Nothing Special   »   [go: up one dir, main page]

CN105893868A - Information protection method and device - Google Patents

Information protection method and device Download PDF

Info

Publication number
CN105893868A
CN105893868A CN201610186940.3A CN201610186940A CN105893868A CN 105893868 A CN105893868 A CN 105893868A CN 201610186940 A CN201610186940 A CN 201610186940A CN 105893868 A CN105893868 A CN 105893868A
Authority
CN
China
Prior art keywords
information
application program
merchant identification
labeled
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610186940.3A
Other languages
Chinese (zh)
Inventor
刘鸣
张亮
王乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610186940.3A priority Critical patent/CN105893868A/en
Publication of CN105893868A publication Critical patent/CN105893868A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an information protection method and device, and belongs to the technical field of information. The information protection method comprises the following steps of when the received information conforms to the preset condition, marking the information; when an application program requests to read the marked information, judging whether the application program is third application which is not girded with the authority for reading the marked information or not; and when the application program is third application which is not girded with the authority for reading the marked information, forbidding the application program to read the marked information. The method and the device disclosed by the invention have the advantages that the problem that when privacy contents in the contents of the information are maliciously read by a malicious application program with the authority of reading the information, the property security and the account privacy bound with a mobile terminal can be possibly leaked and stolen is solved; and the method and the device achieve effects that the malicious reading on the information involving the privacy contents in the terminal is avoided, and the security of the property and the account privacy bound with the terminal is improved.

Description

Information protecting method and device
Technical field
It relates to areas of information technology, particularly to a kind of information protecting method and device.
Background technology
Many application programs can pass through message authentication codes login account, when user tests in the application After the operation that card code logs in, the server that this application program is corresponding can send one to the terminal that this account is bound Checking information, user inputs the identifying code in this checking information in the application, when identifying code is correct Can complete to log in.
Be manually entered the process of identifying code to save user, many application programs have the authority of reading information, After the terminal being provided with this application program receives checking information, application program can read checking information automatically In identifying code.
Summary of the invention
The disclosure provides a kind of information protecting method and device.Described technical scheme is as follows:
First aspect according to disclosure embodiment, it is provided that a kind of information protecting method, described method includes:
When the information received conforms to a predetermined condition, being marked described information, described predetermined condition is extremely Include less following at least one: the transmission account sending described information is predetermined account, the content of described information Comprise predetermined field;
When application requests reads labeled information, it is judged that whether described application program is that reading is not awarded Take the third-party application of the authority of described labeled information;
When described application program is the third-party application that the authority that read described labeled information is not awarded, Forbid that described application program reads described labeled information.
Embodiment of the disclosure that the technical scheme that first aspect provides can include following beneficial effect: by mark The information that note conforms to a predetermined condition, and forbid that the third party that the authority that read this labeled information is not awarded should By the content reading this labeled information;Owing to labeled information relates generally to privacy content, forbid not awarded The third-party application giving the authority reading this labeled information reads the content of this labeled information, can be effective Avoid privacy content to be stolen, therefore solve the privacy content in the content of once information and be there is reading letter The malicious application malice of the authority of breath reads, with account privacy and the property safety of this mobile terminal binding May compromised, the problem stolen;Reach to avoid the information relating to privacy content in terminal maliciously to be read Take, improve the effect of the safety of the account privacy with terminal binding and property.
Optionally, described in forbid described application program read described labeled information, including:
When described third-party application reads described labeled information by system interface request, forbid to described System interface feeds back the content of described labeled information.
Optionally, described method also includes:
After described information is labeled, according to the corresponding relation sent between account and merchant identification, determine The merchant identification corresponding to transmission account of described information, described merchant identification identifies described transmission for unique Account.
Optionally, described when application requests reads labeled information, it is judged that whether described application program For the third-party application of the authority that read described labeled information is not awarded, including:
When described application requests reads labeled information, obtain the merchant identification of described application program;
Judge that the merchant identification of described application program is the most consistent with the merchant identification of described labeled information;
When the merchant identification of described application program and the merchant identification of described labeled information are inconsistent, it is determined that Described application program is the third-party application that the authority that read described labeled information is not awarded.
Embodiment of the disclosure that the optional technical scheme that first aspect provides can include following beneficial effect: When application requests reads labeled information, by judge the merchant identification of this application program whether with quilt The merchant identification of label information is consistent, judges whether this application reads this labeled information as not being awarded The third-party application of authority so that labeled information can only be read by the application program that merchant identification is consistent, has Effect prevents the third-party application that the authority that read described labeled information is not awarded from reading labeled information.
Optionally, described judge that described application program is as the authority that read described labeled information is not awarded Third-party application, including:
Whether the merchant identification detecting described application program further is positioned at white list, and described white list stores There is the merchant identification with the application program reading labeled information authority;
When the merchant identification of described application program is not located in described white list, it is determined that described application program is The third-party application of the authority that read described labeled information is not awarded.
Embodiment of the disclosure that the optional technical scheme that first aspect provides can include following beneficial effect: Valid application program can be considered, by allowing business owing to merchant identification is positioned at the application program of white list Family mark is positioned at the application program of white list and reads labeled information so that labeled information is except can be by Outside the application program reading that merchant identification is consistent, it is also possible to the merchant identification being positioned at white list is inconsistent Valid application program reads, and while the safety of the content that improve labeled information, expands and has reading Take the scope of the valid application program of labeled information authority.
Optionally, described method also includes:
When the merchant identification of described application program is not located in described white list, detect described application program Whether merchant identification belongs to legal merchant identification;
When the merchant identification of described application program belongs to legal merchant identification, by the trade company of described application program Mark is added to described white list.
Embodiment of the disclosure that the optional technical scheme that first aspect provides can include following beneficial effect: By inspection merchant identification volume legitimacy, and legal merchant identification is added to white list, with the most more Merchant identification in new white list, it is to avoid the valid application program that merchant identification is not located in white list is not due to The authority that read labeled information is awarded, and is prohibited to read labeled information.
Second aspect according to disclosure embodiment, it is provided that a kind of information protection device, described device includes:
Mark module, when the information being configured as receiving conforms to a predetermined condition, marks described information Note, described predetermined condition at least include following at least one: the transmission account sending described information is predetermined account Number, the content of described information comprise predetermined field;
Judge module, is configured to when application requests reads labeled information, it is judged that described application journey Whether sequence is the third-party application that the authority that read described labeled information is not awarded;
Disabled module, being configured as described judge module and determining described application program is that reading is not awarded During the third-party application of the authority of described labeled information, forbid that described application program reads described labeled letter Breath.
Optionally, described disabled module, it is also configured to
When described third-party application reads described labeled information by system interface request, forbid to described System interface feeds back the content of described labeled information.
Optionally, described device also includes:
Determine module, be configured to after described information is labeled, according to send account and merchant identification it Between corresponding relation, determine the merchant identification corresponding to transmission account of described information, described merchant identification is used Described transmission account is identified in unique.
Optionally, described judge module, including:
Obtain submodule, be configured to, when described application requests reads labeled information, obtain described The merchant identification of application program;
Judge submodule, be configured to judge trade company's mark of the described application program that described acquisition submodule obtains Know the most consistent with the merchant identification of described labeled information;
First decision sub-module, is configured as described judgement submodule and determines the trade company of described application program When mark is inconsistent with the merchant identification of described labeled information, it is determined that described application program is not for be awarded reading Take the third-party application of the authority of described labeled information.
Optionally, described first decision sub-module, including:
Detection sub-module, is configured to detect further the described application program that described acquisition submodule obtains Whether merchant identification is positioned at white list, and described white list storage has to have reads answering of labeled information authority With the merchant identification of program;
Second decision sub-module, is additionally configured to when described detection sub-module detects the business of described application program When family mark is not located in described white list, it is determined that described application program is described labeled for reading is not awarded The third-party application of the authority of information.
Optionally, described device also includes:
Detection module, is configured to when the merchant identification of described application program is not located in described white list, Whether the merchant identification detecting described application program belongs to legal merchant identification;
Add module, be configured as described detection module and detect that the merchant identification of described application program belongs to During legal merchant identification, the merchant identification of described application program is added to described white list.
The third aspect according to disclosure embodiment, it is provided that a kind of information protection device, described device includes:
Processor;
For storing the memorizer of this processor executable;
Wherein, this processor is configured to:
When the information received conforms to a predetermined condition, being marked described information, described predetermined condition is extremely Include less following at least one: the transmission account sending described information is predetermined account, the content of described information Comprise predetermined field;
When application requests reads labeled information, it is judged that whether described application program is that reading is not awarded Take the third-party application of the authority of described labeled information;
When described application program is the third-party application that the authority that read described labeled information is not awarded, Forbid that described application program reads described labeled information.
It should be appreciated that it is only exemplary that above general description and details hereinafter describe, can not Limit the disclosure.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the disclosure Embodiment, and in description together for explaining the principle of the disclosure.
Fig. 1 is the flow chart according to a kind of information protecting method shown in an exemplary embodiment;
Fig. 2 A is the flow chart according to a kind of information protecting method shown in another exemplary embodiment;
Fig. 2 B be according to shown in an exemplary embodiment judge this application program be whether reading is not awarded should The flow chart of the third-party application method of the authority of labeled information;
Fig. 2 C is that in order reading is not awarded, this is marked according to this application program that judges shown in an exemplary embodiment The flow chart of the third-party application method of the authority of note information;
Fig. 2 D is according to adding the merchant identification of valid application to white list shown in an exemplary embodiment The flow chart of method;
Fig. 3 A is the block diagram according to a kind of information protection device shown in an exemplary embodiment;
Fig. 3 B is the block diagram according to a kind of information protection device shown in another exemplary embodiment;
Fig. 4 is a kind of for protecting the block diagram of the device of information according to shown in an exemplary embodiment.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Following retouches Stating when relating to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element. Embodiment described in following exemplary embodiment does not represent all embodiment party consistent with the disclosure Formula.On the contrary, they only with describe in detail in appended claims, the disclosure some in terms of mutually one The example of the apparatus and method caused.
Fig. 1 is the flow chart according to a kind of information protecting method shown in an exemplary embodiment, such as Fig. 1 institute Showing, this information protecting method comprises the following steps.
In a step 101, when the information received conforms to a predetermined condition, this information is marked, should Predetermined condition at least include following at least one: the transmission account sending this information is predetermined account, this information Content comprise predetermined field.
In a step 102, when application requests reads labeled information, it is judged that whether this application program For the third-party application of the authority that read this labeled information is not awarded.
In step 103, should as the third party that application program is the authority that reading labeled information is not awarded Used time, forbid that this application program reads this labeled information.
In sum, the information protecting method provided in disclosure embodiment, conformed to a predetermined condition by labelling Information, and the third-party application forbidding not being awarded the authority reading this labeled information reads this and is labeled The content of information;Owing to labeled information relates generally to privacy content, this is labeled to forbid that reading is not awarded The third-party application of the authority of information reads the content of this labeled information, can be prevented effectively from privacy content quilt Steal, therefore solve the malice of the authority that the privacy content in the content of once information is had reading information Application program malice reads, with the account privacy of this mobile terminal binding and property safety may compromised, The problem stolen;Reach to avoid the information relating to privacy content in terminal maliciously to be read, improved and terminal The account privacy of binding and the effect of the safety of property.
Fig. 2 A is the flow chart according to a kind of information protecting method shown in another exemplary embodiment, such as figure Shown in 2A, this information protecting method comprises the following steps.
In step 201, when the information received conforms to a predetermined condition, this information is marked.
Here the predetermined condition said at least include following at least one: the transmission account sending this information is pre- Determine account, the content of this information comprises predetermined field.
Here the information said can be the network information can also be general information, such as note, mail, i.e. Time communication information etc., the particular type of information is not defined by the present embodiment.
Optionally, after receiving information, by the transmission account of this information and each account in predetermined account Contrast;When this transmission account is identical with an account in predetermined account, it is determined that this information meets this Predetermined condition.
Optionally, the transmission account of received information is inquired about by the mode such as online query, local search Whether it is predetermined account.
Here the predetermined account said can be Bank Account Number, operator's account, regular Network platform account number etc., The particular type of predetermined account is not defined by the present embodiment.
Such as, after terminal receives transmission account is the information that " 95319 " send, " 95319 " are carried out Inquiry, obtaining " 95319 " is Bank Account Number, and owing to this information conforms to a predetermined condition, terminal can be to this information It is marked.For another example, after terminal receives transmission account is the information that " 10001 " send, to " 10001 " Inquiring about, obtaining " 10001 " is operator's account, and owing to this information conforms to a predetermined condition, terminal can be right This information is marked.
Optionally, after receiving information, the content of this information is carried out participle, obtain this information and comprised Participle field;Inquire about and whether the participle field that this information is comprised comprises at least in this predetermined field Individual;When the participle field that this information is comprised comprises at least one in predetermined field, it is determined that this information Meet this predetermined condition.
Here the participle field said can be pay, transfer accounts, password, identifying code, property etc. may relate to Account privacy and the predetermined field of property.
Such as, the content of the information that terminal receives for " this dynamic logon authentication code is: 123456 ", Terminal obtain after this information is carried out participle " this ", " dynamically ", " logging in ", " identifying code ", " it is " and " 123456 ", when this terminal is after inquiry determines that " identifying code " is predetermined field, can be right This information is marked.
In step 202., after information is labeled, corresponding according to send between account and merchant identification Relation, determines the merchant identification corresponding to transmission account of this information.
Here the merchant identification corresponding to transmission account said refers to apply for the trade company of this transmission account.
Here the merchant identification said identifies this transmission account for unique, merchant identification can be written form, Graphic form, digital form, sign format or the combination etc. of above-mentioned various ways, the present embodiment does not limits Merchant identification specifically represent form.
As a example by merchant identification is as written form, the merchant identification such as sending account " 95319 " corresponding is river Su Yinhang, the merchant identification sending account " 10001 " for another example corresponding is China Telecom.
Optionally, terminal uses online query, the mode of local search, inquiry to send account and merchant identification Between corresponding relation.
In step 203, when application requests reads labeled information, it is judged that whether this application program For the third-party application of the authority that read this labeled information is not awarded.
In a kind of mode in the cards, read the authority of described labeled information to prevent from not being awarded Third-party application read labeled information, whether terminal can be by judging the merchant identification of this application program Consistent with the merchant identification of labeled information, judge that whether this application is as reading this labeled letter is not awarded The third-party application of the authority of breath.Fig. 2 B is The flow chart of the no third-party application method for the authority that read this labeled information is not awarded, such as Fig. 2 B institute Showing, this judges whether this application program is the third-party application that the authority that read this labeled information is not awarded Method can be realized by following step 203a to step 203c.
In step 203, when application requests reads labeled information, the business of this application program is obtained Family identifies.
The merchant identification of the application program said here refers to develop the trade company of this application program.Such as, application The merchant identification of program " rice is chatted " is Xiaomi Technology Co., Ltd..
In step 203b, it is judged that the merchant identification of the merchant identification of application program and labeled information whether Cause.
For example, after terminal receives transmission account is the information that " 1069013327 " send, right " 1069013327 " are inquired about, and obtaining " 1069013327 " is regular Network platform account number, due to this Information conforms to a predetermined condition, and this information can be marked by terminal, and determines transmission account by online query The merchant identification of " 1069013327 " correspondence is Xiaomi Technology Co., Ltd..When a certain application program please During the labeled information asking this merchant identification of reading to be Xiaomi Technology Co., Ltd., terminal can will obtain The merchant identification of this application program, judges whether the merchant identification of this application program is the Semen setariae limited duty of science and technology Ren company.
In step 203c, when the merchant identification of application program and the merchant identification of labeled information are inconsistent, Judge that this application program is as the third-party application that the authority that read this labeled information is not awarded.
Accordingly, when the merchant identification of application program is consistent with the merchant identification of labeled information, it is determined that should Application program is the application that the authority that read this labeled information is awarded.
For example, if the merchant identification of a certain labeled information is Xiaomi Technology Co., Ltd. in terminal, When a certain application requests reads this labeled information, terminal can will obtain the trade company of this application program Mark.If the merchant identification that terminal gets this application program is Xiaomi Technology Co., Ltd., due to this The merchant identification of application program is consistent with the merchant identification of labeled information, terminal then judge this application program as The application of the authority that read this labeled information is awarded;If terminal gets the merchant identification of this application program For ABC Co., Ltd, due to this application program merchant identification and labeled information merchant identification not Unanimously, terminal then judges that this application program is as the application that the authority that read this labeled information is not awarded.
In step 204, should as the third party that application program is the authority that reading labeled information is not awarded Used time, forbid that this application program reads this labeled information.
Optionally, when third-party application reads labeled information by system interface request, forbid to this be System interface feeds back the content of this labeled information.
Accordingly, when application program is side's application that the authority that read labeled information is awarded, it is allowed to should Application program reads this labeled information.
Owing to labeled information relates generally to privacy content, in order to avoid terminal relates to the information of privacy content Maliciously being read, terminal can forbid that the third-party application that the authority that read this labeled information is not awarded is read Take the content of this labeled information.
In sum, the information protecting method provided in disclosure embodiment, conformed to a predetermined condition by labelling Information, and the third-party application forbidding not being awarded the authority reading this labeled information reads this and is labeled The content of information;Owing to labeled information relates generally to privacy content, this is labeled to forbid that reading is not awarded The third-party application of the authority of information reads the content of this labeled information, can be prevented effectively from privacy content quilt Steal, therefore solve the malice of the authority that the privacy content in the content of once information is had reading information Application program malice reads, with the account privacy of this mobile terminal binding and property safety may compromised, The problem stolen;Reach to avoid the information relating to privacy content in terminal maliciously to be read, improved and terminal The account privacy of binding and the effect of the safety of property.
In the present embodiment, when application requests reads labeled information, by judging this application program Merchant identification is the most consistent with the merchant identification of labeled information, judges that whether this application is as reading is not awarded Take the third-party application of the authority of this labeled information so that labeled information can only be consistent by merchant identification Application program reads, and effectively prevents the third-party application that the authority that read described labeled information is not awarded from reading Take labeled information.
In a kind of possible implementation, terminal can prestore to have and read answering of labeled information authority With the white list of the merchant identification of program, and according to whether this white list exists a certain application program, sentence Whether this application program fixed is the application that the authority that read labeled information is awarded.Fig. 2 C is according to an example Property embodiment shown in judge that this application program is as the third party of authority that read this labeled information is not awarded The flow chart of application process, as shown in Figure 2 C, step 203c in Fig. 2 B can be replaced by following step 203c1 is to step 203c2.
In step 203c1, when the merchant identification of application program is inconsistent with the merchant identification of labeled information Time, whether the merchant identification of detection application program is positioned at white list further.
Here the white list storage said has trade company's mark with the application program reading labeled information authority Know.
Optionally, terminal uses the mode of online query, is stored in white by legal for the main flow inquired merchant identification In list.
In step 203c2, when the merchant identification of application program is not located in white list, it is determined that this application Program is that the third-party application of the authority that read labeled information is not awarded.
Accordingly, when the merchant identification of application program is positioned at white list, it is determined that this application program is for be awarded Give the application of the authority reading labeled information.
All can be considered legal merchant identification due to the merchant identification in white list, therefore merchant identification is positioned at Application program in white list all can be judged as valid application program.
For example, if the merchant identification of a certain labeled information is Xiaomi Technology Co., Ltd. in terminal, When a certain application requests reads this labeled information, terminal can will obtain the trade company of this application program Mark, when the merchant identification that terminal gets this application program is ABC Co., Ltd, owing to this should Inconsistent with the merchant identification of labeled information with the merchant identification of program, terminal can detect trade company's mark further Know whether " ABC Co., Ltd " is positioned at white list.Now, if merchant identification " the limited duty of ABC Ren company " it is positioned at white list, terminal then judges that this application program is as the power that reads labeled information is awarded The application of limit;If merchant identification " ABC Co., Ltd " is not located in white list, terminal then judges this Application program is the application that the authority that read labeled information is not awarded.
Such as, user logs in the account of application program B in the application A that terminal is installed, and applies journey Sequence A has the function of reading information, and the merchant identification A of application A is positioned at white list.So, After user selects the mode of " utilizing terminal to receive identifying code " to log in, trade company's meeting corresponding for application program B The information including identifying code is sent to the terminal of this user, after the terminal of this user receives this information, Judge that this information conforms to a predetermined condition, this information has been carried out labelling and has determined the transmission account institute of this information Corresponding merchant identification B.When this labeled information is read in application A request, the terminal of this user obtains Take the merchant identification A of this application A, due to merchant identification A and the transmission of this information of application A Merchant identification B corresponding to account is inconsistent, but owing to the merchant identification A of application A is positioned at white list In, therefore the terminal of this user will judge that application A is as the answering of the authority that read labeled information is awarded With, and allow application A to read trade company corresponding for application program B to comprising that the terminal of this user sends There is the information of identifying code.
In the present embodiment, valid application can be considered owing to merchant identification is positioned at the application program of white list Program, reads labeled information by the application program allowing merchant identification to be positioned at white list so that marked Note information except can be consistent by merchant identification application program read in addition to, it is also possible to be positioned at white list The inconsistent valid application program of merchant identification reads, and improves safety same of the content of labeled information Time, expand the scope with the valid application program reading labeled information authority.
In a kind of possible implementation, the valid application being not located in white list in order to avoid merchant identification Program reads the authority of labeled information owing to not being awarded, and is prohibited to read labeled information, and terminal can In the way of updating by networking, to be manually entered, the merchant identification being not located in white list is added to white list In.Fig. 2 D is according to adding the merchant identification of valid application to white list side shown in an exemplary embodiment The flow chart of method, as shown in Figure 2 D, the merchant identification of valid application is added to white list method by following by this Step 205 realizes to step 207.
In step 205, when the merchant identification of application program is not located in white list, detect this application journey Whether the merchant identification of sequence belongs to legal merchant identification.
Generally, industrial and commercial bureau have registration information trade company can by regarding legal trade company, this legal trade company Merchant identification also can be considered legal mark.
In step 206, when the merchant identification of application program belongs to legal merchant identification, by this application journey The merchant identification of sequence adds to white list.
If the merchant identification of application program belongs to legal merchant identification, illustrate that this application program is valid application journey Sequence, the merchant identification of this application program can be added to white list by terminal, authorizes this application program and reads The authority of labeled information.
In step 207, when the merchant identification of application program is not belonging to legal merchant identification, forbid that this should The content of labeled information is read by program.
If the merchant identification of application program is not belonging to legal merchant identification, illustrate that this application program may be illegal Application program, terminal then forbids that this application program reads the content of labeled information.
In the present embodiment, by inspection merchant identification volume legitimacy, and legal merchant identification is added in vain In list, with the merchant identification in white list that upgrades in time, it is to avoid merchant identification is not located at the conjunction in white list Method application program reads the authority of labeled information owing to not being awarded, and is prohibited to read labeled information.
Following for disclosure device embodiment, may be used for performing method of disclosure embodiment.For the disclosure The details not disclosed in device embodiment, refer to method of disclosure embodiment.
Fig. 3 A is the block diagram according to a kind of information protection device shown in an exemplary embodiment, such as Fig. 3 A institute Showing, this information protection device includes but not limited to: mark module 301, judge module 302 and disabled module 303。
Mark module 301, when the information being configured as receiving conforms to a predetermined condition, marks this information Note, this predetermined condition at least include following at least one: send the transmission account of this information be predetermined account, The content of this information comprises predetermined field.
Here the information said can be the network information can also be general information, such as note, mail, i.e. Time communication information etc., the particular type of information is not defined by the present embodiment.
Optionally, after receiving information, by the transmission account of this information and each account in predetermined account Contrast;When this transmission account is identical with an account in predetermined account, it is determined that this information meets this Predetermined condition.
Optionally, the transmission account of received information is inquired about by the mode such as online query, local search Whether it is predetermined account.
Here the predetermined account said can be Bank Account Number, operator's account, regular Network platform account number etc., The particular type of predetermined account is not defined by the present embodiment.
Such as, after terminal receives transmission account is the information that " 95319 " send, " 95319 " are carried out Inquiry, obtaining " 95319 " is Bank Account Number, and owing to this information conforms to a predetermined condition, terminal can be to this information It is marked.For another example, after terminal receives transmission account is the information that " 10001 " send, to " 10001 " Inquiring about, obtaining " 10001 " is operator's account, and owing to this information conforms to a predetermined condition, terminal can be right This information is marked.
Optionally, after receiving information, the content of this information is carried out participle, obtain this information and comprised Participle field;Inquire about and whether the participle field that this information is comprised comprises at least in this predetermined field Individual;When the participle field that this information is comprised comprises at least one in predetermined field, it is determined that this information Meet this predetermined condition.
Here the participle field said can be pay, transfer accounts, password, identifying code, property etc. may relate to Account privacy and the predetermined field of property.
Such as, the content of the information that terminal receives for " this dynamic logon authentication code is: 123456 ", Terminal obtain after this information is carried out participle " this ", " dynamically ", " logging in ", " identifying code ", " it is " and " 123456 ", when this terminal is after inquiry determines that " identifying code " is predetermined field, can be right This information is marked.
Judge module 302, is configured to when application requests reads labeled information, it is judged that this application journey Whether sequence is the third-party application that the authority that read this labeled information is not awarded.
Disabled module 303, being configured as judge module 302 and determining application program is that reading quilt is not awarded During the third-party application of the authority of label information, forbid that this application program reads this labeled information.
Optionally, when third-party application reads labeled information by system interface request, forbid to this be System interface feeds back the content of this labeled information.
Accordingly, when application program is side's application that the authority that read labeled information is awarded, it is allowed to should Application program reads this labeled information.
Owing to labeled information relates generally to privacy content, in order to avoid terminal relates to the information of privacy content Maliciously being read, terminal can forbid that the third-party application that the authority that read this labeled information is not awarded is read Take the content of this labeled information.
In a kind of possible implementation, referring to Fig. 3 B, it is to illustrate according to another exemplary embodiment The block diagram of a kind of information protection device, as shown in Figure 3 B, this disabled module 303, be also configured to work as When third-party application reads labeled information by system interface request, forbid feeding back this quilt to this system interface The content of label information.
In a kind of possible implementation, referring also to Fig. 3 B, this device also comprises determining that module 304.
Determine module 304, be configured to after information is labeled, according to sending between account and merchant identification Corresponding relation, determine the merchant identification corresponding to transmission account of this information, this merchant identification is for unique Identify this transmission account.
Here the merchant identification corresponding to transmission account said refers to apply for the trade company of this transmission account.
Here the merchant identification said can be written form, graphic form, digital form, sign format or The combination etc. of the above-mentioned various ways of person, what the present embodiment did not limit merchant identification specifically represents form.
As a example by merchant identification is as written form, the merchant identification such as sending account " 95319 " corresponding is river Su Yinhang, the merchant identification sending account " 10001 " for another example corresponding is China Telecom.
Determine module 304, be configured to after the information that mark module 301 receives is labeled, according to transmission Corresponding relation between account and merchant identification, determines the merchant identification corresponding to transmission account of this information, This merchant identification identifies this transmission account for unique.
Merchant identification corresponding to transmission account mentioned here refers to apply for the trade company of this transmission account.Such as The merchant identification sending account " 95319 " corresponding is Jiangsu bank, sends the business that account " 10001 " is corresponding Family is designated China Telecom.
Optionally, terminal uses online query, the mode of local search, inquiry to send account and merchant identification Between corresponding relation.
In a kind of possible implementation, referring also to Fig. 3 B, this judge module 302, including: obtain son Module 302a, judge submodule 302b and the first decision sub-module 302c.
Obtaining submodule 302a, be configured to when application requests reads labeled information, obtaining should With the merchant identification of program.
The merchant identification of the application program said here refers to develop the trade company of this application program.Such as, application The merchant identification of program " rice is chatted " is Xiaomi Technology Co., Ltd..
Judge submodule 302b, be configured to the trade company's mark judging to obtain the application program that submodule 302a obtains Know the most consistent with the merchant identification of labeled information.
For example, after terminal receives transmission account is the information that " 1069013327 " send, right " 1069013327 " are inquired about, and obtaining " 1069013327 " is regular Network platform account number, due to this Information conforms to a predetermined condition, and this information can be marked by terminal, and determines transmission account by online query The merchant identification of " 1069013327 " correspondence is Xiaomi Technology Co., Ltd..When a certain application program please During the labeled information asking this merchant identification of reading to be Xiaomi Technology Co., Ltd., terminal can will obtain The merchant identification of this application program, judges whether the merchant identification of this application program is the Semen setariae limited duty of science and technology Ren company.
First decision sub-module 302c, is configured as judging the trade company that submodule 302b determines application program When mark is inconsistent with the merchant identification of labeled information, it is determined that this application program is not for being awarded this quilt of reading The third-party application of the authority of label information.
Accordingly, when the merchant identification of application program is consistent with the merchant identification of labeled information, it is determined that should Application program is the application that the authority that read this labeled information is awarded.
For example, if the merchant identification of a certain labeled information is Xiaomi Technology Co., Ltd. in terminal, When a certain application requests reads this labeled information, terminal can will obtain the trade company of this application program Mark.If the merchant identification that terminal gets this application program is Xiaomi Technology Co., Ltd., due to this The merchant identification of application program is consistent with the merchant identification of labeled information, terminal then judge this application program as The application of the authority that read this labeled information is awarded;If terminal gets the merchant identification of this application program For ABC Co., Ltd, due to this application program merchant identification and labeled information merchant identification not Unanimously, terminal then judges that this application program is as the application that the authority that read this labeled information is not awarded.
In a kind of possible implementation, referring also to Fig. 3 B, this first decision sub-module 302c, including: Detection sub-module 302c1 and the second decision sub-module 302c2.
Detection sub-module 302c1, is configured to detect the application program obtaining submodule 302a acquisition further Merchant identification whether be positioned at white list, this white list storage have have read labeled information authority should With the merchant identification of program.
Here the white list storage said has trade company's mark with the application program reading labeled information authority Know.
Optionally, terminal uses the mode of online query, is stored in white by legal for the main flow inquired merchant identification In list.
Second decision sub-module 302c2, is additionally configured to when detection sub-module 302c1 detects application program When merchant identification is not located in white list, it is determined that this application program is the power not being awarded and reading labeled information The third-party application of limit.
Accordingly, when the merchant identification of application program is positioned at white list, it is determined that this application program is for be awarded Give the application of the authority reading labeled information.
All can be considered legal merchant identification due to the merchant identification in white list, therefore merchant identification is positioned at Application program in white list all can be judged as valid application program.
For example, if the merchant identification of a certain labeled information is Xiaomi Technology Co., Ltd. in terminal, When a certain application requests reads this labeled information, terminal can will obtain the trade company of this application program Mark, when the merchant identification that terminal gets this application program is ABC Co., Ltd, owing to this should Inconsistent with the merchant identification of labeled information with the merchant identification of program, terminal can detect trade company's mark further Know whether " ABC Co., Ltd " is positioned at white list.Now, if merchant identification " the limited duty of ABC Ren company " it is positioned at white list, terminal then judges that this application program is as the power that reads labeled information is awarded The application of limit;If merchant identification " ABC Co., Ltd " is not located in white list, terminal then judges this Application program is the application that the authority that read labeled information is not awarded.
Such as, user logs in the account of application program B in the application A that terminal is installed, and applies journey Sequence A has the function of reading information, and the merchant identification A of application A is positioned at white list.So, After user selects the mode of " utilizing terminal to receive identifying code " to log in, trade company's meeting corresponding for application program B The information including identifying code is sent to the terminal of this user, after the terminal of this user receives this information, Judge that this information conforms to a predetermined condition, this information has been carried out labelling and has determined the transmission account institute of this information Corresponding merchant identification B.When this labeled information is read in application A request, the terminal of this user obtains Take the merchant identification A of this application A, due to merchant identification A and the transmission of this information of application A Merchant identification B corresponding to account is inconsistent, but owing to the merchant identification A of application A is positioned at white list In, therefore the terminal of this user will judge that application A is as the answering of the authority that read labeled information is awarded With, and allow application A to read trade company corresponding for application program B to comprising that the terminal of this user sends There is the information of identifying code.
In a kind of possible implementation, referring also to Fig. 3 B, this device also includes: detection module 305 He Add module 306.
Detection module 305, is configured to when the merchant identification of application program is not located in white list, and detection should Whether the merchant identification of application program belongs to legal merchant identification.
Generally, industrial and commercial bureau have registration information trade company can by regarding legal trade company, this legal trade company Merchant identification also can be considered legal mark.
Add module 306, be configured as detection module 305 and detect that the merchant identification of application program belongs to conjunction During method merchant identification, the merchant identification of this application program is added to white list.
If the merchant identification of application program belongs to legal merchant identification, illustrate that this application program is valid application journey Sequence, the merchant identification of this application program can be added to white list by terminal, authorizes this application program and reads The authority of labeled information.
In sum, the information protection device provided in disclosure embodiment, conformed to a predetermined condition by labelling Information, and the third-party application forbidding not being awarded the authority reading this labeled information reads this and is labeled The content of information;Owing to labeled information relates generally to privacy content, this is labeled to forbid that reading is not awarded The third-party application of the authority of information reads the content of this labeled information, can be prevented effectively from privacy content quilt Steal, therefore solve the malice of the authority that the privacy content in the content of once information is had reading information Application program malice reads, with the account privacy of this mobile terminal binding and property safety may compromised, The problem stolen;Reach to avoid the information relating to privacy content in terminal maliciously to be read, improved and terminal The account privacy of binding and the effect of the safety of property.
In the present embodiment, when application requests reads labeled information, by judging this application program Merchant identification is the most consistent with the merchant identification of labeled information, judges that whether this application is as reading is not awarded Take the third-party application of the authority of this labeled information so that labeled information can only be consistent by merchant identification Application program reads, and effectively prevents the third-party application that the authority that read described labeled information is not awarded from reading Take labeled information.
In the present embodiment, valid application can be considered owing to merchant identification is positioned at the application program of white list Program, reads labeled information by the application program allowing merchant identification to be positioned at white list so that marked Note information except can be consistent by merchant identification application program read in addition to, it is also possible to be positioned at white list The inconsistent valid application program of merchant identification reads, and improves safety same of the content of labeled information Time, expand the scope with the valid application program reading labeled information authority.
In the present embodiment, by inspection merchant identification volume legitimacy, and legal merchant identification is added in vain In list, with the merchant identification in white list that upgrades in time, it is to avoid merchant identification is not located at the conjunction in white list Method application program reads the authority of labeled information owing to not being awarded, and is prohibited to read labeled information.
The disclosure one exemplary embodiment provides a kind of information protection device, it is possible to realize what the disclosure provided Information protecting method, this information protection device includes: processor, be used for storing processor executable Memorizer;
Wherein, processor is configured to:
When the information received conforms to a predetermined condition, being marked this information, this predetermined condition is at least wrapped Include following at least one: sending the transmission account of this information is that predetermined account, the content of this information comprise predetermined Field;
When application requests reads labeled information, it is judged that whether this application program is that reading is not awarded The third-party application of the authority of this labeled information;
When application program is the third-party application that the authority that read labeled information is not awarded, forbid that this should This labeled information is read by program.
Fig. 4 is a kind of for protecting the block diagram of the device of information according to shown in an exemplary embodiment.Such as, Device 400 can be mobile phone, computer, digital broadcast terminal, messaging devices, and game controls Platform, tablet device, armarium, body-building equipment, platform personal digital assistant etc..
With reference to Fig. 4, device 400 can include one or more assembly following: processes assembly 402, memorizer 404, power supply module 406, multimedia groupware 408, audio-frequency assembly 410, input/output (I/O) interface 412, Sensor cluster 414, and communications component 416.
Process assembly 402 and generally control the integrated operation of device 400, such as with display, call, number The operation being associated according to communication, camera operation and record operation.Process assembly 402 and can include one or many Platform processor 418 performs instruction, to complete all or part of step of above-mentioned method.Additionally, process Assembly 402 can include one or more module, it is simple to process between assembly 402 and other assemblies is mutual. Such as, process assembly 402 and can include multi-media module, to facilitate multimedia groupware 408 and to process assembly Mutual between 402.
Memorizer 404 is configured to store various types of data to support the operation at device 400.These The example of data includes any application program for operation on device 400 or the instruction of method, contact person Data, telephone book data, message, picture, video etc..Memorizer 404 can be by any kind of volatile Property or non-volatile memory device or combinations thereof realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), Programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash memory, Disk or CD.
The various assemblies that power supply module 406 is device 400 provide electric power.Power supply module 406 can include electricity Management system, one or more power supply, and other generate, manage and distribute electric power phase with for device 400 The assembly of association.
The screen of one output interface of offer that multimedia groupware 408 is included between device 400 and user. In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If Screen includes that touch panel, screen may be implemented as touch screen, to receive the input signal from user. Touch panel includes that one or more touch sensor is with the gesture on sensing touch, slip and touch panel. Touch sensor can not only sense touch or the border of sliding action, but also detect and touch or slide behaviour Make relevant persistent period and pressure.In certain embodiments, multimedia groupware 408 includes that one preposition is taken the photograph As head and/or post-positioned pick-up head.When device 400 is in operator scheme, during such as screening-mode or video mode, Front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Every front-facing camera and after Put photographic head can be a fixing optical lens system or there is focal length and optical zoom ability.
Audio-frequency assembly 410 is configured to output and/or input audio signal.Such as, audio-frequency assembly 410 includes One mike (MIC), when device 400 is in operator scheme, such as call model, logging mode and voice During recognition mode, mike is configured to receive external audio signal.The audio signal received can be entered One step is stored in memorizer 404 or sends via communications component 416.In certain embodiments, audio-frequency assembly 410 also include a speaker, are used for exporting audio signal.
I/O interface 412 provides interface, above-mentioned peripheral interface for processing between assembly 402 and peripheral interface module Module can be keyboard, puts striking wheel, button etc..These buttons may include but be not limited to: home button, sound Amount button, start button and locking press button.
Sensor cluster 414 includes one or more sensor, for providing each aspect for device 400 State estimation.Such as, what sensor cluster 414 can detect device 400 opens/closed mode, assembly Relative localization, such as assembly is display and the keypad of device 400, and sensor cluster 414 is all right Detection the device 400 or position change of 400 1 assemblies of device, existence that user contacts with device 400 or Do not exist, device 400 orientation or acceleration/deceleration and the variations in temperature of device 400.Sensor cluster 414 can To include proximity transducer, it is configured to when there is no any physical contact object near detecting. Sensor cluster 414 can also include optical sensor, such as CMOS or ccd image sensor, is used for becoming Use as in application.In certain embodiments, this sensor cluster 414 can also include acceleration transducer, Gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 416 is configured to facilitate the logical of wired or wireless mode between device 400 and other equipment Letter.Device 400 can access wireless network based on communication standard, such as Wi-Fi, 2G or 3G, or they Combination.In an exemplary embodiment, communications component 416 receives wide from outside via broadcast channel The broadcast singal of broadcast management system or broadcast related information.In an exemplary embodiment, communications component 416 Also include near-field communication (NFC) module, to promote junction service.Such as, can be based on penetrating in NFC module Frequency identification (RF mark) technology, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, Bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 400 can by one or more application specific integrated circuit (ASIC), Digital signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), Field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are real Existing, it is used for performing above-mentioned information protecting method.
In the exemplary embodiment, a kind of non-transitory computer-readable storage medium including instruction is additionally provided Matter, such as, include the memorizer 404 of instruction, and above-mentioned instruction can be performed by the processor 418 of device 400 with complete Become above-mentioned information protecting method.Such as, non-transitory computer-readable recording medium can be ROM, random Access memorizer (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to these public affairs Other embodiment opened.The application is intended to any modification, purposes or the adaptations of the disclosure, These modification, purposes or adaptations are followed the general principle of the disclosure and include that the disclosure is not disclosed Common knowledge in the art or conventional techniques means.Description and embodiments is considered only as exemplary , the true scope of the disclosure and spirit are pointed out by claim below.
It should be appreciated that the disclosure is not limited to accurate knot described above and illustrated in the accompanying drawings Structure, and various modifications and changes can carried out without departing from the scope.The scope of the present disclosure is only by appended Claim limits.

Claims (13)

1. an information protecting method, it is characterised in that described method includes:
When the information received conforms to a predetermined condition, being marked described information, described predetermined condition is extremely Include less following at least one: the transmission account sending described information is predetermined account, the content of described information Comprise predetermined field;
When application requests reads labeled information, it is judged that whether described application program is that reading is not awarded Take the third-party application of the authority of described labeled information;
When described application program is the third-party application that the authority that read described labeled information is not awarded, Forbid that described application program reads described labeled information.
Method the most according to claim 1, it is characterised in that described in forbid that described application program reads Described labeled information, including:
When described third-party application reads described labeled information by system interface request, forbid to described System interface feeds back the content of described labeled information.
Method the most according to claim 1, it is characterised in that described method also includes:
After described information is labeled, according to the corresponding relation sent between account and merchant identification, determine The merchant identification corresponding to transmission account of described information, described merchant identification identifies described transmission for unique Account.
4. according to described method arbitrary in claims 1 to 3, it is characterised in that described at application program When labeled information is read in request, it is judged that whether described application program is that reading described labeled letter is not awarded The third-party application of the authority of breath, including:
When described application requests reads labeled information, obtain the merchant identification of described application program;
Judge that the merchant identification of described application program is the most consistent with the merchant identification of described labeled information;
When the merchant identification of described application program and the merchant identification of described labeled information are inconsistent, it is determined that Described application program is the third-party application that the authority that read described labeled information is not awarded.
Method the most according to claim 4, it is characterised in that described judge that described application program is not as The third-party application of the authority that read described labeled information is awarded, including:
Whether the merchant identification detecting described application program further is positioned at white list, and described white list stores There is the merchant identification with the application program reading labeled information authority;
When the merchant identification of described application program is not located in described white list, it is determined that described application program is The third-party application of the authority that read described labeled information is not awarded.
Method the most according to claim 5, it is characterised in that described method also includes:
When the merchant identification of described application program is not located in described white list, detect described application program Whether merchant identification belongs to legal merchant identification;
When the merchant identification of described application program belongs to legal merchant identification, by the trade company of described application program Mark is added to described white list.
7. an information protection device, it is characterised in that described device includes:
Mark module, when the information being configured as receiving conforms to a predetermined condition, marks described information Note, described predetermined condition at least include following at least one: the transmission account sending described information is predetermined account Number, the content of described information comprise predetermined field;
Judge module, is configured to when application requests reads labeled information, it is judged that described application journey Whether sequence is the third-party application that the authority that read described labeled information is not awarded;
Disabled module, being configured as described judge module and determining described application program is that reading is not awarded During the third-party application of the authority of described labeled information, forbid that described application program reads described labeled letter Breath.
Device the most according to claim 7, it is characterised in that described disabled module, is also configured to
When described third-party application reads described labeled information by system interface request, forbid to described System interface feeds back the content of described labeled information.
Device the most according to claim 7, it is characterised in that described device also includes:
Determine module, be configured to after described information is labeled, according to send account and merchant identification it Between corresponding relation, determine the merchant identification corresponding to transmission account of described information, described merchant identification is used Described transmission account is identified in unique.
10. according to described device arbitrary in claim 7 to 9, it is characterised in that described judge module, Including:
Obtain submodule, be configured to, when described application requests reads labeled information, obtain described The merchant identification of application program;
Judge submodule, be configured to judge trade company's mark of the described application program that described acquisition submodule obtains Know the most consistent with the merchant identification of described labeled information;
First decision sub-module, is configured as described judgement submodule and determines the trade company of described application program When mark is inconsistent with the merchant identification of described labeled information, it is determined that described application program is not for be awarded reading Take the third-party application of the authority of described labeled information.
11. devices according to claim 10, it is characterised in that described first decision sub-module, bag Include:
Detection sub-module, is configured to detect further the described application program that described acquisition submodule obtains Whether merchant identification is positioned at white list, and described white list storage has to have reads answering of labeled information authority With the merchant identification of program;
Second decision sub-module, is additionally configured to when described detection sub-module detects the business of described application program When family mark is not located in described white list, it is determined that described application program is described labeled for reading is not awarded The third-party application of the authority of information.
12. devices according to claim 11, it is characterised in that described device also includes:
Detection module, is configured to when the merchant identification of described application program is not located in described white list, Whether the merchant identification detecting described application program belongs to legal merchant identification;
Add module, be configured as described detection module and detect that the merchant identification of described application program belongs to During legal merchant identification, the merchant identification of described application program is added to described white list.
13. 1 kinds of information protection devices, it is characterised in that described device includes:
Processor;
For storing the memorizer of described processor executable;
Wherein, described processor is configured to:
When the information received conforms to a predetermined condition, being marked described information, described predetermined condition is extremely Include less following at least one: the transmission account sending described information is predetermined account, the content of described information Comprise predetermined field;
When application requests reads labeled information, it is judged that whether described application program is that reading is not awarded Take the third-party application of the authority of described labeled information;
When described application program is the third-party application that the authority that read described labeled information is not awarded, Forbid that described application program reads described labeled information.
CN201610186940.3A 2016-03-29 2016-03-29 Information protection method and device Pending CN105893868A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610186940.3A CN105893868A (en) 2016-03-29 2016-03-29 Information protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610186940.3A CN105893868A (en) 2016-03-29 2016-03-29 Information protection method and device

Publications (1)

Publication Number Publication Date
CN105893868A true CN105893868A (en) 2016-08-24

Family

ID=57013956

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610186940.3A Pending CN105893868A (en) 2016-03-29 2016-03-29 Information protection method and device

Country Status (1)

Country Link
CN (1) CN105893868A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107182043A (en) * 2017-06-27 2017-09-19 努比亚技术有限公司 The labeling method and mobile terminal of identifying code short message
CN114492360A (en) * 2022-03-31 2022-05-13 数安信(北京)科技有限公司 Authorization compliance management method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104376273A (en) * 2014-11-18 2015-02-25 乐视致新电子科技(天津)有限公司 Data access control method and device
CN105307137A (en) * 2015-09-18 2016-02-03 小米科技有限责任公司 Short message reading method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104376273A (en) * 2014-11-18 2015-02-25 乐视致新电子科技(天津)有限公司 Data access control method and device
CN105307137A (en) * 2015-09-18 2016-02-03 小米科技有限责任公司 Short message reading method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107182043A (en) * 2017-06-27 2017-09-19 努比亚技术有限公司 The labeling method and mobile terminal of identifying code short message
CN114492360A (en) * 2022-03-31 2022-05-13 数安信(北京)科技有限公司 Authorization compliance management method and device
CN114492360B (en) * 2022-03-31 2022-06-17 数安信(北京)科技有限公司 Authorization compliance management method and device

Similar Documents

Publication Publication Date Title
CN104980580B (en) Short message inspection method and device
CN104391870B (en) Logistics information acquisition methods and device
CN105260673A (en) Short message reading method and apparatus
CN105307137A (en) Short message reading method and device
EP3038334B1 (en) Method and device for replying to a call
EP2978201B1 (en) Method and device for identifying telephone call
CN107516050A (en) Image processing method, device and terminal
CN106060789B (en) short message identification method and device
CN104639533A (en) Safety control method and device based on terminal
CN106529277A (en) Message preview method and device
CN107257555A (en) Method for network access and device
CN107147815A (en) Based on the call handling method and device called a taxi
CN106101105A (en) Data processing method, Apparatus and system
CN105979062A (en) Method and device for processing communication event
CN105282162A (en) Processing method and device for account management business
CN106534551A (en) Information display method and apparatus
CN105912922A (en) Information management method and device, and terminal
JP2011151487A (en) Terminal-line opening system, and terminal-line opening method
CN105893868A (en) Information protection method and device
CN105303120A (en) Short message reading method and apparatus
CN106559575A (en) Information privacy protection method
CN104506710B (en) Short message management method, terminal and device
CN106778198A (en) Perform the safety certifying method and device of operation
CN105721677B (en) Guard method, device and the mobile terminal of information
CN106407835A (en) Mobile terminal, data protection method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160824

RJ01 Rejection of invention patent application after publication