Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal contact security processing method and device

A technology for secure processing and contacts, applied in the field of communication, can solve problems such as easy leakage of contact information, achieve the effects of improving security, preventing information leakage, and improving user experience

Inactive Publication Date: 2017-01-18
BEIJING BENY WAVE SCI & TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method and device for securely processing terminal contacts, which are used to solve the problem that contact information is easily leaked in existing terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal contact security processing method and device
  • Terminal contact security processing method and device
  • Terminal contact security processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0021] figure 1 It is a schematic flowchart of Embodiment 1 of the terminal contact security processing method provided by the present invention, as shown in figure 1 As shown, the method includes:

[0022] S101. The terminal receives contact sub-information security level setting information input by a user.

[0023] Wherein, the contact sub-i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal contact person security processing method and device. The method comprises the steps that a terminal receives contact person information security level setting information; the terminal looks up contact person sub-information hiding strategies corresponding to the security level setting information in a preset security strategy database according to the security level setting information; the terminal hides contact person sub-information according to the contact person sub-information hiding strategies and identifies corresponding security levels on the contact person sub-information. By adopting the terminal contact person security processing method and device, classified security levels of the contact person sub-information is achieved, different hiding strategies can be flexibly taken on different contact person sub-information according to the user demands in a user-defined mode, the security of the contact person sub-information is greatly improved, information leakage is prevented, and the user experience is further improved.

Description

technical field [0001] The present invention relates to communication technology, in particular to a terminal contact security processing method and device. Background technique [0002] With the rapid development of communication technology, smart terminals (such as mobile phones, tablet computers, etc.) are also widely used in daily life. Users often store contact information in their own smart terminals. The contact information can include: name, phone number, and some privacy of the contact, such as work unit, position, email, address, etc. . [0003] In the prior art, as long as the contact list of the user terminal can be opened, all the information in the contact list can be seen, which makes the contact information in the contact list easily leaked. Contents of the invention [0004] The present invention provides a method and device for securely processing terminal contacts, which are used to solve the problem that contact information is easily leaked in existin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/725H04M1/2745
Inventor 张峰懿毛波
Owner BEIJING BENY WAVE SCI & TECH