Communication identification processing method, device and terminal

A processing method and communication technology, applied in security devices, wireless communication, message/mailbox/announcement, etc., can solve the problem of inability to effectively reduce the risk of communication identification being leaked, so as to reduce the risk of being leaked and reduce the risk of being leaked. Risk, achieve the effect of protection

Active Publication Date: 2021-12-03
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method can only hide the communication identification from the interface level, and there are many ways to derive the hidden communication identification from the system of the mobile terminal device, but it cannot effectively reduce the risk of the communication identification being leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication identification processing method, device and terminal
  • Communication identification processing method, device and terminal
  • Communication identification processing method, device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0043] The terminology used in the present disclosure is for the purpose of describing particular embodiments only, and is not intended to limit the present disclosure. As used in this disclosure and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure provides a communication identification processing method, device and terminal. A specific implementation of the method includes: when receiving communication information, obtaining the communication identification corresponding to the communication information; The identification is encrypted to obtain the ciphertext data of the communication identification; the ciphertext data of the communication identification is used for recording and privacy display. In this embodiment, since the operating system encrypts the communication identification through the wireless interface layer, the application layer of the operating system cannot obtain the communication identification, but can only obtain the ciphertext data of the communication identification, thereby realizing the protection of the communication identification from the system level. It effectively prevents the communication identification from being derived from the system of the mobile terminal, and reduces the risk of the communication identification being leaked.

Description

technical field [0001] The present disclosure relates to the technical field of computer software, and in particular to a method, device and terminal for processing communication identifiers. Background technique [0002] With the continuous development of mobile communication technology, more and more mobile terminal devices used for communication are used in people's life and work, providing more convenience for people's life and work. At present, for some industries, in order to prevent the loss of customer resources, hiding business communication logos has become an important requirement. Generally speaking, in related technologies, the communication identification is hidden from the application level of the mobile terminal device. However, this method can only hide the communication identification from the interface level, and there are many ways to derive the hidden communication identification from the system of the mobile terminal device, but cannot effectively redu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/14H04W12/02
Inventor 杨克绚王乐
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products