CN102316197A - Method for acquiring contact information and device - Google Patents
Method for acquiring contact information and device Download PDFInfo
- Publication number
- CN102316197A CN102316197A CN201110264082A CN201110264082A CN102316197A CN 102316197 A CN102316197 A CN 102316197A CN 201110264082 A CN201110264082 A CN 201110264082A CN 201110264082 A CN201110264082 A CN 201110264082A CN 102316197 A CN102316197 A CN 102316197A
- Authority
- CN
- China
- Prior art keywords
- associated person
- person information
- application module
- access rights
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a method for acquiring contact information and a device, which relate to the technical field of communication and are invented for comprehensively protecting the contact information of a user. The method comprises the following steps of: setting an access right for the contact information, wherein the access right comprises the quantity and types of application modules allowed to access the contact information; receiving requests for acquiring the contact information sent by the application modules; judging whether the application modules have rights to acquire the contact information according to the access right; and when the application modules have rights to acquire the contact information, transmitting the contact information to the application modules. The method and the device are mainly applied to the field of protection of terminal information.
Description
Technical field
The present invention relates to communication technical field, relate in particular to a kind of method and device that obtains associated person information.
Background technology
Associated person information in the address list is the personal information of mobile phone users, allows to obtain privately associated person information for preventing other people without the user, and portable terminal tends to the associated person information in the address list is protected.
The technology of existing protection associated person information is that the address list to portable terminal carries out password setting, the correct user capture associated person information that allows of password input, the incorrect user capture associated person information of then forbidding of password input.
State in realization in the process of protection associated person information; The inventor finds to exist at least in the prior art following problem: after the user is provided with password to address list; Though other people associated person information in can't accessing address list; But still can obtain associated person information, really not reach the purpose of protection contact information of customer through approach such as message registration, notes.
Summary of the invention
Embodiments of the invention provide a kind of method and device that obtains associated person information, can reach the purpose of general protection contact information of customer to contact person's information setting access rights.
For achieving the above object, embodiments of the invention adopt following technical scheme:
A kind of method of obtaining associated person information comprises:
For associated person information is provided with access rights, said access rights comprise the quantity and the type of the application module that allows the said associated person information of visit;
Receive the request of obtaining said associated person information that application module sends;
Judge according to said access rights whether said application module has the right to obtain said associated person information;
When said application module has the right to obtain said associated person information, send said associated person information to said application module.
A kind of device that obtains associated person information comprises:
The unit is set, is used to associated person information access rights are set, said access rights comprise the quantity and the type of the application module that allows the said associated person information of visit;
Receiving element is used to receive the request of obtaining said associated person information that application module sends;
Judging unit is used for judging according to said access rights whether said application module has the right to obtain said associated person information;
Transmitting element is used for when said application module has the right to obtain said associated person information, sending said associated person information to said application module.
The method of obtaining associated person information and device that the embodiment of the invention provides; To contact person's information setting access rights; When application module is had no right access contact information, can't from address list, obtain this associated person information, though solved the encrypted protection of user communication record in the prior art; But associated person information can reach the purpose of general protection contact information of customer through the problem of other application modules leakages.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art; To do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below; Obviously, the accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills; Under the prerequisite of not paying creative work property, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is for obtaining the flow chart of the method for associated person information in the embodiment of the invention one;
Fig. 2 is for obtaining the flow chart of the method for associated person information in the embodiment of the invention two;
Fig. 3 is for obtaining the flow chart of the method for associated person information in the embodiment of the invention three;
Fig. 4 is for obtaining the structural representation of the device of associated person information in the embodiment of the invention four;
Fig. 5 is for obtaining the structural representation of the device of associated person information in the embodiment of the invention four;
Fig. 6 is for obtaining the structural representation of the device of associated person information in the embodiment of the invention four.
Embodiment
To combine the accompanying drawing in the embodiment of the invention below, the technical scheme in the embodiment of the invention is carried out clear, intactly description, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills are not making the every other embodiment that is obtained under the creative work prerequisite, all belong to the scope of the present invention's protection.
(Us er Equipment UE) describes for example all embodiment of the present invention, the permanent plant that said UE includes but are not limited to mobile phone, individual mobile device and comprises the address list function with subscriber equipment.
Embodiment one
The embodiment of the invention provides a kind of method of obtaining associated person information, and is as shown in Figure 1, comprises the steps:
101, for associated person information access rights are set.
These access rights comprise the quantity and the type of the application module that allows the said associated person information of visit;
102, receive the request of obtaining associated person information that application module sends.
103, judge this application module associated person information of whether having the right to obtain according to access rights.
104, when application module has the right to obtain said associated person information, send associated person information to this application module.
The method of obtaining associated person information that the embodiment of the invention provides; To contact person's information setting access rights; When application module is had no right access contact information, can't from address list, obtain this associated person information, though solved the encrypted protection of user communication record in the prior art; But associated person information can reach the purpose of general protection contact information of customer through the problem of other application modules leakages.
Embodiment two
The embodiment of the invention provides a kind of method of obtaining associated person information, and is as shown in Figure 2, comprises the steps:
201, for associated person information access rights are set.
The quantity and the type of the application module that allows the said associated person information of visit are set according to user's request; For example; Only allow the message registration module to have the authority of access contact information, and other do not have these access rights such as SMS module, one-touch easy dialing key module.
Application module described in the present invention comprises that also the user downloads and be installed in the various application software the UE through UE from the Internet except that the module that UE such as comprising message registration, caller identification, one-touch easy dialing key carries.
202, receive the request of obtaining associated person information that application module sends.
203, judge this application module associated person information of whether having the right to obtain according to the type of access rights and application module.
When within the access rights of type at said associated person information of application module, this application module has the right to obtain associated person information; When the type of application module was not within the access rights at said associated person information, this application module had no right to obtain associated person information.
For example; Comprise SMS module in the access rights and do not comprise the message registration module; If sending the request of obtaining associated person information is SMS module; Then this SMS module has the right to obtain associated person information, is the message registration module if send the request of obtaining associated person information, and then this message registration module haves no right to obtain associated person information.
204, when application module has the right to obtain associated person information, send associated person information to this application module.
The personal information that said associated person information comprises name of contact person, contact person's picture and comprise this contact person that the user of contact person's email address etc. is provided with in address list.
205, when application module haves no right to obtain associated person information, do not send associated person information to this application module.
The personal information that said associated person information comprises name of contact person, contact person's picture and comprise this contact person that the user of contact person's email address etc. is provided with in address list.
Present embodiment is that associated person information is provided with access rights according to user's demand, and the application module within access rights does not have no right to obtain associated person information, for example; SMS module is when receiving note; The SMS module record sends the phone number of this note, and when the user checked note, SMS module was to the corresponding name of contact person of this phone number of address list request; So that said phone number is replaced with this name, make things convenient for the user to check note.When SMS module is not within access rights, have no right from address list, to obtain the name of contact person of this phone number, when checking note, this note only shows this phone number, thereby has reached the purpose of protection associated person information.
Perhaps download and installed a application software on the UE users from networks; This application software comprises the program package that malice is obtained user profile; Can obtain information such as name that UE goes up the contact person, phone number, email address; And send advertisement SMS and spam to the contact person through this information, or register the contact person as website members, also or that associated person information is backuped to the webserver is first-class.When said application software was not within access rights, said application software had no right from the address list of UE, to obtain associated person information, therefore also just can't implement above-mentioned malicious act.
In addition, when having added new associated person information in user's the address list, if the user then is provided with this associated person information automatically and has access rights, so that protect this associated person information not to the conduct interviews setting of authority of this associated person information.
The method of obtaining associated person information that the embodiment of the invention provides; To contact person's information setting access rights;, application module haves no right from address list, to obtain this associated person information when not having the authority of access contact information; Though solved the encrypted protection of user communication record in the prior art; But associated person information can pass through the problem that other application modules such as message registration, note are revealed, and has also solved applications software malice simultaneously and has obtained associated person information and carry out malfeasant problem, has reached the purpose of general protection contact information of customer.
Embodiment three
The embodiment of the invention provides a kind of method of obtaining associated person information, and is as shown in Figure 3, comprises the steps:
301, the access rights of different stage are set according to contact person's significance level.
Present embodiment can be according to UE user's the needs access rights to contact person's information setting different stage; Be general rank for example with the ordinary contacts information setting; Associated person informations such as the classmate that works together are set to severity level; Associated person informations such as household good friend are set to very severity level, and the quantity and the type of the application module that can visit the access rights setting of different stage.The quantity and the type of its application module that can visit of access rights that rank is high more are few more, if the user does not set access rights, then giving tacit consent to All Contacts's information is general level access authority.
Same in addition associated person information can have other access rights of a plurality of level, when application module is visited, is as the criterion with the highest level access rights of this associated person information.
Application module described in the present invention comprises that also the user downloads and be installed in the various application software the UE through UE from the Internet except that the module that UE such as comprising message registration, caller identification, one-touch easy dialing key carries.
302, receive the request of obtaining associated person information that application module sends.
303, judge this application module associated person information of whether having the right to obtain according to the type of access rights and application module.
When within the access rights of type at said associated person information of application module, this application module has the right to obtain associated person information; When the type of application module was not within the access rights at said associated person information, this application module had no right to obtain associated person information.
What be worth explanation is, when application module has the access rights of a certain grade, and the have the right associated person information that obtains this level access authority and be lower than this level access authority of this application module, but can't obtain the associated person information that is higher than this level access authority.
For example; Comprise SMS module in the access rights and do not comprise the message registration module; If sending the request of obtaining associated person information is SMS module; Then this SMS module has the right to obtain associated person information, is the message registration module if send the request of obtaining associated person information, and then this message registration module haves no right to obtain associated person information.
304, when application module has the right to obtain associated person information, send associated person information to this application module.
The personal information that said associated person information comprises name of contact person, contact person's picture and comprise this contact person that the user of contact person's email address etc. is provided with in address list.
305, when application module haves no right to obtain associated person information, do not send associated person information to this application module.
The personal information that said associated person information comprises name of contact person, contact person's picture and comprise this contact person that the user of contact person's email address etc. is provided with in address list.
Present embodiment is the access rights that associated person information is provided with different stage according to user's demand, and the application module within access rights does not have no right to obtain associated person information, for example; SMS module is when receiving note; The SMS module record sends the phone number of this note, and when the user checked note, SMS module was to the corresponding name of contact person of this phone number of address list request; So that said phone number is replaced with this name, make things convenient for the user to check note.When SMS module is not within access rights, have no right from address list, to obtain the name of contact person of this phone number, when checking note, this note only shows this phone number, thereby has reached the purpose of protection associated person information.
Perhaps download and installed a application software on the UE users from networks; This application software comprises the program package that malice is obtained user profile; Can obtain information such as name that UE goes up the contact person, phone number, email address; And send advertisement SMS and spam to the contact person through this information, or register the contact person as website members, also or that associated person information is backuped to the webserver is first-class.When said application software was not within access rights, said application software had no right from the address list of UE, to obtain associated person information, therefore also just can't implement above-mentioned malicious act.
In addition; When having added new associated person information in user's the address list; If the user is not to the conduct interviews setting of authority of this associated person information; It is other access rights of lowermost level that this associated person information then is set automatically, so that protect this associated person information, the access rights that the user also can this associated person information are set to other grades.
The method of obtaining associated person information that the embodiment of the invention provides; According to contact person's significance level access rights to contact person's information setting different stage;, application module haves no right from address list, to obtain this associated person information when not having the authority of access contact information; Though solved the encrypted protection of user communication record in the prior art; But associated person information can pass through the problem that other application modules such as message registration, note are revealed, and has also solved applications software malice simultaneously and has obtained associated person information and carry out malfeasant problem, has reached the purpose of general protection contact information of customer.
Embodiment four
The embodiment of the invention provides a kind of device that obtains associated person information, and is as shown in Figure 4, comprising: unit 41, receiving element 42, judging unit 43 and transmitting element 44 are set, wherein,
Receiving element 42 is used to receive the request of obtaining institute's associated person information that application module sends.
Judging unit 43 is used for judging according to access rights whether application module has the right to obtain this associated person information.
Transmitting element 44 is used for when application module has the right to obtain this associated person information, sending said associated person information to said application module.
Particularly, said judging unit 43 is judged the said application module associated person information of whether having the right to obtain according to the type of access rights and application module.
When within the access rights of type at associated person information of application module, this application module can have the right to obtain said associated person information.
When the type of application module was not within the access rights at associated person information, this application module had no right to obtain said associated person information.
For example; Comprise SMS module in the access rights and do not comprise the message registration module; If sending the request of obtaining associated person information is SMS module; Then this SMS module has the right to obtain associated person information, is the message registration module if send the request of obtaining associated person information, and then this message registration module haves no right to obtain associated person information.
The personal information that said associated person information comprises name of contact person, contact person's picture and comprise this contact person that the user of contact person's email address etc. is provided with in address list.
Further, as shown in Figure 5, the said unit 41 that is provided with also comprises:
First is provided with subelement 51, is used for according to contact person's the significance level access rights to contact person's information setting different stage the quantity and the type of the application module of different permission access contact information being set promptly.
Further, as shown in Figure 6, the said unit 41 that is provided with also comprises:
If the user is provided with the access rights of different stage, it is other access rights of lowermost level that this associated person information then is set automatically.
The device that obtains associated person information that the embodiment of the invention provides; According to contact person's significance level access rights to contact person's information setting different stage;, application module haves no right from address list, to obtain this associated person information when not having the authority of access contact information; Though solved the encrypted protection of user communication record in the prior art; But associated person information can pass through the problem that other application modules such as message registration, note are revealed, and has also solved applications software malice simultaneously and has obtained associated person information and carry out malfeasant problem, has reached the purpose of general protection contact information of customer.
Through the description of above execution mode, the those skilled in the art can be well understood to the present invention and can realize by the mode that software adds essential common hardware, can certainly pass through hardware, but the former is better execution mode under a lot of situation.Based on such understanding; The part that technical scheme of the present invention contributes to prior art in essence in other words can be come out with the embodied of software product, and this computer software product is stored in the storage medium that can read, like the floppy disk of computer; Hard disk or CD etc.; Comprise some instructions with so that computer equipment (can be personal computer, server, the perhaps network equipment etc.) carry out the described method of each embodiment of the present invention.
The above; Be merely embodiment of the present invention, but protection scope of the present invention is not limited thereto, any technical staff who is familiar with the present technique field is in the technical scope that the present invention discloses; Can expect easily changing or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion by said protection range with claim.
Claims (8)
1. a method of obtaining associated person information is characterized in that, comprising:
For associated person information is provided with access rights, said access rights comprise the quantity and the type of the application module that allows the said associated person information of visit;
Receive the request of obtaining said associated person information that application module sends;
Judge according to said access rights whether said application module has the right to obtain said associated person information;
When said application module has the right to obtain said associated person information, send said associated person information to said application module.
2. the method for obtaining associated person information according to claim 1 is characterized in that, and is said for associated person information is provided with access rights, comprising:
The access rights of different stage are set according to contact person's significance level.
3. the method for obtaining associated person information according to claim 1 and 2 is characterized in that, saidly judges that according to said access rights whether said application module has the right to obtain said associated person information, comprising:
Judge according to the type of said access rights and said application module whether said application module has the right to obtain said associated person information;
When within the access rights of type at said associated person information of said application module, said application module has the right to obtain said associated person information;
When the type of said application module was not within the access rights at said associated person information, said application module had no right to obtain said associated person information.
4. the method for obtaining associated person information according to claim 1 and 2 is characterized in that, also comprises:
When having added new associated person information, said new associated person information is set automatically has access rights.
5. a device that obtains associated person information is characterized in that, comprising:
The unit is set, is used to associated person information access rights are set, said access rights comprise the quantity and the type of the application module that allows the said associated person information of visit;
Receiving element is used to receive the request of obtaining said associated person information that application module sends;
Judging unit is used for judging according to said access rights whether said application module has the right to obtain said associated person information;
Transmitting element is used for when said application module has the right to obtain said associated person information, sending said associated person information to said application module.
6. the device that obtains associated person information according to claim 5 is characterized in that, the said unit that is provided with also comprises:
First is provided with subelement, is used for being provided with according to contact person's significance level the access rights of different stage.
7. according to claim 5 or the 6 described devices that obtain associated person information, it is characterized in that said judging unit specifically is used for judging according to the type of said access rights and said application module whether said application module has the right to obtain said associated person information;
When within the access rights of type at said associated person information of said application module, said application module has the right to obtain said associated person information;
When the type of said application module was not within the access rights at said associated person information, said application module had no right to obtain said associated person information.
8. according to claim 5 or the 6 described devices that obtain associated person information, it is characterized in that, also comprise:
The unit is set automatically, is used for when having added new associated person information, said new associated person information is set automatically has access rights.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110264082.7A CN102316197B (en) | 2011-09-07 | 2011-09-07 | Method for acquiring contact information and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110264082.7A CN102316197B (en) | 2011-09-07 | 2011-09-07 | Method for acquiring contact information and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102316197A true CN102316197A (en) | 2012-01-11 |
CN102316197B CN102316197B (en) | 2014-04-09 |
Family
ID=45429000
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110264082.7A Active CN102316197B (en) | 2011-09-07 | 2011-09-07 | Method for acquiring contact information and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102316197B (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103401949A (en) * | 2013-08-21 | 2013-11-20 | 北京邮电大学 | Personal data safety sharing system and method for mobile phone |
CN103905627A (en) * | 2012-12-28 | 2014-07-02 | 联想(北京)有限公司 | Information acquisition method and user equipment |
CN104038537A (en) * | 2014-05-27 | 2014-09-10 | 小米科技有限责任公司 | Contact list information management method and device and mobile terminal |
CN104794390A (en) * | 2015-03-18 | 2015-07-22 | 西安酷派软件科技有限公司 | Linkman information access control method and device |
CN105141679A (en) * | 2015-08-18 | 2015-12-09 | 耿懿超 | Method and system for adding contacts |
CN105872178A (en) * | 2016-06-06 | 2016-08-17 | 北京珠穆朗玛移动通信有限公司 | Contact person information sharing method and mobile terminal |
CN106210233A (en) * | 2016-07-25 | 2016-12-07 | 上海创功通讯技术有限公司 | A kind of terminal called book management method and device |
WO2017020586A1 (en) * | 2015-07-31 | 2017-02-09 | 宇龙计算机通信科技(深圳)有限公司 | Information security management method for intelligent wearable device, intelligent wearable device and terminal |
CN106506511A (en) * | 2016-11-17 | 2017-03-15 | 京东方科技集团股份有限公司 | A kind of address list information processing method, device |
CN106657525A (en) * | 2016-10-28 | 2017-05-10 | 重庆蓝岸通讯技术有限公司 | Method for expanding the contact means of contact person |
CN109963023A (en) * | 2019-03-26 | 2019-07-02 | 北京小米移动软件有限公司 | Book management method and device |
CN110516918A (en) * | 2019-08-02 | 2019-11-29 | 阿里巴巴集团控股有限公司 | A kind of Risk Identification Method and device |
CN112492589A (en) * | 2017-09-29 | 2021-03-12 | 华为技术有限公司 | Method and device for accessing equipment identifier |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101330458A (en) * | 2008-07-22 | 2008-12-24 | 宇龙计算机通信科技(深圳)有限公司 | Method, apparatus and system for controlling access authority of pickaback plane |
CN102025840A (en) * | 2009-09-18 | 2011-04-20 | 华为技术有限公司 | Method, equipment and system for acquiring multimedia information of contact person in address list |
-
2011
- 2011-09-07 CN CN201110264082.7A patent/CN102316197B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101330458A (en) * | 2008-07-22 | 2008-12-24 | 宇龙计算机通信科技(深圳)有限公司 | Method, apparatus and system for controlling access authority of pickaback plane |
CN102025840A (en) * | 2009-09-18 | 2011-04-20 | 华为技术有限公司 | Method, equipment and system for acquiring multimedia information of contact person in address list |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905627A (en) * | 2012-12-28 | 2014-07-02 | 联想(北京)有限公司 | Information acquisition method and user equipment |
CN103401949B (en) * | 2013-08-21 | 2016-12-28 | 北京邮电大学 | A kind of system and method shared for the personal data safety of mobile phone |
CN103401949A (en) * | 2013-08-21 | 2013-11-20 | 北京邮电大学 | Personal data safety sharing system and method for mobile phone |
CN104038537A (en) * | 2014-05-27 | 2014-09-10 | 小米科技有限责任公司 | Contact list information management method and device and mobile terminal |
CN104794390B (en) * | 2015-03-18 | 2018-06-15 | 西安酷派软件科技有限公司 | A kind of associated person information access control method and device |
CN104794390A (en) * | 2015-03-18 | 2015-07-22 | 西安酷派软件科技有限公司 | Linkman information access control method and device |
WO2017020586A1 (en) * | 2015-07-31 | 2017-02-09 | 宇龙计算机通信科技(深圳)有限公司 | Information security management method for intelligent wearable device, intelligent wearable device and terminal |
CN105141679A (en) * | 2015-08-18 | 2015-12-09 | 耿懿超 | Method and system for adding contacts |
CN105872178A (en) * | 2016-06-06 | 2016-08-17 | 北京珠穆朗玛移动通信有限公司 | Contact person information sharing method and mobile terminal |
CN106210233A (en) * | 2016-07-25 | 2016-12-07 | 上海创功通讯技术有限公司 | A kind of terminal called book management method and device |
CN106210233B (en) * | 2016-07-25 | 2019-04-26 | 上海创功通讯技术有限公司 | A kind of terminal called book management method and device |
CN106657525A (en) * | 2016-10-28 | 2017-05-10 | 重庆蓝岸通讯技术有限公司 | Method for expanding the contact means of contact person |
CN106657525B (en) * | 2016-10-28 | 2019-10-29 | 重庆蓝岸通讯技术有限公司 | The method for expanding contact person's mode |
CN106506511A (en) * | 2016-11-17 | 2017-03-15 | 京东方科技集团股份有限公司 | A kind of address list information processing method, device |
CN106506511B (en) * | 2016-11-17 | 2019-08-23 | 京东方科技集团股份有限公司 | A kind of address list information processing method, device |
CN112492589A (en) * | 2017-09-29 | 2021-03-12 | 华为技术有限公司 | Method and device for accessing equipment identifier |
US11910192B2 (en) | 2017-09-29 | 2024-02-20 | Huawei Technologies Co., Ltd. | Device identifier access method and apparatus |
CN109963023A (en) * | 2019-03-26 | 2019-07-02 | 北京小米移动软件有限公司 | Book management method and device |
CN110516918A (en) * | 2019-08-02 | 2019-11-29 | 阿里巴巴集团控股有限公司 | A kind of Risk Identification Method and device |
CN110516918B (en) * | 2019-08-02 | 2024-05-03 | 创新先进技术有限公司 | Risk identification method and risk identification device |
Also Published As
Publication number | Publication date |
---|---|
CN102316197B (en) | 2014-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102316197B (en) | Method for acquiring contact information and device | |
Lee et al. | An empirical study of wireless carrier authentication for {SIM} swaps | |
Ferreira et al. | Securacy: an empirical investigation of Android applications' network usage, privacy and security | |
US8474030B2 (en) | User authentication system using IP address and method thereof | |
CN103916244B (en) | Verification method and device | |
US20090177514A1 (en) | Services using globally distributed infrastructure for secure content management | |
Achara et al. | Short paper: Wifileaks: Underestimated privacy implications of the ACCESS_WIFI_STATE Android permission | |
JP2014527326A (en) | Wireless LAN connection device and operation method thereof | |
CN102693394A (en) | Method and device for intercepting calling for service of application program | |
CN104767713A (en) | Account binding method, server and account binding system | |
Lee et al. | Security and privacy risks of number recycling at mobile carriers in the United States | |
CN101741568A (en) | Surfing method, client, security gateway and surfing system | |
US20180227298A1 (en) | Selectively permitting a receiver device to access a message based on authenticating the receiver device | |
US20100077489A1 (en) | Method, apparatus, and computer program product for isolating personal data | |
US9935952B2 (en) | Selectively permitting a receiver device to access a message based on authenticating the receiver device | |
KR101095232B1 (en) | Method of selectively preventing spam calls of mobile telecommunication terminal | |
CN106488449A (en) | A kind of management method of Wireless Telecom Equipment and Wireless Telecom Equipment | |
US8380165B1 (en) | Identifying a cloned mobile device in a communications network | |
KR102340976B1 (en) | Deep learning-based customized content provision system using web service user experience | |
US10235525B2 (en) | Application providing server, application setting terminal, application providing system, method of providing application, and program for application providing server | |
Haar et al. | IoT Security With INFINITE: The 3-Dimensional Internet Of Things Maturity Model | |
Romansky | Internet of Things and User Privacy Protection | |
US20210014319A1 (en) | Network policy enforcement for externally-hosted application usage | |
Van Do et al. | A disruption analysis of mobile communication services using Business Ecosystem concept | |
Kumar et al. | Mobile applications: Analyzing private data leakage using third party connections |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |