WO2016184087A1 - Procédé et système de transmission d'informations entre dispositif, terminal source et support de stockage - Google Patents

Procédé et système de transmission d'informations entre dispositif, terminal source et support de stockage Download PDF

Info

Publication number
WO2016184087A1
WO2016184087A1 PCT/CN2015/097286 CN2015097286W WO2016184087A1 WO 2016184087 A1 WO2016184087 A1 WO 2016184087A1 CN 2015097286 W CN2015097286 W CN 2015097286W WO 2016184087 A1 WO2016184087 A1 WO 2016184087A1
Authority
WO
WIPO (PCT)
Prior art keywords
notification message
source terminal
terminal
destination terminal
destination
Prior art date
Application number
PCT/CN2015/097286
Other languages
English (en)
Chinese (zh)
Inventor
王玲
赵冬晓
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016184087A1 publication Critical patent/WO2016184087A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W68/00User notification, e.g. alerting and paging, for incoming communication, change of service or the like

Definitions

  • the present invention relates to the field of communications, and in particular, to a method, system, source terminal, and storage medium for information transmission between devices.
  • the terminal implements more and more functions. Users can accept and view information through the terminal anytime and anywhere.
  • the terminal directly displays after receiving the message. Come out, but there are security risks in this approach, which may cause information to be seen by others, and cause privacy leaks.
  • the owner and user of the projection device are different, and the projector is used during the use of the projection device.
  • the person may be multiple people.
  • directly displaying the received information may cause the disclosure of the projection device owner information.
  • the mobile phone plays the video, it receives the message of the short message, email or other application. When it is displayed directly, the viewer who watches the video will be informed of the information, resulting in the disclosure of the information of the owner of the mobile phone.
  • the main technical problem to be solved by the embodiments of the present invention is to provide an information transmission method and system between devices, a source terminal, and a storage medium, which solve the problem that the terminal owner's privacy is directly displayed after the terminal receives the message in the prior art.
  • the problem of leaking is to provide an information transmission method and system between devices, a source terminal, and a storage medium, which solve the problem that the terminal owner's privacy is directly displayed after the terminal receives the message in the prior art. The problem of leaking.
  • the embodiment of the present invention adopts the following technical solutions:
  • an embodiment of the present invention provides a method for transmitting information between devices, including:
  • the source terminal receives the notification message
  • the source terminal Before the source terminal displays the notification message, it includes: determining whether it is currently in non-security Full state
  • the source terminal forwards the notification message to at least one destination terminal paired with the same, and does not display the notification message locally.
  • the method before the source terminal forwards the notification message to the destination terminal, the method further includes: determining, by the source terminal, whether the notification message belongs to the notification message that needs to be protected, and if yes, the source terminal forwarding the notification message.
  • the method for determining, by the source terminal, whether the notification message belongs to the notification message that needs to be protected includes: determining whether the notification message belongs to a notification message of any one of a social application, a wealth management application, and an office application that needs to be protected. If yes, the notification message needs to be protected.
  • the method before the source terminal forwards the notification message to the destination terminal, the method further includes: authenticating the destination terminal.
  • the authentication mode adopted by the source terminal includes: authenticating the destination terminal by using any one of a cryptographic method, a fingerprint identification, and a voice recognition.
  • the method before the source terminal forwards the notification message to the destination terminal, the method further includes: the source terminal encrypting the notification message according to the local preset encryption rule or the encryption instruction from the destination terminal.
  • determining that the source terminal is in an unsecured state when at least one of the following conditions is met, determining that the source terminal is in an unsecured state:
  • the time at which the source terminal receives the notification message is outside the set security time period
  • the current working state of the source terminal belongs to an open working state
  • the distance between the source terminal and the user is outside the safe viewing distance.
  • the open working state includes a video playback state and/or a projection state.
  • the method further includes: the source terminal is in accordance with the local preset processing rule or the processing instruction from the destination terminal. Know the message to hide or delete.
  • an embodiment of the present invention further provides a method for transmitting information between devices, including:
  • the source terminal receives the notification message
  • the source terminal Before the source terminal displays the notification message, it includes: determining whether the current terminal is in an unsecured state;
  • the source terminal forwards the notification message to at least one destination terminal paired with the destination terminal, and does not display the notification message locally;
  • the destination terminal receives and displays the notification message.
  • the destination terminal after receiving the notification message, further includes sending a processing instruction to the source terminal, instructing the source terminal to hide or delete the notification message.
  • the embodiment of the present invention further provides a source terminal, including:
  • a receiving module configured to receive a notification message
  • the determining module is configured to determine whether the terminal is currently in an unsecured state before displaying the notification message
  • the processing module is configured to: when the judgment result of the determining module is yes, forward the notification message to at least one destination terminal paired with the source terminal, and display the notification message locally.
  • the method further includes: a pre-processing module configured to: before the processing module forwards the notification message to the destination terminal, determining whether the notification message belongs to the notification message that needs to be protected, and if yes, the processing module forwards the notification message .
  • the method further includes: an authentication module configured to authenticate the destination terminal before the processing module forwards the notification message to the destination terminal.
  • the method further includes: an encryption module configured to encrypt the notification message according to the local preset encryption rule or the encryption instruction from the destination terminal before the processing module forwards the notification message to the destination terminal.
  • the determining module is satisfied when at least one of the following conditions is satisfied Determine that the source terminal is in an unsecured state:
  • the time at which the source terminal receives the notification message is outside the set security time period
  • the current working state of the source terminal belongs to an open working state
  • the distance between the source terminal and the user is outside the safe viewing distance.
  • the method further includes: a second processing module, configured to: after the processing module forwards the notification message to the destination terminal, performing the notification message according to the local preset processing rule or the processing instruction from the destination terminal Hide or delete operations.
  • an embodiment of the present invention further provides an information transmission system between devices, including the source terminal as described above, and at least one destination terminal paired with the source terminal;
  • the method includes: determining whether the user is currently in the non-secure state, and if the determination result is yes, forwarding the notification message to the destination terminal, and not displaying the notification message locally. ;
  • the destination terminal is configured to receive and display a notification message.
  • an embodiment of the present invention provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are used to perform information transmission between devices provided by the first aspect of the present invention. method.
  • the information transmission method and system between devices and the source terminal and the storage medium provided by the embodiments of the present invention use the information transmission method between the devices provided by the present invention.
  • the source terminal After receiving the notification message, the source terminal determines whether it is currently in non-secure. Status, if yes, there may be a problem of privacy leakage. At this time, the action taken is that the source terminal does not display the received notification information, and at the same time forwards the notification information to the destination terminal, and then the user views the destination terminal. Notification information.
  • the method can be used to check whether the notification message is in a secure state before the source terminal is in the security state, that is, the state of the notification message can be safely checked.
  • the notification message received in the non-secure state is not displayed, thereby avoiding the non-security of the user.
  • the source terminal of the state leaks the privacy problem, and at the same time, the notification message is forwarded to the destination terminal, and the user can normally view the notification information, thereby improving the user. Experience.
  • FIG. 1 is a schematic flowchart of a method for transmitting information between devices according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic structural diagram of an information transmission system between devices according to Embodiment 2 of the present invention.
  • FIG. 3 is a schematic diagram of a flow of information transmission between a projector and a mobile phone according to Embodiment 3 of the present invention.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • the present embodiment provides a method for transmitting information between devices that can effectively ensure privacy and information transmission between devices.
  • the method includes:
  • S101 The source terminal receives the notification message.
  • the source terminal forwards the notification message to the at least one destination terminal that is paired with the destination terminal, and does not display the notification message locally, ensuring that the source terminal is in an unsecured state, and the user can only actively check.
  • the way to view the notification message on the source terminal further improves privacy security.
  • the source terminal is a device that can receive information, such as a projector, a mobile phone, etc.
  • the destination terminal includes but is not limited to a mobile phone or a smart watch.
  • the pairing of the source terminal and the destination terminal refers to a communication connection between the two terminals.
  • the two terminals can be paired by way of a wireless connection, including but not limited to Bluetooth, WiFi, Internet, and local area network.
  • the foregoing S102 determines whether the source terminal is in an unsecured state, for example, when at least one of the following conditions is met, the source terminal is considered to be in an unsecured state, at the end of the source. There is a possibility of revealing the privacy of the notification message on the side:
  • Condition 1 The time when the source terminal receives the notification message is outside the set security time period
  • the security time period may include a start time and an end time.
  • the source terminal is considered to be in a secure state, and the notification message does not have a privacy problem, and the notification message does not need to be sent to
  • the destination terminal can be set to a certain time period of the day, such as 18:00 to 24 o'clock, or a certain number of days in a certain number of months, for example, September 12 to October 22, 2015;
  • the current working state of the source terminal belongs to an open working state.
  • the open working state refers to when the source terminal is in the working state, is being used by multiple people, or the content displayed on the screen is being Personal viewing, for example, the mobile phone is playing in full screen, or the projector is performing a projection light.
  • the source terminal directly displays the notification message, the person who is watching the display screen will see the notification message, and the source terminal is insecure.
  • the open working state described above includes: a video playing state and/or a projected state;
  • Condition 3 The distance between the source terminal and the user is outside the security viewing distance
  • the above-mentioned method for setting the safety distance is also different.
  • the security viewing distance can be set to a reasonable value range, for example, 0-0.3 meters, and the range is considered to be safe.
  • the user can directly view the notification message on the source terminal, and the user carries it with him.
  • the status includes holding it in the hand (direct contact), putting it in the pocket of the clothes, or putting it in the backpack.
  • the source terminal can determine whether it is carried by the sensor, pocket mode, gravity sensor, etc.; if not, then It is judged that the source terminal is not carried by the user and does not move with the user. At this time, a reasonable range of values is set to limit the security viewing distance, and the range of the value is generally larger than the previous range, for example, it can be set to 0.3 m- 0.7m.
  • the above judgment process is defined by certain properties of the terminal itself, but in reality In the use of the Internet, some messages do not need to be kept secret. If they are forwarded to the destination terminal, resources and time are wasted. Therefore, before the source terminal forwards the notification message, it is necessary to determine whether the notification message needs to be protected. And then forward the notification message that needs to be protected. The manner of the judgment may be set according to the actual situation.
  • the notification message it is determined according to which applications the notification message is from: for example, if the notification message is from a social application that needs to be protected, such as a short message application, an email, a WeChat, QQ, etc.; or from financial applications that need protection, such as Alipay or bank-banking software of banks; or office applications that need protection, such as office software of Microsoft office, WPS, etc., the notification message needs to be protected.
  • a social application that needs to be protected
  • financial applications that need protection such as Alipay or bank-banking software of banks
  • office applications that need protection such as office software of Microsoft office, WPS, etc.
  • the notification message needs to be forwarded to the destination terminal, but in order to ensure privacy security, it is preferable to receive and view the destination terminal before forwarding.
  • the right to notify the message is confirmed, that is, the destination terminal is authenticated.
  • the manner of authenticating the destination terminal may be set according to user needs and actual conditions.
  • the authentication may be performed by any of the following methods: password mode, fingerprint identification, voice recognition, and of course, the implementation. Other feasible authentication methods can also be used in the example.
  • the identity verification request may be sent to the destination terminal in the manner selected by the authentication, and the verification information fed back by the destination terminal may be received and verified whether it is correct. For example, if the password is selected, the message is sent to the destination terminal. The terminal requires a password that can prove its identity. After inputting the password at the destination terminal, and then feeding back the password to the source terminal, the source terminal performs verification again, and then forwards the notification message after the verification is passed.
  • the notification message that needs to be forwarded may be encrypted and then sent, and the source terminal may adopt the MD5. Fingerprint encryption, RSA data encryption, encryption of notification messages. After receiving the encrypted notification message, the destination terminal needs to use a corresponding key (fingerprint or password) to decrypt the notification message, so that the notification message is available. In the state of reading, the notification message can be displayed to further protect the privacy of the user.
  • the above encryption method may be set by the source terminal itself, or may be sent to the source terminal after the destination terminal is completed. If it is sent by the destination terminal, before sending, the destination terminal may first send a message to inquire whether the source terminal needs to encrypt the message, and if necessary, send the encryption rule formulated by itself to the source terminal.
  • the notification message After the user decrypts and views the notification message through the destination terminal, the notification message is known. Since the source terminal is currently in an unsecured state, in order to further improve security, the notification message that has been forwarded to the destination terminal on the source terminal may also be The protection process is performed, for example, including but not limited to deleting or hiding the notification message.
  • the way to hide the message can be set according to the actual situation.
  • the sensitive content of the notification message can be identified according to the set sensitive words, words, sentences (bank card, purchase, consumption, etc.), and certain words or Symbol replacement
  • the manner of processing the notification message may be a processing rule from a local preset or real-time input, and may be a processing instruction from a destination terminal.
  • the foregoing embodiment provides a method for transmitting information between devices. According to the method, it is possible to accurately and quickly determine whether the source terminal is in a non-secure state, whether a notification message needs to be forwarded to the destination terminal, and what notification message needs to be forwarded, which ensures the user.
  • the privacy and security avoids forwarding unnecessary information, saving resources and time.
  • the source terminal authenticates the destination terminal to ensure the validity of the destination terminal identity; the source terminal encrypts the notification message. To ensure that the notification message can only be unlocked by the destination terminal that knows the password, which greatly improves the security of the notification message, especially the transmission of the private notification message, protects the privacy of the user, and improves the user's sense of use.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • an information transmission system 20 between devices according to another embodiment of the present invention includes:
  • the source terminal 201 is configured to receive a notification message, and determine the source before displaying the notification message. Whether the terminal 201 is currently in an unsecured state, and if so, forwarding the notification message to the at least one destination terminal 202 paired with the source terminal 201, and not displaying the notification message locally;
  • the destination terminal 202 is configured to receive and display a notification message.
  • the destination terminal 202 further includes a processing rule sending module 2021 configured to: after the destination terminal receives the notification message, formulate and send a processing rule to the source terminal, and instruct the source terminal to delete or hide the notification message.
  • a processing rule sending module 2021 configured to: after the destination terminal receives the notification message, formulate and send a processing rule to the source terminal, and instruct the source terminal to delete or hide the notification message.
  • the source terminal 201 and the destination terminal 202 are respectively described in detail in conjunction with FIG. 2, and the source terminal 201 includes:
  • the receiving module 2011 is configured to receive a notification message
  • the determining module 2012 is configured to determine whether the source terminal is currently in an unsecured state before being configured to display the notification message;
  • the processing module 2013 is configured to: when the determination result of the determining module is YES, forward the notification message to at least one destination terminal paired with the source terminal, and display the notification message locally.
  • the source terminal 201 may further include a pre-processing module 2014, configured to filter the notification message before the processing module 2013 forwards the notification message, and determine whether the notification message belongs to the notification that needs to be protected. The message, if yes, the processing module 2013 forwards the notification message. If not, the current source terminal 201 does not need to forward the message even if the current source terminal 201 is in an unsecured state.
  • a pre-processing module 2014 configured to filter the notification message before the processing module 2013 forwards the notification message, and determine whether the notification message belongs to the notification that needs to be protected. The message, if yes, the processing module 2013 forwards the notification message. If not, the current source terminal 201 does not need to forward the message even if the current source terminal 201 is in an unsecured state.
  • the determining module 2012 may first determine whether the source terminal 201 is in an unsecured state, and then the pre-processing module 2014 determines the notification message received in the non-secure state to determine whether it is It is a notification message that needs to be protected, and the pre-processing module 2014 first determines whether the notification message received by the receiving module 2011 is a notification message that needs to be protected, and then the determining module 2012 determines that the notification message requiring protection is received, whether the source terminal 201 is The non-secured state, if so, the processing module forwards the message and does not display the message locally.
  • the source terminal 201 further comprises an authentication module 2015 configured to authenticate the destination terminal 202.
  • the source terminal 201 further includes an encryption module 2016 configured to: before the processing module 2013 forwards the notification message to the destination terminal 202, according to the local preset encryption rule or the encryption instruction from the destination terminal 202, The notification message is encrypted.
  • the source terminal 201 of the present embodiment further includes a second processing module 2017 configured to forward the notification message to the destination terminal after the processing module 2013, in order to prevent the notification message that has been forwarded by the source terminal 201 from being viewed by another person.
  • the notification message is hidden or deleted according to the local preset processing rule or the processing instruction from the destination terminal 202.
  • the specific method may be: when the destination terminal 202 cannot decrypt the received notification message, the error message is fed back to the source terminal 201, the source terminal. When the password of the destination terminal 202 is known to be incorrect, the corresponding notification message is hidden.
  • the determining module 2012 may determine that the determining module 2012 determines that the source terminal 201 is in an unsecured state when at least one of the following conditions is met:
  • the time at which the source terminal 201 receives the notification message is outside the set security time period
  • the current working state of the source terminal 201 belongs to an open working state
  • the distance between the source terminal 201 and the user is outside the safe viewing distance.
  • the foregoing embodiment provides an information transmission system between devices.
  • the source terminal in the system determines the forwarded notification message by determining whether it is not in a secure state when receiving the notification message, and determining whether the notification message needs protection.
  • User privacy and security also save time and resources. By limiting the judgment of the two judgments, the judgment result is more accurate. Before the message is forwarded, the authentication of the destination terminal and the encryption of the notification message are guaranteed.
  • User privacy has two security locks, which greatly reduces the possibility of privacy leaks and improves user experience.
  • Embodiment 3 is a diagrammatic representation of Embodiment 3
  • This embodiment provides a specific application scenario as an example, and further exemplifies the present invention.
  • the source terminal in this embodiment is a projector A that can be paired with a terminal such as a mobile phone or a smart watch.
  • the pairing connection process can be implemented by some application software.
  • the destination terminal in this embodiment can be a smart watch.
  • the most targeted terminal of the mobile phone B is used to describe the flow of the embodiment in detail:
  • S301 The projector A is turned on, and is connected with the mobile phone B;
  • S303 A determines whether A is in the optical machine on state when the short message is received, and if yes, proceeds to S304, otherwise, A directly displays the information;
  • S304 A determines whether the short message needs protection, and if yes, proceeds to S305, if not, directly displays the information;
  • S305 A sends a fingerprint information identity authentication request to B;
  • S306 B receives the authentication request of A, then opens the fingerprint identification module, requires the user to input the fingerprint, the input is completed, and the fingerprint authentication information is fed back to A;
  • S307 If A receives the information feedback of B, compares the data with the fingerprint information stored by the local device, and determines whether the comparison is passed. If yes, the process proceeds to S308. If not, the A does not forward the message to B, such as A communication is connected to more than one mobile phone, but the group device B' ⁇ B1, B2, B3... ⁇ , and then sends an identity authentication request to the group device B' to perform identity information verification;
  • S309 After receiving the encrypted short message, B enters a password, if the password and the private key sent by A If the message is consistent, the short message is successfully decrypted, and the short message belongs to a state that can be directly viewed, and enters S3011;
  • S3010 B displays the specific content of the short message
  • S3012 A hides or deletes the forwarded SMS according to the processing instruction.
  • the modules included in the source terminal in the embodiment of the present invention may be implemented by a processor in the terminal, and may also be implemented by a logic circuit, in the process of a specific embodiment.
  • the processor can be a central processing unit (CPU), a microprocessor (MPU), a digital signal processor (DSP), or a field programmable gate array (FPGA).
  • the information transmission method between the devices on the source terminal side is implemented in the form of a software function module, and is sold or used as an independent product, it may also be stored in a computer readable manner. Take the storage medium.
  • the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions.
  • a computer device (which may be a personal computer, server, or network device, etc.) is caused to perform all or part of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes various media that can store program codes, such as a USB flash drive, a mobile hard disk, a read only memory (ROM), a magnetic disk, or an optical disk.
  • program codes such as a USB flash drive, a mobile hard disk, a read only memory (ROM), a magnetic disk, or an optical disk.
  • the embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are used to perform information transmission between devices on the source terminal side in the embodiment of the present invention. method.
  • the source terminal receives the notification message, and before the notification message is displayed, the method includes: determining whether the current terminal is in an unsecured state, and if the determination result is yes, the source terminal forwards the notification message to the at least one
  • the paired destination terminal does not display the notification message locally.
  • the method can be used to check whether the notification message is in a secure state before the source terminal is in the security state, that is, the state of the notification message can be safely checked. After the judgment, the notification message received in the non-secure state is not displayed, thereby avoiding the non-security of the user.
  • the source terminal of the state leaks the privacy problem, and at the same time, the notification message is forwarded to the destination terminal, and the user can normally view the notification information, thereby improving the user experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

La présente invention concerne un procédé et système avec sécurité de confidentialité servant à transmettre des informations entre des dispositifs, un terminal source et un support de stockage. À l'aide du procédé décrit dans la présente invention, le terminal source reçoit un message de notification; et avant d'afficher le message de notification, le terminal source juge s'il se trouve actuellement dans un état non sûr, et si le résultat du jugement est affirmatif, le terminal source transfère le message de notification à au moins un terminal de destination correspondant au terminal source, et n'affiche pas le message de notification localement.
PCT/CN2015/097286 2015-10-19 2015-12-14 Procédé et système de transmission d'informations entre dispositif, terminal source et support de stockage WO2016184087A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510681319.X 2015-10-19
CN201510681319.XA CN106604241B (zh) 2015-10-19 2015-10-19 一种设备间的信息传输方法、系统和源终端

Publications (1)

Publication Number Publication Date
WO2016184087A1 true WO2016184087A1 (fr) 2016-11-24

Family

ID=57319386

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/097286 WO2016184087A1 (fr) 2015-10-19 2015-12-14 Procédé et système de transmission d'informations entre dispositif, terminal source et support de stockage

Country Status (2)

Country Link
CN (1) CN106604241B (fr)
WO (1) WO2016184087A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110245516A (zh) * 2019-05-09 2019-09-17 阿里巴巴集团控股有限公司 一种消息处理方法和装置

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112269554B (zh) * 2019-11-04 2023-03-14 青岛海信激光显示股份有限公司 显示系统及显示方法
CN112037004A (zh) * 2020-07-14 2020-12-04 北京文思海辉金信软件有限公司 业务处理结果呈现方法、装置、计算机设备和存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070136466A1 (en) * 2005-12-12 2007-06-14 Nokia Corporation Privacy protection on application sharing and data projector connectivity
CN103440437A (zh) * 2013-07-30 2013-12-11 东莞宇龙通信科技有限公司 终端和用户界面的显示控制方法
CN104318183A (zh) * 2014-11-18 2015-01-28 南京酷派软件技术有限公司 用于终端的通信信息的处理方法及装置
CN104333811A (zh) * 2013-07-22 2015-02-04 联想(北京)有限公司 一种显示方法及电子设备
EP2860689A1 (fr) * 2012-06-08 2015-04-15 SK Planet Co., Ltd. Procédé et système pour un service de messagerie dans un environnement à plusieurs dispositifs, et appareil associé
CN104519037A (zh) * 2013-09-30 2015-04-15 华为终端有限公司 一种评论信息的显示方法及设备
CN104837113A (zh) * 2015-03-31 2015-08-12 努比亚技术有限公司 隐私信息的显示方法及终端

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8874917B2 (en) * 2012-07-26 2014-10-28 Kabushiki Kaisha Toshiba Storage system in which fictitious information is prevented
CN104573540A (zh) * 2013-10-22 2015-04-29 鸿富锦精密工业(武汉)有限公司 移动终端用户隐私保护方法及系统
CN103618834A (zh) * 2013-12-03 2014-03-05 张剑文 短信提醒的显示方法及移动终端
CN104166813A (zh) * 2014-07-11 2014-11-26 北京奇虎科技有限公司 基于屏幕锁保护智能终端中的隐私内容的方法和装置
CN104156637B (zh) * 2014-07-11 2018-03-02 北京奇虎科技有限公司 一种保护智能终端中的隐私内容的方法和装置
CN104657643B (zh) * 2015-03-13 2018-01-16 广东欧珀移动通信有限公司 隐私信息保护方法、可穿戴设备及移动终端

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070136466A1 (en) * 2005-12-12 2007-06-14 Nokia Corporation Privacy protection on application sharing and data projector connectivity
EP2860689A1 (fr) * 2012-06-08 2015-04-15 SK Planet Co., Ltd. Procédé et système pour un service de messagerie dans un environnement à plusieurs dispositifs, et appareil associé
CN104333811A (zh) * 2013-07-22 2015-02-04 联想(北京)有限公司 一种显示方法及电子设备
CN103440437A (zh) * 2013-07-30 2013-12-11 东莞宇龙通信科技有限公司 终端和用户界面的显示控制方法
CN104519037A (zh) * 2013-09-30 2015-04-15 华为终端有限公司 一种评论信息的显示方法及设备
CN104318183A (zh) * 2014-11-18 2015-01-28 南京酷派软件技术有限公司 用于终端的通信信息的处理方法及装置
CN104837113A (zh) * 2015-03-31 2015-08-12 努比亚技术有限公司 隐私信息的显示方法及终端

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110245516A (zh) * 2019-05-09 2019-09-17 阿里巴巴集团控股有限公司 一种消息处理方法和装置

Also Published As

Publication number Publication date
CN106604241A (zh) 2017-04-26
CN106604241B (zh) 2022-03-18

Similar Documents

Publication Publication Date Title
US11323272B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US10595201B2 (en) Secure short message service (SMS) communications
JP6117317B2 (ja) 否認防止方法、このための決済管理サーバおよび使用者端末
US10893045B2 (en) System for accessing data from multiple devices
US9800562B2 (en) Credential recovery
CN112425114B (zh) 受公钥-私钥对保护的密码管理器
JP6399382B2 (ja) 認証システム
CN111034120B (zh) 基于身份信息的加密密钥管理
WO2018145127A1 (fr) Procédés et systèmes de vérification d'une identification électronique avec stockage d'enregistrements de certification sur une chaîne latérale
WO2016115889A1 (fr) Procédé et système de commande de chiffrement d'informations et d'analyse d'informations et de terminal
CN108880791A (zh) 密钥保护方法、终端及计算机可读存储介质
CN101335754B (zh) 一种利用远程服务器进行信息验证的方法
TWI724684B (zh) 用於執行經過身分驗證的加密操作的方法、系統及裝置
CN105975867A (zh) 一种数据处理方法
WO2017050152A1 (fr) Système de sécurité de mot de passe adopté par un appareil mobile et procédé de saisie de mot de passe sécurisé de celui-ci
US20200233947A1 (en) System and method for facilitating authentication via a short-range wireless token
WO2016184087A1 (fr) Procédé et système de transmission d'informations entre dispositif, terminal source et support de stockage
CN110999254B (zh) 安全地执行加密操作
US11750572B2 (en) System, method, and computer-accessible medium for hiding messages sent to third parties
JP2012044430A (ja) 携帯型情報装置及び暗号化通信プログラム
JP2016100007A (ja) カード装置を用いたネットワーク認証方法
KR101394147B1 (ko) 모바일에서 안전하게 인증서를 사용하는 방법
USRE49968E1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US20240005820A1 (en) Content encryption and in-place decryption using visually encoded ciphertext
KR101611214B1 (ko) 금융 시스템, 금융 시스템의 카드 결제 요청 및 승인 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15892461

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15892461

Country of ref document: EP

Kind code of ref document: A1