CN108206892A - Guard method, device, mobile terminal and the storage medium of contact person's privacy - Google Patents
Guard method, device, mobile terminal and the storage medium of contact person's privacy Download PDFInfo
- Publication number
- CN108206892A CN108206892A CN201711483113.1A CN201711483113A CN108206892A CN 108206892 A CN108206892 A CN 108206892A CN 201711483113 A CN201711483113 A CN 201711483113A CN 108206892 A CN108206892 A CN 108206892A
- Authority
- CN
- China
- Prior art keywords
- password
- contact person
- user
- information
- contact
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72469—User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
Abstract
An embodiment of the present invention provides a kind of guard method, device, mobile terminal and the storage mediums of contact person's privacy, belong to technical field of mobile terminals.The guard method of contact person's privacy includes:Receive the information related with contact person checks instruction;Verify the level password and secondary password of user;When the level password of user be verified but the secondary password of user verification not by when, obtain the grade belonging to the contact person;When the grade of acquisition is private contact, by the Information hiding related with the contact person.The application is authenticated the identity of user by double code; when level password is verified; represent that the user has the permission using the mobile terminal; when secondary password verification also by when; the user is represented as owner, only in the case where determining that user is owner, is just opened and the relevant information of All Contacts; this programme can preferably protect the privacy with the relevant information of private contact, preferably protection user.
Description
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of guard method, device, the shifting of contact person's privacy
Dynamic terminal and storage medium.
Background technology
Present user increasingly takes a fancy to individual privacy, and is used as in application program or cell phone address book and contact person's phase
The chat record of pass either message registration, usually user need most the place of secrecy, protect user private contact and
Social activity record is again into an important function.
The hiding defencive function of current all mobile phones is all fairly simple, generally by the close of one solution lock screen of setting
Code, cannot then protect related to the contact person of user after lock screen is solved in the case where others knows oneself password
Privacy, such as chat record, contact data etc..A kind of demand that is more perfect, more considering user is needed at present
Scheme protects the privacy of user.
Invention content
In view of this, the purpose of the present invention is to provide a kind of guard method of contact person's privacy, device, mobile terminal and
Storage medium can preferably protect the privacy with the relevant information of contact person.
Technical solution is as follows used by the present invention solves above-mentioned technical problem:
According to an aspect of the present invention, the guard method of a kind of contact person's privacy provided, this method include:
Receive the information related with contact person checks instruction;
Verify the level password and secondary password of user;
When the level password of user be verified but the secondary password of user verification not by when, obtain belonging to the contact person
Grade;
When the grade of acquisition is private contact, by the Information hiding related with the contact person.
In one of which embodiment, this method further includes:
When the level password of user is verified and the secondary password of user is also verified, all be somebody's turn to do with contacting is opened
The permission of the related information of people.
In one of which embodiment, this method further includes:
When the level password is verified, the real-time verification secondary password;
It, will be with this when the verification result and the result of secondary password last time verification of the secondary password differ
The permission of the related information of private contact carries out corresponding switching.
In one of which embodiment, which includes the biological information of user;The verification two level is close
The step of code, includes:
The biological information of the user is acquired by way of hiding;
The biological information of acquisition with the biological information to prestore is matched, if successful match, is judged
The secondary password is verified, and otherwise, judges that secondary password verification does not pass through.
In one of which embodiment, information that should be related with contact person includes at least one of situations below:
What the associated person information and the chat record of the contact person for being stored in address list, the contact person received sent
Data, the sectional drawing with the chat record of the contact person.
In one of which embodiment, which is the password of character types or biological information password.
According to another aspect of the present invention, the protective device of a kind of contact person's privacy provided, the device include:
Command reception module checks instruction for the reception information related with contact person;
Authentication module, for verifying the level password of user and secondary password;
Grade acquisition module, the level password for working as user is verified but the verification of the secondary password of user does not pass through
When, obtain the grade belonging to the contact person;
Hidden module, for when the grade of acquisition be private contact when, by the Information hiding related with the contact person.
In one of which embodiment, which is additionally operable to when the level password is verified, real-time verification
The secondary password;
The device further includes:
Permission handover module, for working as the verification result of the secondary password and the knot of secondary password last time verification
When fruit differs, the permission of the information related with the private contact is subjected to corresponding switching.
According to a further aspect of the invention, a kind of mobile terminal provided is deposited including memory, processor and being stored in
On reservoir and the computer program that can run on a processor, the processor realize above-mentioned contact person's privacy when performing the program
Guard method.
According to a further aspect of the invention, a kind of computer readable storage medium provided, is stored thereon with computer
Program, the program realize the step in the guard method of above-mentioned contact person's privacy when being executed by processor.
Guard method, device, mobile terminal and the storage medium of a kind of contact person's privacy provided in an embodiment of the present invention lead to
Setting level password and secondary password are crossed, is receiving when checking instruction of the information related with contact person, judges that the level-one is close
Whether code and secondary password are verified, and open all information related with contact person to user if being verified, if
Level password is verified secondary password verification and does not pass through, then will pass through in the relevant Information hiding of private contact, this programme
Double code is authenticated the identity of user, and when level password is verified, it is whole using the movement to represent that the user has
The permission at end, when secondary password verification also by when, represent that the user for owner, is only determining that user is owner's sheet
In the case of people, just open with the relevant information of All Contacts, this programme can preferably be protected related to private contact
Information, preferably protect user privacy.
Description of the drawings
Fig. 1 to realize the present invention in each embodiment a kind of mobile terminal hardware architecture diagram;
Fig. 2 is according to a kind of communications network system Organization Chart provided in an embodiment of the present invention;
Fig. 3 is the flow chart according to the guard method of contact person's privacy of one embodiment of the present of invention;
Fig. 4 is the interface usage scenario schematic diagram according to one embodiment of the present of invention;
Fig. 5 is the interface usage scenario schematic diagram according to another embodiment of the present invention;
Fig. 6 is the interface usage scenario schematic diagram according to another embodiment of the present invention;
Fig. 7 is the flow chart according to the guard method of contact person's privacy of another embodiment of the present invention;
Fig. 8 is the exemplary block diagram according to the protective device of contact person's privacy of one embodiment of the present of invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
In order to make technical problems, technical solutions and advantages to be solved clearer, clear, tie below
Drawings and examples are closed, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only
To explain the present invention, it is not intended to limit the present invention.
In subsequent description, using for representing that the suffix of such as " module ", " component " or " unit " of element is only
Be conducive to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention can include such as mobile phone, tablet
Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
The shiftings such as media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer
The dynamic fixed terminals such as terminal and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special
For moving except the element of purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware architecture diagram of its mobile terminal of each embodiment to realize the present invention, the shifting
Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103rd, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit
108th, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not form the restriction to mobile terminal, and mobile terminal can be included than illustrating more or fewer components,
Either combine certain components or different components arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receive and send messages or communication process in, signal sends and receivees, specifically, by base station
Downlink information receive after, handled to processor 110;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, it penetrates
Frequency unit 101 can also communicate with network and other equipment by radio communication.Above-mentioned wireless communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, and must be configured into for mobile terminal is not belonging to, it completely can be according to need
It to be omitted in the range for the essence for not changing invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
Formula, speech recognition mode, broadcast reception mode when under isotypes, it is that radio frequency unit 101 or WiFi module 102 are received or
The audio data stored in memory 109 is converted into audio signal and exports as sound.Moreover, audio output unit 103
The relevant audio output of specific function performed with mobile terminal 100 can also be provided (for example, call signal receives sound, disappears
Breath receives sound etc.).Audio output unit 103 can include loud speaker, buzzer etc..
A/V input units 104 are used to receive audio or video signal.A/V input units 104 can include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the static images or the image data of video obtained in image capture mode by image capture apparatus (such as camera) carry out
Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited
Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can
To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition)
The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, size and the direction of gravity are can detect that when static, can be used to identify the application of mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared ray sensor, details are not described herein.
Display unit 106 is used to show by information input by user or be supplied to the information of user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used
Display panel 1061 is configured in forms such as (Organic Light-Emitting Diode, OLED).
User input unit 107 can be used for receiving the number inputted or character information and generation and the use of mobile terminal
The key signals input that family is set and function control is related.Specifically, user input unit 107 may include touch panel 1071 with
And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect user on it or neighbouring touch operation
(for example user uses any suitable objects such as finger, stylus or attachment on touch panel 1071 or in touch panel 1071
Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
Contact coordinate is converted into, then gives processor 110, and the order that processor 110 is sent can be received and performed.It in addition, can
To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
It includes but is not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc.
It is one or more, do not limit herein specifically.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel
1061 be the component independent as two to realize the function that outputs and inputs of mobile terminal, but in certain embodiments, it can
The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically
It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example,
External device (ED) can include wired or wireless head-band earphone port, external power supply (or battery charger) port, wired or nothing
Line data port, memory card port, the port for device of the connection with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area
And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection
A part is stored in storage by running or performing the software program being stored in memory 109 and/or module and call
Data in device 109 perform the various functions of mobile terminal and processing data, so as to carry out integral monitoring to mobile terminal.Place
Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated
Device is managed, wherein, the main processing operation system of application processor, user interface and application program etc., modem processor is main
Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
For the ease of understanding the embodiment of the present invention, below to the communications network system that is based on of mobile terminal of the present invention into
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system
The LTE system united as universal mobile communications technology, the LTE system include the UE (User Equipment, the use that communicate connection successively
Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers
Such as the function of home location register (not shown) etc, and some are preserved in relation to use such as service features, data rates
The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201
Address is distributed and other functions, and PCRF2036 is business data flow and the strategy of IP bearing resources and charging control strategic decision-making
Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And following new network system etc., it does not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the method for the present invention is proposed.
Fig. 3 is according to the flow chart of the guard method of contact person's privacy of one embodiment of the present of invention, with reference to Fig. 3
It is described in detail the guard method of contact person's privacy according to an embodiment of the invention, this method is applied to mobile terminal,
The mobile terminal includes but not limited to the smart electronics such as mobile phone, tablet computer, laptop, as shown in figure 3, the contact person is hidden
Private guard method includes the following steps S301 to S304.
S301, the reception information related with contact person check instruction.
According to the present embodiment example, which can be the contact person in cell phone address book or
The contact person in address list in tripartite's application program, the third party application include but not limited to the chat work such as wechat, QQ
Tool.
According to the present embodiment example, the information related with contact person is included in situations below at least in the step
It is a kind of:
The associated person information that is stored in address list, with the short message record of the contact person, message registration, chat record, connect
The data and the sectional drawing of the chat record of the contact person that the contact person received sends.
According to the present embodiment example, when the information related with contact person includes and the chat record of the contact person
During sectional drawing, the sectional drawing can be associated with corresponding private contact in the following manner:
When receiving sectional drawing instruction, the contact person in the interface of mobile terminal is identified;
When the contact artificially pre-set private contact of identification, the picture for judging interception is and secret
The related information of contact person.
When the information related with contact person includes the data that the contact person received sends, can sentence in the following manner
Whether the disconnected data sent are the information related with private contact:
When receiving the data that contact person sends, whether the contact person for judging to send the data is private contact,
If so, judge the data for the information related with private contact.
According to the present embodiment example, the data which sends include but not limited to picture, video, with attachment
File, compressed package etc. existing for form.
According to the present embodiment example, instruction can receive cell phone address book to be clicked to checking in the step
Instruction or the instruction that is clicked of preset third party application, in this embodiment, which application program can relate to
And user oneself is needed to determine to the private data of user, such as user can set cell phone address book, QQ and/or wechat conduct
The preset third party application, and after program is entered, certain contact persons therein are set as private contact.
S302, the level password and secondary password for verifying user.
According to the present embodiment example, the level password can be character types password or biological information it is close
Code, which can be the biological information password of user.
Wherein, which is the password that user inputs in unlock interface, can be numerical ciphers, letter code, number
The combination pin of word and letter, finger-print cipher, iris password, face feature information password etc., when level password verification is logical
It is out-of-date, represent that the user has the permission using the mobile terminal, when the secondary password is also verified, it is machine to represent the user
Master is in person.
The secondary password can be the finger-print cipher of user, iris feature password or face feature information password.
S303, when the level password of user be verified but the secondary password of user verification not by when, obtain the contact
Grade belonging to people.
In this embodiment, the grade belonging to contact person includes this grade of private contact and ordinary contacts this is first-class
Grade.
According to the present embodiment example, need that contact person is classified as ordinary contacts or secret contact in advance
The contact person of need for confidentiality can be set secret label, all secret labels of being equipped with by people, in this embodiment, user
Contact person is classified as private contact, and all contact persons that the secret label is not set are classified as commonly contacting automatically
People.
S304, when acquisition the grade be private contact when, by the Information hiding related with the contact person.
According to the present embodiment example, corresponding to the related information of the private contact processing mode be not limited to by
Corresponding Information hiding can also be handled by encrypted mode, and encrypted file is stored in preset file.
In one of which embodiment, this method further includes:
When the level password of user is verified and the secondary password of user is also verified, all be somebody's turn to do with contacting is opened
The permission of the related information of people.
In one of which embodiment, this method further includes:
When the level password is verified, the real-time verification secondary password;
It, will be with this when the verification result and the result of secondary password last time verification of the secondary password differ
The permission of the related information of private contact carries out corresponding switching.
According to the present embodiment example, this method further includes:
When the level password is verified, the secondary password is verified at interval of the preset time cycle;
It, will be with this when the verification result and the result of secondary password last time verification of the secondary password differ
The permission of the related information of private contact carries out corresponding switching.
According to the present embodiment example, by taking the contact person shown in address list as an example, the timetable behind contact person
Show the last time contacted with the contact person, wherein, contact person " Wang Ming " and " Liu Xia " they are preset private contact, are schemed
5 be the interface usage scenario schematic diagram according to another embodiment of the present invention, will be all when the secondary password is verified
It is that people shows, when verifying that the secondary password but the secondary password are not verified again, as shown in fig. 6, by private contact
" Wang Ming " and " Liu Xia " is hidden automatically.
In this embodiment, which can be one minute, above-mentioned that the secondary password is tested in real time
It, can be most fast when the mode of card can preferably ensure that the user of mobile terminal is used alternatingly among different users
Whether be owner, so as to be protected to greatest extent to the privacy contact of user, to this in the embodiment if recognizing
Secondary password can save mobile terminal to a certain extent by way of being verified at interval of the preset time cycle
Electricity improves the cruise duration of the mobile terminal.
The present embodiment checks finger by setting level password and secondary password, receive the information related with contact person
When enabling, judge whether the level password and secondary password are verified, opened if being verified to user and contact person
Related all information, if level password is verified secondary password, verification does not pass through, will be in the relevant letter of private contact
Breath is hidden, and this programme is authenticated the identity of user by double code, when level password is verified, represents the user
With the permission for using the mobile terminal, when secondary password verification also by when, the user is represented as owner, only true
Just open with the relevant information of All Contacts in the case of determining user and being owner, this programme can be protected preferably
With the relevant information of private contact, the privacy of user is preferably protected.
Fig. 7 is according to the flow chart of the guard method of contact person's privacy of another embodiment of the present invention, with reference to Fig. 7
Be described in detail the guard method of contact person's privacy according to another embodiment of the present invention, as shown in fig. 7, this method including
On the basis of above-mentioned steps S301, S303 and S304, which includes the biological information of user, above-mentioned steps S302
Further comprise:
S701, the level password for verifying user.
The level password is the password that user inputs in unlock interface, can be numerical ciphers, letter code, number and word
Female combination pin, finger-print cipher, iris password, face feature information password etc., when the level password is verified, table
Show that the user has the permission using the mobile terminal, Fig. 4 is the interface usage scenario signal according to one embodiment of the present of invention
Figure, verifies that the usage scenario of the level password is as shown in Figure 4.
If S702, the level password are verified, the biological information of the user is acquired by way of hiding.
Secondary password is defined to the biological information password of user by the present embodiment, when the secondary password is also verified
When, it is owner to represent the user.
The secondary password can be the finger-print cipher of user, iris feature password or face feature information password.
Fingerprint almost becomes the code name of living things feature recognition since it is with unchangeable property, uniqueness and convenience
Word.Fingerprint refers to the convex recessed uneven streakline generated of the positive surface skin of the finger tips of people.The regular arrangement form of streakline is different
Line type.The details of starting point, terminal, binding site and the bifurcation, referred to as fingerprint of streakline.Fingerprint recognition refers to and passes through ratio
The details of more different fingerprints are differentiated.Fingerprint identification technology is related to image procossing, pattern-recognition, computer regard
Numerous subjects such as feel, mathematical morphology, wavelet analysis.Since everyone fingerprint is different, be exactly the ten of same people refer between, refer to
Line also has significant difference, therefore fingerprint can be used for identity authentication.Due to each stamp orientation not exclusively, impetus is different
Different degrees of deformation can be brought, and there is largely fuzzy fingerprint, how correctly to extract feature and realizes correct matching, is fingerprint
The key of identification technology.The fingerprint of user is compared in the technology for having had comparative maturity at present, determines whether user's sheet
People.
Iris recognition technology is to carry out identification based on the iris in eyes, and the eye structure of people is by sclera, iris, pupil
The part such as hole crystalline lens, retina forms.Iris is the annular formations between black pupil and white sclera, it includes
There is the minutia of many interlaced spot, filament, coronal, striped, crypts etc..And iris is in prenatal development stage shape
Cheng Hou will be to maintain constant in entire life course.These features determine the uniqueness of iris feature, while also determine
The uniqueness of identification.Therefore, iris can be passed through using the iris feature of eyes as everyone identification object
It may also determine whether as owner.
Face feature information identification is also referred to as recognition of face, is that the facial feature information based on people carries out the one of identification
Kind biological identification technology.Image or video flowing containing face with video camera or camera acquisition, and detect in the picture automatically
And track human faces, and then the face to detecting carries out a series of the relevant technologies of face, usually also referred to as Identification of Images, face
Identification.
Current facial recognition techniques are the multiple light courcess face recognition technologies based on active near-infrared image.It can overcome
The influence of light variation, has been achieved for remarkable recognition performance, the overall system performance in terms of precision, stability and speed
More than 3-D view recognition of face.This technology was quickly grown at nearly 1 year, and face recognition technology is made gradually to move towards practical.
Other biological characteristics of face and human body (fingerprint, iris etc.) are equally inherent, its uniqueness and be not easy by
The superperformance of duplication for identity discriminating provides necessary premise, compared with other types of bio-identification recognition of face have
Following features:
It is non-imposed:User does not need to specially coordinate face collecting device, almost can in the state of unconscious
Facial image is obtained, such sampling mode does not have " mandatory ";
It is untouchable:User does not need to be in direct contact with regard to that can obtain facial image with equipment;
Concurrency:The sorting, judgement and identification of multiple faces can be carried out under practical application scene;
In addition to this, it also is compliant with visual characteristic:The characteristic of " knowing people with looks " and easy to operate, visual result, concealment
The features such as good.
S703, the biological information of acquisition is matched with the biological information to prestore, if successful match,
Judge that the secondary password is verified, otherwise, judge that secondary password verification does not pass through.
Fig. 5 is the interface usage scenario schematic diagram according to another embodiment of the present invention, and Fig. 6 is according to the another of the present invention
The interface usage scenario schematic diagram of embodiment, by taking the contact person shown in address list as an example, the time behind contact person represents most
The nearly time once contacted with the contact person, wherein, contact person " Wang Ming " and " Liu Xia " are preset private contact, when this two
Grade password authentification not by when, the interface schematic diagram of display as shown in fig. 6, by private contact " Wang Ming " and " Liu Xia " automatically into
Row is hidden, and when the secondary password is verified, the interface schematic diagram of display is as shown in figure 5, equal by all associated person informations
Display.
Current embodiment require that for contact person to be classified as ordinary contacts or private contact in advance, in the embodiment
In, the contact person of need for confidentiality can be set secret label by user, and all contact persons for being equipped with secret label are classified
For private contact, all contact persons that the secret label is not set are classified as ordinary contacts automatically.
The secret label of setting is contacted not in the aobvious of the contact person to secret for user in one of the embodiments,
Show in interface and show, which is only prompted in setting option.
The present embodiment can be applied to the contact person in cell phone address book, social activity APP, be joined by the way that contact person is divided into secret
It is A grades of people and B grades of two-stages of ordinary contacts, and corresponding permission is set to the contact person of each rank, wherein, A secret grades
Contact person permission higher than the permission of B grade ordinary contacts, terminal is started after chat record protects.Non-user inputs
The records such as B grades of contact persons and call, chat may only be accessed after proper password, and A grades of private chat records and contact person are only
Have in user into fashionable display, i.e., shown when backstage starts recognition of face or iris recognition in defeated proper password, and
And preservation is encrypted when stored to the picture transmitted by private contact and video, cutting when chatting with private contact
Figure also can automatic encryption, only shown when I uses.This programme can make password inform others or leakage feelings again
The privacy of oneself can also be protected under condition.The secret photo protection of user is strengthened in this way, improves the experience of user well.
Realize that scene includes the following steps 1 to 7 according to the one of the present embodiment:
1st, start;
2nd, input password is prepared to enter into the corresponding APP of mobile phone;
3rd, judge whether password is correct, is, enter step 4, otherwise enter step 7;
4th, proactive identification face is opened from the background, wherein, face is set when setting password, and backstage identifies that face does not appear in
Interface, interface are not any change;
Whether 5 identification faces are user, are to enter step 6-1, otherwise enter step 6-2, wherein, identify the people
The process of face is background processes, and interface is not any change;
6th, message registration, chat record and contact person etc. are shown:
6-1, display A+B two permission All Contacts, message registration, chat records etc.;
6-2, B permissions ordinary contacts, message registration, chat record etc. are only shown;
7th, terminate.
The present embodiment acquires the biological information of the user, the identifying object as secondary password by way of hiding
It is being verified from the background so that the verification mode of the secondary password is carried out in the case that user is unwitting, can be to avoid
To the mistrustful psychological impact that other users are brought, and can the realistic contact person's privacy for protecting owner.
According to the present embodiment example, the label of above-mentioned steps S301~S703 is not used to limit in the present embodiment
The sequencing of each step, the number of each step are intended merely to allow general reference step when describing each step
Label easily referred to, such as above-mentioned steps S301 can be before the step of S302, can also be step S302's
After step, as long as the sequence that each step performs does not influence the logical relation of the present embodiment.
Exemplary block diagrams of the Fig. 8 for the protective device of contact person's privacy according to one embodiment of the present of invention, under
The protective device of contact person's privacy according to an embodiment of the invention is described in detail with reference to Fig. 8 for face, as shown in figure 8, should
The protective device 100 of contact person's privacy includes command reception module 11, authentication module 12, grade acquisition module 13 and hidden module
14。
Command reception module 11 checks instruction for the reception information related with contact person.
According to the present embodiment example, which can be the contact person in cell phone address book or
The contact person in address list in tripartite's application program, the third party application include but not limited to the chat work such as wechat, QQ
Tool.
According to the present embodiment example, the information related with contact person is included in situations below at least in the step
It is a kind of:
The associated person information that is stored in address list, with the short message record of the contact person, message registration, chat record, connect
The data and the sectional drawing of the chat record of the contact person that the contact person received sends.
According to the present embodiment example, when the information related with contact person includes and the chat record of the contact person
During sectional drawing, the sectional drawing can be associated with corresponding private contact in the following manner:
When receiving sectional drawing instruction, the contact person in the interface of mobile terminal is identified;
When the contact artificially pre-set private contact of identification, the picture for judging interception is and secret
The related information of contact person.
When the information related with contact person includes the data that the contact person received sends, can sentence in the following manner
Whether the disconnected data sent are the information related with private contact:
When receiving the data that contact person sends, whether the contact person for judging to send the data is private contact,
If so, judge the data for the information related with private contact.
According to the present embodiment example, the data which sends include but not limited to picture, video, with attachment
File, compressed package etc. existing for form.
According to the present embodiment example, what which received checks that instruction can receive mobile phone to lead to
The instruction that the instruction or preset third party application that news record is clicked are clicked, in this embodiment, which should
With program can be related to user private data need user oneself determine, such as user can set cell phone address book, QQ and/
Or certain contact persons therein are set as secret by wechat as the preset third party application, and after program is entered
Contact person.
Authentication module 12, for verifying the level password of user and secondary password.
According to the present embodiment example, the level password can be character types password or biological information it is close
Code, which can be the biological information password of user.
Wherein, which is the password that user inputs in unlock interface, can be numerical ciphers, letter code, number
The combination pin of word and letter, finger-print cipher, iris password, face feature information password etc., when level password verification is logical
It is out-of-date, represent that the user has the permission using the mobile terminal, when the secondary password is also verified, it is machine to represent the user
Master is in person.
The secondary password can be the finger-print cipher of user, iris feature password or face feature information password.
Grade acquisition module 13, the level password for working as user is verified but the verification of the secondary password of user does not pass through
When, obtain the grade belonging to the contact person.
In this embodiment, the grade belonging to contact person includes this grade of private contact and ordinary contacts this is first-class
Grade.
According to the present embodiment example, need that contact person is classified as ordinary contacts or secret contact in advance
The contact person of need for confidentiality can be set secret label, all secret labels of being equipped with by people, in this embodiment, user
Contact person is classified as private contact, and all contact persons that the secret label is not set are classified as commonly contacting automatically
People.
Hidden module 14, for when the grade of acquisition be private contact when, the information related with the contact person is hidden
It hides.
According to the present embodiment example, corresponding to the related information of the private contact processing mode be not limited to by
Corresponding Information hiding can also be encrypted by the encrypting module pair information related with private contact, after encryption
File be stored in preset file.
The protective device 100 of contact person's privacy further includes in one of the embodiments,:
Permission opens module, and the level password for working as user is verified and the secondary password of user is also verified
When, the permission of open all information that should be related with contact person.
In one of which embodiment, which is additionally operable to when the level password is verified, real-time verification
The secondary password;
The protective device 100 of contact person's privacy further includes:
Permission handover module, for working as the verification result of the secondary password and the knot of secondary password last time verification
When fruit differs, the permission of the information related with the private contact is subjected to corresponding switching.
The authentication module is additionally operable to when the level password is verified in one of the embodiments, at interval of default
Time cycle verify the secondary password;
The permission handover module, for working as the verification result of the secondary password and secondary password last time verification
When as a result differing, the permission of the information related with the private contact is subjected to corresponding switching.
In this embodiment, which can be one minute, above-mentioned that the secondary password is tested in real time
It, can be most fast when the mode of card can preferably ensure that the user of mobile terminal is used alternatingly among different users
Whether be owner, so as to be protected to greatest extent to the privacy contact of user, to this in the embodiment if recognizing
Secondary password can save mobile terminal to a certain extent by way of being verified at interval of the preset time cycle
Electricity improves the cruise duration of the mobile terminal.
The present embodiment checks finger by setting level password and secondary password, receive the information related with contact person
When enabling, judge whether the level password and secondary password are verified, opened if being verified to user and contact person
Related all information, if level password is verified secondary password, verification does not pass through, will be in the relevant letter of private contact
Breath is hidden, and this programme is authenticated the identity of user by double code, when level password is verified, represents the user
With the permission for using the mobile terminal, when secondary password verification also by when, the user is represented as owner, only true
Just open with the relevant information of All Contacts in the case of determining user and being owner, this programme can be protected preferably
With the relevant information of private contact, the privacy of user is preferably protected.
In one of which embodiment, which includes the biological information of user, and the authentication module 12 is also
Including:
Collecting biological feature information unit, for acquiring the biological information of the user by way of hiding;
Judging unit, for the biological information acquired to be matched with the biological information to prestore, if
With success, then judge that the secondary password is verified, otherwise, judge that secondary password verification does not pass through.
Wherein, secondary password is defined to the biological information password of user by the present embodiment, when the secondary password is also tested
When card passes through, it is owner to represent the user.
The secondary password can be the finger-print cipher of user, iris feature password or face feature information password.
Current embodiment require that for contact person to be classified as ordinary contacts or private contact in advance, in the embodiment
In, the contact person of need for confidentiality can be set secret label by user, and all contact persons for being equipped with secret label are classified
For private contact, all contact persons that the secret label is not set are classified as ordinary contacts automatically.
The secret label of setting is contacted not in the aobvious of the contact person to secret for user in one of the embodiments,
Show in interface and show, which is only prompted in setting option.
The present embodiment can be applied to the contact person in cell phone address book, social activity APP, be joined by the way that contact person is divided into secret
It is A grades of people and B grades of two-stages of ordinary contacts, and corresponding permission is set to the contact person of each rank, wherein, A secret grades
Contact person permission higher than the permission of B grade ordinary contacts, terminal is started after chat record protects.Non-user inputs
The records such as B grades of contact persons and call, chat may only be accessed after proper password, and A grades of private chat records and contact person are only
Have in user into fashionable display, i.e., shown when backstage starts recognition of face or iris recognition in defeated proper password, and
And preservation is encrypted when stored to the picture transmitted by private contact and video, cutting when chatting with private contact
Figure also can automatic encryption, only shown when I uses.This programme can make password inform others or leakage feelings again
The privacy of oneself can also be protected under condition.The secret photo protection of user is strengthened in this way, improves the experience of user well.
In one of which embodiment, information that should be related with contact person includes at least one of situations below:
What the associated person information and the chat record of the contact person for being stored in address list, the contact person received sent
Data, the sectional drawing with the chat record of the contact person.
In one of which embodiment, which is the password of character types or biological information password.
The present embodiment acquires the biological information of the user, the identifying object as secondary password by way of hiding
It is being verified from the background so that the verification mode of the secondary password is carried out in the case that user is unwitting, can be to avoid
To the mistrustful psychological impact that other users are brought, and can the realistic contact person's privacy for protecting owner.
Wherein, the modules that the protective device of contact person's privacy includes can be fully or partially through software, hardware
Or combination is realized.Further, the modules in the protective device of contact person's privacy can be used to implement correspondence
The program segment of function.
The protective device of above-mentioned contact person's privacy can be implemented as a kind of form of computer program, and computer program can be with
It is run on mobile terminal as shown in Figure 1.
A kind of mobile terminal provided according to one embodiment of present invention including memory, processor and is stored in
On reservoir and the computer program that can run on a processor, the processor realize above-mentioned contact person's privacy when performing the program
Guard method.
A kind of computer readable storage medium provided according to one embodiment of present invention, is stored thereon with computer journey
Sequence, the program realize the step in the guard method of above-mentioned contact person's privacy when being executed by processor.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those elements, and
And it further includes other elements that are not explicitly listed or further includes intrinsic for this process, method, article or device institute
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this
Also there are other identical elements in the process of element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be embodied in the form of software product, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), used including some instructions so that a station terminal (can be mobile phone, computer services
Device, air conditioner or network equipment etc.) perform method described in each embodiment of the present invention.
Guard method, device, mobile terminal and the storage medium of a kind of contact person's privacy provided in this embodiment, by setting
Put level password and secondary password, receiving when checking instruction of the information related with contact person, judge the level password and
Whether secondary password is verified, and all information related with contact person is opened to user if being verified, if level-one
Password authentification is not passed through by secondary password verification, then will be in the relevant Information hiding of private contact, and this programme passes through dual
Password is authenticated the identity of user, when level password is verified, represents that the user has using the mobile terminal
Permission, when secondary password verification also by when, represent that the user for owner, is only determining that user is owner
In the case of, just the open and relevant information of All Contacts, this programme can be protected preferably and the relevant letter of private contact
Breath preferably protects the privacy of user.
The embodiment of the present invention is described above in conjunction with attached drawing, but the invention is not limited in above-mentioned specific
Embodiment, above-mentioned specific embodiment is only schematical rather than restricted, those of ordinary skill in the art
Under the enlightenment of the present invention, present inventive concept and scope of the claimed protection are not being departed from, can also made very much
Form, these are belonged within the protection of the present invention.
Claims (10)
1. a kind of guard method of contact person's privacy, which is characterized in that the method includes:
Receive the information related with contact person checks instruction;
Verify the level password and secondary password of user;
When the level password of user be verified but the secondary password of user verification not by when, obtain belonging to the contact person
Grade;
When the grade of acquisition is private contact, by the Information hiding related with the contact person.
2. according to the method described in claim 1, it is characterized in that, the method further includes:
When the level password of user is verified and the secondary password of user is also verified, open all described and contact persons
The permission of related information.
3. according to the method described in claim 1, it is characterized in that, the method further includes:
When the level password is verified, secondary password described in real-time verification;
It, will be with the private when the verification result and the result of secondary password last time verification of the secondary password differ
The permission of the related information of close contact person carries out corresponding switching.
4. method according to any one of claims 1 to 3, which is characterized in that the secondary password includes the biology of user
Characteristic information;The step of verification secondary password, includes:
The biological information of the user is acquired by way of hiding;
The biological information of acquisition with the biological information to prestore is matched, if successful match, judges institute
It states secondary password to be verified, otherwise, judges that secondary password verification does not pass through.
5. method according to any one of claims 1 to 3, which is characterized in that the information related with contact person includes
At least one of situations below:
The associated person information and the chat record of the contact person that are stored in address list, the contact person received send
Data, the sectional drawing with the chat record of the contact person.
6. method according to any one of claims 1 to 3, which is characterized in that the level password is close for character types
Code or biological information password.
7. a kind of protective device of contact person's privacy, which is characterized in that described device includes:
Command reception module checks instruction for the reception information related with contact person;
Authentication module, for verifying the level password of user and secondary password;
Grade acquisition module, for when the level password of user be verified but the secondary password of user verification not by when, obtain
Take the grade belonging to the contact person;
Hidden module, for when the grade of acquisition be private contact when, by the Information hiding related with the contact person.
8. device according to claim 7, it is characterised in that:
The authentication module is additionally operable to when the level password is verified, secondary password described in real-time verification;
Described device further includes:
Permission handover module, for working as the result of the verification result of the secondary password and secondary password last time verification not
When identical, the permission of the information related with the private contact is subjected to corresponding switching.
9. a kind of mobile terminal including memory, processor and stores the calculating that can be run on a memory and on a processor
Machine program, which is characterized in that the processor is realized when performing described program such as the contact person of any one of claim 1 to 6
The guard method of privacy.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that described program is handled
It is realized when device performs such as the step in any one of claim 1 to 6 the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711483113.1A CN108206892B (en) | 2017-12-29 | 2017-12-29 | Method and device for protecting privacy of contact person, mobile terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711483113.1A CN108206892B (en) | 2017-12-29 | 2017-12-29 | Method and device for protecting privacy of contact person, mobile terminal and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108206892A true CN108206892A (en) | 2018-06-26 |
CN108206892B CN108206892B (en) | 2021-04-09 |
Family
ID=62606117
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711483113.1A Active CN108206892B (en) | 2017-12-29 | 2017-12-29 | Method and device for protecting privacy of contact person, mobile terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108206892B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109033785A (en) * | 2018-08-01 | 2018-12-18 | 上海小蚁科技有限公司 | Screen control method and device, storage medium, terminal |
CN109241899A (en) * | 2018-08-29 | 2019-01-18 | Oppo(重庆)智能科技有限公司 | Fingerprint identification method and relevant apparatus |
CN112446049A (en) * | 2020-11-27 | 2021-03-05 | 珠海读书郎网络教育有限公司 | Method and system for protecting privacy short message of wearable device |
CN116193020A (en) * | 2023-04-27 | 2023-05-30 | 合肥智辉空间科技有限责任公司 | Mobile phone screen unlocking method and system |
TWI824517B (en) * | 2022-05-12 | 2023-12-01 | 技嘉科技股份有限公司 | Authentication method and authentication system |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101184264A (en) * | 2007-11-27 | 2008-05-21 | 北京网秦天下科技有限公司 | Mobile phone telephone and message anti-disturbance and private communication method and system |
CN101917513A (en) * | 2010-08-02 | 2010-12-15 | 中兴通讯股份有限公司 | Method and device for implementing graded display of privacy information |
CN103108082A (en) * | 2013-01-24 | 2013-05-15 | 北京航空航天大学 | Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system |
US20140032921A1 (en) * | 2012-07-26 | 2014-01-30 | International Business Machines Corporation | Protecting data on a mobile device |
CN103795862A (en) * | 2014-01-24 | 2014-05-14 | 宇龙计算机通信科技(深圳)有限公司 | Looking-up method and device of private contact persons |
CN104376011A (en) * | 2013-08-14 | 2015-02-25 | 华为终端有限公司 | Privacy protection implementing method and device |
US20150319789A1 (en) * | 2004-09-21 | 2015-11-05 | Advanced Ground Information Systems, Inc. | Method to provide ad hoc and password protected digital and voice networks |
CN105187599A (en) * | 2015-08-27 | 2015-12-23 | 魅族科技(中国)有限公司 | Contact person information management method and terminal |
WO2016207527A1 (en) * | 2015-06-22 | 2016-12-29 | Orange | Method for converting a first cipher into a second cipher |
CN106888204A (en) * | 2016-12-27 | 2017-06-23 | 中国科学院软件研究所 | Implicit identity identifying method based on natural interaction |
CN107026935A (en) * | 2016-10-28 | 2017-08-08 | 珠海格力电器股份有限公司 | The authority control method and device of mobile device and mobile device |
-
2017
- 2017-12-29 CN CN201711483113.1A patent/CN108206892B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150319789A1 (en) * | 2004-09-21 | 2015-11-05 | Advanced Ground Information Systems, Inc. | Method to provide ad hoc and password protected digital and voice networks |
CN101184264A (en) * | 2007-11-27 | 2008-05-21 | 北京网秦天下科技有限公司 | Mobile phone telephone and message anti-disturbance and private communication method and system |
CN101917513A (en) * | 2010-08-02 | 2010-12-15 | 中兴通讯股份有限公司 | Method and device for implementing graded display of privacy information |
US20140032921A1 (en) * | 2012-07-26 | 2014-01-30 | International Business Machines Corporation | Protecting data on a mobile device |
CN103108082A (en) * | 2013-01-24 | 2013-05-15 | 北京航空航天大学 | Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system |
CN104376011A (en) * | 2013-08-14 | 2015-02-25 | 华为终端有限公司 | Privacy protection implementing method and device |
CN103795862A (en) * | 2014-01-24 | 2014-05-14 | 宇龙计算机通信科技(深圳)有限公司 | Looking-up method and device of private contact persons |
WO2016207527A1 (en) * | 2015-06-22 | 2016-12-29 | Orange | Method for converting a first cipher into a second cipher |
CN105187599A (en) * | 2015-08-27 | 2015-12-23 | 魅族科技(中国)有限公司 | Contact person information management method and terminal |
CN107026935A (en) * | 2016-10-28 | 2017-08-08 | 珠海格力电器股份有限公司 | The authority control method and device of mobile device and mobile device |
CN106888204A (en) * | 2016-12-27 | 2017-06-23 | 中国科学院软件研究所 | Implicit identity identifying method based on natural interaction |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109033785A (en) * | 2018-08-01 | 2018-12-18 | 上海小蚁科技有限公司 | Screen control method and device, storage medium, terminal |
CN109241899A (en) * | 2018-08-29 | 2019-01-18 | Oppo(重庆)智能科技有限公司 | Fingerprint identification method and relevant apparatus |
CN112446049A (en) * | 2020-11-27 | 2021-03-05 | 珠海读书郎网络教育有限公司 | Method and system for protecting privacy short message of wearable device |
TWI824517B (en) * | 2022-05-12 | 2023-12-01 | 技嘉科技股份有限公司 | Authentication method and authentication system |
CN116193020A (en) * | 2023-04-27 | 2023-05-30 | 合肥智辉空间科技有限责任公司 | Mobile phone screen unlocking method and system |
CN116193020B (en) * | 2023-04-27 | 2023-08-11 | 合肥智辉空间科技有限责任公司 | Mobile phone screen unlocking method and system |
Also Published As
Publication number | Publication date |
---|---|
CN108206892B (en) | 2021-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108206892A (en) | Guard method, device, mobile terminal and the storage medium of contact person's privacy | |
CN107315937A (en) | A kind of method for secret protection, mobile terminal and computer-readable recording medium | |
CN108289141A (en) | A kind of the screen locking unlocking method and mobile terminal of mobile terminal | |
CN108830062A (en) | Face identification method, mobile terminal and computer readable storage medium | |
CN108171037A (en) | Using startup method, terminal and computer storage media | |
CN109033779A (en) | A kind of unlock authentication method, wearable device and computer readable storage medium | |
CN109558718A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN110069229A (en) | Screen sharing method, mobile terminal and computer readable storage medium | |
CN108989322A (en) | data transmission method, mobile terminal and computer readable storage medium | |
CN108197441A (en) | Flexible screen terminal and its solution lock control method, computer readable storage medium | |
CN109522695A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN108062489A (en) | A kind of glance prevention method, terminal and computer readable storage medium | |
CN107392013A (en) | A kind of terminal safety protection method, terminal and computer-readable recording medium | |
CN108961489A (en) | A kind of equipment wearing control method, terminal and computer readable storage medium | |
CN107734128A (en) | One kind swindle number identification method and equipment | |
CN109885999A (en) | A kind of account register method, terminal and computer readable storage medium | |
CN107861669A (en) | The switching method and mobile terminal of a kind of custom system | |
CN109086582A (en) | A kind of fingerprint verification method, terminal and computer readable storage medium | |
CN107862196A (en) | Fingerprint verification method, mobile terminal and computer-readable recording medium | |
CN109670287A (en) | Intelligent terminal unlocking method, intelligent terminal and computer readable storage medium | |
CN108376239A (en) | A kind of face identification method, mobile terminal and storage medium | |
CN107330313A (en) | Application control method, mobile terminal and readable storage medium storing program for executing | |
CN108012270A (en) | A kind of method of information processing, equipment and computer-readable recording medium | |
CN108038360A (en) | The switching method and mobile terminal of a kind of operational mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |