Method and device for information security management and storage medium
First Claim
1. A method for information security management, the method comprising:
- storing contacts in a private information database of a terminal;
obtaining first key information, while a dial panel interface or a short message interface is displayed on the terminal, when a triggering operation of the first key is detected;
receiving information sent by an external device to the terminal, the received information including at least one of mail information, short message information, and call information;
parsing the received information to obtain sender information of a sender of the external device, the received information;
comparing the sender information with contacts stored in the private information database;
when one of the contacts stored in the private information database matches the sender information, determining the received information as private information, which is to be stored into the private information database that is protected by an access password;
storing independently the received information into the private information database separate from a non-private database of the terminal when the received information is determined as the private information;
when none of the contacts stored in the private information database matches the sender information, determining the received information as non-private information;
storing the received information into the non-private database when the received information is determined as the non-private information;
determining whether the obtained first key information matches preset key information, wherein the preset key information includes the access password for the private information database and second key information, the second key information including one or more symbols; and
upon determination that the obtained first key information matches the preset key information, displaying the private information stored in the private information database, which corresponds to the preset key information, via the dial panel interface or the short message interface of the terminal without a popup or a switching of an interface of the terminal, wherein a user of the terminal views the private information via the dial panel interface or the short message interface without the popup or the switching,wherein (i) a number of updated private short messages included in the private information is outputted when the one or more symbols included in the second key information corresponds to a first character, (ii) a number of updated private mails included in the private information is outputted when the one or more symbols included in the second key information corresponds to a second character, and (iii) all the private information received within a time period is outputted when the one or more symbols included in the second key information corresponds to a third character representing the time period.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention discloses a method and a device for information security management, and a storage medium, in the field of information security technologies. The method comprises: detecting an information input operation of a terminal; obtaining key information corresponding to a triggering operation of a first key, when the triggering operation of the first key is detected; determining whether the obtained key information matches preset key information, and if so, outputting information related to private information stored in a private information database, which corresponds to the preset key information, wherein, the preset key information includes an access password for the private information database and second key information. In the invention, a user needs not access a private space to check private information; instead, the user only needs to input the preset key information to query the information related to the private information. Therefore, the security of the private information is improved.
22 Citations
7 Claims
-
1. A method for information security management, the method comprising:
-
storing contacts in a private information database of a terminal; obtaining first key information, while a dial panel interface or a short message interface is displayed on the terminal, when a triggering operation of the first key is detected; receiving information sent by an external device to the terminal, the received information including at least one of mail information, short message information, and call information; parsing the received information to obtain sender information of a sender of the external device, the received information; comparing the sender information with contacts stored in the private information database; when one of the contacts stored in the private information database matches the sender information, determining the received information as private information, which is to be stored into the private information database that is protected by an access password; storing independently the received information into the private information database separate from a non-private database of the terminal when the received information is determined as the private information; when none of the contacts stored in the private information database matches the sender information, determining the received information as non-private information; storing the received information into the non-private database when the received information is determined as the non-private information; determining whether the obtained first key information matches preset key information, wherein the preset key information includes the access password for the private information database and second key information, the second key information including one or more symbols; and upon determination that the obtained first key information matches the preset key information, displaying the private information stored in the private information database, which corresponds to the preset key information, via the dial panel interface or the short message interface of the terminal without a popup or a switching of an interface of the terminal, wherein a user of the terminal views the private information via the dial panel interface or the short message interface without the popup or the switching, wherein (i) a number of updated private short messages included in the private information is outputted when the one or more symbols included in the second key information corresponds to a first character, (ii) a number of updated private mails included in the private information is outputted when the one or more symbols included in the second key information corresponds to a second character, and (iii) all the private information received within a time period is outputted when the one or more symbols included in the second key information corresponds to a third character representing the time period. - View Dependent Claims (2, 3)
-
-
4. A terminal for information security management, the terminal comprising:
-
circuitry configured to; store contacts in a private information database of the terminal; obtain first key information, while a dial panel interface or a short message interface is displayed on the terminal, when a triggering operation of the first key is detected; receive information sent by an external device to the terminal, the received information including at least one of mail information, short message information, and call information; parse the received information to obtain sender information of a sender of the external device, the received information; compare the sender information with contacts stored in the private information database; when one of the contacts stored in the private information database matches the sender information, determine the received information as private information, which is to be stored into the private information database that is protected by an access password; store independently the received information into the private information database separate from a non-private database of the terminal when the received information is determined as the private information; when none of the contacts stored in the private information database matches the sender information, determine the received information as non-private information; store the received information into the non-private database when the received information is determined as the non-private information; determine whether the obtained first key information matches preset key information, wherein the preset key information includes the access password for the private information database and second key information, the second key information including one or more symbols; and upon determination that the obtained first key information matches the preset key information, display the private information stored in the private information database, which corresponds to the preset key information, via the dial panel interface or the short message interface of the terminal without a popup or a switching of an interface of the terminal, wherein a user of the terminal views the private information via the dial panel interface or the short message interface without the popup or the switching, wherein (i) a number of updated private short messages included in the private information is outputted when the one or more symbols included in the second key information corresponds to a first character, (ii) a number of updated private mails included in the private information is outputted when the one or more symbols included in the second key information corresponds to a second character, and (iii) all the private information received within a time period is outputted when the one or more symbols included in the second key information corresponds to a third character representing the time period. - View Dependent Claims (5, 6)
-
-
7. A non-transitory storage medium containing computer-executable instructions, which, when executed by a computer, perform a method for information security management, the method comprising:
-
storing contacts in a private information database of the computer; obtaining first key information, while a dial panel interface or a short message interface is displayed on the terminal, when a triggering operation of the first key is detected; receiving information sent by an external device to the computer, the received information including at least one of mail information, short message information, and call information; parsing the received information to obtain sender information of a sender of the external device, the received information; comparing the received information with contacts stored in the private information database; when one of the contacts stored in the private information database matches the sender information, determining the received information as private information, which is to be stored into the private information database that is protected by an access password; storing independently the received information the private information database separate from a non-private database of the computer when the received information is determined as the private information; when none of the contacts stored in the private information database matches the sender information, determining the received information as non-private information; storing the received information into the non-private database when the received information is determined as the non-private information; determining whether the obtained first key information matches preset key information, wherein the preset key information includes the access password for the private information database and second key information, the second key information including one or more symbols; upon determination that the obtained first key information matches the preset key information, displaying the private information stored in the private information database, which corresponds to the preset key information, via the dial panel interface or the short message interface of the terminal without a popup or a switching of an interface of the terminal, wherein a user of the terminal views the private information via the dial panel interface or the short message interface without the popup or the switching, wherein (i) a number of updated private short messages included in the private information is outputted when the one or more symbols included in the second key information corresponds to a first character, (ii) a number of updated private mails included in the private information is outputted when the one or more symbols included in the second key information corresponds to a second character, and (iii) all the private information received within a time period is outputted when the one or more symbols included in the second key information corresponds to a third character representing the time period.
-
Specification