CN108769403A - A kind of information acquisition method and terminal - Google Patents

A kind of information acquisition method and terminal Download PDF

Info

Publication number
CN108769403A
CN108769403A CN201810509931.2A CN201810509931A CN108769403A CN 108769403 A CN108769403 A CN 108769403A CN 201810509931 A CN201810509931 A CN 201810509931A CN 108769403 A CN108769403 A CN 108769403A
Authority
CN
China
Prior art keywords
information
target
terminal
fingerprint
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810509931.2A
Other languages
Chinese (zh)
Other versions
CN108769403B (en
Inventor
马鑫苑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810509931.2A priority Critical patent/CN108769403B/en
Publication of CN108769403A publication Critical patent/CN108769403A/en
Application granted granted Critical
Publication of CN108769403B publication Critical patent/CN108769403B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Environmental & Geological Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)

Abstract

A kind of information acquisition method of offer of the embodiment of the present invention and terminal, are applied to field of terminal technology, to solve the problems, such as that the safety of information reduces.This method includes:In display target mark and target object, the first input of user is received, which executes the first operation for triggering first terminal, which is indicated by target information, the target information includes the first information and the second information, which obtains after being encrypted to the first information;In response to first input, the first fingerprint of user is acquired;In corresponding second fingerprint of first fingerprint matching target identification, the first information and second information are obtained, to obtain the target information;The target information executes first operation for the first terminal, and first information target object corresponding with the target identification is corresponding, and second information, second fingerprint corresponding with the target identification is corresponding.

