CN108848240A - A kind of protecting information safety method and terminal - Google Patents
A kind of protecting information safety method and terminal Download PDFInfo
- Publication number
- CN108848240A CN108848240A CN201810662793.1A CN201810662793A CN108848240A CN 108848240 A CN108848240 A CN 108848240A CN 201810662793 A CN201810662793 A CN 201810662793A CN 108848240 A CN108848240 A CN 108848240A
- Authority
- CN
- China
- Prior art keywords
- contact person
- grouping
- message
- grouped
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/27453—Directories allowing storage of additional subscriber data, e.g. metadata
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/27453—Directories allowing storage of additional subscriber data, e.g. metadata
- H04M1/27457—Management thereof, e.g. manual editing of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Bioethics (AREA)
- Theoretical Computer Science (AREA)
- Library & Information Science (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Medical Informatics (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses a kind of protecting information safety method and terminals, wherein the method includes:When receiving the message of contact person's transmission, determines the grouping of object contact person belonging to the contact person and whether identify in the message comprising predetermined keyword;Result according to object contact person grouping and the identification feeds back the message.The protecting information safety method provided through the embodiment of the present invention can carry out security protection to the message fed back with having and private information is avoided to reveal.
Description
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of protecting information safety methods and terminal.
Background technique
Internet of Things is a new IT industry, belongs to new problem aiming at the problem that background technique proposes.Although intelligence
Energy terminal can be accustomed to Term Learning user behavior, but finally still not fully reach user itself behavior and idea, institute
When having criminal or stranger's active transmission information, the intelligent terminal that user does not have found in time and authorized is automatic
It replys, will lead to the leakage of user's private information, cause economic or personal safety to lose to user.
With the development of social progress and science and technology, Internet of Things information technology is also born therewith.It is compared with traditional internet,
Internet of Things proposition is information exchange between object and object, people and object, and " object " narrow sense point here can be understood as intelligent terminal such as hand
Machine, Internet of Things play the role of assistant in user information transmitting.It, can since intelligent terminal has certain " study " ability
To obtain user behavior habit by simulation learning, therefore can relatively accurately be passed based on Internet of Things mobile terminal for its user
Pass information, if user can authorize intelligent terminal to automatically reply instant messages, greatly promote user experience and information exchange and
Shi Xing.Also some negative impacts is brought to exist while bringing convenience for user when intelligent terminal replaces user's return information
The problem of user's private information is to criminal or stranger is leaked, information security is poor.
Summary of the invention
The embodiment of the present invention provides a kind of information cuing method, replaces use to solve intelligent terminal existing in the prior art
When the return information of family, there is a problem of leaking user's private information to criminal or strangers information safety difference.
In order to solve the above-mentioned technical problem, the invention is realized in this way:
In a first aspect, being applied to mobile terminal, the side the embodiment of the invention provides a kind of protecting information safety method
Method includes:When receiving the message of contact person's transmission, determine that object contact person belonging to the contact person is grouped, and identification
It whether include predetermined keyword in the message;According to object contact person grouping with the identification as a result, disappearing to described
Breath is fed back.
Second aspect, the embodiment of the invention provides a kind of mobile terminals, wherein the mobile terminal includes:Determine mould
Block, for determining that object contact person belonging to the contact person is grouped, and identification when receiving the message of contact person's transmission
It whether include predetermined keyword in the message;Feedback module, for according to object contact person grouping and the identification
As a result, being fed back to the message.
The third aspect the embodiment of the invention provides a kind of terminal, including processor, memory and is stored in the storage
On device and the computer program that can run on the processor, this is realized when the computer program is executed by the processor
Described in inventive embodiments the step of any protecting information safety method.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage
Computer program is stored on medium, and any described in the embodiment of the present invention is realized when the computer program is executed by processor
The step of kind protecting information safety method.
In embodiments of the present invention, message is determined by whether including predetermined keyword in the received message of judgement
Reply in whether be likely to occur private information, by determine contact person belonging to object contact person grouping come determine contact person with
The cohesion grade of user is finally fed back message in conjunction with above-mentioned two dimension, can with having to the message fed back into
Row security protection, such as avoid causing private information to be revealed the message back comprising private information to strange contact person.
Detailed description of the invention
Fig. 1 is the flow diagram of a kind of according to embodiments of the present invention one protecting information safety method;
Fig. 2 is the flow diagram of a kind of according to embodiments of the present invention two protecting information safety method;
Fig. 3 is a kind of structural block diagram of according to embodiments of the present invention three mobile terminal;
Fig. 4 is the hardware structural diagram of according to embodiments of the present invention four mobile terminal.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
Embodiment one
Referring to Fig.1, the flow diagram of the protecting information safety method of the offer of the embodiment of the present invention one is provided.
The protecting information safety method of the embodiment of the present invention includes the following steps:
Step 101:When receiving the message of contact person's transmission, determine that object contact person belonging to contact person is grouped, with
And whether include predetermined keyword in identification message.
Contact person can be the contact person in any communication application program.When receiving the message of contact person's transmission, arrive
The grouping of object contact person belonging to contact person is determined under communication application program belonging to contact person.Such as:It is logical to contact artificial first
Believe the contact person in application program, when determining the grouping of object contact person belonging to contact person, then needs in the first communications applications
It searches and determines in each contact person grouping that program is managed.
During specific implementation, three contact person's groupings, three each connection can be respectively set under each communication application program
It is that the contact person that is managed is different from the cohesion grade of user in people's grouping, cohesion grade can be divided into:Have with user
There is the first estate of close relationship, there is the second grade of friend relation with user and belongs to the third of strange relationship with user
Grade.During specific implementation, cohesion grade can also more be refined, not do specific limit in the embodiment of the present invention to this
System.
Predetermined keyword can be set to:" card number ", " name ", " age ", " identity card ", " passport " and " annual pay " etc.
Word.If comprising one of any in predetermined keyword in message illustrating that secret letter will be present in the replying message of the message
Breath.
Step 102:According to object contact person be grouped and identify as a result, being fed back to message.
The grouping of object contact person belonging to contact person is different, identification result is different, then its corresponding message feedback mode
Also different.Specifically message feedback mode can be configured according to actual needs by user, and the setting of feedback system can be protected
There are other contact persons acquisitions that the message of private information is not had outside close relationship with user for card, to reach message
The purpose of security protection.Wherein, may include with other contact persons outside close relationship with user:It is closed with user with good friend
The contact person of system belongs to contact person of strange relationship etc. with user.Message feedback mode may be set to automatically reply message or defeated
Prompt information is out to prompt user to exist wait reply message.
The feedback of message can include but is not limited to:Terminal automatically replies this message to contact person, terminal output and mentions
Showing information, there is currently wait reply message to prompt user.
Protecting information safety method provided in an embodiment of the present invention, by whether identifying in received message comprising pre-
If whether keyword is likely to occur private information in determining the reply of message, passes through and determine object contact person belonging to contact person
It is grouped the cohesion grade to determine contact person and user, finally combines above-mentioned two dimension is comprehensive to carry out instead to this message
Feedback can carry out security protection to the message fed back with having, for example, avoid will the message back comprising private information to strange
Contact person causes private information to be revealed.
Embodiment two
Referring to Fig. 2, the two of the flow chart of protecting information safety method provided by Embodiment 2 of the present invention are shown.
The protecting information safety method of the embodiment of the present invention includes the following steps:
Step 201:Create contact person's grouping.
Mountable one or more communication application programs, can be each communications applications journey in the embodiment of the present invention in advance in terminal
Sequence creates contact person's grouping.The contact person of each communication application program is grouped:First grouping, second packet and the
Three groupings;First is grouped into grouping belonging to the contact person for having close relationship with user, and second packet is strange contact person institute
The grouping of category, third are grouped into grouping belonging to the contact person for having friend relation with user, in same communication application program not
It is different from the cohesion grade of user with the contact person managed in contact person's grouping.
It should be noted that above-mentioned said for creating three contact person's groupings for each communication application program
It is bright, during specific implementation, the cohesion grade of contact person and user can also further be refined, they be each communication
Application program creates four or greater number contact person grouping.
Step 202:Contact person is added respectively into each contact person grouping.
Can be added into the first grouping user directly under relatives, such as parents, wife, sons and daughters contact person, first point
The cohesion grade highest of contact person and user in group, correspondingly security level also highest.
Addition user is non-directly under the contact persons such as relative and user social contact good friend in being grouped to third, joins in third grouping
Be people and user cohesion grade it is placed in the middle, correspondingly security level is also placed in the middle.
Remaining contact person can be added in second packet, the cohesion grade of contact person and user is most in second packet
Low, correspondingly security level is also minimum.
It should be noted that except the connection being added in second packet artificially has the contact person of strange relationship with user
Outside, the contact person first appeared in the terminal can also be identified as strange contact person.
Step 203:When receiving the message of contact person's transmission, determine that object contact person belonging to contact person is grouped.
Receive contact person transmission message when, to communication application program belonging to contact person under determine contact person belonging to
Object contact person grouping.The corresponding object contact person of contact person is searched in each contact person grouping of communication application program management
When grouping, which is matched with each contact person in the first grouping respectively, if successful match determines that the contact person belongs to the
One grouping, if it fails to match, which is matched with each contact person in second packet respectively, if successful match determines the connection
It is Genus Homo in second packet, determines that the contact person belongs to second packet if it fails to match.
Step 204:Identify in message whether include predetermined keyword.
It should be noted that step 204 is not limited to execute after step 203, step 204 can also be in step
It is executed before 203, or execution synchronous with step 203.
If comprising one of any in predetermined keyword in message illustrating that user will be present in the replying message of the message
The private informations such as property, privacy, these information and user have strong correlation interests, then can not be easily by terminal for this category information
It is automatically replied.Specific setting for predetermined keyword can be configured according to actual needs by user, and the present invention is real
It applies in example and this is not particularly limited.
Wherein, the result of identification is in message comprising not including predetermined keyword in predetermined keyword or message.Identification
As a result different, then message feedback mode is also different.
Step 205:According to object contact person be grouped and identify as a result, being fed back to message.
Message feedback mode can be configured according to actual needs by those skilled in the art, the setting energy of feedback system
It is enough to guarantee that there are other contact persons acquisitions that the message of private information is not had outside close relationship with user, to reach
The purpose of message security protection.Wherein, may include with other contact persons outside close relationship with user:Have with user
The contact person of friendly relationship belongs to contact person of strange relationship etc. with user.
It is a kind of preferably according to object contact person be grouped and identify as a result, carry out message feedback mode it is as follows:
In the case where object contact person is grouped into the first grouping and message comprising predetermined keyword, automatically to message into
Row is replied;In the case where including predetermined keyword in object contact person grouping not the first grouping and message, output first is mentioned
Show information, wherein the first prompt information is for prompting user to exist wait reply message.
First prompt information can prompt with the tinkle of bells, vibration prompting or splashette prompt etc., for the in the embodiment of the present invention
The concrete form of one prompt information is not particularly limited.
In the case where not including predetermined keyword in object contact person grouping not second packet and message, offset automatically
Breath is replied;In the case where object contact person is grouped into second packet and message not comprising predetermined keyword, output the
Two prompt informations, wherein the second prompt information be used for prompt user there are strange contact person send wait reply message.
Second prompt information can be identical as the first prompt information, can also be different from the first prompt information.Second prompt
Information can also be with the tinkle of bells prompt, vibration prompting or splashette prompt etc..
The mode that the above-mentioned result for being grouped and identifying according to object contact person feeds back message, being capable of combining target connection
Be people grouping and identification result be arranged three kinds of different feedback systems so that message feedback meet private information not by with
On the basis of there are other contact persons outside close relationship to obtain at family, is further refined, be able to ascend the use of user
Experience.
During specific implementation, a kind of preferably mode is to be grouped into the second packet and described in object contact person
Not comprising that after exporting the second prompt information, user can also be received and add contact person in the case where predetermined keyword in message
Add to the operation in the first grouping or third grouping;In response to operation, contact person is added in corresponding relationship people grouping.Not only
In this way, user, which is also an option that, is added to second packet for the contact person, permanent strange contact person is set it to.
In this kind of preferred embodiment provided in an embodiment of the present invention, user is configured contact person's grouping, and terminal is according to institute
The contact person of management is grouped and the recognition result of message feeds back message, exists in feedback and mentions to user's output first
The case where showing information or the second prompt information, but receive after the second prompt information can be to according to demand adding strange contact person by user
Respective contacts grouping is added to optimize the setting of contact person's grouping.
Protecting information safety method provided in an embodiment of the present invention, by whether identifying in received message comprising pre-
If whether keyword is likely to occur private information in determining the reply of message, passes through and determine object contact person belonging to contact person
It is grouped the cohesion grade to determine contact person and user, finally message is fed back in conjunction with above-mentioned two dimension, Neng Gouyou
Ground carries out security protection to the message fed back, such as avoids leading to the message back comprising private information to strange contact person
Private information leakage.In addition, protecting information safety method provided in an embodiment of the present invention, is grouped and is identified according to object contact person
Result determine the mode fed back to message, three kinds of differences are arranged in the result for capableing of combining target contact person grouping and identification
Feedback system so that message feedback meet private information by with user have close relationship outside other contact persons obtain
On the basis of, it is further refined, is able to ascend the usage experience of user.
Embodiment three
Referring to Fig. 3, a kind of structural block diagram of terminal of the embodiment of the present invention three is shown.Terminal is able to achieve previous embodiment
In protecting information safety method details, and reach identical effect.
The terminal of the embodiment of the present invention includes:Determining module 301, for when receive contact person transmission message when, really
It whether include predetermined keyword in object contact person grouping, and the identification message belonging to the fixed contact person;Feed back mould
Block 302, for being grouped with the identification according to the object contact person as a result, being fed back to the message.
Preferably, the terminal further includes:It is grouped creation module 303, is received for working as in first determining module
When the message that contact person sends, before determining the grouping of object contact person belonging to the contact person, creation contact person's grouping;Its
In, contact person's grouping includes:First grouping, second packet and third grouping;Described first is grouped into and has with user
Grouping belonging to the contact person of close relationship, the second packet are grouping belonging to strange contact person, and the third is grouped into
There is grouping belonging to the contact person of friend relation with user;Adding module 304, for distinguishing into each contact person's grouping
Add contact person.
Preferably, the feedback module 302 includes:First feedback submodule 3021, in the object contact person point
Group is in first grouping and the message comprising replying automatically the message in the case where predetermined keyword;The
Two feedback submodules 3022, for being grouped and in the message in object contact person grouping not described first comprising default
In the case where keyword, the first prompt information is exported, wherein first prompt information disappears for prompting user to exist wait reply
Breath.
Preferably, the feedback module 302 includes:Third feeds back submodule 3023, in the object contact person point
Group is not in the second packet and the message not comprising returning automatically to the message in the case where predetermined keyword
It is multiple;4th feedback submodule 3024, is not wrapped for being grouped into the second packet and the message in the object contact person
In the case where predetermined keyword, the second prompt information is exported, there are footpaths between fields wherein second prompt information is for prompting user
Raw contact person send wait reply message.
Preferably, the terminal further includes:Receiving module 305 is operated, it is described for being grouped into the object contact person
Comprising after exporting the second prompt information, receiving user for institute in the case where predetermined keyword in second packet and the message
State the operation that contact person is added in first grouping or third grouping;Respond module 306, in response to the behaviour
Make, the contact person is added in corresponding relationship people grouping.
Terminal provided in an embodiment of the present invention can be realized each mistake that terminal is realized in the embodiment of the method for Fig. 1 to Fig. 2
Journey, to avoid repeating, which is not described herein again.
Whether terminal provided in an embodiment of the present invention includes predetermined keyword come really by identifying in received message
Determine whether be likely to occur private information in the reply of message, determines connection by determining the grouping of object contact person belonging to contact person
Be the cohesion grade of people and user, finally message fed back in conjunction with above-mentioned two dimension synthesis, can with having to it is anti-
The message of feedback carries out security protection, such as avoids the message back comprising private information leading to private information to strange contact person
Leakage.
Example IV
Referring to Fig. 4, a kind of hardware structural diagram of terminal of the embodiment of the present invention four is shown.
A kind of hardware structural diagram of Fig. 4 terminal of each embodiment to realize the present invention, the terminal 400 include but not
It is limited to:Radio frequency unit 401, network module 402, audio output unit 403, input unit 404, sensor 405, display unit
406, the components such as user input unit 407, interface unit 408, memory 409, processor 410 and power supply 411.This field
Technical staff is appreciated that the restriction of the not structure paired terminal of terminal structure shown in Fig. 4, and terminal may include than illustrating more
More or less component perhaps combines certain components or different component layouts.In embodiments of the present invention, terminal includes
But be not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and pedometer etc..
Processor 410, for determining that target belonging to the contact person is contacted when receiving the message of contact person's transmission
It whether include predetermined keyword in people's grouping, and the identification message;According to object contact person grouping and the identification
As a result, being fed back to the message.
Whether terminal provided in an embodiment of the present invention includes predetermined keyword come really by identifying in received message
Determine whether be likely to occur private information in the reply of message, determines connection by determining the grouping of object contact person belonging to contact person
Be the cohesion grade of people and user, finally message fed back in conjunction with above-mentioned two dimension synthesis, can with having to it is anti-
The message of feedback carries out security protection, such as avoids the message back comprising private information leading to private information to strange contact person
Leakage.
It should be understood that the embodiment of the present invention in, radio frequency unit 401 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 410 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 401 includes but is not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 401 can also by wireless communication system and network and other set
Standby communication.
Terminal provides wireless broadband internet by network module 402 for user and accesses, and such as user is helped to receive and dispatch electricity
Sub- mail, browsing webpage and access streaming video etc..
Audio output unit 403 can be received by radio frequency unit 401 or network module 402 or in memory 409
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 403 can also provide and end
The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that end 400 executes.Sound
Frequency output unit 403 includes loudspeaker, buzzer and receiver etc..
Input unit 404 is for receiving audio or video signal.Input unit 404 may include graphics processor
(Graphics Processing Unit, GPU) 4041 and microphone 4042, graphics processor 4041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 406.Through graphics processor 4041, treated that picture frame can be deposited
Storage is sent in memory 409 (or other storage mediums) or via radio frequency unit 401 or network module 402.Mike
Wind 4042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be
The format output that mobile communication base station can be sent to via radio frequency unit 401 is converted in the case where telephone calling model.
Terminal 400 further includes at least one sensor 405, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjusts the brightness of display panel 4061, and proximity sensor can close display panel when terminal 400 is moved in one's ear
4061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add
The size of speed can detect that size and the direction of gravity when static, can be used to identify mobile terminal posture, (for example horizontal/vertical screen is cut
Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 405 may be used also
To include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, temperature
Meter, infrared sensor etc., details are not described herein.
Display unit 406 is for showing information input by user or being supplied to the information of user.Display unit 406 can wrap
Display panel 4061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 4061.
User input unit 407 can be used for receiving the number or character information of input, and generates and set with the user of terminal
It sets and the related key signals of function control inputs.Specifically, user input unit 407 include touch panel 4071 and other
Input equipment 4072.Touch panel 4071, also referred to as touch screen, collect user on it or nearby touch operation (such as
User is using any suitable objects or attachment such as finger, stylus on touch panel 4071 or near touch panel 4071
Operation).Touch panel 4071 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined
The touch orientation of user is surveyed, and detects touch operation bring signal, transmits a signal to touch controller;Touch controller from
Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 410, receives processor 410
The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
Realize touch panel 4071.In addition to touch panel 4071, user input unit 407 can also include other input equipments 4072.
Specifically, other input equipments 4072 can include but is not limited to physical keyboard, function key (such as volume control button, switch
Key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 4071 can be covered on display panel 4061, when touch panel 4071 is detected at it
On or near touch operation after, send processor 410 to determine the type of touch event, be followed by subsequent processing device 410 according to touching
The type for touching event provides corresponding visual output on display panel 4061.Although in Fig. 4, touch panel 4071 and display
Panel 4061 is the function that outputs and inputs of realizing mobile terminal as two independent components, but in some embodiments
In, touch panel 4071 and display panel 4061 can be integrated and be realized the function that outputs and inputs of terminal, specifically herein not
It limits.
Interface unit 408 is the interface that external device (ED) is connect with terminal 400.For example, external device (ED) may include it is wired or
Wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, memory card port,
For connecting port, the port audio input/output (I/O), video i/o port, ear port of the device with identification module
Etc..Interface unit 408 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and will
One or more elements that the input received is transferred in terminal 400 or can be used for terminal 400 and external device (ED) it
Between transmit data.
Memory 409 can be used for storing software program and various data.Memory 409 can mainly include storing program area
The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 409 may include high-speed random access memory, it can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 410 is the control centre of terminal, utilizes each portion of various interfaces and the entire mobile terminal of connection
Point, by running or execute the software program and/or module that are stored in memory 409, and calls and be stored in memory 409
Interior data execute the various functions and processing data of mobile terminal, to carry out integral monitoring to terminal.Processor 410 can
Including one or more processing units;Preferably, processor 410 can integrate application processor and modem processor, wherein
The main processing operation system of application processor, user interface and application program etc., modem processor mainly handles channel radio
Letter.It is understood that above-mentioned modem processor can not also be integrated into processor 410.
Mobile terminal 400 can also include the power supply 411 (such as battery) powered to all parts, it is preferred that power supply 411
Can be logically contiguous by power-supply management system and processor 410, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
In addition, terminal 400 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal, including processor 410, and memory 409 is stored in storage
It is real when which is executed by processor 410 on device 409 and the computer program that can be run on the processor 410
Each process of existing above- mentioned information safety protecting method embodiment, and identical technical effect can be reached, to avoid repeating, here
It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program realizes each process of above- mentioned information safety protecting method embodiment when the computer program is executed by processor,
And identical technical effect can be reached, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium,
Such as read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, letter
Claim RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within protection of the invention.
Claims (12)
1. a kind of protecting information safety method, which is characterized in that the method includes:
When receiving the message of contact person's transmission, determine that object contact person belonging to the contact person is grouped, and
It whether identifies in the message comprising predetermined keyword;
According to object contact person grouping with the identification as a result, being fed back to the message.
2. the method according to claim 1, wherein it is described when receive contact person transmission message when, really
Before object contact person grouping belonging to the fixed contact person, the method also includes:
Create contact person's grouping;Wherein, the contact person, which is grouped, includes:First grouping, second packet and third grouping;It is described
First is grouped into grouping belonging to the contact person for having close relationship with user, and the second packet is belonging to strange contact person
Grouping, the third are grouped into grouping belonging to the contact person for having friend relation with user;
Contact person is added respectively into each contact person's grouping.
3. according to the method described in claim 2, it is characterized in that, described according to object contact person grouping and the identification
As a result, fed back to the message, including:
In the case where the object contact person is grouped into first grouping and the message comprising predetermined keyword, to institute
Message is stated to be replied;
It is defeated in the case where including predetermined keyword in not described first grouping of object contact person grouping and the message
First prompt information out, wherein first prompt information is for prompting user to exist wait reply message.
4. according to the method described in claim 2, it is characterized in that, described according to object contact person grouping and the identification
As a result, fed back to the message, including:
In the case where not including predetermined keyword in object contact person grouping not second packet and the message,
The message is replied;
It is defeated in the case where the object contact person is grouped into the second packet and the message not comprising predetermined keyword
Second prompt information out, wherein second prompt information is for prompting user, there are what strange contact person sent to disappear wait reply
Breath.
5. according to the method described in claim 4, it is characterized in that, the object contact person be grouped into the second packet and
In the case where including predetermined keyword in the message, after exporting the second prompt information, the method also includes:
Receive the operation that the contact person is added in first grouping or third grouping by user;
In response to the operation, the contact person is added in corresponding relationship people grouping.
6. a kind of terminal, which is characterized in that the terminal includes:
Determining module, for determining object contact person belonging to the contact person point when receiving the message of contact person's transmission
It whether include predetermined keyword in group, and the identification message;
Feedback module, for being grouped with the identification according to the object contact person as a result, being fed back to the message.
7. terminal according to claim 6, which is characterized in that the terminal further includes:
It is grouped creation module, for, when receiving the message of contact person's transmission, determining described in first determining module
Before being the grouping of object contact person belonging to people, creation contact person's grouping;Wherein, the contact person, which is grouped, includes:First grouping,
Second packet and third grouping;Described first is grouped into grouping belonging to the contact person for having close relationship with user, described
Second packet is grouping belonging to strange contact person, and the third is grouped into belonging to the contact person for having friend relation with user
Grouping;
Adding module, for adding contact person respectively into each contact person's grouping.
8. mobile terminal according to claim 7, which is characterized in that the feedback module includes:
First feedback submodule, for being grouped into first grouping and the message in the object contact person comprising default
In the case where keyword, the message is replied;
Second feedback submodule, for being grouped and in the message in object contact person grouping not described first comprising pre-
If in the case where keyword, exporting the first prompt information, wherein first prompt information is for prompting user to exist wait reply
Message.
9. mobile terminal according to claim 7, which is characterized in that the feedback module includes:
Third feeds back submodule, does not include for being not in the second packet and the message in object contact person grouping
In the case where predetermined keyword, the message is replied;
4th feedback submodule, for being grouped into the second packet and the message not in the object contact person comprising pre-
If in the case where keyword, exporting the second prompt information, wherein second prompt information is for prompting user, there are strange
Be human hair send wait reply message.
10. mobile terminal according to claim 9, which is characterized in that the mobile terminal further includes:
Receiving module is operated, is closed for being grouped into the second packet and the message in the object contact person comprising default
In the case where keyword, after exporting the second prompt information, user is received by the contact person and is added to first grouping or institute
State the operation in third grouping;
Respond module, in response to the operation, the contact person to be added in corresponding relationship people grouping.
11. a kind of terminal, which is characterized in that including processor, memory and be stored on the memory and can be at the place
The computer program run on reason device is realized any in claim 1-5 when the computer program is executed by the processor
The step of protecting information safety method described in item.
12. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium
Sequence, the computer program realize protecting information safety method of any of claims 1-5 when being executed by processor
The step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810662793.1A CN108848240B (en) | 2018-06-25 | 2018-06-25 | Information security protection method, terminal and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810662793.1A CN108848240B (en) | 2018-06-25 | 2018-06-25 | Information security protection method, terminal and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108848240A true CN108848240A (en) | 2018-11-20 |
CN108848240B CN108848240B (en) | 2021-06-04 |
Family
ID=64202562
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810662793.1A Active CN108848240B (en) | 2018-06-25 | 2018-06-25 | Information security protection method, terminal and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108848240B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111294275A (en) * | 2020-02-26 | 2020-06-16 | 上海云鱼智能科技有限公司 | User information indexing method, device, server and storage medium of IM tool |
CN112118173A (en) * | 2020-09-21 | 2020-12-22 | 维沃移动通信(杭州)有限公司 | Message feedback reminding setting method and device and electronic equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102695138A (en) * | 2012-06-05 | 2012-09-26 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and automatic reply processing method |
CN103200550A (en) * | 2013-04-26 | 2013-07-10 | 上海华勤通讯技术有限公司 | Mobile terminal and method for replaying messages automatically |
CN104348974A (en) * | 2014-10-23 | 2015-02-11 | 苏州合欣美电子科技有限公司 | Keyword-verification-based specific message prompting method for communication group |
CN104506711A (en) * | 2014-11-28 | 2015-04-08 | 东莞宇龙通信科技有限公司 | Communication information processing method and device for terminal |
CN106033517A (en) * | 2015-03-11 | 2016-10-19 | 联想(北京)有限公司 | An information processing method and an electronic apparatus |
-
2018
- 2018-06-25 CN CN201810662793.1A patent/CN108848240B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102695138A (en) * | 2012-06-05 | 2012-09-26 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and automatic reply processing method |
CN103200550A (en) * | 2013-04-26 | 2013-07-10 | 上海华勤通讯技术有限公司 | Mobile terminal and method for replaying messages automatically |
CN104348974A (en) * | 2014-10-23 | 2015-02-11 | 苏州合欣美电子科技有限公司 | Keyword-verification-based specific message prompting method for communication group |
CN104506711A (en) * | 2014-11-28 | 2015-04-08 | 东莞宇龙通信科技有限公司 | Communication information processing method and device for terminal |
CN106033517A (en) * | 2015-03-11 | 2016-10-19 | 联想(北京)有限公司 | An information processing method and an electronic apparatus |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111294275A (en) * | 2020-02-26 | 2020-06-16 | 上海云鱼智能科技有限公司 | User information indexing method, device, server and storage medium of IM tool |
CN112118173A (en) * | 2020-09-21 | 2020-12-22 | 维沃移动通信(杭州)有限公司 | Message feedback reminding setting method and device and electronic equipment |
CN112118173B (en) * | 2020-09-21 | 2023-02-21 | 维沃移动通信(杭州)有限公司 | Message feedback reminding setting method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108848240B (en) | 2021-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108491123A (en) | A kind of adjusting application program image target method and mobile terminal | |
CN108595946A (en) | A kind of method and terminal of protection privacy | |
CN108376096A (en) | A kind of message display method and mobile terminal | |
CN110457888A (en) | A kind of verifying code imput method, device, electronic equipment and storage medium | |
CN110149628A (en) | A kind of information processing method and terminal device | |
CN109412932A (en) | A kind of screenshotss method and terminal | |
CN110035183A (en) | Information sharing method and terminal | |
CN110096203A (en) | A kind of screenshot method and mobile terminal | |
CN109981904A (en) | A kind of method for controlling volume and terminal device | |
CN108363591A (en) | A kind of method and device of PUSH message control | |
CN110536253A (en) | A kind of group's Adding Way and mobile terminal | |
CN110213438A (en) | A kind of processing method and terminal device of application program | |
CN110225040A (en) | A kind of information processing method, terminal device and server | |
CN108848240A (en) | A kind of protecting information safety method and terminal | |
CN109190501A (en) | Operate recognition methods and terminal | |
CN109246693A (en) | A kind of control method and terminal of application program | |
CN109218984A (en) | A kind of method for tracing and mobile terminal | |
CN107704334A (en) | A kind of SDK processing method and mobile terminal | |
CN107895108A (en) | A kind of operation management method and mobile terminal | |
CN108494949B (en) | A kind of image classification method and mobile terminal | |
CN109547330A (en) | A kind of information sharing method and device | |
CN110366182A (en) | A kind of data transmission method and terminal device | |
CN109062492A (en) | A kind of application access method and terminal | |
CN110113486A (en) | A kind of moving method and terminal of application icon | |
CN109033898A (en) | A kind of data inputting method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |