CN107748848A - A kind of information processing method and mobile terminal - Google Patents
A kind of information processing method and mobile terminal Download PDFInfo
- Publication number
- CN107748848A CN107748848A CN201710958152.6A CN201710958152A CN107748848A CN 107748848 A CN107748848 A CN 107748848A CN 201710958152 A CN201710958152 A CN 201710958152A CN 107748848 A CN107748848 A CN 107748848A
- Authority
- CN
- China
- Prior art keywords
- information
- keys word
- mobile terminal
- sensitive
- sensitive keys
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a kind of information processing method and mobile terminal.This method includes:Acquisition for mobile terminal judges to whether there is default sensitive keys word in the raw information to after raw information;When default sensitive keys word in raw information be present, the sensitive keys word in raw information is replaced by the non-sensitive information different from sensitive keys word, obtains update information;The update information being displayed on information preview interface is hidden.The present invention by judge acquisition for mobile terminal to raw information in whether there is default sensitive keys word; and when default sensitive keys word in raw information be present; sensitive keys word in the raw information is replaced by the non-sensitive information different from the sensitive keys word; obtain update information; and the update information being displayed on information preview interface is hidden; the protection to mobile terminal user's individual privacy can not only be realized; the effect of secret protection can also be improved, lifts Consumer's Experience.
Description
Technical field
The present embodiments relate to communication technical field, more particularly to a kind of information processing method and mobile terminal.
Background technology
With the continuous popularization of intelligent mobile terminal equipment, increasing people carries out every business using mobile terminal
Handle, such as mobile payment, personal information registration, account number cipher management, mobile phone checking, this is very easy to ours
Life, but equally also bring great potential safety hazard to personal information and property safety.
Especially mobile payment, for example wechat is paid, Alipay is paid, bank card is paid etc., due to above-mentioned mobile payment
Mode typically can all be bound with phone number, and so, any transaction in personal asset account can all pass through the side of information
Formula is sent to mobile phone terminal.Due to this type of information and its sensitivity, to prevent leakage of information, prior art is frequently with cryptographic means to this
Category information is encrypted, and still, the secret protection effect that existing cryptographic means are reached is poor, so that destroying user and its
Trusting relationship between intimate people.
The content of the invention
The embodiment of the present invention provides a kind of information processing method and mobile terminal, is reached with solving existing cryptographic means
Secret protection effect it is poor the problem of.
In order to solve the above-mentioned technical problem, the present invention is realized in:A kind of information processing method, including:
Acquisition for mobile terminal judges to whether there is default sensitive keys word in the raw information to after raw information;
When default sensitive keys word in the raw information be present, by the sensitive keys word in the raw information more
The non-sensitive information different from the sensitive keys word is changed to, obtains update information;
The update information being displayed on information preview interface is hidden.
The embodiment of the present invention additionally provides a kind of mobile terminal, including:
Judge module, after acquisition for mobile terminal to raw information, judge in the raw information with the presence or absence of default
Sensitive keys word;
Processing module, during for default sensitive keys word in the raw information be present, by the raw information
Sensitive keys word be replaced by the non-sensitive information different from the sensitive keys word, obtain update information;
Hidden module, the update information for being displayed on information preview interface are hidden.
The embodiments of the invention provide a kind of mobile terminal, including:Processor, memory and it is stored on the memory
And the computer program that can be run on the processor, the computer program are realized as described above during the computing device
The step of described information processing method.
The embodiments of the invention provide a kind of computer-readable recording medium, stored on the computer-readable recording medium
Computer program, the computer program realizes information processing method as described above when being executed by processor the step of.
In embodiments of the present invention, by judge acquisition for mobile terminal to raw information in whether there is default sensitivity
Keyword, and when default sensitive keys word be present in raw information, the sensitive keys word in the raw information is replaced by
The non-sensitive information different from the sensitive keys word, update information is obtained, and the amendment being displayed on information preview interface
Information is hidden, this that the information for being related to individual subscriber privacy is carried out into invisible processing, can not only be realized to mobile whole
The protection of end subscriber individual privacy, additionally it is possible to improve the effect of secret protection, lift Consumer's Experience.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention
The accompanying drawing needed to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the present invention
Example, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these accompanying drawings
Obtain other accompanying drawings.
Fig. 1 is the flow chart for the information processing method that one embodiment of the invention provides;
Fig. 2 is the flow chart for the information processing method that another embodiment of the present invention provides;
Fig. 3 is the mobile terminal structure schematic diagram that one embodiment of the invention provides;
Fig. 4 is the mobile terminal structure schematic diagram that another embodiment of the present invention provides;
Fig. 5 is the mobile terminal structure schematic diagram of the offer of further embodiment of this invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
Fig. 1 is the flow chart of the information processing method of one embodiment of the invention.Below should figure illustrate this method
Implementation process.
Step 101, acquisition for mobile terminal judges to whether there is default sensitivity in the raw information to after raw information
Keyword.
Here, sensitive keys word is the information related to individual subscriber privacy pre-set.It is such as wage, bonus, red
The information of the reflection individual subscriber condition of assets such as profit, financing, or ID card No. etc. characterize the information of individual subscriber identity.
Step 102, when default sensitive keys word in the raw information be present, by the sensitivity in the raw information
Keyword is replaced by the non-sensitive information different from the sensitive keys word, obtains update information.
Here, because sensitive keys word is related to individual subscriber privacy, so, generally, include sensitive keys word
Raw information, individual subscriber are to be reluctant for other people (people beyond certain limit) disclosures or know.
Here, update information is different from sensitive keys word non-by the way that the sensitive keys word in raw information is replaced by
What sensitive information obtained, so, the information related to individual subscriber privacy is will not relate in the update information, moreover, even if should
Update information is shown in the information list of mobile terminal, is never actually viewed by others, and other people can not also interpret and the update information pair
The raw information answered, substantially reduce the risk of individual subscriber privacy leakage.
Step 103, the update information being displayed on information preview interface is hidden.
That is, the update information is not shown on information preview interface.
Here, the purpose for hiding update information is to further protect mobile terminal user's individual privacy, prevent to original
When sensitive keys word in beginning information changes processing imperfection, the leakage of part privacy information.
Usually, the update information can be hidden to the default memory block of the mobile terminal.
Specifically, the step of update information being displayed on information preview interface is hidden, may particularly include:
When detecting that the update information meets default hidden conditional, the update information is hidden.
Here, specifically, when detecting that validated user has read the update information, the update information is carried out hidden
Hide;
Or detecting that validated user read the update information, and the default behaviour to the update information be present
When making, the update information is hidden.
Here, validated user can be identified by iris detection, for details, reference can be made to the elaboration of step 104 part, here not
Repeat again.
It should be noted that update information can be hidden by configuration information hiding button.Mobile terminal passes through knowledge
The pressing operation on Information hiding button being clipped to, is hidden to update information.Certainly, predetermined registration operation can also be long-press behaviour
Make, selection menu is recalled by long-press operation, after user's selection is hidden, the update information is hidden.
Information processing method provided in an embodiment of the present invention, by judge acquisition for mobile terminal to raw information in whether
, will be quick in the raw information when default sensitive keys word be present, and default sensitive keys word be present in raw information
Sense keyword is replaced by the non-sensitive information different from the sensitive keys word, obtains update information, and be displayed on information preview
The update information on interface is hidden, this that the information for being related to individual subscriber privacy is carried out into invisible processing, can not only
Enough realize the protection to mobile terminal user's individual privacy, additionally it is possible to improve the effect of secret protection, lift Consumer's Experience.
On the basis of the embodiment shown in above-mentioned Fig. 1, as a preferable implementation, step 102 of the present invention can have
Body includes:
According to the corresponding relation of the sensitive keys word prestored and camouflage keyword, the sensitive keys word is replaced with
It is corresponding with the sensitive keys word to pretend keyword.
It should be noted that sensitive keys word can be stored in advance in the quick of mobile terminal with pretending the corresponding relation of keyword
Feel in information database.Here, user can be according to being actually needed, and the non-sensitive information database is added in selection.
Further, sensitive keys word can use system default to set and be selected for user, also can voluntarily be set by user.Camouflage is closed
Keyword and sensitive keys word are set with pretending the corresponding relation of keyword by user, so in addition to user informs other people,
Other people are can not to learn sensitive keys word and pretend the corresponding relation of keyword, avoid the wind of individual subscriber leakage of private information
Danger.
Here, the degree of correlation of the sensitive keys word and the camouflage keyword is less than predetermined threshold value.It is that is, sensitive
Keyword is incoherent with camouflage keyword.
Generally, in a raw information, sensitive keys word may include to have it is multiple, than such as relating to personal income source
Item, such as, wage, bonus, bonus, financing etc.;The monetary unit relevant with money, e.g., member, U.S. dollar, Euro etc.;Also one
A little other informations, such as, keep accounts, pay, remaining sum, tail number 1234 etc..
For example, sensitive keys word is " wage ", camouflage keyword corresponding with " wage " is " pencil ";Sensitive keys word is
" member ", camouflage keyword corresponding with " member " is " branch ";Sensitive keys word is " keeping accounts ", camouflage keyword corresponding with " keeping accounts "
For " receiving ";Sensitive keys word is " remaining sum ", and camouflage keyword corresponding with " remaining sum " is " total ";Sensitive keys word is " tail
Numbers 1234 ", the camouflage keyword with " account of tail number 1234 " is " warehouse ".
If raw information is:The account of tail number 1234 keeps accounts 2000 yuan of wage, 6000 yuan of remaining sum.Place so through this step
Reason, obtained update information are:Warehouse receives pencil 2000, amounts to 6000.
So, using pretending after keyword replaces the sensitive keys word in raw information, obtained update information be with
The information of raw information wide of the mark, even if the update information is shown in the information list of mobile terminal, it is never actually viewed by others,
The individual privacy of user will not be revealed, in this way, while can protect mobile terminal user's individual privacy, additionally it is possible to reach
The purpose for occurring trust crisis between men is avoided, lifts Consumer's Experience.
On the basis of the embodiment shown in above-mentioned Fig. 1, as another preferable implementation, step 102 of the present invention can
Specifically include:
The sensitive keys word is subjected to Fuzzy Processing, mosaic processing or mess code processing, obtains non-sensitive information.
Here, Fuzzy Processing, mosaic processing or mess code are carried out to sensitive keys word by some preset algorithms to handle, obtained
To non-sensitive information.For example, Fuzzy Processing is carried out to sensitive keys word using fuzzy matching algorithm;Using demosaicing algorithm to quick
Feel keyword and carry out mosaic processing;Mess code processing is carried out to sensitive keys word using default mess code encryption algorithm.
So, sensitive keys word can not normally be shown, so as to avoid the individual privacy of user compromised.
On the basis of the embodiment shown in above-mentioned Fig. 1, it is preferred that as shown in Fig. 2 after step 103, methods described is also
Including:
Step 104, will be described non-in the update information when it is determined that validated user request browses the update information
Sensitive information is converted to sensitive keys word, recovers raw information.
It should be noted that by the execution of this step, raw information is recovered from update information, in order to legal use
Family, refer generally to the mobile terminal affiliated user, it is convenient that raw information is checked.
So, how to determine the user for browsing information is validated user, can be realized by following two modes:
As a preferable implementation, this step 104 may particularly include:
When receiving user using non-sensitive information progress information search, it is described to determine that validated user request browses
Update information.
Here, it is preferred that, the non-sensitive information is camouflage keyword.Wherein pretending keyword can correspond to reference to above-mentioned implementation
Example step 102, by the corresponding relation according to the sensitive keys word prestored and camouflage keyword, by the sensitive keys word
Replace with the elaboration of the part of camouflage keyword corresponding with the sensitive keys word.
It should be noted that informed due to the only mobile terminal affiliated user of camouflage keyword, or by user
Camouflage keyword insider know, so, when user input camouflage keyword search information when, mobile terminal can determine that this is searched
Rope user is validated user, further, by pretending keyword search information, due to camouflage keyword to be searched with user it is original
Sensitive keys word in information is uncorrelated, even if other people see the information search operation of user, will not also associate user and want
Search be about its individual privacy in terms of information, improve the effect of secret protection.
As another preferable implementation, this step 104 may particularly include:
Using iris detection, it is determined that the active user for browsing information is validated user.
Explanation is needed exist for, mobile terminal is previously stored with the iris information of the user belonging to it.Work as utilization
Iris detection, detect that the iris information currently got is consistent with the iris information stored on mobile terminal, it is determined that browse
The active user of information is validated user.
Here, iris recognition is one kind belonged in authentication mode based on the iris progress identification in eyes,
It is preferable in the embodiment of the present invention, determine validated user using iris detection.Certain other authentication modes can also adopt
With such as fingerprint recognition, recognition of face, being not specifically limited here.
Due to the stability and uniqueness of the iris feature of eyes, the uniqueness of identification is determined, therefore, utilizes rainbow
Film is detected to determine validated user, can be provided safety assurance to be related to the raw information of privacy of user, be protected the privacy of user
Safety.
As shown in figure 3, the mobile terminal structure schematic diagram provided for one embodiment of the invention.Wherein, the mobile terminal 200
Including:
Judge module 201, after acquisition for mobile terminal to raw information, judge in the raw information with the presence or absence of pre-
If sensitive keys word;
Processing module 202, during for default sensitive keys word in the raw information be present, by the raw information
In sensitive keys word be replaced by the non-sensitive information different from the sensitive keys word, obtain update information;
Hidden module 203, the update information for being displayed on information preview interface are hidden.
On the basis of Fig. 3, it is preferred that as shown in figure 4, the processing module 202 includes:
First processing submodule 2021, for the corresponding pass according to the sensitive keys word prestored with camouflage keyword
System, the sensitive keys word is replaced with and corresponding with the sensitive keys word pretends keyword.
Preferably, the processing module 202 also includes:
Second processing submodule, handled for the sensitive keys word to be carried out into Fuzzy Processing, mosaic processing or mess code,
Obtain non-sensitive information.
Preferably, the mobile terminal 200 also includes:
Information recovery module 204, for when it is determined that validated user request browses the update information, the amendment to be believed
The non-sensitive information in breath is converted to sensitive keys word, recovers raw information.
Preferably, described information recovery module 204 includes:
First determination sub-module 2041, for when receiving user using keyword search information is pretended, it to be legal to determine
User's request browses the update information.
Preferably, described information recovery module 204 includes:
Second determination sub-module 2042, for using iris detection, it is determined that the active user for browsing information is validated user.
Mobile terminal provided in an embodiment of the present invention, by judge module judge acquisition for mobile terminal to raw information in
It is when processing module has default sensitive keys word in raw information, this is original with the presence or absence of default sensitive keys word
Sensitive keys word in information is replaced by the non-sensitive information different from the sensitive keys word, obtains update information, hidden module
The update information being displayed on information preview interface is hidden, this to carry out the information for being related to individual subscriber privacy not
It can be seen that processing, can not only realize the protection to mobile terminal user's individual privacy, additionally it is possible to improve the effect of secret protection, carry
Rise Consumer's Experience.
Mobile terminal provided in an embodiment of the present invention can realize that mobile terminal is realized in Fig. 1 to Fig. 2 embodiment of the method
Each process, to avoid repeating, repeat no more here.
Fig. 5 is a kind of hardware architecture diagram for the mobile terminal for realizing each embodiment of the present invention, the mobile terminal 300
Including but not limited to:It is radio frequency unit 301, mixed-media network modules mixed-media 302, audio output unit 303, input block 304, sensor 305, aobvious
Show the parts such as unit 306, user input unit 307, interface unit 308, memory 309, processor 310 and power supply 311.
It will be understood by those skilled in the art that the mobile terminal structure shown in Fig. 5 does not form the restriction to mobile terminal, it is mobile whole
End can be included than illustrating more or less parts, either combine some parts or different parts arrangement.In the present invention
In embodiment, mobile terminal includes but is not limited to mobile phone, tablet personal computer, notebook computer, palm PC, car-mounted terminal, can worn
Wear equipment and pedometer etc..
Wherein, processor 310, after acquisition for mobile terminal to raw information, judge whether deposited in the raw information
In default sensitive keys word;When default sensitive keys word in the raw information be present, by the raw information
Sensitive keys word is replaced by the non-sensitive information different from the sensitive keys word, obtains update information;It is pre- to be displayed on information
The update information look on interface is hidden.
Mobile terminal 300 can realize each process that mobile terminal is realized in previous embodiment, to avoid repeating, here
Repeat no more.
The mobile terminal 300 of the embodiment of the present invention, can not only realize the protection to mobile terminal user's individual privacy, also
The effect of secret protection can be improved, lifts Consumer's Experience.
It should be understood that in the embodiment of the present invention, radio frequency unit 301 can be used for receiving and sending messages or communication process in, signal
Reception and transmission, specifically, by from base station downlink data receive after, handled to processor 310;In addition, will be up
Data are sent to base station.Generally, radio frequency unit 301 includes but is not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 301 can also by wireless communication system and network and other set
Standby communication.
Mobile terminal has provided the user wireless broadband internet by mixed-media network modules mixed-media 302 and accessed, and such as helps user to receive
Send e-mails, browse webpage and access streaming video etc..
Audio output unit 303 can be receiving by radio frequency unit 301 or mixed-media network modules mixed-media 302 or in memory 309
It is sound that the voice data of storage, which is converted into audio signal and exported,.Moreover, audio output unit 303 can also be provided and moved
The audio output for the specific function correlation that dynamic terminal 300 performs is (for example, call signal receives sound, message sink sound etc.
Deng).Audio output unit 303 includes loudspeaker, buzzer and receiver etc..
Input block 304 is used to receive audio or video signal.Input block 304 can include graphics processor
(Graphics Processing Unit, GPU) 3041 and microphone 3042, graphics processor 3041 is in video acquisition mode
Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out
Reason.Picture frame after processing may be displayed on display unit 306.Picture frame after the processing of graphics processor 3041 can be deposited
Storage is transmitted in memory 309 (or other storage mediums) or via radio frequency unit 301 or mixed-media network modules mixed-media 302.Mike
Wind 3042 can receive sound, and can be voice data by such acoustic processing.Voice data after processing can be
The form output of mobile communication base station can be sent to via radio frequency unit 301 by being converted in the case of telephone calling model.
Mobile terminal 300 also includes at least one sensor 305, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 3061, and proximity transducer can close when mobile terminal 300 is moved in one's ear
Display panel 3061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axles) size of acceleration, size and the direction of gravity are can detect that when static, available for identification mobile terminal posture (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Pass
Sensor 305 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet
Meter, thermometer, infrared ray sensor etc. are spent, will not be repeated here.
Display unit 306 is used for the information for showing the information inputted by user or being supplied to user.Display unit 306 can wrap
Display panel 3061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 3061.
User input unit 307 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal
The key signals input that family is set and function control is relevant.Specifically, user input unit 307 include contact panel 3071 and
Other input equipments 3072.Contact panel 3071, also referred to as touch-screen, collect touch operation of the user on or near it
(for example user uses any suitable objects or annex such as finger, stylus on contact panel 3071 or in contact panel 3071
Neighbouring operation).Contact panel 3071 may include both touch detecting apparatus and touch controller.Wherein, touch detection
Device detects the touch orientation of user, and detects the signal that touch operation is brought, and transmits a signal to touch controller;Touch control
Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 310, receiving area
Manage the order that device 310 is sent and performed.It is furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Type realizes contact panel 3071.Except contact panel 3071, user input unit 307 can also include other input equipments
3072.Specifically, other input equipments 3072 can include but is not limited to physical keyboard, function key (such as volume control button,
Switch key etc.), trace ball, mouse, action bars, will not be repeated here.
Further, contact panel 3071 can be covered on display panel 3061, when contact panel 3071 is detected at it
On or near touch operation after, send processor 310 to determine the type of touch event, be followed by subsequent processing device 310 according to touch
The type for touching event provides corresponding visual output on display panel 3061.Although in Figure 5, contact panel 3071 and display
Panel 3061 is the part independent as two to realize the input of mobile terminal and output function, but in some embodiments
In, can be integrated by contact panel 3071 and display panel 3061 and realize input and the output function of mobile terminal, it is specific this
Place does not limit.
Interface unit 308 is the interface that external device (ED) is connected with mobile terminal 300.For example, external device (ED) can include
Line or wireless head-band earphone port, external power source (or battery charger) port, wired or wireless FPDP, storage card end
Mouth, port, audio input/output (I/O) port, video i/o port, earphone end for connecting the device with identification module
Mouthful etc..Interface unit 308 can be used for receive the input (for example, data message, electric power etc.) from external device (ED) and
One or more elements that the input received is transferred in mobile terminal 300 can be used in the He of mobile terminal 300
Data are transmitted between external device (ED).
Memory 309 can be used for storage software program and various data.Memory 309 can mainly include storing program area
And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Voice data, phone directory etc.) etc..In addition, memory 309 can include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 310 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
Individual part, by running or performing the software program and/or module that are stored in memory 309, and call and be stored in storage
Data in device 309, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place
Reason device 310 may include one or more processing units;Preferably, processor 310 can integrate application processor and modulatedemodulate is mediated
Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main
Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 310.
Mobile terminal 300 can also include the power supply 311 (such as battery) to all parts power supply, it is preferred that power supply 311
Can be logically contiguous by power-supply management system and processor 310, so as to realize management charging by power-supply management system, put
The function such as electricity and power managed.
In addition, mobile terminal 300 includes some unshowned functional modules, will not be repeated here.
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including processor, memory, is stored in memory
Computer program that is upper and can running on the processor, the computer program are realized at above- mentioned information when being executed by processor
Each process of embodiment of the method is managed, and identical technique effect can be reached, to avoid repeating, is repeated no more here.
The embodiment of the present invention also provides a kind of computer-readable recording medium, and meter is stored with computer-readable recording medium
Calculation machine program, the computer program realize each process of above- mentioned information processing method embodiment, and energy when being executed by processor
Reach identical technique effect, to avoid repeating, repeat no more here.Wherein, described computer-readable recording medium, such as only
Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation
RAM), magnetic disc or CD etc..
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal (can be mobile phone, computer, service
Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific
Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art
Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot
Form, belong within the protection of the present invention.
Claims (12)
- A kind of 1. information processing method, it is characterised in that including:Acquisition for mobile terminal judges to whether there is default sensitive keys word in the raw information to after raw information;When default sensitive keys word in the raw information be present, the sensitive keys word in the raw information is replaced by The non-sensitive information different from the sensitive keys word, obtains update information;The update information being displayed on information preview interface is hidden.
- 2. information processing method according to claim 1, it is characterised in that by the sensitive keys word in the raw information The step of being replaced by the non-sensitive informations different from the sensitive keys word, including:According to the corresponding relation of the sensitive keys word that prestores and camouflage keyword, the sensitive keys word is replaced with and institute State camouflage keyword corresponding to sensitive keys word.
- 3. information processing method according to claim 1, it is characterised in that be displayed on described on information preview interface After the step of update information is hidden, methods described also includes:When it is determined that validated user request browses the update information, the non-sensitive information in the update information is changed For sensitive keys word, raw information is recovered.
- 4. information processing method according to claim 3, it is characterised in that determine that validated user request browses the amendment The step of information, including:When receiving user using non-sensitive information progress information search, determine that validated user request browses the amendment Information.
- 5. information processing method according to claim 3, it is characterised in that determine that validated user request browses the amendment The step of information, including:Using iris detection, it is determined that the active user for browsing information is validated user.
- A kind of 6. mobile terminal, it is characterised in that including:Judge module, after acquisition for mobile terminal to raw information, judge in the raw information with the presence or absence of default quick Feel keyword;Processing module, will be quick in the raw information during for default sensitive keys word in the raw information be present Sense keyword is replaced by the non-sensitive information different from the sensitive keys word, obtains update information;Hidden module, the update information for being displayed on information preview interface are hidden.
- 7. mobile terminal according to claim 6, it is characterised in that the processing module includes:First processing submodule, for the corresponding relation according to the sensitive keys word prestored and camouflage keyword, by described in Sensitive keys word, which replaces with, corresponding with the sensitive keys word pretends keyword.
- 8. mobile terminal according to claim 6, it is characterised in that the mobile terminal also includes:Information recovery module, for it is determined that validated user request browse the update information when, by the update information The non-sensitive information is converted to sensitive keys word, recovers raw information.
- 9. mobile terminal according to claim 8, it is characterised in that described information recovery module includes:First determination sub-module, for when receiving user using non-sensitive information progress information search, it to be legal to determine User's request browses the update information.
- 10. mobile terminal according to claim 8, it is characterised in that described information recovery module includes:Second determination sub-module, for using iris detection, it is determined that the active user for browsing information is validated user.
- A kind of 11. mobile terminal, it is characterised in that including:Processor, memory and it is stored on the memory and can be in institute The computer program run on processor is stated, the computer program is realized such as claim 1 to 5 during the computing device Any one of information processing method the step of.
- 12. a kind of computer-readable recording medium, it is characterised in that computer journey is stored on the computer-readable recording medium Sequence, the information processing method as any one of claim 1 to 5 is realized when the computer program is executed by processor Step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710958152.6A CN107748848A (en) | 2017-10-16 | 2017-10-16 | A kind of information processing method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710958152.6A CN107748848A (en) | 2017-10-16 | 2017-10-16 | A kind of information processing method and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107748848A true CN107748848A (en) | 2018-03-02 |
Family
ID=61253712
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710958152.6A Pending CN107748848A (en) | 2017-10-16 | 2017-10-16 | A kind of information processing method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107748848A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109492430A (en) * | 2018-10-30 | 2019-03-19 | 江苏东智数据技术股份有限公司 | A kind of internet Keywork method for secret protection and device based on obfuscated manner |
CN110348186A (en) * | 2019-05-28 | 2019-10-18 | 华为技术有限公司 | A kind of display methods and electronic equipment based on user identity identification |
CN110719365A (en) * | 2019-09-27 | 2020-01-21 | 深圳传音控股股份有限公司 | Information processing method, mobile terminal and computer storage medium |
WO2020103154A1 (en) * | 2018-11-23 | 2020-05-28 | Siemens Aktiengesellschaft | Method, apparatus and system for data analysis |
CN111899741A (en) * | 2020-08-06 | 2020-11-06 | 上海明略人工智能(集团)有限公司 | Audio keyword encryption method and device, storage medium and electronic device |
CN112988906A (en) * | 2021-04-27 | 2021-06-18 | 江苏荣泽信息科技股份有限公司 | Traffic data safety sharing management system based on block chain |
CN113127828A (en) * | 2021-05-18 | 2021-07-16 | 广东省科技基础条件平台中心 | Interface protection method, device, equipment and storage medium based on network security |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916233A (en) * | 2014-03-28 | 2014-07-09 | 小米科技有限责任公司 | Information encryption method and device |
CN106293751A (en) * | 2016-08-15 | 2017-01-04 | 华为技术有限公司 | A kind of method showing information on the terminal device and terminal unit |
CN106355068A (en) * | 2016-08-31 | 2017-01-25 | 维沃移动通信有限公司 | Individual security information displaying method and device |
CN106534572A (en) * | 2016-11-30 | 2017-03-22 | 广东欧珀移动通信有限公司 | Information display method and device and terminal |
CN106716436A (en) * | 2016-11-18 | 2017-05-24 | 深圳前海达闼云端智能科技有限公司 | Information display method and system |
CN107194268A (en) * | 2017-06-30 | 2017-09-22 | 珠海市魅族科技有限公司 | A kind of information processing method, device, computer installation and readable storage medium storing program for executing |
-
2017
- 2017-10-16 CN CN201710958152.6A patent/CN107748848A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916233A (en) * | 2014-03-28 | 2014-07-09 | 小米科技有限责任公司 | Information encryption method and device |
CN106293751A (en) * | 2016-08-15 | 2017-01-04 | 华为技术有限公司 | A kind of method showing information on the terminal device and terminal unit |
CN106355068A (en) * | 2016-08-31 | 2017-01-25 | 维沃移动通信有限公司 | Individual security information displaying method and device |
CN106716436A (en) * | 2016-11-18 | 2017-05-24 | 深圳前海达闼云端智能科技有限公司 | Information display method and system |
CN106534572A (en) * | 2016-11-30 | 2017-03-22 | 广东欧珀移动通信有限公司 | Information display method and device and terminal |
CN107194268A (en) * | 2017-06-30 | 2017-09-22 | 珠海市魅族科技有限公司 | A kind of information processing method, device, computer installation and readable storage medium storing program for executing |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109492430A (en) * | 2018-10-30 | 2019-03-19 | 江苏东智数据技术股份有限公司 | A kind of internet Keywork method for secret protection and device based on obfuscated manner |
WO2020103154A1 (en) * | 2018-11-23 | 2020-05-28 | Siemens Aktiengesellschaft | Method, apparatus and system for data analysis |
CN110348186A (en) * | 2019-05-28 | 2019-10-18 | 华为技术有限公司 | A kind of display methods and electronic equipment based on user identity identification |
CN110348186B (en) * | 2019-05-28 | 2021-08-13 | 华为技术有限公司 | Display method based on user identity recognition and electronic equipment |
CN110719365A (en) * | 2019-09-27 | 2020-01-21 | 深圳传音控股股份有限公司 | Information processing method, mobile terminal and computer storage medium |
CN111899741A (en) * | 2020-08-06 | 2020-11-06 | 上海明略人工智能(集团)有限公司 | Audio keyword encryption method and device, storage medium and electronic device |
CN112988906A (en) * | 2021-04-27 | 2021-06-18 | 江苏荣泽信息科技股份有限公司 | Traffic data safety sharing management system based on block chain |
CN112988906B (en) * | 2021-04-27 | 2021-07-30 | 江苏荣泽信息科技股份有限公司 | Traffic data safety sharing management system based on block chain |
CN113127828A (en) * | 2021-05-18 | 2021-07-16 | 广东省科技基础条件平台中心 | Interface protection method, device, equipment and storage medium based on network security |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107748848A (en) | A kind of information processing method and mobile terminal | |
CN107608514A (en) | Information processing method and mobile terminal | |
CN108021825A (en) | A kind of method for protecting privacy, mobile terminal | |
CN107808084A (en) | A kind of touch operation method and mobile terminal | |
CN107958161A (en) | A kind of multitask display methods and mobile terminal | |
CN108629171A (en) | A kind of unread message processing method and terminal | |
CN108595946A (en) | A kind of method and terminal of protection privacy | |
CN107888392A (en) | A kind of information processing method, server and mobile terminal | |
CN108901020A (en) | Method, mobile terminal and the server of network insertion | |
CN110457888A (en) | A kind of verifying code imput method, device, electronic equipment and storage medium | |
CN110035183A (en) | Information sharing method and terminal | |
CN111523871B (en) | Payment processing method and electronic equipment | |
CN108710806A (en) | A kind of terminal unlock method, mobile terminal | |
CN107707554A (en) | A kind of login method and mobile terminal of application program account | |
CN107728877A (en) | One kind applies recommendation method and mobile terminal | |
CN109800606A (en) | A kind of display control method and mobile terminal | |
CN109446794A (en) | A kind of cipher-code input method and its mobile terminal | |
CN107734162A (en) | The method, apparatus and mobile terminal of a kind of message informing | |
CN107895108A (en) | A kind of operation management method and mobile terminal | |
CN107835297A (en) | Information updating method and mobile terminal | |
CN110191106A (en) | A kind of data transmission method for uplink, terminal and communication system | |
CN111310250A (en) | Application sharing method and electronic equipment | |
CN108848240A (en) | A kind of protecting information safety method and terminal | |
CN109547330A (en) | A kind of information sharing method and device | |
CN109062492A (en) | A kind of application access method and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180302 |
|
RJ01 | Rejection of invention patent application after publication |