CN108769403A - A kind of information acquisition method and terminal - Google Patents
A kind of information acquisition method and terminal Download PDFInfo
- Publication number
- CN108769403A CN108769403A CN201810509931.2A CN201810509931A CN108769403A CN 108769403 A CN108769403 A CN 108769403A CN 201810509931 A CN201810509931 A CN 201810509931A CN 108769403 A CN108769403 A CN 108769403A
- Authority
- CN
- China
- Prior art keywords
- information
- target
- terminal
- fingerprint
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Environmental & Geological Engineering (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Telephone Function (AREA)
Abstract
A kind of information acquisition method of offer of the embodiment of the present invention and terminal, are applied to field of terminal technology, to solve the problems, such as that the safety of information reduces.This method includes:In display target mark and target object, the first input of user is received, which executes the first operation for triggering first terminal, which is indicated by target information, the target information includes the first information and the second information, which obtains after being encrypted to the first information;In response to first input, the first fingerprint of user is acquired;In corresponding second fingerprint of first fingerprint matching target identification, the first information and second information are obtained, to obtain the target information;The target information executes first operation for the first terminal, and first information target object corresponding with the target identification is corresponding, and second information, second fingerprint corresponding with the target identification is corresponding.
Description
Technical field
The present embodiments relate to field of terminal technology more particularly to a kind of information acquisition method and terminals.
Background technology
With the fast development of the communication technology, the application of terminal is more and more extensive, the safety of the information stored in terminal
It is more and more important.
By taking the information stored in terminal is communicating number as an example, user can store the communicating number of the contact person of user
In the address list of terminal.If user needs to communicate with some contact person, user can open the lookup of address list triggering terminal
The communicating number is included on the boundary of terminal after the communicating number for finding the contact person by the communicating number of the contact person, terminal
In face, to which user can use the communicating number of display, such as using the communicating number of display makes a phone call, sends short messages, account
Verify or share business card etc..
However, in the storage mode of current communicating number, many applications can also read and using being stored in address list
Communicating number, such as it is certain application for Rapid Popularization, the contact person that advertisement information may be pushed in user communication record,
So so that the safety of information reduces.
Invention content
A kind of information acquisition method of offer of the embodiment of the present invention and terminal, to solve the problems, such as that the safety of information reduces.
In order to solve the above-mentioned technical problem, the embodiment of the present invention is realized in:
In a first aspect, the embodiment of the present invention provides a kind of information acquisition method, in display target mark and target object,
The first input of user is received, which executes the first operation for triggering first terminal, which is believed by target
Breath instruction, the target information include the first information and the second information, which obtains after being encrypted to the first information;
In response to first input, the first fingerprint of user is acquired;In corresponding second fingerprint of first fingerprint matching target identification
When, the first information and second information are obtained, to obtain the target information;The target information is executed for the first terminal should
First operation, first information target object corresponding with the target identification is corresponding, second information and the target identification pair
Second fingerprint answered corresponds to.
Second aspect, the embodiment of the present invention additionally provide a kind of first terminal, which includes:Receiving module is adopted
Collect module, acquisition module and execution module;The receiving module, in first terminal display target mark and target object
When, the first input of user is received, which executes the first operation for triggering the first terminal, and the target identification is by mesh
Information instruction is marked, which includes the first information and the second information, which obtains after being encrypted to the first information
's;The acquisition module, first input for being received in response to the receiving module, acquires the first fingerprint of user;The acquisition
Module, when corresponding second fingerprint of first fingerprint matching target identification for being acquired in the acquisition module, obtain this
One information and second information, to obtain the target information;The target information executes first operation for the first terminal, should
First information target object corresponding with the target identification is corresponding, second information, second finger corresponding with the target identification
Line corresponds to.
The third aspect an embodiment of the present invention provides a kind of terminal, including processor, memory and is stored in the memory
Computer program that is upper and can running on the processor, realizes such as first aspect when which is executed by the processor
The step of described information acquisition method.
Fourth aspect, an embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage mediums
Computer program is stored in matter, and information acquisition method as described in relation to the first aspect is realized when which is executed by processor
The step of.
In embodiments of the present invention, first, in display target mark and when target object, first terminal receives the of user
One input;Secondly, in response to the first input, first terminal acquires the first fingerprint of user;Again, in the first fingerprint matching target
When identifying corresponding second fingerprint, first terminal obtains the first information and the second information, to obtain target information;The target information
First operation is executed for the first terminal, first information target object corresponding with target identification is corresponding, the second information
The second fingerprint corresponding with target identification is corresponding.On the one hand, it is obtained after being encrypted to the first information due to target object, because
This, terminal only show it is encrypted to the first information in target information as a result, and the second information in target information not
Shown in the display interface of terminal, therefore, target information in the terminal display it is complete and can be used directly information (such as
Complete telephone number is not shown or does not show telephone number), increase the safety of target information;On the other hand in terminal
During using target information, the second information could be obtained since terminal needs the fingerprint of user to carry out verification, and then obtain
Target information, therefore, application, the software etc. of other users or terminal installation can not directly acquire the second information, need by
The verification of the corresponding fingerprint of second information could obtain, and used to obtain target information, improve in terminal and deposit
The safety of the information of storage.
Description of the drawings
Fig. 1 is a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram one of acquisition of information provided in an embodiment of the present invention;
Fig. 3 is a kind of flow diagram two of acquisition of information provided in an embodiment of the present invention;
Fig. 4 is a kind of flow diagram three of acquisition of information provided in an embodiment of the present invention;
Fig. 5 is the possible structural schematic diagram of a kind of first terminal provided in an embodiment of the present invention one;
Fig. 6 is the possible structural schematic diagram of a kind of first terminal provided in an embodiment of the present invention two;
Fig. 7 is the possible structural schematic diagram of a kind of first terminal provided in an embodiment of the present invention three;
Fig. 8 is the possible structural schematic diagram of a kind of first terminal provided in an embodiment of the present invention four;
Fig. 9 is a kind of hardware architecture diagram of terminal of each embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
It should be noted that "/" herein indicate or the meaning, for example, A/B can indicate A or B;Herein
"and/or" is only a kind of incidence relation of description affiliated partner, indicates may exist three kinds of relationships, for example, A and/or B, it can
To indicate:Individualism A exists simultaneously A and B, these three situations of individualism B." multiple " refer to two or more.
It should be noted that in the embodiment of the present invention, " illustrative " or " such as " etc. words make example, example for indicating
Card or explanation.Be described as in the embodiment of the present invention " illustrative " or " such as " any embodiment or design scheme do not answer
It is interpreted than other embodiments or design scheme more preferably or more advantage.Specifically, " illustrative " or " example are used
Such as " word is intended to that related notion is presented in specific ways.
Terminal in the embodiment of the present invention can be the terminal with operating system.The operating system can be Android
(Android) operating system can be ios operating systems, can also be other possible operating systems, the embodiment of the present invention is not
Make specific limit.
Below by taking Android operation system as an example, introduce what information acquisition method provided in an embodiment of the present invention was applied
Software environment.
As shown in Figure 1, being a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention.Scheming
In 1, the framework of Android operation system includes 4 layers, respectively:Application layer, application framework layer, system operation library layer and
Inner nuclear layer (is specifically as follows Linux inner core).
Wherein, application layer includes each application program (including system application and in Android operation system
Tripartite's application program).
Application framework layer is the frame of application program, and developer can be in the exploitation of the frame in accordance with application program
In the case of principle, some application programs are developed based on application framework layer.
System operation library layer includes library (also referred to as system library) and Android operation system running environment.Library is mainly Android behaviour
All kinds of resources needed for it are provided as system.Android operation system running environment is used to provide software loop for Android operation system
Border.
Inner nuclear layer is the operating system layer of Android operation system, belongs to the bottom of Android operation system software level.It is interior
Stratum nucleare provides core system service and hardware-related driver based on linux kernel for Android operation system.
By taking Android operation system as an example, in the embodiment of the present invention, developer can be based on above-mentioned Android as shown in Figure 1
The software program of information acquisition method provided in an embodiment of the present invention is realized in the system architecture of operating system, exploitation, so that
The information acquisition method can be run based on Android operation system as shown in Figure 1.I.e. processor or terminal device can lead to
It crosses and runs software program realization information acquisition method provided in an embodiment of the present invention in Android operation system.
In order to make it easy to understand, the embodiment of the present invention is illustrated by taking first terminal and second terminal as an example, wherein first eventually
End and second terminal can be any one terminal, and the embodiment of the present invention is not especially limited this.
Target information in the embodiment of the present invention may include communicating number, account number, ID card No. and password
Deng, wherein communicating number may include the communicating number of phone number, base number and instant messaging;Account number can be
Bank account numbers, the account numbers such as email accounts number, the target information in the embodiment of the present invention can be number, letter and symbol
The information of number composition, the embodiment of the present invention is not especially limited this.
Information acquisition method provided in an embodiment of the present invention is illustrated with reference to Fig. 2, Fig. 2 is the embodiment of the present invention
The flow diagram of a kind of acquisition of information provided, as shown in Fig. 2, including S201-S203:
S201, in display target mark and when target object, first terminal receives the first input.
Wherein, the first input executes the first operation for triggering first terminal, and target identification is indicated by target information, target
Information includes the first information and the second information, and target object obtains after being encrypted to the first information.
Optionally, the first input can be the pressing of user on the screen, click, suspension touch control, or user adopts
The corresponding target object of target identification is chosen with physical button control, or voice input control uses target identification
Target information corresponding with target object etc., the embodiment of the present invention is not especially limited this.
Assuming that target information is contact number, then target identification can be name of contact person, and target object can be terminal
A part of number of contact number is encrypted.
Optionally, first terminal can in address list display target mark and target object, can also converse in history
Display target mark and target object in record;On the other hand, the first operation can be that user is made a phone call using contact number, sent out
Short message or the operation for sharing contact number;The embodiment of the present invention is not especially limited this.
It should be noted that when target information is contact number, target identification can be name of contact person, contact person's surname
Name and company name, name of contact person and other can distinguish the label etc. of the contact person and other contact persons, target identification is used for
One target information of unique mark in first terminal, the form and content of the unlimited mark that sets the goal of the embodiment of the present invention.
S202, it is inputted in response to first, first terminal acquires the first fingerprint of user.
Optionally, be provided with fingerprint collecting region outside the display screen of first terminal, or in first terminal screen it is solid
Positioning, which installs, is equipped with fingerprint collecting region, then terminal prompts the user with after receiving the first input of user in fingerprint collecting
Region acquires fingerprint.When first terminal has a lower finger print collecting function of screen, and any one region can acquire and refer on the screen
When line, if the first input is the operations such as pressing, touch or suspension control on a display screen, terminal is detecting that first is defeated
Do not have to prompt the user with after entering, directly acquisition first inputs the fingerprint of corresponding user's finger and carries out fingerprint matching.The present invention
Embodiment is not especially limited for how fingerprint acquires.
S203, in corresponding second fingerprint of the first fingerprint matching target identification, first terminal obtains the first information and the
Two information, to obtain target information.
Wherein, target information executes the first operation, first information target pair corresponding with target identification for first terminal
As correspondence, the second information the second fingerprint corresponding with target identification is corresponding.
Information acquisition method in the embodiment of the present invention, first, in display target mark and target object, first terminal
Receive the first input of user;Secondly, in response to the first input, first terminal acquires the first fingerprint of user;Again, first
When corresponding second fingerprint of fingerprint matching target identification, first terminal obtains the first information and the second information, to obtain target letter
Breath;Wherein, first information target object corresponding with target identification is corresponding, the second information the second fingerprint corresponding with target identification
It is corresponding.On the one hand, it is obtained after being encrypted to the first information due to target object, terminal is only shown to target information
In the first information it is encrypted as a result, and the second information in target information is not shown in the display interface of terminal, therefore,
Display is complete in the terminal and the information that can be used directly (such as does not show complete telephone number or not for target information
Show telephone number), increase the safety of target information;On the other hand during terminal uses target information, due to
Terminal, which needs the fingerprint of user to carry out verification, could obtain the second information, and then obtain target information, therefore, other users or
Application, the software etc. of terminal installation can not directly acquire the second information, need the verification ability by the corresponding fingerprint of the second information
It can obtain, be used to which target information can not be obtained, improve the safety of the information stored in terminal.
Optionally, (that is, after S203) after terminal obtains target information, user can use the target information,
Information acquisition method provided in an embodiment of the present invention can also include S204:
S204, first terminal execute the first operation according to target information.
Illustratively, if the first operation is makes a phone call, terminal dials number after obtaining target information;If the first behaviour
As sending short messages, then terminal after obtaining target information can with editing short message content, certainly, terminal can also edited it is short
Believe that content selects a contact person later, then the first operation is that the contact person is selected to send short message, and target is got in terminal
Give target information corresponding contact person the short message sending editted after information.
Optionally, terminal when using target information firstly the need of storing target information in the terminal, as shown in figure 3,
Before S201, above- mentioned information acquisition methods further include S205-S208:
S205, first terminal obtain target information and target identification.
Optionally, first terminal can obtain target information and target identification in several ways, such as can pass through use
The target information and target identification of family input obtain, and can also be received and be obtained sharing for other users by the application of instant messaging class
It takes, the embodiment of the present invention is not especially limited this.
S206, first terminal use the first cipher mode encrypted first information, obtain target object.
Optionally, the first cipher mode can be any one cipher mode, the target pair obtained after first information encryption
As that can be at least two combination in picture, number, letter or symbol etc. or picture, number, letter, symbol, the present invention
Embodiment is not especially limited this.
S207, first terminal acquire the second fingerprint of user.
Optionally, first terminal can prompt the user with acquisition fingerprint, fingerprint collecting region can be terminal screen under refer to
Line pickup area, or pickup area of the terminal in physical button, the embodiment of the present invention are not especially limited this.
It should be noted that the second fingerprint of user can be the fingerprint of any one finger of user, the second fingerprint also may be used
Think that the unlock fingerprint that user has prestored, the embodiment of the present invention are not especially limited this.
S208, first terminal preserve target correspondence, and target correspondence is target identification, target object and the second finger
Correspondence between line, target object correspond to the first information, and the second fingerprint corresponds to the second information.
In order to make it easy to understand, being briefly described to target correspondence with reference to table.Wherein, table 1, table 2-1, table 2-
2, table 2-3 is exemplary illustration, and target correspondence can also be stored as other forms in practical application, for example, the shape of tree
Formula, form of figure etc., the embodiment of the present invention is not especially limited this.
Illustratively, target identification, effective period of time, target object, the first information, fingerprint, the second letter are stored in table 1
Breath, particular content can refer to following forms and store.
Table 1
Target identification | Effective period of time | Target object | The first information | Fingerprint | Second information |
User 1 | 20180101-20180107 | Target object 1 | The first information 1 | Fingerprint 1 | Second information 1 |
User 2 | 20180101-20180301 | Target object 1 | The first information 2 | Fingerprint 1 | Second information 2 |
User 3 | 20180101-20180501 | Target object 3 | The first information 3 | Fingerprint 2 | Second information 3 |
User 4 | 20180101-20190101 | Target object 4 | The first information 4 | Fingerprint 2 | Second information 4 |
User 5 | 20180101- | Target object 5 | The first information 5 | Fingerprint 3 | Second information 5 |
Wherein, user 5 is not provided with the effect period, i.e. terminal can use always the target information of user 5.
Certainly, the correspondence of target identification and effective period of time can also be stored in a table in terminal, example
Such as table 2-1, the correspondence of target identification, target object and the first information is stored in a table by terminal, such as table 2-
2, the correspondence of target identification, fingerprint and the second information is stored in a table by terminal, such as table 2-3.
Table 2-1
Target identification | Effective period of time |
User 1 | 20180101-20180107 |
User 2 | 20180101-20180301 |
User 3 | 20180101-20180501 |
User 4 | 20180101-20190101 |
User 5 | 20180101- |
Table 2-2
Target identification | Target object | The first information |
User 1 | Target object 1 | The first information 1 |
User 2 | Target object 1 | The first information 2 |
User 3 | Target object 3 | The first information 3 |
User 4 | Target object 4 | The first information 4 |
User 5 | Target object 5 | The first information 5 |
Table 2-3
Target identification | Fingerprint | Second information |
User 1 | Fingerprint 1 | Second information 1 |
User 2 | Fingerprint 1 | Second information 2 |
User 3 | Fingerprint 2 | Second information 3 |
User 4 | Fingerprint 2 | Second information 4 |
User 5 | Fingerprint 3 | Second information 5 |
In conjunction in above-mentioned table as can be seen that different target identifications can correspond to identical target object, correspondence it is different
Target identification can also correspond to identical fingerprint, and the embodiment of the present invention is not especially limited this.
Based on the program, first, first terminal obtains target information and target identification;Secondly, first terminal uses first
Cipher mode encrypted first information, obtains target object;Again, the second fingerprint of first terminal acquisition user;Finally, first eventually
End preserves target correspondence, correspondence of the target correspondence between target identification, target object and the second fingerprint, mesh
Mark object corresponds to the first information, and the second fingerprint corresponds to the second information;Since terminal does not preserve target information directly, but,
Target object is corresponded into the first information when target identification is to corresponding to, the second fingerprint corresponds to the second information, i.e., target information is divided into two
Part establishes respective correspondence respectively, target information can be directly invoked to avoid the application in terminal, to improve
The safety of information.
Optionally, when target information is to be obtained in the message that is sent by second terminal of first terminal, then in S205
" obtaining target information " can be executed by S205a:
S205a, first terminal receive the target message that second terminal is sent, and target message includes target information and target
The effective period of time of information.
Optionally, the first information can be electronic business card information, can be to target information and target information it is effective when
Between after section processing (such as encryption) information, this is not especially limited in the embodiment of the present invention.
First terminal is authorized to correspond to it should be noted that the effective period of time of target information is the corresponding user of target information
The time span that can use of user, the length of the effective period of time of target information can be any one length, the present invention
The effective period of time of target information is not especially limited.
Illustratively, it is assumed that user A needed to contact with user B in three months, was no longer contacted after three months, then user
The effective period of time that user B can use the telephone number of user A can be arranged in A, then the telephone number of user A is shared with use
Family B;Certainly, if user A, which is shared in the telephone number of user B, is not provided with effective period of time, can always may be used with default user B
To use the contact number of user A.
In turn, the S208 in above- mentioned information acquisition methods embodiment can be executed by S208a:
S208a, first terminal preserve the correspondence between target correspondence and effective period of time.
Based on the program, if first terminal obtains target information by second terminal, if the target information is provided with
Effective period of time, then first terminal the correspondence of the effective period of time and target correspondence can be saved in terminal,
In order to which whether user judges the target information in effective period of time when in use.
Optionally, if first terminal saves the correspondence between target correspondence and effective period of time, S202
It can be executed by S202a and S202b:
S202a, it is inputted in response to first, first terminal obtains the first moment for receiving the first input.
If S202b, the first moment, in effective period of time, first terminal acquires the first fingerprint.
Optionally, terminal can also obtain target information and determine whether in effective period of time again, i.e., can after S203
To include S209:
S209, first terminal acquire the second moment of target information.
In turn, S204 can be executed by S204a:
If S204a, second moment, in effective period of time, first terminal executes the first operation to target information.
Based on the program, whether first terminal is before using target information, in target at the time of needing first to judge current
In the effective period of time of information, if the target information could be used, so that the corresponding user of target information can control
The time limit that target information is used by first terminal, so as to increase the safety of information.
Optionally, if the effectual time of target information is no longer valid, above- mentioned information acquisition methods are after S202a, also
May include S210:
If S210, the first moment, not in effective period of time, it is invalid information that first terminal, which prompts target information,.
Optionally, it is invalid information that terminal can prompt target information in several ways, such as:Believed by display reminding
It ceases, by output prompt tone and by showing picture prompting etc., the embodiment of the present invention is not especially limited this.
Optionally, if the first moment is not in effective period of time, first terminal can prompt target information that can not use, the
One terminal can delete data corresponding with target information after determining that target information is invalid information in inside, can also carry
Show the corresponding data of user's delete target information.
Based on the program, if receiving the first moment of the first input not in the effective period of time of target information, table
Show that the corresponding user of first terminal can not be continuing with target information, it is invalid that first terminal, which can prompt the user with target information,
Information in order to which user further processes, such as is made to target information corresponding user application by other communication modes
With, or the corresponding data of prompt user's delete target information, avoid the memory space of invalid data occupied terminal.
Optionally, it is assumed that the effective period of time of target information and target information that first terminal obtains is to come from target information
What corresponding user shared, then S205a can be realized by S205a1 and S205a2:
S205a1, first terminal receive the Quick Response Code that second terminal is sent, which is used to indicate target message.
It should be noted that the information in above-mentioned Quick Response Code may include effective time, first terminal receives Quick Response Code
Moment alreadys exceed the effective time of Quick Response Code, then terminal can not obtain target message by the Quick Response Code received.
S205a2, first terminal identify Quick Response Code, to obtain target message.
It should be noted that first terminal after obtaining Quick Response Code, may not identify the Quick Response Code immediately, therefore
Before first terminal identifies Quick Response Code, first terminal can first detect the operation of user, if the operation instruction first terminal of user
Identify Quick Response Code, then terminal executes S205a2.
It is understood that first terminal receive second terminal transmission Quick Response Code after, can also be by the two dimension
Code is transmitted to third terminal, and the Quick Response Code that third terminal receives first terminal transmission later can also be according to the place of first terminal
Reason mode is handled, wherein the effective period of time of the target information stored in third terminal is the period of second terminal setting.
Based on the program, first terminal can receive the Quick Response Code that second terminal is sent by second terminal, pass through identification
The Quick Response Code, first terminal can obtain the effective period of time of the target information and target information of first information instruction, and first eventually
Target information is shared in end by Quick Response Code, and other users can also be avoided to obtain target letter by watching the target information of display
Breath, to increase the safety of information.
Optionally, target information includes N number of character, and the first information is from the 1st to m-th character in N number of character second
Information is (N-M) a character in addition to the first information in N number of character, wherein N is positive integer, and M is the positive integer less than N.
Based on the program, the length of the encrypted first information can be selected according to the complexity of realization, select the first fingerprint
The length of corresponding second information.
Illustratively, in order to make it easy to understand, by using telephone number 1 that target information is user 1, the first information as phone number
(such as telephone number is 1234678901, then the first information is by code first 5 of 1, latter 6 that the second information be telephone number 1
" 12345 ", the second information are " 678901 "), first terminal is the terminal that user 2 uses, and second terminal is the end that user 1 uses
It is detailed according to a kind of acquisition process of possible telephone number, storing process and using being carried out for process successively for end
It illustrates, Fig. 4 is a kind of acquisition of information flow diagram provided in an embodiment of the present invention, and flow includes as follows:
Acquisition process:
T1:Second terminal detects that sharing operation, second terminal display interface 1, interface 1 can be used for inputting using effective
Period, sharing operation are that telephone number 1 (that is, target information) is shared with user 2 by user.
T2:Second terminal obtains the period 1 that user 1 inputs at interface 1, and the period 1 uses for 1 authorized user 2 of user
The telephone number of user 1 when a length of period 1.
T3:Second terminal generates Quick Response Code 1 according to telephone number 1 and period 1.
T4:Quick Response Code 1 is sent to first terminal by second terminal.
T5:First terminal receives the Quick Response Code 1 that second terminal is sent.
Storing process:
T6:First terminal detects operation 1, which is that user stores the corresponding electricity of the Quick Response Code by the Quick Response Code
Talk about the operation of number 1.
T7:Effectively whether first terminal judge Quick Response Code 1.
It should be noted that judging whether Quick Response Code 1 effectively can be to judge whether Quick Response Code 1 is overtime, avoids in T1
Fixed Quick Response Code may also reveal information, judge Quick Response Code certainly, in T1 effectively and can also be to judge the Quick Response Code whether by
Damage etc., that is, judge whether the Quick Response Code can be used.
T8:If first terminal judges that Quick Response Code 1 is effective, first terminal identifies Quick Response Code 1.
It is appreciated that second terminal identifies that Quick Response Code, i.e. second terminal obtain the electricity of Quick Response Code instruction from Quick Response Code
Talk about the effective period of time of number 1 and telephone number 1.
T9:If first terminal judges that Quick Response Code 1 is invalid, first terminal prompts the Quick Response Code 1 to fail.
T10:Preceding 5 bit digital (that is, first information) of first terminal encrypted telephone number 1, obtains 1 (i.e. target pair of picture
As).
Specifically, in T10, first terminal can select number being converted to the first cipher mode of picture to phone number
Preceding the 5 of code 1 are encryption.
T11:First terminal acquires the fingerprint 1 (that is, second fingerprint) of user 2.
T12:First terminal preserves target correspondence.
Wherein, target correspondence is the correspondence between name 1, picture 1, fingerprint 1, wherein in depositing for the name 1
It stores up under catalogue, picture 1 corresponds to the first information, and fingerprint 1 corresponds to the second information.
Use process:
T13, first terminal receive user 2 and make a phone call the input of number, wherein the input for making a phone call number can be with
For user in address list selection dial the input of 1 corresponding user of name.
T14:First terminal acquires the fingerprint 2 (that is, first fingerprint) of user 2.
T15:When fingerprint 2 meets 1 corresponding fingerprint 1 of name, first terminal obtains information 1 (i.e. the first information) and information
2 (i.e. the second information), to obtain telephone number 1.
Wherein, information 1 is corresponding with 1 corresponding picture 1 of name, and information 2 is corresponding with 1 corresponding fingerprint 1 of name.
T16:Whether first terminal determines object time within the period 1.Wherein, object time is that first terminal obtains electricity
At the time of talking about number 1.
Optionally, second terminal can also be obtained in T4 acquisition fingerprint 2 when at the time of, and judge acquire fingerprint 2 when
Whether the moment is within the period 1.
T17:If object time, within the period 1, first terminal makes a phone call number 1.
T18:First terminal establishes correspondence with second terminal.
T19:If object time, not within the period 1, first terminal prompt mobile phone number 1 fails.
Based on the program, on the one hand, it is obtained after being encrypted to the first information due to target object, terminal is only aobvious
Shown it is encrypted to the first information in target information as a result, and the second information in target information not in the display of terminal
Interface display, therefore, display is complete in the terminal and the information that can be used directly (such as is not shown complete for target information
Telephone number does not show telephone number), increase the safety of target information;On the other hand target information is used in terminal
During, the second information could be obtained since terminal needs the fingerprint of user to carry out verification, and then obtain target information, because
This, application, the software etc. of other users or terminal installation can not directly acquire the second information, need to correspond to by the second information
The verification of fingerprint could obtain, to which target information use can not be obtained, improve the safety of the information stored in terminal.
Fig. 5 is a kind of possible structural schematic diagram of first terminal provided in an embodiment of the present invention, as shown in figure 5, first is whole
End 500 includes:Receiving module 501, acquisition module 502 and acquisition module 503;Receiving module 501 is used for aobvious in first terminal 500
When showing target identification and target object, the first input of user is received, the first input executes first for triggering first terminal 500
Operation, target identification are indicated that target information includes the first information and the second information, and target object is to the first information by target information
It is obtained after encryption;Acquisition module 502, the first input for being received in response to receiving module 501, acquire user first refer to
Line;Acquisition module 503, in corresponding second fingerprint of the first fingerprint matching target identification that acquisition module 502 acquires, obtaining
The first information and the second information are taken, to obtain target information;Target information executes first for first terminal 500 and operates, and first
Information target object corresponding with target identification is corresponding, and the second information the second fingerprint corresponding with target identification is corresponding.
Optionally, as described in Figure 6 in conjunction with Fig. 5, first terminal 500 further includes execution module 504;Execution module 504 is used for
The first operation is executed according to the target information that acquisition module 503 obtains.
Optionally, in conjunction with Fig. 5, as shown in fig. 7, first terminal 500 further includes encrypting module 505 and preserving module 506;It obtains
Modulus block 503 is additionally operable to before display target mark and target object, obtains target information and target identification;Encrypting module
505, the first information for being obtained using the first cipher mode encryption acquisition module 503 obtains target object;Acquisition module
502, it is additionally operable to the second fingerprint of acquisition user;Preserving module 506, for preserving target correspondence, target correspondence is
The target identification of the acquisition of acquisition module 503, encrypting module 505 encrypt obtained target object and acquisition module 502 collects
The second fingerprint between correspondence, target object corresponds to the first information, and the second fingerprint corresponds to the second information.
Optionally, acquisition module 503 are specifically used for receiving the target message that second terminal is sent, and target message includes
The effective period of time of target information and target information;Preserving module 506 is specifically used for preserving target correspondence and effective time
Correspondence between section.
Optionally, acquisition module 502 is used for:In response to the first input, obtains receiving module 501 and receive the first input
First moment;If the first moment in effective period of time, acquired the first fingerprint.
Optionally, in conjunction with Fig. 5, as shown in figure 8, first terminal 500 further includes reminding module 507;Reminding module 507 is used
If in the first moment that acquisition module 502 obtains not in effective period of time, it is invalid information to prompt target information.
Optionally, receiving module 501 is specifically used for:The Quick Response Code that second terminal is sent is received, Quick Response Code is used to indicate mesh
Mark message;Quick Response Code is identified, to obtain target message.
Optionally, target information includes N number of character, and the first information is from the 1st to m-th character in N number of character second
Information is (N-M) a character in addition to the first information in N number of character, wherein N is positive integer, and M is the positive integer less than N.
First terminal 500 provided in an embodiment of the present invention can realize that first terminal is realized each in above method embodiment
A process, to avoid repeating, which is not described herein again.
A kind of hardware architecture diagram of Fig. 9 terminals of each embodiment to realize the present invention, the terminal 100 include but not
It is limited to:Radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit
106, the components such as user input unit 107, interface unit 108, memory 109, processor 110 and power supply 111.This field
Technical staff is appreciated that the restriction of the not structure paired terminal of terminal structure shown in Fig. 9, terminal may include than illustrating more
More or less component either combines certain components or different components arrangement.In embodiments of the present invention, terminal includes
But be not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, user input unit 107, in display target mark and target object, receive user first to be defeated
Enter, which executes the first operation for triggering terminal, which is indicated that the target information includes by target information
The first information and the second information, the target object obtain after being encrypted to the first information;Sensor 105, in response to
First input, acquires the first fingerprint of user;Processor 110, it is corresponding for the target identification in first fingerprint matching
When the second fingerprint, the first information and the second information are obtained, to obtain the target information;The first information is corresponding with the target identification
Target object correspond to, second information the second fingerprint corresponding with the target identification is corresponding;To the target information execute this
One operation.
Terminal provided in an embodiment of the present invention in display target mark and target object, receives the first of user first
Input, first input execute the first operation for triggering terminal, which is indicated by target information, the target information packet
The first information and the second information are included, which obtains after being encrypted to the first information;Secondly, first defeated in response to this
Enter, acquires the first fingerprint of user;Again, in corresponding second fingerprint of first fingerprint matching target identification, the is obtained
One information and the second information, to obtain the target information;The target information executes first operation for the first terminal, this
One information target object corresponding with the target identification is corresponding, second information the second fingerprint pair corresponding with the target identification
It answers.On the one hand, it is obtained after being encrypted to the first information due to target object, terminal is only shown in target information
The first information it is encrypted as a result, and the second information in target information is not shown in the display interface of terminal, therefore, mesh
Display is complete in the terminal and the information that can be used directly (such as does not show complete telephone number or do not show for mark information
Show telephone number), increase the safety of target information;On the other hand during terminal uses target information, due to end
End, which needs the fingerprint of user to carry out verification, could obtain the second information, and then obtain target information, therefore, other users or end
Application, the software etc. for holding installation can not directly acquire the second information, need the verification ability by the corresponding fingerprint of the second information
It obtains, to which target information use can not be obtained, improves the safety of the information stored in terminal.
It should be understood that the embodiment of the present invention in, radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 110 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 101 includes but not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by radio communication system and network and other set
Standby communication.
Terminal has provided wireless broadband internet to the user by network module 102 and has accessed, and such as user is helped to receive and dispatch electricity
Sub- mail, browsing webpage and access streaming video etc..
It is that audio output unit 103 can receive radio frequency unit 101 or network module 102 or in memory 109
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 103 can also provide and end
The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that end 100 executes.Sound
Frequency output unit 103 includes loud speaker, buzzer and receiver etc..
Input unit 104 is for receiving audio or video signal.Input unit 104 may include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the image data of the static images or video obtained by image capture apparatus (such as camera) in image capture mode carries out
Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited
Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or network module 102.Mike
Wind 1042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be
The format output of mobile communication base station can be sent to via radio frequency unit 101 by being converted in the case of telephone calling model.
Terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjusts the brightness of display panel 1061, and proximity sensor can close display panel when terminal 100 is moved in one's ear
1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add
The size of speed can detect that size and the direction of gravity when static, can be used to identify terminal posture (such as horizontal/vertical screen switching,
Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 105 can be with
Including fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, thermometer,
Infrared sensor etc., details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generates and set with the user of terminal
It sets and the related key signals of function control inputs.Specifically, user input unit 107 include touch panel 1071 and other
Input equipment 1072.Touch panel 1071, also referred to as touch screen, collect user on it or neighbouring touch operation (such as
User is using any suitable objects or attachment such as finger, stylus on touch panel 1071 or near touch panel 1071
Operation).Touch panel 1071 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined
The touch orientation of user is surveyed, and detects the signal that touch operation is brought, transmits a signal to touch controller;Touch controller from
Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 110, receives processor 110
The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
Realize touch panel 1071.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.
Specifically, other input equipments 1072 can include but is not limited to physical keyboard, function key (such as volume control button, switch
Button etc.), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 1071 can be covered on display panel 1061, when touch panel 1071 is detected at it
On or near touch operation after, send processor 110 to determine the type of touch event, be followed by subsequent processing device 110 according to touch
The type for touching event provides corresponding visual output on display panel 1061.Although in fig.9, touch panel 1071 and display
Panel 1061 is to realize the function that outputs and inputs of terminal as two independent components, but in certain embodiments, can
The function that outputs and inputs of terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not limited herein specifically
It is fixed.
Interface unit 108 is the interface that external device (ED) is connect with terminal 100.For example, external device (ED) may include it is wired or
Wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, memory card port,
For connecting the port of device with identification module, the port audio input/output (I/O), video i/o port, ear port
Etc..Interface unit 108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and will
One or more elements that the input received is transferred in terminal 100 or can be used for terminal 100 and external device (ED) it
Between transmission data.
Memory 109 can be used for storing software program and various data.Memory 109 can include mainly storing program area
And storage data field, wherein storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to
It crosses operation or executes the software program and/or module being stored in memory 109, and call and be stored in memory 109
Data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 110 may include one
Or multiple processing units;Preferably, processor 110 can integrate application processor and modem processor, wherein application processing
The main processing operation system of device, user interface and application program etc., modem processor mainly handles wireless communication.It can manage
Solution, above-mentioned modem processor can not also be integrated into processor 110.
Terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 can be with
It is logically contiguous by power-supply management system and processor 110, to by power-supply management system realize management charging, electric discharge, with
And the functions such as power managed.
In addition, terminal 100 includes some unshowned function modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal, and in conjunction with Fig. 9, including processor 110, memory 109 is deposited
The computer program that can be run on memory 109 and on processor 110 is stored up, which is executed by processor 110
Each process of Shi Shixian above- mentioned information acquisition methods embodiments, and identical technique effect can be reached, to avoid repeating, here
It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program realizes each process of above- mentioned information acquisition methods embodiment, and energy when the computer program is executed by processor
Reach identical technique effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only
Read memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc
Or CD etc..
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements include not only those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this
There is also other identical elements in the process of element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within the protection of the present invention.
Claims (12)
1. a kind of information acquisition method, which is characterized in that the method includes:
In display target mark and target object, the first input is received, first input is executed for triggering first terminal
First operation, the target identification are indicated that the target information includes the first information and the second information, the mesh by target information
Mark object obtains after being encrypted to the first information;
In response to first input, the first fingerprint of user is acquired;
When corresponding second fingerprint of the target identification described in first fingerprint matching, the first information and described second are obtained
Information, to obtain the target information;The target information executes described first for the first terminal and operates, and described first
The information target object corresponding with the target identification is corresponding, and second information is corresponding with the target identification described
Second fingerprint corresponds to.
2. according to the method described in claim 1, it is characterized in that, before display target mark and target object, further include:
Obtain the target information and the target identification;
The first information is encrypted using the first cipher mode, obtains the target object;
Acquire second fingerprint of user;
Target correspondence is preserved, the target correspondence is the target identification, the target object and second finger
Correspondence between line, the target object correspond to the first information, and second fingerprint corresponds to second information.
3. according to the method described in claim 2, it is characterized in that, described obtain the target information, including:
The target message that second terminal is sent is received, the target message includes the target information and the target information
Effective period of time;
Target correspondence is preserved, including:
Preserve the correspondence between the target correspondence and the effective period of time.
4. according to the method described in claim 3, it is characterized in that, described in response to first input, the of user is acquired
One fingerprint, including:
In response to first input, the first moment for receiving first input is obtained;
If first moment in the effective period of time, acquires first fingerprint.
5. according to the method described in claim 3, it is characterized in that, it is described receive second terminal send target message, including:
The Quick Response Code that the second terminal is sent is received, the Quick Response Code is used to indicate the target message;
The Quick Response Code is identified, to obtain the target message.
6. a kind of first terminal, which is characterized in that the first terminal includes:Receiving module, acquisition module and acquisition module;
The receiving module, in first terminal display target mark and target object, receive user first to be defeated
Enter, first input executes the first operation for triggering the first terminal, and the target identification is indicated by target information, institute
It includes the first information and the second information to state target information, what the target object obtained after being encrypted to the first information;
The acquisition module, first input for being received in response to the receiving module, acquires the first fingerprint of user;
The acquisition module, target identification described in first fingerprint matching for acquiring in the acquisition module corresponding the
When two fingerprints, the first information and second information are obtained, to obtain the target information;The target information is used for institute
It states first terminal and executes first operation, the first information target object corresponding with the target identification is corresponding,
Second information, second fingerprint corresponding with the target identification is corresponding.
7. first terminal according to claim 6, which is characterized in that the first terminal further includes encrypting module and preservation
Module;
The acquisition module is additionally operable to before display target mark and target object, obtains the target information and the mesh
Mark mark;
The encrypting module is obtained for encrypting the first information that the acquisition module obtains using the first cipher mode
The target object;
The acquisition module is additionally operable to second fingerprint of acquisition user;
The preserving module, for preserving target correspondence, the institute that the target correspondence obtains for the acquisition module
State target identification, described second that the target object that the encrypting module is encrypted and the acquisition module collect
Correspondence between fingerprint, the target object correspond to the first information, and second fingerprint corresponds to second information.
8. first terminal according to claim 7, which is characterized in that
The acquisition module is specifically used for receiving the target message that second terminal is sent, and the target message includes the mesh
Mark the effective period of time of information and the target information;
The preserving module is specifically used for preserving the correspondence between the target correspondence and the effective period of time.
9. first terminal according to claim 8, which is characterized in that the acquisition module is used for:
In response to first input, the first moment that the receiving module receives first input is obtained;
If first moment in the effective period of time, acquires first fingerprint.
10. first terminal according to claim 8, which is characterized in that the receiving module is specifically used for:
The Quick Response Code that the second terminal is sent is received, the Quick Response Code is used to indicate the target message;
The Quick Response Code is identified, to obtain the target message.
11. a kind of terminal, which is characterized in that the terminal includes processor, memory and is stored on the memory and can
The computer program run on the processor realizes such as claim when the computer program is executed by the processor
The step of information acquisition method described in any one of 1-5.
12. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium
Sequence, the information acquisition method as described in any one of claim 1-5 is realized when the computer program is executed by processor
Step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810509931.2A CN108769403B (en) | 2018-05-24 | 2018-05-24 | Information acquisition method, terminal and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810509931.2A CN108769403B (en) | 2018-05-24 | 2018-05-24 | Information acquisition method, terminal and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108769403A true CN108769403A (en) | 2018-11-06 |
CN108769403B CN108769403B (en) | 2021-05-18 |
Family
ID=64005914
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810509931.2A Active CN108769403B (en) | 2018-05-24 | 2018-05-24 | Information acquisition method, terminal and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108769403B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109951844A (en) * | 2019-01-31 | 2019-06-28 | 维沃移动通信有限公司 | A kind of information protecting method and device |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20070119255A (en) * | 2006-06-14 | 2007-12-20 | 주식회사 엘지텔레콤 | Method for controlling of reading message in mobile telecommunication terminal and terminal having controllable function of reading message |
CN103780731A (en) * | 2012-10-26 | 2014-05-07 | 腾讯科技(深圳)有限公司 | Method and device for obtaining privacy contacts |
CN103795849A (en) * | 2012-11-01 | 2014-05-14 | 广州三星通信技术研究有限公司 | Device and method for executing operation on private contact person in portable terminal |
KR101472495B1 (en) * | 2014-06-13 | 2014-12-19 | 동국대학교 산학협력단 | Data hiding device and method for information security |
US20150288668A1 (en) * | 2014-04-08 | 2015-10-08 | Aric Sean Kupper | Authenticating access to confidential information by unregistered requestor |
CN105120047A (en) * | 2015-07-16 | 2015-12-02 | 魅族科技(中国)有限公司 | Display method of caller ID display information and terminal |
CN105338172A (en) * | 2015-09-24 | 2016-02-17 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint dialing method and apparatus |
CN105611040A (en) * | 2015-09-23 | 2016-05-25 | 宇龙计算机通信科技(深圳)有限公司 | Information display method, information display device and terminal |
CN106022196A (en) * | 2016-06-30 | 2016-10-12 | 维沃移动通信有限公司 | Information sharing method and intelligent terminal |
CN106357413A (en) * | 2016-11-02 | 2017-01-25 | 广东虹勤通讯技术有限公司 | Method for encrypting numbers with fingerprint and mobile terminal |
CN106878560A (en) * | 2017-02-22 | 2017-06-20 | 北京珠穆朗玛移动通信有限公司 | Call-information processing method and mobile terminal based on dual system |
CN106936973A (en) * | 2017-04-24 | 2017-07-07 | 北京珠穆朗玛移动通信有限公司 | Incoming call sound method and mobile terminal based on fingerprint |
CN106941565A (en) * | 2017-03-22 | 2017-07-11 | 努比亚技术有限公司 | Address list display method and mobile terminal |
CN107154920A (en) * | 2016-03-04 | 2017-09-12 | 神讯电脑(昆山)有限公司 | Encryption method, decryption method and the reception device to receive security information of security information |
CN107292194A (en) * | 2017-05-26 | 2017-10-24 | 北京珠穆朗玛移动通信有限公司 | A kind of data guard method, mobile terminal and storage medium |
CN107317680A (en) * | 2017-06-28 | 2017-11-03 | 努比亚技术有限公司 | Labeling method, system and the computer-readable recording medium of secured account numbers |
CN107426420A (en) * | 2017-07-06 | 2017-12-01 | 努比亚技术有限公司 | A kind of method, apparatus and computer-readable recording medium for protecting associated person information |
-
2018
- 2018-05-24 CN CN201810509931.2A patent/CN108769403B/en active Active
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20070119255A (en) * | 2006-06-14 | 2007-12-20 | 주식회사 엘지텔레콤 | Method for controlling of reading message in mobile telecommunication terminal and terminal having controllable function of reading message |
CN103780731A (en) * | 2012-10-26 | 2014-05-07 | 腾讯科技(深圳)有限公司 | Method and device for obtaining privacy contacts |
CN103795849A (en) * | 2012-11-01 | 2014-05-14 | 广州三星通信技术研究有限公司 | Device and method for executing operation on private contact person in portable terminal |
US20150288668A1 (en) * | 2014-04-08 | 2015-10-08 | Aric Sean Kupper | Authenticating access to confidential information by unregistered requestor |
KR101472495B1 (en) * | 2014-06-13 | 2014-12-19 | 동국대학교 산학협력단 | Data hiding device and method for information security |
CN105120047A (en) * | 2015-07-16 | 2015-12-02 | 魅族科技(中国)有限公司 | Display method of caller ID display information and terminal |
CN105611040A (en) * | 2015-09-23 | 2016-05-25 | 宇龙计算机通信科技(深圳)有限公司 | Information display method, information display device and terminal |
CN105338172A (en) * | 2015-09-24 | 2016-02-17 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint dialing method and apparatus |
CN107154920A (en) * | 2016-03-04 | 2017-09-12 | 神讯电脑(昆山)有限公司 | Encryption method, decryption method and the reception device to receive security information of security information |
CN106022196A (en) * | 2016-06-30 | 2016-10-12 | 维沃移动通信有限公司 | Information sharing method and intelligent terminal |
CN106357413A (en) * | 2016-11-02 | 2017-01-25 | 广东虹勤通讯技术有限公司 | Method for encrypting numbers with fingerprint and mobile terminal |
CN106878560A (en) * | 2017-02-22 | 2017-06-20 | 北京珠穆朗玛移动通信有限公司 | Call-information processing method and mobile terminal based on dual system |
CN106941565A (en) * | 2017-03-22 | 2017-07-11 | 努比亚技术有限公司 | Address list display method and mobile terminal |
CN106936973A (en) * | 2017-04-24 | 2017-07-07 | 北京珠穆朗玛移动通信有限公司 | Incoming call sound method and mobile terminal based on fingerprint |
CN107292194A (en) * | 2017-05-26 | 2017-10-24 | 北京珠穆朗玛移动通信有限公司 | A kind of data guard method, mobile terminal and storage medium |
CN107317680A (en) * | 2017-06-28 | 2017-11-03 | 努比亚技术有限公司 | Labeling method, system and the computer-readable recording medium of secured account numbers |
CN107426420A (en) * | 2017-07-06 | 2017-12-01 | 努比亚技术有限公司 | A kind of method, apparatus and computer-readable recording medium for protecting associated person information |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109951844A (en) * | 2019-01-31 | 2019-06-28 | 维沃移动通信有限公司 | A kind of information protecting method and device |
Also Published As
Publication number | Publication date |
---|---|
CN108769403B (en) | 2021-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107608514A (en) | Information processing method and mobile terminal | |
CN105912905A (en) | Fingerprint unlocking method and terminal | |
CN108595946A (en) | A kind of method and terminal of protection privacy | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN110209323A (en) | A kind of method and terminal device showing unread message | |
CN108449481A (en) | A kind of associated person information recommends method and terminal | |
CN109600297A (en) | A kind of mark sweep-out method and terminal device | |
CN110457935A (en) | A kind of authority configuring method and terminal device | |
CN110309004A (en) | The processing method and terminal of data | |
CN108898040A (en) | A kind of recognition methods and mobile terminal | |
CN110149628A (en) | A kind of information processing method and terminal device | |
CN108733993A (en) | A kind of method for information display and terminal | |
CN110049187A (en) | A kind of display methods and terminal device | |
CN107707554A (en) | A kind of login method and mobile terminal of application program account | |
CN108363591A (en) | A kind of method and device of PUSH message control | |
CN110505340A (en) | A kind of message method and terminal device | |
CN108984231A (en) | A kind of login method and mobile terminal of application program account | |
CN108446153A (en) | A kind of method and terminal of control e-sourcing | |
CN110443030A (en) | A kind of permission processing method and terminal device | |
CN109815678A (en) | A kind of authority configuring method and mobile terminal | |
CN108769403A (en) | A kind of information acquisition method and terminal | |
CN109033898A (en) | A kind of data inputting method and mobile terminal | |
CN109343900A (en) | A kind of authority configuring method and terminal | |
CN108012024A (en) | The method and mobile terminal of a kind of calendar notification | |
CN108171036A (en) | The control method and mobile terminal of a kind of application program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |