comprises a privacy application, a privacy directory and a privacy file;
and the privacy object starting control module is used for opening the privacy object mapped with the object secret code when the object secret code mapped with the privacy object is retrieved.
Secret code-based intelligent equipment privacy protection implementation system, wherein, still include:
the input and judgment module is used for acquiring the manager starting password currently input by the user and judging whether the manager starting password is mapped to the privacy manager or not;
and the privacy manager starting module is used for starting the privacy manager when the manager starts the password mapping privacy manager.
Secret code-based intelligent equipment privacy protection implementation system, wherein, still include:
and the privacy protection setting module is used for acquiring an object secret code input by a user when detecting that an object to be set with privacy on the desktop of the intelligent terminal is added to the privacy manager, generating a mapping ID according to the object secret code, and storing the object secret code, the mapping ID and object data corresponding to the object to be set with privacy to a privacy database.
Secret code-based intelligent equipment privacy protection implementation system, wherein, still include:
and the unprotected setting module is used for acquiring the mapping ID corresponding to the privacy object when detecting that the privacy object is deleted from the privacy manager, acquiring the object data of the privacy object according to the mapping ID, transmitting the object data to a specified storage path, and deleting the mapping ID in the privacy database and the object data corresponding to the mapping ID.
The secret code-based intelligent device privacy protection implementation system is characterized in that the object data comprises an application unique ID, application configuration information and a data storage path.
The invention provides a secret code-based intelligent equipment privacy protection implementation method and system, wherein the method comprises the following steps: acquiring an object password currently input by a user, and searching whether the object password is mapped with a privacy object in a privacy database; the privacy object comprises a privacy application, a privacy directory and a privacy file; and when the object password is searched to be mapped with the privacy object, opening the privacy object mapped with the object password. According to the invention, the opening and hiding of the privacy object are realized through the object password, and the privacy object cannot be directly displayed and found after the screen lock of the intelligent terminal is cracked, so that the data security of the privacy object is improved.
Drawings
Fig. 1 is a flowchart of a preferred embodiment of a secret code-based intelligent device privacy protection implementation method according to the present invention.
Fig. 2 is a block diagram of a preferred embodiment of the secret code-based intelligent device privacy protection implementation system according to the present invention.
Detailed Description
The invention provides a secret code-based intelligent equipment privacy protection implementation method and system, and the invention is further described in detail below in order to make the purpose, technical scheme and effect of the invention clearer and more clear. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, a flowchart of a preferred embodiment of a secret code-based intelligent device privacy protection implementation method according to the present invention is shown, where the method includes the following steps:
s100, acquiring an object password currently input by a user, and searching whether the object password is mapped with a privacy object in a privacy database; the privacy object comprises a privacy application, a privacy directory and a privacy file;
and S200, when the object password is searched to be mapped with the privacy object, opening the privacy object mapped with the object password.
In the embodiment of the invention, when a user needs to open an existing object, a dialing application program which is installed in advance can be started first. The dialing application program can also be called as a dialing APP, when the dialing APP is started, a soft keyboard is popped up for a user to input characters, the character input is completed, and after a confirmation key in the soft keyboard is pressed, an input character string is used as an object secret code. The object password input by the user is composed of single or multiple characters, for example @ #888888#, when the user inputs the object password, the user searches whether the object password is mapped with the privacy object in the privacy database, once the object password is mapped with the privacy object, the object password can be used as a 'key' for opening the privacy object, and at this time, the privacy object mapped with the object password can be opened.
Obviously, the object password of each privacy object needs to be preset, and before the object password is set, the privacy manager needs to be started first, and the steps of starting the privacy manager in the invention are as follows:
step S11, acquiring the manager starting password currently input by the user, and judging whether the manager starting password is mapped to the privacy manager;
step S12, when the manager starts the password mapping privacy manager, the privacy manager is started.
Similarly, the privacy manager in the invention is used as a functional module which can set privacy protection on a certain privacy object or cancel the privacy protection of a certain privacy object, and the mode of starting the privacy manager is similar to that of starting a certain privacy object. That is, when the privacy manager is started, the dialing application is started first, the manager starting password is input, and the privacy manager is started after the manager starting password is successfully verified.
The privacy manager is built in the intelligent terminal system, is invisible to the user on the desktop of the intelligent terminal, and can be opened only by starting the password through the manager. Besides the object password and the manager starting password, the privacy database also stores related data of each privacy object, such as an application unique ID, application configuration information, a data storage path and the like, and provides data for opening and restoring the subsequent privacy objects.
When the privacy manager is started, any one or more applications and files on the intelligent terminal can be selected and added to the privacy manager for privacy protection, and the specific process is as follows:
and step S13, when detecting that an object to be set with privacy on the desktop of the intelligent terminal is added to the privacy manager, acquiring an object password input by a user, generating a mapping ID according to the object password, and storing the object password, the mapping ID and object data corresponding to the object to be set with privacy to a privacy database.
After each object to be set with privacy is added into the privacy manager, an object password is required to be set, a mapping ID is generated according to the object password, the object password is bound with the mapping ID, and after object data corresponding to the object to be set with privacy is bound with the mapping ID, the object password, the mapping ID and the object data corresponding to the object to be set with privacy are stored in a privacy database. At this time, after the object data of the object to be set with privacy is stored in the privacy database, the application icon or the file icon on the intelligent terminal needs to be hidden, or the application icon or the file icon on the intelligent terminal needs to be deleted.
When the privacy manager is started, the privacy application corresponding to the object password can be started by inputting the object password, and the privacy protection of the privacy application is cancelled in the privacy manager, and the specific process is as follows:
step S14, when detecting that the privacy object is deleted from the privacy manager, acquiring the mapping ID corresponding to the privacy object, acquiring the object data of the privacy object according to the mapping ID, transmitting the object data to the specified storage path, and deleting the mapping ID in the privacy database and the object data corresponding to the mapping ID.
In steps S13 and S14, the privacy manager adds and cancels the protection of the privacy object, and after the added privacy object (such as an application), the object password is set according to a specified format (such as @ #0001 #); the privacy manager judges whether the set object password is available, if so, the privacy manager saves the data (such as application unique ID, application configuration information, data storage path and the like) corresponding to the added privacy object into a privacy database, and meanwhile, the application is hidden from a desktop and an application list (if the application is a directory or a file, the application is moved to a specified position for encrypted saving), so that the application is invisible to a user and can only be opened through the object password; on the contrary, if the privacy protection of a certain privacy object is cancelled, the data stored before the privacy object is read from the privacy database and is restored one by one.
Therefore, the privacy object is opened and hidden through the object password, and the privacy object cannot be directly displayed and discovered after the screen lock of the intelligent terminal is cracked, so that the data security of the privacy object is improved.
Based on the method embodiment, the invention also provides a secret code-based intelligent equipment privacy protection implementation system. As shown in fig. 2, the secret code-based intelligent device privacy protection implementation system includes:
a secret code obtaining and retrieving module 100, configured to obtain an object secret code currently input by a user, and retrieve whether the object secret code is mapped with a privacy object in a privacy database; the privacy object comprises a privacy application, a privacy directory and a privacy file;
and the privacy object starting control module 200 is used for opening the privacy object mapped with the object secret code when the object secret code mapped with the privacy object is retrieved.
Preferably, in the secret code-based intelligent device privacy protection implementation system, the secret code-based intelligent device privacy protection implementation system further includes:
the input and judgment module is used for acquiring the manager starting password currently input by the user and judging whether the manager starting password is mapped to the privacy manager or not;
and the privacy manager starting module is used for starting the privacy manager when the manager starts the password mapping privacy manager.
Preferably, in the secret code-based intelligent device privacy protection implementation system, the secret code-based intelligent device privacy protection implementation system further includes:
and the privacy protection setting module is used for acquiring an object secret code input by a user when detecting that an object to be set with privacy on the desktop of the intelligent terminal is added to the privacy manager, generating a mapping ID according to the object secret code, and storing the object secret code, the mapping ID and object data corresponding to the object to be set with privacy to a privacy database.
Preferably, in the secret code-based intelligent device privacy protection implementation system, the secret code-based intelligent device privacy protection implementation system further includes:
and the unprotected setting module is used for acquiring the mapping ID corresponding to the privacy object when detecting that the privacy object is deleted from the privacy manager, acquiring the object data of the privacy object according to the mapping ID, transmitting the object data to a specified storage path, and deleting the mapping ID in the privacy database and the object data corresponding to the mapping ID.
Preferably, in the secret code-based intelligent device privacy protection implementation system, the object data includes an application unique ID, application configuration information, and a data storage path.
In summary, the secret code-based intelligent device privacy protection implementation method and system provided by the present invention include: acquiring an object password currently input by a user, and searching whether the object password is mapped with a privacy object in a privacy database; the privacy object comprises a privacy application, a privacy directory and a privacy file; and when the object password is searched to be mapped with the privacy object, opening the privacy object mapped with the object password. According to the invention, the opening and hiding of the privacy object are realized through the object password, and the privacy object cannot be directly displayed and found after the screen lock of the intelligent terminal is cracked, so that the data security of the privacy object is improved.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a computer-readable storage medium, and when the computer program is executed, the processes of the embodiments of the methods described above can be included. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a Random Access Memory (RAM), or the like.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations may be effected thereto by those of ordinary skill in the art in light of the foregoing description, and that all such modifications and variations are intended to be within the scope of the invention as defined by the appended claims.

Claims (4)

1. A secret code-based intelligent device privacy protection implementation method is characterized by comprising the following steps:
A. acquiring an object password currently input by a user, and searching whether the object password is mapped with a privacy object in a privacy database; the privacy object comprises a privacy application, a privacy directory and a privacy file;
B. when the object password is searched and mapped with the privacy object, opening the privacy object mapped with the object password;
the step A is also preceded by:
s1, acquiring the manager starting password currently input by the user, and judging whether the manager starting password is mapped to the privacy manager;
s2, when the manager starts the password mapping privacy manager, the privacy manager is started;
s3, when detecting that an object to be set with privacy on the desktop of the intelligent terminal is added to the privacy manager, acquiring an object password input by a user, generating a mapping ID according to the object password, and storing the object password, the mapping ID and object data corresponding to the object to be set with privacy to a privacy database;
s4, when detecting that the privacy object is deleted from the privacy manager, acquiring a mapping ID corresponding to the privacy object, acquiring object data of the privacy object according to the mapping ID, transmitting the object data to a specified storage path, and deleting the mapping ID in the privacy database and the object data corresponding to the mapping ID;
after the privacy manager is started, selecting an application or a file on the intelligent terminal, and adding the selected application or file to the privacy manager for setting privacy protection; after storing object data of an object to be set with privacy into a privacy database, hiding an application icon or a file icon on an intelligent terminal, or deleting the application icon or the file icon on the intelligent terminal;
after the privacy manager is started, the privacy application corresponding to the object password is started by inputting the object password, and the privacy protection of the privacy application is cancelled in the privacy manager.
2. The secret code-based intelligent device privacy protection implementation method of claim 1, wherein the object data comprises an application unique ID, application configuration information and a data storage path.
3. The utility model provides a smart machine privacy protection implementation system based on secret code which characterized in that includes:
the password acquiring and retrieving module is used for acquiring the object password currently input by the user and retrieving whether the object password is mapped with the privacy object in the privacy database; the privacy object comprises a privacy application, a privacy directory and a privacy file;
the privacy object starting control module is used for opening the privacy object mapped with the object secret code when the object secret code is searched to be mapped with the privacy object;
further comprising:
the input and judgment module is used for acquiring the manager starting password currently input by the user and judging whether the manager starting password is mapped to the privacy manager or not;
the privacy manager starting module is used for starting the privacy manager when the manager starts the password mapping privacy manager;
the privacy protection setting module is used for acquiring an object password input by a user when detecting that an object to be set with privacy on the desktop of the intelligent terminal is added to the privacy manager, generating a mapping ID according to the object password, and storing the object password, the mapping ID and object data corresponding to the object to be set with privacy to a privacy database;
the device comprises a privacy manager, a protection cancellation setting module, a storage module and a protection module, wherein the privacy manager is used for storing the object data of the privacy object, the protection cancellation setting module is used for acquiring the mapping ID corresponding to the privacy object when detecting that the privacy object is deleted from the privacy manager, acquiring the object data of the privacy object according to the mapping ID, transmitting the object data to a specified storage path, and deleting the mapping ID in the privacy database and the object data corresponding to the mapping ID;
after the privacy manager is started, selecting an application or a file on the intelligent terminal, and adding the selected application or file to the privacy manager for setting privacy protection; after storing object data of an object to be set with privacy into a privacy database, hiding an application icon or a file icon on an intelligent terminal, or deleting the application icon or the file icon on the intelligent terminal;
after the privacy manager is started, the privacy application corresponding to the object password is started by inputting the object password, and the privacy protection of the privacy application is cancelled in the privacy manager.
4. The password-based intelligent device privacy protection implementation system according to claim 3, wherein the object data includes an application unique ID, application configuration information, and a data storage path.
CN201610979603.XA 2016-11-08 2016-11-08 Secret code-based intelligent equipment privacy protection implementation method and system Active CN106570420B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610979603.XA CN106570420B (en) 2016-11-08 2016-11-08 Secret code-based intelligent equipment privacy protection implementation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610979603.XA CN106570420B (en) 2016-11-08 2016-11-08 Secret code-based intelligent equipment privacy protection implementation method and system

Publications (2)

Publication Number Publication Date
CN106570420A CN106570420A (en) 2017-04-19
CN106570420B true CN106570420B (en) 2020-11-06

Family

ID=58540457

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610979603.XA Active CN106570420B (en) 2016-11-08 2016-11-08 Secret code-based intelligent equipment privacy protection implementation method and system

Country Status (1)

Country Link
CN (1) CN106570420B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109543468B (en) * 2018-10-19 2023-05-05 西安闻泰电子科技有限公司 Password detection method and device of electronic equipment
CN112231758B (en) * 2020-11-03 2023-11-17 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10043229B2 (en) * 2011-01-26 2018-08-07 Eyelock Llc Method for confirming the identity of an individual while shielding that individual's personal data
CN103413102A (en) * 2013-08-30 2013-11-27 深圳市中兴移动通信有限公司 Secret data management device and secret data management method as well as mobile terminal
CN103617382B (en) * 2013-11-22 2017-10-17 北京奇虎科技有限公司 Method for secret protection and its device
US9443101B2 (en) * 2014-03-10 2016-09-13 Xerox Corporation Low-cost specification and enforcement of a privacy-by-consent-policy for online services
CN105912911A (en) * 2016-04-29 2016-08-31 乐视控股(北京)有限公司 Method and system for managing application programs of mobile equipment

Also Published As

Publication number Publication date
CN106570420A (en) 2017-04-19

Similar Documents

Publication Publication Date Title
US11270267B2 (en) Sensitive information management
CN109643356B (en) Method and system for preventing phishing or extorting software attacks
CN110651270B (en) Data access method and device
US20080189793A1 (en) System and method for setting application permissions
JP3805986B2 (en) Information processing apparatus, information processing apparatus control method, and storage medium
CN106203011B (en) Method and device for entering operating system desktop
CN104700050A (en) Mobile terminal safety positioning method and device
US20160134625A1 (en) Method and apparatus for controlling communications terminal and corresponding communications terminal
CN101415075A (en) Digital camera with fingerprint identification function and use method thereof
JP2007140798A (en) Information leakage prevention system for computer
CN105809007A (en) Privacy protection method and device
CN107045604A (en) Information processing method and device
CN104820805A (en) Method and device for burglary prevention of user identity identification card information
CN106570420B (en) Secret code-based intelligent equipment privacy protection implementation method and system
KR20140093556A (en) Security System Using Two factor Authentication And Security Method of Electronic Equipment Using Thereof
JP7278345B2 (en) Mobile terminal privacy protection method and protection device, and mobile terminal
CN107180201A (en) The creation method and device of private space
JPH11184756A (en) Security control method in portable information terminal and system therefor and recording medium for programming and recording the same method
CN108171849B (en) Password updating method, safe and safe control system
CN106650368A (en) Encrypted information display method and apparatus
CN107154999B (en) Terminal and unlocking method and storage device based on environmental information
JP6714283B1 (en) Electronic unlocking management system and program
US20140047564A1 (en) Managing contact records in a device with multiple operation perimeters
CN106127071B (en) File access protection method and system based on mobile terminal and mobile terminal
CN107403114B (en) Input locking structure and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201021

Address after: 510000 Private Finance Street Changdi Avenue, Yuexiu District, Guangzhou City, Guangdong Province

Applicant after: Guangzhou TCL Internet micro loan Co., Ltd

Address before: 516006 Guangdong province Huizhou City Zhongkai high tech Zone and seven West Road No. 86

Applicant before: HUIZHOU TCL MOBILE COMMUNICATION Co.,Ltd.

GR01 Patent grant
GR01 Patent grant