CN107306305A - A kind of important relation people method and device of safe processing - Google Patents

A kind of important relation people method and device of safe processing Download PDF

Info

Publication number
CN107306305A
CN107306305A CN201610263929.2A CN201610263929A CN107306305A CN 107306305 A CN107306305 A CN 107306305A CN 201610263929 A CN201610263929 A CN 201610263929A CN 107306305 A CN107306305 A CN 107306305A
Authority
CN
China
Prior art keywords
relation people
important relation
user
important
people
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610263929.2A
Other languages
Chinese (zh)
Inventor
张宏伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610263929.2A priority Critical patent/CN107306305A/en
Priority to PCT/CN2016/104072 priority patent/WO2017185704A1/en
Publication of CN107306305A publication Critical patent/CN107306305A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/27453Directories allowing storage of additional subscriber data, e.g. metadata
    • H04M1/27457Management thereof, e.g. manual editing of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/27453Directories allowing storage of additional subscriber data, e.g. metadata

Abstract

The invention discloses a kind of important relation people security processing, including:Whether the active user that detection sends operation requests to important contact person is operable user bound in the important relation people;When detecting operable user of the active user bound in the important relation people, receive the operation that the active user is carried out to the important relation people.The present invention further simultaneously discloses a kind of important relation people secure processing device.

Description

A kind of important relation people method and device of safe processing
Technical field
The present invention relates to communication technical field, more particularly to a kind of important relation people method and device of safe processing.
Background technology
With the fast development and the improvement of people's living standards of the communication technology, the intelligence such as mobile phone, tablet personal computer Energy terminal has obtained widely available in people live, and is increasingly becoming communication or the converter tools of indispensability.It is logical Often, user can by personal information storages such as the name of contact person, telephone numbers in the terminal oneself held, And showed in contacts list form.Wherein, user will can also have in the contacts list with oneself There is the contact person (such as father, mother) of substantial connection or be not intended to contact person's setting that other people know For important contact person (or private contact).But under normal conditions, either terminating machine primary user is still User in addition to owner user, as long as the contacts list opened a terminal, it is possible to check each contact person's bag Include the personal details including name, telephone number etc..In addition, when the communication that user is checked in terminal is remembered During record (such as message registration, short message record), terminal typically will not also be verified to the identity of user, Just directly receive user and check the communications records.So, it is not only important in the contacts list of terminal It is that people's information is easily compromised, and the privacy such as communications records related to important relation people is also easily compromised.
It is also anti-without safety can either be carried out to the important relation people information in contacts list in the prior art Shield, again can be while the method that pair communication privacy related to important relation people is protected, i.e., either join It is that still the communication privacy related to important relation people can not all be had for important relation people information in list The protection of effect.
The content of the invention
In view of this, the embodiment of the present invention is expected to provide a kind of important relation people method and device of safe processing, The important relation people information and the communication privacy related to important relation people in contacts list can be entered simultaneously Row protection.
To reach above-mentioned purpose, the technical proposal of the invention is realized in this way:
The invention provides a kind of important relation people security processing, methods described includes:
Whether the active user that detection sends operation requests to important contact person is bound in the important relation people Operable user;
When detecting operable user of the active user bound in the important relation people, receive institute State the operation that active user is carried out to the important relation people.
It is described to detect whether the active user that operation requests are sent to important contact person is described in such scheme Before operable user bound in important relation people, methods described also includes:
According to the input operation of user, important relation people is selected from contacts list;
Bind the operable user of the selected important relation people;
Gather the biometric information of the operable user bound in the selected important relation people;
Store the selected important relation people and operable bound in the selected important relation people The biometric information of user is to the trusted partition of terminal.
In such scheme, methods described also includes:
Hide information of the selected important relation people in the contacts list in addition to name.
In such scheme, methods described also includes:
According to the biometric information stored in the trusted partition of the terminal, encrypt described selected important Contact person;The biometric information is the biology of the operable user bound with selected important relation people Identification information;
And/or, will be described after the selected important relation people is deleted in the contacts list The deleted important relation people stored in the trusted partition of terminal is arranged by recovering to the contact person Table.
It is described to detect whether the active user that operation requests are sent to important contact person is described in such scheme Operable user bound in important relation people, including:
Detection important contact person is sent operation requests active user biometric information whether with it is described heavy Want the biometric information of operable user bound in contact person consistent;If inconsistent, show described work as Preceding user is not the operable user bound in the important relation people;If consistent, show the current use Family is the operable user bound in the important relation people.
In such scheme, before the operation that the receiving active user is carried out to the important relation people, Methods described also includes:
According to the biometric information stored in the trusted partition of the terminal, the important relation people is decrypted; The biometric information is the biometric information of the operable user bound with important relation people.
In such scheme, methods described also includes:
Hide the record for the operation that the active user is carried out to the important relation people.
Present invention also offers a kind of important relation people secure processing device, including:Detection module, processing mould Block;Wherein,
The detection module, whether the active user for sending operation requests to important contact person for detecting is institute State the operable user bound in important relation people;
The processing module, for detecting that the active user is the important relation when the detection module During operable user bound in people, receive the operation that the active user is carried out to the important relation people.
In such scheme, described device also includes:
Selecting module, for the input operation according to user, selects important relation people from contacts list;
Binding module, the operable user for binding selected important relation people in the selecting module;
Acquisition module, it is operable bound in selected important relation people in the binding module for gathering The biometric information of user;
Memory module, for storing selected important relation people and the acquisition module in the selecting module In operable user bound in selected important relation people biometric information to credible point of terminal Area.
In such scheme, described device also includes:
Hidden module, is arranged for hiding selected important relation people in the selecting module in the contact person Information in table in addition to name.
In such scheme, described device also includes:Encrypting module, and/or recovery module;Wherein,
The encrypting module, for the biometric information stored in the trusted partition according to the terminal, plus Selected important relation people in the close selecting module;The biometric information be with it is selected important The biometric information of the operable user of contact person's binding;
The recovery module, for when in the selecting module selected important relation people in the contact person It is after being deleted in list, the deleted important relation people stored in the trusted partition of the terminal is extensive The multiple extremely contacts list.
In such scheme, the detection module, specifically for:
Detection important contact person is sent operation requests active user biometric information whether with it is described heavy Want the biometric information of operable user bound in contact person consistent;If inconsistent, show described work as Preceding user is not the operable user bound in the important relation people;If consistent, show the current use Family is the operable user bound in the important relation people.
In such scheme, described device also includes:
Deciphering module, for the biometric information stored in the trusted partition according to the terminal, decrypts institute State the important relation people in detection module;The biometric information is operable with important relation people binding The biometric information of user.
In such scheme, the hidden module is additionally operable to:
Hide the record of the operation that active user is carried out to the important relation people in the processing module.
Important relation people method and device of safe processing provided in an embodiment of the present invention, is detected to important contact person Whether the active user for sending operation requests is operable user bound in the important relation people;Work as detection When going out operable user of the active user bound in the important relation people, receive the active user The operation carried out to the important relation people.It so, it is possible to ensure grasping bound in only important relation people Making user can just operate to the important relation people, protect important in the contacts list of terminal It is compromised to be that the privacy such as people's information and the communications records related to important relation people is not easy;Further, root According to the biometric information pair of the operable user bound in the important relation people stored in the trusted partition of terminal Important relation people's information is encrypted, and can further improve the security of important relation people's information;Meanwhile, The biometric information of operable user bound in important relation people information and the important relation people is stored To the trusted partition of terminal, it is ensured that important relation people's information do not allow it is easy to lose, and in the contacts list After important relation people is deleted, the important relation people being deleted in contacts list can be recovered from trusted partition.
Brief description of the drawings
Fig. 1 is the implementation process schematic diagram of important relation people's security processing of the embodiment of the present invention;
Fig. 2 is the specific handling process schematic diagram of the important relation people's security processing of the embodiment of the present invention one;
Fig. 3 is the specific handling process schematic diagram of the important contact person's security processing of the embodiment of the present invention two;
Fig. 4 is the specific handling process schematic diagram of the important contact person's security processing of the embodiment of the present invention three;
Fig. 5 is the composition structural representation of important relation people's secure processing device of the embodiment of the present invention.
Embodiment
A kind of implementation process schematic diagram of important relation people security processing of the embodiment of the present invention, such as Fig. 1 institutes Show, including:
Step 101:Whether the active user that detection sends operation requests to important contact person is described important It is the operable user bound in people;
Specifically, terminal obtains the biometric information for the active user that operation requests are sent to important contact person, And detect the active user biometric information whether with the operable use bound in the important relation people The biometric information at family is consistent;If inconsistent, it is not the important relation people to show the active user Bound operable user;If consistent, it is bound in the important relation people to show the active user Operable user.
Here, the active user can be times in following request to the operation requests that important contact person sends Meaning is a kind of:Request checks that important relation people's information, including request check the telephone number and electricity of important relation people The sub-informations such as sub-voice mailbox address, request check that message registration related to important relation people in terminal and short message are remembered The communications records such as record;Request is communicated with important relation people, such as initiates communication request to important relation people Or the communication request that important relation people initiates is received, the communication request can be called, send letter Breath, transmission file etc. can realize the one or more in the mode of communication;It is important that request recovery is deleted Contact person.
Here, the biometric information can be fingerprint identification information, recognition of face information, personal recognition Information, Application on Voiceprint Recognition information, retina identification information etc. can be as in the biological informations of person identification One or more.For example, when the biometric information is fingerprint identification information and the fingerprint recognition When information is fingerprint template, if terminal detects the finger for the active user that operation requests are sent to important contact person Line template is consistent with the fingerprint template of the operable user bound in the important relation people, then shows described work as Preceding user is the operable user bound in the important relation people;Important contact person is sent out if terminal is detected The fingerprint template for the active user for going out operation requests and the finger of the operable user bound in the important relation people Line template is inconsistent, then it is not the operable user bound in the important relation people to show the active user.
Wherein, before step 101, methods described also includes:
According to the input operation of user, important relation people is selected from contacts list;
Bind the operable user of the selected important relation people;
Gather the biometric information of the operable user bound in the selected important relation people;
Store the selected important relation people and operable bound in the selected important relation people The biometric information of user is to the trusted partition of terminal.
Specifically, terminal is according to input operation of the user based on actual demand, from the contacts list of terminal The contact person of one or more quantity is selected as important relation people, and binds described selected important The operable user of contact person;Terminal utilizes itself embedded biometric information collector set or setting In exterior of terminal and the biometric information collector that is connected with terminal gathers the selected important relation people The biometric information of bound operable user;Selected important relation people information described in terminal storage It is credible with the biometric information of the operable user bound in the selected important relation people to terminal In subregion.
Here, the contacts list can be the energy such as cell phone address book, QQ address lists, wechat address list One or more in the address list of enough storing contact informations;Each contact person bag in the contacts list Contain one kind in the sub-informations such as name, telephone number, E-mail address, work unit, home address Or it is a variety of.
Here, the operable user of the binding selected important relation people refers to that binding can be to quilt The important relation people of selection carries out the user of various operations, such as checks the telephone number of important relation people, connects Receive the communication request of important relation people initiation, check message registration related to important relation people etc..When one Terminal only one of which user's private be the user be terminal owner when, the selected important relation people's can Operation user can bind terminal owner;It is described selected when a terminal has multiple users to be used in conjunction with The operable user of the important relation people selected can bind one or more of multiple users of terminal, Mei Geyong Family can individually bind oneself as the operable user of oneself selected important relation people.
Here, the bio-identification of the operable user bound in the collection selected important relation people Information can be collection fingerprint identification information, recognition of face information, personal recognition information, Application on Voiceprint Recognition information, Retina identification information etc. can be as the one or more in the biological information of person identification;It is described Fingerprint identification information can be fingerprint template, fingerprint character code etc. can identification fingerprint information, the face knows Other information can be face template, and the personal recognition information can be palmmprint template, the Application on Voiceprint Recognition letter Breath can be voice.
Here, it is described to store bound in selected important relation people and the selected important relation people The biometric information of operable user to the purpose of the trusted partition of terminal is:Trusted partition is list in terminal Only security isolation subregion, even if some special circumstances occurs in terminal, is stored in the information in trusted partition It will not lose.For example, when the terminal is mobile phone, after mobile phone factory reset, being stored in mobile phone Information in trusted partition will not lose.
Further, methods described also includes:Collection sends the active user of operation requests to important contact person Biometric information.
Further, methods described also includes:According to the bio-identification stored in the trusted partition of the terminal Information, encrypts the selected important relation people;The biometric information be with it is selected important It is the biometric information of the operable user bound in people.
Here, terminal uses the bio-identification of the operable user bound in the selected important relation people The selected important relation people is encrypted information, is easy to detection current user identities mistake above Journey and follow-up decryption important relation people's information process are united;The encryption is described selected important The purpose for being people is:The difficulty that the criminals such as hacker use information in illegal technical limit spacing terminal is increased, is entered One step protection important relation people's information is not easy compromised.
Here, the terminal uses the biology of the operable user bound in the selected important relation people The process that the selected important relation people is encrypted identification information can be:Terminal binds institute in advance The biometric information of operable user bound in selected important relation people is stated as described selected The encryption information of important relation people, therefore, terminal are acquired bound in the selected important relation people After the biometric information of operable user, the biometric information pair of the operable user just can be utilized Important relation people corresponding with the operable user is encrypted.For example, when terminal gathers operable user Fingerprint template as biometric information when, then using the fingerprint template pair and the operable user Corresponding important relation people is encrypted.
Further, methods described also includes:The selected important relation people is hidden in the contact person Information in list in addition to name.
Specifically, terminal is inquired about according to the important relation people's information stored in the trusted partition and judges connection It is whether contact person in list is the selected important relation people, if it is, in contact person's row Information of the selected important relation people in addition to name is hidden in table, i.e., only by the surname of important relation people Name is shown in contacts list.
Step 102:When detecting that the active user is the operable user bound in the important relation people When, receive the operation that the active user is carried out to the important relation people.
Specifically, when terminal detects described to send operation requests to important contact person and work as in a step 101 The biometric information of preceding user and the biometric information of the operable user bound in the important relation people When consistent, i.e., the described active user that operation requests are sent to important contact person is tied up by the important relation people Fixed operable user, terminal receives the active user please according to the operation sent to the important relation people Ask the operation of progress.
Here, the terminal receives the active user according to the operation requests sent to the important relation people The operation of progress can be any one in following operation:Important relation people's information is checked, including checks weight Want the sub-informations such as the telephone number and E-mail address of contact person, check related to important relation people in terminal Message registration and short message record etc. communications records;People is communicated with important relation, such as to important relation People initiates communication request or receives the communication request that important relation people initiates, and the communication request can be dialled Make a phone call, send information, transmission file etc. and can realize the one or more in the mode of communication;Recover quilt The important relation people of deletion.
Wherein, before the operation that the receiving active user is carried out to the important relation people, the side Method also includes:Decrypt the important relation people.
Specifically, when terminal detects described to send operation requests to important contact person and work as in a step 101 After operable user of the preceding user bound in the important relation people, terminal is utilized in itself trusted partition The important relation people information is decrypted the biometric information of middle storage;The biometric information is The biometric information of the operable user bound with important relation people.
Using operable bound in the important relation people when here, due to important contact person being encrypted The biometric information of user, therefore, is also required to using described important when important contact person is decrypted It is the biometric information of the operable user bound in people.The process of decryption important relation people's information can To be:Terminal using the active user that operation requests are sent to important contact person of acquisition biometric information After detecting the active user for the operable user bound in the important relation people, using can at itself The biometric information of the operable user bound in the important relation people stored in letter subregion is to important It is that people's information is decrypted.Due to using operable use when the important relation people information is encrypted The biometric information at family, therefore, decrypts identification information and encryption institute that the important relation people information needs Stating the identification information used during important relation people's information needs to be identical.For example, terminal is any one in encryption The fingerprint template of the operable user bound in important relation people is used during individual important relation people information, When terminal collects the fingerprint for the active user that the operation requests for checking telephone number are sent to important relation people Template, and detect the fingerprint template of the active user and the operable user bound in important relation people Fingerprint template it is identical when, that is, detect the active user be important relation people operable user, meeting Fingerprint template in trusted partition is stored in information such as the telephone numbers of important relation people using active user It is decrypted.
Wherein, after the operation that the receiving active user is carried out to the important relation people, the side Method also includes:Hide the record for the operation that the active user is carried out to the important relation people.
Specifically, enter when terminal receives the active user according to the operation requests that the important relation people sends After row operation and the operation completion, active user described in terminal automatic hidden enters to the important relation people The record of row operation.For example, active user calls and the call knot to any one important relation people Shu Hou, terminal detects the contact person for important contact person, and the call included in communications records is remembered Record information of the important relation people in addition to name described in automatic hidden.
Here, the note for the operation that active user described in the terminal automatic hidden is carried out to the important relation people The process of record can be:After active user is completed to the operation of important contact person, terminal is according to described credible point The important relation people's information stored in area, inquires about and judges whether the contact person operated by active user is important Contact person, if it is, important relation people's information can be hidden.
Further, methods described also includes:When the selected important relation people arranges in the contact person After being deleted in table, the deleted important relation people stored in the trusted partition of the terminal is recovered To the contacts list.
Here, active user's imprudence will be one or more described selected in the contacts list of the terminal Important relation people delete after, because terminal monitoring active user deletes during active user's using terminal The operation removed, will be automatically by depositing after terminal finds to have important relation people to be deleted in trusted partition The important relation people being deleted described in the Information recovering of storage;Or, terminal is led because of reasons such as factory resets After All Contacts in cause contacts list are deleted, terminal can go inquiry credible automatically after being again started up It whether there is important relation people's information in subregion, if in the presence of all in recovery contacts list to have credible point Important relation people in area, still performs after recovery and hides display.
Based on the mode of above-mentioned several operation requests, this hair is described in detail with specific embodiment below in conjunction with the accompanying drawings Bright various important relation people security processings implement flow.
Embodiment one
The embodiment of the present invention one is checked under the scene of important relation people's information in the operation requests for request, heavy The detailed process of contact person's security processing is wanted, as shown in Fig. 2 comprising the following steps:
Step 201:Active user clicks on the name of important relation people, and the important relation people letter is checked in request Breath, terminal receives the operation requests for checking the important relation people information;
Here, if active user asks with checking telephone number, the E-mail address of any one important relation people During the sub-informations such as location, then the name of the important relation people shown in the contacts list for clicking on terminal;If Message registration related to any one important relation people in terminal, short message record etc. are checked in active user's request During communications records, then the name of the important relation people shown in the communications records for clicking on terminal.
Step 202:Terminal detects whether the active user is operable bound in the important relation people User, if so, then performing step 203;If it is not, then performing step 205;
Specifically, terminal obtains the bio-identification letter that the active user of the important relation people information is checked in request Breath, and detect the active user biometric information whether with grasping bound in the important relation people The biometric information for making user is consistent;If inconsistent, it is not described important to show the active user It is the operable user bound in people, performs step 205;If consistent, it is institute to show the active user The operable user bound in important relation people is stated, step 203 is performed.
Step 203:Terminal deciphering important relation people's information;
Specifically, when terminal detects to ask to check the current of the important relation people information in step 202. After operable user of the user bound in the important relation people, terminal is obtained and is stored in trusted partition Biometric information, and using the biometric information to described in being stored in the trusted partition of terminal Important relation people's information is decrypted;The biometric information is that active user is stored in trusted partition Biometric information.
Step 204:Active user checks important relation people's information;
Here, can be by the decryption after terminal decrypts the important relation people information in step 203 Important relation people presentation of information afterwards is corresponding important in the contacts list of terminal or in communications records It is that at people, active user just can check the important relation people information.In addition, active user has checked described After important relation people's information, the important relation people decrypted in terminal meeting automatic hidden step 203 Name is only shown in information, the contacts list of terminal or in communications records at corresponding important relation people.
Step 205:Terminate the operation requests of analysis active user.
Here, when terminal detects the current use asking to check the important relation people information in step 202. After family is not the operable user bound in the important relation people, active user can not check described important It is people's information, terminates the operation requests that important relation people's information is checked in analysis active user's request.
Illustrate:Assuming that the contact electricity of important relation people " Li Si " is checked in active user " Zhang San " request The sub-informations such as words, E-mail address, then click on the name of " Li Si " in the contacts list of terminal;Eventually After the operation for terminating the name for receiving " Zhang San " click " Li Si ", verification process circle is shown to " Zhang San " Face;" Zhang San " inputs the fingerprint template of oneself at the verification process interface, and terminal receives " Zhang San " in institute State the fingerprint template of verification process interface input;Terminal detection " Zhang San " input fingerprint template whether with " Lee The fingerprint template of operable user bound in four " is consistent, if inconsistent, points out authentication failed and terminates " Zhang San's " checks operation requests, if unanimously, utilizing the fingerprint template of " Zhang San " in trusted partition It will decrypt the information of " Li Si " in the trusted partition of terminal, and by the information of " Li Si " that decrypts Display is into contacts list in the sub-information of " Li Si ";" Zhang San " is clicked in contacts list " Li Si " Sub-information, just can check the sub-informations such as telephone number, the E-mail address of " Li Si ".
Embodiment two
The embodiment of the present invention two initiates the scene of communication request in the operation requests for request to important relation people Under, the detailed process of important relation people's security processing, as shown in figure 3, comprising the following steps:
Step 301:Active user clicks on the name of important relation people, and the important relation people letter is checked in request Breath, terminal receives the operation requests for checking the important relation people information;
Here, due to only showing the name of important relation people in contacts list, and active user needs Initiate that before communication request the contact of the important relation people must be known first to any one important relation people The information such as phone.Therefore, when active user needs the request to check the important relation people information, then click on eventually The name of the important relation people shown in the contacts list at end, terminal will receive active user and look into See the operation requests of the important relation people information.
Step 302:Terminal detects whether the active user is operable bound in the important relation people User, if so, then performing step 303;If it is not, then performing step 305;
Specifically, terminal obtains the bio-identification letter that the active user of the important relation people information is checked in request Breath, and detect the active user biometric information whether with grasping bound in the important relation people The biometric information for making user is consistent;If inconsistent, it is not described important to show the active user It is the operable user bound in people, performs step 305;If consistent, it is institute to show the active user The operable user bound in important relation people is stated, step 303 is performed.
Step 303:Terminal deciphering important relation people's information;
Specifically, when terminal detects to ask to check the current of the important relation people information in step 302 After operable user of the user bound in the important relation people, terminal is obtained and is stored in trusted partition Biometric information, and using the biometric information to described in being stored in the trusted partition of terminal Important relation people's information is decrypted;The biometric information is that active user is stored in trusted partition Biometric information.
Step 304:Active user initiates logical according to the important relation people information to the important relation people Letter request;
Specifically, can be by the solution after terminal decrypts the important relation people information in step 303 Important relation people's presentation of information after close is in contacts list at corresponding important relation people, and active user is just The important relation people information can be checked.The connection for the important relation people that active user goes out according to terminal deciphering It is the information such as phone, communication request is initiated to the important relation people using terminal, it is described to important relation It can call, sent in the modes such as information, transmission file to important relation people that people, which initiates communication request, One or more.
Here, after active user completes the communication with the important relation people, terminal can automatic hidden step In the important relation people information decrypted in 303, the contacts list of terminal and in communications records The name of important relation people is only shown at corresponding important relation people.
Step 305:Terminate the operation requests of analysis active user.
Here, when terminal detects the current use asking to check the important relation people information in step 302 After family is not the operable user bound in the important relation people, active user can not check described important It is people's information, terminates analysis active user and ask to initiate the operation requests of communication to important relation people.
Illustrate:Assuming that active user " Zhang San " asks to call to important relation people " Li Si ", Firstly the need of the telephone number for checking important relation people " Li Si ", then " Lee in the contacts list of terminal is clicked on Four " name;Terminal is received after the operation of the name of " Zhang San " click " Li Si ", to " Zhang San " Show verification process interface;" Zhang San " inputs the face of oneself at the verification process interface, and terminal, which is received, " opens Three " the faces inputted at the verification process interface;Whether the face template of terminal detection " Zhang San " input It is consistent with the face template of the operable user bound in " Li Si ", if inconsistent, point out authentication failed And terminate " Zhang San " check operation requests, if unanimously, utilizing " Zhang San " being stored in trusted partition In face template decrypt the information of " Li Si " from the trusted partition of terminal, and by " Lee decrypted Four " presentation of information is into contacts list in the sub-information of " Li Si ";" Zhang San " clicks on contacts list In " Li Si " sub-information, just can check the telephone number of " Li Si ", and according to the contact of " Li Si " Phone is called using terminal to " Li Si ".
Embodiment three
The embodiment of the present invention three receives the communication request that important relation people initiates in the operation requests for request Under scene, the detailed process of important relation people's security processing, as shown in figure 4, including following step Suddenly:
Step 401:Active user's request receives the communication request that important relation people initiates, and terminal is received please Seek the operation requests for receiving the communication request that important relation people initiates;
Specifically, when terminal shows the communication request of important relation people initiation, active user's request receives institute The communication request of important relation people initiation is stated, terminal will receive active user and receive important relation people initiation Communication request operation requests.
Here, for important relation people initiate communication request, terminal only show the name of important relation people with And the mode of specific communication request;The communication request that the important relation people initiates can be call, The one or more in the mode of communication can be realized by sending information, transmission file etc., corresponding, receive institute State the operation of the communication request of important relation people initiation and include receiving calls, receive information, receive file etc..
Step 402:Whether the active user for the communication request that terminal detection request reception important relation people initiates For the operable user bound in the important relation people, if so, then performing step 403;If it is not, then Perform step 404;
Specifically, terminal obtains the biology that request receives the active user for the communication request that important relation people initiates Identification information, and detect the active user biometric information whether with bound in the important relation people Operable user biometric information it is consistent, if inconsistent, it is not described to show the active user Operable user bound in important relation people, performs step 404;If consistent, show the current use Family is the operable user bound in the important relation people, performs step 403.
Step 403:Terminal receives the operation that the active user receives the communication request that important relation people initiates;
Specifically, when terminal detects that request receives the communication request that important relation people initiates in step 402 Active user for the operable user bound in the important relation people after, receive the active user and connect Receive the operation for the communication request that important relation people initiates.
Step 404:Terminate the operation requests of analysis active user.
Here, when terminal detects that request receives the communication request that important relation people initiates in step 402 After active user is not the operable user bound in the important relation people, active user can not receive described The communication request that important relation people initiates, what end analysis active user request reception important relation people initiated leads to Believe the operation requests of request.
Illustrate:Assuming that the incoming call of important relation people " Li Si " is answered in active user " Zhang San " request, " Zhang San " clicks on the incoming call prompting for answering " Li Si " that terminal is shown first;Terminal is received " Zhang San " Click is answered after the operation of the incoming call of " Li Si ", and verification process interface is shown to " Zhang San ";" Zhang San " exists The verification process interface inputs the palmmprint template of oneself, and terminal receives " Zhang San " in verification process circle The palmmprint template of face input;The palmmprint template of terminal detection " Zhang San " input seems no to be tied up with " Li Si " The palmmprint template of fixed operable user is consistent, if inconsistent, points out authentication failed and terminates " Zhang San " Answer the next electrically operated request of " Li Si ";If consistent, receive " Zhang San " and answer coming for " Li Si " Electricity.
To realize the above method, the embodiment of the present invention additionally provides a kind of important relation people secure processing device, The device can be integrated in terminal, as shown in figure 5, described device includes:Detection module 27, processing mould Block 29;Wherein,
The detection module 27, important contact person is sent for detecting operation requests active user whether be Operable user bound in the important relation people;
The processing module 29, for detecting that the active user is described heavy when the detection module 27 When wanting the operable user bound in contact person, receive what the active user was carried out to the important relation people Operation.
Wherein, the detection module 27, specifically for:Acquisition sends operation requests to important contact person and worked as The biometric information of preceding user, and detect the active user biometric information whether with it is described important The biometric information of operable user bound in contact person is consistent;If inconsistent, show described current User is not the operable user bound in the important relation people;If consistent, show the active user It is the operable user bound in the important relation people.
Here, the active user can be times in following request to the operation requests that important contact person sends Meaning is a kind of:Request checks that important relation people's information, including request check the telephone number and electricity of important relation people The sub-informations such as sub-voice mailbox address, request check that message registration related to important relation people in terminal and short message are remembered The communications records such as record;Request is communicated with important relation people, such as initiates communication request to important relation people Or the communication request that important relation people initiates is received, the communication request can be called, send letter Breath, transmission file etc. can realize the one or more in the mode of communication;It is important that request recovery is deleted Contact person.
Here, the biometric information can be fingerprint identification information, recognition of face information, personal recognition Information, Application on Voiceprint Recognition information, retina identification information etc. can be as in the biological informations of person identification One or more.For example, when the biometric information is fingerprint identification information and the fingerprint recognition When information is fingerprint template, if detection module 27 detects the current use that operation requests are sent to important contact person The fingerprint template at family is consistent with the fingerprint template of the operable user bound in the important relation people, then shows The active user is the operable user bound in the important relation people;If detection module 27 is detected pair Important relation human hair go out the fingerprint template of the active user of operation requests with bound in the important relation people can The fingerprint template of operation user is inconsistent, then it is not bound in the important relation people to show the active user Operable user.
The processing module 29, specifically for:When the detection module 27 detect it is described to important relation Human hair go out the biometric information of the active user of operation requests with it is operable bound in the important relation people When the biometric information of user is consistent, i.e., it is described operation requests are sent to important contact person active user be Operable user bound in the important relation people, receives the active user according to the important relation The operation that the operation requests that people sends are carried out.
Here, it is described to receive the active user according to the operation requests progress sent to the important relation people Operation can be any one in following operation:Important relation people's information is checked, including checks important It is the sub-informations such as the telephone number and E-mail address of people, checks related to important relation people in terminal lead to The communications records such as words record and short message record;People is communicated with important relation, such as to important relation human hair Play communication request or receive the communication request that important relation people initiates, the communication request can dial electricity Words, transmission information, transmission file etc. can realize the one or more in the mode of communication;Recover to be deleted Important relation people.
Further, described device also includes:Selecting module 21, binding module 22, acquisition module 23, Memory module 25;Wherein,
The selecting module 21, for the input operation according to user, selects important from contacts list It is people;
The binding module 22, can for bind selected important relation people in the selecting module 21 Operate user;
The acquisition module 23, is tied up for gathering selected important relation people in the binding module 22 The biometric information of fixed operable user;
The memory module 25, for storing selected important relation people and institute in the selecting module 21 State the biometric information of operable user in acquisition module 23 bound in selected important relation people extremely The trusted partition of terminal.
Wherein, the selecting module 21, specifically for according to input operation of the user based on actual demand, from The contact person of one or more quantity is selected in the contacts list of terminal as important relation people;It is described Contacts list can be that cell phone address book, QQ address lists, wechat address list etc. being capable of storing contact letters One or more in the address list of breath;Each contact person in the contacts list includes name, contact One or more in the sub-informations such as phone, E-mail address, work unit, home address.
The binding module 22, various operations can be carried out specifically for binding to selected important relation people User, such as check the telephone number of important relation people, receive communication request that important relation people initiates, Check message registration related to important relation people etc..When terminal only one of which user's private is the user During for terminal owner, the operable user of the selected important relation people can bind terminal owner; When a terminal has multiple users to be used in conjunction with, the operable user of the selected important relation people can One or more of multiple users of terminal are bound, each user can individually bind oneself as selected by oneself The operable user of the important relation people selected.
The acquisition module 23, specifically for being gathered using the embedded biometric information set of terminal itself Device or the biometric information collector for being arranged at exterior of terminal and being connected with terminal gather the binding module The biometric information of operable user in 22 bound in selected important relation people;The bio-identification Information can be fingerprint identification information, recognition of face information, personal recognition information, Application on Voiceprint Recognition information, regard Nethike embrane identification information etc. can be as the one or more in the biological information of person identification;It is described to refer to Line identification information can be fingerprint template, fingerprint character code etc. can identification fingerprint information, the recognition of face Information can be face template, and the personal recognition information can be palmmprint template, the Application on Voiceprint Recognition information It can be voice.
The memory module 25, specifically for storing selected important relation people in the selecting module 21 The biological knowledge of operable user in information and the acquisition module 23 bound in selected important relation people Other information is into the trusted partition of terminal;It is described to store the selected important relation people and described selected Important relation people bound in operable user biometric information to the trusted partition of terminal purpose It is:Trusted partition is single security isolation subregion in terminal, even if some special circumstances occurs in terminal, is deposited The information stored up in trusted partition will not also lose.For example, when the terminal is mobile phone, mobile phone is recovered After factory is set, the information being stored in trusted partition will not lose.
Here, the acquisition module 23, is additionally operable to the current use that collection sends operation requests to important contact person The biometric information at family, and the biometric information of the active user is sent to detection module 27;It is right Answer, the detection module 27 is additionally operable to receive the described to important contact person of the transmission of acquisition module 23 Send the biometric information of the active user of operation requests.
Further, described device also includes:Encrypting module 24, for the trusted partition according to the terminal The biometric information of middle storage, encrypts selected important relation people in the selecting module 21;The life Thing identification information is the biometric information of the operable user bound with selected important relation people.
The encrypting module 24, specifically for storing the selecting module 21 in the memory module 25 in quilt It is operable bound in selected important relation people in the important relation people of selection and the binding module 22 After the biometric information of user to the trusted partition of terminal, stored according in the trusted partition of the terminal Selected important relation people bound in operable user biometric information, encrypt it is described be chosen Important relation people.
Here, the selected important relation people that encrypting module 24 is gathered using the acquisition module 23 The selected important relation people is encrypted the biometric information of bound operable user, just In by above detection current user identities process and follow-up decryption important relation people information process uniformly Come;The purpose of the encryption selected important relation people is:The criminals such as hacker are increased using non- Law technology obtains the difficulty of information in terminal, and further protection important relation people's information is not easy compromised.
Here, the encrypting module 24 is using the described selected important of the acquisition module 23 collection It is that the selected important relation people is encrypted for the biometric information of operable user bound in people Process can be:Binding module 22 is bound operable bound in the selected important relation people in advance Therefore the biometric information of user, gathers mould as the encryption information of the selected important relation people Block 23 is acquired after the biometric information of the operable user bound in the selected important relation people, Encrypting module 24 just can utilize the biometric information pair of the operable user and the operable user Corresponding important relation people is encrypted.For example, when acquisition module 23 gathers any one operable user's When fingerprint template is as biometric information, then encrypting module 24 using the fingerprint template pair with it is described can The corresponding important relation people of operation user is encrypted.
Further, described device also includes:Hidden module 26, for hiding in the selecting module 21 Information of the selected important relation people in the contacts list in addition to name.
The hidden module 26, specifically for according to the important relation people's information stored in the trusted partition, Inquire about and judge whether the contact person in contacts list is the selected important relation people, if it is, Information of the selected important relation people in addition to name is then hidden in contacts list, i.e., only will weight The name of contact person is wanted to be shown in contacts list.
Further, described device also includes:Deciphering module 28, for the trusted partition according to the terminal The biometric information of middle storage, the important relation people for decrypting the detection module 27;The bio-identification letter Cease the biometric information of the operable user to be bound with important relation people.
The deciphering module 28, specifically for when the detection module 27 detect it is described to important contact person Send after operable user of the active user of operation requests bound in the important relation people, utilize institute The biometric information of the operable user bound in important relation people stored in the trusted partition for stating terminal, The important relation people information being stored in the trusted partition of terminal is decrypted.
Here, the important relation people is used when important contact person being encrypted due to encrypting module 24 The biometric information of bound operable user, therefore, is also required to when important contact person is decrypted Using the biometric information of the operable user bound in the important relation people.The decryption important relation The process of people's information can be:Detection module 27 sends operation requests to important contact person using acquisition and worked as The biometric information of preceding user detects that the active user is operable bound in the important relation people After user, deciphering module 28 is stored using acquisition to the active user that important contact person sends operation requests Biometric information in the trusted partition of terminal, to the important relation people's information being stored in trusted partition It is decrypted.Due to using the biology of operable user when the important relation people information is encrypted Identification information, therefore, the identification information for decrypting the important relation people information needs are described important with encrypting The identification information used when being people's information needs to be identical.For example, encrypting module 24 is encrypting any one The fingerprint template of the operable user bound in important relation people is used during important relation people's information, when Acquisition module 23 collects the active user that the operation requests for checking telephone number are sent to important relation people Fingerprint template, detection module 27 detects that the fingerprint template of the active user and important relation people are tied up When the fingerprint template of fixed operable user is identical, that is, it is important relation people's to detect the active user Operable user, deciphering module 28 can be stored in the biological fingerprint template of trusted partition using the active user The information such as the telephone number to important relation people are decrypted.
The hidden module 26, is additionally operable to hide the operation that the active user carries out the important relation people Record.
The hidden module 26, specifically for receiving the active user according to right when the processing module 29 After the operation and the operation that the operation requests that the important relation people sends are carried out are completed, automatic hidden institute State the record that active user is operated to the important relation people.For example, active user is heavy to any one Want contact person to call and after the end of conversation, hidden module 26 can judge this conversation object whether be Important relation people, if it is, important described in the message registration automatic hidden included in communications records Information of the contact person in addition to name.
Here, the behaviour that active user described in the automatic hidden of hidden module 26 is carried out to the important relation people The process of the record of work can be:After active user is completed to the operation of important contact person, hidden module 26 According to the important relation people's information stored in the trusted partition, inquire about and judge the connection operated by active user It is whether people is important contact person, if it is, important relation people's information can be hidden.
Further, described device also includes:Recovery module 30, for when quilt in the selecting module 21 After the important relation people of selection is deleted in the contacts list, it will be deposited in the trusted partition of the terminal The deleted important relation people of storage recovers to the contacts list.
Here, active user's imprudence will be one or more described selected in the contacts list of the terminal Important relation people delete after, due to the terminal monitoring active user during active user's using terminal Operation, after terminal finds to have important relation people to be deleted, will inquire about stored in trusted partition important Associated person information, and recover the deleted important relation people into contacts list;Or, terminal because The reasons such as factory reset cause after All Contacts in contacts list are deleted, and terminal is opened again It can go in inquiry trusted partition to whether there is important relation people's information automatically after dynamic, if in the presence of recovery contact person All important relation people being stored in trusted partition in list, still perform after recovery and hide display.
In actual applications, the selecting module 21, binding module 22, acquisition module 23, encrypting module 24th, memory module 25, hidden module 26, detection module 27, deciphering module 28, processing module 29, extensive Multiple module 30 can be by the central processing unit (CPU) positioned at terminal, microprocessor (MPU), numeral Signal processor (DSP) or field programmable gate array (FPGA) etc. are realized.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the protection model of the present invention Enclose.All any modifications, equivalent substitutions and improvements made within the spirit and scope of the present invention etc., are wrapped It is contained within protection scope of the present invention.

Claims (14)

1. a kind of important relation people security processing, it is characterised in that this method includes:
Whether the active user that detection sends operation requests to important contact person is bound in the important relation people Operable user;
When detecting operable user of the active user bound in the important relation people, receive institute State the operation that active user is carried out to the important relation people.
2. according to the method described in claim 1, it is characterised in that the detection is sent out important contact person Before whether the active user for going out operation requests is operable user bound in the important relation people, the party Method also includes:
According to the input operation of user, important relation people is selected from contacts list;
Bind the operable user of the selected important relation people;
Gather the biometric information of the operable user bound in the selected important relation people;
Store the selected important relation people and operable bound in the selected important relation people The biometric information of user is to the trusted partition of terminal.
3. method according to claim 2, it is characterised in that this method also includes:Hide described Information of the selected important relation people in the contacts list in addition to name.
4. method according to claim 2, it is characterised in that this method also includes:
According to the biometric information stored in the trusted partition of the terminal, encrypt described selected important Contact person;The biometric information is the biology of the operable user bound with selected important relation people Identification information;
And/or, will be described after the selected important relation people is deleted in the contacts list The deleted important relation people stored in the trusted partition of terminal is arranged by recovering to the contact person Table.
5. according to the method described in claim 1, it is characterised in that the detection is sent out important contact person Whether the active user for going out operation requests is operable user bound in the important relation people, including:
Detection important contact person is sent operation requests active user biometric information whether with it is described heavy Want the biometric information of operable user bound in contact person consistent;If inconsistent, show described work as Preceding user is not the operable user bound in the important relation people;If consistent, show the current use Family is the operable user bound in the important relation people.
6. according to the method described in claim 1, it is characterised in that described to receive the active user couple Before the operation that the important relation people is carried out, this method also includes:According in the trusted partition of the terminal The biometric information of storage, decrypts the important relation people;The biometric information is and important relation The biometric information of the operable user of people's binding.
7. according to the method described in claim 1, it is characterised in that this method also includes:Hide described The record for the operation that active user is carried out to the important relation people.
8. a kind of important relation people secure processing device, it is characterised in that the device includes:Detection module, Processing module;Wherein,
The detection module, whether the active user for sending operation requests to important contact person for detecting is institute State the operable user bound in important relation people;
The processing module, for detecting that the active user is the important relation when the detection module During operable user bound in people, receive the operation that the active user is carried out to the important relation people.
9. device according to claim 8, it is characterised in that the device also includes:
Selecting module, for the input operation according to user, selects important relation people from contacts list;
Binding module, the operable user for binding selected important relation people in the selecting module;
Acquisition module, it is operable bound in selected important relation people in the binding module for gathering The biometric information of user;
Memory module, for storing selected important relation people and the acquisition module in the selecting module In operable user bound in selected important relation people biometric information to credible point of terminal Area.
10. device according to claim 9, it is characterised in that the device also includes:Hidden module, For hiding in the selecting module selected important relation people in the contacts list in addition to name Information.
11. device according to claim 9, it is characterised in that the device also includes:Encrypting module, And/or recovery module;Wherein,
The encrypting module, for the biometric information stored in the trusted partition according to the terminal, plus Selected important relation people in the close selecting module;The biometric information be with it is selected important The biometric information of the operable user of contact person's binding;
The recovery module, for when in the selecting module selected important relation people in the contact person It is after being deleted in list, the deleted important relation people stored in the trusted partition of the terminal is extensive The multiple extremely contacts list.
12. device according to claim 8, it is characterised in that the detection module, specifically for:
Detection important contact person is sent operation requests active user biometric information whether with it is described heavy Want the biometric information of operable user bound in contact person consistent;If inconsistent, show described work as Preceding user is not the operable user bound in the important relation people;If consistent, show the current use Family is the operable user bound in the important relation people.
13. device according to claim 8, it is characterised in that the device also includes:Deciphering module, For the biometric information stored in the trusted partition according to the terminal, decrypt in the detection module Important relation people;The biometric information is the bio-identification of the operable user bound with important relation people Information.
14. device according to claim 10, it is characterised in that the hidden module, is additionally operable to Hide the record of the operation that active user is carried out to the important relation people in the processing module.
CN201610263929.2A 2016-04-25 2016-04-25 A kind of important relation people method and device of safe processing Pending CN107306305A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610263929.2A CN107306305A (en) 2016-04-25 2016-04-25 A kind of important relation people method and device of safe processing
PCT/CN2016/104072 WO2017185704A1 (en) 2016-04-25 2016-10-31 Method and device for secure processing of important contact

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610263929.2A CN107306305A (en) 2016-04-25 2016-04-25 A kind of important relation people method and device of safe processing

Publications (1)

Publication Number Publication Date
CN107306305A true CN107306305A (en) 2017-10-31

Family

ID=60150593

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610263929.2A Pending CN107306305A (en) 2016-04-25 2016-04-25 A kind of important relation people method and device of safe processing

Country Status (2)

Country Link
CN (1) CN107306305A (en)
WO (1) WO2017185704A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345789A (en) * 2008-08-27 2009-01-14 宇龙计算机通信科技(深圳)有限公司 Secrecy method and apparatus for mobile terminal, and mobile terminal
CN102004703A (en) * 2009-08-31 2011-04-06 比亚迪股份有限公司 Method and system for protecting data
KR20130053838A (en) * 2011-11-16 2013-05-24 한국전자통신연구원 Strongness of tie evalution apparatus and method
CN102917098A (en) * 2012-10-17 2013-02-06 广东欧珀移动通信有限公司 Method and device for preventing important linkman from being wrongly deleted
CN104657674B (en) * 2015-01-16 2018-02-23 北京邮电大学 The insulation blocking system and method for private data in a kind of mobile phone

Also Published As

Publication number Publication date
WO2017185704A1 (en) 2017-11-02

Similar Documents

Publication Publication Date Title
WO2015117333A1 (en) Information processing method and apparatus, encryption device and computer storage medium
CN103186761B (en) The fingerprint encryption method and its communication terminal of secret file
CN108200093B (en) Encryption and decryption method and encryption and decryption device for transmission file
CN104618579A (en) Mobile terminal and touch calling method thereof
CN104038613B (en) The method and apparatus of information security management
EP3352528A1 (en) Remote control method and apparatus and mobile terminal
WO2015158043A1 (en) Method, terminal and system for protecting terminal security
CN105025146A (en) Incoming call answering control method, system and mobile terminal
CN104270517A (en) Information encryption method and mobile terminal
CN105472093B (en) Mobile terminal call answers method for authenticating and mobile terminal
CN107563712A (en) A kind of mobile terminal punch card method, device, equipment and system
CN105447365B (en) A kind of method for secret protection and user terminal based on control
WO2016045464A1 (en) Decryption method and mobile terminal
CN107196917A (en) A kind of service response method and its middleware
CN106301767A (en) The processing method of a kind of speech scrambling, device, terminal and KMC
CN103077357A (en) Method for storing private files
CN104462945A (en) Monitoring method of terminal and monitoring device of terminal
CN106303085B (en) Mobile terminal and method and device for secure call
US7177425B2 (en) Device and method for securing information associated with a subscriber in a communication apparatus
CN105787319A (en) Iris recognition-based portable terminal and method for same
EP2911087A1 (en) Method, device and apparatus for storing and reading data
US20230370463A1 (en) Air gap-based network isolation device
CN107306305A (en) A kind of important relation people method and device of safe processing
CN105430150B (en) Method and device for realizing safe call
CN106357413A (en) Method for encrypting numbers with fingerprint and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20171031

WD01 Invention patent application deemed withdrawn after publication