Description

A kind of information acquisition method and terminal
Technical field
The present embodiments relate to field of terminal technology more particularly to a kind of information acquisition method and terminals.
Background technology
With the fast development of the communication technology, the application of terminal is more and more extensive, the safety of the information stored in terminal It is more and more important.
By taking the information stored in terminal is communicating number as an example, user can store the communicating number of the contact person of user In the address list of terminal.If user needs to communicate with some contact person, user can open the lookup of address list triggering terminal The communicating number is included on the boundary of terminal after the communicating number for finding the contact person by the communicating number of the contact person, terminal In face, to which user can use the communicating number of display, such as using the communicating number of display makes a phone call, sends short messages, account Verify or share business card etc..
However, in the storage mode of current communicating number, many applications can also read and using being stored in address list Communicating number, such as it is certain application for Rapid Popularization, the contact person that advertisement information may be pushed in user communication record, So so that the safety of information reduces.
Invention content
A kind of information acquisition method of offer of the embodiment of the present invention and terminal, to solve the problems, such as that the safety of information reduces.
In order to solve the above-mentioned technical problem, the embodiment of the present invention is realized in:
In a first aspect, the embodiment of the present invention provides a kind of information acquisition method, in display target mark and target object, The first input of user is received, which executes the first operation for triggering first terminal, which is believed by target Breath instruction, the target information include the first information and the second information, which obtains after being encrypted to the first information; In response to first input, the first fingerprint of user is acquired;In corresponding second fingerprint of first fingerprint matching target identification When, the first information and second information are obtained, to obtain the target information;The target information is executed for the first terminal should First operation, first information target object corresponding with the target identification is corresponding, second information and the target identification pair Second fingerprint answered corresponds to.
Second aspect, the embodiment of the present invention additionally provide a kind of first terminal, which includes:Receiving module is adopted Collect module, acquisition module and execution module;The receiving module, in first terminal display target mark and target object When, the first input of user is received, which executes the first operation for triggering the first terminal, and the target identification is by mesh Information instruction is marked, which includes the first information and the second information, which obtains after being encrypted to the first information 's;The acquisition module, first input for being received in response to the receiving module, acquires the first fingerprint of user;The acquisition Module, when corresponding second fingerprint of first fingerprint matching target identification for being acquired in the acquisition module, obtain this One information and second information, to obtain the target information;The target information executes first operation for the first terminal, should First information target object corresponding with the target identification is corresponding, second information, second finger corresponding with the target identification Line corresponds to.
The third aspect an embodiment of the present invention provides a kind of terminal, including processor, memory and is stored in the memory Computer program that is upper and can running on the processor, realizes such as first aspect when which is executed by the processor The step of described information acquisition method.
Fourth aspect, an embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage mediums Computer program is stored in matter, and information acquisition method as described in relation to the first aspect is realized when which is executed by processor The step of.
In embodiments of the present invention, first, in display target mark and when target object, first terminal receives the of user One input;Secondly, in response to the first input, first terminal acquires the first fingerprint of user;Again, in the first fingerprint matching target When identifying corresponding second fingerprint, first terminal obtains the first information and the second information, to obtain target information;The target information First operation is executed for the first terminal, first information target object corresponding with target identification is corresponding, the second information The second fingerprint corresponding with target identification is corresponding.On the one hand, it is obtained after being encrypted to the first information due to target object, because This, terminal only show it is encrypted to the first information in target information as a result, and the second information in target information not Shown in the display interface of terminal, therefore, target information in the terminal display it is complete and can be used directly information (such as Complete telephone number is not shown or does not show telephone number), increase the safety of target information;On the other hand in terminal During using target information, the second information could be obtained since terminal needs the fingerprint of user to carry out verification, and then obtain Target information, therefore, application, the software etc. of other users or terminal installation can not directly acquire the second information, need by The verification of the corresponding fingerprint of second information could obtain, and used to obtain target information, improve in terminal and deposit The safety of the information of storage.
Description of the drawings
Fig. 1 is a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram one of acquisition of information provided in an embodiment of the present invention;
Fig. 3 is a kind of flow diagram two of acquisition of information provided in an embodiment of the present invention;
Fig. 4 is a kind of flow diagram three of acquisition of information provided in an embodiment of the present invention;
Fig. 5 is the possible structural schematic diagram of a kind of first terminal provided in an embodiment of the present invention one;
Fig. 6 is the possible structural schematic diagram of a kind of first terminal provided in an embodiment of the present invention two;
Fig. 7 is the possible structural schematic diagram of a kind of first terminal provided in an embodiment of the present invention three;
Fig. 8 is the possible structural schematic diagram of a kind of first terminal provided in an embodiment of the present invention four;
Fig. 9 is a kind of hardware architecture diagram of terminal of each embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
It should be noted that "/" herein indicate or the meaning, for example, A/B can indicate A or B;Herein "and/or" is only a kind of incidence relation of description affiliated partner, indicates may exist three kinds of relationships, for example, A and/or B, it can To indicate:Individualism A exists simultaneously A and B, these three situations of individualism B." multiple " refer to two or more.
It should be noted that in the embodiment of the present invention, " illustrative " or " such as " etc. words make example, example for indicating Card or explanation.Be described as in the embodiment of the present invention " illustrative " or " such as " any embodiment or design scheme do not answer It is interpreted than other embodiments or design scheme more preferably or more advantage.Specifically, " illustrative " or " example are used Such as " word is intended to that related notion is presented in specific ways.
Terminal in the embodiment of the present invention can be the terminal with operating system.The operating system can be Android (Android) operating system can be ios operating systems, can also be other possible operating systems, the embodiment of the present invention is not Make specific limit.
Below by taking Android operation system as an example, introduce what information acquisition method provided in an embodiment of the present invention was applied Software environment.
As shown in Figure 1, being a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention.Scheming In 1, the framework of Android operation system includes 4 layers, respectively:Application layer, application framework layer, system operation library layer and Inner nuclear layer (is specifically as follows Linux inner core).
Wherein, application layer includes each application program (including system application and in Android operation system Tripartite's application program).
Application framework layer is the frame of application program, and developer can be in the exploitation of the frame in accordance with application program In the case of principle, some application programs are developed based on application framework layer.
System operation library layer includes library (also referred to as system library) and Android operation system running environment.Library is mainly Android behaviour All kinds of resources needed for it are provided as system.Android operation system running environment is used to provide software loop for Android operation system Border.
Inner nuclear layer is the operating system layer of Android operation system, belongs to the bottom of Android operation system software level.It is interior Stratum nucleare provides core system service and hardware-related driver based on linux kernel for Android operation system.
