CN108848240A - A kind of protecting information safety method and terminal - Google Patents

A kind of protecting information safety method and terminal Download PDF

Info

Publication number
CN108848240A
CN108848240A CN201810662793.1A CN201810662793A CN108848240A CN 108848240 A CN108848240 A CN 108848240A CN 201810662793 A CN201810662793 A CN 201810662793A CN 108848240 A CN108848240 A CN 108848240A
Authority
CN
China
Prior art keywords
contact person
grouping
message
grouped
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810662793.1A
Other languages
Chinese (zh)
Other versions
CN108848240B (en
Inventor
兰永城
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810662793.1A priority Critical patent/CN108848240B/en
Publication of CN108848240A publication Critical patent/CN108848240A/en
Application granted granted Critical
Publication of CN108848240B publication Critical patent/CN108848240B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/27453Directories allowing storage of additional subscriber data, e.g. metadata
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/27453Directories allowing storage of additional subscriber data, e.g. metadata
    • H04M1/27457Management thereof, e.g. manual editing of data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Bioethics (AREA)
  • Theoretical Computer Science (AREA)
  • Library & Information Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Medical Informatics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of protecting information safety method and terminals, wherein the method includes:When receiving the message of contact person's transmission, determines the grouping of object contact person belonging to the contact person and whether identify in the message comprising predetermined keyword;Result according to object contact person grouping and the identification feeds back the message.The protecting information safety method provided through the embodiment of the present invention can carry out security protection to the message fed back with having and private information is avoided to reveal.

Description

A kind of protecting information safety method and terminal
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of protecting information safety methods and terminal.
Background technique
Internet of Things is a new IT industry, belongs to new problem aiming at the problem that background technique proposes.Although intelligence Energy terminal can be accustomed to Term Learning user behavior, but finally still not fully reach user itself behavior and idea, institute When having criminal or stranger's active transmission information, the intelligent terminal that user does not have found in time and authorized is automatic It replys, will lead to the leakage of user's private information, cause economic or personal safety to lose to user.
With the development of social progress and science and technology, Internet of Things information technology is also born therewith.It is compared with traditional internet, Internet of Things proposition is information exchange between object and object, people and object, and " object " narrow sense point here can be understood as intelligent terminal such as hand Machine, Internet of Things play the role of assistant in user information transmitting.It, can since intelligent terminal has certain " study " ability To obtain user behavior habit by simulation learning, therefore can relatively accurately be passed based on Internet of Things mobile terminal for its user Pass information, if user can authorize intelligent terminal to automatically reply instant messages, greatly promote user experience and information exchange and Shi Xing.Also some negative impacts is brought to exist while bringing convenience for user when intelligent terminal replaces user's return information The problem of user's private information is to criminal or stranger is leaked, information security is poor.
Summary of the invention
The embodiment of the present invention provides a kind of information cuing method, replaces use to solve intelligent terminal existing in the prior art When the return information of family, there is a problem of leaking user's private information to criminal or strangers information safety difference.
In order to solve the above-mentioned technical problem, the invention is realized in this way:
In a first aspect, being applied to mobile terminal, the side the embodiment of the invention provides a kind of protecting information safety method Method includes:When receiving the message of contact person's transmission, determine that object contact person belonging to the contact person is grouped, and identification It whether include predetermined keyword in the message;According to object contact person grouping with the identification as a result, disappearing to described Breath is fed back.
Second aspect, the embodiment of the invention provides a kind of mobile terminals, wherein the mobile terminal includes:Determine mould Block, for determining that object contact person belonging to the contact person is grouped, and identification when receiving the message of contact person's transmission It whether include predetermined keyword in the message;Feedback module, for according to object contact person grouping and the identification As a result, being fed back to the message.
The third aspect the embodiment of the invention provides a kind of terminal, including processor, memory and is stored in the storage On device and the computer program that can run on the processor, this is realized when the computer program is executed by the processor Described in inventive embodiments the step of any protecting information safety method.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage Computer program is stored on medium, and any described in the embodiment of the present invention is realized when the computer program is executed by processor The step of kind protecting information safety method.
In embodiments of the present invention, message is determined by whether including predetermined keyword in the received message of judgement Reply in whether be likely to occur private information, by determine contact person belonging to object contact person grouping come determine contact person with The cohesion grade of user is finally fed back message in conjunction with above-mentioned two dimension, can with having to the message fed back into Row security protection, such as avoid causing private information to be revealed the message back comprising private information to strange contact person.
Detailed description of the invention
Fig. 1 is the flow diagram of a kind of according to embodiments of the present invention one protecting information safety method;
Fig. 2 is the flow diagram of a kind of according to embodiments of the present invention two protecting information safety method;
Fig. 3 is a kind of structural block diagram of according to embodiments of the present invention three mobile terminal;
Fig. 4 is the hardware structural diagram of according to embodiments of the present invention four mobile terminal.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Embodiment one
Referring to Fig.1, the flow diagram of the protecting information safety method of the offer of the embodiment of the present invention one is provided.
The protecting information safety method of the embodiment of the present invention includes the following steps:
Step 101:When receiving the message of contact person's transmission, determine that object contact person belonging to contact person is grouped, with And whether include predetermined keyword in identification message.
Contact person can be the contact person in any communication application program.When receiving the message of contact person's transmission, arrive The grouping of object contact person belonging to contact person is determined under communication application program belonging to contact person.Such as:It is logical to contact artificial first Believe the contact person in application program, when determining the grouping of object contact person belonging to contact person, then needs in the first communications applications It searches and determines in each contact person grouping that program is managed.
During specific implementation, three contact person's groupings, three each connection can be respectively set under each communication application program It is that the contact person that is managed is different from the cohesion grade of user in people's grouping, cohesion grade can be divided into:Have with user There is the first estate of close relationship, there is the second grade of friend relation with user and belongs to the third of strange relationship with user Grade.During specific implementation, cohesion grade can also more be refined, not do specific limit in the embodiment of the present invention to this System.
Predetermined keyword can be set to:" card number ", " name ", " age ", " identity card ", " passport " and " annual pay " etc. Word.If comprising one of any in predetermined keyword in message illustrating that secret letter will be present in the replying message of the message Breath.
Step 102:According to object contact person be grouped and identify as a result, being fed back to message.
The grouping of object contact person belonging to contact person is different, identification result is different, then its corresponding message feedback mode Also different.Specifically message feedback mode can be configured according to actual needs by user, and the setting of feedback system can be protected There are other contact persons acquisitions that the message of private information is not had outside close relationship with user for card, to reach message The purpose of security protection.Wherein, may include with other contact persons outside close relationship with user:It is closed with user with good friend The contact person of system belongs to contact person of strange relationship etc. with user.Message feedback mode may be set to automatically reply message or defeated Prompt information is out to prompt user to exist wait reply message.
The feedback of message can include but is not limited to:Terminal automatically replies this message to contact person, terminal output and mentions Showing information, there is currently wait reply message to prompt user.
Protecting information safety method provided in an embodiment of the present invention, by whether identifying in received message comprising pre- If whether keyword is likely to occur private information in determining the reply of message, passes through and determine object contact person belonging to contact person It is grouped the cohesion grade to determine contact person and user, finally combines above-mentioned two dimension is comprehensive to carry out instead to this message Feedback can carry out security protection to the message fed back with having, for example, avoid will the message back comprising private information to strange Contact person causes private information to be revealed.
Embodiment two
Referring to Fig. 2, the two of the flow chart of protecting information safety method provided by Embodiment 2 of the present invention are shown.
The protecting information safety method of the embodiment of the present invention includes the following steps:
Step 201:Create contact person's grouping.
Mountable one or more communication application programs, can be each communications applications journey in the embodiment of the present invention in advance in terminal Sequence creates contact person's grouping.The contact person of each communication application program is grouped:First grouping, second packet and the Three groupings;First is grouped into grouping belonging to the contact person for having close relationship with user, and second packet is strange contact person institute The grouping of category, third are grouped into grouping belonging to the contact person for having friend relation with user, in same communication application program not It is different from the cohesion grade of user with the contact person managed in contact person's grouping.
It should be noted that above-mentioned said for creating three contact person's groupings for each communication application program It is bright, during specific implementation, the cohesion grade of contact person and user can also further be refined, they be each communication Application program creates four or greater number contact person grouping.
Step 202:Contact person is added respectively into each contact person grouping.
Can be added into the first grouping user directly under relatives, such as parents, wife, sons and daughters contact person, first point The cohesion grade highest of contact person and user in group, correspondingly security level also highest.
Addition user is non-directly under the contact persons such as relative and user social contact good friend in being grouped to third, joins in third grouping Be people and user cohesion grade it is placed in the middle, correspondingly security level is also placed in the middle.
Remaining contact person can be added in second packet, the cohesion grade of contact person and user is most in second packet Low, correspondingly security level is also minimum.
It should be noted that except the connection being added in second packet artificially has the contact person of strange relationship with user Outside, the contact person first appeared in the terminal can also be identified as strange contact person.
Step 203:When receiving the message of contact person's transmission, determine that object contact person belonging to contact person is grouped.
Receive contact person transmission message when, to communication application program belonging to contact person under determine contact person belonging to Object contact person grouping.The corresponding object contact person of contact person is searched in each contact person grouping of communication application program management When grouping, which is matched with each contact person in the first grouping respectively, if successful match determines that the contact person belongs to the One grouping, if it fails to match, which is matched with each contact person in second packet respectively, if successful match determines the connection It is Genus Homo in second packet, determines that the contact person belongs to second packet if it fails to match.
Step 204:Identify in message whether include predetermined keyword.
It should be noted that step 204 is not limited to execute after step 203, step 204 can also be in step It is executed before 203, or execution synchronous with step 203.
If comprising one of any in predetermined keyword in message illustrating that user will be present in the replying message of the message The private informations such as property, privacy, these information and user have strong correlation interests, then can not be easily by terminal for this category information It is automatically replied.Specific setting for predetermined keyword can be configured according to actual needs by user, and the present invention is real It applies in example and this is not particularly limited.
Wherein, the result of identification is in message comprising not including predetermined keyword in predetermined keyword or message.Identification As a result different, then message feedback mode is also different.
Step 205:According to object contact person be grouped and identify as a result, being fed back to message.
Message feedback mode can be configured according to actual needs by those skilled in the art, the setting energy of feedback system It is enough to guarantee that there are other contact persons acquisitions that the message of private information is not had outside close relationship with user, to reach The purpose of message security protection.Wherein, may include with other contact persons outside close relationship with user:Have with user The contact person of friendly relationship belongs to contact person of strange relationship etc. with user.
It is a kind of preferably according to object contact person be grouped and identify as a result, carry out message feedback mode it is as follows:
In the case where object contact person is grouped into the first grouping and message comprising predetermined keyword, automatically to message into Row is replied;In the case where including predetermined keyword in object contact person grouping not the first grouping and message, output first is mentioned Show information, wherein the first prompt information is for prompting user to exist wait reply message.
First prompt information can prompt with the tinkle of bells, vibration prompting or splashette prompt etc., for the in the embodiment of the present invention The concrete form of one prompt information is not particularly limited.
In the case where not including predetermined keyword in object contact person grouping not second packet and message, offset automatically Breath is replied;In the case where object contact person is grouped into second packet and message not comprising predetermined keyword, output the Two prompt informations, wherein the second prompt information be used for prompt user there are strange contact person send wait reply message.
Second prompt information can be identical as the first prompt information, can also be different from the first prompt information.Second prompt Information can also be with the tinkle of bells prompt, vibration prompting or splashette prompt etc..
The mode that the above-mentioned result for being grouped and identifying according to object contact person feeds back message, being capable of combining target connection Be people grouping and identification result be arranged three kinds of different feedback systems so that message feedback meet private information not by with On the basis of there are other contact persons outside close relationship to obtain at family, is further refined, be able to ascend the use of user Experience.
During specific implementation, a kind of preferably mode is to be grouped into the second packet and described in object contact person Not comprising that after exporting the second prompt information, user can also be received and add contact person in the case where predetermined keyword in message Add to the operation in the first grouping or third grouping;In response to operation, contact person is added in corresponding relationship people grouping.Not only In this way, user, which is also an option that, is added to second packet for the contact person, permanent strange contact person is set it to.
In this kind of preferred embodiment provided in an embodiment of the present invention, user is configured contact person's grouping, and terminal is according to institute The contact person of management is grouped and the recognition result of message feeds back message, exists in feedback and mentions to user's output first The case where showing information or the second prompt information, but receive after the second prompt information can be to according to demand adding strange contact person by user Respective contacts grouping is added to optimize the setting of contact person's grouping.
Protecting information safety method provided in an embodiment of the present invention, by whether identifying in received message comprising pre- If whether keyword is likely to occur private information in determining the reply of message, passes through and determine object contact person belonging to contact person It is grouped the cohesion grade to determine contact person and user, finally message is fed back in conjunction with above-mentioned two dimension, Neng Gouyou Ground carries out security protection to the message fed back, such as avoids leading to the message back comprising private information to strange contact person Private information leakage.In addition, protecting information safety method provided in an embodiment of the present invention, is grouped and is identified according to object contact person Result determine the mode fed back to message, three kinds of differences are arranged in the result for capableing of combining target contact person grouping and identification Feedback system so that message feedback meet private information by with user have close relationship outside other contact persons obtain On the basis of, it is further refined, is able to ascend the usage experience of user.
Embodiment three
Referring to Fig. 3, a kind of structural block diagram of terminal of the embodiment of the present invention three is shown.Terminal is able to achieve previous embodiment In protecting information safety method details, and reach identical effect.
The terminal of the embodiment of the present invention includes:Determining module 301, for when receive contact person transmission message when, really It whether include predetermined keyword in object contact person grouping, and the identification message belonging to the fixed contact person;Feed back mould Block 302, for being grouped with the identification according to the object contact person as a result, being fed back to the message.
Preferably, the terminal further includes:It is grouped creation module 303, is received for working as in first determining module When the message that contact person sends, before determining the grouping of object contact person belonging to the contact person, creation contact person's grouping;Its In, contact person's grouping includes:First grouping, second packet and third grouping;Described first is grouped into and has with user Grouping belonging to the contact person of close relationship, the second packet are grouping belonging to strange contact person, and the third is grouped into There is grouping belonging to the contact person of friend relation with user;Adding module 304, for distinguishing into each contact person's grouping Add contact person.
Preferably, the feedback module 302 includes:First feedback submodule 3021, in the object contact person point Group is in first grouping and the message comprising replying automatically the message in the case where predetermined keyword;The Two feedback submodules 3022, for being grouped and in the message in object contact person grouping not described first comprising default In the case where keyword, the first prompt information is exported, wherein first prompt information disappears for prompting user to exist wait reply Breath.
Preferably, the feedback module 302 includes:Third feeds back submodule 3023, in the object contact person point Group is not in the second packet and the message not comprising returning automatically to the message in the case where predetermined keyword It is multiple;4th feedback submodule 3024, is not wrapped for being grouped into the second packet and the message in the object contact person In the case where predetermined keyword, the second prompt information is exported, there are footpaths between fields wherein second prompt information is for prompting user Raw contact person send wait reply message.
Preferably, the terminal further includes:Receiving module 305 is operated, it is described for being grouped into the object contact person Comprising after exporting the second prompt information, receiving user for institute in the case where predetermined keyword in second packet and the message State the operation that contact person is added in first grouping or third grouping;Respond module 306, in response to the behaviour Make, the contact person is added in corresponding relationship people grouping.
Terminal provided in an embodiment of the present invention can be realized each mistake that terminal is realized in the embodiment of the method for Fig. 1 to Fig. 2 Journey, to avoid repeating, which is not described herein again.
Whether terminal provided in an embodiment of the present invention includes predetermined keyword come really by identifying in received message Determine whether be likely to occur private information in the reply of message, determines connection by determining the grouping of object contact person belonging to contact person Be the cohesion grade of people and user, finally message fed back in conjunction with above-mentioned two dimension synthesis, can with having to it is anti- The message of feedback carries out security protection, such as avoids the message back comprising private information leading to private information to strange contact person Leakage.
Example IV
Referring to Fig. 4, a kind of hardware structural diagram of terminal of the embodiment of the present invention four is shown.
A kind of hardware structural diagram of Fig. 4 terminal of each embodiment to realize the present invention, the terminal 400 include but not It is limited to:Radio frequency unit 401, network module 402, audio output unit 403, input unit 404, sensor 405, display unit 406, the components such as user input unit 407, interface unit 408, memory 409, processor 410 and power supply 411.This field Technical staff is appreciated that the restriction of the not structure paired terminal of terminal structure shown in Fig. 4, and terminal may include than illustrating more More or less component perhaps combines certain components or different component layouts.In embodiments of the present invention, terminal includes But be not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and pedometer etc..
Processor 410, for determining that target belonging to the contact person is contacted when receiving the message of contact person's transmission It whether include predetermined keyword in people's grouping, and the identification message;According to object contact person grouping and the identification As a result, being fed back to the message.
Whether terminal provided in an embodiment of the present invention includes predetermined keyword come really by identifying in received message Determine whether be likely to occur private information in the reply of message, determines connection by determining the grouping of object contact person belonging to contact person Be the cohesion grade of people and user, finally message fed back in conjunction with above-mentioned two dimension synthesis, can with having to it is anti- The message of feedback carries out security protection, such as avoids the message back comprising private information leading to private information to strange contact person Leakage.
It should be understood that the embodiment of the present invention in, radio frequency unit 401 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 410 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 401 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 401 can also by wireless communication system and network and other set Standby communication.
Terminal provides wireless broadband internet by network module 402 for user and accesses, and such as user is helped to receive and dispatch electricity Sub- mail, browsing webpage and access streaming video etc..
Audio output unit 403 can be received by radio frequency unit 401 or network module 402 or in memory 409 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 403 can also provide and end The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that end 400 executes.Sound Frequency output unit 403 includes loudspeaker, buzzer and receiver etc..
Input unit 404 is for receiving audio or video signal.Input unit 404 may include graphics processor (Graphics Processing Unit, GPU) 4041 and microphone 4042, graphics processor 4041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 406.Through graphics processor 4041, treated that picture frame can be deposited Storage is sent in memory 409 (or other storage mediums) or via radio frequency unit 401 or network module 402.Mike Wind 4042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 401 is converted in the case where telephone calling model.
Terminal 400 further includes at least one sensor 405, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjusts the brightness of display panel 4061, and proximity sensor can close display panel when terminal 400 is moved in one's ear 4061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add The size of speed can detect that size and the direction of gravity when static, can be used to identify mobile terminal posture, (for example horizontal/vertical screen is cut Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 405 may be used also To include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, temperature Meter, infrared sensor etc., details are not described herein.
Display unit 406 is for showing information input by user or being supplied to the information of user.Display unit 406 can wrap Display panel 4061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 4061.
User input unit 407 can be used for receiving the number or character information of input, and generates and set with the user of terminal It sets and the related key signals of function control inputs.Specifically, user input unit 407 include touch panel 4071 and other Input equipment 4072.Touch panel 4071, also referred to as touch screen, collect user on it or nearby touch operation (such as User is using any suitable objects or attachment such as finger, stylus on touch panel 4071 or near touch panel 4071 Operation).Touch panel 4071 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined The touch orientation of user is surveyed, and detects touch operation bring signal, transmits a signal to touch controller;Touch controller from Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 410, receives processor 410 The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves Realize touch panel 4071.In addition to touch panel 4071, user input unit 407 can also include other input equipments 4072. Specifically, other input equipments 4072 can include but is not limited to physical keyboard, function key (such as volume control button, switch Key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 4071 can be covered on display panel 4061, when touch panel 4071 is detected at it On or near touch operation after, send processor 410 to determine the type of touch event, be followed by subsequent processing device 410 according to touching The type for touching event provides corresponding visual output on display panel 4061.Although in Fig. 4, touch panel 4071 and display Panel 4061 is the function that outputs and inputs of realizing mobile terminal as two independent components, but in some embodiments In, touch panel 4071 and display panel 4061 can be integrated and be realized the function that outputs and inputs of terminal, specifically herein not It limits.
Interface unit 408 is the interface that external device (ED) is connect with terminal 400.For example, external device (ED) may include it is wired or Wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, memory card port, For connecting port, the port audio input/output (I/O), video i/o port, ear port of the device with identification module Etc..Interface unit 408 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and will One or more elements that the input received is transferred in terminal 400 or can be used for terminal 400 and external device (ED) it Between transmit data.
Memory 409 can be used for storing software program and various data.Memory 409 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 409 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 410 is the control centre of terminal, utilizes each portion of various interfaces and the entire mobile terminal of connection Point, by running or execute the software program and/or module that are stored in memory 409, and calls and be stored in memory 409 Interior data execute the various functions and processing data of mobile terminal, to carry out integral monitoring to terminal.Processor 410 can Including one or more processing units;Preferably, processor 410 can integrate application processor and modem processor, wherein The main processing operation system of application processor, user interface and application program etc., modem processor mainly handles channel radio Letter.It is understood that above-mentioned modem processor can not also be integrated into processor 410.
Mobile terminal 400 can also include the power supply 411 (such as battery) powered to all parts, it is preferred that power supply 411 Can be logically contiguous by power-supply management system and processor 410, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, terminal 400 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal, including processor 410, and memory 409 is stored in storage It is real when which is executed by processor 410 on device 409 and the computer program that can be run on the processor 410 Each process of existing above- mentioned information safety protecting method embodiment, and identical technical effect can be reached, to avoid repeating, here It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program realizes each process of above- mentioned information safety protecting method embodiment when the computer program is executed by processor, And identical technical effect can be reached, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, Such as read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, letter Claim RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (12)

1. a kind of protecting information safety method, which is characterized in that the method includes:
When receiving the message of contact person's transmission, determine that object contact person belonging to the contact person is grouped, and
It whether identifies in the message comprising predetermined keyword;
According to object contact person grouping with the identification as a result, being fed back to the message.
2. the method according to claim 1, wherein it is described when receive contact person transmission message when, really Before object contact person grouping belonging to the fixed contact person, the method also includes:
Create contact person's grouping;Wherein, the contact person, which is grouped, includes:First grouping, second packet and third grouping;It is described First is grouped into grouping belonging to the contact person for having close relationship with user, and the second packet is belonging to strange contact person Grouping, the third are grouped into grouping belonging to the contact person for having friend relation with user;
Contact person is added respectively into each contact person's grouping.
3. according to the method described in claim 2, it is characterized in that, described according to object contact person grouping and the identification As a result, fed back to the message, including:
In the case where the object contact person is grouped into first grouping and the message comprising predetermined keyword, to institute Message is stated to be replied;
It is defeated in the case where including predetermined keyword in not described first grouping of object contact person grouping and the message First prompt information out, wherein first prompt information is for prompting user to exist wait reply message.
4. according to the method described in claim 2, it is characterized in that, described according to object contact person grouping and the identification As a result, fed back to the message, including:
In the case where not including predetermined keyword in object contact person grouping not second packet and the message, The message is replied;
It is defeated in the case where the object contact person is grouped into the second packet and the message not comprising predetermined keyword Second prompt information out, wherein second prompt information is for prompting user, there are what strange contact person sent to disappear wait reply Breath.
5. according to the method described in claim 4, it is characterized in that, the object contact person be grouped into the second packet and In the case where including predetermined keyword in the message, after exporting the second prompt information, the method also includes:
Receive the operation that the contact person is added in first grouping or third grouping by user;
In response to the operation, the contact person is added in corresponding relationship people grouping.
6. a kind of terminal, which is characterized in that the terminal includes:
Determining module, for determining object contact person belonging to the contact person point when receiving the message of contact person's transmission It whether include predetermined keyword in group, and the identification message;
Feedback module, for being grouped with the identification according to the object contact person as a result, being fed back to the message.
7. terminal according to claim 6, which is characterized in that the terminal further includes:
It is grouped creation module, for, when receiving the message of contact person's transmission, determining described in first determining module Before being the grouping of object contact person belonging to people, creation contact person's grouping;Wherein, the contact person, which is grouped, includes:First grouping, Second packet and third grouping;Described first is grouped into grouping belonging to the contact person for having close relationship with user, described Second packet is grouping belonging to strange contact person, and the third is grouped into belonging to the contact person for having friend relation with user Grouping;
Adding module, for adding contact person respectively into each contact person's grouping.
8. mobile terminal according to claim 7, which is characterized in that the feedback module includes:
First feedback submodule, for being grouped into first grouping and the message in the object contact person comprising default In the case where keyword, the message is replied;
Second feedback submodule, for being grouped and in the message in object contact person grouping not described first comprising pre- If in the case where keyword, exporting the first prompt information, wherein first prompt information is for prompting user to exist wait reply Message.
9. mobile terminal according to claim 7, which is characterized in that the feedback module includes:
Third feeds back submodule, does not include for being not in the second packet and the message in object contact person grouping In the case where predetermined keyword, the message is replied;
4th feedback submodule, for being grouped into the second packet and the message not in the object contact person comprising pre- If in the case where keyword, exporting the second prompt information, wherein second prompt information is for prompting user, there are strange Be human hair send wait reply message.
10. mobile terminal according to claim 9, which is characterized in that the mobile terminal further includes:
Receiving module is operated, is closed for being grouped into the second packet and the message in the object contact person comprising default In the case where keyword, after exporting the second prompt information, user is received by the contact person and is added to first grouping or institute State the operation in third grouping;
Respond module, in response to the operation, the contact person to be added in corresponding relationship people grouping.
11. a kind of terminal, which is characterized in that including processor, memory and be stored on the memory and can be at the place The computer program run on reason device is realized any in claim 1-5 when the computer program is executed by the processor The step of protecting information safety method described in item.
12. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium Sequence, the computer program realize protecting information safety method of any of claims 1-5 when being executed by processor The step of.
CN201810662793.1A 2018-06-25 2018-06-25 Information security protection method, terminal and computer readable storage medium Active CN108848240B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810662793.1A CN108848240B (en) 2018-06-25 2018-06-25 Information security protection method, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810662793.1A CN108848240B (en) 2018-06-25 2018-06-25 Information security protection method, terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108848240A true CN108848240A (en) 2018-11-20
CN108848240B CN108848240B (en) 2021-06-04

Family

ID=64202562

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810662793.1A Active CN108848240B (en) 2018-06-25 2018-06-25 Information security protection method, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108848240B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111294275A (en) * 2020-02-26 2020-06-16 上海云鱼智能科技有限公司 User information indexing method, device, server and storage medium of IM tool
CN112118173A (en) * 2020-09-21 2020-12-22 维沃移动通信(杭州)有限公司 Message feedback reminding setting method and device and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102695138A (en) * 2012-06-05 2012-09-26 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and automatic reply processing method
CN103200550A (en) * 2013-04-26 2013-07-10 上海华勤通讯技术有限公司 Mobile terminal and method for replaying messages automatically
CN104348974A (en) * 2014-10-23 2015-02-11 苏州合欣美电子科技有限公司 Keyword-verification-based specific message prompting method for communication group
CN104506711A (en) * 2014-11-28 2015-04-08 东莞宇龙通信科技有限公司 Communication information processing method and device for terminal
CN106033517A (en) * 2015-03-11 2016-10-19 联想(北京)有限公司 An information processing method and an electronic apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102695138A (en) * 2012-06-05 2012-09-26 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and automatic reply processing method
CN103200550A (en) * 2013-04-26 2013-07-10 上海华勤通讯技术有限公司 Mobile terminal and method for replaying messages automatically
CN104348974A (en) * 2014-10-23 2015-02-11 苏州合欣美电子科技有限公司 Keyword-verification-based specific message prompting method for communication group
CN104506711A (en) * 2014-11-28 2015-04-08 东莞宇龙通信科技有限公司 Communication information processing method and device for terminal
CN106033517A (en) * 2015-03-11 2016-10-19 联想(北京)有限公司 An information processing method and an electronic apparatus

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111294275A (en) * 2020-02-26 2020-06-16 上海云鱼智能科技有限公司 User information indexing method, device, server and storage medium of IM tool
CN112118173A (en) * 2020-09-21 2020-12-22 维沃移动通信(杭州)有限公司 Message feedback reminding setting method and device and electronic equipment
CN112118173B (en) * 2020-09-21 2023-02-21 维沃移动通信(杭州)有限公司 Message feedback reminding setting method and device and electronic equipment

Also Published As

Publication number Publication date
CN108848240B (en) 2021-06-04

Similar Documents

Publication Publication Date Title
CN108491123A (en) A kind of adjusting application program image target method and mobile terminal
CN108595946A (en) A kind of method and terminal of protection privacy
CN108376096A (en) A kind of message display method and mobile terminal
CN110457888A (en) A kind of verifying code imput method, device, electronic equipment and storage medium
CN110149628A (en) A kind of information processing method and terminal device
CN109412932A (en) A kind of screenshotss method and terminal
CN110035183A (en) Information sharing method and terminal
CN110096203A (en) A kind of screenshot method and mobile terminal
CN109981904A (en) A kind of method for controlling volume and terminal device
CN108363591A (en) A kind of method and device of PUSH message control
CN110536253A (en) A kind of group's Adding Way and mobile terminal
CN110213438A (en) A kind of processing method and terminal device of application program
CN110225040A (en) A kind of information processing method, terminal device and server
CN108848240A (en) A kind of protecting information safety method and terminal
CN109190501A (en) Operate recognition methods and terminal
CN109246693A (en) A kind of control method and terminal of application program
CN109218984A (en) A kind of method for tracing and mobile terminal
CN107704334A (en) A kind of SDK processing method and mobile terminal
CN107895108A (en) A kind of operation management method and mobile terminal
CN108494949B (en) A kind of image classification method and mobile terminal
CN109547330A (en) A kind of information sharing method and device
CN110366182A (en) A kind of data transmission method and terminal device
CN109062492A (en) A kind of application access method and terminal
CN110113486A (en) A kind of moving method and terminal of application icon
CN109033898A (en) A kind of data inputting method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant