CN108012023B - Communication message processing method and mobile terminal - Google Patents
Communication message processing method and mobile terminal Download PDFInfo
- Publication number
- CN108012023B CN108012023B CN201711084929.7A CN201711084929A CN108012023B CN 108012023 B CN108012023 B CN 108012023B CN 201711084929 A CN201711084929 A CN 201711084929A CN 108012023 B CN108012023 B CN 108012023B
- Authority
- CN
- China
- Prior art keywords
- terminal
- communication
- message
- communication message
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 448
- 238000003672 processing method Methods 0.000 title claims abstract description 27
- 238000000034 method Methods 0.000 claims abstract description 67
- 238000004590 computer program Methods 0.000 claims description 20
- 238000012545 processing Methods 0.000 claims description 15
- 238000001514 detection method Methods 0.000 claims description 14
- 230000009977 dual effect Effects 0.000 claims description 12
- 238000012795 verification Methods 0.000 claims description 10
- 230000006870 function Effects 0.000 description 29
- 238000010586 diagram Methods 0.000 description 23
- 230000000694 effects Effects 0.000 description 4
- 238000007726 management method Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 230000001960 triggered effect Effects 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 238000007599 discharging Methods 0.000 description 2
- 230000005484 gravity Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000010079 rubber tapping Methods 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- 238000010897 surface acoustic wave method Methods 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 229910012506 LiSi Inorganic materials 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
- H04M1/72436—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. short messaging services [SMS] or e-mails
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a communication message processing method and a mobile terminal, and belongs to the technical field of communication. The first terminal may detect whether the received communication message includes a key pre-assigned by the first terminal and whether the second terminal has a communication right corresponding to the type of the communication message, and finally display the communication message if it is detected that the communication message includes the key pre-assigned by the first terminal and the second terminal has the communication right corresponding to the type of the communication message. Compared with the prior art, the method has the advantages that the communication message is displayed only by determining that the number of the second terminal sending the communication message is in the preset list, the first terminal can determine whether the communication message comprises the pre-distributed secret key, the problem that the terminal frequently receives the harassment message due to the fact that illegal molecules bypass the preset list in the modes of disguised numbers and the like is avoided, and the safety of the mobile terminal is improved.
Description
Technical Field
The invention belongs to the technical field of communication, and particularly relates to a communication message processing method and a mobile terminal.
Background
With the continuous development of the technical field of mobile terminals, the application of the mobile terminals is more and more extensive. Users often use mobile terminals to communicate, for example, use mobile phones to make calls, send short messages, and the like. However, the information leakage situation is more and more serious, for example, when the number of the mobile terminal is leaked, the mobile terminal will often receive the communication message sent by the illegal party, that is, receive the call or short message sent by the illegal party, which seriously affects the security of the mobile terminal.
In the prior art, a white list is pre-established by a mobile terminal, when a communication message sent by other terminals is received, whether the number of the terminal sending the message is in the white list or not is determined, and if the number of the terminal sending the message is in the white list, the communication message is responded; if not, the communication message is discarded, and the receiving of the telephone call or the short message sent by the illegal user is avoided.
However, the illegal party can dial a call or send a short message to the mobile terminal by disguising the number as a number in the white list or by stealing the terminal corresponding to the number in the white list, so that the mobile terminal still receives a harassing call and a short message, and the security is poor.
Disclosure of Invention
The invention provides a communication message processing method and a mobile terminal, which are used for solving the problem that crank calls and short messages are frequently received due to number leakage in the prior art.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a method for processing a communication message, where the method is applied to a first terminal, and the method includes:
receiving a communication message sent by a second terminal;
detecting whether the communication message contains a secret key pre-distributed by the first terminal and whether the second terminal has a communication authority corresponding to the type of the communication message;
and if the communication message is detected to contain a key pre-distributed by the first terminal and the second terminal has the communication authority corresponding to the type of the communication message, displaying the communication message.
In a second aspect, an embodiment of the present invention provides a communication message processing method, which is applied to a second terminal, and the method includes:
encrypting a communication message to be sent by using a secret key pre-distributed by a first terminal;
sending the encrypted communication message to the first terminal;
wherein the communication message carries the pre-assigned key.
In a third aspect, an embodiment of the present invention provides a first terminal, including:
the first receiving module is used for receiving a communication message sent by the second terminal;
a first detection module, configured to detect whether the communication message includes a key pre-allocated by the first terminal and whether the second terminal has a communication right corresponding to the type of the communication message;
and the display module is used for displaying the communication message if the communication message is detected to contain a secret key pre-distributed by the first terminal and the second terminal has the communication authority corresponding to the type of the communication message.
In a fourth aspect, an embodiment of the present invention provides a second terminal, including:
the encryption module is used for encrypting the communication message to be sent through a secret key pre-distributed by the first terminal;
the second sending module is used for sending the encrypted communication message to the first terminal;
wherein the communication message includes the pre-assigned key.
In a fifth aspect, an embodiment of the present invention provides a mobile terminal, including a processor, a memory, and a computer program stored on the memory and executable on the processor, where the computer program, when executed by the processor, implements the steps of the communication message processing method according to the present invention.
In a sixth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the communication message processing method according to the present invention.
In the embodiment of the present invention, the first terminal may receive the communication message sent by the second terminal, then detect whether the communication message includes the key pre-assigned by the first terminal and whether the second terminal has the communication right corresponding to the type of the communication message, and finally display the communication message if it is detected that the communication message includes the key pre-assigned by the first terminal and that the second terminal has the communication right corresponding to the type of the communication message. Compared with the prior art, the method for displaying the communication message only by determining that the number of the second terminal sending the communication message is in the preset list, in the embodiment of the invention, the first terminal can determine whether the communication message comprises the pre-distributed secret key, so that the problem that the terminal frequently receives the harassment message due to the fact that illegal molecules bypass the preset list in the modes of disguising numbers and the like is avoided, and the safety of the mobile terminal is improved.
Drawings
Fig. 1 is a flowchart of a communication message processing method according to an embodiment of the present invention;
fig. 2-1 is a second flowchart of a communication message processing method according to an embodiment of the present invention;
FIG. 2-2 is a diagram of a user interface provided by an embodiment of the invention;
FIGS. 2-3 are diagrams of alternative user interfaces provided by embodiments of the present invention;
FIGS. 2-4 are diagrams of still another user interface provided by embodiments of the present invention;
FIGS. 2-5 are diagrams of still another user interface provided by embodiments of the present invention;
fig. 3 is a third flowchart of a communication message processing method according to an embodiment of the present invention;
fig. 4 is a fourth flowchart of a communication message processing method according to an embodiment of the present invention;
fig. 5 is one of block diagrams of a first terminal according to an embodiment of the present invention;
fig. 6 is a second block diagram of the first terminal according to the embodiment of the present invention;
fig. 7 is one of block diagrams of a second terminal provided by the embodiment of the present invention;
fig. 8 is a second block diagram of the second terminal according to the embodiment of the present invention;
fig. 9 is a schematic diagram of a hardware structure of the first terminal according to the embodiment of the present invention;
fig. 10 is a schematic diagram of a hardware structure of the second terminal according to the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart of a communication message processing method according to an embodiment of the present invention, and as shown in fig. 1, the method may be applied to a first terminal, and the method may include:
In the embodiment of the present invention, the second terminal may send a communication message to the first terminal when communication with the first terminal is required, where the communication message may have different types, and specifically, the communication message may be a telephone message or a short message. Correspondingly, when the second terminal needs to make a call to the first terminal, a telephone message can be sent to the first terminal, and when the second terminal needs to send a short message to the first terminal, a short message can be sent to the first terminal.
For example, assuming that the user "zhangsan" wants to make a call to the first terminal used by the user "lie si" through the second terminal, the user "zhangsan" can send a telephone message to the first terminal through the second terminal, the first terminal can receive the telephone message, and if the first terminal responds to the telephone message, for example, the first terminal displays the telephone message, the user "lie si" can perceive the call made by "zhangsan".
In this embodiment of the present invention, the first terminal may assign a key to at least one contact in advance, and send the assigned key to the second terminals corresponding to the contacts. Thus, after receiving the communication message sent by the second terminal, the first terminal may determine the key associated with the second terminal number, and if the lookup fails, it indicates that the first terminal does not assign the key to the second terminal, and at this time, the first terminal may consider the communication message as a harassment message and delete the harassment message from the memory; further, if the search is successful, the secret key included in the communication message may be compared with the secret key associated with the number of the second terminal, and if the two secret keys are not consistent, the communication message may be considered as a harassment message, and at this time, the communication message may not be responded, and deleted from the memory, thereby preventing the user from being disturbed by a harassment call, and improving the security of the mobile terminal.
Further, the first terminal may also set communication rights for the contacts to which the key is assigned in advance, where the communication rights may include: any one of a call authority, a short message authority and a double communication authority. The call permission is used for indicating the first terminal to respond to the telephone message sent by the second terminal corresponding to the contact person, the short message permission is used for indicating the first terminal to respond to the short message sent by the second terminal corresponding to the contact person, and the dual communication permission comprises the short message permission and the call permission and is used for indicating the first terminal to respond to the telephone message or the short message sent by the second terminal corresponding to the contact person.
If the type of the communication message is a telephone message and the communication authority of the second terminal is a communication authority or a dual-communication authority, the first terminal can determine that the second terminal has the communication authority corresponding to the type of the communication message; if the type of the communication message is a short message and the communication authority of the second terminal is a short message authority or a dual communication authority, the first terminal can determine that the second terminal has the communication authority corresponding to the type of the communication message.
In the embodiment of the invention, the terminals corresponding to different contacts can correspond to different communication authorities, and compared with the prior art that the terminals corresponding to all the contacts in the preset list have the same communication authority, in the embodiment of the invention, a user can set different communication authorities for different contacts through the first terminal, so that the autonomous selectivity of the user is improved.
If the communication message sent by the second terminal is a telephone message, and the communication right of the second terminal is a talking right, that is, the second terminal has a communication right corresponding to the type of the communication message, at this time, the first terminal can display the telephone message, and further, the first terminal and the second terminal are communicated. For example, assuming that the first terminal previously sets the short message authority for the contact "zhang san", when the first terminal receives a phone message sent by the second terminal corresponding to the contact "zhang san", the phone message may be displayed. Further, when the first terminal receives the short message sent by the second terminal corresponding to the contact person "zhang san", because the second terminal corresponding to the contact person "zhang san" has no corresponding authority, at this time, the first terminal may discard the short message.
In summary, in the communication message processing method provided in the embodiments of the present invention, the first terminal may receive the communication message sent by the second terminal, then detect whether the communication message includes the key pre-assigned by the first terminal and whether the second terminal has the communication right corresponding to the type of the communication message, and finally display the communication message if it is detected that the communication message includes the key pre-assigned by the first terminal and the second terminal has the communication right corresponding to the type of the communication message. Compared with the prior art, the method for displaying the communication message only by determining that the number of the second terminal sending the communication message is in the preset list, in the embodiment of the invention, the first terminal can determine whether the communication message comprises the pre-distributed secret key, so that the problem that the terminal frequently receives the harassment message due to the fact that illegal molecules bypass the preset list in the modes of disguising numbers and the like is avoided, and the safety of the mobile terminal is improved.
Fig. 2-1 is a second flowchart of a communication message processing method according to an embodiment of the present invention, and as shown in fig. 2-1, the method may include:
In this step, the permission setting instruction may be that the user sends the permission setting function to the first terminal by triggering the permission setting function of the first terminal, for example, the permission setting function may be triggered by a button, for example, the first terminal may display a permission setting button on the notification bar, when the user wants to set a communication permission for a certain contact, the permission setting instruction may be sent to the first terminal by triggering the permission setting button, the first terminal may receive the permission setting instruction and display all pre-stored contacts, and the user may click the contacts to select. On the other hand, the first terminal may also set an authority setting button on the address book interface, when the user wants to set a communication authority for a certain contact, the authority setting button may be triggered to send an authority setting instruction to the first terminal, the first terminal may display a selection button for each contact in the address book according to the received authority setting instruction, and the user may select by clicking the selection buttons. Fig. 2-2 is a user interface diagram provided by an embodiment of the present invention, as shown in fig. 2-2, the user interface diagram includes: the first terminal may display a selection button for each contact after the user clicks the authority setting button 01, and the authority setting button 01 and four contacts 02 pre-stored in the address book.
Specifically, the step of determining at least one target contact and the communication authority corresponding to each target contact according to the authority setting instruction can be realized by the following substeps (1) to (3):
substep (1): and detecting the selection operation of the user on at least one pre-stored contact.
Fig. 2-3 are another user interface diagram provided by the embodiment of the present invention, as shown in fig. 2-3, the user interface diagram includes: a selection button 03 corresponding to each contact person and a determination button 04 positioned at the upper right corner of the interface. The user may select a contact by clicking the selection button 03 behind each contact, which may be the circular button shown in fig. 2-3, for example, if the user wants to select "zhang three", then the user may click the selection button 03 behind "zhang three" of the contact, and finally, the user may complete the selection operation by clicking the determination button 04. In fig. 2-3, for example, the user selects the contact "zhang san", and as can be seen from fig. 2-3, the selection button behind the contact "zhang san" is a black solid circular button.
Substep (2): and determining the contact selected by the user as the target contact.
In this step, the first terminal may determine the contact selected by the user as the target contact. For example, assuming that the user selects the contact "three open", the first terminal may determine the contact "three open" as the target contact.
In another optional embodiment of the present invention, when receiving the permission setting instruction, the first terminal may further display a contact input window to prompt the user to input contact information, and then determine the contact input by the user as the target contact, and if the user inputs a new number, the first terminal may newly establish a contact according to the new number input by the user or directly determine the new number as a newly established contact, and determine the newly established contact as the target contact.
Substep (3): obtaining the communication authority corresponding to each target contact person input by a user
In this step, the communication right may include: any one of a call authority, a short message authority and a double communication authority. The first terminal can detect the communication authority setting operation of the user aiming at each target contact person, and set the communication authority for each target contact person according to the communication authority setting operation. Fig. 2 to 4 are further user interface diagrams provided by an embodiment of the present invention, as shown in fig. 2 to 4, the user interface is a user interface displayed after the first terminal determines at least one target contact, in the user interface, the communication authority setting operation may be a user selection operation on a communication authority setting option corresponding to the target contact, and the communication authority setting option may include "allow making a call" and "allow sending a short message". For example, the user may select only the option "allow to make a call" behind the target contact, and the first terminal may set "call permission" for the target contact according to the selection operation; the user can only select the option of 'allowing to send short messages' behind the target contact person, and the first terminal can set 'short message permission' for the target contact person according to the selection operation; the user can simultaneously select the options of 'allowing to make a call' and 'allowing to send a short message' behind the target contact person, and the first terminal can set 'double communication permission' for the target contact person according to the selection operation. Specifically, the user can select by clicking the selection button 03 behind each communication right option, and finally, the selection can be completed by clicking the determination button 04. For example, assuming that the user selects the "allow call" option behind the target contact "three open", the first terminal may set "call authority" for the target contact "three open".
Fig. 2 to 5 are still another user interface diagrams provided by the embodiment of the present invention, as shown in fig. 2 to 5, in the user interface diagrams, the communication right setting options may include: the mobile phone comprises an option A, an option B and an option C, wherein the option A represents that the calling is allowed, the option B represents that the short message is allowed to be sent, and the option C represents that the calling and the short message are allowed to be sent. For example, the user may select option a behind the target contact, and the first terminal may set "call permission" for the target contact according to the selection operation; the user can select an option B behind the target contact person, and the first terminal can set a short message authority for the target contact person according to the selection operation; the user may select "option C" behind the target contact, and the first terminal may set "dual communication permission" for the target contact according to the selection operation. Specifically, the user can select by clicking the selection button 03 behind each communication authority option, and finally, the user can complete the selection operation by clicking the determination button 04.
For example, assuming that the user selects option C behind the target contact "wang five", the first terminal may set "dual communication authority" for the target contact "wang five".
In the embodiment of the invention, the first terminal can set different communication authorities for different contacts according to the setting operation of the user, so that the autonomous selectivity of the user is improved, and the user experience is further improved.
In this step, the first terminal may store the communication right of the target contact and the number of the target contact in a memory in a one-to-one correspondence manner, so as to establish an association relationship between the communication right of each target contact and the number and the communication right of the target contact.
For example, assume that the number corresponding to the target contact "zhang san" is: 123XXXX8910, the communication authority of the target contact person "zhang san" is "conversation authority", and the number corresponding to the target contact person "lie si" is: 177XXXX6789, the communication authority of the target contact person 'LiSi four' is 'short message authority', and the number corresponding to the target contact person 'WangWu' is: 188XXXX1234, the communication authority of the target contact "wangwu" is "dual communication authority", then the correspondence between the number and the communication authority as shown in table 1 below can be generated:
number (I) | Communication rights |
123XXXX8910 | Talking right |
177XXXX6789 | Short message authority |
188XXXX1234 | Dual communication privileges |
In the embodiment of the invention, the first terminal establishes the association relationship between the number and the communication authority, and when the communication message is received, the communication authority owned by the second terminal sending the communication message can be quickly and accurately determined according to the association relationship between the number and the communication authority.
In this step, the key setting instruction may be sent by the user by triggering the key setting function of the first terminal, for example, the key setting function may be triggered by the user by clicking the determination button 04 in fig. 2 to 5, that is, when the user completes the communication right setting operation by clicking the determination button in fig. 2 to 5, the click operation may simultaneously trigger the key setting function of the first terminal, and then send the key setting instruction to the first terminal. In another optional embodiment of the present invention, the first terminal may be specially configured with a key setting button, and after the user completes the communication right setting operation by clicking the determination button, the user may send a key setting instruction to the first terminal by clicking the key setting button, which is not limited in this embodiment of the present invention.
Specifically, the step may include:
substep (4): and displaying first prompt information, wherein the first prompt information is used for prompting a user to input identity information.
In the embodiment of the invention, in order to prevent an illegal user from distributing the secret key for the contact by using the first terminal, the first terminal can display the first prompt message according to the secret key setting instruction, and then prompt the user to input the identity information, so that the identity of the user can be verified through the identity information subsequently.
Substep (5): and acquiring identity information input by a user.
In this step, the identity information may include: fingerprint, iris or face image.
After acquiring the identity information input by the user, the first terminal may compare the identity information with preset verification information, that is, unlocking verification information preset in the mobile terminal by the user, and if the identity information is not matched with the preset verification information, the user who sets the secret key at this time may be considered as an illegal user, and the user may directly return to the main interface of the first terminal at this time to suspend the current operation. In practical applications, the first terminal may also suspend the current operation in other manners, such as power off, and the like, which is not limited in this embodiment of the present invention.
Substep (6): and if the identity information is matched with preset verification information, distributing a secret key for the target contact person.
If the identity information matches the preset authentication information, that is, the user passes the authentication, the first terminal may continue to assign the key to the target contact, specifically, the key may be assigned in a manner provided in the following sub-steps (7) to (9) or in a manner provided in the following sub-steps (10) to (12):
substep (7): and displaying second prompt information, wherein the second prompt information is used for prompting the user to input the secret key.
In this step, the first terminal may display the second prompt message after determining that the identity information input by the user is the same as the preset verification information, so as to prompt the user to input the key.
Substep (8): and acquiring a secret key input by a user.
In this step, the key may be composed of numbers, letters, "+", or "#", and the specific number of digits of the key may be set by the user according to actual needs, which is not limited in this embodiment of the present invention
Substep (9): and determining the key input by the user as the key corresponding to the target contact.
For example, assuming that the user inputs "123" in the key input window in the above sub-step 7), the first terminal may determine "123" as the key corresponding to "zhang san" of the target contact.
Substep (10): at least one alternative key is displayed.
In this step, the first terminal may display at least one alternative key, which may be a key pre-assigned by the user. Specifically, the first terminal may provide a key option in the setting menu, and the user may preset a plurality of keys as the candidate keys through the key option, and after determining that the identity information input by the user matches the preset verification information, the first terminal may display the plurality of candidate keys.
Substep (11): detecting a user selection operation of the at least one alternative key.
For example, it is assumed that the alternative keys displayed by the first terminal include: the method comprises the steps that an alternative secret key 1, an alternative secret key 2, an alternative secret key 3 and an alternative secret key 4 are set by a user, when the user sets a secret key for target contact Zusan, the user can select one alternative secret key from the four alternative secret keys as a secret key corresponding to the target contact Zusan, and the first terminal can detect the selection operation of the user for the at least one alternative secret key.
Substep (12): and determining the alternative key selected by the user as the key corresponding to the target contact.
For example, assuming that the user selects the alternative key 2, the first terminal may determine the alternative key 2 as the key corresponding to "zhang san" of the target contact according to the selection operation.
In this step, the first terminal may store the key allocated to the target contact and the number of the target contact in the memory in a one-to-one correspondence manner, so as to establish an association relationship between the number of each target contact and the key.
For example, assume that the number corresponding to the target contact "zhang san" is: 123XXXX8910, the key allocated for "zhangsan" is "123", and the number corresponding to the target contact "lie four" is: 177XXXX6789, the key assigned to "lie four" is "234", and the number corresponding to the target contact "wangwu" is: 188XXXX1234, the key assigned to "wangwu" is "678", then the associations between numbers and keys as shown in table 2 below may be established:
number (I) | Secret key |
123XXXX8910 | 123 |
177XXXX6789 | 234 |
188XXXX1234 | 678 |
TABLE 2
In the embodiment of the present invention, the first terminal generates the association relationship between the number and the key, and when receiving the communication message, the first terminal can quickly and accurately determine the key corresponding to the second terminal that sends the communication message according to the association relationship between the number and the key, and further determine whether the communication message includes the pre-assigned key.
And step 207, sending the distributed secret keys to the second terminals corresponding to the target contacts respectively.
Specifically, before sending the distributed key to the second terminal corresponding to the target contact, the first terminal may further perform display format processing on the key through the following sub-steps:
substep (13): and displaying at least one key display mode.
In this step, the key display mode may include plaintext display and ciphertext display. The plaintext display means that the key is not encrypted and displayed in an initial form, and if the key allocated to the target contact is "123", the plaintext display manner correspondingly displays the key as "123". The ciphertext display refers to encrypting the key by using a preset encryption algorithm, and converting the encrypted key into other forms, and assuming that the key distributed to the target contact is '123', the ciphertext display mode is that the key correspondence can be displayed as 'x'. After the user sets the key for the target contact, the first terminal may display the two key display modes, and the user may select one display mode according to actual requirements in the two modes.
Substep (14): and detecting the selection operation of the user on the at least one key display mode.
In this step, the first terminal may determine the key display mode selected by the user by detecting a selection operation of the user for the key display mode. By way of example, the selection operation may be a click operation.
Substep (15): and performing display format processing on the distributed secret key according to a secret key display mode selected by a user.
In this step, it is assumed that the user clicks the ciphertext display, the first terminal determines, according to the click operation, that the key display mode selected by the user is the ciphertext display, and then the first terminal may encrypt the key according to a preset encryption algorithm to obtain the encrypted key. And if the key display mode selected by the user is plaintext display, the first terminal does not process the key.
In the embodiment of the present invention, after the first terminal performs the display format processing on the key, the first terminal may send a message including the processed key to the number of the target contact, so as to implement sending to the second terminal corresponding to the target contact. If the key display mode selected by the user is ciphertext display, the first terminal may send the encrypted key to the second terminal corresponding to the target contact. If the key display mode selected by the user is plaintext display, the first terminal can directly send the distributed key to the second terminal corresponding to the target contact.
In the embodiment of the invention, the user can select the display mode of the secret key through the first terminal, so that the autonomous selectivity of the user is improved, and meanwhile, the encrypted secret key is sent to the second terminal corresponding to the target contact person, so that the problem that an illegal user steals the secret key from the second terminal corresponding to the target contact person can be avoided.
And step 208, receiving the communication message sent by the second terminal.
Specifically, the implementation process of this step may refer to the implementation process of step 101, which is not described herein again in this embodiment of the present invention.
Specifically, the step of the first terminal detecting whether the communication message contains the key pre-assigned by the first terminal may be implemented by the following sub-steps:
substep (16): and determining a first secret key associated with the number of the second terminal according to the association relationship between the preset number and the secret key.
In this step, in an actual application scenario, each terminal needs to configure a Subscriber Identity Module (SIM) card to implement a communication function, where the SIM card is also called a Subscriber Identity Module (SIM) card or a smart card. The number of the second terminal may be a card number of a SIM card configured by the second terminal.
The first terminal may search the first key associated with the number of the second terminal from the association relationship between the preset number and the key according to the number of the second terminal.
Substep (17): and comparing the first secret key with a second secret key in the communication message.
For example, assuming that the number of the second terminal sending the communication message is "123 XXXX 8910", the first terminal may determine, through a lookup, that the key associated with the number of the second terminal is "123", and at this time, the first terminal may determine whether the key in the communication message is consistent with the key corresponding to the number of the second terminal. If the second secret key included in the communication message is '109', and the second secret key are not consistent, the communication message may be sent by an illegal user through a disguised number, and the first terminal may delete the communication message from the memory, so that the user is prevented from being disturbed by a harassing call, and the security of the mobile terminal is improved.
Substep (18): and if the first secret key is matched with the second secret key, determining that the communication message comprises a secret key pre-distributed by the first terminal.
For example, assuming that the key associated with the second terminal sending the communication message is "123", and the second key in the communication message is "123", since the two are consistent, the first terminal may determine that the communication message includes the key pre-assigned by the first terminal.
Specifically, the first terminal may determine whether the second terminal has the communication right corresponding to the type of the communication message by the following sub-steps:
substep (19): and determining the target communication authority associated with the number of the second terminal according to the association relationship between the preset number and the communication authority.
In this step, the first terminal may search for the authority corresponding to the number in the preset correspondence between the number and the communication authority according to the number of the second terminal. For example, assuming that the number of the second terminal is "123 XXXX 8910", it may be determined that the communication right corresponding to the number of the second terminal is "call right".
Substep (20): and acquiring the message type associated with the communication message.
In this step, the message type associated with the communication message is a telephone message or a short message.
Substep (21): and detecting whether the second terminal has the communication authority corresponding to the type of the communication message or not according to the target communication authority and the message type.
In the step, if the message type is a telephone message and the target communication authority is a communication authority or a dual-communication authority, determining that the second terminal has a communication authority corresponding to the type of the communication message; or if the message type is the short message and the target communication authority is the short message authority or the dual communication authority, determining that the second terminal has the communication authority corresponding to the type of the communication message.
Specifically, the implementation process of this step may refer to the implementation process of step 103, which is not described herein again in this embodiment of the present invention. It should be noted that, in another alternative embodiment of the present invention, the user may also set a communicable time period for different contacts by using the first terminal, and further may control the different contacts to have communication rights in different time periods. Specifically, for at least one target contact, the first terminal may receive time period information, which is input by a user and is specific to the target contact, and establish an association relationship between a preset number and a communicable time period according to the number corresponding to the target contact and the time period information, so that when the first terminal receives a communication message, the first terminal may search for a communicable time period corresponding to the number of the second terminal in the association relationship between the preset number and the communicable time period, and if the search fails, discard the communication message; if the searching is successful, discarding the communication message according to whether the current time point is in a communicable time period corresponding to the number of the second terminal or not; and if the current time point is in the communicable time period corresponding to the number of the second terminal, displaying the communication message.
In summary, in the method for processing a communication message according to the embodiment of the present invention, the first terminal may receive the communication message sent by the second terminal, detect whether the communication message includes a key pre-assigned by the first terminal and whether the second terminal has a communication right corresponding to the type of the communication message, and finally display the communication message if it is detected that the communication message includes the key pre-assigned by the first terminal and the second terminal has the communication right corresponding to the type of the communication message. Compared with the prior art, the method for displaying the communication message only by determining that the number of the second terminal sending the communication message is in the preset list, in the embodiment of the invention, the first terminal can determine whether the communication message comprises the pre-distributed secret key, so that the problem that the terminal frequently receives the harassment message due to the fact that illegal molecules bypass the preset list in the modes of disguising numbers and the like is avoided, and the safety of the mobile terminal is improved.
Fig. 3 is a third flowchart of a communication message processing method according to an embodiment of the present invention, and as shown in fig. 3, the method may be applied to a second terminal, and the method may include:
In the embodiment of the present invention, before sending the communication message to the first terminal, the second terminal encrypts the communication message to be sent by using the key pre-allocated to the first terminal, specifically, the second terminal may encrypt the communication message so that the pre-allocated key is carried in the communication message.
In the embodiment of the present invention, the communication message may carry a key pre-allocated by the first terminal. Therefore, after the first terminal receives the communication message, the first terminal can perform identity verification through the secret key in the communication message, so that the problem that the terminal receives the harassment message due to the fact that an illegal party bypasses the preset list through a disguised number and the like is avoided, and the safety of the mobile terminal is improved.
In summary, in the communication message processing method provided in the embodiment of the present invention, the second terminal may encrypt the communication message to be sent through the secret key pre-allocated by the first terminal, and then send the encrypted communication message to the first terminal, so that the first terminal may verify according to the secret key of the communication message, thereby avoiding the problem that the terminal frequently receives the harassment message due to the fact that an illegal party bypasses the preset list through a disguised number or the like, and improving the security of the mobile terminal.
Fig. 4 is a fourth flowchart of a communication message processing method according to an embodiment of the present invention, and as shown in fig. 4, the method may include:
In this step, the second terminal may receive the key sent by the first terminal, and the second terminal may determine the key sent by the first terminal as the key pre-allocated by the first terminal.
For example, assuming that the key received by the second terminal is "123", the second terminal may store the key. Specifically, the second terminal may automatically store the key, or may prompt the user to perform manual storage, which is not limited in the embodiment of the present invention.
Specifically, the implementation manner of this step may refer to step 201 described above, and details of the embodiment of the present invention are not described herein.
Specifically, the implementation manner of this step may refer to step 202, which is not described herein again in this embodiment of the present invention.
In summary, in the communication message processing method provided in the embodiment of the present invention, the second terminal may store the received secret key sent by the first terminal, then encrypt the communication message to be sent by using the secret key pre-allocated by the first terminal, and finally send the encrypted communication message to the first terminal, so that the first terminal may verify the communication message according to the secret key of the communication message, thereby avoiding the problem that the terminal frequently receives the harassment message due to the illegal party bypassing the preset list by means of a disguised number or the like, and improving the security of the mobile terminal.
Fig. 5 is one of block diagrams of a first terminal according to an embodiment of the present invention, and as shown in fig. 5, the first terminal 50 may include:
a first receiving module 501, configured to receive a communication message sent by a second terminal.
A first detecting module 502, configured to detect whether the communication message includes a key pre-allocated by the first terminal and whether the second terminal has a communication right corresponding to the type of the communication message.
A first display module 503, configured to display the communication message if it is detected that the communication message includes a key pre-assigned by the first terminal and the second terminal has a communication right corresponding to the type of the communication message.
The mobile terminal provided in the embodiment of the present invention can implement each process implemented by the first terminal in the method embodiment of fig. 1, and is not described herein again to avoid repetition. The first terminal may detect whether the communication message includes a key pre-assigned by the first terminal and whether the second terminal has a communication right corresponding to the type of the communication message, and display the communication message if it is detected that the communication message includes the key pre-assigned by the first terminal and the second terminal has the communication right corresponding to the type of the communication message. Compared with the prior art, the method for displaying the communication message only by determining that the number of the second terminal sending the communication message is in the preset list, the first terminal can determine whether the communication message comprises the pre-distributed secret key or not, further the problem that the terminal frequently receives the harassment message due to the fact that illegal molecules bypass the preset list in the modes of disguising numbers and the like is avoided, and the safety of the mobile terminal is improved.
Fig. 6 is a second block diagram of the first terminal according to the embodiment of the present invention, and as shown in fig. 6, the first terminal 60 may include:
the first receiving module 601 is configured to receive a communication message sent by the second terminal.
A first detecting module 602, configured to detect whether the communication message includes a key pre-allocated by the first terminal and whether the second terminal has a communication right corresponding to the type of the communication message.
A first display module 603, configured to display the communication message if it is detected that the communication message includes a key pre-assigned by the first terminal and the second terminal has a communication right corresponding to the type of the communication message.
Optionally, the first detecting module 602 is configured to:
determining a first secret key associated with the number of the second terminal according to the association relationship between the preset number and the secret key;
comparing the first secret key with a second secret key in the communication message;
and if the first secret key is matched with the second secret key, determining that the communication message comprises a secret key pre-distributed by the first terminal.
Optionally, the first detecting module 602 includes:
the determining submodule is used for determining the target communication authority related to the number of the second terminal according to the association relation between the preset number and the communication authority;
the first obtaining submodule is used for obtaining the message type associated with the communication message;
and the detection submodule is used for detecting whether the second terminal has the communication authority corresponding to the type of the communication message or not according to the target communication authority and the message type.
Optionally, the detection submodule is configured to:
if the message type is a telephone message and the target communication authority is a communication authority or a dual-communication authority, determining that the second terminal has a communication authority corresponding to the type of the communication message;
or if the message type is a short message and the target communication authority is a short message authority or a dual communication authority, determining that the second terminal has the communication authority corresponding to the type of the communication message.
Optionally, the first terminal 60 may further include:
a second receiving module 604, configured to receive an authority setting instruction input by a user;
a determining module 605, configured to determine at least one target contact and a communication right corresponding to each target contact according to the right setting instruction;
a first establishing module 606, configured to establish an association relationship between the number of each target contact and the communication authority;
a third receiving module 607, configured to receive a key setting instruction input by a user;
the distribution module 608 is configured to distribute a key to each target contact according to the key setting instruction;
a second establishing module 609, configured to establish an association relationship between the number of each target contact and the key;
the first sending module 610 is configured to send the allocated keys to the second terminals corresponding to each target contact respectively.
Optionally, the determining module 605 is configured to:
detecting the selection operation of a user on at least one pre-stored contact;
determining the contact person selected by the user as a target contact person;
and acquiring the communication authority corresponding to each target contact person input by the user.
Optionally, the allocating module 608 includes:
the display submodule is used for displaying first prompt information, and the first prompt information is used for prompting a user to input identity information;
the second acquisition submodule is used for acquiring the identity information input by the user;
the distribution submodule is used for distributing a secret key for the target contact person if the identity information is matched with preset verification information;
wherein the identity information comprises: at least one of a fingerprint, iris, or face image.
Optionally, the distribution submodule is configured to:
displaying second prompt information, wherein the second prompt information is used for prompting a user to input a secret key;
acquiring a secret key input by a user;
and determining the key input by the user as the key corresponding to the target contact.
Optionally, the distribution submodule is configured to:
displaying at least one alternative key;
detecting a selection operation of the user on the at least one alternative key;
and determining the standby key selected by the user as the key corresponding to the target contact.
Optionally, the first terminal 60 further includes:
the second display module is used for displaying at least one secret key display mode;
the second detection module is used for detecting the selection operation of the user on the display mode of the at least one secret key;
the processing module is used for carrying out display format processing on the distributed secret key according to a secret key display mode selected by a user;
the key display mode comprises plaintext display and ciphertext display.
The mobile terminal provided in the embodiment of the present invention can implement each process implemented by the first terminal in the method embodiment of fig. 2-1, and is not described herein again to avoid repetition. The first terminal may detect whether the communication message includes a key pre-assigned by the first terminal and whether the second terminal has a communication right corresponding to the type of the communication message, and finally display the communication message if it is detected that the communication message includes the key pre-assigned by the first terminal and the second terminal has the communication right corresponding to the type of the communication message. Compared with the prior art, the method for displaying the communication message only by determining that the number of the second terminal sending the communication message is in the preset list, the first terminal can determine whether the communication message comprises the pre-distributed secret key or not, further the problem that the terminal frequently receives the harassment message due to the fact that illegal molecules bypass the preset list in the modes of disguising numbers and the like is avoided, and the safety of the mobile terminal is improved.
Fig. 7 is one of block diagrams of a second terminal according to an embodiment of the present invention, and as shown in fig. 7, the second terminal 70 may include:
an encryption module 701, configured to encrypt a communication message to be sent by using a secret key pre-allocated by a first terminal;
a second sending module 702, configured to send the encrypted communication message to the first terminal;
wherein the communication message carries the pre-assigned key.
The mobile terminal provided in the embodiment of the present invention can implement each process implemented by the second terminal in the method embodiment of fig. 3, and is not described herein again to avoid repetition. The second terminal encrypts the communication message to be sent through the secret key pre-allocated by the first terminal, and then sends the encrypted communication message to the first terminal, so that the first terminal can verify according to the secret key of the communication message, further the problem that the terminal frequently receives harassment messages due to the fact that illegal molecules bypass a preset list through ways such as disguised numbers is avoided, and the safety of the mobile terminal is improved.
Fig. 8 is a second block diagram of the second terminal according to the embodiment of the present invention, and as shown in fig. 8, the second terminal 80 may include:
an encryption module 801, configured to encrypt a communication message to be sent by using a secret key pre-allocated by a first terminal;
a second sending module 802, configured to send the encrypted communication message to the first terminal;
wherein the communication message carries the pre-assigned key.
Optionally, the second terminal 80 may further include:
a fourth receiving module 803, configured to receive the key sent by the first terminal;
a storage module 804, configured to store the key.
Optionally, the types of the communication messages include a telephone message and a short message.
The mobile terminal provided in the embodiment of the present invention can implement each process implemented by the second terminal in the method embodiment of fig. 4, and is not described herein again to avoid repetition. The second terminal can store the received secret key sent by the first terminal, then encrypts the communication message to be sent through the secret key pre-distributed by the first terminal, and finally sends the encrypted communication message to the first terminal, so that the first terminal can verify according to the secret key of the communication message, and further avoid the problem that the terminal frequently receives harassment messages due to the fact that illegal molecules bypass a preset list in the modes of disguised numbers and the like, and the safety of the mobile terminal is improved.
Figure 9 is a schematic diagram of the hardware structure of the first terminal according to the embodiment of the present invention,
the mobile terminal 900 includes, but is not limited to: a radio frequency unit 901, a network module 902, an audio output unit 903, an input unit 904, a sensor 905, a display unit 906, a user input unit 907, an interface unit 908, a memory 909, a processor 910, and a power supply 911. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 9 is not intended to be limiting of mobile terminals, and that a mobile terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the mobile terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The radio frequency unit 901 is configured to receive a communication message sent by a second terminal;
a processor 910, configured to detect whether the communication message includes a key pre-assigned by the first terminal and whether the second terminal has a communication right corresponding to the type of the communication message;
a processor 510, configured to display the communication message if it is detected that the communication message includes a key pre-assigned by the first terminal and the second terminal has a communication right corresponding to a type of the communication message.
In this embodiment of the present invention, a first terminal may receive a communication message sent by a second terminal, detect whether the communication message includes a key pre-assigned by the first terminal and whether the second terminal has a communication right corresponding to a type of the communication message, and finally display the communication message if it is detected that the communication message includes the key pre-assigned by the first terminal and that the second terminal has the communication right corresponding to the type of the communication message. Compared with the prior art, the method for displaying the communication message only by determining that the number of the second terminal sending the communication message is in the preset list, in the embodiment of the invention, the first terminal can determine whether the communication message comprises the pre-distributed secret key, so that the problem that the terminal frequently receives the harassment message due to the fact that illegal molecules bypass the preset list in the modes of disguising numbers and the like is avoided, and the safety of the mobile terminal is improved.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 901 may be used for receiving and sending signals during a message transmission and reception process or a call process, and specifically, after receiving downlink data from a base station, the downlink data is processed by the processor 910; in addition, the uplink data is transmitted to the base station. Generally, the radio frequency unit 901 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 901 can also communicate with a network and other devices through a wireless communication system.
The mobile terminal provides the user with wireless broadband internet access via the network module 902, such as helping the user send and receive e-mails, browse web pages, and access streaming media.
The audio output unit 903 may convert audio data received by the radio frequency unit 901 or the network module 902 or stored in the memory 909 into an audio signal and output as sound. Also, the audio output unit 903 may also provide audio output related to a specific function performed by the mobile terminal 900 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 903 includes a speaker, a buzzer, a receiver, and the like.
The input unit 904 is used to receive audio or video signals. The input Unit 904 may include a Graphics Processing Unit (GPU) 9041 and a microphone 9042, and the Graphics processor 9041 processes image data of a still picture or video obtained by an image capturing device (such as a camera) in a video capture mode or an image capture mode. The processed image frames may be displayed on the display unit 906. The image frames processed by the graphic processor 9041 may be stored in the memory 909 (or other storage medium) or transmitted via the radio frequency unit 901 or the network module 902. The microphone 9042 can receive sounds and can process such sounds into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 901 in case of the phone call mode.
The mobile terminal 900 also includes at least one sensor 905, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 9061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 9061 and/or backlight when the mobile terminal 900 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of the mobile terminal (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 905 may also include a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, etc., which are not described in detail herein.
The display unit 906 is used to display information input by the user or information provided to the user. The Display unit 906 may include a Display panel 9061, and the Display panel 9061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 907 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 907 includes a touch panel 9071 and other input devices 9072. The touch panel 9071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 9071 (e.g., operations by a user on or near the touch panel 9071 using a finger, a stylus, or any other suitable object or accessory). The touch panel 9071 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 910, receives a command from the processor 910, and executes the command. In addition, the touch panel 9071 may be implemented by using various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The user input unit 907 may include other input devices 9072 in addition to the touch panel 9071. Specifically, the other input devices 9072 may include, but are not limited to, a physical keyboard, function keys (such as a volume control key, a switch key, and the like), a track ball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 9071 may be overlaid on the display panel 9061, and when the touch panel 9071 detects a touch operation on or near the touch panel 9071, the touch panel is transmitted to the processor 910 to determine the type of the touch event, and then the processor 910 provides a corresponding visual output on the display panel 9061 according to the type of the touch event. Although in fig. 9, the touch panel 9071 and the display panel 9061 are two independent components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 9071 and the display panel 9061 may be integrated to implement the input and output functions of the mobile terminal, which is not limited herein.
The interface unit 908 is an interface through which an external device is connected to the mobile terminal 900. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 908 may be used to receive input from external devices (e.g., data information, power, etc.) and transmit the received input to one or more elements within the mobile terminal 900 or may be used to transmit data between the mobile terminal 900 and external devices.
The memory 909 may be used to store software programs as well as various data. The memory 909 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 909 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 910 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by running or executing software programs and/or modules stored in the memory 909 and calling data stored in the memory 909, thereby performing overall monitoring of the mobile terminal. Processor 910 may include one or more processing units; preferably, the processor 910 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It is to be appreciated that the modem processor described above may not be integrated into processor 910.
The mobile terminal 900 may also include a power supply 911 (e.g., a battery) for powering the various components, and preferably, the power supply 911 is logically connected to the processor 910 through a power management system that provides power management functions to manage charging, discharging, and power consumption.
In addition, the mobile terminal 900 includes some functional modules that are not shown, and thus will not be described in detail herein.
Preferably, an embodiment of the present invention further provides a mobile terminal, including a processor 910, a memory 909, and a computer program stored in the memory 909 and capable of running on the processor 910, where the computer program, when executed by the processor 910, implements each process of the communication message processing method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the communication message processing method in the embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
Figure 10 is a schematic diagram of the hardware structure of the second terminal according to the embodiment of the present invention,
the second terminal 1000 can include, but is not limited to: a radio frequency unit 1001, a network module 1002, an audio output unit 1003, an input unit 1004, a sensor 1005, a display unit 1006, a user input unit 1007, an interface unit 1008, a memory 1009, a processor 1010, and a power supply 1011. Those skilled in the art will appreciate that the second terminal structure shown in fig. 10 does not constitute a limitation of the second terminal, and that the second terminal may include more or less components than those shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the second terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 1010 is configured to encrypt a communication message to be sent by using a secret key pre-allocated to the first terminal;
a processor 1010 configured to send the encrypted communication message to the first terminal.
In the embodiment of the invention, the second terminal can encrypt the communication message to be sent through the secret key pre-distributed by the first terminal and then send the encrypted communication message to the first terminal, so that the first terminal can verify according to the secret key carried in the communication message, thereby avoiding the problem that the terminal frequently receives the harassment message due to the fact that illegal molecules bypass the preset list through ways such as disguised numbers and the like, and improving the safety of the mobile terminal.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 1001 may be used for receiving and sending signals during a message transmission or a call, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 1010; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 1001 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. Further, the radio frequency unit 1001 may also communicate with a network and other devices through a wireless communication system.
The second terminal provides the user with wireless broadband internet access through the network module 1002, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 1003 may convert audio data received by the radio frequency unit 1001 or the network module 1002 or stored in the memory 1009 into an audio signal and output as sound. Also, the audio output unit 1003 can also provide audio output related to a specific function performed by the second terminal 1000 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 1003 includes a speaker, a buzzer, a receiver, and the like.
The input unit 1004 is used to receive an audio or video signal. The input Unit 1004 may include a Graphics Processing Unit (GPU) 10041 and a microphone 10042, the Graphics processor 10041 Processing image data of still pictures or video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 10041 may be stored in the memory 1009 (or other storage medium) or transmitted via the radio frequency unit 1001 or the network module 1002. The microphone 10042 can receive sound and can process such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 1001 in case of a phone call mode.
Second terminal 1000 can also include at least one sensor 1005 such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 10061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 10061 and/or backlight when the second terminal 1000 moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the second terminal attitude (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 1005 may also include a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, etc., which will not be described in detail herein.
The display unit 1006 is used to display information input by the user or information provided to the user. The Display unit 106 may include a Display panel 10061, and the Display panel 10061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 1007 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the second terminal. Specifically, the user input unit 1007 includes a touch panel 10071 and other input devices 10072. The touch panel 10071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 10071 (e.g., operations by a user on or near the touch panel 10071 using a finger, a stylus, or any other suitable object or attachment). The touch panel 10071 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 1010, and receives and executes commands sent by the processor 1010. In addition, the touch panel 10071 may be implemented by various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 10071, the user input unit 1007 can include other input devices 10072. Specifically, the other input devices 10072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a track ball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 10071 can be overlaid on the display panel 10061, and when the touch panel 10071 detects a touch operation thereon or nearby, the touch operation is transmitted to the processor 1010 to determine the type of the touch event, and then the processor 1010 provides a corresponding visual output on the display panel 10061 according to the type of the touch event. Although in fig. 10, the touch panel 10071 and the display panel 10061 are two independent components for implementing the input and output functions of the second terminal, in some embodiments, the touch panel 10071 and the display panel 10061 may be integrated to implement the input and output functions of the second terminal, and this is not limited herein.
An interface unit 1008 is an interface for connecting an external device to the second terminal 1000. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. Interface unit 1008 can be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within second terminal 1000 or can be used to transmit data between second terminal 1000 and external devices.
The memory 1009 may be used to store software programs as well as various data. The memory 1009 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, and the like), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 1009 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 1010 is a control center of the second terminal, connects various parts of the entire second terminal using various interfaces and lines, and performs various functions and processes of the second terminal by operating or executing software programs and/or modules stored in the memory 1009 and calling data stored in the memory 1009, thereby integrally monitoring the second terminal. Processor 1010 may include one or more processing units; preferably, the processor 1010 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 1010.
The second terminal 1000 can further include a power source 1011 (e.g., a battery) for supplying power to various components, and preferably, the power source 1011 can be logically connected to the processor 1010 through a power management system, so that functions of managing charging, discharging, and power consumption can be implemented through the power management system.
In addition, the second terminal 1000 includes some functional modules that are not shown, and are not described herein again.
Preferably, an embodiment of the present invention further provides a second terminal, which includes a processor 1010, a memory 1009, and a computer program stored in the memory 1009 and capable of running on the processor 1010, where the computer program is executed by the processor 1010 to implement each process of the above-mentioned call charge early warning method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned embodiment of the telephone charge early warning method, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.
Claims (28)
1. A communication message processing method applied to a first terminal is characterized by comprising the following steps:
receiving a communication message sent by a second terminal;
detecting whether the communication message contains a secret key pre-distributed by the first terminal and whether the second terminal has a communication authority corresponding to the type of the communication message;
if the communication message is detected to contain a key pre-distributed by the first terminal and the second terminal has communication authority corresponding to the type of the communication message, displaying the communication message, and if the communication message is not detected to contain the key pre-distributed by the first terminal or the second terminal does not have the communication authority corresponding to the type of the communication message, not responding to the communication message;
the detecting whether the communication message includes a key pre-assigned by the first terminal and whether the second terminal has a communication right corresponding to the type of the communication message includes:
determining a first secret key associated with the number of the second terminal according to the association relationship between the preset number and the secret key;
comparing the first secret key with a second secret key in the communication message;
if the first secret key is matched with the second secret key, determining that the communication message comprises a secret key pre-distributed by the first terminal;
wherein the communication message comprises a telephone message or a short message.
2. The method according to claim 1, wherein the detecting whether the communication message includes a key pre-assigned by the first terminal and whether the second terminal has a communication right corresponding to the type of the communication message comprises:
determining a target communication authority associated with the number of the second terminal according to an association relation between a preset number and the communication authority;
acquiring a message type associated with the communication message;
and detecting whether the second terminal has the communication authority corresponding to the type of the communication message or not according to the target communication authority and the message type.
3. The method of claim 2, wherein the communication authority comprises at least one of a call authority, a text message authority, and a dual communication authority, wherein the dual communication authority comprises a text message authority and a call authority;
the type of the communication message comprises a telephone message and a short message;
the detecting whether the second terminal has the communication authority corresponding to the type of the communication message according to the target communication authority and the message type includes:
if the message type is a telephone message and the target communication authority is a communication authority or a dual-communication authority, determining that the second terminal has a communication authority corresponding to the type of the communication message;
or if the message type is a short message and the target communication authority is a short message authority or a dual communication authority, determining that the second terminal has the communication authority corresponding to the type of the communication message.
4. The method of claim 1, wherein prior to receiving the communication message sent by the second terminal, the method further comprises:
receiving an authority setting instruction input by a user;
determining at least one target contact and the communication authority corresponding to each target contact according to the authority setting instruction;
establishing an association relation between the number of each target contact and the communication authority;
receiving a secret key setting instruction input by a user;
distributing a secret key for each target contact according to the secret key setting instruction;
establishing an association relation between the number of each target contact and the secret key;
and respectively sending the distributed secret keys to the second terminals corresponding to the target contacts.
5. The method of claim 4, wherein the determining, according to the permission setting instruction, at least one target contact and a communication permission corresponding to each target contact comprises:
detecting the selection operation of a user on at least one pre-stored contact;
determining the contact person selected by the user as a target contact person;
and acquiring the communication authority corresponding to each target contact person input by the user.
6. The method of claim 4, wherein the assigning a key to the target contact according to the key setting instruction comprises:
displaying first prompt information, wherein the first prompt information is used for prompting a user to input identity information;
acquiring identity information input by a user;
if the identity information is matched with preset verification information, distributing a secret key for the target contact person;
wherein the identity information comprises: at least one of a fingerprint, iris, or face image.
7. The method of claim 6, wherein the assigning the target contact with the key comprises:
displaying second prompt information, wherein the second prompt information is used for prompting a user to input a secret key;
acquiring a secret key input by a user;
and determining the key input by the user as the key corresponding to the target contact.
8. The method of claim 6, wherein the assigning the target contact with the key comprises:
displaying at least one alternative key;
detecting a selection operation of the user on the at least one alternative key;
and determining the standby key selected by the user as the key corresponding to the target contact.
9. The method of claim 4, wherein before the sending the assigned key to the second terminal corresponding to the target contact, the method further comprises:
displaying at least one key display mode;
detecting the selection operation of the user on the at least one key display mode;
according to a key display mode selected by a user, performing display format processing on the distributed key;
the key display mode comprises plaintext display and ciphertext display.
10. A communication message processing method applied to a second terminal is characterized by comprising the following steps:
encrypting a communication message to be sent by using a secret key pre-distributed by a first terminal;
sending the encrypted communication message to the first terminal, so that the first terminal displays the communication message when detecting that the communication message contains a secret key pre-distributed by the first terminal and the second terminal has a communication right corresponding to the type of the communication message, and does not respond to the communication message when detecting that the communication message does not contain the secret key pre-distributed by the first terminal or the second terminal does not have the communication right corresponding to the type of the communication message, wherein the communication message comprises a telephone message or a short message;
wherein the communication message carries the pre-assigned key;
the second terminal and the secret key have a corresponding relationship.
11. The method of claim 10, wherein before the step of encrypting the communication message to be transmitted by the key pre-assigned by the first terminal, the method further comprises:
receiving a secret key sent by a first terminal;
storing the key.
12. The method of claim 10, wherein the types of communication messages include telephone messages and short message messages.
13. A first terminal, comprising:
the first receiving module is used for receiving a communication message sent by the second terminal;
a first detection module, configured to detect whether the communication message includes a key pre-allocated by the first terminal and whether the second terminal has a communication right corresponding to the type of the communication message;
a first display module, configured to display the communication message if it is detected that the communication message includes a key pre-assigned by the first terminal and the second terminal has a communication right corresponding to the type of the communication message, and not to respond to the communication message if it is detected that the communication message does not include the key pre-assigned by the first terminal or the second terminal does not have the communication right corresponding to the type of the communication message;
the first detection module is configured to:
determining a first secret key associated with the number of the second terminal according to the association relationship between the preset number and the secret key;
comparing the first secret key with a second secret key in the communication message;
if the first secret key is matched with the second secret key, determining that the communication message comprises a secret key pre-distributed by the first terminal;
wherein the communication message comprises a telephone message or a short message.
14. The first terminal of claim 13, wherein the first detection module comprises:
the determining submodule is used for determining the target communication authority related to the number of the second terminal according to the association relation between the preset number and the communication authority;
the first obtaining submodule is used for obtaining the message type associated with the communication message;
and the detection submodule is used for detecting whether the second terminal has the communication authority corresponding to the type of the communication message or not according to the target communication authority and the message type.
15. The first terminal of claim 14, wherein the detection submodule is configured to:
if the message type is a telephone message and the target communication authority is a communication authority or a dual-communication authority, determining that the second terminal has a communication authority corresponding to the type of the communication message;
or if the message type is a short message and the target communication authority is a short message authority or a dual communication authority, determining that the second terminal has the communication authority corresponding to the type of the communication message.
16. The first terminal of claim 13, further comprising:
the second receiving module is used for receiving the authority setting instruction input by the user;
the determining module is used for determining at least one target contact and the communication authority corresponding to each target contact according to the authority setting instruction;
the first establishing module is used for establishing the association relationship between the number of each target contact person and the communication authority;
the third receiving module is used for receiving a secret key setting instruction input by a user;
the distribution module is used for distributing the secret key for each target contact according to the secret key setting instruction;
the second establishing module is used for establishing the association relationship between the number of each target contact person and the secret key;
and the first sending module is used for sending the distributed secret keys to the second terminals corresponding to the target contacts respectively.
17. The first terminal of claim 16, wherein the determining module is configured to:
detecting the selection operation of a user on at least one pre-stored contact;
determining the contact person selected by the user as a target contact person;
and acquiring the communication authority corresponding to each target contact person input by the user.
18. The first terminal of claim 16, wherein the assignment module comprises:
the display submodule is used for displaying first prompt information, and the first prompt information is used for prompting a user to input identity information;
the second acquisition submodule is used for acquiring the identity information input by the user;
the distribution submodule is used for distributing a secret key for the target contact person if the identity information is matched with preset verification information;
wherein the identity information comprises: at least one of a fingerprint, iris, or face image.
19. The first terminal of claim 18, wherein the assignment sub-module is configured to:
displaying second prompt information, wherein the second prompt information is used for prompting a user to input a secret key;
acquiring a secret key input by a user;
and determining the key input by the user as the key corresponding to the target contact.
20. The first terminal of claim 18, wherein the assignment sub-module is configured to:
displaying at least one alternative key;
detecting a selection operation of the user on the at least one alternative key;
and determining the standby key selected by the user as the key corresponding to the target contact.
21. The first terminal of claim 16, further comprising:
the second display module is used for displaying at least one secret key display mode;
the second detection module is used for detecting the selection operation of the user on the display mode of the at least one secret key;
the processing module is used for carrying out display format processing on the distributed secret key according to a secret key display mode selected by a user;
the key display mode comprises plaintext display and ciphertext display.
22. A second terminal, comprising:
the encryption module is used for encrypting the communication message to be sent through a secret key pre-distributed by the first terminal;
a second sending module, configured to send the encrypted communication message to the first terminal, so that when detecting that the communication message includes a key pre-assigned by the first terminal and the second terminal has a communication right corresponding to a type of the communication message, the first terminal displays the communication message, and when detecting that the communication message does not include the key pre-assigned by the first terminal or the second terminal does not have the communication right corresponding to the type of the communication message, the second sending module does not respond to the communication message, where the communication message includes a telephone message or a short message;
wherein the communication message carries the pre-assigned key;
the second terminal and the secret key have a corresponding relationship.
23. The second terminal of claim 22, further comprising:
the fourth receiving module is used for receiving the secret key sent by the first terminal;
and the storage module is used for storing the secret key.
24. The second terminal of claim 22, wherein the types of communication messages include telephone messages and short message messages.
25. A mobile terminal, characterized in that it comprises a processor, a memory and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, implements the steps of the communication message processing method according to any one of claims 1 to 9.
26. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the communication message processing method according to one of claims 1 to 9.
27. A mobile terminal, characterized in that it comprises a processor, a memory and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, implements the steps of the communication message processing method according to any one of claims 10 to 12.
28. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the communication message processing method according to one of claims 10 to 12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711084929.7A CN108012023B (en) | 2017-11-07 | 2017-11-07 | Communication message processing method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711084929.7A CN108012023B (en) | 2017-11-07 | 2017-11-07 | Communication message processing method and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108012023A CN108012023A (en) | 2018-05-08 |
CN108012023B true CN108012023B (en) | 2021-08-27 |
Family
ID=62051321
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711084929.7A Active CN108012023B (en) | 2017-11-07 | 2017-11-07 | Communication message processing method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108012023B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113297615A (en) * | 2021-05-20 | 2021-08-24 | 青岛海信移动通信技术股份有限公司 | Mobile terminal and data encryption method thereof |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101662765B (en) * | 2008-08-29 | 2013-08-07 | 深圳富泰宏精密工业有限公司 | Encryption system and method of short message of mobile telephone |
CN101800798A (en) * | 2009-02-10 | 2010-08-11 | 阿尔卡特朗讯公司 | Method and device for controlling access to personal mobile phones |
CN107615294A (en) * | 2016-03-04 | 2018-01-19 | 华为技术有限公司 | A kind of identifying code short message display method and mobile terminal |
CN106210233B (en) * | 2016-07-25 | 2019-04-26 | 上海创功通讯技术有限公司 | A kind of terminal called book management method and device |
-
2017
- 2017-11-07 CN CN201711084929.7A patent/CN108012023B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN108012023A (en) | 2018-05-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106534072B (en) | user information authorization method, device, equipment and system | |
CN106453052B (en) | Message interaction method and device | |
CN108288154B (en) | Starting method and device of payment application program and mobile terminal | |
CN110188524B (en) | Information encryption method, information decryption method and terminal | |
CN108901020B (en) | Network access method, mobile terminal and server | |
CN108449114B (en) | Bluetooth connection method and mobile terminal | |
CN109062634A (en) | A kind of application starting method and mobile terminal | |
CN109376519B (en) | Fingerprint unlocking method and terminal equipment | |
CN108012270B (en) | Information processing method, equipment and computer readable storage medium | |
CN109446794B (en) | Password input method and mobile terminal thereof | |
CN106303085B (en) | Mobile terminal and method and device for secure call | |
CN108040186B (en) | DTMF signal sending method and mobile terminal | |
CN111125680A (en) | Permission setting method and terminal equipment | |
CN110990850A (en) | Authority management method and electronic equipment | |
CN107835297B (en) | Information updating method, mobile terminal and computer readable storage medium | |
CN110795746B (en) | Information processing method and electronic equipment | |
CN109451143B (en) | Call method and mobile terminal | |
CN109753776B (en) | Information processing method and device and mobile terminal | |
CN108012023B (en) | Communication message processing method and mobile terminal | |
CN110113826B (en) | D2D device-to-device connection method and terminal device | |
CN108880787B (en) | Information key processing method and related equipment | |
CN110717163B (en) | Interaction method and terminal equipment | |
CN107818247B (en) | Mobile terminal unlocking method and mobile terminal | |
CN110032861B (en) | Password setting method and terminal equipment | |
CN108038358B (en) | Authorization method and device for mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |