Information protecting method, terminal equipment and computer-readable storage medium
A technology for terminal equipment and information protection, applied in the field of communication, can solve problems such as low information security and mobile phones are easy to leak information, and achieve the effect of improving security
Inactive Publication Date: 2018-04-13
SHENZHEN GIONEE COMM EQUIP
3 Cites 2 Cited by
AI-Extracted Technical Summary
Problems solved by technology
[0004] Therefore, when the mobile phone receives an incoming call, the mobile phone is in a si...
Method used
Compared with implementing the terminal equipment described in Fig. 3, by implementing the terminal equipment described in Fig. 4, the terminal equipment prevents incoming calls and simulates the normal incoming call process when obtaining the information that the answer verification fails, that is, playing the pre-stored recording, The security of the information in the terminal device can be effectively protected. And the audio information of the user who uses the terminal device is collected and saved to the target folder, which can provide the user with evidence that others use the terminal device. In order to prevent the contact of the incoming call from repeatedly calling and putting the information of the terminal device in a more dangerous situation, the terminal device will send a preset text message to the caller after blocking the above-mentioned incoming call and directly block it after detecting that the contact to which the incoming call belongs has made multiple calls. The contact's incoming call is exempted from all subsequent answering and verification processes, further reducing the possibility of information leakage in the terminal device. However, if the user himself opens the target folder, the call blocking for the contact can be lifted, and the content of the interface displayed by the terminal device after detecting the incoming call of the contact belonging to the target contact is not the real information of the contact, but the terminal The information pre-stored in the device, so as to combine with the actual scene, the security of the information in the terminal device is improved.
Compared with the invention embodiment 1, through the method described in the invention embodiment 2, when the terminal device obtains the information that the answering verification fails, the incoming call is prevented and the normal incoming call process is simulated, that is, the pre-stored recording is played, which can effectively protect the terminal device Security of information in . And the audio information of the user who uses the terminal device is collected and saved to the target folder, which can provide the user with evidence that others use the terminal device. In order to prevent the contact of the incoming call from repeatedly calling and putting the information of the termin...
Abstract
An embodiment of the invention discloses an information safety method, terminal equipment and a computer-readable storage medium, wherein the method comprises the steps of after the terminal equipmentreceives incoming call information, acquiring contact person kind to which an incoming call party is affiliated; on the condition that the contact person kind belongs to an objective kind, performinganswering verification; and on the condition that answering verification is not passed, stopping the incoming call and simulating a process of normally answering the incoming call. According to the information safety method, the terminal equipment and the computer-readable storage medium, through classifying the contact persons and performing answering verification on the incoming call of the objective contact person, stopping the incoming call and simulating the normal answering process on the condition that answering verification is not passed, information safety in the terminal equipment can be improved.
Application Domain
Automatic call-answering/message-recording/conversation-recordingRecord information storage +2
Technology Topic
Terminal equipmentComputer engineering +2
Image
Examples
- Experimental program(1)
Example Embodiment
[0066] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention.
[0067] It should be understood that when used in this specification and the appended claims, the terms "including" and "including" indicate the existence of the described features, wholes, steps, operations, elements and/or components, but do not exclude one or The existence or addition of multiple other features, wholes, steps, operations, elements, components, and/or collections thereof.
[0068] It should also be understood that the terms used in this specification of the present invention are only for the purpose of describing specific embodiments and are not intended to limit the present invention. As used in the specification of the present invention and the appended claims, unless the context clearly indicates other circumstances, the singular forms "a", "an" and "the" are intended to include plural forms.
[0069] It should be further understood that the term "and/or" used in the specification and appended claims of the present invention refers to any combination of one or more of the items listed in the associated list and all possible combinations, and includes these combinations .
[0070] As used in this specification and the appended claims, the term "if" can be interpreted as "when" or "once" or "in response to determination" or "in response to detection" depending on the context . Similarly, the phrase "if determined" or "if detected [described condition or event]" can be interpreted as meaning "once determined" or "in response to determination" or "once detected [described condition or event]" depending on the context ]" or "in response to detection of [condition or event described]".
[0071] In specific implementation, the terminal devices described in the embodiments of the present invention include but are not limited to other portable devices such as mobile phones, laptop computers, or tablet computers with touch-sensitive surfaces (for example, touch screen displays and/or touch pads) . It should also be understood that in some embodiments, the device is not a portable communication device, but a desktop computer with a touch-sensitive surface (eg, a touch screen display and/or a touch pad).
[0072] In the discussion that follows, terminal devices including displays and touch-sensitive surfaces are described. However, it should be understood that the terminal device may include one or more other physical user interface devices such as a physical keyboard, mouse, and/or joystick.
[0073] The terminal device supports various applications, such as one or more of the following: drawing application, presentation application, word processing application, website creation application, disk burning application, spreadsheet application, game application, telephone Apps, video conferencing apps, email apps, instant messaging apps, exercise support apps, photo management apps, digital camera apps, digital camera apps, web browsing apps, digital music player apps And/or digital video player application.
[0074] Various application programs that can be executed on the terminal device can use at least one common physical user interface device such as a touch-sensitive surface. One or more functions of the touch-sensitive surface and the corresponding information displayed on the terminal device can be adjusted and/or changed between applications and/or within corresponding applications. In this way, the common physical architecture (for example, touch-sensitive surface) of the terminal device can support various applications with user interfaces that are intuitive and transparent to the user.
[0075] See figure 1 Is a schematic flowchart of an information protection method provided by an embodiment of the present invention. As shown in the figure, the information protection method may include:
[0076] 101: After receiving the incoming call information, the terminal device obtains the contact category to which the caller belongs.
[0077] In the embodiment of the present invention, the terminal equipment receiving the incoming call information means that the terminal equipment receives a signal containing the caller number and other information sent by a node (such as a base station) in the communication network. After the terminal equipment receives the above incoming call information, the terminal The device can compare the caller number in the caller information with each contact number in the target folder in the terminal device or the contact list in the phone application. If it is in the contact list in the above target folder If a contact number consistent with the above-mentioned caller number is found, the contact category to which the call belongs is the target contact. If the contact number information consistent with the above-mentioned caller number information is found in the contact list in the above-mentioned phone application, the The contact category to which the call belongs is general contact.
[0078] Further, if a general contact calls, the user can directly answer the general contact's call without passing the answer verification. If the target contact calls, the user needs to pass the answer verification to answer the target contact's call.
[0079] It should be noted that the target folder is pre-designated by the user or automatically generated by the terminal device, and is used to store incoming call information, short messages, or social application messages of contacts belonging to the target contact category.
[0080] It should be noted that the contact category can be set by the user in the contact list in the phone application or the contact list in the target folder. Depending on the contact category to which it belongs, the contact information can be set in the phone application or The contact list in the target folder is viewed. If the contact number that matches the above caller number is not found in the above phone application or the contact list in the target folder, the type of the caller’s contact defaults to unfamiliar contact People, and can directly answer the call of the strange contact without passing the answer verification.
[0081] 102: When the contact category belongs to the target category, perform answer verification.
[0082] In the embodiment of the present invention, if it is detected in step 101 that the contact category to which the caller belongs is the target category, the waiting interface is displayed first, and then the answer verification is performed.
[0083] It should be noted that the waiting display interface contains preset numbers, blank avatars, preset attribution addresses, user tags, etc. Answer verification includes fingerprint verification, facial contour verification or iris information, fingerprint verification includes full-screen fingerprint recognition or ultrasonic fingerprint recognition, etc. Among them, the preset number includes the call-back invalid or the empty number automatically generated by the system, and the user mark is a mark that simulates other users as the preset number, such as lottery lottery, machine market research, telecom fraud or advertising, etc. The preset attribution The address is the province or city that the incoming call belongs to, etc. set by the system.
[0084] For example, the terminal device recognizes the contact category of the caller as the target contact, and then displays the waiting interface and then starts the answer verification, such as fingerprint recognition. When the user answers the call, slide the answer button, and the terminal device receives the answer instruction At the same time, the user's fingerprint information is obtained, or the terminal device obtains the fingerprint of another preset place on the screen. The terminal device does not respond immediately after receiving the answering instruction, but compares the user's fingerprint information obtained above with the fingerprint information pre-stored in the terminal device. If they are consistent, the normal answered interface is displayed, that is The waiting interface that contains the name, avatar, attribution and other information of the contact of the incoming call, responds to the above-mentioned answering instruction after displaying the normal answering interface; if inconsistent, the preset has been answered interface is displayed, that is, it can contain the preset Number, blank avatar, and preset attribution address, etc. Contacts in the same target contact category can correspond to different preset numbers, blank avatars, and preset attribution addresses, etc. After displaying the preset answered interface, the terminal device does not In response to the above-mentioned answering instruction, step 103 is executed.
[0085] 103: In the case that the answer verification fails, block incoming calls and simulate the process of normal answering calls.
[0086] In the embodiment of the present invention, if the answer verification in step 102 fails, the incoming call will be blocked. If the terminal device receives the answer instruction, it will simulate the process of answering the incoming call normally, that is, it will display the preset answer that has been answered. Play the preset recording after the interface.
[0087] Optionally, if the terminal device acquires the fingerprint from the non-answer button, if the terminal device acquires the fingerprint but does not receive the instruction to answer, the incoming call will be blocked, and the interface that the other party has hung up is displayed after the preset duration , Where the preset duration includes two seconds or ten seconds, etc.
[0088] It should be noted that the preset recording is a pre-recorded sound, including the phone has been hung up, noise or busy tone, etc.
[0089] Optionally, in the case that the answer verification fails, the terminal device activates the camera and/or microphone to obtain audio information, and saves the audio information to the target folder after obtaining the above audio information, where the audio information includes sound and/or images Etc., where the target folder is pre-designated by the user or automatically generated by the terminal device, and is used to store the aforementioned audio information and incoming call information, short messages, or social application messages of contacts belonging to the target contact category.
[0090] Optionally, after blocking the call, send a preset short message to the contact. If two or more calls from the contact are detected, the call will be blocked immediately after receiving the call information from the contact, that is, the terminal After the device receives an incoming call, it does not display the call prompt, such as the waiting interface.
[0091] Optionally, when the terminal device receives a shutdown instruction or a hang-up instruction, it can also block the incoming call immediately after accepting the incoming call and not display the incoming call prompt.
[0092] For example, after blocking the aforementioned incoming call, the terminal device sends a unified preset short message "It is not convenient to answer the call now, and I will call you back later" to the incoming contact.
[0093] Optionally, different contacts that belong to the same target contact category can receive different preset short messages, that is, after blocking the above-mentioned call, the terminal device detects the preset short message corresponding to the contact of the incoming call. If no contact with the incoming call is detected If the preset short message corresponding to the contact is sent, the unified preset short message is sent, that is, different contacts belonging to the target contact category receive the same short message. On the contrary, if the preset short message corresponding to the incoming contact is detected , Then send the detected preset message.
[0094] For example, the above preset text message can be "Mr. Wang, it is not convenient for me to answer the call now, and the things you entrusted are progressing smoothly, please rest assured. I will call you back later.".
[0095] Further optionally, after receiving an incoming call from a contact, immediately block the incoming call, and then obtain the incoming call record of the incoming contact and save it to the target folder. If the terminal device receives the instruction to open the target folder, unblock the incoming call The operation of a person's incoming call, and display the waiting interface when an incoming call from a contact is detected.
[0096] It should be noted that the terminal device can use the information protection method described in the embodiment of the present invention when the screen is locked or unlocked.
[0097] Through the embodiment of the present invention, the terminal device can classify the contacts to classify the contacts that need key protection into target contacts. When a contact belonging to the target contact category calls, the terminal device detects that it is using Whether the terminal device is the user himself, if it is the user himself, the instruction to answer the call is executed normally, if it is not the user himself, the incoming call is blocked and the normal answering process is simulated, thereby protecting the answering and the user's information security, and avoiding others The blocking of answering the phone makes the information more easily exposed and strengthens the security of the information.
[0098] See figure 2 Is a schematic flowchart of another information protection method provided by an embodiment of the present invention. As shown in the figure, the information protection method may include:
[0099] 201: The terminal device receives incoming call information.
[0100] In the embodiment of the present invention, the terminal equipment receiving the incoming call information means that the terminal equipment receives a signal containing the caller number and other information sent by a node (such as a base station) in the communication network, that is, the terminal equipment receives the above incoming call information, where: The caller information includes the caller's number, etc.
[0101] 202: Obtain the contact category to which the caller belongs.
[0102] In the embodiment of the present invention, after the terminal device receives the above-mentioned incoming call information, the terminal device can compare the caller number in the incoming call information with the target folder in the terminal device or each contact number in the contact list in the phone application Perform a one-to-one comparison. If a contact number that is consistent with the above-mentioned caller number is found in the contact list in the above-mentioned target folder, the contact category to which the call belongs is the target contact. If the contact in the above-mentioned phone application If the contact number information consistent with the above-mentioned caller number information is found in the person list, the contact category to which the call belongs is a general contact.
[0103] It should be noted that the target folder is pre-designated by the user or automatically generated by the terminal device, and is used to store incoming call information, short messages, or social application messages of contacts belonging to the target contact category.
[0104] It should be noted that the contact category can be set by the user in the contact list in the phone application or the contact list in the target folder. Depending on the contact category to which it belongs, the contact information can be set in the phone application or The contact list in the target folder is viewed. If the contact number that matches the above caller number is not found in the above phone application or the contact list in the target folder, the type of the caller’s contact defaults to unfamiliar contact People, and can directly answer the call of the strange contact without passing the answer verification.
[0105] 203: The above contact category belongs to the target category?
[0106] In the embodiment of the present invention, the method in step 202 is used to detect whether the contact category to which the call belongs is the target contact. If a general contact calls, the user can directly answer the call from the general contact without going through the answer verification. If the target contact calls, the user needs to pass answer verification to answer the call from the target contact.
[0107] 204: Display a waiting interface. The waiting interface displays a preset number, a blank avatar, and a preset home address.
[0108] In the embodiment of the present invention, if the terminal device detects that the contact category to which the incoming call belongs is the target contact, it displays a waiting interface. The waiting interface is a display interface preset by the system, and the displayed content is not the target contact. People’s information is displayed in the same way as when an unfamiliar contact or an incoming call is marked as a nuisance.
[0109] It should be noted that the waiting display interface contains preset numbers, blank avatars, preset attribution addresses, user tags, etc. The preset numbers include invalid callbacks or empty numbers automatically generated by the system, and the user is marked as simulating other users. The mark of the preset number, such as lottery lottery, machine market research, telecommunications fraud or advertising, etc. The preset home address is the province or city set by the system to which the call belongs.
[0110] 205: Perform answer verification.
[0111] In the embodiment of the present invention, after the terminal device detects that the contact category to which the incoming call belongs is the target contact and displays an interface waiting to be answered, the answer verification is performed.
[0112] It should be noted that the answer verification includes fingerprint verification, facial contour verification or iris information, and fingerprint verification includes full-screen fingerprint recognition or ultrasonic fingerprint recognition.
[0113] 206: Answer verification passed?
[0114] In the embodiment of the present invention, after obtaining the verification information, the terminal device compares the verification information with the pre-stored verification information, if they are consistent, the answer verification is passed, if they are inconsistent, the answer verification fails, and step 207 is executed.
[0115] For example, the terminal device recognizes the contact category of the caller as the target contact, and then displays the waiting interface and then starts the answer verification, such as fingerprint recognition. When the user answers the call, slide the answer button, and the terminal device receives the answer instruction At the same time, the user's fingerprint information is obtained, or the terminal device obtains the fingerprint of another preset place on the screen. The terminal device does not respond immediately after receiving the answering instruction, but compares the user's fingerprint information obtained above with the fingerprint information pre-stored in the terminal device. If they are consistent, the normal answered interface is displayed, that is The waiting interface that contains the name, avatar, attribution and other information of the contact of the incoming call, responds to the above-mentioned answering instruction after displaying the normal answering interface; if inconsistent, the preset has been answered interface is displayed, that is, it can contain the preset Number, blank avatar, and preset attribution address, etc. Contacts in the same target contact category can correspond to different preset numbers, blank avatars, and preset attribution addresses, etc. After displaying the preset answered interface, the terminal device does not Respond to the above instructions to answer.
[0116] Optionally, if the terminal device acquires the fingerprint at the non-answering button, if the terminal device acquires the fingerprint but does not receive the instruction to answer, the preset time period of the interface displaying that the other party has hung up the call after the incoming call is blocked, where , The preset duration includes two seconds or ten seconds, etc.
[0117] 207: Block the above calls.
[0118] In the embodiment of the present invention, if the answer verification in step 206 fails, the incoming call will be blocked. If the terminal device receives the answering instruction, it will simulate the process of answering the incoming call normally, that is, it will display the preset answer that has been answered. Play the preset recording after the interface.
[0119] It should be noted that the preset recording is a pre-recorded sound, including the phone has been hung up, noise or busy tone, etc.
[0120] 208: Start the camera and microphone to obtain the audio information and save the audio information to the target folder.
[0121] In the embodiment of the present invention, if the answer verification fails in step 206, the terminal device activates the camera and/or microphone to obtain audio information, and after obtaining the above audio information, saves the audio information to the target folder.
[0122] It should be noted that the audio information includes sound and/or images, etc. The target folder is pre-designated by the user or automatically generated by the terminal device, and is used to store the above audio information and the caller information, short messages or messages of contacts belonging to the target contact category. News of social applications, etc.
[0123] It should be noted that the execution order of step 208 and step 207 is not specified in the embodiment of the present invention. Step 207 may be executed after step 208 is executed, or step 208 may be executed after step 207 is executed.
[0124] 209: Received an instruction to answer the above call?
[0125] In the embodiment of the present invention, if the terminal device determines whether the instruction to answer the incoming call is received after the incoming call is blocked, and if the instruction to answer the incoming call is received, step 210 is executed. If the instruction to answer the incoming call is not received, The preset time duration of the interface showing that the other party has hung up the call is blocked after the incoming call belongs, where the preset duration includes two seconds or ten seconds, etc.
[0126] 210: Display the answered interface, and play the preset recording after displaying the answered interface.
[0127] In the embodiment of the present invention, if in step 208, the terminal device receives the instruction to answer the above-mentioned incoming call, it displays the answered interface, and plays the preset recording after displaying the answered interface.
[0128] It should be noted that the interface that has been answered includes preset numbers, blank avatars, preset attribution addresses, user tags, etc., among them, preset numbers include invalid callbacks or empty numbers automatically generated by the system, and users are marked as imitating others The user is the mark of the preset number, such as lottery lottery, machine market research, telecommunications fraud or advertising, etc., and the preset home address is the province or city set by the system to which the call belongs.
[0129] It should be noted that the preset recording is a pre-recorded sound, including the phone has been hung up, noise or busy tone, etc.
[0130] 211: Detect the preset short message corresponding to the above contact?
[0131] In the embodiment of the present invention, the terminal device detects whether there is a preset short message corresponding to the contact of the incoming call prestored in the terminal device, that is, according to the information of the contact (including the number or name, etc.), it searches the target folder for the If the preset short message with the same contact information is detected, step 212 is executed; if not detected, step 213 is executed.
[0132] It should be noted that the aforementioned preset short messages corresponding to contacts are different short messages pre-stored according to different contacts, which are edited and saved by the user in the target folder.
[0133] It should be noted that the execution order of step 209 and step 211 is not specified in the embodiment of the present invention, and step 211 may be executed after step 209, or step 209 may be executed after step 211 is executed.
[0134] It should be noted that the terminal device can block the aforementioned call in step 207, and when the terminal device is idle, that is, step 211 can be executed before or after the instruction to answer the aforementioned call is received in step 209, which is not limited in the present invention. .
[0135] 212: Send the aforementioned preset short message.
[0136] In the embodiment of the present invention, if the terminal device detects the preset short message corresponding to the aforementioned contact of the incoming call, the preset short message is sent.
[0137] For example, the above preset text message can be "Mr. Wang, it is not convenient for me to answer the call now, and the things you entrusted are progressing smoothly, please rest assured. I will call you back later.".
[0138] 213: Send a unified preset short message.
[0139] In the embodiment of the present invention, if the terminal device does not detect the preset short message corresponding to the aforementioned contact of the incoming call, the unified preset short message is sent.
[0140] It should be noted that the aforementioned unified preset short message is different from the aforementioned preset short message, and the unified preset short message is generated by the system.
[0141] For example, the unified preset text message sent to the caller can be "It is not convenient to answer the call now, I will call you back later" or "Mr. Wang, it is not convenient to answer the call now, I will call you back later", according to the above If the name of the contact is different, the system will automatically replace the name in the SMS.
[0142] Optionally, different contacts that belong to the same target contact category can receive different preset short messages, that is, after blocking the above-mentioned call, the terminal device detects the preset short message corresponding to the contact of the incoming call. If no contact with the incoming call is detected If the preset short message corresponding to the contact is sent, the unified preset short message is sent, that is, different contacts belonging to the target contact category receive the same short message. On the contrary, if the preset short message corresponding to the incoming contact is detected , Then send the detected preset message.
[0143] 214: Two or more incoming calls from the above contacts have been detected?
[0144] In the embodiment of the present invention, if the previous answer verification fails and the aforementioned incoming call is blocked, if two or more incoming calls from the contact are detected, step 215 is executed.
[0145] 215: Block the call immediately after receiving the call from the contact.
[0146] In the embodiment of the present invention, if the previous answer verification fails and the aforementioned incoming call is blocked, two or more incoming calls from the contact are detected, then the incoming call will be blocked immediately after receiving the call information from the contact, that is, After receiving the incoming call, the terminal device does not display the incoming call prompt, such as the waiting interface.
[0147] Optionally, when the terminal device receives a shutdown instruction or a hang-up instruction, it can also block the incoming call immediately after accepting the incoming call and not display the incoming call prompt.
[0148] 216: Obtain the incoming call record of the above contact and save it in the target folder.
[0149] In the embodiment of the present invention, after step 215, the incoming call record of the aforementioned contact is obtained and stored in the target folder.
[0150] It should be noted that the aforementioned call record includes caller information, call time, and number of calls.
[0151] 217: Received an instruction to open the target folder?
[0152] In the embodiment of the present invention, if the terminal device receives an instruction to open the target folder, step 218 is executed, and if not, no operation is executed.
[0153] 218: Unblock the operation of the incoming call from the aforementioned contact, and display the waiting interface when the incoming call from the contact is detected.
[0154] In the embodiment of the present invention, if the terminal device receives an instruction to open the target folder, the operation of blocking the incoming call from the aforementioned contact is unblocked, and the waiting interface is displayed when the incoming call from the contact is detected.
[0155] It should be noted that the above-mentioned target folder includes a folder in the terminal device file manager or a folder in other applications.
[0156] Compared with the first embodiment of the invention, through the method described in the second embodiment of the invention, the terminal device blocks the incoming call and simulates the normal incoming call process when it obtains the information that the answer verification fails, that is, plays the pre-stored recording, which can effectively protect the information in the terminal device Security. Moreover, the audio information of the user who uses the terminal device is collected and saved to the target folder, which can provide the user with evidence of others using the terminal device. In order to prevent the repeated calls from the incoming contact making the information of the terminal device more dangerous, the terminal device will send a preset short message to the caller after blocking the above-mentioned call, and directly block it after detecting multiple calls from the contact to which the call belongs The incoming call of this contact eliminates all subsequent procedures of answering and verifying, further reducing the possibility of information leakage in the terminal device. However, if the user opens the target folder himself, the call blocking for the contact can be unblocked, and the content of the interface displayed after the terminal device detects the call from the contact belonging to the target contact is not the real information of the contact, but the terminal The information pre-stored in the device, combined with actual scenarios, improves the security of the information in the terminal device.
[0157] The embodiment of the present invention also provides a terminal device, which is used to execute a unit of any one of the foregoing methods. Specifically, see Figure 4 Is a schematic block diagram of a terminal device according to an embodiment of the present invention. The terminal device of this embodiment includes: a receiving unit 301, an acquiring unit 302, a verification unit 303, and a control unit 304.
[0158] The receiving unit 301 is configured to receive incoming call information.
[0159] The obtaining unit 302 is configured to obtain the contact category to which the caller belongs after the receiving unit 301 receives the incoming call information.
[0160] The verification unit 303 is configured to perform answer verification when the contact category belongs to the target category;
[0161] The control unit 304 is configured to block the incoming call and simulate the process of normally answering the call when the answer verification fails.
[0162] By implementing image 3 The described terminal device, the terminal device can classify the contacts to classify the contacts that need key protection into target contacts. When a contact belonging to the target contact category calls, the terminal device detects that it is in use by answering the verification Whether the terminal device is the user himself, if it is the user himself, the instruction to answer the call is executed normally, if it is not the user himself, the incoming call is blocked and the normal answering process is simulated, thereby protecting the answering and the user's information security, and avoiding others The blocking of answering the phone makes the information more easily exposed and strengthens the security of the information.
[0163] Please refer to Figure 4 , Figure 4 It is a schematic structural diagram of another terminal device disclosed in an embodiment of the present invention. among them, Figure 4 The terminal equipment shown is made by image 3 The terminal equipment shown is optimized. versus image 3 Compared with the terminal equipment shown, Figure 4 Among the terminal devices shown:
[0164] The control unit 304 is also configured to, if the receiving unit 301 receives an instruction to answer an incoming call, play a preset recording after displaying the answered interface.
[0165] The control unit 304 is also configured to activate the camera and microphone to obtain audio information and save the audio information to the target folder when the verification unit 303 fails to pass the answer verification.
[0166] In the embodiment of the present invention, Figure 4 The terminal device shown may also include:
[0167] The sending unit 305 is configured to send a preset short message to the contact after the control unit 304 blocks the incoming call.
[0168] In the embodiment of the present invention, the control unit 304 is further configured to block the incoming call immediately after receiving the incoming call information from the contact if two or more incoming calls from the contact are detected.
[0169] The obtaining unit 302 is further configured to obtain the call history of the contact after the control unit 304 blocks the call from the contact.
[0170] The control unit 304 is also configured to save the incoming call record in the target folder after the obtaining unit obtains the incoming call record.
[0171] The control unit is also used for unblocking the call from the contact if the receiving unit receives the instruction to open the target folder.
[0172] In the embodiment of the present invention, Figure 4 The terminal device shown may also include:
[0173] The display unit 306 is configured to display the waiting interface after the control unit 304 releases the operation of the call from the contact and detects the call from the contact.
[0174] In the embodiment of the present invention, the control unit 304 is further configured to detect the preset short message corresponding to the contact after the sending unit 305 sends the preset short message to the contact;
[0175] The sending unit 305 is further configured to send a unified preset short message if the control unit 304 does not detect the preset short message, and if the control unit 304 detects the preset short message, then send the preset short message.
[0176] The display unit 306 is also configured to display a waiting interface before the verification unit 303 performs the answer verification when the acquiring unit 302 acquires that the contact category belongs to the target category, and the waiting interface displays the preset number, blank avatar, and preset Home address.
[0177] Compare and implement image 3 The described terminal equipment, by implementing Figure 4 The described terminal device prevents incoming calls and simulates the normal incoming call process when the terminal device obtains the information that the answer verification fails, that is, plays a pre-stored recording, which can effectively protect the security of the information in the terminal device. Moreover, the audio information of the user who uses the terminal device is collected and saved to the target folder, which can provide the user with evidence of others using the terminal device. In order to prevent the repeated calls from the incoming contact making the information of the terminal device more dangerous, the terminal device will send a preset short message to the caller after blocking the above-mentioned call, and directly block it after detecting multiple calls from the contact to which the call belongs The incoming call of this contact eliminates all subsequent procedures of answering and verifying, further reducing the possibility of information leakage in the terminal device. However, if the user opens the target folder himself, the call blocking for the contact can be unblocked, and the content of the interface displayed after the terminal device detects the call from the contact belonging to the target contact is not the real information of the contact, but the terminal The information pre-stored in the device, combined with actual scenarios, improves the security of the information in the terminal device.
[0178] See Figure 5 Is a structural block diagram of a terminal device provided by an embodiment of the present invention. The terminal device in this embodiment as shown in the figure may include: one or more processors 601; one or more input devices 602, one or more output devices 603, a memory 604, and a communication interface 605. The aforementioned processor 601, input device 602, output device 603, memory 604, and communication interface 605 are connected via a bus 606. The memory 602 is configured to store a computer program, and the computer program includes program instructions, and the processor 601 is configured to execute the program instructions stored in the memory 602.
[0179] The processor 601 is used to perform the function of the receiving unit 301 to receive incoming call information; it is also used to perform the function of the obtaining unit 302 to obtain the contact category to which the caller belongs after the receiving processor 601 receives the incoming call information ; It is also used to perform the function of the verification unit 303, used to perform answer verification when the contact category belongs to the target category; also used to perform the function of the control unit 304, used to prevent the answer verification fails Incoming calls and the process of simulating a normal answering call.
[0180] The input device 601 is used to obtain answer verification information and instructions for answering incoming calls.
[0181] In the embodiment of the present invention, the processor 601 is further configured to, if the processor 601 receives an instruction to answer an incoming call, play the preset recording after displaying the answered interface; it is also used to perform the answer verification failed by the processor 601 In the case of, start the camera and microphone to obtain audio information, save the audio information to the target folder; also used to detect two or more calls from the contact, after receiving the call information from the contact Blocking incoming calls immediately is also used to obtain the incoming call records of the contact after the processor 601 blocks incoming calls from the contact; it is also used to save the incoming call record to the target folder after the obtaining unit obtains the incoming call record; and it is also used if the receiving unit receives When the instruction to open the target folder is reached, the operation of blocking incoming calls from the contact is unblocked; it is also used to detect the preset short message corresponding to the contact after the communication interface 605 sends the preset short message to the contact
[0182] In the embodiment of the present invention, an output device 602 is also included, which is used to execute the function of the display unit 306, and is used to display the waiting interface after the processor 601 releases the call from the contact and detects the call from the contact; When the processor 601 obtains that the contact category belongs to the target category, before the processor 601 performs answer verification, display a waiting interface, and the waiting interface displays a preset number, a blank avatar, and a preset home address.
[0183] The communication interface 605 is used to perform the functions of the communication interface 605, and is used to send a preset short message to the contact after the processor 601 blocks the incoming call. Further, if the processor 601 does not detect the preset short message, then send a unified preset short message, if the processor 601 detects the preset short message, then send the preset short message.
[0184] It should be understood that in the embodiment of the present invention, the so-called processor 601 may be a central processing unit (Central Processing Unit, CPU), and the processor may also be other general-purpose processors, digital signal processors (Digital Signal Processors, DSP), and dedicated Integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
[0185] The input device 602 may include a touch panel, a fingerprint sensor (used to collect user fingerprint information and fingerprint orientation information), a microphone, etc., and the output device 603 may include a display (LCD, etc.), a speaker, etc.
[0186] The memory 604 may include a read-only memory and a random access memory, and provides instructions and data to the processor 601. A part of the memory 604 may also include a non-volatile random access memory. For example, the memory 604 may also store device type information.
[0187] In specific implementation, the processor 601, input device 602, and output device 603 described in the embodiment of the present invention can execute the implementations described in the first embodiment and the second embodiment of the information protection method provided by the embodiment of the present invention. In the manner, the implementation manner of the terminal device described in the embodiment of the present invention can also be implemented, which will not be repeated here.
[0188] In another embodiment of the present invention, a computer-readable storage medium is provided. The computer-readable storage medium stores a computer program, the computer program includes program instructions, and the program instructions are executed by a processor.
[0189] The computer-readable storage medium may be an internal storage unit of the terminal device of any of the foregoing embodiments, such as the hard disk or memory of the terminal device. The computer-readable storage medium can also be an external storage device of the terminal device, such as a plug-in hard disk equipped on the terminal device, a smart memory card (Smart Media Card, SMC), a Secure Digital (SD) card, and a flash memory card (Flash). Card) and so on. Further, the computer-readable storage medium may also include both an internal storage unit of the terminal device and an external storage device. The computer-readable storage medium is used to store computer programs and other programs and data required by the terminal device. The computer-readable storage medium can also be used to temporarily store data that has been output or will be output.
[0190] Those of ordinary skill in the art may realize that the units and algorithm steps of the examples described in the embodiments disclosed herein can be implemented by electronic hardware, computer software, or a combination of the two, in order to clearly illustrate the hardware and software Interchangeability. In the above description, the composition and steps of each example have been generally described in accordance with the function. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered as going beyond the scope of the present invention.
[0191] Those skilled in the art can clearly understand that for the convenience and conciseness of description, the specific working process of the terminal device and unit described above can refer to the corresponding process in the foregoing method embodiment, which is not repeated here.
[0192] In the several embodiments provided in this application, it should be understood that the disclosed terminal device and method may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or integrated. To another system, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may also be electrical, mechanical or other forms of connection.
[0193] The units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments of the present invention.
[0194] In addition, the functional units in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit. The above-mentioned integrated unit can be realized in the form of hardware or software functional unit.
[0195] If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium. Based on this understanding, the technical solution of the present invention is essentially or the part that contributes to the existing technology, or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium. Among them, several instructions are included to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods in each embodiment of the present invention. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program code .
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Trusted computing platform chip applicable to mobile communication equipment and authentication method thereof
Owner:HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
Capacity calling method, capacity calling request device, capacity calling platform and capacity calling system
Owner:CHINA MOBILE COMM GRP CO LTD
Method, device and system for sending and receiving scheduling user data information
Owner:HUAWEI TECH CO LTD
Hidden frame glass curtain wall structure and method for mounting same
Owner:XINCHANG SICHUANG DESIGN CONSULTING CO LTD
Classification and recommendation of technical efficacy words
- improve security
Automatic charging system for electric automobile
Owner:WUHAN INSTITUTE OF TECHNOLOGY
Block chain system, and data storage method and apparatus
Owner:ADVANCED NEW TECH CO LTD
Pesticide micro-capsule granules and preparation method thereof
Owner:联合国南通农药剂型开发中心 +1
Method for achieving user authentication by utilizing camera
Owner:湖北微模式科技发展有限公司