CN106385506A - Information notification management method and device - Google Patents

Information notification management method and device Download PDF

Info

Publication number
CN106385506A
CN106385506A CN201610839191.XA CN201610839191A CN106385506A CN 106385506 A CN106385506 A CN 106385506A CN 201610839191 A CN201610839191 A CN 201610839191A CN 106385506 A CN106385506 A CN 106385506A
Authority
CN
China
Prior art keywords
information
privacy
contact
person
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610839191.XA
Other languages
Chinese (zh)
Inventor
孙钰
刘鹤晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Mobile Intelligent Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610839191.XA priority Critical patent/CN106385506A/en
Publication of CN106385506A publication Critical patent/CN106385506A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephone Function (AREA)

Abstract

The present invention discloses an information notification management method and device and belongs to the information processing technical field. The method includes the following steps that: an information notification is received, the information of a sender is obtained according to the information notification; if the information of the sender is matched with a pre-stored privacy contact, the information notification is determined as privacy information, and concealment processing is performed on a notification text in the privacy information; and the privacy information which has been subjected to concealment processing is displayed in a notification bar. With the information notification management method and device provided by the technical schemes of the invention adopted, an existing information notification management technology is optimized; even if a terminal receives and displays an information notification corresponding to a privacy contact, the content in the information notification will not be disclosed; and therefore, the security and privacy of the information sent by the privacy contact can be greatly improved.

Description

Information notification management method and device
Technical field
The present embodiments relate to the information processing technology, more particularly, to a kind of information notification management method and device.
Background technology
With scientific and technological development, the intelligent terminal such as mobile phone, panel computer is increasingly popularized in our life, meanwhile, In order to meet the use demand of user, mobile terminal provides various functions, and for example, people can be carried out using mobile phone Positioning and navigation, carry out information interchange by mobile phone with colleague, relative and friend, and cell phone address book are just used to record A kind of very important mode of frequent contact information.Wherein, because the associated person information of record in address list is very possible It is related to the privacy of user, therefore how to ensure that the security of associated person information is that have a to be solved major issue.
In prior art, there are various different cipher modes can realize to one of address list or multiple contact person Information is encrypted, to realize the protection to associated person information.
During realizing the present invention, inventor finds:Although prior art can be believed to the contact person in address list Breath is protected, but if this contact person sends various information, then this associated person information and transmitted information to user Content can be shown in the informing of terminal in the way of information notifies, therefore, other users can be in the screen locking of terminal Under state or released state obtain user wish obtain secret protection associated person information.
Content of the invention
In view of this, the embodiment of the present invention provides a kind of information notification management method and device, to optimize existing information Notify administrative skill it is ensured that the security of privacy contact and privacy contact institute photos and sending messages and privacy.
In a first aspect, embodiments providing a kind of information notification management method, including:
Receive information notifies, and notifies to obtain sender information according to described information;
If described sender information is matched with the privacy contact prestoring, described information is notified to be defined as privacy Information, and the notice text in described privacy information is hidden processing;
To be shown in informing through hiding the described privacy information processing.
Second aspect, the embodiment of the present invention additionally provides a kind of information and notifies managing device, including:
Sender information acquisition module, notifies for receive information, and notifies to obtain sender information according to described information;
Notify text hidden module, if matched with the privacy contact prestoring for described sender information, will Described information notifies to be defined as privacy information, and the notice text in described privacy information is hidden processing;
Privacy information display module, for being shown in informing through hiding the described privacy information processing.
Information notification management method provided in an embodiment of the present invention and device are corresponding with a privacy contact receiving Information notify after, be not directly this information content of announcement to be shown in informing, but need to obtain first and institute State privacy contact corresponding Authority Verification information, only described Authority Verification information and the conjunction associated by described privacy contact Method authority information matches, and just can notify to be shown by described information, optimize existing information and notify administrative skill, realize Even if terminal receive and show information corresponding with privacy contact notify it is also possible to ensure this information notify in content Not compromised, substantially increase security and the privacy of the sent information of privacy contact.
Brief description
Fig. 1 is a kind of flow chart of information notification management method that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow chart of information notification management method that the embodiment of the present invention two provides;
Fig. 3 is a kind of flow chart of information notification management method that the embodiment of the present invention three provides;
Fig. 4 is the structure chart that a kind of information that the embodiment of the present invention four provides notifies managing device;
Fig. 5 is the structure chart that a kind of information that the embodiment of the present invention five provides notifies managing device.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention, rather than limitation of the invention.It also should be noted that, in order to just Part related to the present invention rather than entire infrastructure is illustrate only in description, accompanying drawing.
It also should be noted that, for the ease of description, illustrate only in accompanying drawing part related to the present invention rather than Full content.It should be mentioned that some exemplary embodiments are described before exemplary embodiment is discussed in greater detail Become the process described as flow chart or method.Although operations (or step) are described as the process of order by flow chart, It is that many of which operation can be implemented concurrently, concomitantly or simultaneously.Additionally, the order of operations can be by again Arrange.Described process can be terminated when its operations are completed, it is also possible to have the additional step being not included in accompanying drawing. Described process can correspond to method, function, code, subroutine, subprogram etc..
Embodiment one
A kind of flow chart of information notification management method that Fig. 1 provides for the embodiment of the present invention one, the method can be by believing Breath notifies managing device execution, and this device can be realized by software and/or hardware, and typically can be integrated in terminal.As Fig. 1 institute Show, the method for the present embodiment specifically includes:
110th, receive information notifies, and notifies to obtain sender information according to described information.
In the present embodiment, if terminal opens Information Notification Services, when terminal receives the short of other-end transmission During the information that letter, wechat or certain application service push, corresponding information can be generated and notify and shown in informing, So that user easily and efficiently obtains content of announcement.
One information has generally comprised sender information in notifying, and for example, the information that user have received a note notifies, Then in this information notice, carry sender information corresponding with short message sending person, for example, short message sending person is at this eventually simultaneously The pet name of storage in end communication record.
If 120 described sender information and the privacy contact prestoring match, described information is notified to be defined as Privacy information, and the notice text in described privacy information is hidden processing.
In the present embodiment, described privacy contact refers to need to carry out secret protection or the higher connection of privacy class It is people.Described contact person can include:Address book contact, mail contact, the contact person in instant chat application program or Contact person in person's social networks application program etc..
Optionally, the whole contact persons in address list, mailbox or instant chat application program can be disposed as hidden Private contact person can also be selection according to user by part contact person (the 1 or several) setting in above-mentioned contact person For privacy contact.
In the present embodiment, inventor based on the deficiencies in the prior art it is proposed that a kind of to the information with privacy contact The text that notifies in notice is necessarily hidden the technical scheme of process, when user receives one by the sent letter of privacy contact When ceasing corresponding information notice, only can show the essential information (optional, the pet name in address list) of this privacy contact, and Notice text during information is notified is hidden, to guarantee the security of information.
130th, will be shown in informing through hiding the described privacy information processing.
Those skilled in the art could be aware that, the informing of terminal interface is generally used for display information and notifies, by privacy Information after treatment, can directly be shown in informing, both ensure that the security of this privacy information and will not make User misses and this privacy information is checked.
Information notification management method provided in an embodiment of the present invention, is receiving information corresponding with privacy contact After notice, it is not directly this information content of announcement to be shown in informing, but needs to obtain first and described privacy Contact person's corresponding Authority Verification information, only described Authority Verification information and the lawful authority associated by described privacy contact Described information just can be notified be shown by information match, though optimize existing information notify administrative skill it is achieved that Terminal receives and shows that information corresponding with privacy contact notifies it is also possible to ensure that the content in this information notice is not let out Dew, substantially increases security and the privacy of the sent information of privacy contact.
On the basis of above-described embodiment, will shown in informing through hiding the described privacy information processing Afterwards, can also include:
Asked according to information inspection corresponding with described privacy information, obtain first authority corresponding with described privacy information Checking information;
If the legal power associated by described first Authority Verification information privacy contact corresponding with described privacy information Limit information matches, then shown the described notice text in described privacy information.
In the present embodiment, if after information notifies to be confirmed as privacy information, if receiving the information of user Check request, then will not directly the content of this privacy information be shown, but need to obtain Authority Verification information first.
Wherein, described Authority Verification information specifically refers to check in privacy information for verifying whether active user has permission The checking information held.
Accordingly, need to prestore the lawful authority information associating with privacy contact, this lawful authority information is used for Identify the accuracy of this Authority Verification information.
Described lawful authority information can include following at least one:Finger print information, iris information, face information, gesture Information, setting character string information and setting pictorial information.
Wherein, described lawful authority information can identical or different from the screen locking password of terminal it is preferred that in order to Improve the security of described privacy contact further, described lawful authority information is different from the screen locking password of terminal.
Typically, the input window of Authority Verification information can be ejected after the information inspection receiving user is asked, with Indicate this user in described input window, complete the input to described Authority Verification information.
Further, operation complexity during privacy information, described lawful authority information are checked in order to reduce validated user Iris information or face information can be selected.Now, after the information inspection receiving user is asked, can be opened by backstage Open the iris information of mode this user of direct access of camera or face information is mated with lawful authority information, if This user is validated user, then directly can be shown privacy information.
Further, if described Authority Verification information and the lawful authority information not phase associated by described privacy contact Coupling, then can be automatically switched off informing, prompting user re-enters new Authority Verification information and verified or directly right Terminal carries out the operation such as screen locking, and the present embodiment to this and is not limited.
So setting benefit be:After receiving information inspection request corresponding with privacy information, it is not direct This privacy information is shown, but needs to obtain the authority of privacy contact association corresponding with described privacy information first Checking information, only described Authority Verification information and the lawful authority information match associated by described privacy contact, just meeting Described privacy information row is shown it is ensured that the content of privacy information is not compromised, substantially increases the security of privacy information And privacy.
Embodiment two
A kind of schematic flow sheet of information notification management method that Fig. 2 provides for the embodiment of the present invention two.The present embodiment with Embodied based on above-described embodiment, in the present embodiment, asked according to information inspection corresponding with described privacy information Ask, before obtaining the first Authority Verification information of privacy contact corresponding with described privacy information, also specifically include:According to connection It is people's information storage request, identification setting identification symbol in associated person information corresponding with contact person to be stored;If identified Described setting identification symbol, then obtain lawful authority information corresponding with described contact person to be stored;By described contact person to be stored It is defined as privacy contact, and store corresponding with described privacy contact for described lawful authority information.Accordingly, the present embodiment Method specifically include:
210th, request is stored according to associated person information, identification in associated person information corresponding with contact person to be stored sets Identifier.
In the present embodiment, give a kind of implementation method of quick setting privacy contact.When user passes through contact person Class application program (typical, the application program such as address list, mailbox, QQ good friend and wechat) have input an associated person information Afterwards, can be further in input entry (for example, contact person's Real Name or contact phone or the address of associated person information Deng) stem or afterbody input one or more identifier set in advance, for example:" # ", " * ", " $ " or " % " Deng, afterwards need not any artificial setting operation, this contact person can be set to a privacy contact by system automatically.
Certainly, it will be appreciated by persons skilled in the art that described setting identification symbol can be special for one or more Character or the middle word (for example, close) or the setting English alphabet or English word etc. that set quantity;Described setting The identification position of identifier can be the setting position of the setting entry in associated person information, and the present embodiment is to the above not Limited.
220th, judge whether to identify described setting identification symbol, if so, execute 230;Otherwise, 250 are executed.
230th, lawful authority information corresponding with described contact person to be stored, execution 240 are obtained.
Wherein, described lawful authority information can be autonomous by user by way of ejecting lawful authority information input window Input, it is also possible to the mode of camera is opened on backstage, catches the iris information of user or face information obtains, can also be directly Using the screen locking password of terminal or other kinds of password set in advance as described lawful authority information, the present embodiment To this and be not limited.
240th, described contact person to be stored is defined as privacy contact, and by described lawful authority information and described privacy The corresponding storage of contact person, executes 260.
250th, described contact person to be stored is defined as ordinary contacts, executes 260.
In the present embodiment, if the user while when storing an associated person information, adding in associated person information and set Determine identifier, then this contact person can be defined as ordinary contacts, and lead to receiving information corresponding with ordinary contacts When knowing, information corresponding with ordinary contacts can be notified directly to be shown in informing.
260th, receive information notifies, and notifies to obtain sender information according to described information.
If 270 described sender information and the privacy contact prestoring match, described information is notified to be defined as Privacy information, and the notice text in described privacy information is hidden processing.
280th, will be shown in informing through hiding the described privacy information processing.
290th, according to information inspection request corresponding with described privacy information, obtain corresponding with described privacy information first Authority Verification information.
If the conjunction associated by 2100 described first Authority Verification information privacy contact corresponding with described privacy information Method authority information matches, then shown the described notice text in described privacy information.
The technical scheme of the present embodiment is passed through, according to information inspection request corresponding with described privacy information, to obtain and institute Before stating the first Authority Verification information of the corresponding privacy contact of privacy information, according to associated person information store request, with Identification setting identification symbol in the corresponding associated person information of contact person to be stored;If identifying described setting identification symbol, obtain Lawful authority information corresponding with described contact person to be stored;Described contact person to be stored is defined as privacy contact, and will The technological means of described lawful authority information storage corresponding with described privacy contact, it is possible to achieve simple, easily arrange hidden The technique effect of private contact person, user, on the basis of completing associated person information input, only passes through a very simple increase The operation of setting identification symbol a, you can contact person is set to privacy contact.
On the basis of the various embodiments described above, by corresponding with described privacy contact for described lawful authority information storage Afterwards, can also include:
Request is checked according to associated person information corresponding with privacy contact, obtains corresponding with described privacy contact the Two Authority Verification information;
If described second Authority Verification information and the lawful authority information match associated by described privacy contact, The associated person information of described privacy contact is shown.
Wherein, described associated person information check request can include following at least one:
Associated person information corresponding with address list application program checks request contact person corresponding with short message application program letter Breath checks that request associated person information corresponding with mail applications checks that request is corresponding with instant chat application program It is that people's information inspection is asked and associated person information corresponding with social networks application program checks request.
In this optional embodiment, in each application program with associated by privacy contact (optionally, address list, short Letter and mail etc.) in, directly can not directly display the details of privacy contact, need also exist for similar to embodiment one Operation just enable checking to the associated person information in above-mentioned application program.So setting benefit be:Even if terminal is led to Cross various modes to be unlocked it is also possible to ensure that privacy contact information is not compromised, substantially increase privacy contact information Security and privacy.
On the basis of the various embodiments described above, request is checked according to associated person information corresponding with privacy contact, is obtaining After taking the second Authority Verification information corresponding with described privacy contact, can also include:
If described second Authority Verification information and the lawful authority information matches failure associated by described privacy contact, Then reacquire the second new Authority Verification information to be mated;
If the number of times that it fails to match exceedes setting threshold value, triggering execution terminal screen lock operation.
In this optional embodiment it is contemplated that when user is based on a privacy contact input Authority Verification information, by The presence of the factors such as the maloperation in the accuracy of identification of system and user, may a validated user single Authority Verification letter The matching process of breath is unsuccessful.At this point it is possible to require user to re-enter new Authority Verification information to be mated again, such as If really repeatedly it fails to match, then can determine that this user is not validated user.Therefore, it can directly terminal be carried out screen lock Fixed other privacy informations with protection user.So setting benefit be:Hidden with described in Authority Verification information by increased The process strategy after the failure of lawful authority information matches associated by private contact person, optimizes and perfect enforcement of the present invention further The technical scheme of example.
Embodiment three
A kind of schematic flow sheet of information notification management method that Fig. 3 provides for the embodiment of the present invention three.The present embodiment with Embodied based on above-described embodiment, in the present embodiment, asked according to information inspection corresponding with described privacy information Ask, before obtaining the first Authority Verification information corresponding with described privacy information, also specifically include:Please according to contact person's encryption Ask, obtain the contact person of Choice encryption;Obtain lawful authority information corresponding with the contact person of described Choice encryption;By described choosing The contact person selecting encryption is defined as privacy contact, and stores corresponding with described privacy contact for described lawful authority information.
Accordingly, the method for the present embodiment specifically includes:
310th, according to contact person's CIPHERING REQUEST, obtain the contact person of Choice encryption.
In the present embodiment, give a kind of practical operation according to user and select the contact person needing encryption as privacy The implementation method of contact person, the present embodiment is with the difference of embodiment two:For cannot be true in associated person information memory phase In the case that whether this contact person fixed is privacy contact, flexibly a contact person can be set under when machine in office hidden Private contact person.
320th, obtain lawful authority information corresponding with the contact person of described Choice encryption.
330th, the contact person of described Choice encryption is defined as privacy contact, and by described lawful authority information with described The corresponding storage of privacy contact.
340th, receive information notifies, and notifies to obtain sender information according to described information.
If 350 described sender information and the privacy contact prestoring match, described information is notified to be defined as Privacy information, and the notice text in described privacy information is hidden processing.
360th, will be shown in informing through hiding the described privacy information processing.
370th, according to information inspection request corresponding with described privacy information, obtain corresponding with described privacy information first Authority Verification information.
If the conjunction associated by 380 described first Authority Verification information privacy contact corresponding with described privacy information Method authority information matches, then shown the described notice text in described privacy information.
The technical scheme of the present embodiment is passed through to obtain the contact person of Choice encryption according to contact person's CIPHERING REQUEST;Obtain with Contact person's corresponding lawful authority information of described Choice encryption;The contact person of described Choice encryption is defined as privacy contact People, and the technological means by corresponding with described privacy contact for described lawful authority information storage, increased privacy contact and set Put flexibility and the mobility on opportunity.
On the basis of the various embodiments described above, methods described can also include:
Obtain at least one to be synchronized contact person corresponding with contact person's synchronization request;
If described contact person to be synchronized includes privacy contact to be synchronized, by described privacy contact to be synchronized Associated person information, privacy state and the lawful authority information associated by described privacy contact to be synchronized jointly send to In step equipment.
Wherein, described synchronizer can be Cloud Server, or other kinds of terminal device.
So setting benefit be:At present, a lot of application programs all carry high in the clouds or the work(of other-end remote synchronization Can, if a privacy contact is synchronized, the privacy state of this privacy contact synchronous and associated simultaneously Lawful authority information, it is possible to achieve if other users want to check this privacy contact in synchronizer, similarly need Input the Authority Verification information matching, with the security of comprehensive, multi-level guarantee privacy contact information.
Example IV
Fig. 4 notifies the structure chart of managing device for a kind of information that the embodiment of the present invention four provides.As shown in figure 4, it is described Device includes:Sender information acquisition module 41, notice text hidden module 42 and privacy information display module 43.
Sender information acquisition module 41, notifies for receive information, and notifies to obtain addresser's letter according to described information Breath.
Notify text hidden module 42, if matched with the privacy contact prestoring for described sender information, Described information is notified to be defined as privacy information, and the notice text in described privacy information is hidden processing.
Privacy information display module 43, for being shown in informing through hiding the described privacy information processing Show.
Information provided in an embodiment of the present invention notifies managing device, is receiving information corresponding with privacy contact After notice, it is not directly this information content of announcement to be shown in informing, but needs to obtain first and described privacy Contact person's corresponding Authority Verification information, only described Authority Verification information and the lawful authority associated by described privacy contact Described information just can be notified be shown by information match, though optimize existing information notify administrative skill it is achieved that Terminal receives and shows that information corresponding with privacy contact notifies it is also possible to ensure that the content in this information notice is not let out Dew, substantially increases security and the privacy of the sent information of privacy contact.
Embodiment five
Fig. 5 notifies the structure chart of managing device for a kind of information that the embodiment of the present invention five provides.The present embodiment is with above-mentioned Embodied based on embodiment.
In the present embodiment, can also include, privacy information checks module 44, is used for:
After being shown in informing through hiding the described privacy information of process, believe according to described privacy Cease corresponding information inspection request, obtain first Authority Verification information corresponding with described privacy information;
If the legal power associated by described first Authority Verification information privacy contact corresponding with described privacy information Limit information matches, then shown the described notice text in described privacy information.
In the present embodiment, can also include, the first privacy contact determining module 45, be used for:
According to information inspection request corresponding with described privacy information, obtain privacy connection corresponding with described privacy information Be people the first Authority Verification information before, according to associated person information store request, contact corresponding with contact person to be stored Identification setting identification symbol in people's information;
If identifying described setting identification symbol, obtain lawful authority information corresponding with described contact person to be stored;
Described contact person to be stored is defined as privacy contact, and described lawful authority information and described privacy are contacted The corresponding storage of people.
In the present embodiment, can also include, the second privacy contact determining module 46, be used for:
According to information inspection request corresponding with described privacy information, obtain first power corresponding with described privacy information Before limit checking information, according to contact person's CIPHERING REQUEST, obtain the contact person of Choice encryption;
Obtain lawful authority information corresponding with the contact person of described Choice encryption;
The contact person of described Choice encryption is defined as privacy contact, and by described lawful authority information and described privacy The corresponding storage of contact person.
In the present embodiment, described lawful authority information can include following at least one:
Finger print information, iris information, face information, gesture information, setting character string information and setting pictorial information.
In the present embodiment, can also include, privacy contact information display module 47, be used for:
After by corresponding with described privacy contact for described lawful authority information storage, according to corresponding with privacy contact Associated person information check request, obtain second Authority Verification information corresponding with described privacy contact;
If described second Authority Verification information and the lawful authority information match associated by described privacy contact, The associated person information of described privacy contact is shown.
In the present embodiment, can also include, screen locking module 48, be used for:
Request is checked according to associated person information corresponding with privacy contact, is obtaining corresponding with described privacy contact After second Authority Verification information, if described second Authority Verification information and the lawful authority associated by described privacy contact Information matches failure, then reacquire the second new Authority Verification information and mated;
If the number of times that it fails to match exceedes setting threshold value, triggering execution terminal screen lock operation.
In the present embodiment, can also include, privacy contact synchronization module 49, be used for:
Obtain at least one to be synchronized contact person corresponding with contact person's synchronization request;
If described contact person to be synchronized includes privacy contact to be synchronized, by described privacy contact to be synchronized Associated person information, privacy state and the lawful authority information associated by described privacy contact to be synchronized jointly send to In step equipment.
In the present embodiment, described contact person can include:Address book contact, mail contact, instant chat application Contact person in program or the contact person in social networks application program;
Described associated person information check request can include following at least one:
Associated person information corresponding with address list application program checks request contact person corresponding with short message application program letter Breath checks that request associated person information corresponding with mail applications checks that request is corresponding with instant chat application program It is that people's information inspection is asked and associated person information corresponding with social networks application program checks request.
The information that the embodiment of the present invention is provided notifies managing device to can be used for executing what any embodiment of the present invention provided Information notification management method, possesses corresponding functional module, realizes identical beneficial effect.
Note, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious changes, Readjust and substitute without departing from protection scope of the present invention.Therefore although being carried out to the present invention by above example It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also Other Equivalent embodiments more can be included, and the scope of the present invention is determined by scope of the appended claims.

Claims (18)

1. a kind of information notification management method is it is characterised in that include:
Receive information notifies, and notifies to obtain sender information according to described information;
If described sender information is matched with the privacy contact prestoring, described information is notified to be defined as privacy letter Breath, and the notice text in described privacy information is hidden processing;
To be shown in informing through hiding the described privacy information processing.
2. method according to claim 1 is it is characterised in that will notify through hiding the described privacy information processing After being shown in hurdle, also include:
Asked according to information inspection corresponding with described privacy information, obtain first Authority Verification corresponding with described privacy information Information;
If the lawful authority letter associated by described first Authority Verification information privacy contact corresponding with described privacy information Manner of breathing mates, then shown the described notice text in described privacy information.
3. method according to claim 2 is it is characterised in that asking according to information inspection corresponding with described privacy information Ask, before obtaining the first Authority Verification information of privacy contact corresponding with described privacy information, also include:
Request is stored according to associated person information, identification setting identification symbol in associated person information corresponding with contact person to be stored;
If identifying described setting identification symbol, obtain lawful authority information corresponding with described contact person to be stored;
Described contact person to be stored is defined as privacy contact, and by described lawful authority information and described privacy contact pair Should store.
4. method according to claim 2 is it is characterised in that asking according to information inspection corresponding with described privacy information Ask, before obtaining the first Authority Verification information corresponding with described privacy information, also include:
According to contact person's CIPHERING REQUEST, obtain the contact person of Choice encryption;
Obtain lawful authority information corresponding with the contact person of described Choice encryption;
The contact person of described Choice encryption is defined as privacy contact, and described lawful authority information and described privacy are contacted The corresponding storage of people.
5. method according to claim 2 it is characterised in that described lawful authority information include following at least one:
Finger print information, iris information, face information, gesture information, setting character string information and setting pictorial information.
6. the method according to claim 3 or 4 it is characterised in that joining described lawful authority information with described privacy After being the corresponding storage of people, also include:
Request is checked according to associated person information corresponding with privacy contact, obtains second power corresponding with described privacy contact Limit checking information;
If described second Authority Verification information and the lawful authority information match associated by described privacy contact, by institute The associated person information stating privacy contact is shown.
7. method according to claim 6 is it is characterised in that looking into according to associated person information corresponding with privacy contact See request, after obtaining the second Authority Verification information corresponding with described privacy contact, also include:
If described second Authority Verification information and the lawful authority information matches failure associated by described privacy contact, weigh The second new Authority Verification information of new acquisition is mated;
If the number of times that it fails to match exceedes setting threshold value, triggering execution terminal screen lock operation.
8. method according to claim 2 is it is characterised in that also include:
Obtain at least one to be synchronized contact person corresponding with contact person's synchronization request;
If described contact person to be synchronized includes privacy contact to be synchronized, by the contact of described privacy contact to be synchronized People's information, privacy state and the lawful authority information associated by described privacy contact to be synchronized jointly send and set to synchronous In standby.
9. method according to claim 6 is it is characterised in that described contact person includes:Address book contact, e-mail contact Contact person in people, instant chat application program or the contact person in social networks application program;
Described associated person information check request include following at least one:
Associated person information corresponding with address list application program checks that request associated person information corresponding with short message application program is looked into See that request associated person information corresponding with mail applications checks request contact person corresponding with instant chat application program Information inspection request and associated person information corresponding with social networks application program check request.
10. a kind of information notifies managing device it is characterised in that including:
Sender information acquisition module, notifies for receive information, and notifies to obtain sender information according to described information;
Notify text hidden module, if matched with the privacy contact prestoring for described sender information, will be described Information notifies to be defined as privacy information, and the notice text in described privacy information is hidden processing;
Privacy information display module, for being shown in informing through hiding the described privacy information processing.
It is characterised in that also including, privacy information checks module to 11. devices according to claim 10, is used for:
By through hiding process described privacy information shown in informing after, according to described privacy information pair The information inspection request answered, obtains first Authority Verification information corresponding with described privacy information;
If the lawful authority letter associated by described first Authority Verification information privacy contact corresponding with described privacy information Manner of breathing mates, then shown the described notice text in described privacy information.
12. devices according to claim 11 it is characterised in that also including, the first privacy contact determining module, use In:
According to information inspection request corresponding with described privacy information, obtain privacy contact corresponding with described privacy information The first Authority Verification information before, according to associated person information store request, contact person corresponding with contact person to be stored letter Identification setting identification symbol in breath;
If identifying described setting identification symbol, obtain lawful authority information corresponding with described contact person to be stored;
Described contact person to be stored is defined as privacy contact, and by described lawful authority information and described privacy contact pair Should store.
13. devices according to claim 11 it is characterised in that also including, the second privacy contact determining module, use In:
According to information inspection request corresponding with described privacy information, obtain first authority corresponding with described privacy information and test Before card information, according to contact person's CIPHERING REQUEST, obtain the contact person of Choice encryption;
Obtain lawful authority information corresponding with the contact person of described Choice encryption;
The contact person of described Choice encryption is defined as privacy contact, and described lawful authority information and described privacy are contacted The corresponding storage of people.
14. devices according to claim 11 it is characterised in that described lawful authority information include following at least one:
Finger print information, iris information, face information, gesture information, setting character string information and setting pictorial information.
15. devices according to claim 12 or 13 it is characterised in that also including, privacy contact information display module, For:
After by corresponding with described privacy contact for described lawful authority information storage, according to corresponding with privacy contact It is the request of people's information inspection, obtain second Authority Verification information corresponding with described privacy contact;
If described second Authority Verification information and the lawful authority information match associated by described privacy contact, by institute The associated person information stating privacy contact is shown.
16. devices according to claim 15 it is characterised in that also including, screen locking module, be used for:
Request is checked according to associated person information corresponding with privacy contact, is obtaining corresponding with described privacy contact second After Authority Verification information, if described second Authority Verification information and the lawful authority information associated by described privacy contact It fails to match, then reacquire the second new Authority Verification information and mated;
If the number of times that it fails to match exceedes setting threshold value, triggering execution terminal screen lock operation.
17. devices according to claim 11 it is characterised in that also including, privacy contact synchronization module, be used for:
Obtain at least one to be synchronized contact person corresponding with contact person's synchronization request;
If described contact person to be synchronized includes privacy contact to be synchronized, by the contact of described privacy contact to be synchronized People's information, privacy state and the lawful authority information associated by described privacy contact to be synchronized jointly send and set to synchronous In standby.
18. devices according to claim 15 are it is characterised in that described contact person includes:Address book contact, mail connection Be people, the contact person in instant chat application program or the contact person in social networks application program;
Described associated person information check request include following at least one:
Associated person information corresponding with address list application program checks that request associated person information corresponding with short message application program is looked into See that request associated person information corresponding with mail applications checks request contact person corresponding with instant chat application program Information inspection request and associated person information corresponding with social networks application program check request.
CN201610839191.XA 2016-09-21 2016-09-21 Information notification management method and device Withdrawn CN106385506A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610839191.XA CN106385506A (en) 2016-09-21 2016-09-21 Information notification management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610839191.XA CN106385506A (en) 2016-09-21 2016-09-21 Information notification management method and device

Publications (1)

Publication Number Publication Date
CN106385506A true CN106385506A (en) 2017-02-08

Family

ID=57936684

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610839191.XA Withdrawn CN106385506A (en) 2016-09-21 2016-09-21 Information notification management method and device

Country Status (1)

Country Link
CN (1) CN106385506A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107315934A (en) * 2017-05-24 2017-11-03 北京珠穆朗玛移动通信有限公司 Communication message processing method, mobile terminal and storage device
CN107426410A (en) * 2017-05-26 2017-12-01 上海与德科技有限公司 Private information display methods and device
CN107483738A (en) * 2017-08-24 2017-12-15 北京珠穆朗玛移动通信有限公司 Communication message processing method, mobile terminal and storage medium based on dual system
CN107508799A (en) * 2017-07-31 2017-12-22 珠海格力电器股份有限公司 A kind of information demonstrating method and device based on instant messaging
CN107862214A (en) * 2017-06-16 2018-03-30 平安科技(深圳)有限公司 Prevent the method, apparatus and storage medium of sensitive information leakage
CN108574760A (en) * 2017-03-08 2018-09-25 阿里巴巴集团控股有限公司 The display methods and device of associated person information and the display methods and device of information
CN108668001A (en) * 2017-03-30 2018-10-16 中兴通讯股份有限公司 A kind of method, apparatus and terminal of display notification message
WO2021164314A1 (en) * 2020-02-19 2021-08-26 华为技术有限公司 Notification prompting method, server, and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895607A (en) * 2010-05-10 2010-11-24 华为终端有限公司 Method and terminal for protecting user privacy information
CN103780731A (en) * 2012-10-26 2014-05-07 腾讯科技(深圳)有限公司 Method and device for obtaining privacy contacts
CN104284024A (en) * 2014-09-30 2015-01-14 厦门美图移动科技有限公司 Method for hiding contact person information on intelligent device
KR20160086160A (en) * 2015-01-09 2016-07-19 엘지전자 주식회사 Mobile terminal and method for controlling the same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895607A (en) * 2010-05-10 2010-11-24 华为终端有限公司 Method and terminal for protecting user privacy information
CN103780731A (en) * 2012-10-26 2014-05-07 腾讯科技(深圳)有限公司 Method and device for obtaining privacy contacts
CN104284024A (en) * 2014-09-30 2015-01-14 厦门美图移动科技有限公司 Method for hiding contact person information on intelligent device
KR20160086160A (en) * 2015-01-09 2016-07-19 엘지전자 주식회사 Mobile terminal and method for controlling the same

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108574760A (en) * 2017-03-08 2018-09-25 阿里巴巴集团控股有限公司 The display methods and device of associated person information and the display methods and device of information
US10977350B2 (en) 2017-03-08 2021-04-13 Alibaba Group Holding Limited Contact information display method and device, and information display method and device
CN108668001A (en) * 2017-03-30 2018-10-16 中兴通讯股份有限公司 A kind of method, apparatus and terminal of display notification message
CN107315934A (en) * 2017-05-24 2017-11-03 北京珠穆朗玛移动通信有限公司 Communication message processing method, mobile terminal and storage device
CN107426410A (en) * 2017-05-26 2017-12-01 上海与德科技有限公司 Private information display methods and device
CN107862214A (en) * 2017-06-16 2018-03-30 平安科技(深圳)有限公司 Prevent the method, apparatus and storage medium of sensitive information leakage
CN107508799A (en) * 2017-07-31 2017-12-22 珠海格力电器股份有限公司 A kind of information demonstrating method and device based on instant messaging
CN107508799B (en) * 2017-07-31 2018-12-04 珠海格力电器股份有限公司 A kind of information demonstrating method and device based on instant messaging
CN107483738A (en) * 2017-08-24 2017-12-15 北京珠穆朗玛移动通信有限公司 Communication message processing method, mobile terminal and storage medium based on dual system
CN107483738B (en) * 2017-08-24 2020-05-22 北京珠穆朗玛移动通信有限公司 Communication information processing method based on dual systems, mobile terminal and storage medium
WO2021164314A1 (en) * 2020-02-19 2021-08-26 华为技术有限公司 Notification prompting method, server, and storage medium

Similar Documents

Publication Publication Date Title
CN106385506A (en) Information notification management method and device
US9306926B2 (en) User authentication using unique hidden identifiers
US20220385471A1 (en) Mobile Terminal Privacy Protection Method and Protection Apparatus, and Mobile Terminal
CN106534570B (en) A kind of method for secret protection and device
US10193844B1 (en) Secure cloud-based messaging and storage
US10708237B2 (en) System and method for chat messaging in a zero-knowledge vault architecture
US8290473B2 (en) Remotely modifying data in memory in a mobile device
US9866591B1 (en) Enterprise messaging platform
CN101304453A (en) Mobile terminal as well as method and system for data privacy
CN103365922A (en) Method and device for associating images with personal information
CN103841262A (en) Method and device for displaying privacy information
CN109088812A (en) Information processing method, device, computer equipment and storage medium
CN107666395A (en) One population file management method, user terminal, group chat system
CN109684129A (en) Data backup restoration method, storage medium, encryption equipment, client and server
CN107315934A (en) Communication message processing method, mobile terminal and storage device
CN109981677A (en) A kind of credit management method and device
JP2013120594A (en) Portable information terminal communicable with ic chip
CN106254226A (en) A kind of information synchronization method and device
US20160294787A1 (en) Secure and confidential messaging systems
JP2013120433A (en) Portable information terminal communicable with ic chip
WO2016126151A1 (en) System for establishing secure communication between multiple electronic communication devices
CN105471711A (en) Mail encryption system based on intelligent mobile phone and realization method thereof
CN106332011B (en) Short message encryption communication method and terminal
CN105959112B (en) A kind of offline key injected system and method
CN103338148A (en) Address book updating methods and address book updating device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20170208

WW01 Invention patent application withdrawn after publication