Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and terminal for managing personal information

A technology of the first and content of information, applied in the information field, can solve the problems of insufficient privacy protection and low reliability, and achieve the effect of improving reliability and protecting personal privacy

Active Publication Date: 2018-04-03
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] When the existing technology manages personal information, only a password set by the user is used to encrypt and decrypt personal information. However, once the set password is deciphered, all personal information will be displayed, resulting in insufficient privacy protection. , the reliability is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and terminal for managing personal information
  • Method, device and terminal for managing personal information
  • Method, device and terminal for managing personal information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] This embodiment provides a method for managing personal information, see figure 1 , the method flow provided by this embodiment is specifically as follows:

[0075] 101: Obtain the personal information input by the user, and determine the content to be hidden in the personal information according to the field length of the personal information;

[0076] Among them, the content to be hidden in the personal information is determined according to the field length of the personal information, including but not limited to:

[0077] If the field length of the personal information is N<3, all the fields in the personal information will be displayed;

[0078] If the field length of the personal information is N=3, then determine the first 2 fields in the personal information as the content to be hidden;

[0079] If the field length of personal information is N>3, if N%3=0, it is determined that the N*1 / 3 to N-1th field in the personal information is the content to be hidden; ...

Embodiment 2

[0098] Embodiment two

[0099] This embodiment provides a method for managing personal information. The method manages the user's personal information by hiding content and encrypting all personal information, thereby effectively protecting personal privacy. Combining the content of the first embodiment above, for the convenience of description, this embodiment takes the method of managing personal information through a mobile terminal as an example for illustration, see figure 2 , the method flow provided by this embodiment is specifically as follows:

[0100] 201: Obtain the password preset by the user, the full display password protection question, answer and personal information entered by the user;

[0101] For this step, when obtaining the password preset by the user, a password setting interface can be provided to the user through the mobile phone terminal, and the user can input the password set on the password setting interface, so that the password entered by the u...

example 1

[0111] Example 1: For the bank card information in the personal information, the card number, payment password, telephone inquiry password, online banking login password, custom options and other information in which the field length is less than 3 digits are all displayed, which is equal to 3 digits and the first two digits are hidden. If it is greater than 3 digits, follow the determination method described in the above situation 3; if the head of household name is 1 digit, it will display all; The 3-bit follows the determination method described in the third case above.

[0112] For example, taking the bank card number "6222000000000000000" as an example, since its field length N is 19 digits, it meets the third case, and because the remainder of 19%3 is 1, then according to the content of the third case above, it can be determined that the (N- 1) *1 / 3 digit to N-1 digit field is the content to be hidden, and (19-1)*1 / 3 digit is the 6th digit, and N-1 digit is the 18th digi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a personal information management method and device and a terminal, and belongs to the technical field of information. The method includes the steps that personal information input by a user is acquired, and content, to be hidden, in the personal information is determined according to the field length of the personal information; the determined content to be hidden is hidden, and encryption processing is carried out on all the personal information according to passwords preset by the user to obtain encrypted personal information. The device comprises an acquiring module, a determining module, a hiding module and an encrypting module. According to the personal information management method and device, because the content, to be hidden, in the personal information is determined according to the field length of the personal information and encryption processing is carried out on all the personal information after the determined content to be hidden is hidden, the personal information is still in a hidden state even when passwords are cracked, accordingly, personal privacy can be effectively protected, and personal information management reliability can be improved.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to a method, device and terminal for managing personal information. Background technique [0002] Today, with the rapid development of information technology, there are more and more types of personal information, such as bank card information, website information, note information, etc. In order to ensure personal privacy, how to manage personal information is a key issue. [0003] In the existing technology, when managing personal information, the user usually sets a password in advance, and then encrypts the user's personal information according to the password set by the user. After that, the user only needs to enter the preset password to realize personal information information viewing. [0004] In the process of realizing the present invention, the inventor finds that there are at least the following problems in the prior art: [0005] When the existing technol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/60
CPCG06F21/31G06F21/60G06F2221/2103
Inventor 张军柯
Owner TENCENT TECH (SHENZHEN) CO LTD