CN106856541A - A kind of terminal and method for secret protection - Google Patents

A kind of terminal and method for secret protection Download PDF

Info

Publication number
CN106856541A
CN106856541A CN201611084714.0A CN201611084714A CN106856541A CN 106856541 A CN106856541 A CN 106856541A CN 201611084714 A CN201611084714 A CN 201611084714A CN 106856541 A CN106856541 A CN 106856541A
Authority
CN
China
Prior art keywords
information
terminal
default
user
current terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611084714.0A
Other languages
Chinese (zh)
Inventor
苏玉立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201611084714.0A priority Critical patent/CN106856541A/en
Publication of CN106856541A publication Critical patent/CN106856541A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of terminal and method for secret protection, the terminal includes:Identification module, judge module and protection module.Identification module carries out identification to current terminal user;Judge module judges whether the current terminal user for identifying belongs to default crowd;When judging that current terminal user belongs to default crowd, protection module takes safeguard measure to the presupposed information preserved in terminal.By the scheme of the embodiment of the present invention; identifying that the user using present terminal is when being not desired to reveal it user of individual privacy or secret; take protection to handle the associated privacy information or confidential information in terminal in time, effectively protect the privacy and secret of user, make it not compromised.

Description

A kind of terminal and method for secret protection
Technical field
The present invention relates to terminal applies field, more particularly to a kind of terminal and method for secret protection.
Background technology
At present, with the popularization that terminal (such as mobile phone) is applied, terminal has goed deep into the every field of people's life, example Such as, including chatting, making friends, take pictures including various recreations, and exist including minutes, client communication, information Store Interior various jobs, terminal applies are certainly for people bring many facilities in life and work.And with Terminal applies live more and more deep with work in people, and people become increasingly dependent on to terminal, and people tend to more Many personal information, individual privacy even trade secrets are remained in terminal, for example, chat record or photo with former girlfriend; Important work data or the chat message with client.Terminal as opening, surrounding people be readily accessible or The application tool of opening, above-mentioned individual privacy or trade secret is easy to be obtained by stranger, and this can be undoubtedly the life of user Inconvenience is brought with work.Therefore, need person skilled badly and provide effective solution.
The content of the invention
It is a primary object of the present invention to propose a kind of terminal and method for secret protection, can effectively protect that user's is hidden It is private not compromised.
To achieve the above object, a kind of terminal that the present invention is provided, the terminal includes:Identification module, judge module And protection module.
Identification module, under privacy protection mode, identification being carried out to current terminal user.
Whether judge module, the current terminal user for judging to identify belongs to default crowd.
Protection module, for when judging that current terminal user belongs to default crowd, to the default letter preserved in terminal Breath takes safeguard measure.
Alternatively, identification module carries out identification to current terminal user includes:
Grip state of the detection terminal user to the terminal.
The grip state that will be detected compares with the gripping information for prestoring.
Any one in the gripping information that acquisition prestores is more than or equal in advance with the similarity of the grip state for detecting If similarity threshold first gripping information.
Using the user identity corresponding to the user identity as the grip state for detecting corresponding to the first gripping information.
Wherein, grip state includes gripping dynamics, grips scope and/or grip.
Alternatively, judge module judges whether the current terminal user for identifying belongs to default crowd and include:
First identity information of the current terminal user that will identify that and default blacklist list and specific markers people The second identity information in member's list compares.
It is any in the middle of the first identity information for identifying with default blacklist list or specific markers lists of persons When one the second identity information is consistent, judge that current terminal user belongs to default crowd.
It is any in the middle of the first identity information for identifying with default blacklist list and specific markers lists of persons When one the second identity information is not corresponded, judge that current terminal user is not belonging to default crowd.
Alternatively, default crowd includes:It is drawn into the personnel of blacklist, personnel and/or stranger by specific markers.
Alternatively, protection module takes the safeguard measure to include the presupposed information preserved in terminal:
Presupposed information to being preserved in terminal is directly deleted, or after presupposed information is backuped into default cloud server Presupposed information is deleted.
File where presupposed information is set to invisible;And/or,
Convert the store name of presupposed information.
Additionally, to achieve the above object, the invention allows for a kind of method for secret protection, the method includes:
Under privacy protection mode, identification is carried out to current terminal user;
Whether the current terminal user that judgement is identified belongs to default crowd;
When judging that current terminal user belongs to default crowd, the presupposed information to being preserved in terminal takes protection to arrange Apply.
Alternatively, carrying out identification to current terminal user includes:
Grip state of the detection terminal user to terminal;
The grip state that will be detected compares with the gripping information for prestoring;
Any one in the gripping information that acquisition prestores is more than or equal in advance with the similarity of the grip state for detecting If similarity threshold first gripping information;
Using the user identity corresponding to the user identity as the grip state for detecting corresponding to the first gripping information;
Wherein, grip state includes gripping dynamics, grips scope and/or grip.
Alternatively, judge whether the current terminal user for identifying belongs to default crowd and include:
First identity information of the current terminal user that will identify that and default blacklist list and specific markers people The second identity information in member's list compares;
It is any in the middle of the first identity information for identifying with default blacklist list or specific markers lists of persons When one the second identity information is consistent, judge that current terminal user belongs to default crowd;
It is any in the middle of the first identity information for identifying with default blacklist list and specific markers lists of persons When one the second identity information is not corresponded, judge that current terminal user is not belonging to default crowd.
Alternatively, default crowd includes:It is drawn into the personnel of blacklist, personnel and/or stranger by specific markers.
Alternatively, taking the presupposed information preserved in terminal safeguard measure includes:
Presupposed information to being preserved in terminal is directly deleted, or after presupposed information is backuped into default cloud server Presupposed information is deleted;
File where presupposed information is set to invisible;And/or,
Convert the store name of presupposed information.
The present invention proposes a kind of terminal and method for secret protection, and the terminal includes:Identification module, judge module and Protection module.Identification module carries out identification under privacy protection mode to current terminal user;Judge module is sentenced Whether the disconnected current terminal user for identifying belongs to default crowd;When judging that current terminal user belongs to default crowd, Protection module takes safeguard measure to the presupposed information preserved in terminal.By the scheme of the embodiment of the present invention, sent as an envoy in identification When with the user of present terminal being the user for being not desired to reveal it individual privacy or secret, in time to the associated privacy in terminal Information or confidential information take protection to handle, and effectively protect the privacy and secret of user, make it not compromised.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for realizing the optional mobile terminal of each embodiment one of the invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is embodiment of the present invention terminal composition frame chart;
Fig. 4 is the method for secret protection flow chart of the embodiment of the present invention;
Fig. 5 is the embodiment method schematic diagram that identification is carried out to current terminal user of the embodiment of the present invention;
Whether Fig. 6 belongs to the embodiment of default crowd for the current terminal user that identifies of judgement of the embodiment of the present invention Method schematic diagram.
The realization of the object of the invention, functional characteristics and advantage will be described further referring to the drawings in conjunction with the embodiments.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The optional mobile terminal of each embodiment one of the invention is realized referring now to Description of Drawings.In follow-up description In, using the suffix of such as " module ", " part " or " unit " for representing element only for being conducive to explanation of the invention, Itself do not have specific meaning.Therefore, " module " can be used mixedly with " part ".
Mobile terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP The mobile terminal of (portable media player), guider etc. and such as numeral TV, desktop computer etc. are consolidated Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for movement Outside the element of purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is that the hardware configuration of the mobile terminal for realizing each embodiment of the invention is illustrated.
Mobile terminal 1 00 can include wireless communication unit 110, A/V (audio/video) input block 120, user input Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power subsystem 190 Etc..Fig. 1 shows the mobile terminal with various assemblies, it should be understood that being not required for implementing all groups for showing Part.More or less component can alternatively be implemented.The element of mobile terminal will be discussed in more detail below.
Wireless communication unit 110 generally includes one or more assemblies, and it allows mobile terminal 1 00 and wireless communication system Or the radio communication between network.For example, wireless communication unit can include broadcasting reception module 111, mobile communication module 112nd, at least one of wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast via broadcast channel from external broadcast management server Relevant information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast management server can be generated and sent The broadcast singal and/or broadcast related information generated before the server or reception of broadcast singal and/or broadcast related information And send it to the server of terminal.Broadcast singal can include TV broadcast singals, radio signals, data broadcasting Signal etc..And, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase Pass information can also be provided via mobile communications network, and in this case, broadcast related information can be by mobile communication mould Block 112 is received.Broadcast singal can exist in a variety of manners, for example, it can be with the electronics of DMB (DMB) The form of program guide (EPG), the electronic service guidebooks (ESG) of digital video broadcast-handheld (DVB-H) etc. and exist.Broadcast Receiver module 111 can receive signal and broadcast by using various types of broadcast systems.Especially, broadcasting reception module 111 Can be wide by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video Broadcast-hand-held (DVB-H), forward link media (MediaFLO@) Radio Data System, received terrestrial digital broadcasting integrated service Etc. (ISDB-T) digit broadcasting system receives digital broadcasting.Broadcasting reception module 111 may be constructed such that and be adapted to provide for extensively Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via broadcasting reception module 111 receive broadcast singal and/ Or broadcast related information can be stored in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal And at least one of server and/or receive from it radio signal.Such radio signal can be logical including voice Words signal, video calling signal or the various types of data for sending and/or receiving according to text and/or Multimedia Message.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.The module can be internally or externally It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by the module can include WLAN (WLAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant ToothTM, radio frequency identification (RFID), Infrared Data Association (IrDA), ultra wide band (UWB), purple honeybeeTMEtc..
Location information module 115 is the module for checking or obtaining the positional information of mobile terminal.Location information module Typical case be GPS (global positioning system).According to current technology, GPS module 115 is calculated and comes from three or more satellites Range information and correct time information and the Information application triangulation for calculating, so as to according to longitude, latitude Highly accurately calculate three-dimensional current location information.Currently, defended using three for calculating the method for position and temporal information Star and the position that is calculated by using other satellite correction and the error of temporal information.Additionally, GPS module 115 Can be by Continuous plus current location information in real time come calculating speed information.
A/V input blocks 120 are used to receive audio or video signal.A/V input blocks 120 can include the He of camera 121 Microphone 1220, the static map that 121 pairs, camera is obtained in Video Capture pattern or image capture mode by image capture apparatus The view data of piece or video is processed.Picture frame after treatment may be displayed on display unit 151.At camera 121 Picture frame after reason can be stored in memory 160 (or other storage mediums) or carried out via wireless communication unit 110 Send, two or more cameras 1210 can be provided according to the construction of mobile terminal.Microphone 122 can be in telephone relation mould Sound (voice data) is received via microphone in formula, logging mode, speech recognition mode etc. operational mode, and can be by Such acoustic processing is voice data.Audio (voice) data after treatment can be changed in the case of telephone calling model For the form that can be sent to mobile communication base station via mobile communication module 112 is exported.Microphone 122 can implement all kinds Noise eliminate (or suppress) algorithm eliminating (or suppression) in the noise for receiving and producing during sending audio signal or Person disturbs.
User input unit 130 can generate key input data to control each of mobile terminal according to the order of user input Plant operation.User input unit 130 allows the various types of information of user input, and can include keyboard, metal dome, touch Plate (for example, detection due to being touched caused by resistance, pressure, electric capacity etc. change sensitive component), roller, rocking bar etc. Deng.Especially, when touch pad is superimposed upon on display unit 151 in the form of layer, touch-screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 1 00, (for example, mobile terminal 1 00 opens or closes shape State), the presence or absence of the contact (that is, touch input) of the position of mobile terminal 1 00, user for mobile terminal 1 00, mobile terminal The acceleration or deceleration movement of 100 orientation, mobile terminal 1 00 and direction etc., and generate for controlling mobile terminal 1 00 The order of operation or signal.For example, when mobile terminal 1 00 is embodied as sliding-type mobile phone, sensing unit 140 can be sensed The sliding-type phone is opened or closed.In addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or Whether person's interface unit 170 couples with external device (ED).Sensing unit 140 can will be combined below including proximity transducer 1410 Touch-screen is described to this.
Interface unit 170 is connected the interface that can pass through with mobile terminal 1 00 as at least one external device (ED).For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Identification module can be that storage uses each of mobile terminal 1 00 for verifying user Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included Etc..In addition, the device (hereinafter referred to as " identifying device ") with identification module can take the form of smart card, therefore, know Other device can be connected via port or other attachment means with mobile terminal 1 00.Interface unit 170 can be used for reception and come from The input (for example, data message, electric power etc.) of the external device (ED) and input that will be received is transferred in mobile terminal 1 00 One or more elements can be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 1 00 is connected with external base, interface unit 170 can serve as allowing by it by electricity Power provides to the path of mobile terminal 1 00 from base or can serve as allowing the various command signals being input into from base to pass through it It is transferred to the path of mobile terminal.Be can serve as recognizing that mobile terminal is from the various command signals or electric power of base input The no signal being accurately fitted within base.Output unit 150 is configured to provide defeated with vision, audio and/or tactile manner Go out signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.).Output unit 150 can include display Unit 151, dio Output Modules 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information processed in mobile terminal 1 00.For example, when mobile terminal 1 00 is in electricity During words call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia file Download etc.) related user interface (UI) or graphic user interface (GUI).When mobile terminal 1 00 is in video calling pattern Or during image capture mode, display unit 151 can show the image of capture and/or the image of reception, show video or figure UI or GUI of picture and correlation function etc..
Meanwhile, when display unit 151 and touch pad in the form of layer it is superposed on one another to form touch-screen when, display unit 151 can serve as input unit and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT) In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least It is a kind of.Some in these displays may be constructed such that transparence to allow user to be watched from outside, and this is properly termed as transparent Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific Desired implementation method, mobile terminal 1 00 can include two or more display units (or other display devices), for example, moving Dynamic terminal can include outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used to detect touch Input pressure and touch input position and touch input area.
Dio Output Modules 152 can mobile terminal be in call signal reception pattern, call mode, logging mode, It is that wireless communication unit 110 is received or in memory 160 when under the isotypes such as speech recognition mode, broadcast reception mode The voice data transducing audio signal of middle storage and it is output as sound.And, dio Output Modules 152 can be provided and movement The audio output (for example, call signal receives sound, message sink sound etc.) of the specific function correlation that terminal 100 is performed. Dio Output Modules 152 can include loudspeaker, buzzer etc..
Alarm unit 153 can provide output and be notified to mobile terminal 1 00 with by event.Typical event can be with Including calling reception, message sink, key signals input, touch input etc..In addition to audio or video is exported, alarm unit 153 can in a different manner provide output with the generation of notification event.For example, alarm unit 153 can be in the form of vibrating Output is provided, when calling, message or some other entrance communication (incoming communication) are received, alarm list Unit 153 can provide tactile output (that is, vibrating) to notify to user.Exported by providing such tactile, even if When in pocket of the mobile phone of user in user, user also can recognize that the generation of various events.Alarm unit 153 The output of the generation of notification event can be provided via display unit 151 or dio Output Modules 152.
Memory 160 can store software program for the treatment and control operation performed by controller 180 etc., Huo Zheke Temporarily to store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.And And, memory 160 can store the vibration of various modes on being exported when touching and being applied to touch-screen and audio signal Data.
Memory 160 can include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, many Media card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), static random-access storage Device (SRAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..And, mobile terminal 1 00 can perform memory with by network connection The network storage device cooperation of 160 store function.
The overall operation of the generally control mobile terminal of controller 180.For example, controller 180 is performed and voice call, data Communication, video calling etc. related control and treatment.In addition, controller 180 can be included for reproducing (or playback) many matchmakers The multi-media module 1810 of volume data, multi-media module 1810 can be constructed in controller 180, or can be structured as and control Device processed 180 is separated.Controller 180 can be with execution pattern identifying processing, the handwriting input that will be performed on the touchscreen or figure Piece draws input and is identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit Appropriate electric power needed for part and component.
Various implementation methods described herein can be with use such as computer software, hardware or its any combination of calculating Machine computer-readable recording medium is implemented.Implement for hardware, implementation method described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Programming gate array (FPGA), processor, controller, microcontroller, microprocessor, it is designed to perform function described herein At least one in electronic unit is implemented, and in some cases, such implementation method can be implemented in controller 180. For software implementation, the implementation method of such as process or function can with allow to perform the single of at least one function or operation Software module is implemented.Software code can be come by the software application (or program) write with any appropriate programming language Implement, software code can be stored in memory 160 and performed by controller 180.
So far, oneself according to its function through describing mobile terminal.Below, for the sake of brevity, will description such as folded form, Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc. is used as showing Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
Mobile terminal 1 00 as shown in Figure 1 may be constructed such that using via frame or packet transmission data it is all if any Line and wireless communication system and satellite-based communication system are operated.
The communication system that mobile terminal wherein of the invention can be operated is described referring now to Fig. 2.
Such communication system can use different air interface and/or physical layer.For example, used by communication system Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications system System (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, under The description in face is related to cdma communication system, but such teaching is equally applicable to other types of system.
With reference to Fig. 2, cdma wireless communication system can include multiple mobile terminal 1s 00, multiple base station (BS) 270, base station Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is configured to and Public Switched Telephony Network (PSTN) 290 form interface.MSC280 is also structured to form interface with the BSC275 that can be couple to base station 270 via back haul link. If any one in the interface that back haul link can be known according to Ganji is constructed, the interface includes such as E1/T1, ATM, IP, PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that system can include multiple BSC2750 as shown in Figure 2.
Each BS270 can service one or more subregions (or region), by multidirectional antenna or the day of sensing specific direction Each subregion of line covering is radially away from BS270.Or, each subregion can be by two or more for diversity reception Antenna is covered.Each BS270 may be constructed such that the multiple frequency distribution of support, and the distribution of each frequency has specific frequency spectrum (for example, 1.25MHz, 5MHz etc.).
What subregion and frequency were distributed intersects can be referred to as CDMA Channel.BS270 can also be referred to as base station transceiver System (BTS) or other equivalent terms.In this case, term " base station " can be used for broadly representing single BSC275 and at least one BS270.Base station can also be referred to as " cellular station ".Or, each subregion of specific BS270 can be claimed It is multiple cellular stations.
As shown in Figure 2, broadcast singal is sent to broadcsting transmitter (BT) 295 mobile terminal operated in system 100.Broadcasting reception module 111 as shown in Figure 1 is arranged at mobile terminal 1 00 to receive the broadcast sent by BT295 Signal.In fig. 2 it is shown that several global positioning system (GPS) satellites 300.Satellite 300 helps position multiple mobile terminals At least one of 100.
In fig. 2, multiple satellites 300 are depicted, it is understood that be, it is possible to use any number of satellite obtains useful Location information.GPS module 115 as shown in Figure 1 is generally configured to coordinate with satellite 300 to be believed with obtaining desired positioning Breath.Substitute GPS tracking techniques or outside GPS tracking techniques, it is possible to use other of the position of mobile terminal can be tracked Technology.In addition, at least one gps satellite 300 can optionally or additionally process satellite dmb transmission.
Used as a typical operation of wireless communication system, BS270 receives the reverse link from various mobile terminal 1s 00 Signal.Mobile terminal 1 00 generally participates in call, information receiving and transmitting and other types of communication.Each of the reception of certain base station 270 is anti- Processed in specific BS270 to link signal.The data of acquisition are forwarded to the BSC275 of correlation.BSC provides call Resource allocation and the mobile management function of the coordination including the soft switching process between BS270.The number that BSC275 will also be received According to MSC280 is routed to, it provides the extra route service for forming interface with PSTN290.Similarly, PSTN290 with MSC280 forms interface, and MSC and BSC275 form interface, and BSC275 correspondingly controls BS270 with by forward link signals It is sent to mobile terminal 1 00.
Based on above-mentioned optional mobile terminal hardware configuration and communication system, the inventive method each embodiment is proposed.
As shown in figure 3, first embodiment of the invention proposes a kind of terminal 1, the terminal includes:Identification module 11, Judge module 12 and protection module 13.
Identification module 11, under privacy protection mode, identification being carried out to current terminal user.
Whether judge module 12, the current terminal user for judging to identify belongs to default crowd.
Protection module 13, for when judging that current terminal user belongs to default crowd, being preset to preservation in terminal Information takes safeguard measure.
Alternatively, 11 couples of current terminal users of identification module carry out identification includes:
Grip state of the detection terminal user to the terminal.
The grip state that will be detected compares with the gripping information for prestoring.
Any one in the gripping information that acquisition prestores is more than or equal in advance with the similarity of the grip state for detecting If similarity threshold first gripping information.
Using the user identity corresponding to the user identity as the grip state for detecting corresponding to the first gripping information.
Wherein, grip state includes gripping dynamics, grips scope and/or grip.
Alternatively, judge module 12 judges whether the current terminal user for identifying belongs to default crowd and include:
First identity information of the current terminal user that will identify that and default blacklist list and specific markers people The second identity information in member's list compares.
It is any in the middle of the first identity information for identifying with default blacklist list or specific markers lists of persons When one the second identity information is consistent, judge that current terminal user belongs to default crowd.
It is any in the middle of the first identity information for identifying with default blacklist list and specific markers lists of persons When one the second identity information is not corresponded, judge that current terminal user is not belonging to default crowd.
Alternatively, default crowd includes:It is drawn into the personnel of blacklist, personnel and/or stranger by specific markers.
Alternatively, protection module 13 takes the safeguard measure to include the presupposed information preserved in terminal:
Presupposed information to being preserved in terminal is directly deleted, or after presupposed information is backuped into default cloud server Presupposed information is deleted.
File where presupposed information is set to invisible;And/or,
Convert the store name of presupposed information.
Additionally, to achieve the above object, second embodiment of the invention also proposed a kind of method for secret protection, such as Fig. 4 institutes Show, it is necessary to illustrate, any embodiment in the inventive method embodiment is equally applicable to above-mentioned device embodiment, in text In repeat no more.The method includes S101-S103:
S101, under privacy protection mode, identification is carried out to current terminal user.
In embodiments of the present invention, for the personal information in the individual privacy or its terminal of effectively protecting user and Trade secret, in the owner not in the case of using terminal of terminal, for example, terminal is positioned on desk before removing meeting In the case of, go for a dip before terminal is positioned over bathroom outside in the case of, terminal borrowed in the case of other people uses etc., can be with The terminal of oneself is arranged under default privacy protection mode.In this mode, terminal can carry out identity to current user Identification, and corresponding safeguard measure is taken to the relevant information in terminal according to the identity information of the user for identifying.Pass through The program, can take protection to handle the associated privacy information or confidential information in terminal in time, effectively protect user's Privacy, makes it not compromised.
It should be noted that the owner of terminal can be operated into the secret protection mould using any convenient implementation Formula, for example, the operation of trigger action, screen touch, voice-controlled operations to programmable button, gesture operation high up in the air etc..In this hair In bright embodiment, the triggering method of privacy protection mode can be carried out according to different application scenarios it is self-defined, for its tool The operation format of body is not limited, it is any can triggering terminal enter privacy protection mode method in the embodiment of the present invention Within protection domain.
In embodiments of the present invention, in order to identity information effectively according to terminal user enters to the different information in terminal Row protection can be specifically realized by following scheme, it is necessary to first carry out identification to current terminal user.
Alternatively, as shown in figure 5, identification is carried out to current terminal user includes S201-S204:
S201, detection terminal user are to the grip state of terminal.
In embodiments of the present invention, people will necessarily check terminal at application terminal by the gripping of hand, due to every The personal health and habits and customs difference of itself, everyone also has different grippings customs, example when terminal is gripped Such as, hang on to terminal with palm or terminal, the middle part of custom gripping terminal or bottom are only gently supported with finger (here Top, middle part, bottom refer to and when terminal is placed vertically that terminal is in the vertical when terminal screen front faces user's face Three parts being divided into this from top to bottom), custom laterally grip terminal or longitudinal direction grip terminal.According to above-mentioned many Custom is gripped, terminal can gather the gripping information of different user in daily use, and the gripping information can be practised including user Used gripping dynamics, the grip position of custom, the grip of custom, custom gripping scope, custom palm grip still Righthanded gripping etc. is still practised in the position of custom finger grip, palm and finger custom placement, custom left-handed, and And the different gripping information that terminal will can be gathered is corresponded from different users.Based on the above-mentioned gripping information of terminal-pair Record, after terminal enters privacy protection mode, it is possible to which the grip state to operating the active user of the terminal detects, Similarly, the grip state is also including gripping dynamics, gripping scope and/or grip etc..Can for its specific detection method With using it is existing it is any can detection method in real time, for example, by pressure sensor detection gripping dynamics, by fingerprint knowledge Other device detects the specific grip position of finger, detects it is that palm grip or finger grip (also may be used by pattern recognition device Detected with by fingerprint identification device) etc., in embodiments of the present invention, for specific detection method, algorithm and device not It is limited, the method for any detection scheme that can realize the embodiment of the present invention, algorithm and device are in the embodiment of the present invention Within protection domain.
S202, the grip state that will be detected compare with the gripping information for prestoring.
In embodiments of the present invention, by step S201, it is known that can in advance obtain different grippings by daily collection Corresponding relation between information and different users, after the grip state for detecting active user by step S201, just The grip state that this can be detected is compared with the gripping information for gathering in advance and storing, and is held with current to obtain The gripping information that the state of holding matches.Here match refers to that both similarities are more than or equal to default similarity threshold.
Any one in the gripping information that S203, acquisition prestore is more than or waits with the similarity of the grip state for detecting In default similarity threshold first grips information.
In embodiments of the present invention, after the grip state that will be detected is compared with the gripping information for prestoring relatively, as long as The similarity of the grip state that at least one of the gripping information that acquisition prestores gripping information goes out with current detection is more than or waits In default similarity threshold, just comprising the gripping information matched with the grip state in explanation prestored information, and by the phase The gripping information of matching is referred to as the first gripping information.
S204, using the user's body corresponding to the user identity as the grip state for detecting corresponding to the first gripping information Part.
In embodiments of the present invention, obtain after the first gripping information, just can be believed according to the different gripping for prestoring Breath obtains the user identity corresponding to the first gripping information with the one-to-one relationship of different user, and the user identity is made It is the identity of the user of currently used terminal.
It should be noted that matching with the grip state that current detection goes out multiple first gripping information are tested with When, can further be recognized by other personal identification methods (or second personal identification method), it is also possible to will The identity of the plurality of first gripping information user of the corresponding user identity as the currently used terminal for detecting respectively.It is optional Ground, second personal identification method can include:Fingerprint recognition, face recognition and/or speech recognition.
In embodiments of the present invention, fingerprint recognition to user, face recognition and language can also be accomplished by the following way Sound is recognized.
Alternatively, carrying out identification to current terminal user also includes:
Detect the finger print information of terminal user.
The finger print information that will be detected compares with the fingerprint information template for prestoring.
Any one in the fingerprint information template that acquisition prestores is more than or waits with the similarity of the grip state for detecting In the first finger print information of default similarity threshold.
Using the user identity corresponding to the user identity corresponding to the first finger print information as the finger print information for detecting.
Alternatively, carrying out identification to current terminal user also includes:
Detect the facial information of terminal user.
The facial information that will be detected compares with the facial information template for prestoring.
Any one in the facial information template that acquisition prestores is more than or waits with the similarity of the grip state for detecting In the first facial information of default similarity threshold.
Using the user identity corresponding to the user identity corresponding to first facial information as the facial information for detecting.
Alternatively, carrying out identification to current terminal user also includes:
Detect the voice messaging of terminal user.
The voice messaging that will be detected compares with the voice messaging template for prestoring.
Any one in the voice messaging template that acquisition prestores is more than or waits with the similarity of the grip state for detecting In the first voice messaging of default similarity threshold.
Using the user identity corresponding to the user identity corresponding to the first voice messaging as the voice messaging for detecting.
In embodiments of the present invention, can be using any one or more above-mentioned detection mode to current terminal user Identification is carried out, and is not limited for the detection means and algorithm of its specific use, it is any to realize that the present invention is real The detection means and algorithm of the identity detection scheme of example are applied within the protection domain of the embodiment of the present invention.
Whether the current terminal user that S102, judgement are identified belongs to default crowd.
In embodiments of the present invention, after carrying out identification to current terminal user by above-mentioned steps, just can be with Determine the identity information of active user, alternatively, the identity information can include:User's head portrait, cell-phone number, the pet name, name, volume Number, label, Tencent QQ account number, wechat account etc..Because the user using present terminal might not be required for using hidden to it Private safeguard measure, produces extra power consumption, and avoid terminal frequently in order to avoid any user of terminal-pair implements secret protection It is numerous to carry out secret protection so that perhaps the owner of terminal continually recovers to relevant information, a people can be pre-set Group, only carries out secret protection to the user for meeting crowd's identity.Therefore, current terminal user is carried out identification with Afterwards, in addition it is also necessary to determine whether whether the identity information for currently identifying belongs to default crowd.Specifically can be by following scheme Realize.
Alternatively, as shown in fig. 6, judging whether the current terminal user for identifying belongs to default crowd and include S301- S303:
S301, first identity information of the current terminal user that will identify that and default blacklist list and specific mark The second identity information in note lists of persons compares.
In embodiments of the present invention, before whether the current terminal user for judging to identify belongs to default crowd, need The default crowd is pre-set or set up, that is, predefines the measure for needing which personnel to take secret protection for.Here Crowd's setting or foundation can be carried out according to the own situation of different terminal owners or different application scenarios, be set for it The personnel specifically included in the default crowd for putting are not limited.
Because being to be not intended to it to check this in daily life, generally for the people and stranger for being drawn into blacklist Content in terminal, more particularly, to the content of personal information, privacy or secret.In addition, everyone is directed to different personnel Can not expect that it sees a certain category information yet, for example, husband is not intended to the wife of oneself sees chat message with former girlfriend, always Mother-in-law is not intended to husband and sees the consumption information of oneself, and sales force is not intended to competitive colleague and sees the customer information of oneself. For above-mentioned various situations for needing to protect privacy, we can set up different crowds, and can for different crowds The relevant information protected the need for correspondence difference.
Alternatively, the default crowd can include:Be drawn into the personnel of blacklist, the personnel by specific markers and/or Stranger.
In embodiments of the present invention, stranger be by after above-mentioned various identifications it is unidentified go out its identity people Member, due to it is unidentified go out its identity, then illustrate that the owner before the personnel not with this terminal contacted, or at least without The often personnel of contact, therefore information in terminal need to maintain secrecy it.
It can once be drawn into black name in any dating site installed in present terminal to be drawn into the personnel of blacklist Single people, for example, QQ blacklists, wechat blacklist, contact person's blacklist etc., since being drawn into blacklist, illustrate terminal user Owner it is lost confidence.A blacklist list or blacklist Ziren can be set up in embodiments of the present invention Group, can be associated in the blacklist list or blacklist Ziren group with above-mentioned various platforms, can include above-mentioned various Blacklist personnel in platform, it is also possible to which any existing contact person in the terminal is added into the blacklist list or black List Ziren group.
Can be contact person in terminal, even frequent contact, household or relatives by the people of specific markers, but Need to carry out it personnel of secret protection under the privacy mode, such as, according to the above embodiments, husband can be wife Labeled as specific markers people, husband can also be labeled as specific markers people by wife, and sales force can be one or more certain Colleague is labeled as specific markers people.In a particular application, the owner of terminal can be according to different application scenarios self-definings Which need to be divided into personnel in the default crowd, it is possible to according to the thinner Ziren group of the mutual powder of specific identity, and set up Corresponding list, for example, blacklist list, specific markers lists of persons etc..
In addition, in embodiments of the present invention, for the personnel for meeting default crowd, in order to be directed to the identity of different personnel Different privacy informations is protected, can also by the different types of personnel in the crowd of the Yushe from it is different the need for protect Relevant information carry out correspondence.For example, if husband belonged to the default crowd, could be using accounts information or consumption information as needing Information to be protected is corresponding with husband;If wife belongs to the default crowd, can be by sensitive chat message or some photographs Piece is corresponding with wife as need information to be protected;If colleague belong to the default crowd, can by customer information or some Capsule information are corresponding with the colleague as need information to be protected.Certainly, it is above-mentioned right to be also not necessarily limited in other embodiments Information is answered, can set which personnel needs corresponding which information according to different application scenarios, be not particularly limited herein.
S302, in the middle of the first identity information for identifying with default blacklist list or specific markers lists of persons When any one the second identity information is consistent, judge that current terminal user belongs to default crowd.
In embodiments of the present invention, based on the setting and the foundation of corresponding relation in the above to default crowd, when Any one the second body in the middle of the first identity information for identifying and default blacklist list or specific markers lists of persons When part information is consistent, illustrate that current terminal user belongs to default crowd.
S303, in the middle of the first identity information for identifying with default blacklist list and specific markers lists of persons When any one the second identity information is not corresponded, judge that current terminal user is not belonging to default crowd.
In embodiments of the present invention, if it is judged that active user be present terminal in contact person, but with it is default When any one the second identity information in the middle of blacklist list and specific markers lists of persons is not corresponded, then can be determined that and work as Preceding terminal user is not belonging to default crowd.But, if terminal does not identify the identity of active user, or judge to work as Preceding user is not the contact person in present terminal, just active user can be judged into stranger, then active user falls within pre- If crowd.
It should be noted that above-mentioned step S302 is different judged results from S303, in step in no particular order.
S103, when judging that current terminal user belongs to default crowd, the presupposed information to being preserved in terminal takes guarantor Shield measure.
In embodiments of the present invention, after above scheme determines whether current terminal user belongs to default crowd, Just can be determined the need for for user's implementation information safeguard measure for different judged results.Specifically, judgement is worked as When current terminal user is not belonging to default crowd, it is not necessary to which the presupposed information to being preserved in terminal takes safeguard measure, i.e., eventually It is failure to actuate at end.When judging that current terminal user belongs to default crowd, the presupposed information to being preserved in terminal takes protection to arrange Apply.
Alternatively, taking the presupposed information preserved in terminal safeguard measure includes:
Presupposed information to being preserved in terminal is directly deleted, or after presupposed information is backuped into default cloud server Presupposed information is deleted;
File where presupposed information is set to invisible;And/or,
Convert the store name of presupposed information.
In embodiments of the present invention, the presupposed information preserved in terminal can be adopted using one or more above-mentioned mode Fetch protection measure.Further, since need information to be protected different for different personnel, therefore, for belonging to default crowd's User, can judge take safeguard measure to which presupposed information preserved in terminal according to specific identity.For example, for strange For people, the personal information of terminal owner, accounts information and/or account information can be hidden;It is black for being drawn into For the people of list, can by the information of related platform be set to it is invisible (e.g., the people of QQ blacklists in present terminal appoint What QQ information is invisible);For specific certain colleague can the information of certain conferencing information once or certain client set For invisible;The chat message of default sensitive photo or correlation can be deleted etc. for wife.
So far, by the agency of is over whole essential characteristics of the embodiment of the present invention, but the above is only implementation of the present invention One or more specific embodiments of example, are not the full content of the embodiment of the present invention, in other embodiments, can be with Using other implementation methods, any and embodiment of the present invention same or analogous implementation method of implementation method, and this hair Any combination of the essential characteristic of bright embodiment, within the protection domain of the embodiment of the present invention.
The present invention proposes a kind of terminal and method for secret protection, and the terminal includes:Identification module, judge module and Protection module.Identification module carries out identification to current terminal user;It is current that judge module judgement is identified Whether terminal user belongs to default crowd;When judging that current terminal user belongs to default crowd, protection module is in terminal The presupposed information of preservation takes safeguard measure.By the scheme of the embodiment of the present invention, the user of present terminal is used identifying During for the user for being not desired to reveal it individual privacy or secret, the associated privacy information or confidential information in terminal are adopted in time Fetch protection and handle, effectively protect the privacy and secret of user, make it not compromised.
It should be noted that herein, term " including ", "comprising" or its any other variant be intended to non-row His property is included, so that process, method, article or device including a series of key elements not only include those key elements, and And also include other key elements being not expressly set out, or also include for this process, method, article or device institute are intrinsic Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Also there is other identical element in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably implementation method.Based on such understanding, technical scheme is substantially done to prior art in other words The part for going out contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used to so that a station terminal equipment (can be mobile phone, computer, clothes Business device, air-conditioner, or network equipment etc.) perform method described in each embodiment of the invention.
The preferred embodiments of the present invention are these are only, the scope of the claims of the invention is not thereby limited, it is every to utilize this hair Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of terminal, it is characterised in that the terminal includes:Identification module, judge module and protection module;
The identification module, under privacy protection mode, identification being carried out to current terminal user;
Whether the judge module, the described current terminal user for judging to identify belongs to default crowd;
The protection module, for when judging that the current terminal user belongs to the default crowd, to being preserved in terminal Presupposed information take safeguard measure.
2. terminal as claimed in claim 1, it is characterised in that the identification module carries out body to current terminal user Part identification includes:
Detect grip state of the terminal user to the terminal;
The grip state that will be detected compares with the gripping information for prestoring;
Any one in the gripping information prestored described in obtaining is more than or waits with the similarity of the grip state for detecting In default similarity threshold first grips information;
Using the user's body corresponding to the user identity corresponding to the first gripping information as the grip state for detecting Part;
Wherein, the grip state includes gripping dynamics, grips scope and/or grip.
3. terminal as claimed in claim 1, it is characterised in that the judge module judges the described current terminal for identifying Whether user belongs to default crowd includes:
First identity information of the described current terminal user that will identify that and default blacklist list and specific markers people The second identity information in member's list compares;
When first identity information for identifying is worked as with the default blacklist list or the specific markers lists of persons In any one second identity information when being consistent, judge that the current terminal user belongs to the default crowd;
When first identity information for identifying is worked as with the default blacklist list and the specific markers lists of persons In any one second identity information when not corresponding, judge that the current terminal user is not belonging to the default people Group.
4. the terminal as described in claim 1 or 3, it is characterised in that the default crowd includes:It is drawn into the people of blacklist Member, by the personnel and/or stranger of specific markers.
5. terminal method as claimed in claim 1, it is characterised in that the protection module is adopted to the presupposed information preserved in terminal The measure of fetching protection includes:
The presupposed information to being preserved in the terminal is directly deleted, or the presupposed information is backuped into default high in the clouds The presupposed information is deleted after server;
File where the presupposed information is set to invisible;And/or,
Convert the store name of the presupposed information.
6. a kind of method for secret protection, it is characterised in that methods described includes:
Under privacy protection mode, identification is carried out to current terminal user;
Whether the described current terminal user that judgement is identified belongs to default crowd;
When judging that the current terminal user belongs to the default crowd, the presupposed information to being preserved in terminal takes protection Measure.
7. method for secret protection as claimed in claim 6, it is characterised in that described that identity knowledge is carried out to current terminal user Do not include:
Detect grip state of the terminal user to the terminal;
The grip state that will be detected compares with the gripping information for prestoring;
Any one in the gripping information prestored described in obtaining is more than or waits with the similarity of the grip state for detecting In default similarity threshold first grips information;
Using the user's body corresponding to the user identity corresponding to the first gripping information as the grip state for detecting Part;
Wherein, the grip state includes gripping dynamics, grips scope and/or grip.
8. method for secret protection as claimed in claim 6, it is characterised in that the described current terminal that the judgement is identified Whether user belongs to default crowd includes:
First identity information of the described current terminal user that will identify that and default blacklist list and specific markers people The second identity information in member's list compares;
When first identity information for identifying is worked as with the default blacklist list or the specific markers lists of persons In any one second identity information when being consistent, judge that the current terminal user belongs to the default crowd;
When first identity information for identifying is worked as with the default blacklist list and the specific markers lists of persons In any one second identity information when not corresponding, judge that the current terminal user is not belonging to the default people Group.
9. the method for secret protection as described in claim 6 or 8, it is characterised in that the default crowd includes:It is drawn into black name Single personnel, personnel and/or stranger by specific markers.
10. method for secret protection as claimed in claim 6, it is characterised in that the presupposed information to being preserved in terminal is adopted The measure of fetching protection includes:
The presupposed information to being preserved in the terminal is directly deleted, or the presupposed information is backuped into default high in the clouds The presupposed information is deleted after server;
File where the presupposed information is set to invisible;And/or,
Convert the store name of the presupposed information.
CN201611084714.0A 2016-11-30 2016-11-30 A kind of terminal and method for secret protection Pending CN106856541A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611084714.0A CN106856541A (en) 2016-11-30 2016-11-30 A kind of terminal and method for secret protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611084714.0A CN106856541A (en) 2016-11-30 2016-11-30 A kind of terminal and method for secret protection

Publications (1)

Publication Number Publication Date
CN106856541A true CN106856541A (en) 2017-06-16

Family

ID=59125570

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611084714.0A Pending CN106856541A (en) 2016-11-30 2016-11-30 A kind of terminal and method for secret protection

Country Status (1)

Country Link
CN (1) CN106856541A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108200291A (en) * 2018-01-30 2018-06-22 广东小天才科技有限公司 Talking management method, call management device and electronic equipment
CN108366223A (en) * 2018-04-26 2018-08-03 天清(沧州)科技有限公司 Multipart video-meeting system and method based on mobile device
CN108600551A (en) * 2018-05-07 2018-09-28 Oppo广东移动通信有限公司 Call request processing method and Related product
CN110489949A (en) * 2018-05-15 2019-11-22 上海博泰悦臻网络技术服务有限公司 Vehicle and its car-mounted terminal privacy settings method
CN116072123A (en) * 2023-03-06 2023-05-05 南昌航天广信科技有限责任公司 Broadcast information playing method and device, readable storage medium and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103023649A (en) * 2012-11-29 2013-04-03 北京小米科技有限责任公司 Method, device and equipment for protecting privacy information
CN103577737A (en) * 2012-08-07 2014-02-12 百度在线网络技术(北京)有限公司 Mobile terminal and automatic authority adjusting method thereof
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal
CN104506728A (en) * 2014-12-25 2015-04-08 昆山工研院新型平板显示技术中心有限公司 Mobile phone identity authentication device and mobile phone identity authentication method
CN105025157A (en) * 2015-05-28 2015-11-04 广东欧珀移动通信有限公司 Private contact concealing method and user terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577737A (en) * 2012-08-07 2014-02-12 百度在线网络技术(北京)有限公司 Mobile terminal and automatic authority adjusting method thereof
CN103023649A (en) * 2012-11-29 2013-04-03 北京小米科技有限责任公司 Method, device and equipment for protecting privacy information
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal
CN104506728A (en) * 2014-12-25 2015-04-08 昆山工研院新型平板显示技术中心有限公司 Mobile phone identity authentication device and mobile phone identity authentication method
CN105025157A (en) * 2015-05-28 2015-11-04 广东欧珀移动通信有限公司 Private contact concealing method and user terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108200291A (en) * 2018-01-30 2018-06-22 广东小天才科技有限公司 Talking management method, call management device and electronic equipment
CN108366223A (en) * 2018-04-26 2018-08-03 天清(沧州)科技有限公司 Multipart video-meeting system and method based on mobile device
CN108600551A (en) * 2018-05-07 2018-09-28 Oppo广东移动通信有限公司 Call request processing method and Related product
CN108600551B (en) * 2018-05-07 2020-07-28 Oppo广东移动通信有限公司 Call request processing method and related product
CN110489949A (en) * 2018-05-15 2019-11-22 上海博泰悦臻网络技术服务有限公司 Vehicle and its car-mounted terminal privacy settings method
CN116072123A (en) * 2023-03-06 2023-05-05 南昌航天广信科技有限责任公司 Broadcast information playing method and device, readable storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
CN104732133B (en) Electronic contract signs method and system
CN104915582B (en) unlocking method and device
CN106856541A (en) A kind of terminal and method for secret protection
CN105160264B (en) Photo encryption device and method
CN104821068A (en) Mobile terminal real-time antitheft alarm method and apparatus
CN106341817A (en) Access control system, access control method, mobile terminals and access server
CN105118201A (en) Mobile terminal theft prevention method and device
CN106657606A (en) Photograph processing method, device and terminal
CN106817377A (en) A kind of data encryption device, decryption device and method
CN105120054B (en) Information processing method and mobile terminal
CN105099701B (en) A kind of method of terminal and terminal authentication
CN106873895A (en) The implementation method and device of a kind of edge gesture operation
CN106570945A (en) Terminal, check-in machine and check-in method
CN104820797B (en) Using the management method and device of account
CN107071321A (en) A kind of processing method of video file, device and terminal
CN104735254B (en) terminal screen locking method and system
CN104715262B (en) A kind of utilization, which is taken pictures, realizes the method, device and mobile terminal of intelligent label function
CN105117627A (en) Method and device for hiding information
CN107423600A (en) Mobile terminal and interface of mobile terminal locking means
CN106919840A (en) The detection method and device of a kind of Malware
CN106817481A (en) A kind of terminal and terminal children's lock setting method
CN106550133A (en) Calling identification device and method
CN106528138A (en) Message prompting method and apparatus
CN106934279A (en) A kind of two-dimension code safe means of defence and device
CN106792644A (en) Mobile terminal, server and information processing method

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170616

RJ01 Rejection of invention patent application after publication