CN202872901U - Terminal realizing privacy protection in communication process - Google Patents
Terminal realizing privacy protection in communication process Download PDFInfo
- Publication number
- CN202872901U CN202872901U CN201220474914.8U CN201220474914U CN202872901U CN 202872901 U CN202872901 U CN 202872901U CN 201220474914 U CN201220474914 U CN 201220474914U CN 202872901 U CN202872901 U CN 202872901U
- Authority
- CN
- China
- Prior art keywords
- module
- password
- input
- mapping table
- tabulation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The utility model discloses a terminal realizing privacy protection in communication process. The terminal realizing privacy protection in a communication process includes a selecting/receiving module, an input module, a verifying module and a communication connection establishing module. A contact person is selected from a secret contact list through the selecting/receiving module as an object for establishing communication connection or a request for establishing communication connection sent by a contact person in the secret contact list is received. Then a password is input through the input module and is verified through the verifying module. After the password is verified to be correct, communication connection is established through the communication connection establishing module. Therefore, according to the utility model, an encryption mode (password input and verification) is set before communication connection (mainly indicating short messages and calls) is established. All persons can be effectively prevented from checking the short messages or making and answering the calls freely when they need to send or receive the short messages and to make or answer the calls, so that the safety performance of the terminal realizing privacy protection in the communication process is improved and user privacy disclosure is prevented.
Description
Technical field
The utility model relates to the mobile communication terminal safety technical field, relates more specifically to a kind of terminal that realizes secret protection in communication process.
Background technology
Along with increasing of function and increasing substantially of described mobile phone popularity rate that mobile phone possesses, its fail safe more and more receives people's concern.At present, mostly adopt the related data to being stored in the described mobile phone to be encrypted protection to play the effect that prevents that privacy from revealing.
But, for general voice call or transmitting-receiving note, but comparatively imperfect guard method.As, when receiving note or incoming call, anyone can arbitrarily check or answer, thereby causes individual privacy to be revealed.In addition, along with the development of mobile communication technology, some bankings and third party's payment transaction (paying logical, Alipay such as wealth) all with as described in the number of mobile phone be associated.When using bank card to realize banking or using Alipay to realize payment, banking system or Alipay system all can send information such as identifying code and so on to mobile phone, only have after inputting this identifying code and just can finish corresponding service.At this moment, if described mobile phone fail safe is not high, just anyone can arbitrarily view this identifying code, thereby may bring loss to the user, cause simultaneously privacy to reveal.
Therefore, be necessary to provide a kind of terminal of secret protection that can in communication process, realize to overcome defects.
The utility model content
The purpose of this utility model provides a kind of terminal that realizes secret protection in communication process, to increase the fail safe of this terminal, prevents the privacy of user leakage.
For achieving the above object, the utility model provides a kind of terminal that realizes secret protection in communication process, comprises shell and is installed on the interior movement of described shell.Wherein, described movement comprises:
Selection/receiver module, the object of the request that a contact person who be used for to select the private contact tabulation establishes a communications link as transmission, or receive the request that establishes a communications link that sends from the contact person in the described private contact tabulation;
Input module is connected, is used for the input password with described selection/receiver module;
Authentication module is connected with described input module, is used for verifying whether the password that described input module inputs is correct;
Module is set up in communication connection, is connected with described authentication module, for establishing a communications link when being when the result of described authentication module; And
Reminding module, with described authentication module be connected input module and be connected, be used for when the result of described authentication module when being no, display password input error and point out described input module to re-enter password.
Compared with prior art, the utility model realizes that in communication process the terminal of secret protection comprises interconnective selection/receiver module, input module, module is set up in authentication module and communication connection, in the private contact tabulation, select a contact person as the object that establishes a communications link by described selection/receiver module first, or receive the request that establishes a communications link that sends from the contact person in the described private contact tabulation, verify by described input module input password and by described authentication module again, after being proved to be successful, setting up module by described communication connection and establish a communications link; Namely, this terminal is at establish a communications link (mainly finger is received and dispatched note and beaten and answer the call) the front encryption mode (the input password is also verified) that arranges, when needs transmitting-receivings note or beat when answering the call, prevented that effectively anyone from arbitrarily checking note or beat and answer the call, thereby increased the fail safe of terminal, prevented the privacy of user leakage.
Particularly, described movement also comprises:
Password arranges module, is used for the corresponding number of a plurality of described contact persons and is set to encryption mode and password is set;
Mapping table is set up module, with described password module being set is connected, is used for the set encryption mode of module being set and password is set up a mapping table according to described password, described mapping table shows the relation between the corresponding number of a plurality of described contact persons and the set password, and described mapping table adopts one to one or many-to-one mode;
Module is set up in the private contact tabulation, is connected, is used for creating described private contact tabulation with described selection/receiver module and add a plurality of described contact persons to described private contact tabulation; And
Memory module is set up module and is connected private contact tabulation and sets up module and is connected, is used for storing described mapping table and set up mapping table that module sets up and the tabulation of described private contact and set up the described private contact that module sets up and tabulate with described mapping table.
Particularly, described authentication module comprises:
Receiving element is connected, is used for receiving the password that described input module is inputted with described input module;
Corresponding relation is set up the unit, is connected with described receiving element, is used for setting up described password and stating corresponding relation between the corresponding number of contact person according to the password that described receiving element receives; And
Judging unit, set up the unit and be connected memory module and connect, be used for judging that described corresponding relation sets up the corresponding relation of setting up the unit and whether be in the mapping table that described memory module is stored with described corresponding relation, if judge that then password is correct, otherwise, then judge the password mistake.
Particularly, described communication process comprises conversation and note.
By following description also by reference to the accompanying drawings, it is more clear that the utility model will become, and these accompanying drawings are used for explaining embodiment of the present utility model.
Description of drawings
Fig. 1 is the utility model is realized terminal one embodiment of secret protection in communication process structure chart.
Fig. 2 is the structured flowchart of movement shown in Figure 1.
Fig. 3 is the workflow diagram of the terminal that realizes secret protection in communication process shown in Figure 1 during as transmit leg.
Fig. 4 is the shown interface of step S502 among Fig. 3.
Fig. 5 is the shown interface of step S503 among Fig. 3.
Workflow diagram when Fig. 6 is the terminal conduct side of picking that realizes secret protection in communication process shown in Figure 1.
Embodiment
With reference now to accompanying drawing, describe embodiment of the present utility model, similar element numbers represents similar element in the accompanying drawing.As mentioned above; the utility model provides a kind of terminal that realizes secret protection in communication process; this terminal is at establish a communications link (mainly finger is received and dispatched note and beaten and answer the call) the front encryption mode (the input password is also verified) that arranges; when needs transmitting-receivings note or beat when answering the call; prevented that effectively anyone from arbitrarily checking note or beat and answer the call; thereby increased the fail safe of terminal, prevented the privacy of user leakage.
Please refer to Fig. 1, the terminal that realizes secret protection in communication process of the present utility model comprises shell 100 and is installed on movement 200 in the described shell 100.
Particularly, as shown in Figure 2, described movement 200 comprises:
Mapping table is set up module 202, be used for according to described password module 201 set encryption mode and passwords being set and set up a mapping table, described mapping table shows the relation between the corresponding number of a plurality of described contact persons and the set password, and described mapping table adopts one to one or many-to-one mode;
Selection/receiver module 205, the object of the request that a contact person who is used for selecting the private contact tabulation that described private contact list block 203 sets up establishes a communications link as transmission, or receive the request that establishes a communications link that sends from the contact person in the described private contact tabulation;
Particularly, described authentication module 207 specifically comprises:
Receiving element 2071 is used for receiving the password that described input module 206 is inputted;
Corresponding relation is set up unit 2072, is used for setting up described password and stating corresponding relation between the corresponding number of contact person according to the password that described receiving element 2071 receives;
Judging unit 2073 is used for judging that described corresponding relation sets up the corresponding relation of setting up unit 2072 and whether be in the mapping table that described memory module 204 is stored, if, judge that then password is correct, otherwise, then judge the password mistake.
Particularly, described communication process comprises conversation and note.
Please refer to Fig. 3, when the described terminal that realizes secret protection in communication process during as the recipient, its specific works flow process is as follows again:
S301 adds a plurality of contact persons and tabulates to private contact;
S302 receives note or the phone of a contact person in the tabulation of described private contact, if what receive is phone, then this moment shown interface as shown in Figure 4;
S303 enters interface for password input, and at this moment shown interface as shown in Figure 5;
S304 judges whether the password of inputting is correct, if correct, then carries out S305, otherwise, then carry out S306;
S305 establishes a communications link, and enters note and checks interface or telephone relation interface;
S306, note is checked unsuccessful, note is saved to message list, the phone auto-hang up.
If it should be noted that and input password by mistake continuous three times, then note is saved to message list automatically, the phone auto-hang up.Certainly, after inputing password by mistake, can in interface as shown in Figure 5, select return key to withdraw from Password Input.
Please refer to Fig. 6, when the described terminal that realizes secret protection in communication process during as transmit leg, its specific works flow process is as follows again:
S601 adds a plurality of contact persons and tabulates to private contact;
S602 selects in the tabulation of described private contact a contact person to carry out that note sends or conversation, this moment shown interface as shown in Figure 4;
S603 enters interface for password input, and at this moment shown interface as shown in Figure 7;
S604 judges whether the password of inputting is correct, if correct, then carries out S605, otherwise, then carry out S606;
S605 establishes a communications link, and enters note and sends interface or dialing interface;
S606, note sends unsuccessful, and note is saved to message list, and phone is back to dialing interface.
If it should be noted that and input password by mistake continuous three times, then note is saved to message list automatically, the phone auto-hang up.Certainly, after inputing password by mistake, can in interface as shown in Figure 5, select return key to withdraw from Password Input.
Operation principle of the present utility model is as follows:
Described password arranges the corresponding number of module 201 a plurality of contact persons and is set to encryption mode and password is set, in the private contact tabulation, select a contact person as the object that establishes a communications link by described selection/receiver module 205, or receive the request that establishes a communications link that sends from the contact person in the described private contact tabulation, verify by described input module 206 input passwords and by described authentication module 207 again, after being proved to be successful, setting up module 208 by described communication connection and establish a communications link; Namely, this terminal is at establish a communications link (mainly finger is received and dispatched note and beaten and answer the call) the front encryption mode (the input password is also verified) that arranges, when needs transmitting-receivings note or beat when answering the call, prevented that effectively anyone from arbitrarily checking note or beat and answer the call, thereby increased the fail safe of terminal, prevented the privacy of user leakage.
More than be preferred implementation of the present utility model, but the utility model is not limited to the embodiment of above announcement, and should contains various modification, equivalent combinations of carrying out according to essence of the present utility model.
Claims (3)
1. terminal that in communication process, realizes secret protection; comprise shell and be installed on the interior movement of described shell; it is characterized in that: described movement comprises the object of the request that establishes a communications link as transmission for a contact person who selects the private contact tabulation; or receive the selection/receiver module of the request that establishes a communications link that sends from the contact person in the described private contact tabulation; be connected with described selection/receiver module; the input module that is used for the input password; be connected with described input module; be used for verifying whether correct authentication module of password that described input module inputs; be connected with described authentication module; module is set up in the communication connection that is used for the result when described authentication module and is establishing a communications link when being, and with described authentication module be connected input module and be connected; be used for when the result of described authentication module when being no; the display password input error also points out described input module to re-enter the reminding module of password.
2. the terminal that in communication process, realizes secret protection as claimed in claim 1; it is characterized in that: comprise that also the password that is set to encryption mode and password is set for the corresponding number of a plurality of described contact persons arranges module; with described password module being set is connected; being used for according to described password the set encryption mode of module and password being set sets up the mapping table of a mapping table and sets up module; described mapping table shows the relation between the corresponding number of a plurality of described contact persons and the set password; and described mapping table adopts one to one or many-to-one mode; be connected with described selection/receiver module; be used for creating described private contact tabulation and add a plurality of described contact persons and set up module to the private contact tabulation of described private contact tabulation, and set up module and be connected the private contact tabulation and set up module and be connected with described mapping table; be used for storing described mapping table and set up the memory module that the described private contact tabulation that module sets up is set up in mapping table that module sets up and the tabulation of described private contact.
3. the terminal that in communication process, realizes secret protection as claimed in claim 2; it is characterized in that: described authentication module comprises with described input module and being connected; be used for receiving the receiving element of the password that described input module inputs; be connected with described receiving element; be used for setting up the unit according to the corresponding relation that the password that described receiving element receives is set up described password and stated the corresponding relation between the corresponding number of contact person; and set up the unit with described corresponding relation and be connected memory module and connect; be used for judging that described corresponding relation sets up the judging unit whether corresponding relation of setting up the unit is in the mapping table that described memory module stores; if; judge that then password is correct; otherwise, then judge the password mistake.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201220474914.8U CN202872901U (en) | 2012-09-17 | 2012-09-17 | Terminal realizing privacy protection in communication process |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201220474914.8U CN202872901U (en) | 2012-09-17 | 2012-09-17 | Terminal realizing privacy protection in communication process |
Publications (1)
Publication Number | Publication Date |
---|---|
CN202872901U true CN202872901U (en) | 2013-04-10 |
Family
ID=48039584
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201220474914.8U Expired - Lifetime CN202872901U (en) | 2012-09-17 | 2012-09-17 | Terminal realizing privacy protection in communication process |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN202872901U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103632105A (en) * | 2013-11-25 | 2014-03-12 | 联想(北京)有限公司 | Information displaying method and electronic device |
-
2012
- 2012-09-17 CN CN201220474914.8U patent/CN202872901U/en not_active Expired - Lifetime
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103632105A (en) * | 2013-11-25 | 2014-03-12 | 联想(北京)有限公司 | Information displaying method and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI449394B (en) | User authentication, verification and code generation system maintenance subsystem | |
CN101345789A (en) | Secrecy method and apparatus for mobile terminal, and mobile terminal | |
CN105472093B (en) | Mobile terminal call answers method for authenticating and mobile terminal | |
CN104270354A (en) | User account security verification method and device | |
CN101345788A (en) | Identity affirmation method and system through telephone call-back | |
CN101795454A (en) | Method and system of double identity authentication based on mobile communication independent channel | |
US20140370838A1 (en) | System and method for preventing abuse of emergency calls placed using smartphone | |
CN101150631A (en) | A method and device for setting call forward | |
CN101808094A (en) | Identity authentication system and method | |
CN102883313A (en) | Method for implementing privacy protection during communication, and terminal | |
KR101306074B1 (en) | Method and system to prevent phishing | |
CN106921633A (en) | Calling number Verification System and method | |
CN104735651B (en) | A kind of method, system and device of securely communicating data | |
CN206993151U (en) | Network signal security authentication systems | |
KR20120039536A (en) | Method for performing ussd services in a telecommunications network | |
CN101720088A (en) | Method and mobile phone for preventing interception in mobile phone communicating process | |
CN102857731A (en) | Method for identity validation and automatic answering of 3G wireless communication module video telephone call | |
CN202872901U (en) | Terminal realizing privacy protection in communication process | |
CN105792203A (en) | Method and system for distinguishing authenticity through data channel and authenticating data through voice channel | |
JP4289186B2 (en) | Telephone and telephone system having authentication function | |
CN104348780A (en) | Login method and system thereof | |
KR101071023B1 (en) | Apparatus and Method for User Certification using Mobile Phone | |
CN102611813B (en) | Telephone network the silver device, phone internet banking system and phone Net silver method of commerce | |
CN103391120A (en) | Friend relation establishing method and device based on near-field communication | |
CN105069345A (en) | Privacy protection method and system of mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CP01 | Change in the name or title of a patent holder | ||
CX01 | Expiry of patent term |
Granted publication date: 20130410 |
|
CX01 | Expiry of patent term |