CN103916233A - Information encryption method and device - Google Patents

Information encryption method and device Download PDF

Info

Publication number
CN103916233A
CN103916233A CN201410121024.2A CN201410121024A CN103916233A CN 103916233 A CN103916233 A CN 103916233A CN 201410121024 A CN201410121024 A CN 201410121024A CN 103916233 A CN103916233 A CN 103916233A
Authority
CN
China
Prior art keywords
information
sensitive data
recognition rule
default
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410121024.2A
Other languages
Chinese (zh)
Other versions
CN103916233B (en
Inventor
陈志军
张涛
张波
王琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410121024.2A priority Critical patent/CN103916233B/en
Publication of CN103916233A publication Critical patent/CN103916233A/en
Application granted granted Critical
Publication of CN103916233B publication Critical patent/CN103916233B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an information encryption method and device. The method comprises the steps of acquiring the information received by a terminal, determining whether the information contains sensitive data according to a preset identification rule, converting the sensitive data into safe data according to a preset encryption rule when it is determined that the information contains the sensitive data, and displaying the information containing the safe data. By means of the preset identification rule, the sensitive data in the information received by the terminal can be determined, the sensitive data are converted into the safe data by means of the preset encryption rule after the sensitive data are found, and only the information containing safe data is displayed finally. In the encryption process, encryption of the sensitive data in the information can be conducted without user participation, and therefore operation burdens of a user can be reduced on the premise that encryption of the sensitive data in the information received by the terminal is achieved, and then user experience is improved.

Description

A kind of information ciphering method and device
Technical field
The present invention relates to communication technical field, in particular, relate to information ciphering method and device.
Background technology
At present, in order to guarantee that the information that terminal receives do not stolen by other people, there is much information encryption policy.
Relevant encryption policy mainly contains two kinds of modes, and the first encryption policy is that the information that user manually receives terminal is encrypted.For example, user's terminal has received an important information, user can not seen by other people in order to guarantee this important information, can a password be set to this important information, even if this terminal is stolen by other lawless persons, lawless person also cannot check the important information that is provided with password so, can well guarantee in this way the safety of the important information of terminal.
The second encryption policy, for user presets some particular numbers, as long as when terminal receives the information of these particular numbers transmissions, will be encrypted the information of these particular numbers transmissions.For example, user's terminal and the information of another terminal interaction mostly are important information, so it is particular number that user sets in advance the number of another terminal, and a specific cryptosystem is set for this particular number, as long as when terminal receives the information that particular number sends, the information that terminal will be sent particular number is so encrypted automatically according to specific cryptosystem.
In research and practice process, inventor finds that above-mentioned correlation technique at least exists following problem:
For above-mentioned the first encryption policy of mentioning, although this kind of encryption policy can be good at guaranteeing the safety of important information in terminal, but the important information that terminal receives may have a lot of bars, if user is encrypted each important information, user's operational ton may be too heavy so, strengthened user's operation burden.
For above-mentioned the second encryption policy of mentioning, although this kind of mask strategy can comparatively reduce user's operational ton, but all information that not particular number is sent are all important informations, so according to the second encryption policy, user checks that all information of this particular number all need deciphering, thereby has increased the number of operations that user need to decipher.
Therefore, in the situation that how to guarantee the important information of terminal to be encrypted, alleviate user's operation burden, become the problem that needs most at present solution.
Summary of the invention
For overcoming the problem existing in correlation technique, the disclosure provides a kind of information ciphering method and device, to guarantee, in the case of the important information of terminal is encrypted, alleviating user's operation burden.
According to the first aspect of disclosure embodiment, a kind of information ciphering method is provided, comprising:
Obtain the information that terminal receives;
Utilize default recognition rule to determine and in described information, whether have sensitive data;
In the time there is sensitive data in described information, convert the described sensitive data in described information to secure data according to default encryption rule;
Show the described information with described secure data.
Optionally, described default recognition rule comprises at least one recognition rule, and the default recognition rule of described utilization determines in described information whether exist sensitive data to comprise:
Judge and in described information, whether have predetermined keyword;
In the time there is described predetermined keyword in described information, determine the recognition rule corresponding with described predetermined keyword, utilize described recognition rule to determine and in described information, whether have sensitive data.
Optionally, described default recognition rule comprises at least one recognition rule, and the default recognition rule of described utilization determines in described information whether exist sensitive data to comprise:
Obtain a recognition rule in default recognition rule according to setting order;
The recognition rule that utilization is obtained determines in described information, whether there is sensitive data;
Determine while there is not sensitive data in described information when the recognition rule that utilization is obtained, carry out the described step of obtaining a recognition rule in default recognition rule according to setting order, until traveled through all recognition rules in described default recognition rule.
Optionally, described method also comprises:
Receive user input for checking the password of described sensitive data;
Judge that whether described password is correct;
In the time that described password is correct, according to described default encryption rule, described secure data is reduced into described sensitive data, and shows the described information with described sensitive data.
Optionally, described method also comprises:
Record shows the initial time of the described information with described sensitive data;
Whether the difference that judges current time and described initial time is greater than threshold value;
In the time that the difference of described current time and described initial time is greater than threshold value, carry out the described step that according to default encryption rule, the described sensitive data in described information is converted to secure data;
In the time that the difference of described current time and described initial time is not more than threshold value, carries out and describedly judge whether the difference of current time and described initial time is greater than the step of threshold value.
Optionally, described password is one or more the combination in any in fixed password, dynamic password or gesture password.
Optionally, describedly convert the described sensitive data in described information to secure data step according to default encryption rule and comprise:
Convert the described sensitive data of part or whole described sensitive datas in described information to secure data according to default encryption rule.
According to the second aspect of disclosure embodiment, a kind of information encryption device is provided, comprising:
Acquisition module, the information receiving for obtaining terminal;
Determination module, for utilizing default recognition rule to determine whether described information exists sensitive data;
Modular converter, in the time that described information exists sensitive data, converts the described sensitive data in described information to secure data according to default encryption rule;
Display module, for showing the described information with described secure data.
Optionally, described determination module comprises:
First judges submodule, for judging whether described information exists predetermined keyword;
The first implementation sub-module, in the time that described information exists described predetermined keyword, determines the recognition rule corresponding with described predetermined keyword, utilizes described recognition rule to determine and in described information, whether has sensitive data.
Optionally, described determination module comprises:
Obtain submodule, for obtain a recognition rule of default recognition rule according to setting order;
Determine submodule, for utilizing the recognition rule obtaining to determine whether described information exists sensitive data;
Control submodule, while determining that for the recognition rule obtaining in utilization described information does not exist sensitive data, obtain submodule executable operations described in triggering, until traveled through all recognition rules in described default recognition rule.
Optionally, also comprise:
Receiver module, for receive user input for checking the password of described sensitive data;
The second judge module, whether correct for judging described password;
The second Executive Module, in the time that described password is correct, is reduced into described sensitive data according to described default encryption rule by described secure data, and shows the described information with described sensitive data.
Optionally, also comprise:
Logging modle, for recording the initial time that shows the described information with described sensitive data;
Whether the 3rd judge module, be greater than threshold value for the difference that judges current time and described initial time;
The 3rd Executive Module, in the time that the difference of described current time and described initial time is greater than threshold value, carries out described modular converter; In the time that the difference of described current time and described initial time is not more than threshold value, carry out described the 3rd judge module.
According to the third aspect of disclosure embodiment, a kind of information encryption device is provided, comprising:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
Obtain the information that terminal receives;
Utilize default recognition rule to determine and in described information, whether have sensitive data;
In the time there is sensitive data in described information, convert the described sensitive data in described information to secure data according to default encryption rule;
Show the described information with described secure data.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect: can determine by default recognition rule in the information that terminal receives, which data is sensitive datas, finding after these sensitive datas, convert these sensitive datas in information to secure data according to default encryption rule, the last information with secure data that only shows, in above-mentioned ciphering process, participate in without user, just can be encrypted the sensitive data in information, therefore, in the situation that sensitive data in the information that the scheme that the disclosure provides can guarantee terminal to receive is encrypted, alleviate user's operation burden, thereby improve user's experience.
Should be understood that, it is only exemplary and explanatory that above general description and details are hereinafter described, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing is herein merged in specification and forms the part of this specification, shows embodiment according to the invention, and is used from and explains principle of the present invention with specification one.
Fig. 1 is according to the flow chart of a kind of information ciphering method shown in an exemplary embodiment.
Fig. 2 is according to the flow chart of the another kind of information ciphering method shown in an exemplary embodiment.
Fig. 3 is according to the flow chart of another information ciphering method shown in an exemplary embodiment.
Fig. 4 is according to the schematic diagram of a kind of information encryption device shown in an exemplary embodiment.
Fig. 5 is according to the schematic diagram of the another kind of information encryption device shown in an exemplary embodiment.
Fig. 6 is according to the schematic diagram of another the information encryption device shown in an exemplary embodiment.
Fig. 7 is according to the block diagram of a kind of information encryption device shown in an exemplary embodiment.
Embodiment
Here will at length describe exemplary embodiment, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless separately there is expression, the same numbers in different accompanying drawings represents same or analogous key element.Execution mode described in following exemplary embodiment does not represent all execution modes consistent with the present invention.On the contrary, they are only and the example of apparatus and method as consistent in some aspects that described in detail in appended claims, of the present invention.
Embodiment mono-
Fig. 1 is according to the flow chart of a kind of information ciphering method shown in an exemplary embodiment, as shown in Figure 1, this information ciphering method can be in terminal, in the situation that sensitive data in the information that the method can guarantee terminal to receive is encrypted, alleviate user's operation burden, thereby the experience that has improved user, the method comprises the following steps.
In step S101, obtain the information that terminal receives.
Wherein, information can be the information such as note or mail.In the time that terminal receives the information such as note or mail of other-end transmission, this acquisition of information is arrived, use in order to step below.
In step S102, utilize default recognition rule to determine and in information, whether have sensitive data.
Wherein, sensitive data refers to very important information for user, if once these very important information are stolen or lose, user may exist and lose property or lose private information so, so it is identified that the sensitive data in information needs, so that subsequent step is encrypted sensitive data.
Default recognition rule is sensitive data for which data of identifying information, so default recognition rule can be defined as the recognition rule that comprises at least one identification sensitive data.
For example, bank card account is on the market generally 16 bit digital, bank card password is generally 6 bit digital, so default recognition rule can be set to 16 continuous bit digital of inquiry or inquire about 6 continuous bit digital, once so comprise 16 continuous bit digital or 6 continuous bit digital in the information that terminal receives, utilize so default recognition rule just can identify, and using 16 bit digital or continuous 6 bit digital as sensitive data.The 16 continuous bit digital of inquiry here can be thought a kind of recognition rule, can think another kind of recognition rule and inquire about 6 continuous bit digital, and these two kinds of recognition rules are included in default recognition rule.
Refer to shown in table 1, shown in table 1 is default recognition rule and the relation table of the sensitive data inquiring according to default recognition rule.Suppose that default recognition rule is 16 continuous numerals of inquiry, or 6 continuous numerals of inquiry, the information content that terminal receives is " bank card account of XX bank is 1111222233334444; bank card password is 555555 ", utilizing so the sensitive data that default recognition rule can inquire is " 1111222233334444 " and " 555555 ", so that subsequent step can be encrypted these sensitive datas, can avoid being stolen by disabled user.
Default recognition rule Sensitive data
Inquire about 16 continuous numerals 1111222233334444
Inquire about 6 continuous numerals 555555
Table 1
And for example, the account of Mou Kuan chat software is 10 continuous bit digital, the password of this chat software is to comprise English and digital combining characters, and the figure place of this combining characters is between 8 to 12, so default recognition rule can be set to 10 continuous bit digital of inquiry or inquire about continuous between 8 to 12 and comprise English and digital combining characters, once so comprise 10 continuous bit digital or continuous between 8 to 12 and comprise English and digital combining characters in the information that terminal receives, utilize so default recognition rule just can identify, and using 10 continuous bit digital or continuous between 8 to 12 and comprise English and digital combining characters as sensitive data.The 10 continuous bit digital of inquiry here can be thought a kind of recognition rule, inquire about continuous between 8 to 12, and comprise English and digital combining characters and can think another kind of recognition rule, these two kinds of recognition rules are included in default recognition rule.
Refer to shown in table 2, shown in table 2 is default recognition rule and the relation table of the sensitive data inquiring according to default recognition rule.Suppose that default recognition rule is 10 continuous bit digital of inquiry or inquires about continuous between 8 to 12 and comprise English and digital combining characters, the information content that terminal receives is " account of XX chat software is 1234567890; the password of chat software is ABCD1234 ", utilizing so the sensitive data that default recognition rule can inquire is " 1234567890 " and " ABCD1234 ", so that subsequent step can be encrypted these sensitive datas, can avoid being stolen by disabled user.
Table 2
In an optional embodiment, the first recognition rule that can comprise from default recognition rule starts, and judges successively in information whether have sensitive data, until exist sensitive data or traversal to complete all recognition rules in definite information.Be the operating procedure of this optional embodiment below: step 1), obtain a recognition rule in default recognition rule according to setting order; Step 2), utilize the recognition rule that obtains to determine in information, whether to have sensitive data; Step 3), the recognition rule obtaining when utilization are determined while there is not sensitive data in information, execution step 1), until travel through all recognition rules of presetting in recognition rule.
In step S103, in the time there is sensitive data in information, convert the sensitive data in information to secure data according to default encryption rule.
Wherein, default encryption rule is for being encrypted and obtaining secure data the sensitive data of information, the mode of setting default encryption rule has a variety of, both can convert the sensitive data of part in information to secure data according to default encryption rule, also can convert the sensitive data of part in information to secure data according to default encryption rule.For example, determine that by step S102 the sensitive data in information is " 1234567890 " and " ABCD1234 ", encryption rule is that the sensitive data in information is become to symbol " * ", after the conversion of step S103, sensitive data " 1234567890 " and " ABCD1234 " will become secure data " * * * * * * * * * * " and " * * * * * * * * " so.And for example, determine that by step S102 the sensitive data in information is " 1234567890 " and " ABCD1234 ", encryption rule is that the mid portion of the sensitive data in information is become to symbol " * ", the head and the tail character of sensitive data is constant, after the conversion of step S103, sensitive data " 1234567890 " and " ABCD1234 " will become secure data " 1********0 " and " A******4 " so.For another example, determine that by step S102 the sensitive data in information is " 1234567890 " and " ABCD1234 ", encryption rule is that the odd bits of the sensitive data in information is become to symbol " * ", the even bit of sensitive data is constant, after the conversion of step S103, sensitive data " 1234567890 " and " ABCD1234 " will become secure data " * 2*4*6*8*0 " and " * B*D*2*4 " so.
In step S104, show the information with secure data.
Wherein, suppose that the information content that terminal receives is that " account of XX chat software is 1234567890, the password of chat software is ABCD1234 ", learn that through step S102 " 1234567890 " and " ABCD1234 " are for sensitive data, according to default encryption rule, sensitive data " 1234567890 " and " ABCD1234 " are become to secure data " * * * * * * * * * * " and " * * * * * * * * " through step S103, this step S104 will show that the information content is for " account of XX chat software is * * * * * * * * * *, the password of chat software is * * * * * * * * ", even so user's lost terminal or information are stolen by hacker, hacker also cannot learn user's important information so.
In the embodiment shown in fig. 1, the scheme that the disclosure provides can determine by default recognition rule in the information that terminal receives, which data is sensitive datas, finding after these sensitive datas, convert these sensitive datas in information to secure data according to default encryption rule, the last information with secure data that only shows, in above-mentioned ciphering process, participate in without user, just can be encrypted the sensitive data in information, therefore, in the situation that sensitive data in the information that the scheme that the disclosure provides can guarantee terminal to receive is encrypted, alleviate user's operation burden, thereby improve user's experience.
Embodiment bis-
Shown in Figure 2, Fig. 2 is according to the flow chart of the another kind of information ciphering method shown in an exemplary embodiment.Because the present embodiment is the improvement based on embodiment mono-, so refer to the content of embodiment mono-in the present embodiment with embodiment mono-something in common, duplicate contents will repeat no more.The embodiment that the disclosure provides can be applied in terminal.The disclosed method of the present embodiment can often coordinate the predetermined keyword of appearance to find out every kind of sensitive data in advance, the recognition rule of every kind of sensitive data and predetermined keyword foundation are contacted, once there is predetermined keyword in discovery information, so just go to determine the sensitive data in information according to recognition rule corresponding to this predetermined keyword, adopt sensitive data in locating information in this way comparatively quick.The method comprises the following steps.
In step S201, obtain the information that terminal receives.
In step S202, judge in information whether have predetermined keyword, if so, perform step S203.
Wherein, if the kind of sensitive data reaches tens kinds, so just, need to define the method for discrimination of these tens kinds of sensitive datas, in the time receiving information, need to be by after the method for discrimination judgement of tens kinds of sensitive datas, can determine sensitive data, so when more for the kind of sensitive data, there will be the slow problem of recognition speed.For the more situation of the kind of sensitive data, can pre-define every kind of recognition rule that sensitive data is corresponding, and often coordinate the predetermined keyword of appearance to find out every kind of sensitive data in advance, the recognition rule of every kind of sensitive data and predetermined keyword foundation are contacted, once there is predetermined keyword in discovery information, so just go to determine the sensitive data in information according to recognition rule corresponding to this predetermined keyword, adopt sensitive data in locating information in this way comparatively quick.
For example, when sensitive data is bank card account number and bank card password, bank card account is 16 bit digital, and bank card password is 6 bit digital.The recognition rule that such sensitive data is corresponding is inquire about 16 continuous bit digital or inquire about 6 continuous bit digital, and it is " bank card account number ", " bank card password ", " money transfer amount " etc. that such sensitive data often coordinates the predetermined keyword of appearance.If the information receiving is " bank card account of XX bank is 1111222233334444; bank card password is 555555 ", so first, judge and in this information, whether have predetermined keyword, judged result is to determine in this information to have predetermined keyword " bank card account number " and " bank card password ", start so the recognition rule that this keyword is corresponding, inquire about 16 continuous bit digital or inquire about 6 continuous bit digital, utilizing the sensitive data that recognition rule can inquire is " 1111222233334444 " and " 555555 ".
In step S203, determine the recognition rule corresponding with predetermined keyword, utilize recognition rule to determine and in information, whether have sensitive data.
Wherein, the recognition rule of mentioning in step S203 is different from the default recognition rule of mentioning in step S204, recognition rule represents the recognition rule corresponding to a certain sensitive data, and default recognition rule represents the recognition rule corresponding at least one sensitive data.For example, recognition rule is only corresponding to the recognition rule of bank card account number and bank card password, and default recognition rule both can be only corresponding to the recognition rule of bank card account number and bank card password, also can be corresponding to the recognition rule of multiple sensitive data.
In step S204, in the time there is sensitive data in information, convert the sensitive data in information to secure data according to default encryption rule.
In step S205, show the information with secure data.
In the embodiment shown in Figure 2, the method that embodiment of the present disclosure provides can often coordinate the predetermined keyword of appearance to find out every kind of sensitive data in advance, the recognition rule of every kind of sensitive data and predetermined keyword foundation are contacted, once there is predetermined keyword in discovery information, so just go to determine the sensitive data in information according to recognition rule corresponding to this predetermined keyword, adopt sensitive data in locating information in this way comparatively quick.
Embodiment tri-
Shown in Figure 3, Fig. 3 is according to the flow chart of another information ciphering method shown in an exemplary embodiment.Because the present embodiment is the improvement based on embodiment mono-, so refer to the content of embodiment mono-in the present embodiment with embodiment mono-something in common, duplicate contents will repeat no more.The embodiment that the disclosure provides can be applied in terminal.The disclosed method of the present embodiment not only can receive the password of user's input, so that user checks the information with sensitive data, and, showing that this information reached after the scheduled time, can convert the sensitive data in information to secure data automatically, thus the safety of sensitive data in guarantee information that can be lasting.The method comprises the following steps.
In step S301, obtain the information that terminal receives.
In step S302, utilize default recognition rule to determine and in information, whether have sensitive data.
In step S303, in the time there is sensitive data in information, convert the sensitive data in information to secure data according to default encryption rule.
In step S304, show the information with secure data.
In step S305, receive user input for checking the password of sensitive data.
Wherein, the password presetting for checking sensitive data can have various ways, for example, password can be fixed password, also can be dynamic password, can be also gesture password, or the combination in any of these three kinds of passwords, certainly the kind of password can also be other types, and the kind providing is provided.
In step S306, judge that whether password is correct, if correct, execution step S307.
Wherein, if the password of user's input is correct, according to default encryption rule, secure data is reduced into sensitive data so, so that user checks the original contents of this information.
In step S307, in the time that password is correct, according to default encryption rule, secure data is reduced into sensitive data, and shows the information with sensitive data.
In step S308, record shows the initial time of the information with sensitive data.
Wherein, input correct password user, and after demonstrating the original contents of information, now supply the original contents of user's viewing information.Finish watching the original contents of information user after, in order to continue to guarantee that the sensitive data in this information is not revealed, can record the initial time that shows this information, and whether the difference that judges current time and initial time is greater than threshold value, if be greater than threshold value, illustrate that so sensitive data in this information need to continue encrypted, so execution step S305, if be not more than threshold value, illustrate and also do not reach predetermined time, and whether the real-time difference that judges current time and initial time is greater than threshold value.
Threshold value is for the predefined time period, and for example, threshold value can be set as 30 minutes, also can be set as 1 hour etc.
In step S309, judge whether the difference of current time and initial time is greater than threshold value, if so, perform step S303, otherwise, execution step S309.
In the embodiment shown in fig. 3, the disclosed method of the present embodiment not only can receive the password of user's input, demonstrates the original contents of information, so that user checks the information with sensitive data; And, in order to continue to guarantee that the sensitive data in this information is not revealed, showing that this information reached after the scheduled time, can convert the sensitive data in information to secure data automatically, thus the safety of sensitive data in guarantee information that can be lasting.
Embodiment tetra-
Shown in Figure 4, Fig. 4 is according to the module map of a kind of information encryption device shown in an exemplary embodiment, in the situation that sensitive data in the information that the disclosed device of the present embodiment can guarantee to receive is encrypted, alleviate user's operation burden, thereby improved user's experience.This device comprises:
Acquisition module 11, the information receiving for obtaining terminal;
Determination module 12, for utilizing default recognition rule to determine whether information exists sensitive data;
Modular converter 13, in the time that information exists sensitive data, converts the sensitive data in information to secure data according to default encryption rule;
Display module 14, for showing the information with secure data.
In the embodiment shown in fig. 4, the function of the information encryption device that the present embodiment provides is corresponding with the function that embodiment mono-realizes, thus can be referring to the content in embodiment mono-about the function of the present embodiment modules, and this is no longer going to repeat them.
Embodiment five
Shown in Figure 5, Fig. 5 is according to the module map of the another kind of information encryption device shown in an exemplary embodiment, the disclosed device of the present embodiment can often coordinate the predetermined keyword of appearance to find out every kind of sensitive data in advance, the recognition rule of every kind of sensitive data and predetermined keyword foundation are contacted, once there is predetermined keyword in discovery information, so just go to determine the sensitive data in information according to recognition rule corresponding to this predetermined keyword, adopt sensitive data in locating information in this way comparatively quick.This device comprises:
Acquisition module 21, the information receiving for obtaining terminal;
Determination module 24, for utilizing default recognition rule to determine whether information exists sensitive data;
Optionally, determination module 24 can comprise the first judgement submodule 22 and the first implementation sub-module 23, and wherein, first judges submodule 22, for judging whether information exists predetermined keyword; The first implementation sub-module 23, in the time that information exists predetermined keyword, determines the recognition rule corresponding with predetermined keyword, utilizes recognition rule to determine the sensitive data in information.
Optionally, determination module 24 can also comprise and obtains submodule, determine submodule and control submodule, wherein, obtains submodule, for obtain a recognition rule of default recognition rule according to setting order; Determine submodule, for utilizing the recognition rule obtaining to determine whether information exists sensitive data; Control submodule, while determining that for the recognition rule obtaining in utilization information does not exist sensitive data, trigger and obtain submodule executable operations, until traveled through all recognition rules in default recognition rule.Not shown in Fig. 5 about obtaining submodule, determine submodule and controlling submodule.
Modular converter 25, in the time that information exists sensitive data, converts the sensitive data in information to secure data according to default encryption rule;
Display module 26, for showing the information with secure data.
In the embodiment shown in fig. 4, the function of the information encryption device that the present embodiment provides is corresponding with the function that embodiment bis-realizes, thus can be referring to the content in embodiment bis-about the function of the present embodiment modules, and this is no longer going to repeat them.
Embodiment six
Shown in Figure 6, Fig. 6 is according to the module map of another the information encryption device shown in an exemplary embodiment, the disclosed device of the present embodiment not only can receive the password of user's input, so that user checks the information with sensitive data, and, showing that this information reached after the scheduled time, can convert the sensitive data in information to secure data automatically, thus the safety of sensitive data in guarantee information that can be lasting.This device comprises:
Acquisition module 31, the information receiving for obtaining terminal;
Determination module 32, for utilizing default recognition rule to determine whether information exists sensitive data;
Modular converter 33, in the time that information exists sensitive data, converts the sensitive data in information to secure data according to default encryption rule;
Display module 34, for showing the information with secure data.
Receiver module 35, for receive user input for checking the password of sensitive data;
The second judge module 36, whether correct for judging password;
The second Executive Module 37, in the time that password is correct, is reduced into sensitive data according to default encryption rule by secure data, and shows the information with sensitive data.
Logging modle 38, for recording the initial time that shows the information with sensitive data;
Whether the 3rd judge module 39, be greater than threshold value for the difference that judges current time and initial time;
The 3rd Executive Module 310, in the time that the difference of current time and initial time is greater than threshold value, carries out modular converter 33; In the time that the difference of current time and initial time is not more than threshold value, carry out the 3rd judge module 39.
In the embodiment shown in fig. 6, the function of the information encryption device that the present embodiment provides is corresponding with the function that embodiment tri-realizes, thus can be referring to the content in embodiment tri-about the function of the present embodiment modules, and this is no longer going to repeat them.
Embodiment seven
Fig. 7 is according to the block diagram of a kind of information encryption device 800 shown in an exemplary embodiment.For example, device 800 can be mobile phone, computer, digital broadcast terminal, information receiving and transmitting equipment, game console, flat-panel devices, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Fig. 7, device 800 can comprise following one or more assembly: processing components 802, memory 804, power supply module 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of I/O (I/O), sensor cluster 814, and communications component 816.
The integrated operation of processing components 802 common control device 800, such as with demonstration, call, data communication, the operation that camera operation and record operation are associated.Processing components 802 can comprise that one or more processors 820 carry out instruction, to complete all or part of step of above-mentioned method.In addition, processing components 802 can comprise one or more modules, is convenient to mutual between processing components 802 and other assemblies.For example, processing components 802 can comprise multi-media module, to facilitate mutual between multimedia groupware 808 and processing components 802.
Memory 804 is configured to store various types of data to be supported in the operation of device 800.The example of these data comprises for any application program of operation on device 800 or the instruction of method, contact data, telephone book data, message, picture, video etc.Memory 804 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read-only memory (prom), read-only memory (ROM), magnetic memory, flash memory, disk or CD.
Power supply module 806 provides electric power for installing 800 various assemblies.Power supply module 806 can comprise power-supply management system, one or more power supplys, and other and the assembly that generates, manages and distribute electric power to be associated for device 800.
Multimedia groupware 808 is included in the screen that an output interface is provided between described device 800 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises that one or more touch sensors are with the gesture on sensing touch, slip and touch panel.Described touch sensor is the border of sensing touch or sliding action not only, but also detects duration and the pressure relevant to described touch or slide.In certain embodiments, multimedia groupware 808 comprises a front-facing camera and/or post-positioned pick-up head.When device 800 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.For example, audio-frequency assembly 810 comprises a microphone (MIC), and when device 800 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The audio signal receiving can be further stored in memory 804 or be sent via communications component 816.In certain embodiments, audio-frequency assembly 810 also comprises a loud speaker, for output audio signal.
I/O interface 812 is for providing interface between processing components 802 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor cluster 814 comprises one or more transducers, is used to device 800 that the state estimation of various aspects is provided.For example, sensor cluster 814 can detect the opening/closing state of device 800, the relative positioning of assembly, for example described assembly is display and the keypad of device 800, the position of all right checkout gear 800 of sensor cluster 814 or 800 1 assemblies of device changes, user is with device 800 existence that contact or do not have the variations in temperature of device 800 orientation or acceleration/deceleration and device 800.Sensor cluster 814 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor cluster 814 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor cluster 814 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communications component 816 is configured to be convenient to the communication of wired or wireless mode between device 800 and other equipment.Device 800 wireless networks that can access based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communications component 816 receives broadcast singal or the broadcast related information from external broadcasting management system via broadcast channel.In one exemplary embodiment, described communications component 816 also comprises near-field communication (NFC) module, to promote junction service.For example, can be based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 800 can be realized by one or more application specific integrated circuits (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components, for carrying out said method.
In the exemplary embodiment, also provide a kind of non-provisional computer-readable recording medium that comprises instruction, for example, comprised the memory 804 of instruction, above-mentioned instruction can have been carried out said method by the processor 820 of device 800.For example, described non-provisional computer-readable recording medium can be ROM, random-access memory (ram), CD-ROM, tape, floppy disk and optical data storage equipment etc.
A kind of non-provisional computer-readable recording medium, in the time that the instruction in storage medium is carried out by the processor of mobile terminal, makes mobile terminal can carry out a kind of information ciphering method, and method comprises: obtain the information that terminal receives; Utilize default recognition rule to determine and in information, whether have sensitive data; In the time there is sensitive data in information, convert the sensitive data in information to secure data according to default encryption rule; Show the information with secure data.
Those skilled in the art, considering specification and putting into practice after invention disclosed herein, will easily expect other embodiment of the present invention.The application is intended to contain any modification of the present invention, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present invention and comprised undocumented common practise or the conventional techniques means in the art of the disclosure.Specification and embodiment are only regarded as exemplary, and true scope of the present invention and spirit are pointed out by claim below.
Should be understood that, the present invention is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various modifications and change not departing from its scope.Scope of the present invention is only limited by appended claim.

Claims (13)

1. an information ciphering method, is characterized in that, comprising:
Obtain the information that terminal receives;
Utilize default recognition rule to determine and in described information, whether have sensitive data;
In the time there is sensitive data in described information, convert the described sensitive data in described information to secure data according to default encryption rule;
Show the described information with described secure data.
2. information ciphering method according to claim 1, is characterized in that, described default recognition rule comprises at least one recognition rule, and the default recognition rule of described utilization determines in described information whether exist sensitive data to comprise:
Judge and in described information, whether have predetermined keyword;
In the time there is described predetermined keyword in described information, determine the recognition rule corresponding with described predetermined keyword, utilize described recognition rule to determine and in described information, whether have sensitive data.
3. information ciphering method according to claim 1, is characterized in that, described default recognition rule comprises at least one recognition rule, and the default recognition rule of described utilization determines in described information whether exist sensitive data to comprise:
Obtain a recognition rule in default recognition rule according to setting order;
The recognition rule that utilization is obtained determines in described information, whether there is sensitive data;
Determine while there is not sensitive data in described information when the recognition rule that utilization is obtained, carry out the described step of obtaining a recognition rule in default recognition rule according to setting order, until traveled through all recognition rules in described default recognition rule.
4. information ciphering method according to claim 1, is characterized in that, described method also comprises:
Receive user input for checking the password of described sensitive data;
Judge that whether described password is correct;
In the time that described password is correct, according to described default encryption rule, described secure data is reduced into described sensitive data, and shows the described information with described sensitive data.
5. information ciphering method according to claim 4, is characterized in that, described method also comprises:
Record shows the initial time of the described information with described sensitive data;
Whether the difference that judges current time and described initial time is greater than threshold value;
In the time that the difference of described current time and described initial time is greater than threshold value, carry out the described step that according to default encryption rule, the described sensitive data in described information is converted to secure data;
In the time that the difference of described current time and described initial time is not more than threshold value, carries out and describedly judge whether the difference of current time and described initial time is greater than the step of threshold value.
6. information ciphering method according to claim 4, is characterized in that, described password is one or more the combination in any in fixed password, dynamic password or gesture password.
7. information ciphering method according to claim 1, is characterized in that, describedly converts the described sensitive data in described information to secure data step according to default encryption rule and comprises:
Convert the described sensitive data of part or whole described sensitive datas in described information to secure data according to default encryption rule.
8. an information encryption device, is characterized in that, comprising:
Acquisition module, the information receiving for obtaining terminal;
Determination module, for utilizing default recognition rule to determine whether described information exists sensitive data;
Modular converter, in the time that described information exists sensitive data, converts the described sensitive data in described information to secure data according to default encryption rule;
Display module, for showing the described information with described secure data.
9. information encryption device according to claim 8, is characterized in that, described determination module comprises:
First judges submodule, for judging whether described information exists predetermined keyword;
The first implementation sub-module, in the time that described information exists described predetermined keyword, determines the recognition rule corresponding with described predetermined keyword, utilizes described recognition rule to determine and in described information, whether has sensitive data.
10. information encryption device according to claim 8, is characterized in that, described determination module comprises:
Obtain submodule, for obtain a recognition rule of default recognition rule according to setting order;
Determine submodule, for utilizing the recognition rule obtaining to determine whether described information exists sensitive data;
Control submodule, while determining that for the recognition rule obtaining in utilization described information does not exist sensitive data, obtain submodule executable operations described in triggering, until traveled through all recognition rules in described default recognition rule.
11. information encryption devices according to claim 8, is characterized in that, also comprise:
Receiver module, for receive user input for checking the password of described sensitive data;
The second judge module, whether correct for judging described password;
The second Executive Module, in the time that described password is correct, is reduced into described sensitive data according to described default encryption rule by described secure data, and shows the described information with described sensitive data.
12. information encryption devices according to claim 11, is characterized in that, also comprise:
Logging modle, for recording the initial time that shows the described information with described sensitive data;
Whether the 3rd judge module, be greater than threshold value for the difference that judges current time and described initial time;
The 3rd Executive Module, in the time that the difference of described current time and described initial time is greater than threshold value, carries out described modular converter; In the time that the difference of described current time and described initial time is not more than threshold value, carry out described the 3rd judge module.
13. 1 kinds of information encryption devices, is characterized in that, comprising:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
Obtain the information that terminal receives;
Utilize default recognition rule to determine and in described information, whether have sensitive data;
In the time there is sensitive data in described information, convert the described sensitive data in described information to secure data according to default encryption rule;
Show the described information with described secure data.
CN201410121024.2A 2014-03-28 2014-03-28 A kind of information ciphering method and device Active CN103916233B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410121024.2A CN103916233B (en) 2014-03-28 2014-03-28 A kind of information ciphering method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410121024.2A CN103916233B (en) 2014-03-28 2014-03-28 A kind of information ciphering method and device

Publications (2)

Publication Number Publication Date
CN103916233A true CN103916233A (en) 2014-07-09
CN103916233B CN103916233B (en) 2018-05-29

Family

ID=51041654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410121024.2A Active CN103916233B (en) 2014-03-28 2014-03-28 A kind of information ciphering method and device

Country Status (1)

Country Link
CN (1) CN103916233B (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410486A (en) * 2014-11-27 2015-03-11 西安酷派软件科技有限公司 Automatic encryption method, device and terminal
CN104506545A (en) * 2014-12-30 2015-04-08 北京奇虎科技有限公司 Data leakage prevention method and data leakage prevention device
CN105426745A (en) * 2015-10-28 2016-03-23 小米科技有限责任公司 Information display method and apparatus
CN105554745A (en) * 2016-01-27 2016-05-04 广东欧珀移动通信有限公司 Information management method and system
CN105635131A (en) * 2015-12-25 2016-06-01 东软集团股份有限公司 Data transmission method and device and server
CN106156642A (en) * 2016-07-28 2016-11-23 宇龙计算机通信科技(深圳)有限公司 Data ciphering method and device
CN106295367A (en) * 2016-08-15 2017-01-04 北京奇虎科技有限公司 Data ciphering method and device
CN106506153A (en) * 2016-11-28 2017-03-15 浙江齐治科技股份有限公司 One kind changes decryption method, device and fort machine automatically
CN106603568A (en) * 2016-12-30 2017-04-26 广东欧珀移动通信有限公司 Data encryption method, data encryption device, and access point equipment
CN106791087A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The storage method of information, device and equipment
CN106921805A (en) * 2017-04-20 2017-07-04 维沃移动通信有限公司 A kind of encryption method and mobile terminal
CN106921952A (en) * 2017-01-25 2017-07-04 宇龙计算机通信科技(深圳)有限公司 Communication data method for transformation and mobile terminal
CN107102831A (en) * 2017-04-14 2017-08-29 北京小度信息科技有限公司 Data-printing method and apparatus
CN107147636A (en) * 2017-05-03 2017-09-08 北京小米移动软件有限公司 E-mail transmission method and device
CN107332973A (en) * 2017-05-19 2017-11-07 北京安云世纪科技有限公司 A kind of processing method of text data, device and mobile terminal
CN107493393A (en) * 2017-09-25 2017-12-19 深圳辉烨通讯技术有限公司 A kind of short message encryption method, device and mobile terminal
CN107508799A (en) * 2017-07-31 2017-12-22 珠海格力电器股份有限公司 A kind of information demonstrating method and device based on instant messaging
CN107748848A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 A kind of information processing method and mobile terminal
CN107846351A (en) * 2017-10-23 2018-03-27 苏州亿科赛卓电子科技有限公司 A kind of chat messages sensitive information encryption method and device
CN108111667A (en) * 2016-11-25 2018-06-01 北京搜狗科技发展有限公司 A kind of communication information encryption method, device and electronic equipment
CN109791592A (en) * 2016-09-21 2019-05-21 国际商业机器公司 The sensitive data in application program is handled using external treatment
CN110163013A (en) * 2019-05-22 2019-08-23 上海上湖信息技术有限公司 A kind of method and apparatus detecting sensitive information
CN111460484A (en) * 2020-04-20 2020-07-28 深圳市云智融科技有限公司 Information encryption method, information encryption device and computer readable storage medium
CN111899741A (en) * 2020-08-06 2020-11-06 上海明略人工智能(集团)有限公司 Audio keyword encryption method and device, storage medium and electronic device
CN114598671A (en) * 2022-03-21 2022-06-07 北京明略昭辉科技有限公司 Session message processing method, device, storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1679066A (en) * 2002-07-12 2005-10-05 英格里安网络公司 Network attached encryption
CN101957894A (en) * 2009-07-17 2011-01-26 精品科技股份有限公司 System and method for controlling and managing authority of conditional electronic file
CN102638459A (en) * 2012-03-23 2012-08-15 腾讯科技(深圳)有限公司 Authentication information transmission system, authentication information transmission service platform and authentication information transmission method
CN103677647A (en) * 2013-12-06 2014-03-26 上海众人网络安全技术有限公司 Electronic device power-on password input method and electronic device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1679066A (en) * 2002-07-12 2005-10-05 英格里安网络公司 Network attached encryption
CN101957894A (en) * 2009-07-17 2011-01-26 精品科技股份有限公司 System and method for controlling and managing authority of conditional electronic file
CN102638459A (en) * 2012-03-23 2012-08-15 腾讯科技(深圳)有限公司 Authentication information transmission system, authentication information transmission service platform and authentication information transmission method
CN103677647A (en) * 2013-12-06 2014-03-26 上海众人网络安全技术有限公司 Electronic device power-on password input method and electronic device

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410486A (en) * 2014-11-27 2015-03-11 西安酷派软件科技有限公司 Automatic encryption method, device and terminal
CN104506545B (en) * 2014-12-30 2017-12-22 北京奇安信科技有限公司 Leakage prevention method and device
CN104506545A (en) * 2014-12-30 2015-04-08 北京奇虎科技有限公司 Data leakage prevention method and data leakage prevention device
CN105426745B (en) * 2015-10-28 2019-08-06 小米科技有限责任公司 Information display method and device
CN105426745A (en) * 2015-10-28 2016-03-23 小米科技有限责任公司 Information display method and apparatus
CN105635131B (en) * 2015-12-25 2019-06-25 东软集团股份有限公司 Transmit data method, device and server
CN105635131A (en) * 2015-12-25 2016-06-01 东软集团股份有限公司 Data transmission method and device and server
CN105554745A (en) * 2016-01-27 2016-05-04 广东欧珀移动通信有限公司 Information management method and system
CN106156642A (en) * 2016-07-28 2016-11-23 宇龙计算机通信科技(深圳)有限公司 Data ciphering method and device
CN106295367A (en) * 2016-08-15 2017-01-04 北京奇虎科技有限公司 Data ciphering method and device
CN109791592A (en) * 2016-09-21 2019-05-21 国际商业机器公司 The sensitive data in application program is handled using external treatment
CN108111667A (en) * 2016-11-25 2018-06-01 北京搜狗科技发展有限公司 A kind of communication information encryption method, device and electronic equipment
CN106506153A (en) * 2016-11-28 2017-03-15 浙江齐治科技股份有限公司 One kind changes decryption method, device and fort machine automatically
CN106791087A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The storage method of information, device and equipment
CN106603568A (en) * 2016-12-30 2017-04-26 广东欧珀移动通信有限公司 Data encryption method, data encryption device, and access point equipment
CN106603568B (en) * 2016-12-30 2019-09-17 Oppo广东移动通信有限公司 Data ciphering method, device and access point apparatus
CN106921952A (en) * 2017-01-25 2017-07-04 宇龙计算机通信科技(深圳)有限公司 Communication data method for transformation and mobile terminal
CN107102831A (en) * 2017-04-14 2017-08-29 北京小度信息科技有限公司 Data-printing method and apparatus
CN106921805A (en) * 2017-04-20 2017-07-04 维沃移动通信有限公司 A kind of encryption method and mobile terminal
CN106921805B (en) * 2017-04-20 2021-04-23 维沃移动通信有限公司 Encryption method and mobile terminal
CN107147636A (en) * 2017-05-03 2017-09-08 北京小米移动软件有限公司 E-mail transmission method and device
CN107332973A (en) * 2017-05-19 2017-11-07 北京安云世纪科技有限公司 A kind of processing method of text data, device and mobile terminal
CN107332973B (en) * 2017-05-19 2020-09-25 北京安云世纪科技有限公司 Text data processing method and device and mobile terminal
CN107508799A (en) * 2017-07-31 2017-12-22 珠海格力电器股份有限公司 A kind of information demonstrating method and device based on instant messaging
CN107508799B (en) * 2017-07-31 2018-12-04 珠海格力电器股份有限公司 A kind of information demonstrating method and device based on instant messaging
CN107493393A (en) * 2017-09-25 2017-12-19 深圳辉烨通讯技术有限公司 A kind of short message encryption method, device and mobile terminal
CN107748848A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 A kind of information processing method and mobile terminal
CN107846351A (en) * 2017-10-23 2018-03-27 苏州亿科赛卓电子科技有限公司 A kind of chat messages sensitive information encryption method and device
CN110163013A (en) * 2019-05-22 2019-08-23 上海上湖信息技术有限公司 A kind of method and apparatus detecting sensitive information
CN110163013B (en) * 2019-05-22 2021-08-03 上海上湖信息技术有限公司 Method and equipment for detecting sensitive information
CN111460484A (en) * 2020-04-20 2020-07-28 深圳市云智融科技有限公司 Information encryption method, information encryption device and computer readable storage medium
CN111899741A (en) * 2020-08-06 2020-11-06 上海明略人工智能(集团)有限公司 Audio keyword encryption method and device, storage medium and electronic device
CN114598671A (en) * 2022-03-21 2022-06-07 北京明略昭辉科技有限公司 Session message processing method, device, storage medium and electronic equipment
CN114598671B (en) * 2022-03-21 2023-01-31 北京明略昭辉科技有限公司 Session message processing method, device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN103916233B (en) 2018-05-29

Similar Documents

Publication Publication Date Title
CN103916233A (en) Information encryption method and device
CN104202306B (en) Access authentication method, Apparatus and system
US10608988B2 (en) Method and apparatus for bluetooth-based identity recognition
CN105656948A (en) Account login method and device
US10102505B2 (en) Server-implemented method, terminal-implemented method and device for acquiring business card information
CN104391870B (en) Logistics information acquisition methods and device
CN106453052B (en) Message interaction method and device
RU2628478C2 (en) Method and device for network access
CN103914634A (en) Image encryption method, image encryption device and electronic device
CN104933351A (en) Information security processing method and information security processing device
CN106097494A (en) The method for unlocking of smart lock and device
CN105407098A (en) Identity verification method and device
CN103914541B (en) The method and device of information search
CN104318177A (en) Protection method and protection device for data of terminal equipment
CN105471814A (en) Account number management method and account number management device
CN105323244A (en) Method and device for network identification
CN104468581B (en) The method and device of login application program
CN104158659A (en) Anti-fake verifying method, device and system
CN105407070A (en) Logging-in authorization method and device
CN104166814A (en) Method and device for prompting WIFI network password and equipment
CN104158665A (en) Method and device of verification
CN108012270B (en) Information processing method, equipment and computer readable storage medium
US20160242107A1 (en) Apparatus and method for accessing electronic device having hot spot function
CN105491518A (en) Method and device for social reminding based on wearable devices
CN105681261A (en) Security authentication method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant