Method, device and terminal for managing personal information
A technology of the first and content of information, applied in the information field, can solve the problems of insufficient privacy protection and low reliability, and achieve the effect of improving reliability and protecting personal privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0074] This embodiment provides a method for managing personal information, see figure 1 , the method flow provided by this embodiment is specifically as follows:
[0075] 101: Obtain the personal information input by the user, and determine the content to be hidden in the personal information according to the field length of the personal information;
[0076] Among them, the content to be hidden in the personal information is determined according to the field length of the personal information, including but not limited to:
[0077] If the field length of the personal information is N<3, all the fields in the personal information will be displayed;
[0078] If the field length of the personal information is N=3, then determine the first 2 fields in the personal information as the content to be hidden;
[0079] If the field length of personal information is N>3, if N%3=0, it is determined that the N*1 / 3 to N-1th field in the personal information is the content to be hidden; ...
Embodiment 2
[0098] Embodiment two
[0099] This embodiment provides a method for managing personal information. The method manages the user's personal information by hiding content and encrypting all personal information, thereby effectively protecting personal privacy. Combining the content of the first embodiment above, for the convenience of description, this embodiment takes the method of managing personal information through a mobile terminal as an example for illustration, see figure 2 , the method flow provided by this embodiment is specifically as follows:
[0100] 201: Obtain the password preset by the user, the full display password protection question, answer and personal information entered by the user;
[0101] For this step, when obtaining the password preset by the user, a password setting interface can be provided to the user through the mobile phone terminal, and the user can input the password set on the password setting interface, so that the password entered by the u...
example 1
[0111] Example 1: For the bank card information in the personal information, the card number, payment password, telephone inquiry password, online banking login password, custom options and other information in which the field length is less than 3 digits are all displayed, which is equal to 3 digits and the first two digits are hidden. If it is greater than 3 digits, follow the determination method described in the above situation 3; if the head of household name is 1 digit, it will display all; The 3-bit follows the determination method described in the third case above.
[0112] For example, taking the bank card number "6222000000000000000" as an example, since its field length N is 19 digits, it meets the third case, and because the remainder of 19%3 is 1, then according to the content of the third case above, it can be determined that the (N- 1) *1 / 3 digit to N-1 digit field is the content to be hidden, and (19-1)*1 / 3 digit is the 6th digit, and N-1 digit is the 18th digi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