By taking Android operation system as an example, in the embodiment of the present invention, developer can be based on above-mentioned Android as shown in Figure 1 The software program of information acquisition method provided in an embodiment of the present invention is realized in the system architecture of operating system, exploitation, so that The information acquisition method can be run based on Android operation system as shown in Figure 1.I.e. processor or terminal device can lead to It crosses and runs software program realization information acquisition method provided in an embodiment of the present invention in Android operation system.
In order to make it easy to understand, the embodiment of the present invention is illustrated by taking first terminal and second terminal as an example, wherein first eventually End and second terminal can be any one terminal, and the embodiment of the present invention is not especially limited this.
Target information in the embodiment of the present invention may include communicating number, account number, ID card No. and password Deng, wherein communicating number may include the communicating number of phone number, base number and instant messaging;Account number can be Bank account numbers, the account numbers such as email accounts number, the target information in the embodiment of the present invention can be number, letter and symbol The information of number composition, the embodiment of the present invention is not especially limited this.
Information acquisition method provided in an embodiment of the present invention is illustrated with reference to Fig. 2, Fig. 2 is the embodiment of the present invention The flow diagram of a kind of acquisition of information provided, as shown in Fig. 2, including S201-S203:
S201, in display target mark and when target object, first terminal receives the first input.
Wherein, the first input executes the first operation for triggering first terminal, and target identification is indicated by target information, target Information includes the first information and the second information, and target object obtains after being encrypted to the first information.
Optionally, the first input can be the pressing of user on the screen, click, suspension touch control, or user adopts The corresponding target object of target identification is chosen with physical button control, or voice input control uses target identification Target information corresponding with target object etc., the embodiment of the present invention is not especially limited this.
Assuming that target information is contact number, then target identification can be name of contact person, and target object can be terminal A part of number of contact number is encrypted.
Optionally, first terminal can in address list display target mark and target object, can also converse in history Display target mark and target object in record;On the other hand, the first operation can be that user is made a phone call using contact number, sent out Short message or the operation for sharing contact number;The embodiment of the present invention is not especially limited this.
It should be noted that when target information is contact number, target identification can be name of contact person, contact person's surname Name and company name, name of contact person and other can distinguish the label etc. of the contact person and other contact persons, target identification is used for One target information of unique mark in first terminal, the form and content of the unlimited mark that sets the goal of the embodiment of the present invention.
S202, it is inputted in response to first, first terminal acquires the first fingerprint of user.
Optionally, be provided with fingerprint collecting region outside the display screen of first terminal, or in first terminal screen it is solid Positioning, which installs, is equipped with fingerprint collecting region, then terminal prompts the user with after receiving the first input of user in fingerprint collecting Region acquires fingerprint.When first terminal has a lower finger print collecting function of screen, and any one region can acquire and refer on the screen When line, if the first input is the operations such as pressing, touch or suspension control on a display screen, terminal is detecting that first is defeated Do not have to prompt the user with after entering, directly acquisition first inputs the fingerprint of corresponding user's finger and carries out fingerprint matching.The present invention Embodiment is not especially limited for how fingerprint acquires.
S203, in corresponding second fingerprint of the first fingerprint matching target identification, first terminal obtains the first information and the Two information, to obtain target information.
Wherein, target information executes the first operation, first information target pair corresponding with target identification for first terminal As correspondence, the second information the second fingerprint corresponding with target identification is corresponding.
Information acquisition method in the embodiment of the present invention, first, in display target mark and target object, first terminal Receive the first input of user;Secondly, in response to the first input, first terminal acquires the first fingerprint of user;Again, first When corresponding second fingerprint of fingerprint matching target identification, first terminal obtains the first information and the second information, to obtain target letter Breath;Wherein, first information target object corresponding with target identification is corresponding, the second information the second fingerprint corresponding with target identification It is corresponding.On the one hand, it is obtained after being encrypted to the first information due to target object, terminal is only shown to target information In the first information it is encrypted as a result, and the second information in target information is not shown in the display interface of terminal, therefore, Display is complete in the terminal and the information that can be used directly (such as does not show complete telephone number or not for target information Show telephone number), increase the safety of target information;On the other hand during terminal uses target information, due to Terminal, which needs the fingerprint of user to carry out verification, could obtain the second information, and then obtain target information, therefore, other users or Application, the software etc. of terminal installation can not directly acquire the second information, need the verification ability by the corresponding fingerprint of the second information It can obtain, be used to which target information can not be obtained, improve the safety of the information stored in terminal.
Optionally, (that is, after S203) after terminal obtains target information, user can use the target information, Information acquisition method provided in an embodiment of the present invention can also include S204:
S204, first terminal execute the first operation according to target information.
Illustratively, if the first operation is makes a phone call, terminal dials number after obtaining target information;If the first behaviour As sending short messages, then terminal after obtaining target information can with editing short message content, certainly, terminal can also edited it is short Believe that content selects a contact person later, then the first operation is that the contact person is selected to send short message, and target is got in terminal Give target information corresponding contact person the short message sending editted after information.
Optionally, terminal when using target information firstly the need of storing target information in the terminal, as shown in figure 3, Before S201, above- mentioned information acquisition methods further include S205-S208:
S205, first terminal obtain target information and target identification.
Optionally, first terminal can obtain target information and target identification in several ways, such as can pass through use The target information and target identification of family input obtain, and can also be received and be obtained sharing for other users by the application of instant messaging class It takes, the embodiment of the present invention is not especially limited this.
S206, first terminal use the first cipher mode encrypted first information, obtain target object.
Optionally, the first cipher mode can be any one cipher mode, the target pair obtained after first information encryption As that can be at least two combination in picture, number, letter or symbol etc. or picture, number, letter, symbol, the present invention Embodiment is not especially limited this.
S207, first terminal acquire the second fingerprint of user.
Optionally, first terminal can prompt the user with acquisition fingerprint, fingerprint collecting region can be terminal screen under refer to Line pickup area, or pickup area of the terminal in physical button, the embodiment of the present invention are not especially limited this.
It should be noted that the second fingerprint of user can be the fingerprint of any one finger of user, the second fingerprint also may be used Think that the unlock fingerprint that user has prestored, the embodiment of the present invention are not especially limited this.
S208, first terminal preserve target correspondence, and target correspondence is target identification, target object and the second finger Correspondence between line, target object correspond to the first information, and the second fingerprint corresponds to the second information.
In order to make it easy to understand, being briefly described to target correspondence with reference to table.Wherein, table 1, table 2-1, table 2- 2, table 2-3 is exemplary illustration, and target correspondence can also be stored as other forms in practical application, for example, the shape of tree Formula, form of figure etc., the embodiment of the present invention is not especially limited this.
Illustratively, target identification, effective period of time, target object, the first information, fingerprint, the second letter are stored in table 1 Breath, particular content can refer to following forms and store.
Table 1
Target identification Effective period of time Target object The first information Fingerprint Second information
User 1 20180101-20180107 Target object 1 The first information 1 Fingerprint 1 Second information 1
User 2 20180101-20180301 Target object 1 The first information 2 Fingerprint 1 Second information 2
User 3 20180101-20180501 Target object 3 The first information 3 Fingerprint 2 Second information 3
User 4 20180101-20190101 Target object 4 The first information 4 Fingerprint 2 Second information 4
User 5 20180101- Target object 5 The first information 5 Fingerprint 3 Second information 5
Wherein, user 5 is not provided with the effect period, i.e. terminal can use always the target information of user 5.
Certainly, the correspondence of target identification and effective period of time can also be stored in a table in terminal, example Such as table 2-1, the correspondence of target identification, target object and the first information is stored in a table by terminal, such as table 2- 2, the correspondence of target identification, fingerprint and the second information is stored in a table by terminal, such as table 2-3.
Table 2-1
Target identification Effective period of time
User 1 20180101-20180107
User 2 20180101-20180301
User 3 20180101-20180501
User 4 20180101-20190101
User 5 20180101-
Table 2-2
Target identification Target object The first information
User 1 Target object 1 The first information 1
User 2 Target object 1 The first information 2
User 3 Target object 3 The first information 3
User 4 Target object 4 The first information 4
User 5 Target object 5 The first information 5
Table 2-3
Target identification Fingerprint Second information
User 1 Fingerprint 1 Second information 1
User 2 Fingerprint 1 Second information 2
User 3 Fingerprint 2 Second information 3
User 4 Fingerprint 2 Second information 4
User 5 Fingerprint 3 Second information 5
In conjunction in above-mentioned table as can be seen that different target identifications can correspond to identical target object, correspondence it is different Target identification can also correspond to identical fingerprint, and the embodiment of the present invention is not especially limited this.
Based on the program, first, first terminal obtains target information and target identification;Secondly, first terminal uses first Cipher mode encrypted first information, obtains target object;Again, the second fingerprint of first terminal acquisition user;Finally, first eventually End preserves target correspondence, correspondence of the target correspondence between target identification, target object and the second fingerprint, mesh Mark object corresponds to the first information, and the second fingerprint corresponds to the second information;Since terminal does not preserve target information directly, but, Target object is corresponded into the first information when target identification is to corresponding to, the second fingerprint corresponds to the second information, i.e., target information is divided into two Part establishes respective correspondence respectively, target information can be directly invoked to avoid the application in terminal, to improve The safety of information.
Optionally, when target information is to be obtained in the message that is sent by second terminal of first terminal, then in S205 " obtaining target information " can be executed by S205a:
S205a, first terminal receive the target message that second terminal is sent, and target message includes target information and target The effective period of time of information.
Optionally, the first information can be electronic business card information, can be to target information and target information it is effective when Between after section processing (such as encryption) information, this is not especially limited in the embodiment of the present invention.
First terminal is authorized to correspond to it should be noted that the effective period of time of target information is the corresponding user of target information The time span that can use of user, the length of the effective period of time of target information can be any one length, the present invention The effective period of time of target information is not especially limited.
Illustratively, it is assumed that user A needed to contact with user B in three months, was no longer contacted after three months, then user The effective period of time that user B can use the telephone number of user A can be arranged in A, then the telephone number of user A is shared with use Family B;Certainly, if user A, which is shared in the telephone number of user B, is not provided with effective period of time, can always may be used with default user B To use the contact number of user A.
In turn, the S208 in above- mentioned information acquisition methods embodiment can be executed by S208a:
S208a, first terminal preserve the correspondence between target correspondence and effective period of time.
Based on the program, if first terminal obtains target information by second terminal, if the target information is provided with Effective period of time, then first terminal the correspondence of the effective period of time and target correspondence can be saved in terminal, In order to which whether user judges the target information in effective period of time when in use.
Optionally, if first terminal saves the correspondence between target correspondence and effective period of time, S202 It can be executed by S202a and S202b:
S202a, it is inputted in response to first, first terminal obtains the first moment for receiving the first input.
If S202b, the first moment, in effective period of time, first terminal acquires the first fingerprint.
Optionally, terminal can also obtain target information and determine whether in effective period of time again, i.e., can after S203 To include S209:
S209, first terminal acquire the second moment of target information.
In turn, S204 can be executed by S204a:
If S204a, second moment, in effective period of time, first terminal executes the first operation to target information.
Based on the program, whether first terminal is before using target information, in target at the time of needing first to judge current In the effective period of time of information, if the target information could be used, so that the corresponding user of target information can control The time limit that target information is used by first terminal, so as to increase the safety of information.
Optionally, if the effectual time of target information is no longer valid, above- mentioned information acquisition methods are after S202a, also May include S210:
If S210, the first moment, not in effective period of time, it is invalid information that first terminal, which prompts target information,.
Optionally, it is invalid information that terminal can prompt target information in several ways, such as:Believed by display reminding It ceases, by output prompt tone and by showing picture prompting etc., the embodiment of the present invention is not especially limited this.
Optionally, if the first moment is not in effective period of time, first terminal can prompt target information that can not use, the One terminal can delete data corresponding with target information after determining that target information is invalid information in inside, can also carry Show the corresponding data of user's delete target information.
Based on the program, if receiving the first moment of the first input not in the effective period of time of target information, table Show that the corresponding user of first terminal can not be continuing with target information, it is invalid that first terminal, which can prompt the user with target information, Information in order to which user further processes, such as is made to target information corresponding user application by other communication modes With, or the corresponding data of prompt user's delete target information, avoid the memory space of invalid data occupied terminal.
Optionally, it is assumed that the effective period of time of target information and target information that first terminal obtains is to come from target information What corresponding user shared, then S205a can be realized by S205a1 and S205a2:
S205a1, first terminal receive the Quick Response Code that second terminal is sent, which is used to indicate target message.
It should be noted that the information in above-mentioned Quick Response Code may include effective time, first terminal receives Quick Response Code Moment alreadys exceed the effective time of Quick Response Code, then terminal can not obtain target message by the Quick Response Code received.
S205a2, first terminal identify Quick Response Code, to obtain target message.
It should be noted that first terminal after obtaining Quick Response Code, may not identify the Quick Response Code immediately, therefore Before first terminal identifies Quick Response Code, first terminal can first detect the operation of user, if the operation instruction first terminal of user Identify Quick Response Code, then terminal executes S205a2.
It is understood that first terminal receive second terminal transmission Quick Response Code after, can also be by the two dimension Code is transmitted to third terminal, and the Quick Response Code that third terminal receives first terminal transmission later can also be according to the place of first terminal Reason mode is handled, wherein the effective period of time of the target information stored in third terminal is the period of second terminal setting.
Based on the program, first terminal can receive the Quick Response Code that second terminal is sent by second terminal, pass through identification The Quick Response Code, first terminal can obtain the effective period of time of the target information and target information of first information instruction, and first eventually Target information is shared in end by Quick Response Code, and other users can also be avoided to obtain target letter by watching the target information of display Breath, to increase the safety of information.
Optionally, target information includes N number of character, and the first information is from the 1st to m-th character in N number of character second Information is (N-M) a character in addition to the first information in N number of character, wherein N is positive integer, and M is the positive integer less than N.
Based on the program, the length of the encrypted first information can be selected according to the complexity of realization, select the first fingerprint The length of corresponding second information.
Illustratively, in order to make it easy to understand, by using telephone number 1 that target information is user 1, the first information as phone number (such as telephone number is 1234678901, then the first information is by code first 5 of 1, latter 6 that the second information be telephone number 1 " 12345 ", the second information are " 678901 "), first terminal is the terminal that user 2 uses, and second terminal is the end that user 1 uses It is detailed according to a kind of acquisition process of possible telephone number, storing process and using being carried out for process successively for end It illustrates, Fig. 4 is a kind of acquisition of information flow diagram provided in an embodiment of the present invention, and flow includes as follows:
Acquisition process:
T1:Second terminal detects that sharing operation, second terminal display interface 1, interface 1 can be used for inputting using effective Period, sharing operation are that telephone number 1 (that is, target information) is shared with user 2 by user.
T2:Second terminal obtains the period 1 that user 1 inputs at interface 1, and the period 1 uses for 1 authorized user 2 of user The telephone number of user 1 when a length of period 1.
T3:Second terminal generates Quick Response Code 1 according to telephone number 1 and period 1.
T4:Quick Response Code 1 is sent to first terminal by second terminal.
T5:First terminal receives the Quick Response Code 1 that second terminal is sent.
Storing process:
T6:First terminal detects operation 1, which is that user stores the corresponding electricity of the Quick Response Code by the Quick Response Code Talk about the operation of number 1.
T7:Effectively whether first terminal judge Quick Response Code 1.
It should be noted that judging whether Quick Response Code 1 effectively can be to judge whether Quick Response Code 1 is overtime, avoids in T1 Fixed Quick Response Code may also reveal information, judge Quick Response Code certainly, in T1 effectively and can also be to judge the Quick Response Code whether by Damage etc., that is, judge whether the Quick Response Code can be used.
T8:If first terminal judges that Quick Response Code 1 is effective, first terminal identifies Quick Response Code 1.
It is appreciated that second terminal identifies that Quick Response Code, i.e. second terminal obtain the electricity of Quick Response Code instruction from Quick Response Code Talk about the effective period of time of number 1 and telephone number 1.
T9:If first terminal judges that Quick Response Code 1 is invalid, first terminal prompts the Quick Response Code 1 to fail.
T10:Preceding 5 bit digital (that is, first information) of first terminal encrypted telephone number 1, obtains 1 (i.e. target pair of picture As).
Specifically, in T10, first terminal can select number being converted to the first cipher mode of picture to phone number Preceding the 5 of code 1 are encryption.
T11:First terminal acquires the fingerprint 1 (that is, second fingerprint) of user 2.
T12:First terminal preserves target correspondence.
Wherein, target correspondence is the correspondence between name 1, picture 1, fingerprint 1, wherein in depositing for the name 1 It stores up under catalogue, picture 1 corresponds to the first information, and fingerprint 1 corresponds to the second information.
Use process:
T13, first terminal receive user 2 and make a phone call the input of number, wherein the input for making a phone call number can be with For user in address list selection dial the input of 1 corresponding user of name.
T14:First terminal acquires the fingerprint 2 (that is, first fingerprint) of user 2.
T15:When fingerprint 2 meets 1 corresponding fingerprint 1 of name, first terminal obtains information 1 (i.e. the first information) and information 2 (i.e. the second information), to obtain telephone number 1.
Wherein, information 1 is corresponding with 1 corresponding picture 1 of name, and information 2 is corresponding with 1 corresponding fingerprint 1 of name.
T16:Whether first terminal determines object time within the period 1.Wherein, object time is that first terminal obtains electricity At the time of talking about number 1.
Optionally, second terminal can also be obtained in T4 acquisition fingerprint 2 when at the time of, and judge acquire fingerprint 2 when Whether the moment is within the period 1.
T17:If object time, within the period 1, first terminal makes a phone call number 1.
T18:First terminal establishes correspondence with second terminal.
T19:If object time, not within the period 1, first terminal prompt mobile phone number 1 fails.
Based on the program, on the one hand, it is obtained after being encrypted to the first information due to target object, terminal is only aobvious Shown it is encrypted to the first information in target information as a result, and the second information in target information not in the display of terminal Interface display, therefore, display is complete in the terminal and the information that can be used directly (such as is not shown complete for target information Telephone number does not show telephone number), increase the safety of target information;On the other hand target information is used in terminal During, the second information could be obtained since terminal needs the fingerprint of user to carry out verification, and then obtain target information, because This, application, the software etc. of other users or terminal installation can not directly acquire the second information, need to correspond to by the second information The verification of fingerprint could obtain, to which target information use can not be obtained, improve the safety of the information stored in terminal.
Fig. 5 is a kind of possible structural schematic diagram of first terminal provided in an embodiment of the present invention, as shown in figure 5, first is whole End 500 includes:Receiving module 501, acquisition module 502 and acquisition module 503;Receiving module 501 is used for aobvious in first terminal 500 When showing target identification and target object, the first input of user is received, the first input executes first for triggering first terminal 500 Operation, target identification are indicated that target information includes the first information and the second information, and target object is to the first information by target information It is obtained after encryption;Acquisition module 502, the first input for being received in response to receiving module 501, acquire user first refer to Line;Acquisition module 503, in corresponding second fingerprint of the first fingerprint matching target identification that acquisition module 502 acquires, obtaining The first information and the second information are taken, to obtain target information;Target information executes first for first terminal 500 and operates, and first Information target object corresponding with target identification is corresponding, and the second information the second fingerprint corresponding with target identification is corresponding.
Optionally, as described in Figure 6 in conjunction with Fig. 5, first terminal 500 further includes execution module 504;Execution module 504 is used for The first operation is executed according to the target information that acquisition module 503 obtains.
Optionally, in conjunction with Fig. 5, as shown in fig. 7, first terminal 500 further includes encrypting module 505 and preserving module 506;It obtains Modulus block 503 is additionally operable to before display target mark and target object, obtains target information and target identification;Encrypting module 505, the first information for being obtained using the first cipher mode encryption acquisition module 503 obtains target object;Acquisition module 502, it is additionally operable to the second fingerprint of acquisition user;Preserving module 506, for preserving target correspondence, target correspondence is The target identification of the acquisition of acquisition module 503, encrypting module 505 encrypt obtained target object and acquisition module 502 collects The second fingerprint between correspondence, target object corresponds to the first information, and the second fingerprint corresponds to the second information.
Optionally, acquisition module 503 are specifically used for receiving the target message that second terminal is sent, and target message includes The effective period of time of target information and target information;Preserving module 506 is specifically used for preserving target correspondence and effective time Correspondence between section.
Optionally, acquisition module 502 is used for:In response to the first input, obtains receiving module 501 and receive the first input First moment;If the first moment in effective period of time, acquired the first fingerprint.
Optionally, in conjunction with Fig. 5, as shown in figure 8, first terminal 500 further includes reminding module 507;Reminding module 507 is used If in the first moment that acquisition module 502 obtains not in effective period of time, it is invalid information to prompt target information.
Optionally, receiving module 501 is specifically used for:The Quick Response Code that second terminal is sent is received, Quick Response Code is used to indicate mesh Mark message;Quick Response Code is identified, to obtain target message.
Optionally, target information includes N number of character, and the first information is from the 1st to m-th character in N number of character second Information is (N-M) a character in addition to the first information in N number of character, wherein N is positive integer, and M is the positive integer less than N.
First terminal 500 provided in an embodiment of the present invention can realize that first terminal is realized each in above method embodiment A process, to avoid repeating, which is not described herein again.
A kind of hardware architecture diagram of Fig. 9 terminals of each embodiment to realize the present invention, the terminal 100 include but not It is limited to:Radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106, the components such as user input unit 107, interface unit 108, memory 109, processor 110 and power supply 111.This field Technical staff is appreciated that the restriction of the not structure paired terminal of terminal structure shown in Fig. 9, terminal may include than illustrating more More or less component either combines certain components or different components arrangement.In embodiments of the present invention, terminal includes But be not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, user input unit 107, in display target mark and target object, receive user first to be defeated Enter, which executes the first operation for triggering terminal, which is indicated that the target information includes by target information The first information and the second information, the target object obtain after being encrypted to the first information;Sensor 105, in response to First input, acquires the first fingerprint of user;Processor 110, it is corresponding for the target identification in first fingerprint matching When the second fingerprint, the first information and the second information are obtained, to obtain the target information;The first information is corresponding with the target identification Target object correspond to, second information the second fingerprint corresponding with the target identification is corresponding;To the target information execute this One operation.
Terminal provided in an embodiment of the present invention in display target mark and target object, receives the first of user first Input, first input execute the first operation for triggering terminal, which is indicated by target information, the target information packet The first information and the second information are included, which obtains after being encrypted to the first information;Secondly, first defeated in response to this Enter, acquires the first fingerprint of user;Again, in corresponding second fingerprint of first fingerprint matching target identification, the is obtained One information and the second information, to obtain the target information;The target information executes first operation for the first terminal, this One information target object corresponding with the target identification is corresponding, second information the second fingerprint pair corresponding with the target identification It answers.On the one hand, it is obtained after being encrypted to the first information due to target object, terminal is only shown in target information The first information it is encrypted as a result, and the second information in target information is not shown in the display interface of terminal, therefore, mesh Display is complete in the terminal and the information that can be used directly (such as does not show complete telephone number or do not show for mark information Show telephone number), increase the safety of target information;On the other hand during terminal uses target information, due to end End, which needs the fingerprint of user to carry out verification, could obtain the second information, and then obtain target information, therefore, other users or end Application, the software etc. for holding installation can not directly acquire the second information, need the verification ability by the corresponding fingerprint of the second information It obtains, to which target information use can not be obtained, improves the safety of the information stored in terminal.
It should be understood that the embodiment of the present invention in, radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 110 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 101 includes but not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by radio communication system and network and other set Standby communication.
Terminal has provided wireless broadband internet to the user by network module 102 and has accessed, and such as user is helped to receive and dispatch electricity Sub- mail, browsing webpage and access streaming video etc..
It is that audio output unit 103 can receive radio frequency unit 101 or network module 102 or in memory 109 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 103 can also provide and end The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that end 100 executes.Sound Frequency output unit 103 includes loud speaker, buzzer and receiver etc..
Input unit 104 is for receiving audio or video signal.Input unit 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained by image capture apparatus (such as camera) in image capture mode carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or network module 102.Mike Wind 1042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output of mobile communication base station can be sent to via radio frequency unit 101 by being converted in the case of telephone calling model.
Terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjusts the brightness of display panel 1061, and proximity sensor can close display panel when terminal 100 is moved in one's ear 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add The size of speed can detect that size and the direction of gravity when static, can be used to identify terminal posture (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 105 can be with Including fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, thermometer, Infrared sensor etc., details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generates and set with the user of terminal It sets and the related key signals of function control inputs.Specifically, user input unit 107 include touch panel 1071 and other Input equipment 1072.Touch panel 1071, also referred to as touch screen, collect user on it or neighbouring touch operation (such as User is using any suitable objects or attachment such as finger, stylus on touch panel 1071 or near touch panel 1071 Operation).Touch panel 1071 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined The touch orientation of user is surveyed, and detects the signal that touch operation is brought, transmits a signal to touch controller;Touch controller from Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 110, receives processor 110 The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves Realize touch panel 1071.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072. Specifically, other input equipments 1072 can include but is not limited to physical keyboard, function key (such as volume control button, switch Button etc.), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 1071 can be covered on display panel 1061, when touch panel 1071 is detected at it On or near touch operation after, send processor 110 to determine the type of touch event, be followed by subsequent processing device 110 according to touch The type for touching event provides corresponding visual output on display panel 1061.Although in fig.9, touch panel 1071 and display Panel 1061 is to realize the function that outputs and inputs of terminal as two independent components, but in certain embodiments, can The function that outputs and inputs of terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not limited herein specifically It is fixed.
Interface unit 108 is the interface that external device (ED) is connect with terminal 100.For example, external device (ED) may include it is wired or Wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, memory card port, For connecting the port of device with identification module, the port audio input/output (I/O), video i/o port, ear port Etc..Interface unit 108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and will One or more elements that the input received is transferred in terminal 100 or can be used for terminal 100 and external device (ED) it Between transmission data.
Memory 109 can be used for storing software program and various data.Memory 109 can include mainly storing program area And storage data field, wherein storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to It crosses operation or executes the software program and/or module being stored in memory 109, and call and be stored in memory 109 Data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 110 may include one Or multiple processing units;Preferably, processor 110 can integrate application processor and modem processor, wherein application processing The main processing operation system of device, user interface and application program etc., modem processor mainly handles wireless communication.It can manage Solution, above-mentioned modem processor can not also be integrated into processor 110.
Terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 can be with It is logically contiguous by power-supply management system and processor 110, to by power-supply management system realize management charging, electric discharge, with And the functions such as power managed.
In addition, terminal 100 includes some unshowned function modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal, and in conjunction with Fig. 9, including processor 110, memory 109 is deposited The computer program that can be run on memory 109 and on processor 110 is stored up, which is executed by processor 110 Each process of Shi Shixian above- mentioned information acquisition methods embodiments, and identical technique effect can be reached, to avoid repeating, here It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program realizes each process of above- mentioned information acquisition methods embodiment, and energy when the computer program is executed by processor Reach identical technique effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc Or CD etc..
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within the protection of the present invention.

Claims (12)

1. a kind of information acquisition method, which is characterized in that the method includes:
In display target mark and target object, the first input is received, first input is executed for triggering first terminal First operation, the target identification are indicated that the target information includes the first information and the second information, the mesh by target information Mark object obtains after being encrypted to the first information;
In response to first input, the first fingerprint of user is acquired;
When corresponding second fingerprint of the target identification described in first fingerprint matching, the first information and described second are obtained Information, to obtain the target information;The target information executes described first for the first terminal and operates, and described first The information target object corresponding with the target identification is corresponding, and second information is corresponding with the target identification described Second fingerprint corresponds to.
2. according to the method described in claim 1, it is characterized in that, before display target mark and target object, further include:
Obtain the target information and the target identification;
The first information is encrypted using the first cipher mode, obtains the target object;
Acquire second fingerprint of user;
Target correspondence is preserved, the target correspondence is the target identification, the target object and second finger Correspondence between line, the target object correspond to the first information, and second fingerprint corresponds to second information.
3. according to the method described in claim 2, it is characterized in that, described obtain the target information, including:
The target message that second terminal is sent is received, the target message includes the target information and the target information Effective period of time;
Target correspondence is preserved, including:
Preserve the correspondence between the target correspondence and the effective period of time.
4. according to the method described in claim 3, it is characterized in that, described in response to first input, the of user is acquired One fingerprint, including:
In response to first input, the first moment for receiving first input is obtained;
If first moment in the effective period of time, acquires first fingerprint.
5. according to the method described in claim 3, it is characterized in that, it is described receive second terminal send target message, including:
The Quick Response Code that the second terminal is sent is received, the Quick Response Code is used to indicate the target message;
The Quick Response Code is identified, to obtain the target message.
6. a kind of first terminal, which is characterized in that the first terminal includes:Receiving module, acquisition module and acquisition module;
The receiving module, in first terminal display target mark and target object, receive user first to be defeated Enter, first input executes the first operation for triggering the first terminal, and the target identification is indicated by target information, institute It includes the first information and the second information to state target information, what the target object obtained after being encrypted to the first information;
The acquisition module, first input for being received in response to the receiving module, acquires the first fingerprint of user;
The acquisition module, target identification described in first fingerprint matching for acquiring in the acquisition module corresponding the When two fingerprints, the first information and second information are obtained, to obtain the target information;The target information is used for institute It states first terminal and executes first operation, the first information target object corresponding with the target identification is corresponding, Second information, second fingerprint corresponding with the target identification is corresponding.
7. first terminal according to claim 6, which is characterized in that the first terminal further includes encrypting module and preservation Module;
The acquisition module is additionally operable to before display target mark and target object, obtains the target information and the mesh Mark mark;
The encrypting module is obtained for encrypting the first information that the acquisition module obtains using the first cipher mode The target object;
The acquisition module is additionally operable to second fingerprint of acquisition user;
The preserving module, for preserving target correspondence, the institute that the target correspondence obtains for the acquisition module State target identification, described second that the target object that the encrypting module is encrypted and the acquisition module collect Correspondence between fingerprint, the target object correspond to the first information, and second fingerprint corresponds to second information.
8. first terminal according to claim 7, which is characterized in that
The acquisition module is specifically used for receiving the target message that second terminal is sent, and the target message includes the mesh Mark the effective period of time of information and the target information;
The preserving module is specifically used for preserving the correspondence between the target correspondence and the effective period of time.
9. first terminal according to claim 8, which is characterized in that the acquisition module is used for:
In response to first input, the first moment that the receiving module receives first input is obtained;
If first moment in the effective period of time, acquires first fingerprint.
10. first terminal according to claim 8, which is characterized in that the receiving module is specifically used for:
The Quick Response Code that the second terminal is sent is received, the Quick Response Code is used to indicate the target message;
The Quick Response Code is identified, to obtain the target message.
11. a kind of terminal, which is characterized in that the terminal includes processor, memory and is stored on the memory and can The computer program run on the processor realizes such as claim when the computer program is executed by the processor The step of information acquisition method described in any one of 1-5.
12. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium Sequence, the information acquisition method as described in any one of claim 1-5 is realized when the computer program is executed by processor Step.
CN201810509931.2A 2018-05-24 2018-05-24 Information acquisition method, terminal and computer readable storage medium Active CN108769403B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810509931.2A CN108769403B (en) 2018-05-24 2018-05-24 Information acquisition method, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810509931.2A CN108769403B (en) 2018-05-24 2018-05-24 Information acquisition method, terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108769403A true CN108769403A (en) 2018-11-06
CN108769403B CN108769403B (en) 2021-05-18

Family

ID=64005914

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810509931.2A Active CN108769403B (en) 2018-05-24 2018-05-24 Information acquisition method, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108769403B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109951844A (en) * 2019-01-31 2019-06-28 维沃移动通信有限公司 A kind of information protecting method and device

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070119255A (en) * 2006-06-14 2007-12-20 주식회사 엘지텔레콤 Method for controlling of reading message in mobile telecommunication terminal and terminal having controllable function of reading message
CN103780731A (en) * 2012-10-26 2014-05-07 腾讯科技(深圳)有限公司 Method and device for obtaining privacy contacts
CN103795849A (en) * 2012-11-01 2014-05-14 广州三星通信技术研究有限公司 Device and method for executing operation on private contact person in portable terminal
KR101472495B1 (en) * 2014-06-13 2014-12-19 동국대학교 산학협력단 Data hiding device and method for information security
US20150288668A1 (en) * 2014-04-08 2015-10-08 Aric Sean Kupper Authenticating access to confidential information by unregistered requestor
CN105120047A (en) * 2015-07-16 2015-12-02 魅族科技(中国)有限公司 Display method of caller ID display information and terminal
CN105338172A (en) * 2015-09-24 2016-02-17 宇龙计算机通信科技(深圳)有限公司 Fingerprint dialing method and apparatus
CN105611040A (en) * 2015-09-23 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Information display method, information display device and terminal
CN106022196A (en) * 2016-06-30 2016-10-12 维沃移动通信有限公司 Information sharing method and intelligent terminal
CN106357413A (en) * 2016-11-02 2017-01-25 广东虹勤通讯技术有限公司 Method for encrypting numbers with fingerprint and mobile terminal
CN106878560A (en) * 2017-02-22 2017-06-20 北京珠穆朗玛移动通信有限公司 Call-information processing method and mobile terminal based on dual system
CN106936973A (en) * 2017-04-24 2017-07-07 北京珠穆朗玛移动通信有限公司 Incoming call sound method and mobile terminal based on fingerprint
CN106941565A (en) * 2017-03-22 2017-07-11 努比亚技术有限公司 Address list display method and mobile terminal
CN107154920A (en) * 2016-03-04 2017-09-12 神讯电脑(昆山)有限公司 Encryption method, decryption method and the reception device to receive security information of security information
CN107292194A (en) * 2017-05-26 2017-10-24 北京珠穆朗玛移动通信有限公司 A kind of data guard method, mobile terminal and storage medium
CN107317680A (en) * 2017-06-28 2017-11-03 努比亚技术有限公司 Labeling method, system and the computer-readable recording medium of secured account numbers
CN107426420A (en) * 2017-07-06 2017-12-01 努比亚技术有限公司 A kind of method, apparatus and computer-readable recording medium for protecting associated person information

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070119255A (en) * 2006-06-14 2007-12-20 주식회사 엘지텔레콤 Method for controlling of reading message in mobile telecommunication terminal and terminal having controllable function of reading message
CN103780731A (en) * 2012-10-26 2014-05-07 腾讯科技(深圳)有限公司 Method and device for obtaining privacy contacts
CN103795849A (en) * 2012-11-01 2014-05-14 广州三星通信技术研究有限公司 Device and method for executing operation on private contact person in portable terminal
US20150288668A1 (en) * 2014-04-08 2015-10-08 Aric Sean Kupper Authenticating access to confidential information by unregistered requestor
KR101472495B1 (en) * 2014-06-13 2014-12-19 동국대학교 산학협력단 Data hiding device and method for information security
CN105120047A (en) * 2015-07-16 2015-12-02 魅族科技(中国)有限公司 Display method of caller ID display information and terminal
CN105611040A (en) * 2015-09-23 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Information display method, information display device and terminal
CN105338172A (en) * 2015-09-24 2016-02-17 宇龙计算机通信科技(深圳)有限公司 Fingerprint dialing method and apparatus
CN107154920A (en) * 2016-03-04 2017-09-12 神讯电脑(昆山)有限公司 Encryption method, decryption method and the reception device to receive security information of security information
CN106022196A (en) * 2016-06-30 2016-10-12 维沃移动通信有限公司 Information sharing method and intelligent terminal
CN106357413A (en) * 2016-11-02 2017-01-25 广东虹勤通讯技术有限公司 Method for encrypting numbers with fingerprint and mobile terminal
CN106878560A (en) * 2017-02-22 2017-06-20 北京珠穆朗玛移动通信有限公司 Call-information processing method and mobile terminal based on dual system
CN106941565A (en) * 2017-03-22 2017-07-11 努比亚技术有限公司 Address list display method and mobile terminal
CN106936973A (en) * 2017-04-24 2017-07-07 北京珠穆朗玛移动通信有限公司 Incoming call sound method and mobile terminal based on fingerprint
CN107292194A (en) * 2017-05-26 2017-10-24 北京珠穆朗玛移动通信有限公司 A kind of data guard method, mobile terminal and storage medium
CN107317680A (en) * 2017-06-28 2017-11-03 努比亚技术有限公司 Labeling method, system and the computer-readable recording medium of secured account numbers
CN107426420A (en) * 2017-07-06 2017-12-01 努比亚技术有限公司 A kind of method, apparatus and computer-readable recording medium for protecting associated person information

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109951844A (en) * 2019-01-31 2019-06-28 维沃移动通信有限公司 A kind of information protecting method and device

Also Published As

Publication number Publication date
CN108769403B (en) 2021-05-18

Similar Documents

Publication Publication Date Title
CN107608514A (en) Information processing method and mobile terminal
CN105912905A (en) Fingerprint unlocking method and terminal
CN108595946A (en) A kind of method and terminal of protection privacy
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN110209323A (en) A kind of method and terminal device showing unread message
CN108449481A (en) A kind of associated person information recommends method and terminal
CN109600297A (en) A kind of mark sweep-out method and terminal device
CN110457935A (en) A kind of authority configuring method and terminal device
CN110309004A (en) The processing method and terminal of data
CN108898040A (en) A kind of recognition methods and mobile terminal
CN110149628A (en) A kind of information processing method and terminal device
CN108733993A (en) A kind of method for information display and terminal
CN110049187A (en) A kind of display methods and terminal device
CN107707554A (en) A kind of login method and mobile terminal of application program account
CN108363591A (en) A kind of method and device of PUSH message control
CN110505340A (en) A kind of message method and terminal device
CN108984231A (en) A kind of login method and mobile terminal of application program account
CN108446153A (en) A kind of method and terminal of control e-sourcing
CN110443030A (en) A kind of permission processing method and terminal device
CN109815678A (en) A kind of authority configuring method and mobile terminal
CN108769403A (en) A kind of information acquisition method and terminal
CN109033898A (en) A kind of data inputting method and mobile terminal
CN109343900A (en) A kind of authority configuring method and terminal
CN108012024A (en) The method and mobile terminal of a kind of calendar notification
CN108171036A (en) The control method and mobile terminal of a kind of application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant