CN107748848A - A kind of information processing method and mobile terminal - Google Patents

A kind of information processing method and mobile terminal Download PDF

Info

Publication number
CN107748848A
CN107748848A CN201710958152.6A CN201710958152A CN107748848A CN 107748848 A CN107748848 A CN 107748848A CN 201710958152 A CN201710958152 A CN 201710958152A CN 107748848 A CN107748848 A CN 107748848A
Authority
CN
China
Prior art keywords
information
keys word
mobile terminal
sensitive
sensitive keys
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710958152.6A
Other languages
Chinese (zh)
Inventor
赵淑平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201710958152.6A priority Critical patent/CN107748848A/en
Publication of CN107748848A publication Critical patent/CN107748848A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a kind of information processing method and mobile terminal.This method includes:Acquisition for mobile terminal judges to whether there is default sensitive keys word in the raw information to after raw information;When default sensitive keys word in raw information be present, the sensitive keys word in raw information is replaced by the non-sensitive information different from sensitive keys word, obtains update information;The update information being displayed on information preview interface is hidden.The present invention by judge acquisition for mobile terminal to raw information in whether there is default sensitive keys word; and when default sensitive keys word in raw information be present; sensitive keys word in the raw information is replaced by the non-sensitive information different from the sensitive keys word; obtain update information; and the update information being displayed on information preview interface is hidden; the protection to mobile terminal user's individual privacy can not only be realized; the effect of secret protection can also be improved, lifts Consumer's Experience.

Description

A kind of information processing method and mobile terminal
Technical field
The present embodiments relate to communication technical field, more particularly to a kind of information processing method and mobile terminal.
Background technology
With the continuous popularization of intelligent mobile terminal equipment, increasing people carries out every business using mobile terminal Handle, such as mobile payment, personal information registration, account number cipher management, mobile phone checking, this is very easy to ours Life, but equally also bring great potential safety hazard to personal information and property safety.
Especially mobile payment, for example wechat is paid, Alipay is paid, bank card is paid etc., due to above-mentioned mobile payment Mode typically can all be bound with phone number, and so, any transaction in personal asset account can all pass through the side of information Formula is sent to mobile phone terminal.Due to this type of information and its sensitivity, to prevent leakage of information, prior art is frequently with cryptographic means to this Category information is encrypted, and still, the secret protection effect that existing cryptographic means are reached is poor, so that destroying user and its Trusting relationship between intimate people.
The content of the invention
The embodiment of the present invention provides a kind of information processing method and mobile terminal, is reached with solving existing cryptographic means Secret protection effect it is poor the problem of.
In order to solve the above-mentioned technical problem, the present invention is realized in:A kind of information processing method, including:
Acquisition for mobile terminal judges to whether there is default sensitive keys word in the raw information to after raw information;
When default sensitive keys word in the raw information be present, by the sensitive keys word in the raw information more The non-sensitive information different from the sensitive keys word is changed to, obtains update information;
The update information being displayed on information preview interface is hidden.
The embodiment of the present invention additionally provides a kind of mobile terminal, including:
Judge module, after acquisition for mobile terminal to raw information, judge in the raw information with the presence or absence of default Sensitive keys word;
Processing module, during for default sensitive keys word in the raw information be present, by the raw information Sensitive keys word be replaced by the non-sensitive information different from the sensitive keys word, obtain update information;
Hidden module, the update information for being displayed on information preview interface are hidden.
The embodiments of the invention provide a kind of mobile terminal, including:Processor, memory and it is stored on the memory And the computer program that can be run on the processor, the computer program are realized as described above during the computing device The step of described information processing method.
The embodiments of the invention provide a kind of computer-readable recording medium, stored on the computer-readable recording medium Computer program, the computer program realizes information processing method as described above when being executed by processor the step of.
In embodiments of the present invention, by judge acquisition for mobile terminal to raw information in whether there is default sensitivity Keyword, and when default sensitive keys word be present in raw information, the sensitive keys word in the raw information is replaced by The non-sensitive information different from the sensitive keys word, update information is obtained, and the amendment being displayed on information preview interface Information is hidden, this that the information for being related to individual subscriber privacy is carried out into invisible processing, can not only be realized to mobile whole The protection of end subscriber individual privacy, additionally it is possible to improve the effect of secret protection, lift Consumer's Experience.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention The accompanying drawing needed to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the present invention Example, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is the flow chart for the information processing method that one embodiment of the invention provides;
Fig. 2 is the flow chart for the information processing method that another embodiment of the present invention provides;
Fig. 3 is the mobile terminal structure schematic diagram that one embodiment of the invention provides;
Fig. 4 is the mobile terminal structure schematic diagram that another embodiment of the present invention provides;
Fig. 5 is the mobile terminal structure schematic diagram of the offer of further embodiment of this invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
Fig. 1 is the flow chart of the information processing method of one embodiment of the invention.Below should figure illustrate this method Implementation process.
Step 101, acquisition for mobile terminal judges to whether there is default sensitivity in the raw information to after raw information Keyword.
Here, sensitive keys word is the information related to individual subscriber privacy pre-set.It is such as wage, bonus, red The information of the reflection individual subscriber condition of assets such as profit, financing, or ID card No. etc. characterize the information of individual subscriber identity.
Step 102, when default sensitive keys word in the raw information be present, by the sensitivity in the raw information Keyword is replaced by the non-sensitive information different from the sensitive keys word, obtains update information.
Here, because sensitive keys word is related to individual subscriber privacy, so, generally, include sensitive keys word Raw information, individual subscriber are to be reluctant for other people (people beyond certain limit) disclosures or know.
Here, update information is different from sensitive keys word non-by the way that the sensitive keys word in raw information is replaced by What sensitive information obtained, so, the information related to individual subscriber privacy is will not relate in the update information, moreover, even if should Update information is shown in the information list of mobile terminal, is never actually viewed by others, and other people can not also interpret and the update information pair The raw information answered, substantially reduce the risk of individual subscriber privacy leakage.
Step 103, the update information being displayed on information preview interface is hidden.
That is, the update information is not shown on information preview interface.
Here, the purpose for hiding update information is to further protect mobile terminal user's individual privacy, prevent to original When sensitive keys word in beginning information changes processing imperfection, the leakage of part privacy information.
Usually, the update information can be hidden to the default memory block of the mobile terminal.
Specifically, the step of update information being displayed on information preview interface is hidden, may particularly include:
When detecting that the update information meets default hidden conditional, the update information is hidden.
Here, specifically, when detecting that validated user has read the update information, the update information is carried out hidden Hide;
Or detecting that validated user read the update information, and the default behaviour to the update information be present When making, the update information is hidden.
Here, validated user can be identified by iris detection, for details, reference can be made to the elaboration of step 104 part, here not Repeat again.
It should be noted that update information can be hidden by configuration information hiding button.Mobile terminal passes through knowledge The pressing operation on Information hiding button being clipped to, is hidden to update information.Certainly, predetermined registration operation can also be long-press behaviour Make, selection menu is recalled by long-press operation, after user's selection is hidden, the update information is hidden.
Information processing method provided in an embodiment of the present invention, by judge acquisition for mobile terminal to raw information in whether , will be quick in the raw information when default sensitive keys word be present, and default sensitive keys word be present in raw information Sense keyword is replaced by the non-sensitive information different from the sensitive keys word, obtains update information, and be displayed on information preview The update information on interface is hidden, this that the information for being related to individual subscriber privacy is carried out into invisible processing, can not only Enough realize the protection to mobile terminal user's individual privacy, additionally it is possible to improve the effect of secret protection, lift Consumer's Experience.
On the basis of the embodiment shown in above-mentioned Fig. 1, as a preferable implementation, step 102 of the present invention can have Body includes:
According to the corresponding relation of the sensitive keys word prestored and camouflage keyword, the sensitive keys word is replaced with It is corresponding with the sensitive keys word to pretend keyword.
It should be noted that sensitive keys word can be stored in advance in the quick of mobile terminal with pretending the corresponding relation of keyword Feel in information database.Here, user can be according to being actually needed, and the non-sensitive information database is added in selection.
Further, sensitive keys word can use system default to set and be selected for user, also can voluntarily be set by user.Camouflage is closed Keyword and sensitive keys word are set with pretending the corresponding relation of keyword by user, so in addition to user informs other people, Other people are can not to learn sensitive keys word and pretend the corresponding relation of keyword, avoid the wind of individual subscriber leakage of private information Danger.
Here, the degree of correlation of the sensitive keys word and the camouflage keyword is less than predetermined threshold value.It is that is, sensitive Keyword is incoherent with camouflage keyword.
Generally, in a raw information, sensitive keys word may include to have it is multiple, than such as relating to personal income source Item, such as, wage, bonus, bonus, financing etc.;The monetary unit relevant with money, e.g., member, U.S. dollar, Euro etc.;Also one A little other informations, such as, keep accounts, pay, remaining sum, tail number 1234 etc..
For example, sensitive keys word is " wage ", camouflage keyword corresponding with " wage " is " pencil ";Sensitive keys word is " member ", camouflage keyword corresponding with " member " is " branch ";Sensitive keys word is " keeping accounts ", camouflage keyword corresponding with " keeping accounts " For " receiving ";Sensitive keys word is " remaining sum ", and camouflage keyword corresponding with " remaining sum " is " total ";Sensitive keys word is " tail Numbers 1234 ", the camouflage keyword with " account of tail number 1234 " is " warehouse ".
If raw information is:The account of tail number 1234 keeps accounts 2000 yuan of wage, 6000 yuan of remaining sum.Place so through this step Reason, obtained update information are:Warehouse receives pencil 2000, amounts to 6000.
So, using pretending after keyword replaces the sensitive keys word in raw information, obtained update information be with The information of raw information wide of the mark, even if the update information is shown in the information list of mobile terminal, it is never actually viewed by others, The individual privacy of user will not be revealed, in this way, while can protect mobile terminal user's individual privacy, additionally it is possible to reach The purpose for occurring trust crisis between men is avoided, lifts Consumer's Experience.
On the basis of the embodiment shown in above-mentioned Fig. 1, as another preferable implementation, step 102 of the present invention can Specifically include:
The sensitive keys word is subjected to Fuzzy Processing, mosaic processing or mess code processing, obtains non-sensitive information.
Here, Fuzzy Processing, mosaic processing or mess code are carried out to sensitive keys word by some preset algorithms to handle, obtained To non-sensitive information.For example, Fuzzy Processing is carried out to sensitive keys word using fuzzy matching algorithm;Using demosaicing algorithm to quick Feel keyword and carry out mosaic processing;Mess code processing is carried out to sensitive keys word using default mess code encryption algorithm.
So, sensitive keys word can not normally be shown, so as to avoid the individual privacy of user compromised.
On the basis of the embodiment shown in above-mentioned Fig. 1, it is preferred that as shown in Fig. 2 after step 103, methods described is also Including:
Step 104, will be described non-in the update information when it is determined that validated user request browses the update information Sensitive information is converted to sensitive keys word, recovers raw information.
It should be noted that by the execution of this step, raw information is recovered from update information, in order to legal use Family, refer generally to the mobile terminal affiliated user, it is convenient that raw information is checked.
So, how to determine the user for browsing information is validated user, can be realized by following two modes:
As a preferable implementation, this step 104 may particularly include:
When receiving user using non-sensitive information progress information search, it is described to determine that validated user request browses Update information.
Here, it is preferred that, the non-sensitive information is camouflage keyword.Wherein pretending keyword can correspond to reference to above-mentioned implementation Example step 102, by the corresponding relation according to the sensitive keys word prestored and camouflage keyword, by the sensitive keys word Replace with the elaboration of the part of camouflage keyword corresponding with the sensitive keys word.
It should be noted that informed due to the only mobile terminal affiliated user of camouflage keyword, or by user Camouflage keyword insider know, so, when user input camouflage keyword search information when, mobile terminal can determine that this is searched Rope user is validated user, further, by pretending keyword search information, due to camouflage keyword to be searched with user it is original Sensitive keys word in information is uncorrelated, even if other people see the information search operation of user, will not also associate user and want Search be about its individual privacy in terms of information, improve the effect of secret protection.
As another preferable implementation, this step 104 may particularly include:
Using iris detection, it is determined that the active user for browsing information is validated user.
Explanation is needed exist for, mobile terminal is previously stored with the iris information of the user belonging to it.Work as utilization Iris detection, detect that the iris information currently got is consistent with the iris information stored on mobile terminal, it is determined that browse The active user of information is validated user.
Here, iris recognition is one kind belonged in authentication mode based on the iris progress identification in eyes, It is preferable in the embodiment of the present invention, determine validated user using iris detection.Certain other authentication modes can also adopt With such as fingerprint recognition, recognition of face, being not specifically limited here.
Due to the stability and uniqueness of the iris feature of eyes, the uniqueness of identification is determined, therefore, utilizes rainbow Film is detected to determine validated user, can be provided safety assurance to be related to the raw information of privacy of user, be protected the privacy of user Safety.
As shown in figure 3, the mobile terminal structure schematic diagram provided for one embodiment of the invention.Wherein, the mobile terminal 200 Including:
Judge module 201, after acquisition for mobile terminal to raw information, judge in the raw information with the presence or absence of pre- If sensitive keys word;
Processing module 202, during for default sensitive keys word in the raw information be present, by the raw information In sensitive keys word be replaced by the non-sensitive information different from the sensitive keys word, obtain update information;
Hidden module 203, the update information for being displayed on information preview interface are hidden.
On the basis of Fig. 3, it is preferred that as shown in figure 4, the processing module 202 includes:
First processing submodule 2021, for the corresponding pass according to the sensitive keys word prestored with camouflage keyword System, the sensitive keys word is replaced with and corresponding with the sensitive keys word pretends keyword.
Preferably, the processing module 202 also includes:
Second processing submodule, handled for the sensitive keys word to be carried out into Fuzzy Processing, mosaic processing or mess code, Obtain non-sensitive information.
Preferably, the mobile terminal 200 also includes:
Information recovery module 204, for when it is determined that validated user request browses the update information, the amendment to be believed The non-sensitive information in breath is converted to sensitive keys word, recovers raw information.
Preferably, described information recovery module 204 includes:
First determination sub-module 2041, for when receiving user using keyword search information is pretended, it to be legal to determine User's request browses the update information.
Preferably, described information recovery module 204 includes:
Second determination sub-module 2042, for using iris detection, it is determined that the active user for browsing information is validated user.
Mobile terminal provided in an embodiment of the present invention, by judge module judge acquisition for mobile terminal to raw information in It is when processing module has default sensitive keys word in raw information, this is original with the presence or absence of default sensitive keys word Sensitive keys word in information is replaced by the non-sensitive information different from the sensitive keys word, obtains update information, hidden module The update information being displayed on information preview interface is hidden, this to carry out the information for being related to individual subscriber privacy not It can be seen that processing, can not only realize the protection to mobile terminal user's individual privacy, additionally it is possible to improve the effect of secret protection, carry Rise Consumer's Experience.
Mobile terminal provided in an embodiment of the present invention can realize that mobile terminal is realized in Fig. 1 to Fig. 2 embodiment of the method Each process, to avoid repeating, repeat no more here.
Fig. 5 is a kind of hardware architecture diagram for the mobile terminal for realizing each embodiment of the present invention, the mobile terminal 300 Including but not limited to:It is radio frequency unit 301, mixed-media network modules mixed-media 302, audio output unit 303, input block 304, sensor 305, aobvious Show the parts such as unit 306, user input unit 307, interface unit 308, memory 309, processor 310 and power supply 311. It will be understood by those skilled in the art that the mobile terminal structure shown in Fig. 5 does not form the restriction to mobile terminal, it is mobile whole End can be included than illustrating more or less parts, either combine some parts or different parts arrangement.In the present invention In embodiment, mobile terminal includes but is not limited to mobile phone, tablet personal computer, notebook computer, palm PC, car-mounted terminal, can worn Wear equipment and pedometer etc..
Wherein, processor 310, after acquisition for mobile terminal to raw information, judge whether deposited in the raw information In default sensitive keys word;When default sensitive keys word in the raw information be present, by the raw information Sensitive keys word is replaced by the non-sensitive information different from the sensitive keys word, obtains update information;It is pre- to be displayed on information The update information look on interface is hidden.
Mobile terminal 300 can realize each process that mobile terminal is realized in previous embodiment, to avoid repeating, here Repeat no more.
The mobile terminal 300 of the embodiment of the present invention, can not only realize the protection to mobile terminal user's individual privacy, also The effect of secret protection can be improved, lifts Consumer's Experience.
It should be understood that in the embodiment of the present invention, radio frequency unit 301 can be used for receiving and sending messages or communication process in, signal Reception and transmission, specifically, by from base station downlink data receive after, handled to processor 310;In addition, will be up Data are sent to base station.Generally, radio frequency unit 301 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 301 can also by wireless communication system and network and other set Standby communication.
Mobile terminal has provided the user wireless broadband internet by mixed-media network modules mixed-media 302 and accessed, and such as helps user to receive Send e-mails, browse webpage and access streaming video etc..
Audio output unit 303 can be receiving by radio frequency unit 301 or mixed-media network modules mixed-media 302 or in memory 309 It is sound that the voice data of storage, which is converted into audio signal and exported,.Moreover, audio output unit 303 can also be provided and moved The audio output for the specific function correlation that dynamic terminal 300 performs is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 303 includes loudspeaker, buzzer and receiver etc..
Input block 304 is used to receive audio or video signal.Input block 304 can include graphics processor (Graphics Processing Unit, GPU) 3041 and microphone 3042, graphics processor 3041 is in video acquisition mode Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out Reason.Picture frame after processing may be displayed on display unit 306.Picture frame after the processing of graphics processor 3041 can be deposited Storage is transmitted in memory 309 (or other storage mediums) or via radio frequency unit 301 or mixed-media network modules mixed-media 302.Mike Wind 3042 can receive sound, and can be voice data by such acoustic processing.Voice data after processing can be The form output of mobile communication base station can be sent to via radio frequency unit 301 by being converted in the case of telephone calling model.
Mobile terminal 300 also includes at least one sensor 305, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 3061, and proximity transducer can close when mobile terminal 300 is moved in one's ear Display panel 3061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axles) size of acceleration, size and the direction of gravity are can detect that when static, available for identification mobile terminal posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Pass Sensor 305 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared ray sensor etc. are spent, will not be repeated here.
Display unit 306 is used for the information for showing the information inputted by user or being supplied to user.Display unit 306 can wrap Display panel 3061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 3061.
User input unit 307 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal The key signals input that family is set and function control is relevant.Specifically, user input unit 307 include contact panel 3071 and Other input equipments 3072.Contact panel 3071, also referred to as touch-screen, collect touch operation of the user on or near it (for example user uses any suitable objects or annex such as finger, stylus on contact panel 3071 or in contact panel 3071 Neighbouring operation).Contact panel 3071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects the signal that touch operation is brought, and transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 310, receiving area Manage the order that device 310 is sent and performed.It is furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Type realizes contact panel 3071.Except contact panel 3071, user input unit 307 can also include other input equipments 3072.Specifically, other input equipments 3072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, action bars, will not be repeated here.
Further, contact panel 3071 can be covered on display panel 3061, when contact panel 3071 is detected at it On or near touch operation after, send processor 310 to determine the type of touch event, be followed by subsequent processing device 310 according to touch The type for touching event provides corresponding visual output on display panel 3061.Although in Figure 5, contact panel 3071 and display Panel 3061 is the part independent as two to realize the input of mobile terminal and output function, but in some embodiments In, can be integrated by contact panel 3071 and display panel 3061 and realize input and the output function of mobile terminal, it is specific this Place does not limit.
Interface unit 308 is the interface that external device (ED) is connected with mobile terminal 300.For example, external device (ED) can include Line or wireless head-band earphone port, external power source (or battery charger) port, wired or wireless FPDP, storage card end Mouth, port, audio input/output (I/O) port, video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 308 can be used for receive the input (for example, data message, electric power etc.) from external device (ED) and One or more elements that the input received is transferred in mobile terminal 300 can be used in the He of mobile terminal 300 Data are transmitted between external device (ED).
Memory 309 can be used for storage software program and various data.Memory 309 can mainly include storing program area And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Voice data, phone directory etc.) etc..In addition, memory 309 can include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 310 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection Individual part, by running or performing the software program and/or module that are stored in memory 309, and call and be stored in storage Data in device 309, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place Reason device 310 may include one or more processing units;Preferably, processor 310 can integrate application processor and modulatedemodulate is mediated Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 310.
Mobile terminal 300 can also include the power supply 311 (such as battery) to all parts power supply, it is preferred that power supply 311 Can be logically contiguous by power-supply management system and processor 310, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
In addition, mobile terminal 300 includes some unshowned functional modules, will not be repeated here.
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including processor, memory, is stored in memory Computer program that is upper and can running on the processor, the computer program are realized at above- mentioned information when being executed by processor Each process of embodiment of the method is managed, and identical technique effect can be reached, to avoid repeating, is repeated no more here.
The embodiment of the present invention also provides a kind of computer-readable recording medium, and meter is stored with computer-readable recording medium Calculation machine program, the computer program realize each process of above- mentioned information processing method embodiment, and energy when being executed by processor Reach identical technique effect, to avoid repeating, repeat no more here.Wherein, described computer-readable recording medium, such as only Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic disc or CD etc..
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal (can be mobile phone, computer, service Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot Form, belong within the protection of the present invention.

Claims (12)

  1. A kind of 1. information processing method, it is characterised in that including:
    Acquisition for mobile terminal judges to whether there is default sensitive keys word in the raw information to after raw information;
    When default sensitive keys word in the raw information be present, the sensitive keys word in the raw information is replaced by The non-sensitive information different from the sensitive keys word, obtains update information;
    The update information being displayed on information preview interface is hidden.
  2. 2. information processing method according to claim 1, it is characterised in that by the sensitive keys word in the raw information The step of being replaced by the non-sensitive informations different from the sensitive keys word, including:
    According to the corresponding relation of the sensitive keys word that prestores and camouflage keyword, the sensitive keys word is replaced with and institute State camouflage keyword corresponding to sensitive keys word.
  3. 3. information processing method according to claim 1, it is characterised in that be displayed on described on information preview interface After the step of update information is hidden, methods described also includes:
    When it is determined that validated user request browses the update information, the non-sensitive information in the update information is changed For sensitive keys word, raw information is recovered.
  4. 4. information processing method according to claim 3, it is characterised in that determine that validated user request browses the amendment The step of information, including:
    When receiving user using non-sensitive information progress information search, determine that validated user request browses the amendment Information.
  5. 5. information processing method according to claim 3, it is characterised in that determine that validated user request browses the amendment The step of information, including:
    Using iris detection, it is determined that the active user for browsing information is validated user.
  6. A kind of 6. mobile terminal, it is characterised in that including:
    Judge module, after acquisition for mobile terminal to raw information, judge in the raw information with the presence or absence of default quick Feel keyword;
    Processing module, will be quick in the raw information during for default sensitive keys word in the raw information be present Sense keyword is replaced by the non-sensitive information different from the sensitive keys word, obtains update information;
    Hidden module, the update information for being displayed on information preview interface are hidden.
  7. 7. mobile terminal according to claim 6, it is characterised in that the processing module includes:
    First processing submodule, for the corresponding relation according to the sensitive keys word prestored and camouflage keyword, by described in Sensitive keys word, which replaces with, corresponding with the sensitive keys word pretends keyword.
  8. 8. mobile terminal according to claim 6, it is characterised in that the mobile terminal also includes:
    Information recovery module, for it is determined that validated user request browse the update information when, by the update information The non-sensitive information is converted to sensitive keys word, recovers raw information.
  9. 9. mobile terminal according to claim 8, it is characterised in that described information recovery module includes:
    First determination sub-module, for when receiving user using non-sensitive information progress information search, it to be legal to determine User's request browses the update information.
  10. 10. mobile terminal according to claim 8, it is characterised in that described information recovery module includes:
    Second determination sub-module, for using iris detection, it is determined that the active user for browsing information is validated user.
  11. A kind of 11. mobile terminal, it is characterised in that including:Processor, memory and it is stored on the memory and can be in institute The computer program run on processor is stated, the computer program is realized such as claim 1 to 5 during the computing device Any one of information processing method the step of.
  12. 12. a kind of computer-readable recording medium, it is characterised in that computer journey is stored on the computer-readable recording medium Sequence, the information processing method as any one of claim 1 to 5 is realized when the computer program is executed by processor Step.
CN201710958152.6A 2017-10-16 2017-10-16 A kind of information processing method and mobile terminal Pending CN107748848A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710958152.6A CN107748848A (en) 2017-10-16 2017-10-16 A kind of information processing method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710958152.6A CN107748848A (en) 2017-10-16 2017-10-16 A kind of information processing method and mobile terminal

Publications (1)

Publication Number Publication Date
CN107748848A true CN107748848A (en) 2018-03-02

Family

ID=61253712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710958152.6A Pending CN107748848A (en) 2017-10-16 2017-10-16 A kind of information processing method and mobile terminal

Country Status (1)

Country Link
CN (1) CN107748848A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109492430A (en) * 2018-10-30 2019-03-19 江苏东智数据技术股份有限公司 A kind of internet Keywork method for secret protection and device based on obfuscated manner
CN110348186A (en) * 2019-05-28 2019-10-18 华为技术有限公司 A kind of display methods and electronic equipment based on user identity identification
CN110719365A (en) * 2019-09-27 2020-01-21 深圳传音控股股份有限公司 Information processing method, mobile terminal and computer storage medium
WO2020103154A1 (en) * 2018-11-23 2020-05-28 Siemens Aktiengesellschaft Method, apparatus and system for data analysis
CN111899741A (en) * 2020-08-06 2020-11-06 上海明略人工智能(集团)有限公司 Audio keyword encryption method and device, storage medium and electronic device
CN112988906A (en) * 2021-04-27 2021-06-18 江苏荣泽信息科技股份有限公司 Traffic data safety sharing management system based on block chain
CN113127828A (en) * 2021-05-18 2021-07-16 广东省科技基础条件平台中心 Interface protection method, device, equipment and storage medium based on network security

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916233A (en) * 2014-03-28 2014-07-09 小米科技有限责任公司 Information encryption method and device
CN106293751A (en) * 2016-08-15 2017-01-04 华为技术有限公司 A kind of method showing information on the terminal device and terminal unit
CN106355068A (en) * 2016-08-31 2017-01-25 维沃移动通信有限公司 Individual security information displaying method and device
CN106534572A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Information display method and device and terminal
CN106716436A (en) * 2016-11-18 2017-05-24 深圳前海达闼云端智能科技有限公司 Information display method and system
CN107194268A (en) * 2017-06-30 2017-09-22 珠海市魅族科技有限公司 A kind of information processing method, device, computer installation and readable storage medium storing program for executing

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916233A (en) * 2014-03-28 2014-07-09 小米科技有限责任公司 Information encryption method and device
CN106293751A (en) * 2016-08-15 2017-01-04 华为技术有限公司 A kind of method showing information on the terminal device and terminal unit
CN106355068A (en) * 2016-08-31 2017-01-25 维沃移动通信有限公司 Individual security information displaying method and device
CN106716436A (en) * 2016-11-18 2017-05-24 深圳前海达闼云端智能科技有限公司 Information display method and system
CN106534572A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Information display method and device and terminal
CN107194268A (en) * 2017-06-30 2017-09-22 珠海市魅族科技有限公司 A kind of information processing method, device, computer installation and readable storage medium storing program for executing

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109492430A (en) * 2018-10-30 2019-03-19 江苏东智数据技术股份有限公司 A kind of internet Keywork method for secret protection and device based on obfuscated manner
WO2020103154A1 (en) * 2018-11-23 2020-05-28 Siemens Aktiengesellschaft Method, apparatus and system for data analysis
CN110348186A (en) * 2019-05-28 2019-10-18 华为技术有限公司 A kind of display methods and electronic equipment based on user identity identification
CN110348186B (en) * 2019-05-28 2021-08-13 华为技术有限公司 Display method based on user identity recognition and electronic equipment
CN110719365A (en) * 2019-09-27 2020-01-21 深圳传音控股股份有限公司 Information processing method, mobile terminal and computer storage medium
CN111899741A (en) * 2020-08-06 2020-11-06 上海明略人工智能(集团)有限公司 Audio keyword encryption method and device, storage medium and electronic device
CN112988906A (en) * 2021-04-27 2021-06-18 江苏荣泽信息科技股份有限公司 Traffic data safety sharing management system based on block chain
CN112988906B (en) * 2021-04-27 2021-07-30 江苏荣泽信息科技股份有限公司 Traffic data safety sharing management system based on block chain
CN113127828A (en) * 2021-05-18 2021-07-16 广东省科技基础条件平台中心 Interface protection method, device, equipment and storage medium based on network security

Similar Documents

Publication Publication Date Title
CN107748848A (en) A kind of information processing method and mobile terminal
CN107608514A (en) Information processing method and mobile terminal
CN108021825A (en) A kind of method for protecting privacy, mobile terminal
CN107808084A (en) A kind of touch operation method and mobile terminal
CN107958161A (en) A kind of multitask display methods and mobile terminal
CN108629171A (en) A kind of unread message processing method and terminal
CN108595946A (en) A kind of method and terminal of protection privacy
CN107888392A (en) A kind of information processing method, server and mobile terminal
CN108901020A (en) Method, mobile terminal and the server of network insertion
CN110457888A (en) A kind of verifying code imput method, device, electronic equipment and storage medium
CN110035183A (en) Information sharing method and terminal
CN111523871B (en) Payment processing method and electronic equipment
CN108710806A (en) A kind of terminal unlock method, mobile terminal
CN107707554A (en) A kind of login method and mobile terminal of application program account
CN107728877A (en) One kind applies recommendation method and mobile terminal
CN109800606A (en) A kind of display control method and mobile terminal
CN109446794A (en) A kind of cipher-code input method and its mobile terminal
CN107734162A (en) The method, apparatus and mobile terminal of a kind of message informing
CN107895108A (en) A kind of operation management method and mobile terminal
CN107835297A (en) Information updating method and mobile terminal
CN110191106A (en) A kind of data transmission method for uplink, terminal and communication system
CN111310250A (en) Application sharing method and electronic equipment
CN108848240A (en) A kind of protecting information safety method and terminal
CN109547330A (en) A kind of information sharing method and device
CN109062492A (en) A kind of application access method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180302

RJ01 Rejection of invention patent application after publication