CN109219003A - Information ciphering method, device, storage medium and electronic equipment - Google Patents

Information ciphering method, device, storage medium and electronic equipment Download PDF

Info

Publication number
CN109219003A
CN109219003A CN201810962898.9A CN201810962898A CN109219003A CN 109219003 A CN109219003 A CN 109219003A CN 201810962898 A CN201810962898 A CN 201810962898A CN 109219003 A CN109219003 A CN 109219003A
Authority
CN
China
Prior art keywords
information
secrecy
degree
secret
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810962898.9A
Other languages
Chinese (zh)
Other versions
CN109219003B (en
Inventor
陈岩
方攀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810962898.9A priority Critical patent/CN109219003B/en
Publication of CN109219003A publication Critical patent/CN109219003A/en
Application granted granted Critical
Publication of CN109219003B publication Critical patent/CN109219003B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/10Multimedia information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/56Unified messaging, e.g. interactions between e-mail, instant messaging or converged IP messaging [CPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present application discloses information ciphering method, device, storage medium and electronic equipment.Wherein method encrypts information for controlling equipment, comprising: receives information, and identifies the content of the information;The degree of secrecy of the information is determined according to the content of the information;The information for meeting default degree of secrecy is encrypted.The embodiment of the present application is by using above-mentioned technical proposal, whether the received information of electronic equipment automatic identification is confidential information, and degree of secrecy, targetedly confidential information is encrypted, avoid the problem that sense of security of users difference causes confidential information to be revealed, decryption oprerations cumbersome situation when information browse caused by avoiding all information to encrypt simultaneously, has taken into account information security and operation ease, has improved the intelligence and hommization of electronic equipment.

Description

Information ciphering method, device, storage medium and electronic equipment
Technical field
The invention relates to technical field of electronic equipment more particularly to a kind of information ciphering method, device, storage Jie Matter and electronic equipment.
Background technique
With the continuous development of the electronic equipments such as smart phone, electronic equipment brings very big convenience to user, uses Family is more and more stronger in dependence of the life and work various aspects to electronic equipment, and information security becomes the focus of user.
The developer of electronic equipments many at present increases the secret function of application, such as wechat or short message etc. are answered With.But it most of user consciousness for not having information to encrypt or does not know about those information and needs secret, while current information Secret is that secret is arranged as unit of application, such as to wechat information, and whole wechat information that electronic equipment receives are added Close, when user receives a large amount of wechat information, user's each information is required to be decrypted, cumbersome, user experience Difference.
Summary of the invention
The embodiment of the present application provides information ciphering method, device, storage medium and electronic equipment, the machine of intelligent recognition information Close grade improves the safety of confidential information.
In a first aspect, the embodiment of the present application provides a kind of information ciphering method, information is added for controlling equipment It is close, comprising:
Information is received, and identifies the content of the information;
The degree of secrecy of the information is determined according to the content of the information;
The information for meeting default degree of secrecy is encrypted.
Second aspect, the embodiment of the present application provide a kind of information encryption device, comprising:
Information receiving module for receiving information, and identifies the content of the information;
Degree of secrecy determining module, for determining the degree of secrecy of the information according to the content of the information;
Encrypting module, for being encrypted to the information for meeting default degree of secrecy.
The third aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer journey Sequence realizes the information ciphering method as described in the embodiment of the present application when the program is executed by processor.
Fourth aspect, the embodiment of the present application provide a kind of electronic equipment, including memory, processor and are stored in storage On device and the computer program that can run on a processor, the processor realize such as the application when executing the computer program Information ciphering method described in embodiment.
The information ciphering method provided in the embodiment of the present application.Information is received, and identifies the content of the information, according to institute The content for stating information determines the degree of secrecy of the information, encrypts to the information for meeting default degree of secrecy.By using Above scheme, whether the received information of electronic equipment automatic identification is confidential information and degree of secrecy, targetedly to machine Confidential information is encrypted, and avoids the problem that sense of security of users difference causes confidential information to be revealed, while all information being avoided to encrypt Decryption oprerations cumbersome situation when caused information browse has taken into account information security and operation ease, improves electronic equipment Intelligence and hommization.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of information ciphering method provided by the embodiments of the present application;
Fig. 2 is the flow diagram of another information ciphering method provided by the embodiments of the present application;
Fig. 3 is the flow diagram of another information ciphering method provided by the embodiments of the present application;
Fig. 4 is the flow diagram of another information ciphering method provided by the embodiments of the present application;
Fig. 5 is a kind of structural schematic diagram of information encryption device provided by the embodiments of the present application;
Fig. 6 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application;
Fig. 7 is the structural schematic diagram of another electronic equipment provided by the embodiments of the present application.
Specific embodiment
Further illustrate the technical solution of the application below with reference to the accompanying drawings and specific embodiments.It is understood that It is that specific embodiment described herein is used only for explaining the application, rather than the restriction to the application.It further needs exist for illustrating , part relevant to the application is illustrated only for ease of description, in attached drawing rather than entire infrastructure.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The processing or method described as flow chart.Although each step is described as the processing of sequence by flow chart, many of these Step can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of each step can be rearranged.When its operation The processing can be terminated when completion, it is also possible to have the additional step being not included in attached drawing.The processing can be with Corresponding to method, function, regulation, subroutine, subprogram etc..
Fig. 1 is a kind of flow diagram of information ciphering method provided by the embodiments of the present application, and this method can be by information Encryption device executes, and wherein the device can be implemented by software and/or hardware, and can generally integrate in the electronic device.Such as Fig. 1 institute Show, this method comprises:
Step 101 receives information, and identifies the content of the information;
Step 102, the degree of secrecy that the information is determined according to the content of the information;
Step 103 encrypts the information for meeting default degree of secrecy.
Illustratively, the electronic equipment in the embodiment of the present application may include the smart machines such as mobile phone, wrist-watch and tablet computer.
In a step 101, the received information of electronic equipment is the received information of application program in electronic equipment, exemplary , it can be the information that user contact is sent by communication application program, such as journey is applied by wechat, QQ or short message etc. The information that sequence is sent can also be the notice category information that the management backstage of application program is sent, such as game application, take journey Or notification information, pushed information of the transmissions such as Alipay etc..Wherein, the content of the received information of electronic equipment can be including One or more in text, image and character string, electronic equipment passes through text, image and the character for including in identification information String, it may be determined that the information content.
In a step 102, in the received information of electronic equipment, even same application or same addresser send Information in, may include the confidential information or routine information of user, in the present embodiment, pass through preset secret rule The information content of identification is judged to determine whether the received information of electronic equipment is confidential information, and determines received letter The degree of secrecy of breath.Illustratively, the received confidential information of electronic equipment can be the individual privacy information of user, personal account Information, job information etc..
In some embodiments, the degree of secrecy of the information is determined according to the content of the information, comprising: according to preparatory The secret rule of setting identifies secret keyword, secret image and secret character string in the content of the information and described The degree of secrecy of secret keyword, secret image and secret character string;According to the secret keyword, secret image and secret word The degree of secrecy of symbol string determines the degree of secrecy of the information.
In the present embodiment, for judging that the secret rule of confidential information and degree of secrecy can be by system setting, It can also be and be independently arranged by user, it is determining to can also be that user is updated based on system setting.Wherein, identification information In include image, keyword and character string, if image, keyword and character string in the information content at least one of it is full When the judgment criteria of the preset secret rule of foot, it is determined that be in confidential information, such as identification information in the information including default Degree of secrecy image or identification information in include default degree of secrecy keyword or identification information in include preset Identification information can then be determined as setting the confidential information of degree of secrecy by the character string of degree of secrecy.
Optionally, the text of identification information content is segmented, and removal repetitor, monosyllabic word and stop words are obtained wait sentence Disconnected keyword, it is settable for judging the keywords database of confidential information in the electronic device, keyword to be judged is being closed Keyword is matched in library, and for judging confidential information secret rule, for keyword to be judged, there are any in keywords database Keywords matching success.Correspondingly, further include the degree of secrecy of each keyword in keywords database, any Keywords matching at When function, the degree of secrecy of the keyword of successful match can be further determined that, and then by the machine of keyword corresponding informance to be judged Close grade is set as the degree of secrecy of the keyword of successful match.Wherein, for judging that the keywords database of secret keyword can be with It is that system is arranged, can also be that user is added the keyword in keywords database, deletes and modifies, such as keywords database In include keyword can be but not limited to ID card No., phone number, account, password, the pet name or work it is relevant Keyword etc., wherein the pet name can be added according to user demand.Correspondingly, the degree of secrecy of keyword can have user's progress It is set or adjusted.The degree of secrecy of the degree of secrecy highest, the pet name that illustratively, can be the relevant keyword of work takes second place, The degree of secrecy of personal account etc. is inferior again.Wherein the grade quantity of degree of secrecy is also possible to by user setting, such as 3 etc. Grade or 5 grades etc..It should be noted that the keyword in identification information content, the text being not limited only in the information content, It further include the text in the image in the information content.
Optionally, when the information content is the received information of instant message applications, confidential information is carried out to character string and is sentenced Disconnected can be obtains the character string in the context of dialog interface, carries out semantic analysis to context, whether determines the character string For confidential information, wherein the context of the character string can be not limited to the information content, can also include except the information content Text.Illustratively, in the dialog interface of instant messaging, there is " this is my ID card No. " after character string Text, or pass through semantic analysis, it is known that the character in the presence of the text of " giving me your ID card No. " before character string String is ID card No., belongs to confidential information.Wherein, preferential to identify when including simultaneously text and character string in the information content And judge the keyword in text, when arriving confidential information by the way that keyword is unidentified, confidential information is being carried out to character string Judgement.When in the information content and context only comprising character string or it is unidentified to the keyword for belonging to confidential information when, to word Whether symbol string is that the secret rule that confidential information is judged can be, and character string setting rule, being provided with rule can be The digit and character types of character string.The setting rule of character string and the setting of character string in pre-set confidential information are advised It is then matched, for judging that the default confidential information judgment criteria of character string can be the setting of the character string in the information content The regular setting rule match success with pre-set secret character string.For example, if character string be only comprising number or only 18 character strings comprising number and letter X then can determine that the character string is ID card No.;If character string is only comprising number And the character string that initial three bit digital of character string is 622, then it can determine that the character string is bank's card number.It should be noted that knowing Character string in the other information content, the character string being not limited only in the information content further include the word in the image in the information content Symbol string.
Optionally, when the notification information that the information content is application program, and can pass through in the information content there are when character string The packet name of application program for sending notification information judges whether the information is confidential information, for example, if the transmission notification information The entitled Alipay of the packet of application program or industrial and commercial bank can determine that the character string in the information is the financing account with user Relevant character string, it may be determined that the information is confidential information.
The judgement that confidential information is carried out to image, can be whether the image in identification information content includes preset secret Image, when the image in identification information content includes preset facial image, determines that the information is machine by taking facial image as an example Confidential information.
In the present embodiment, institute is determined according to the degree of secrecy of the secret keyword, secret image and secret character string State the degree of secrecy of information, specially by the degree of secrecy of keyword secret in information, secret image and secret character string most High degree of secrecy is determined as the degree of secrecy of the information.Illustratively, degree of secrecy includes the first estate, the second grade and Three grades, and grade successively reduces, when by identification information content, determine keyword in the information content including the first estate and The image of second grade, it may be determined that the degree of secrecy of the information is the first estate.
In step 103, only the information for meeting default degree of secrecy is encrypted, to being unsatisfactory for default degree of secrecy Information directly displays the screen in electronic equipment without encryption.Illustratively, degree of secrecy includes the first estate, second etc. Grade and the tertiary gradient, and grade successively reduces, default degree of secrecy can be the first estate and the second grade.Wherein, secret etc. The quantity and default degree of secrecy of grade can be arranged according to user demand.
Illustratively, information encrypt can be and be added by password encryption, encrypting fingerprint, face encryption and vocal print It is one of close or a variety of, various forms of cipher modes can be used simultaneously for the information of different degree of secrecy, to improve letter The safety of breath, such as the double-encryption mode of encrypting fingerprint and dynamic password is used for the information of higher level, for The information of lower grade is using voiceprint or the single cipher mode of encrypting fingerprint.Optionally, it is adopted according to date or time Sound is used in 20:00- next day 8:00 for example, using encrypting fingerprint mode in 8:00-20:00 with the cipher mode of switching at runtime Line cipher mode;With the sequence that password encryption, encrypting fingerprint, face encryption and vocal print encrypt, with 24 hours for time interval The switching of cipher mode is carried out, such as used password encryption mode at first day, uses encrypting fingerprint mode ... the 5th within second day It uses password encryption mode, and with above-mentioned encryption order and so on.By dynamic transformation of encrypted mode, letter is further increased The safety of breath.Wherein, in above-mentioned cryptographic operation, the sequence of cipher mode or each cipher mode corresponding period can by with Family setting.
The information ciphering method provided in the embodiment of the present application receives information, and identifies the content of the information, according to institute The content for stating information determines the degree of secrecy of the information, encrypts to the information for meeting default degree of secrecy.By using Above scheme, whether the received information of electronic equipment automatic identification is confidential information and degree of secrecy, targetedly to machine Confidential information is encrypted, and avoids the problem that sense of security of users difference causes confidential information to be revealed, while all information being avoided to encrypt Decryption oprerations cumbersome situation when caused information browse has taken into account information security and operation ease, improves electronic equipment Intelligence and hommization.
Fig. 2 is the flow diagram of another information ciphering method provided by the embodiments of the present application, referring to fig. 2, this implementation The method of example includes the following steps:
Step 201 receives information, and identifies the content of the information.
The content of the information is input to information secret identification model trained in advance by step 202.
Step 203, the degree of secrecy that the information is determined according to the output result of the information secret identification model.
Step 204 encrypts the information for meeting default degree of secrecy.
In step 202, information secret identification model trained in advance can be neural network model or disaggregated model etc. Machine learning model.Wherein, neural network model and disaggregated model are formed according to great amount of samples training, have confidential information The function that identification and degree of secrecy determine.It illustratively, include sample information content and the secret of the sample etc. in sample Grade can be the sample information in acquisition extensive application program, and carry out the mark of practical degree of secrecy to above-mentioned sample information, To generate sample;Sample can also be based on default secret rule to writing after the practical degree of secrecy judgement of the carry out of confidential information It generates.Neural network model and disaggregated model can be the training by way of supervised learning and obtain, specifically, sample is inputted To in untrained information secret identification model, model output can be obtained based on the untrained information secret identification model Predict degree of secrecy, when practical degree of secrecy difference in the prediction degree of secrecy and sample of model output, based on this model The deviation of the practical degree of secrecy of prediction degree of secrecy and the sample mark of output is reversely adjusted in information secret identification model Weight parameter, iteration execute above-mentioned training process, until the error of information secret identification model is less than default error.Training is completed Information secret identification model have information degree of secrecy arbitration functions, by the received information input of electronic equipment to training After the information secret identification model of completion, the accurate prediction degree of secrecy of the information can be obtained.
Optionally, before equipment is applied for the first time or receives information, further includes: obtain the secret keyword of user's input Or secret image, and set the secret keyword or the corresponding degree of secrecy of secret image of input;According to user input Secret keyword or secret image and corresponding degree of secrecy are trained the information secret identification model trained in advance.
In the present embodiment, the secret keyword of user's input and secret image are the confidential information that user itself thinks, Information secret identification model is trained by the secret keyword and secret image that are inputted based on user, so that training obtains The recognition result of information secret identification model be more in line with the demand of user, there is personalized and otherness.Optionally, it is setting Before standby application for the first time or reception information, it can also be that each application program has been received in preset time period in traversal electronic equipment Information, or extract in the received information of each application program the information of preset quantity, be shown in screen, obtain user To the degree of secrecy for having received information setting, mould is identified to information secret trained in advance by the information after setting degree of secrecy Type is trained.
In step 203, information secret identification model can be the degree of secrecy of output information;It can also be output information Secret image in content, secret keyword and secret character string, and secret image, secret keyword and secret character string Degree of secrecy, electronic equipment determine the machine of the information according to the degree of secrecy of secret image, secret keyword and secret character string Close grade.
The information ciphering method provided in the embodiment of the present application receives information, and identifies the content of the information, will be described The content of information is input to information secret identification model trained in advance, according to the output result of the information secret identification model The degree of secrecy for determining the information encrypts the information for meeting default degree of secrecy.By using above-mentioned technical proposal, Based on the degree of secrecy of the received information of deep learning model intelligent recognition electronic equipment trained in advance, Dynamic Recognition need into The information of row encryption, it is poor according to specific aim caused by being encrypted to the corresponding information of same application to avoid, and it is invalid to exist The problem of encryption, improves the specific aim of information encryption.
Fig. 3 is the flow diagram of another information ciphering method provided by the embodiments of the present application, and the present embodiment is above-mentioned One optinal plan of embodiment, correspondingly, as shown in figure 3, the method for the present embodiment includes the following steps:
Step 301 receives information, and identifies the content of the information.
The scene that step 302, identification equipment are currently located.
Step 303 determines information type according to the content and/or addresser of the information.
Step 304, determine scene that the equipment is currently located whether be the information type security scenario.If then Step 305 is executed, if it is not, thening follow the steps 306.
Step 305, the display information.
Step 306, the degree of secrecy that the information is determined according to the content of the information.
Step 307 encrypts the information for meeting default degree of secrecy.
In step 302, scene where electronic equipment can include but is not limited to operative scenario, common scene and family's ring Border.The confidentiality of information can be for scene, for example, work related information does not have secret in operative scenario Property, personal account information is can be in the home environment without confidentiality.The scene that identification electronic equipment is currently located, can be true Determine the confidential information under current scene, avoids the invalid cryptographic operation under security scenario.
Optionally, the scene that the equipment is currently located is identified, comprising: work as according to the network type of equipment connection, equipment At least one in the work and rest of preceding position and user determines the scene that the equipment is currently located.Wherein, network type can To include movable signal network, cable network and wifi network, for example, when the network of electronic equipment connection is corporate wired network Or when company's WiFi network, it may be determined that it is operative scenario that electronic equipment, which is currently located scene,;When electronic equipment connects home network Network or when family WiFi, it may be determined that it is home scenarios that electronic equipment, which is currently located scene,.Wherein, the network of company's scene and family Front yard network can be what user pre-entered.It can be according to the scene that equipment present position determines that equipment is currently located, Preset the location information of operative scenario and the location information of home scenarios, when electronic equipment present position with it is above-mentioned When the location information of operative scenario or home scenarios is identical, it may be determined that the scene of electronic equipment, correspondingly, when electronic equipment is current Position be above-mentioned operative scenario or home scenarios location information except position when, it may be determined that electronic equipment is located at public field The positions such as scape, such as park, supermarket belong to common scene.It can be according to the scene that the work and rest of user determines that equipment is currently located Determine the work and rest of current time user, for example, on Monday to Friday 9:00-11:30 be the working time, 11:30-12:30 is lunch Time, 12:30-20:00 are the working time, and 20:00- next day 8:00 is the time of having a rest, correspondingly, can determine electronic equipment in week One to Friday 9:00-11:30 and 12:30-20:00 is in operative scenario, is in common scene in 11:30-12:30,20: 00- next day 8:00 is in home scenarios.
It should be noted that network type, equipment present position and the work and rest of user that equipment connects can be passed through Scene where two or three determining electronic equipments.For example, on Monday to period Friday 9:00-11:30, electronic equipment The pre-set company position of the user of position can accurately determine that scene locating for electronic equipment is operative scenario.
Wherein, the scene where electronic equipment can be added or be adjusted by user, correspondingly, it is used to determine scene The network information and location information equally can be added or be adjusted by user.
In step 303, illustratively, information type can include but is not limited to news type, types of entertainment, financing class Type, personal social type, work social type etc..Information type can be determined according to the addresser of information in the present embodiment, need Illustrate, when the corresponding application program of the information is instant messaging application, transmits the contact person for artificially sending the information, when The corresponding application program of the information is the other applications of non-instant communications applications, such as Alipay, takes journey or trill etc. When program, addresser includes the app title for receiving information.Illustratively, when transmitting artificial today's tops, information type is news Type;It transmits artificial trill, protruding canine teeth, disappear happy etc. in application, information type is types of entertainment;Transmit artificially realize doctrinairism wealth or Alipay etc. is in application, information type is financing type;When transmitting the contact person in the instant messaging applications such as artificial wechat, short message When, information type is social type, and further follow-up contact person determines personal social type or work social type, works as connection When people is with user's Peer Relationships, it may be determined that information type is work social type, when contacting artificial kith and kin's relationship, it may be determined that letter Ceasing type is personal social type.
Optionally, it can also be according to the information content, determine information type, specifically, can be in identification information content Keyword, and information type is determined based on keyword.Illustratively, in the information content exist " king's honor ", " trill ", When keywords such as " main broadcasters ", it may be determined that information type is types of entertainment, when there are keywords such as " meetings " in the information content, really Determining information type is work social type;When in the information content exist the keywords such as " party ", " having a meal ", " playing ", " appointment " When, it may be determined that information type is personal social type.
Optionally, information type is determined based on the content of information and addresser, such as have colleague's transmission includes keyword The information of " meeting ", the information type of the information are work social type, the information comprising " having a dinner party " for transmission of working together, the information Information type be personal social type.
In step 304, the security scenario of each information type is provided in electronic equipment, for example, work social category The security scenario of type is operative scenario, and the security scenario of financing type and personal social type is home scenarios or personal scene, The security scenario of news type and types of entertainment is operative scenario, home scenarios and common scene.
In the present embodiment, it to the received information of security scenario, without being encrypted, can directly display in electronic equipment On screen, omits the process that information is encrypted and decrypted and reduce the meter of electronic equipment on the basis of ensuring information security Calculation process improves the convenience of operation.
It should be noted that when electronic equipment leaves security scenario, to confidential information received under security scenario according to Its degree of secrecy is encrypted, and the received confidential information under security scenario is avoided, the case where leakage under other scenes.Such as It can be when network type, equipment present position and the work and rest of user of equipment connection change, detection electronics is set Whether standby scene changes, if so, encrypting to confidential information received within the time of security scenario.
The information ciphering method provided in the embodiment of the present application is in safety when recognizing electronic equipment when receiving information When scene, without judging the degree of secrecy and cryptographic operation of information, the information is directly displayed, it is aobvious to simplify the information under security scenario Show process, omits information encryption and information decrypting process, improve the hommization of electronic equipment.
Fig. 4 is the flow diagram of another information ciphering method provided by the embodiments of the present application, and the present embodiment is above-mentioned One optinal plan of embodiment, correspondingly, as shown in figure 4, the method for the present embodiment includes the following steps:
Step 401 receives information, and identifies the content of the information.
Step 402, the degree of secrecy that the information is determined according to the content of the information;
Step 403, the information that degree of secrecy is preset to satisfaction, carry out the information according to the degree of secrecy of the information Single encryption or multi-enciphering.
Step 404, the verification information for obtaining user's input, and in verification information success, show the information.
In step 403, different cipher modes is carried out for the information of different degree of secrecy, for example, for secret etc. The lower information of grade carries out single encryption, i.e., is encrypted using a kind of cipher mode to information, to the higher letter of degree of secrecy Breath carries out multi-enciphering, i.e., is encrypted using two or more cipher modes, to provide the safety of confidential information.Wherein, Cipher mode can be password encryption, encrypting fingerprint, face encryption and vocal print encryption.Correspondingly, being encrypted to information It later, further include that information is arranged according to the degree of secrecy of information to identify, to prompt user to determine adding for the information according to mark Close mode accurately inputs the correct verification information for decryption convenient for user.
In step 404, when user inputs the browsing instructions to information, the biological information of user is acquired, such as When user inputs browsing instructions by way of touch-control click, the finger print information of user is acquired, when user is defeated by voice mode When entering browsing instructions, the voiceprint of user is acquired, or after user inputs browsing instructions, user is acquired by camera Facial image.Biological information based on above-mentioned acquisition is matched, and information is decrypted.Correspondingly, the information Cipher mode is password encryption, then user is prompted to input verifying password.
When the biological information of user's input or verifying password are proved to be successful, information is decrypted, is shown The information.Optionally, it during the display of confidential information, if occur other faces in the image pickup scope of electronic equipment, moves back Current application program or current page is exited out, the risk for avoiding confidential information from revealing during display.
The information ciphering method provided in the embodiment of the present application carries out information by the degree of secrecy according to information different The encryption of level improves the safety of confidential information.
Fig. 5 is a kind of structural block diagram of information encryption device provided by the embodiments of the present application, the device can by software and/or Hardware realization is typically integrated in electronic equipment, can by execute electronic equipment information ciphering method come to desktop layouts into Edlin.As shown in figure 5, the device includes: information receiving module 501, degree of secrecy determining module 502 and encrypting module 503.
Information receiving module 501 for receiving information, and identifies the content of the information;
Degree of secrecy determining module 502, for determining the degree of secrecy of the information according to the content of the information;
Encrypting module 503, for being encrypted to the information for meeting default degree of secrecy.
Whether the information encryption device provided in the embodiment of the present application, the received information of electronic equipment automatic identification are secret Information and degree of secrecy, targetedly encrypt confidential information, and sense of security of users difference is avoided to lead to confidential information The problem of leakage, at the same avoid all information encrypt caused by information browse when the cumbersome situation of decryption oprerations, taken into account information Safety and operation ease improve the intelligence and hommization of electronic equipment.
On the basis of the above embodiments, degree of secrecy determining module includes:
Information input unit, for the content of the information to be input to information secret identification model trained in advance;
First degree of secrecy determination unit, for determining the letter according to the output result of the information secret identification model The degree of secrecy of breath.
On the basis of the above embodiments, degree of secrecy determining module further include:
Confidential information determination unit, for before receiving information, obtaining the secret keyword or secret figure of user's input Picture;
Degree of secrecy setup unit, for setting the secret keyword or the corresponding degree of secrecy of secret image of input;
Model optimization unit, secret keyword or secret image and corresponding secret etc. for being inputted according to the user Grade is trained the information secret identification model trained in advance.
On the basis of some embodiments, degree of secrecy determining module includes:
Information identificating unit, for identification secret keyword in the content of the information, secret image and secret character The degree of secrecy of string and the secret keyword, secret image and secret character string;
Second degree of secrecy determination unit, for the machine according to the secret keyword, secret image and secret character string Close grade determines the degree of secrecy of the information.
On the basis of the above embodiments, further includes:
Scene Recognition module, for identifying before the degree of secrecy for determining the information according to the content of the information The scene that equipment is currently located;
Information type determining module, for determining information type according to the content and/or addresser of the information;
Security scenario judgment module, for determine scene that the equipment is currently located whether be the information type peace Whole scene;If so, showing the information;If it is not, then continuing to execute the machine for determining the information according to the content of the information The step of close grade.
On the basis of the above embodiments, scene Recognition module is used for:
Institute is determined according at least one in the network type of equipment connection, equipment present position and the work and rest of user State the scene that equipment is currently located.
On the basis of the above embodiments, encrypting module is used for:
To the information for meeting default degree of secrecy, single encryption is carried out to the information according to the degree of secrecy of the information Or multi-enciphering
The embodiment of the present application also provides a kind of storage medium comprising computer executable instructions, and the computer is executable Instruction is used for execution information encryption method when being executed by computer processor, this method comprises:
Information is received, and identifies the content of the information;
The degree of secrecy of the information is determined according to the content of the information;
The information for meeting default degree of secrecy is encrypted.
Storage medium --- any various types of memory devices or storage equipment.Term " storage medium " is intended to wrap It includes: install medium, such as CD-ROM, floppy disk or magnetic tape equipment;Computer system memory or random access memory, such as DRAM, DDRRAM, SRAM, EDORAM, blue Bath (Rambus) RAM etc.;Nonvolatile memory, such as flash memory, magnetic medium (example Such as hard disk or optical storage);Register or the memory component of other similar types etc..Storage medium can further include other types Memory or combinations thereof.In addition, storage medium can be located at program in the first computer system being wherein performed, or It can be located in different second computer systems, second computer system is connected to the first meter by network (such as internet) Calculation machine system.Second computer system can provide program instruction to the first computer for executing.Term " storage medium " can To include two or more that may reside in different location (such as in the different computer systems by network connection) Storage medium.Storage medium can store the program instruction that can be performed by one or more processors and (such as be implemented as counting Calculation machine program).
Certainly, a kind of storage medium comprising computer executable instructions, computer provided by the embodiment of the present application The information cryptographic operation that executable instruction is not limited to the described above, can also be performed information provided by the application any embodiment Relevant operation in encryption method.
The embodiment of the present application provides a kind of electronic equipment, and letter provided by the embodiments of the present application can be integrated in the electronic equipment Encryption for information device.Fig. 6 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application.Electronic equipment 600 can wrap It includes: memory 601, processor 602 and the computer program that is stored on memory 601 and can be run in processor 602, it is described Processor 602 realizes the information ciphering method as described in the embodiment of the present application when executing the computer program.
Whether electronic equipment provided by the embodiments of the present application, the received information of electronic equipment automatic identification are confidential information, And degree of secrecy, targetedly confidential information is encrypted, avoids sense of security of users difference that confidential information is caused to be revealed The problem of, at the same avoid all information encrypt caused by information browse when the cumbersome situation of decryption oprerations, taken into account information security Property and operation ease, improve the intelligence and hommization of electronic equipment.
Fig. 7 is the structural schematic diagram of another server provided by the embodiments of the present application.The server may include: shell (not shown), memory 701, central processing unit (central processing unit, CPU) 702 (also known as processor, Hereinafter referred to as CPU), circuit board (not shown) and power circuit (not shown).The circuit board is placed in the shell The space interior that body surrounds;The CPU702 and the memory 701 are arranged on the circuit board;The power circuit is used In each circuit or the device power supply for the server;The memory 701, for storing executable program code;It is described CPU702 is run and the executable program code pair by reading the executable program code stored in the memory 701 The computer program answered, to perform the steps of
Information is received, and identifies the content of the information;
The degree of secrecy of the information is determined according to the content of the information;
The information for meeting default degree of secrecy is encrypted.
The server further include: Peripheral Interface 703, RF (Radio Frequency, radio frequency) circuit 705, voicefrequency circuit 706, loudspeaker 711, power management chip 708, input/output (I/O) subsystem 709, other input/control devicess 710, touching Touch screen 712, other input/control devicess 710 and outside port 704, these components pass through one or more communication bus or Signal wire 707 communicates.
It should be understood that diagram server 700 is only an example of server, and server 700 can have Have than shown in the drawings more or less component, two or more components can be combined, or can have not Same component configuration.Various parts shown in the drawings can include one or more signal processings and/or dedicated integrated electricity It is realized in the combination of hardware, software or hardware and software including road.
Just provided in this embodiment for the server for updating operation to be described in detail below, the server is with hand For machine.
Memory 701, the memory 701 can be accessed by CPU702, Peripheral Interface 703 etc., and the memory 701 can It can also include nonvolatile memory to include high-speed random access memory, such as one or more disk memory, Flush memory device or other volatile solid-state parts.
The peripheral hardware that outputs and inputs of equipment can be connected to CPU702 and deposited by Peripheral Interface 703, the Peripheral Interface 703 Reservoir 701.
I/O subsystem 709, the I/O subsystem 709 can be by the input/output peripherals in equipment, such as touch screen 712 With other input/control devicess 710, it is connected to Peripheral Interface 703.I/O subsystem 709 may include 7091 He of display controller For controlling one or more input controllers 7092 of other input/control devicess 710.Wherein, one or more input controls Device 7092 processed receives electric signal from other input/control devicess 710 or sends electric signal to other input/control devicess 710, Other input/control devicess 710 may include physical button (push button, rocker buttons etc.), dial, slide switch, behaviour Vertical pole clicks idler wheel.It is worth noting that input controller 7092 can with it is following any one connect: keyboard, infrared port, The indicating equipment of USB interface and such as mouse.
Touch screen 712, the touch screen 712 are the input interface and output interface between client server and user, will Visual output is shown to user, and visual output may include figure, text, icon, video etc..
Display controller 7091 in I/O subsystem 709 receives electric signal from touch screen 712 or sends out to touch screen 712 Electric signals.Touch screen 712 detects the contact on touch screen, and the contact that display controller 7091 will test is converted to and is shown The interaction of user interface object on touch screen 712, i.e. realization human-computer interaction, the user interface being shown on touch screen 712 Object can be the icon of running game, the icon for being networked to corresponding network etc..It is worth noting that equipment can also include light Mouse, light mouse are the extensions for the touch sensitive surface for not showing the touch sensitive surface visually exported, or formed by touch screen.
RF circuit 705 is mainly used for establishing the communication of mobile phone Yu wireless network (i.e. network side), realizes mobile phone and wireless network The data receiver of network and transmission.Such as transmitting-receiving short message, Email etc..Specifically, RF circuit 705 receives and sends RF letter Number, RF signal is also referred to as electromagnetic signal, and RF circuit 705 converts electrical signals to electromagnetic signal or electromagnetic signal is converted to telecommunications Number, and communicated by the electromagnetic signal with communication network and other equipment.RF circuit 705 may include for executing The known circuit of these functions comprising but it is not limited to antenna system, RF transceiver, one or more amplifiers, tuner, one A or multiple oscillators, digital signal processor, CODEC (COder-DECoder, coder) chipset, user identifier mould Block (Subscriber Identity Module, SIM) etc..
Voicefrequency circuit 706 is mainly used for receiving audio data from Peripheral Interface 703, which is converted to telecommunications Number, and the electric signal is sent to loudspeaker 711.
Loudspeaker 711 is reduced to sound for mobile phone to be passed through RF circuit 705 from the received voice signal of wireless network And the sound is played to user.
Power management chip 708, the hardware for being connected by CPU702, I/O subsystem and Peripheral Interface are powered And power management.
The application, which can be performed, in information encryption device, storage medium and the electronic equipment provided in above-described embodiment arbitrarily implements Information ciphering method provided by example has and executes the corresponding functional module of this method and beneficial effect.Not in above-described embodiment In detailed description technical detail, reference can be made to information ciphering method provided by the application any embodiment.
Note that above are only the preferred embodiment and institute's application technology principle of the application.It will be appreciated by those skilled in the art that The application is not limited to specific embodiment described here, be able to carry out for a person skilled in the art it is various it is apparent variation, The protection scope readjusted and substituted without departing from the application.Therefore, although being carried out by above embodiments to the application It is described in further detail, but the application is not limited only to above embodiments, in the case where not departing from the application design, also It may include more other equivalent embodiments, and scope of the present application is determined by the scope of the appended claims.

Claims (10)

1. a kind of information ciphering method encrypts information for controlling equipment characterized by comprising
Information is received, and identifies the content of the information;
The degree of secrecy of the information is determined according to the content of the information;
The information for meeting default degree of secrecy is encrypted.
2. the method according to claim 1, wherein determining the secret of the information according to the content of the information Grade, comprising:
The content of the information is input to information secret identification model trained in advance;
The degree of secrecy of the information is determined according to the output result of the information secret identification model.
3. according to the method described in claim 2, it is characterized in that, before receiving information, further includes:
Obtain the secret keyword or secret image of user's input;
Set the secret keyword or the corresponding degree of secrecy of secret image of input;
According to the secret keyword of user input or secret image and corresponding degree of secrecy to the information trained in advance Secret identification model is trained.
4. the method according to claim 1, wherein determining the secret of the information according to the content of the information Grade, comprising:
Identify secret keyword in the content of the information, secret image and secret character string and the secret keyword, The degree of secrecy of secret image and secret character string;
The degree of secrecy of the information is determined according to the degree of secrecy of the secret keyword, secret image and secret character string.
5. the method according to claim 1, wherein in the machine for determining the information according to the content of the information Before close grade, further includes:
The scene that identification equipment is currently located;
Information type is determined according to the content of the information and/or addresser;
Determine scene that the equipment is currently located whether be the information type security scenario;
If so, showing the information;
If it is not, then continuing to execute the step of determining the degree of secrecy of the information according to the content of the information.
6. according to the method described in claim 5, it is characterized in that, identifying the scene that the equipment is currently located, comprising:
It is set described at least one determination in network type, equipment present position and the work and rest of user connected according to equipment The standby scene being currently located.
7. being wrapped the method according to claim 1, wherein being encrypted to the information for meeting default degree of secrecy It includes:
To the information for meeting default degree of secrecy, single encryption or more is carried out to the information according to the degree of secrecy of the information Re-encryption.
8. a kind of information encryption device characterized by comprising
Information receiving module for receiving information, and identifies the content of the information;
Degree of secrecy determining module, for determining the degree of secrecy of the information according to the content of the information;
Encrypting module, for being encrypted to the information for meeting default degree of secrecy.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The pager decryption method as described in any in claim 1-7 is realized when row.
10. a kind of electronic equipment, which is characterized in that including memory, processor and storage are on a memory and can be in processor The computer program of operation, the processor realize letter as claimed in claim 1 when executing the computer program Encryption for information method.
CN201810962898.9A 2018-08-22 2018-08-22 Information encryption method and device, storage medium and electronic equipment Active CN109219003B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810962898.9A CN109219003B (en) 2018-08-22 2018-08-22 Information encryption method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810962898.9A CN109219003B (en) 2018-08-22 2018-08-22 Information encryption method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN109219003A true CN109219003A (en) 2019-01-15
CN109219003B CN109219003B (en) 2022-02-22

Family

ID=64988973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810962898.9A Active CN109219003B (en) 2018-08-22 2018-08-22 Information encryption method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN109219003B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110191106A (en) * 2019-05-15 2019-08-30 维沃移动通信有限公司 A kind of data transmission method for uplink, terminal and communication system
WO2020119692A1 (en) * 2018-12-10 2020-06-18 杭州海康威视数字技术股份有限公司 Video stream playing method and device
CN117037270A (en) * 2023-08-03 2023-11-10 北京军安中科信息科技研究所 Screen anti-shooting system and method based on image processing

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102334306A (en) * 2011-07-18 2012-01-25 华为终端有限公司 Information instant enciphering and deciphering method and device
EP2584490A1 (en) * 2011-10-21 2013-04-24 Research In Motion Limited Displaying private information using alternate frame sequencing
CN103841262A (en) * 2014-02-17 2014-06-04 宇龙计算机通信科技(深圳)有限公司 Method and device for displaying privacy information
CN105260682A (en) * 2015-10-14 2016-01-20 广东小天才科技有限公司 Method and apparatus for protecting user privacy
CN105354509A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Picture processing method and processing system
CN105554745A (en) * 2016-01-27 2016-05-04 广东欧珀移动通信有限公司 Information management method and system
CN105574437A (en) * 2015-12-31 2016-05-11 北京金山安全软件有限公司 Method and device for protecting privacy information and electronic equipment
US20160307002A1 (en) * 2014-06-10 2016-10-20 Tencent Technology (Shenzhen) Company Limited Method and apparatus for displaying information content
CN106599716A (en) * 2016-11-30 2017-04-26 广东欧珀移动通信有限公司 Message content protection method and device, and mobile terminal
CN106682527A (en) * 2016-12-25 2017-05-17 北京明朝万达科技股份有限公司 Data security control method and system based on data classification and grading
CN107172205A (en) * 2017-06-29 2017-09-15 腾讯科技(深圳)有限公司 Pushed information processing method, mobile terminal and computer-readable storage medium
CN107368542A (en) * 2017-06-27 2017-11-21 山东华软金盾软件股份有限公司 A kind of concerning security matters Classified Protection of confidential data
US20180062846A1 (en) * 2015-03-31 2018-03-01 Huawei Technologies Co., Ltd. Mobile Terminal Privacy Protection Method and Protection Apparatus, and Mobile Terminal
CN108111667A (en) * 2016-11-25 2018-06-01 北京搜狗科技发展有限公司 A kind of communication information encryption method, device and electronic equipment
CN108111757A (en) * 2017-12-21 2018-06-01 广东欧珀移动通信有限公司 Photographic method, device, storage medium and terminal

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102334306A (en) * 2011-07-18 2012-01-25 华为终端有限公司 Information instant enciphering and deciphering method and device
EP2584490A1 (en) * 2011-10-21 2013-04-24 Research In Motion Limited Displaying private information using alternate frame sequencing
CN103841262A (en) * 2014-02-17 2014-06-04 宇龙计算机通信科技(深圳)有限公司 Method and device for displaying privacy information
US20160307002A1 (en) * 2014-06-10 2016-10-20 Tencent Technology (Shenzhen) Company Limited Method and apparatus for displaying information content
US20180062846A1 (en) * 2015-03-31 2018-03-01 Huawei Technologies Co., Ltd. Mobile Terminal Privacy Protection Method and Protection Apparatus, and Mobile Terminal
CN105260682A (en) * 2015-10-14 2016-01-20 广东小天才科技有限公司 Method and apparatus for protecting user privacy
CN105354509A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Picture processing method and processing system
CN105574437A (en) * 2015-12-31 2016-05-11 北京金山安全软件有限公司 Method and device for protecting privacy information and electronic equipment
CN105554745A (en) * 2016-01-27 2016-05-04 广东欧珀移动通信有限公司 Information management method and system
CN108111667A (en) * 2016-11-25 2018-06-01 北京搜狗科技发展有限公司 A kind of communication information encryption method, device and electronic equipment
CN106599716A (en) * 2016-11-30 2017-04-26 广东欧珀移动通信有限公司 Message content protection method and device, and mobile terminal
CN106682527A (en) * 2016-12-25 2017-05-17 北京明朝万达科技股份有限公司 Data security control method and system based on data classification and grading
CN107368542A (en) * 2017-06-27 2017-11-21 山东华软金盾软件股份有限公司 A kind of concerning security matters Classified Protection of confidential data
CN107172205A (en) * 2017-06-29 2017-09-15 腾讯科技(深圳)有限公司 Pushed information processing method, mobile terminal and computer-readable storage medium
CN108111757A (en) * 2017-12-21 2018-06-01 广东欧珀移动通信有限公司 Photographic method, device, storage medium and terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
何晓琳等: "健康医疗可穿戴设备数据隐私相关问题研究", 《中国医院管理》 *
李凤华等: "社交照片隐私保护机制研究进展", 《信息安全学报》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020119692A1 (en) * 2018-12-10 2020-06-18 杭州海康威视数字技术股份有限公司 Video stream playing method and device
CN110191106A (en) * 2019-05-15 2019-08-30 维沃移动通信有限公司 A kind of data transmission method for uplink, terminal and communication system
CN117037270A (en) * 2023-08-03 2023-11-10 北京军安中科信息科技研究所 Screen anti-shooting system and method based on image processing

Also Published As

Publication number Publication date
CN109219003B (en) 2022-02-22

Similar Documents

Publication Publication Date Title
US9892245B2 (en) Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device
CN103916233B (en) A kind of information ciphering method and device
KR102216877B1 (en) Authentication method and apparatus based on biometric information in a electronic device
CN101809581B (en) Embedded authentication systems in an electronic device
CN108780475A (en) Personalized inference certification for virtually assisting
WO2015055095A1 (en) Identity authentication method and device and storage medium
CN109085975A (en) Screenshotss method, apparatus, storage medium and electronic device
CN108475304B (en) Method and device for associating application program and biological characteristics and mobile terminal
CN108886469A (en) For providing the methods, devices and systems of holding account information
EP2927834A1 (en) Information processing apparatus, information processing method, and recording medium
CN109219003A (en) Information ciphering method, device, storage medium and electronic equipment
CN109254661B (en) Image display method, image display device, storage medium and electronic equipment
CN106778295B (en) File storage method, file display method, file storage device, file display device and terminal
CN109472122A (en) A kind of multimedia messages reminding method and system
CN108009140A (en) A kind of end message edit methods and system
CN108763885A (en) unlocking method, device, storage medium and electronic equipment
CN107341378A (en) For the method for the access right for setting application
CN107506721A (en) A kind of more method for collecting iris and system
CN108600084A (en) Information transferring method, device, storage medium and mobile terminal
CN108537086A (en) Method for information display, device, storage medium and mobile terminal
CN109618342A (en) It is a kind of for determining the method and apparatus of the operation permission information of user
CN108881417A (en) A kind of user interaction approach and system based on local area network
CN108449511A (en) A kind of presentation of information update method and system
WO2017215436A1 (en) Information encryption and decryption method, device and terminal
CN108509017A (en) A kind of control method and system of terminal applies

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant