Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal and information protection method

An information protection and terminal technology, applied in the field of mobile communication, can solve problems such as cumbersome operation, poor user experience, and great influence of legitimate participants, and achieve the effect of ensuring information security

Active Publication Date: 2016-08-24
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1. Using new emails for discussions can avoid leakage of sensitive content, but the loss of previous content will have a greater impact on legitimate participants (such as joining a person who can view the information)
[0008] 2. The method of deleting sensitive information is cumbersome and the user experience is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal and information protection method
  • Terminal and information protection method
  • Terminal and information protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0026] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0027] figure 1 A block diagram of a terminal according to an embodiment of the present invention is shown.

[0028] Such as figure 1 As shown, the terminal 100 according to the embodiment of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal. The terminal comprises a setting and recording unit, a detection unit and a shielding processing unit, wherein the setting and recording unit sets and records legal participants for information interaction; the detection unit detects whether other participants except the legal participants exist in real time in the information interaction process according to the recorded legal participants; and the shielding processing unit shields specific information to other participants in the information interaction process when detecting that other participants exist. Correspondingly, the invention further provides an information protection method. According to the technical scheme, in the multi-user information interaction process, important or sensitive information can be automatically shielded to some participant, the terminal and the information protection method can guarantee that the important or sensitive information is not leaked without needing additional operation by users, and information safety is guaranteed.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular, to a terminal and an information protection method. Background technique [0002] In daily work and life, users often need to communicate or discuss information with multiple people at the same time, such as sending and receiving emails between multiple people, or using instant messaging tools or social networking sites to initiate multi-person conversations. [0003] Take the scenario of multiple people discussing via email as an example. As the topic of the email discussion changes, the number of people participating in the discussion will change (mainly increase). Suppose the publisher of the previous discussion topic does not want to be seen by those who join later. Or do not want participants to forward it unintentionally or intentionally, then the solutions are: [0004] 1. Stop the email discussion and restart the new email discussion. [0005] 2. Let the curren...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W88/02H04M1/725H04L12/58
Inventor 郭少华毕涛李涛
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD