CN202872901U - Terminal realizing privacy protection in communication process - Google Patents

Terminal realizing privacy protection in communication process Download PDF

Info

Publication number
CN202872901U
CN202872901U CN201220474914.8U CN201220474914U CN202872901U CN 202872901 U CN202872901 U CN 202872901U CN 201220474914 U CN201220474914 U CN 201220474914U CN 202872901 U CN202872901 U CN 202872901U
Authority
CN
China
Prior art keywords
module
password
input
mapping table
tabulation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN201220474914.8U
Other languages
Chinese (zh)
Inventor
罗乔一
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201220474914.8U priority Critical patent/CN202872901U/en
Application granted granted Critical
Publication of CN202872901U publication Critical patent/CN202872901U/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The utility model discloses a terminal realizing privacy protection in communication process. The terminal realizing privacy protection in a communication process includes a selecting/receiving module, an input module, a verifying module and a communication connection establishing module. A contact person is selected from a secret contact list through the selecting/receiving module as an object for establishing communication connection or a request for establishing communication connection sent by a contact person in the secret contact list is received. Then a password is input through the input module and is verified through the verifying module. After the password is verified to be correct, communication connection is established through the communication connection establishing module. Therefore, according to the utility model, an encryption mode (password input and verification) is set before communication connection (mainly indicating short messages and calls) is established. All persons can be effectively prevented from checking the short messages or making and answering the calls freely when they need to send or receive the short messages and to make or answer the calls, so that the safety performance of the terminal realizing privacy protection in the communication process is improved and user privacy disclosure is prevented.

Description

In communication process, realize the terminal of secret protection
Technical field
The utility model relates to the mobile communication terminal safety technical field, relates more specifically to a kind of terminal that realizes secret protection in communication process.
Background technology
Along with increasing of function and increasing substantially of described mobile phone popularity rate that mobile phone possesses, its fail safe more and more receives people's concern.At present, mostly adopt the related data to being stored in the described mobile phone to be encrypted protection to play the effect that prevents that privacy from revealing.
But, for general voice call or transmitting-receiving note, but comparatively imperfect guard method.As, when receiving note or incoming call, anyone can arbitrarily check or answer, thereby causes individual privacy to be revealed.In addition, along with the development of mobile communication technology, some bankings and third party's payment transaction (paying logical, Alipay such as wealth) all with as described in the number of mobile phone be associated.When using bank card to realize banking or using Alipay to realize payment, banking system or Alipay system all can send information such as identifying code and so on to mobile phone, only have after inputting this identifying code and just can finish corresponding service.At this moment, if described mobile phone fail safe is not high, just anyone can arbitrarily view this identifying code, thereby may bring loss to the user, cause simultaneously privacy to reveal.
Therefore, be necessary to provide a kind of terminal of secret protection that can in communication process, realize to overcome defects.
The utility model content
The purpose of this utility model provides a kind of terminal that realizes secret protection in communication process, to increase the fail safe of this terminal, prevents the privacy of user leakage.
For achieving the above object, the utility model provides a kind of terminal that realizes secret protection in communication process, comprises shell and is installed on the interior movement of described shell.Wherein, described movement comprises:
Selection/receiver module, the object of the request that a contact person who be used for to select the private contact tabulation establishes a communications link as transmission, or receive the request that establishes a communications link that sends from the contact person in the described private contact tabulation;
Input module is connected, is used for the input password with described selection/receiver module;
Authentication module is connected with described input module, is used for verifying whether the password that described input module inputs is correct;
Module is set up in communication connection, is connected with described authentication module, for establishing a communications link when being when the result of described authentication module; And
Reminding module, with described authentication module be connected input module and be connected, be used for when the result of described authentication module when being no, display password input error and point out described input module to re-enter password.
Compared with prior art, the utility model realizes that in communication process the terminal of secret protection comprises interconnective selection/receiver module, input module, module is set up in authentication module and communication connection, in the private contact tabulation, select a contact person as the object that establishes a communications link by described selection/receiver module first, or receive the request that establishes a communications link that sends from the contact person in the described private contact tabulation, verify by described input module input password and by described authentication module again, after being proved to be successful, setting up module by described communication connection and establish a communications link; Namely, this terminal is at establish a communications link (mainly finger is received and dispatched note and beaten and answer the call) the front encryption mode (the input password is also verified) that arranges, when needs transmitting-receivings note or beat when answering the call, prevented that effectively anyone from arbitrarily checking note or beat and answer the call, thereby increased the fail safe of terminal, prevented the privacy of user leakage.
Particularly, described movement also comprises:
Password arranges module, is used for the corresponding number of a plurality of described contact persons and is set to encryption mode and password is set;
Mapping table is set up module, with described password module being set is connected, is used for the set encryption mode of module being set and password is set up a mapping table according to described password, described mapping table shows the relation between the corresponding number of a plurality of described contact persons and the set password, and described mapping table adopts one to one or many-to-one mode;
Module is set up in the private contact tabulation, is connected, is used for creating described private contact tabulation with described selection/receiver module and add a plurality of described contact persons to described private contact tabulation; And
Memory module is set up module and is connected private contact tabulation and sets up module and is connected, is used for storing described mapping table and set up mapping table that module sets up and the tabulation of described private contact and set up the described private contact that module sets up and tabulate with described mapping table.
Particularly, described authentication module comprises:
Receiving element is connected, is used for receiving the password that described input module is inputted with described input module;
Corresponding relation is set up the unit, is connected with described receiving element, is used for setting up described password and stating corresponding relation between the corresponding number of contact person according to the password that described receiving element receives; And
Judging unit, set up the unit and be connected memory module and connect, be used for judging that described corresponding relation sets up the corresponding relation of setting up the unit and whether be in the mapping table that described memory module is stored with described corresponding relation, if judge that then password is correct, otherwise, then judge the password mistake.
Particularly, described communication process comprises conversation and note.
By following description also by reference to the accompanying drawings, it is more clear that the utility model will become, and these accompanying drawings are used for explaining embodiment of the present utility model.
Description of drawings
Fig. 1 is the utility model is realized terminal one embodiment of secret protection in communication process structure chart.
Fig. 2 is the structured flowchart of movement shown in Figure 1.
Fig. 3 is the workflow diagram of the terminal that realizes secret protection in communication process shown in Figure 1 during as transmit leg.
Fig. 4 is the shown interface of step S502 among Fig. 3.
Fig. 5 is the shown interface of step S503 among Fig. 3.
Workflow diagram when Fig. 6 is the terminal conduct side of picking that realizes secret protection in communication process shown in Figure 1.
Embodiment
With reference now to accompanying drawing, describe embodiment of the present utility model, similar element numbers represents similar element in the accompanying drawing.As mentioned above; the utility model provides a kind of terminal that realizes secret protection in communication process; this terminal is at establish a communications link (mainly finger is received and dispatched note and beaten and answer the call) the front encryption mode (the input password is also verified) that arranges; when needs transmitting-receivings note or beat when answering the call; prevented that effectively anyone from arbitrarily checking note or beat and answer the call; thereby increased the fail safe of terminal, prevented the privacy of user leakage.
Please refer to Fig. 1, the terminal that realizes secret protection in communication process of the present utility model comprises shell 100 and is installed on movement 200 in the described shell 100.
Particularly, as shown in Figure 2, described movement 200 comprises:
Password arranges module 201, is used for the corresponding number of a plurality of contact persons and is set to encryption mode and password is set;
Mapping table is set up module 202, be used for according to described password module 201 set encryption mode and passwords being set and set up a mapping table, described mapping table shows the relation between the corresponding number of a plurality of described contact persons and the set password, and described mapping table adopts one to one or many-to-one mode;
Module 203 is set up in the private contact tabulation, is used for creating the private contact tabulation and adds a plurality of contact persons to described private contact tabulation;
Memory module 204 is used for storing described mapping table and sets up mapping table and the tabulation of described private contact that module 202 sets up and set up the described private contact tabulation that module 203 is set up;
Selection/receiver module 205, the object of the request that a contact person who is used for selecting the private contact tabulation that described private contact list block 203 sets up establishes a communications link as transmission, or receive the request that establishes a communications link that sends from the contact person in the described private contact tabulation;
Input module 206 is connected for the input password and with described selection/receiver module 205;
Authentication module 207 is for verifying whether the password that described input module 206 is inputted is correct;
Module 208 is set up in communication connection, be used for establishing a communications link when being when the result of described authentication module 207, described communication connection is checked note for entering, sends note, is dialled, receives calls or the interface of hanging up the telephone, and receives and dispatches note, plays the operation such as answer the call;
Reminding module 209 is used for when the result of described authentication module 207 when being no, display password input error and points out described input module 206 to re-enter password.
Particularly, described authentication module 207 specifically comprises:
Receiving element 2071 is used for receiving the password that described input module 206 is inputted;
Corresponding relation is set up unit 2072, is used for setting up described password and stating corresponding relation between the corresponding number of contact person according to the password that described receiving element 2071 receives;
Judging unit 2073 is used for judging that described corresponding relation sets up the corresponding relation of setting up unit 2072 and whether be in the mapping table that described memory module 204 is stored, if, judge that then password is correct, otherwise, then judge the password mistake.
Particularly, described communication process comprises conversation and note.
Please refer to Fig. 3, when the described terminal that realizes secret protection in communication process during as the recipient, its specific works flow process is as follows again:
S301 adds a plurality of contact persons and tabulates to private contact;
S302 receives note or the phone of a contact person in the tabulation of described private contact, if what receive is phone, then this moment shown interface as shown in Figure 4;
S303 enters interface for password input, and at this moment shown interface as shown in Figure 5;
S304 judges whether the password of inputting is correct, if correct, then carries out S305, otherwise, then carry out S306;
S305 establishes a communications link, and enters note and checks interface or telephone relation interface;
S306, note is checked unsuccessful, note is saved to message list, the phone auto-hang up.
If it should be noted that and input password by mistake continuous three times, then note is saved to message list automatically, the phone auto-hang up.Certainly, after inputing password by mistake, can in interface as shown in Figure 5, select return key to withdraw from Password Input.
Please refer to Fig. 6, when the described terminal that realizes secret protection in communication process during as transmit leg, its specific works flow process is as follows again:
S601 adds a plurality of contact persons and tabulates to private contact;
S602 selects in the tabulation of described private contact a contact person to carry out that note sends or conversation, this moment shown interface as shown in Figure 4;
S603 enters interface for password input, and at this moment shown interface as shown in Figure 7;
S604 judges whether the password of inputting is correct, if correct, then carries out S605, otherwise, then carry out S606;
S605 establishes a communications link, and enters note and sends interface or dialing interface;
S606, note sends unsuccessful, and note is saved to message list, and phone is back to dialing interface.
If it should be noted that and input password by mistake continuous three times, then note is saved to message list automatically, the phone auto-hang up.Certainly, after inputing password by mistake, can in interface as shown in Figure 5, select return key to withdraw from Password Input.
Operation principle of the present utility model is as follows:
Described password arranges the corresponding number of module 201 a plurality of contact persons and is set to encryption mode and password is set, in the private contact tabulation, select a contact person as the object that establishes a communications link by described selection/receiver module 205, or receive the request that establishes a communications link that sends from the contact person in the described private contact tabulation, verify by described input module 206 input passwords and by described authentication module 207 again, after being proved to be successful, setting up module 208 by described communication connection and establish a communications link; Namely, this terminal is at establish a communications link (mainly finger is received and dispatched note and beaten and answer the call) the front encryption mode (the input password is also verified) that arranges, when needs transmitting-receivings note or beat when answering the call, prevented that effectively anyone from arbitrarily checking note or beat and answer the call, thereby increased the fail safe of terminal, prevented the privacy of user leakage.
More than be preferred implementation of the present utility model, but the utility model is not limited to the embodiment of above announcement, and should contains various modification, equivalent combinations of carrying out according to essence of the present utility model.

Claims (3)

1. terminal that in communication process, realizes secret protection; comprise shell and be installed on the interior movement of described shell; it is characterized in that: described movement comprises the object of the request that establishes a communications link as transmission for a contact person who selects the private contact tabulation; or receive the selection/receiver module of the request that establishes a communications link that sends from the contact person in the described private contact tabulation; be connected with described selection/receiver module; the input module that is used for the input password; be connected with described input module; be used for verifying whether correct authentication module of password that described input module inputs; be connected with described authentication module; module is set up in the communication connection that is used for the result when described authentication module and is establishing a communications link when being, and with described authentication module be connected input module and be connected; be used for when the result of described authentication module when being no; the display password input error also points out described input module to re-enter the reminding module of password.
2. the terminal that in communication process, realizes secret protection as claimed in claim 1; it is characterized in that: comprise that also the password that is set to encryption mode and password is set for the corresponding number of a plurality of described contact persons arranges module; with described password module being set is connected; being used for according to described password the set encryption mode of module and password being set sets up the mapping table of a mapping table and sets up module; described mapping table shows the relation between the corresponding number of a plurality of described contact persons and the set password; and described mapping table adopts one to one or many-to-one mode; be connected with described selection/receiver module; be used for creating described private contact tabulation and add a plurality of described contact persons and set up module to the private contact tabulation of described private contact tabulation, and set up module and be connected the private contact tabulation and set up module and be connected with described mapping table; be used for storing described mapping table and set up the memory module that the described private contact tabulation that module sets up is set up in mapping table that module sets up and the tabulation of described private contact.
3. the terminal that in communication process, realizes secret protection as claimed in claim 2; it is characterized in that: described authentication module comprises with described input module and being connected; be used for receiving the receiving element of the password that described input module inputs; be connected with described receiving element; be used for setting up the unit according to the corresponding relation that the password that described receiving element receives is set up described password and stated the corresponding relation between the corresponding number of contact person; and set up the unit with described corresponding relation and be connected memory module and connect; be used for judging that described corresponding relation sets up the judging unit whether corresponding relation of setting up the unit is in the mapping table that described memory module stores; if; judge that then password is correct; otherwise, then judge the password mistake.
CN201220474914.8U 2012-09-17 2012-09-17 Terminal realizing privacy protection in communication process Expired - Lifetime CN202872901U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201220474914.8U CN202872901U (en) 2012-09-17 2012-09-17 Terminal realizing privacy protection in communication process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201220474914.8U CN202872901U (en) 2012-09-17 2012-09-17 Terminal realizing privacy protection in communication process

Publications (1)

Publication Number Publication Date
CN202872901U true CN202872901U (en) 2013-04-10

Family

ID=48039584

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201220474914.8U Expired - Lifetime CN202872901U (en) 2012-09-17 2012-09-17 Terminal realizing privacy protection in communication process

Country Status (1)

Country Link
CN (1) CN202872901U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632105A (en) * 2013-11-25 2014-03-12 联想(北京)有限公司 Information displaying method and electronic device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632105A (en) * 2013-11-25 2014-03-12 联想(北京)有限公司 Information displaying method and electronic device

Similar Documents

Publication Publication Date Title
TWI449394B (en) User authentication, verification and code generation system maintenance subsystem
CN101345789A (en) Secrecy method and apparatus for mobile terminal, and mobile terminal
CN105472093B (en) Mobile terminal call answers method for authenticating and mobile terminal
CN104270354A (en) User account security verification method and device
CN101345788A (en) Identity affirmation method and system through telephone call-back
CN101795454A (en) Method and system of double identity authentication based on mobile communication independent channel
US20140370838A1 (en) System and method for preventing abuse of emergency calls placed using smartphone
CN101150631A (en) A method and device for setting call forward
CN101808094A (en) Identity authentication system and method
CN102883313A (en) Method for implementing privacy protection during communication, and terminal
KR101306074B1 (en) Method and system to prevent phishing
CN106921633A (en) Calling number Verification System and method
CN104735651B (en) A kind of method, system and device of securely communicating data
CN206993151U (en) Network signal security authentication systems
KR20120039536A (en) Method for performing ussd services in a telecommunications network
CN101720088A (en) Method and mobile phone for preventing interception in mobile phone communicating process
CN102857731A (en) Method for identity validation and automatic answering of 3G wireless communication module video telephone call
CN202872901U (en) Terminal realizing privacy protection in communication process
CN105792203A (en) Method and system for distinguishing authenticity through data channel and authenticating data through voice channel
JP4289186B2 (en) Telephone and telephone system having authentication function
CN104348780A (en) Login method and system thereof
KR101071023B1 (en) Apparatus and Method for User Certification using Mobile Phone
CN102611813B (en) Telephone network the silver device, phone internet banking system and phone Net silver method of commerce
CN103391120A (en) Friend relation establishing method and device based on near-field communication
CN105069345A (en) Privacy protection method and system of mobile terminal

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CP01 Change in the name or title of a patent holder
CX01 Expiry of patent term

Granted publication date: 20130410

CX01 Expiry of patent term