CN109219003A - Information ciphering method, device, storage medium and electronic equipment - Google Patents
Information ciphering method, device, storage medium and electronic equipment Download PDFInfo
- Publication number
- CN109219003A CN109219003A CN201810962898.9A CN201810962898A CN109219003A CN 109219003 A CN109219003 A CN 109219003A CN 201810962898 A CN201810962898 A CN 201810962898A CN 109219003 A CN109219003 A CN 109219003A
- Authority
- CN
- China
- Prior art keywords
- information
- secrecy
- degree
- secret
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/10—Multimedia information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/56—Unified messaging, e.g. interactions between e-mail, instant messaging or converged IP messaging [CPM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- User Interface Of Digital Computer (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the present application discloses information ciphering method, device, storage medium and electronic equipment.Wherein method encrypts information for controlling equipment, comprising: receives information, and identifies the content of the information;The degree of secrecy of the information is determined according to the content of the information;The information for meeting default degree of secrecy is encrypted.The embodiment of the present application is by using above-mentioned technical proposal, whether the received information of electronic equipment automatic identification is confidential information, and degree of secrecy, targetedly confidential information is encrypted, avoid the problem that sense of security of users difference causes confidential information to be revealed, decryption oprerations cumbersome situation when information browse caused by avoiding all information to encrypt simultaneously, has taken into account information security and operation ease, has improved the intelligence and hommization of electronic equipment.
Description
Technical field
The invention relates to technical field of electronic equipment more particularly to a kind of information ciphering method, device, storage Jie
Matter and electronic equipment.
Background technique
With the continuous development of the electronic equipments such as smart phone, electronic equipment brings very big convenience to user, uses
Family is more and more stronger in dependence of the life and work various aspects to electronic equipment, and information security becomes the focus of user.
The developer of electronic equipments many at present increases the secret function of application, such as wechat or short message etc. are answered
With.But it most of user consciousness for not having information to encrypt or does not know about those information and needs secret, while current information
Secret is that secret is arranged as unit of application, such as to wechat information, and whole wechat information that electronic equipment receives are added
Close, when user receives a large amount of wechat information, user's each information is required to be decrypted, cumbersome, user experience
Difference.
Summary of the invention
The embodiment of the present application provides information ciphering method, device, storage medium and electronic equipment, the machine of intelligent recognition information
Close grade improves the safety of confidential information.
In a first aspect, the embodiment of the present application provides a kind of information ciphering method, information is added for controlling equipment
It is close, comprising:
Information is received, and identifies the content of the information;
The degree of secrecy of the information is determined according to the content of the information;
The information for meeting default degree of secrecy is encrypted.
Second aspect, the embodiment of the present application provide a kind of information encryption device, comprising:
Information receiving module for receiving information, and identifies the content of the information;
Degree of secrecy determining module, for determining the degree of secrecy of the information according to the content of the information;
Encrypting module, for being encrypted to the information for meeting default degree of secrecy.
The third aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer journey
Sequence realizes the information ciphering method as described in the embodiment of the present application when the program is executed by processor.
Fourth aspect, the embodiment of the present application provide a kind of electronic equipment, including memory, processor and are stored in storage
On device and the computer program that can run on a processor, the processor realize such as the application when executing the computer program
Information ciphering method described in embodiment.
The information ciphering method provided in the embodiment of the present application.Information is received, and identifies the content of the information, according to institute
The content for stating information determines the degree of secrecy of the information, encrypts to the information for meeting default degree of secrecy.By using
Above scheme, whether the received information of electronic equipment automatic identification is confidential information and degree of secrecy, targetedly to machine
Confidential information is encrypted, and avoids the problem that sense of security of users difference causes confidential information to be revealed, while all information being avoided to encrypt
Decryption oprerations cumbersome situation when caused information browse has taken into account information security and operation ease, improves electronic equipment
Intelligence and hommization.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of information ciphering method provided by the embodiments of the present application;
Fig. 2 is the flow diagram of another information ciphering method provided by the embodiments of the present application;
Fig. 3 is the flow diagram of another information ciphering method provided by the embodiments of the present application;
Fig. 4 is the flow diagram of another information ciphering method provided by the embodiments of the present application;
Fig. 5 is a kind of structural schematic diagram of information encryption device provided by the embodiments of the present application;
Fig. 6 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application;
Fig. 7 is the structural schematic diagram of another electronic equipment provided by the embodiments of the present application.
Specific embodiment
Further illustrate the technical solution of the application below with reference to the accompanying drawings and specific embodiments.It is understood that
It is that specific embodiment described herein is used only for explaining the application, rather than the restriction to the application.It further needs exist for illustrating
, part relevant to the application is illustrated only for ease of description, in attached drawing rather than entire infrastructure.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail
The processing or method described as flow chart.Although each step is described as the processing of sequence by flow chart, many of these
Step can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of each step can be rearranged.When its operation
The processing can be terminated when completion, it is also possible to have the additional step being not included in attached drawing.The processing can be with
Corresponding to method, function, regulation, subroutine, subprogram etc..
Fig. 1 is a kind of flow diagram of information ciphering method provided by the embodiments of the present application, and this method can be by information
Encryption device executes, and wherein the device can be implemented by software and/or hardware, and can generally integrate in the electronic device.Such as Fig. 1 institute
Show, this method comprises:
Step 101 receives information, and identifies the content of the information;
Step 102, the degree of secrecy that the information is determined according to the content of the information;
Step 103 encrypts the information for meeting default degree of secrecy.
Illustratively, the electronic equipment in the embodiment of the present application may include the smart machines such as mobile phone, wrist-watch and tablet computer.
In a step 101, the received information of electronic equipment is the received information of application program in electronic equipment, exemplary
, it can be the information that user contact is sent by communication application program, such as journey is applied by wechat, QQ or short message etc.
The information that sequence is sent can also be the notice category information that the management backstage of application program is sent, such as game application, take journey
Or notification information, pushed information of the transmissions such as Alipay etc..Wherein, the content of the received information of electronic equipment can be including
One or more in text, image and character string, electronic equipment passes through text, image and the character for including in identification information
String, it may be determined that the information content.
In a step 102, in the received information of electronic equipment, even same application or same addresser send
Information in, may include the confidential information or routine information of user, in the present embodiment, pass through preset secret rule
The information content of identification is judged to determine whether the received information of electronic equipment is confidential information, and determines received letter
The degree of secrecy of breath.Illustratively, the received confidential information of electronic equipment can be the individual privacy information of user, personal account
Information, job information etc..
In some embodiments, the degree of secrecy of the information is determined according to the content of the information, comprising: according to preparatory
The secret rule of setting identifies secret keyword, secret image and secret character string in the content of the information and described
The degree of secrecy of secret keyword, secret image and secret character string;According to the secret keyword, secret image and secret word
The degree of secrecy of symbol string determines the degree of secrecy of the information.
In the present embodiment, for judging that the secret rule of confidential information and degree of secrecy can be by system setting,
It can also be and be independently arranged by user, it is determining to can also be that user is updated based on system setting.Wherein, identification information
In include image, keyword and character string, if image, keyword and character string in the information content at least one of it is full
When the judgment criteria of the preset secret rule of foot, it is determined that be in confidential information, such as identification information in the information including default
Degree of secrecy image or identification information in include default degree of secrecy keyword or identification information in include preset
Identification information can then be determined as setting the confidential information of degree of secrecy by the character string of degree of secrecy.
Optionally, the text of identification information content is segmented, and removal repetitor, monosyllabic word and stop words are obtained wait sentence
Disconnected keyword, it is settable for judging the keywords database of confidential information in the electronic device, keyword to be judged is being closed
Keyword is matched in library, and for judging confidential information secret rule, for keyword to be judged, there are any in keywords database
Keywords matching success.Correspondingly, further include the degree of secrecy of each keyword in keywords database, any Keywords matching at
When function, the degree of secrecy of the keyword of successful match can be further determined that, and then by the machine of keyword corresponding informance to be judged
Close grade is set as the degree of secrecy of the keyword of successful match.Wherein, for judging that the keywords database of secret keyword can be with
It is that system is arranged, can also be that user is added the keyword in keywords database, deletes and modifies, such as keywords database
In include keyword can be but not limited to ID card No., phone number, account, password, the pet name or work it is relevant
Keyword etc., wherein the pet name can be added according to user demand.Correspondingly, the degree of secrecy of keyword can have user's progress
It is set or adjusted.The degree of secrecy of the degree of secrecy highest, the pet name that illustratively, can be the relevant keyword of work takes second place,
The degree of secrecy of personal account etc. is inferior again.Wherein the grade quantity of degree of secrecy is also possible to by user setting, such as 3 etc.
Grade or 5 grades etc..It should be noted that the keyword in identification information content, the text being not limited only in the information content,
It further include the text in the image in the information content.
Optionally, when the information content is the received information of instant message applications, confidential information is carried out to character string and is sentenced
Disconnected can be obtains the character string in the context of dialog interface, carries out semantic analysis to context, whether determines the character string
For confidential information, wherein the context of the character string can be not limited to the information content, can also include except the information content
Text.Illustratively, in the dialog interface of instant messaging, there is " this is my ID card No. " after character string
Text, or pass through semantic analysis, it is known that the character in the presence of the text of " giving me your ID card No. " before character string
String is ID card No., belongs to confidential information.Wherein, preferential to identify when including simultaneously text and character string in the information content
And judge the keyword in text, when arriving confidential information by the way that keyword is unidentified, confidential information is being carried out to character string
Judgement.When in the information content and context only comprising character string or it is unidentified to the keyword for belonging to confidential information when, to word
Whether symbol string is that the secret rule that confidential information is judged can be, and character string setting rule, being provided with rule can be
The digit and character types of character string.The setting rule of character string and the setting of character string in pre-set confidential information are advised
It is then matched, for judging that the default confidential information judgment criteria of character string can be the setting of the character string in the information content
The regular setting rule match success with pre-set secret character string.For example, if character string be only comprising number or only
18 character strings comprising number and letter X then can determine that the character string is ID card No.;If character string is only comprising number
And the character string that initial three bit digital of character string is 622, then it can determine that the character string is bank's card number.It should be noted that knowing
Character string in the other information content, the character string being not limited only in the information content further include the word in the image in the information content
Symbol string.
Optionally, when the notification information that the information content is application program, and can pass through in the information content there are when character string
The packet name of application program for sending notification information judges whether the information is confidential information, for example, if the transmission notification information
The entitled Alipay of the packet of application program or industrial and commercial bank can determine that the character string in the information is the financing account with user
Relevant character string, it may be determined that the information is confidential information.
The judgement that confidential information is carried out to image, can be whether the image in identification information content includes preset secret
Image, when the image in identification information content includes preset facial image, determines that the information is machine by taking facial image as an example
Confidential information.
In the present embodiment, institute is determined according to the degree of secrecy of the secret keyword, secret image and secret character string
State the degree of secrecy of information, specially by the degree of secrecy of keyword secret in information, secret image and secret character string most
High degree of secrecy is determined as the degree of secrecy of the information.Illustratively, degree of secrecy includes the first estate, the second grade and
Three grades, and grade successively reduces, when by identification information content, determine keyword in the information content including the first estate and
The image of second grade, it may be determined that the degree of secrecy of the information is the first estate.
In step 103, only the information for meeting default degree of secrecy is encrypted, to being unsatisfactory for default degree of secrecy
Information directly displays the screen in electronic equipment without encryption.Illustratively, degree of secrecy includes the first estate, second etc.
Grade and the tertiary gradient, and grade successively reduces, default degree of secrecy can be the first estate and the second grade.Wherein, secret etc.
The quantity and default degree of secrecy of grade can be arranged according to user demand.
Illustratively, information encrypt can be and be added by password encryption, encrypting fingerprint, face encryption and vocal print
It is one of close or a variety of, various forms of cipher modes can be used simultaneously for the information of different degree of secrecy, to improve letter
The safety of breath, such as the double-encryption mode of encrypting fingerprint and dynamic password is used for the information of higher level, for
The information of lower grade is using voiceprint or the single cipher mode of encrypting fingerprint.Optionally, it is adopted according to date or time
Sound is used in 20:00- next day 8:00 for example, using encrypting fingerprint mode in 8:00-20:00 with the cipher mode of switching at runtime
Line cipher mode;With the sequence that password encryption, encrypting fingerprint, face encryption and vocal print encrypt, with 24 hours for time interval
The switching of cipher mode is carried out, such as used password encryption mode at first day, uses encrypting fingerprint mode ... the 5th within second day
It uses password encryption mode, and with above-mentioned encryption order and so on.By dynamic transformation of encrypted mode, letter is further increased
The safety of breath.Wherein, in above-mentioned cryptographic operation, the sequence of cipher mode or each cipher mode corresponding period can by with
Family setting.
The information ciphering method provided in the embodiment of the present application receives information, and identifies the content of the information, according to institute
The content for stating information determines the degree of secrecy of the information, encrypts to the information for meeting default degree of secrecy.By using
Above scheme, whether the received information of electronic equipment automatic identification is confidential information and degree of secrecy, targetedly to machine
Confidential information is encrypted, and avoids the problem that sense of security of users difference causes confidential information to be revealed, while all information being avoided to encrypt
Decryption oprerations cumbersome situation when caused information browse has taken into account information security and operation ease, improves electronic equipment
Intelligence and hommization.
Fig. 2 is the flow diagram of another information ciphering method provided by the embodiments of the present application, referring to fig. 2, this implementation
The method of example includes the following steps:
Step 201 receives information, and identifies the content of the information.
The content of the information is input to information secret identification model trained in advance by step 202.
Step 203, the degree of secrecy that the information is determined according to the output result of the information secret identification model.
Step 204 encrypts the information for meeting default degree of secrecy.
In step 202, information secret identification model trained in advance can be neural network model or disaggregated model etc.
Machine learning model.Wherein, neural network model and disaggregated model are formed according to great amount of samples training, have confidential information
The function that identification and degree of secrecy determine.It illustratively, include sample information content and the secret of the sample etc. in sample
Grade can be the sample information in acquisition extensive application program, and carry out the mark of practical degree of secrecy to above-mentioned sample information,
To generate sample;Sample can also be based on default secret rule to writing after the practical degree of secrecy judgement of the carry out of confidential information
It generates.Neural network model and disaggregated model can be the training by way of supervised learning and obtain, specifically, sample is inputted
To in untrained information secret identification model, model output can be obtained based on the untrained information secret identification model
Predict degree of secrecy, when practical degree of secrecy difference in the prediction degree of secrecy and sample of model output, based on this model
The deviation of the practical degree of secrecy of prediction degree of secrecy and the sample mark of output is reversely adjusted in information secret identification model
Weight parameter, iteration execute above-mentioned training process, until the error of information secret identification model is less than default error.Training is completed
Information secret identification model have information degree of secrecy arbitration functions, by the received information input of electronic equipment to training
After the information secret identification model of completion, the accurate prediction degree of secrecy of the information can be obtained.
Optionally, before equipment is applied for the first time or receives information, further includes: obtain the secret keyword of user's input
Or secret image, and set the secret keyword or the corresponding degree of secrecy of secret image of input;According to user input
Secret keyword or secret image and corresponding degree of secrecy are trained the information secret identification model trained in advance.
In the present embodiment, the secret keyword of user's input and secret image are the confidential information that user itself thinks,
Information secret identification model is trained by the secret keyword and secret image that are inputted based on user, so that training obtains
The recognition result of information secret identification model be more in line with the demand of user, there is personalized and otherness.Optionally, it is setting
Before standby application for the first time or reception information, it can also be that each application program has been received in preset time period in traversal electronic equipment
Information, or extract in the received information of each application program the information of preset quantity, be shown in screen, obtain user
To the degree of secrecy for having received information setting, mould is identified to information secret trained in advance by the information after setting degree of secrecy
Type is trained.
In step 203, information secret identification model can be the degree of secrecy of output information;It can also be output information
Secret image in content, secret keyword and secret character string, and secret image, secret keyword and secret character string
Degree of secrecy, electronic equipment determine the machine of the information according to the degree of secrecy of secret image, secret keyword and secret character string
Close grade.
The information ciphering method provided in the embodiment of the present application receives information, and identifies the content of the information, will be described
The content of information is input to information secret identification model trained in advance, according to the output result of the information secret identification model
The degree of secrecy for determining the information encrypts the information for meeting default degree of secrecy.By using above-mentioned technical proposal,
Based on the degree of secrecy of the received information of deep learning model intelligent recognition electronic equipment trained in advance, Dynamic Recognition need into
The information of row encryption, it is poor according to specific aim caused by being encrypted to the corresponding information of same application to avoid, and it is invalid to exist
The problem of encryption, improves the specific aim of information encryption.
Fig. 3 is the flow diagram of another information ciphering method provided by the embodiments of the present application, and the present embodiment is above-mentioned
One optinal plan of embodiment, correspondingly, as shown in figure 3, the method for the present embodiment includes the following steps:
Step 301 receives information, and identifies the content of the information.
The scene that step 302, identification equipment are currently located.
Step 303 determines information type according to the content and/or addresser of the information.
Step 304, determine scene that the equipment is currently located whether be the information type security scenario.If then
Step 305 is executed, if it is not, thening follow the steps 306.
Step 305, the display information.
Step 306, the degree of secrecy that the information is determined according to the content of the information.
Step 307 encrypts the information for meeting default degree of secrecy.
In step 302, scene where electronic equipment can include but is not limited to operative scenario, common scene and family's ring
Border.The confidentiality of information can be for scene, for example, work related information does not have secret in operative scenario
Property, personal account information is can be in the home environment without confidentiality.The scene that identification electronic equipment is currently located, can be true
Determine the confidential information under current scene, avoids the invalid cryptographic operation under security scenario.
Optionally, the scene that the equipment is currently located is identified, comprising: work as according to the network type of equipment connection, equipment
At least one in the work and rest of preceding position and user determines the scene that the equipment is currently located.Wherein, network type can
To include movable signal network, cable network and wifi network, for example, when the network of electronic equipment connection is corporate wired network
Or when company's WiFi network, it may be determined that it is operative scenario that electronic equipment, which is currently located scene,;When electronic equipment connects home network
Network or when family WiFi, it may be determined that it is home scenarios that electronic equipment, which is currently located scene,.Wherein, the network of company's scene and family
Front yard network can be what user pre-entered.It can be according to the scene that equipment present position determines that equipment is currently located,
Preset the location information of operative scenario and the location information of home scenarios, when electronic equipment present position with it is above-mentioned
When the location information of operative scenario or home scenarios is identical, it may be determined that the scene of electronic equipment, correspondingly, when electronic equipment is current
Position be above-mentioned operative scenario or home scenarios location information except position when, it may be determined that electronic equipment is located at public field
The positions such as scape, such as park, supermarket belong to common scene.It can be according to the scene that the work and rest of user determines that equipment is currently located
Determine the work and rest of current time user, for example, on Monday to Friday 9:00-11:30 be the working time, 11:30-12:30 is lunch
Time, 12:30-20:00 are the working time, and 20:00- next day 8:00 is the time of having a rest, correspondingly, can determine electronic equipment in week
One to Friday 9:00-11:30 and 12:30-20:00 is in operative scenario, is in common scene in 11:30-12:30,20:
00- next day 8:00 is in home scenarios.
It should be noted that network type, equipment present position and the work and rest of user that equipment connects can be passed through
Scene where two or three determining electronic equipments.For example, on Monday to period Friday 9:00-11:30, electronic equipment
The pre-set company position of the user of position can accurately determine that scene locating for electronic equipment is operative scenario.
Wherein, the scene where electronic equipment can be added or be adjusted by user, correspondingly, it is used to determine scene
The network information and location information equally can be added or be adjusted by user.
In step 303, illustratively, information type can include but is not limited to news type, types of entertainment, financing class
Type, personal social type, work social type etc..Information type can be determined according to the addresser of information in the present embodiment, need
Illustrate, when the corresponding application program of the information is instant messaging application, transmits the contact person for artificially sending the information, when
The corresponding application program of the information is the other applications of non-instant communications applications, such as Alipay, takes journey or trill etc.
When program, addresser includes the app title for receiving information.Illustratively, when transmitting artificial today's tops, information type is news
Type;It transmits artificial trill, protruding canine teeth, disappear happy etc. in application, information type is types of entertainment;Transmit artificially realize doctrinairism wealth or
Alipay etc. is in application, information type is financing type;When transmitting the contact person in the instant messaging applications such as artificial wechat, short message
When, information type is social type, and further follow-up contact person determines personal social type or work social type, works as connection
When people is with user's Peer Relationships, it may be determined that information type is work social type, when contacting artificial kith and kin's relationship, it may be determined that letter
Ceasing type is personal social type.
Optionally, it can also be according to the information content, determine information type, specifically, can be in identification information content
Keyword, and information type is determined based on keyword.Illustratively, in the information content exist " king's honor ", " trill ",
When keywords such as " main broadcasters ", it may be determined that information type is types of entertainment, when there are keywords such as " meetings " in the information content, really
Determining information type is work social type;When in the information content exist the keywords such as " party ", " having a meal ", " playing ", " appointment "
When, it may be determined that information type is personal social type.
Optionally, information type is determined based on the content of information and addresser, such as have colleague's transmission includes keyword
The information of " meeting ", the information type of the information are work social type, the information comprising " having a dinner party " for transmission of working together, the information
Information type be personal social type.
In step 304, the security scenario of each information type is provided in electronic equipment, for example, work social category
The security scenario of type is operative scenario, and the security scenario of financing type and personal social type is home scenarios or personal scene,
The security scenario of news type and types of entertainment is operative scenario, home scenarios and common scene.
In the present embodiment, it to the received information of security scenario, without being encrypted, can directly display in electronic equipment
On screen, omits the process that information is encrypted and decrypted and reduce the meter of electronic equipment on the basis of ensuring information security
Calculation process improves the convenience of operation.
It should be noted that when electronic equipment leaves security scenario, to confidential information received under security scenario according to
Its degree of secrecy is encrypted, and the received confidential information under security scenario is avoided, the case where leakage under other scenes.Such as
It can be when network type, equipment present position and the work and rest of user of equipment connection change, detection electronics is set
Whether standby scene changes, if so, encrypting to confidential information received within the time of security scenario.
The information ciphering method provided in the embodiment of the present application is in safety when recognizing electronic equipment when receiving information
When scene, without judging the degree of secrecy and cryptographic operation of information, the information is directly displayed, it is aobvious to simplify the information under security scenario
Show process, omits information encryption and information decrypting process, improve the hommization of electronic equipment.
Fig. 4 is the flow diagram of another information ciphering method provided by the embodiments of the present application, and the present embodiment is above-mentioned
One optinal plan of embodiment, correspondingly, as shown in figure 4, the method for the present embodiment includes the following steps:
Step 401 receives information, and identifies the content of the information.
Step 402, the degree of secrecy that the information is determined according to the content of the information;
Step 403, the information that degree of secrecy is preset to satisfaction, carry out the information according to the degree of secrecy of the information
Single encryption or multi-enciphering.
Step 404, the verification information for obtaining user's input, and in verification information success, show the information.
In step 403, different cipher modes is carried out for the information of different degree of secrecy, for example, for secret etc.
The lower information of grade carries out single encryption, i.e., is encrypted using a kind of cipher mode to information, to the higher letter of degree of secrecy
Breath carries out multi-enciphering, i.e., is encrypted using two or more cipher modes, to provide the safety of confidential information.Wherein,
Cipher mode can be password encryption, encrypting fingerprint, face encryption and vocal print encryption.Correspondingly, being encrypted to information
It later, further include that information is arranged according to the degree of secrecy of information to identify, to prompt user to determine adding for the information according to mark
Close mode accurately inputs the correct verification information for decryption convenient for user.
In step 404, when user inputs the browsing instructions to information, the biological information of user is acquired, such as
When user inputs browsing instructions by way of touch-control click, the finger print information of user is acquired, when user is defeated by voice mode
When entering browsing instructions, the voiceprint of user is acquired, or after user inputs browsing instructions, user is acquired by camera
Facial image.Biological information based on above-mentioned acquisition is matched, and information is decrypted.Correspondingly, the information
Cipher mode is password encryption, then user is prompted to input verifying password.
When the biological information of user's input or verifying password are proved to be successful, information is decrypted, is shown
The information.Optionally, it during the display of confidential information, if occur other faces in the image pickup scope of electronic equipment, moves back
Current application program or current page is exited out, the risk for avoiding confidential information from revealing during display.
The information ciphering method provided in the embodiment of the present application carries out information by the degree of secrecy according to information different
The encryption of level improves the safety of confidential information.
Fig. 5 is a kind of structural block diagram of information encryption device provided by the embodiments of the present application, the device can by software and/or
Hardware realization is typically integrated in electronic equipment, can by execute electronic equipment information ciphering method come to desktop layouts into
Edlin.As shown in figure 5, the device includes: information receiving module 501, degree of secrecy determining module 502 and encrypting module 503.
Information receiving module 501 for receiving information, and identifies the content of the information;
Degree of secrecy determining module 502, for determining the degree of secrecy of the information according to the content of the information;
Encrypting module 503, for being encrypted to the information for meeting default degree of secrecy.
Whether the information encryption device provided in the embodiment of the present application, the received information of electronic equipment automatic identification are secret
Information and degree of secrecy, targetedly encrypt confidential information, and sense of security of users difference is avoided to lead to confidential information
The problem of leakage, at the same avoid all information encrypt caused by information browse when the cumbersome situation of decryption oprerations, taken into account information
Safety and operation ease improve the intelligence and hommization of electronic equipment.
On the basis of the above embodiments, degree of secrecy determining module includes:
Information input unit, for the content of the information to be input to information secret identification model trained in advance;
First degree of secrecy determination unit, for determining the letter according to the output result of the information secret identification model
The degree of secrecy of breath.
On the basis of the above embodiments, degree of secrecy determining module further include:
Confidential information determination unit, for before receiving information, obtaining the secret keyword or secret figure of user's input
Picture;
Degree of secrecy setup unit, for setting the secret keyword or the corresponding degree of secrecy of secret image of input;
Model optimization unit, secret keyword or secret image and corresponding secret etc. for being inputted according to the user
Grade is trained the information secret identification model trained in advance.
On the basis of some embodiments, degree of secrecy determining module includes:
Information identificating unit, for identification secret keyword in the content of the information, secret image and secret character
The degree of secrecy of string and the secret keyword, secret image and secret character string;
Second degree of secrecy determination unit, for the machine according to the secret keyword, secret image and secret character string
Close grade determines the degree of secrecy of the information.
On the basis of the above embodiments, further includes:
Scene Recognition module, for identifying before the degree of secrecy for determining the information according to the content of the information
The scene that equipment is currently located;
Information type determining module, for determining information type according to the content and/or addresser of the information;
Security scenario judgment module, for determine scene that the equipment is currently located whether be the information type peace
Whole scene;If so, showing the information;If it is not, then continuing to execute the machine for determining the information according to the content of the information
The step of close grade.
On the basis of the above embodiments, scene Recognition module is used for:
Institute is determined according at least one in the network type of equipment connection, equipment present position and the work and rest of user
State the scene that equipment is currently located.
On the basis of the above embodiments, encrypting module is used for:
To the information for meeting default degree of secrecy, single encryption is carried out to the information according to the degree of secrecy of the information
Or multi-enciphering
The embodiment of the present application also provides a kind of storage medium comprising computer executable instructions, and the computer is executable
Instruction is used for execution information encryption method when being executed by computer processor, this method comprises:
Information is received, and identifies the content of the information;
The degree of secrecy of the information is determined according to the content of the information;
The information for meeting default degree of secrecy is encrypted.
Storage medium --- any various types of memory devices or storage equipment.Term " storage medium " is intended to wrap
It includes: install medium, such as CD-ROM, floppy disk or magnetic tape equipment;Computer system memory or random access memory, such as
DRAM, DDRRAM, SRAM, EDORAM, blue Bath (Rambus) RAM etc.;Nonvolatile memory, such as flash memory, magnetic medium (example
Such as hard disk or optical storage);Register or the memory component of other similar types etc..Storage medium can further include other types
Memory or combinations thereof.In addition, storage medium can be located at program in the first computer system being wherein performed, or
It can be located in different second computer systems, second computer system is connected to the first meter by network (such as internet)
Calculation machine system.Second computer system can provide program instruction to the first computer for executing.Term " storage medium " can
To include two or more that may reside in different location (such as in the different computer systems by network connection)
Storage medium.Storage medium can store the program instruction that can be performed by one or more processors and (such as be implemented as counting
Calculation machine program).
Certainly, a kind of storage medium comprising computer executable instructions, computer provided by the embodiment of the present application
The information cryptographic operation that executable instruction is not limited to the described above, can also be performed information provided by the application any embodiment
Relevant operation in encryption method.
The embodiment of the present application provides a kind of electronic equipment, and letter provided by the embodiments of the present application can be integrated in the electronic equipment
Encryption for information device.Fig. 6 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application.Electronic equipment 600 can wrap
It includes: memory 601, processor 602 and the computer program that is stored on memory 601 and can be run in processor 602, it is described
Processor 602 realizes the information ciphering method as described in the embodiment of the present application when executing the computer program.
Whether electronic equipment provided by the embodiments of the present application, the received information of electronic equipment automatic identification are confidential information,
And degree of secrecy, targetedly confidential information is encrypted, avoids sense of security of users difference that confidential information is caused to be revealed
The problem of, at the same avoid all information encrypt caused by information browse when the cumbersome situation of decryption oprerations, taken into account information security
Property and operation ease, improve the intelligence and hommization of electronic equipment.
Fig. 7 is the structural schematic diagram of another server provided by the embodiments of the present application.The server may include: shell
(not shown), memory 701, central processing unit (central processing unit, CPU) 702 (also known as processor,
Hereinafter referred to as CPU), circuit board (not shown) and power circuit (not shown).The circuit board is placed in the shell
The space interior that body surrounds;The CPU702 and the memory 701 are arranged on the circuit board;The power circuit is used
In each circuit or the device power supply for the server;The memory 701, for storing executable program code;It is described
CPU702 is run and the executable program code pair by reading the executable program code stored in the memory 701
The computer program answered, to perform the steps of
Information is received, and identifies the content of the information;
The degree of secrecy of the information is determined according to the content of the information;
The information for meeting default degree of secrecy is encrypted.
The server further include: Peripheral Interface 703, RF (Radio Frequency, radio frequency) circuit 705, voicefrequency circuit
706, loudspeaker 711, power management chip 708, input/output (I/O) subsystem 709, other input/control devicess 710, touching
Touch screen 712, other input/control devicess 710 and outside port 704, these components pass through one or more communication bus or
Signal wire 707 communicates.
It should be understood that diagram server 700 is only an example of server, and server 700 can have
Have than shown in the drawings more or less component, two or more components can be combined, or can have not
Same component configuration.Various parts shown in the drawings can include one or more signal processings and/or dedicated integrated electricity
It is realized in the combination of hardware, software or hardware and software including road.
Just provided in this embodiment for the server for updating operation to be described in detail below, the server is with hand
For machine.
Memory 701, the memory 701 can be accessed by CPU702, Peripheral Interface 703 etc., and the memory 701 can
It can also include nonvolatile memory to include high-speed random access memory, such as one or more disk memory,
Flush memory device or other volatile solid-state parts.
The peripheral hardware that outputs and inputs of equipment can be connected to CPU702 and deposited by Peripheral Interface 703, the Peripheral Interface 703
Reservoir 701.
I/O subsystem 709, the I/O subsystem 709 can be by the input/output peripherals in equipment, such as touch screen 712
With other input/control devicess 710, it is connected to Peripheral Interface 703.I/O subsystem 709 may include 7091 He of display controller
For controlling one or more input controllers 7092 of other input/control devicess 710.Wherein, one or more input controls
Device 7092 processed receives electric signal from other input/control devicess 710 or sends electric signal to other input/control devicess 710,
Other input/control devicess 710 may include physical button (push button, rocker buttons etc.), dial, slide switch, behaviour
Vertical pole clicks idler wheel.It is worth noting that input controller 7092 can with it is following any one connect: keyboard, infrared port,
The indicating equipment of USB interface and such as mouse.
Touch screen 712, the touch screen 712 are the input interface and output interface between client server and user, will
Visual output is shown to user, and visual output may include figure, text, icon, video etc..
Display controller 7091 in I/O subsystem 709 receives electric signal from touch screen 712 or sends out to touch screen 712
Electric signals.Touch screen 712 detects the contact on touch screen, and the contact that display controller 7091 will test is converted to and is shown
The interaction of user interface object on touch screen 712, i.e. realization human-computer interaction, the user interface being shown on touch screen 712
Object can be the icon of running game, the icon for being networked to corresponding network etc..It is worth noting that equipment can also include light
Mouse, light mouse are the extensions for the touch sensitive surface for not showing the touch sensitive surface visually exported, or formed by touch screen.
RF circuit 705 is mainly used for establishing the communication of mobile phone Yu wireless network (i.e. network side), realizes mobile phone and wireless network
The data receiver of network and transmission.Such as transmitting-receiving short message, Email etc..Specifically, RF circuit 705 receives and sends RF letter
Number, RF signal is also referred to as electromagnetic signal, and RF circuit 705 converts electrical signals to electromagnetic signal or electromagnetic signal is converted to telecommunications
Number, and communicated by the electromagnetic signal with communication network and other equipment.RF circuit 705 may include for executing
The known circuit of these functions comprising but it is not limited to antenna system, RF transceiver, one or more amplifiers, tuner, one
A or multiple oscillators, digital signal processor, CODEC (COder-DECoder, coder) chipset, user identifier mould
Block (Subscriber Identity Module, SIM) etc..
Voicefrequency circuit 706 is mainly used for receiving audio data from Peripheral Interface 703, which is converted to telecommunications
Number, and the electric signal is sent to loudspeaker 711.
Loudspeaker 711 is reduced to sound for mobile phone to be passed through RF circuit 705 from the received voice signal of wireless network
And the sound is played to user.
Power management chip 708, the hardware for being connected by CPU702, I/O subsystem and Peripheral Interface are powered
And power management.
The application, which can be performed, in information encryption device, storage medium and the electronic equipment provided in above-described embodiment arbitrarily implements
Information ciphering method provided by example has and executes the corresponding functional module of this method and beneficial effect.Not in above-described embodiment
In detailed description technical detail, reference can be made to information ciphering method provided by the application any embodiment.
Note that above are only the preferred embodiment and institute's application technology principle of the application.It will be appreciated by those skilled in the art that
The application is not limited to specific embodiment described here, be able to carry out for a person skilled in the art it is various it is apparent variation,
The protection scope readjusted and substituted without departing from the application.Therefore, although being carried out by above embodiments to the application
It is described in further detail, but the application is not limited only to above embodiments, in the case where not departing from the application design, also
It may include more other equivalent embodiments, and scope of the present application is determined by the scope of the appended claims.
Claims (10)
1. a kind of information ciphering method encrypts information for controlling equipment characterized by comprising
Information is received, and identifies the content of the information;
The degree of secrecy of the information is determined according to the content of the information;
The information for meeting default degree of secrecy is encrypted.
2. the method according to claim 1, wherein determining the secret of the information according to the content of the information
Grade, comprising:
The content of the information is input to information secret identification model trained in advance;
The degree of secrecy of the information is determined according to the output result of the information secret identification model.
3. according to the method described in claim 2, it is characterized in that, before receiving information, further includes:
Obtain the secret keyword or secret image of user's input;
Set the secret keyword or the corresponding degree of secrecy of secret image of input;
According to the secret keyword of user input or secret image and corresponding degree of secrecy to the information trained in advance
Secret identification model is trained.
4. the method according to claim 1, wherein determining the secret of the information according to the content of the information
Grade, comprising:
Identify secret keyword in the content of the information, secret image and secret character string and the secret keyword,
The degree of secrecy of secret image and secret character string;
The degree of secrecy of the information is determined according to the degree of secrecy of the secret keyword, secret image and secret character string.
5. the method according to claim 1, wherein in the machine for determining the information according to the content of the information
Before close grade, further includes:
The scene that identification equipment is currently located;
Information type is determined according to the content of the information and/or addresser;
Determine scene that the equipment is currently located whether be the information type security scenario;
If so, showing the information;
If it is not, then continuing to execute the step of determining the degree of secrecy of the information according to the content of the information.
6. according to the method described in claim 5, it is characterized in that, identifying the scene that the equipment is currently located, comprising:
It is set described at least one determination in network type, equipment present position and the work and rest of user connected according to equipment
The standby scene being currently located.
7. being wrapped the method according to claim 1, wherein being encrypted to the information for meeting default degree of secrecy
It includes:
To the information for meeting default degree of secrecy, single encryption or more is carried out to the information according to the degree of secrecy of the information
Re-encryption.
8. a kind of information encryption device characterized by comprising
Information receiving module for receiving information, and identifies the content of the information;
Degree of secrecy determining module, for determining the degree of secrecy of the information according to the content of the information;
Encrypting module, for being encrypted to the information for meeting default degree of secrecy.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor
The pager decryption method as described in any in claim 1-7 is realized when row.
10. a kind of electronic equipment, which is characterized in that including memory, processor and storage are on a memory and can be in processor
The computer program of operation, the processor realize letter as claimed in claim 1 when executing the computer program
Encryption for information method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810962898.9A CN109219003B (en) | 2018-08-22 | 2018-08-22 | Information encryption method and device, storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810962898.9A CN109219003B (en) | 2018-08-22 | 2018-08-22 | Information encryption method and device, storage medium and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109219003A true CN109219003A (en) | 2019-01-15 |
CN109219003B CN109219003B (en) | 2022-02-22 |
Family
ID=64988973
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810962898.9A Active CN109219003B (en) | 2018-08-22 | 2018-08-22 | Information encryption method and device, storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109219003B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110191106A (en) * | 2019-05-15 | 2019-08-30 | 维沃移动通信有限公司 | A kind of data transmission method for uplink, terminal and communication system |
WO2020119692A1 (en) * | 2018-12-10 | 2020-06-18 | 杭州海康威视数字技术股份有限公司 | Video stream playing method and device |
CN117037270A (en) * | 2023-08-03 | 2023-11-10 | 北京军安中科信息科技研究所 | Screen anti-shooting system and method based on image processing |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102334306A (en) * | 2011-07-18 | 2012-01-25 | 华为终端有限公司 | Information instant enciphering and deciphering method and device |
EP2584490A1 (en) * | 2011-10-21 | 2013-04-24 | Research In Motion Limited | Displaying private information using alternate frame sequencing |
CN103841262A (en) * | 2014-02-17 | 2014-06-04 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for displaying privacy information |
CN105260682A (en) * | 2015-10-14 | 2016-01-20 | 广东小天才科技有限公司 | Method and apparatus for protecting user privacy |
CN105354509A (en) * | 2015-10-28 | 2016-02-24 | 广东欧珀移动通信有限公司 | Picture processing method and processing system |
CN105554745A (en) * | 2016-01-27 | 2016-05-04 | 广东欧珀移动通信有限公司 | Information management method and system |
CN105574437A (en) * | 2015-12-31 | 2016-05-11 | 北京金山安全软件有限公司 | Method and device for protecting privacy information and electronic equipment |
US20160307002A1 (en) * | 2014-06-10 | 2016-10-20 | Tencent Technology (Shenzhen) Company Limited | Method and apparatus for displaying information content |
CN106599716A (en) * | 2016-11-30 | 2017-04-26 | 广东欧珀移动通信有限公司 | Message content protection method and device, and mobile terminal |
CN106682527A (en) * | 2016-12-25 | 2017-05-17 | 北京明朝万达科技股份有限公司 | Data security control method and system based on data classification and grading |
CN107172205A (en) * | 2017-06-29 | 2017-09-15 | 腾讯科技(深圳)有限公司 | Pushed information processing method, mobile terminal and computer-readable storage medium |
CN107368542A (en) * | 2017-06-27 | 2017-11-21 | 山东华软金盾软件股份有限公司 | A kind of concerning security matters Classified Protection of confidential data |
US20180062846A1 (en) * | 2015-03-31 | 2018-03-01 | Huawei Technologies Co., Ltd. | Mobile Terminal Privacy Protection Method and Protection Apparatus, and Mobile Terminal |
CN108111667A (en) * | 2016-11-25 | 2018-06-01 | 北京搜狗科技发展有限公司 | A kind of communication information encryption method, device and electronic equipment |
CN108111757A (en) * | 2017-12-21 | 2018-06-01 | 广东欧珀移动通信有限公司 | Photographic method, device, storage medium and terminal |
-
2018
- 2018-08-22 CN CN201810962898.9A patent/CN109219003B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102334306A (en) * | 2011-07-18 | 2012-01-25 | 华为终端有限公司 | Information instant enciphering and deciphering method and device |
EP2584490A1 (en) * | 2011-10-21 | 2013-04-24 | Research In Motion Limited | Displaying private information using alternate frame sequencing |
CN103841262A (en) * | 2014-02-17 | 2014-06-04 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for displaying privacy information |
US20160307002A1 (en) * | 2014-06-10 | 2016-10-20 | Tencent Technology (Shenzhen) Company Limited | Method and apparatus for displaying information content |
US20180062846A1 (en) * | 2015-03-31 | 2018-03-01 | Huawei Technologies Co., Ltd. | Mobile Terminal Privacy Protection Method and Protection Apparatus, and Mobile Terminal |
CN105260682A (en) * | 2015-10-14 | 2016-01-20 | 广东小天才科技有限公司 | Method and apparatus for protecting user privacy |
CN105354509A (en) * | 2015-10-28 | 2016-02-24 | 广东欧珀移动通信有限公司 | Picture processing method and processing system |
CN105574437A (en) * | 2015-12-31 | 2016-05-11 | 北京金山安全软件有限公司 | Method and device for protecting privacy information and electronic equipment |
CN105554745A (en) * | 2016-01-27 | 2016-05-04 | 广东欧珀移动通信有限公司 | Information management method and system |
CN108111667A (en) * | 2016-11-25 | 2018-06-01 | 北京搜狗科技发展有限公司 | A kind of communication information encryption method, device and electronic equipment |
CN106599716A (en) * | 2016-11-30 | 2017-04-26 | 广东欧珀移动通信有限公司 | Message content protection method and device, and mobile terminal |
CN106682527A (en) * | 2016-12-25 | 2017-05-17 | 北京明朝万达科技股份有限公司 | Data security control method and system based on data classification and grading |
CN107368542A (en) * | 2017-06-27 | 2017-11-21 | 山东华软金盾软件股份有限公司 | A kind of concerning security matters Classified Protection of confidential data |
CN107172205A (en) * | 2017-06-29 | 2017-09-15 | 腾讯科技(深圳)有限公司 | Pushed information processing method, mobile terminal and computer-readable storage medium |
CN108111757A (en) * | 2017-12-21 | 2018-06-01 | 广东欧珀移动通信有限公司 | Photographic method, device, storage medium and terminal |
Non-Patent Citations (2)
Title |
---|
何晓琳等: "健康医疗可穿戴设备数据隐私相关问题研究", 《中国医院管理》 * |
李凤华等: "社交照片隐私保护机制研究进展", 《信息安全学报》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020119692A1 (en) * | 2018-12-10 | 2020-06-18 | 杭州海康威视数字技术股份有限公司 | Video stream playing method and device |
CN110191106A (en) * | 2019-05-15 | 2019-08-30 | 维沃移动通信有限公司 | A kind of data transmission method for uplink, terminal and communication system |
CN117037270A (en) * | 2023-08-03 | 2023-11-10 | 北京军安中科信息科技研究所 | Screen anti-shooting system and method based on image processing |
Also Published As
Publication number | Publication date |
---|---|
CN109219003B (en) | 2022-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9892245B2 (en) | Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device | |
CN103916233B (en) | A kind of information ciphering method and device | |
KR102216877B1 (en) | Authentication method and apparatus based on biometric information in a electronic device | |
CN101809581B (en) | Embedded authentication systems in an electronic device | |
CN108780475A (en) | Personalized inference certification for virtually assisting | |
WO2015055095A1 (en) | Identity authentication method and device and storage medium | |
CN109085975A (en) | Screenshotss method, apparatus, storage medium and electronic device | |
CN108475304B (en) | Method and device for associating application program and biological characteristics and mobile terminal | |
CN108886469A (en) | For providing the methods, devices and systems of holding account information | |
EP2927834A1 (en) | Information processing apparatus, information processing method, and recording medium | |
CN109219003A (en) | Information ciphering method, device, storage medium and electronic equipment | |
CN109254661B (en) | Image display method, image display device, storage medium and electronic equipment | |
CN106778295B (en) | File storage method, file display method, file storage device, file display device and terminal | |
CN109472122A (en) | A kind of multimedia messages reminding method and system | |
CN108009140A (en) | A kind of end message edit methods and system | |
CN108763885A (en) | unlocking method, device, storage medium and electronic equipment | |
CN107341378A (en) | For the method for the access right for setting application | |
CN107506721A (en) | A kind of more method for collecting iris and system | |
CN108600084A (en) | Information transferring method, device, storage medium and mobile terminal | |
CN108537086A (en) | Method for information display, device, storage medium and mobile terminal | |
CN109618342A (en) | It is a kind of for determining the method and apparatus of the operation permission information of user | |
CN108881417A (en) | A kind of user interaction approach and system based on local area network | |
CN108449511A (en) | A kind of presentation of information update method and system | |
WO2017215436A1 (en) | Information encryption and decryption method, device and terminal | |
CN108509017A (en) | A kind of control method and system of terminal applies |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |