MANAGEMENT METHOD, MANAGEMENT DEVICE AND TERMINAL FOR CONTACTS IN TERMINAL

Information

  • Patent Application
  • 20170094502
  • Publication Number
    20170094502
  • Date Filed
    December 14, 2016
    8 years ago
  • Date Published
    March 30, 2017
    8 years ago
Abstract
A management method and management device for contacts in a terminal, and the terminal are provided. The terminal includes a first system and a second system, and the management method includes setting a data channel between the first system and the second system; permitting the first system to read contact information in the second system through the data channel when a current running system in the terminal is the first system; and prohibiting the second system from reading contact information in the first system through the data channel when the current running system in the terminal is the second system. The present disclosure ensures high-level security of contact information in a security system, realizes an interaction of contact information between an ordinary system and the security system, and improves user experience.
Description
FIELD

The embodiments of the present disclosure relate to client terminal technology, and specifically to a management method and a management device for contacts in a terminal, and the terminal.


BACKGROUND

For data security reasons, an idea of installing dual systems in a current terminal (e.g., a smart phone) has been provided, namely installing an ordinary system and a security system in the terminal. In the security system, contact information is not read from the subscriber identity module (SIM) card, but in the security system of the terminal. Meanwhile, the security system does not access the SIM card directly and the contact information in the SIM card is not displayed in the security system. In addition, the security system does not enable the user to read and write files in the security system even by connecting to a computer through a Universal Serial Bus (USB) cable.


Although data can be secured effectively in the above manner, it is very troublesome when there is a need to execute a batch processing operation on the contact information. For example, a mobile phone can store 5000 contacts, of which 100 contacts need to be kept secret. Thus, a user needs to re-input contact information repeatedly when classifying and transferring the contacts. In addition, the contact information may include various kinds of data, such as images relating to the contacts, websites, addresses, birthdays, and memorial days. A current security system is energy consuming for the user to implement the batch processing operation on the contact information under an interaction strategy of the current security system, and user experience is affected correspondingly.


Therefore, ensuring high-level security of the contact information in the security system, and rendering convenient all interactions between the ordinary system and the security system in relation to the contact information is problematic.


SUMMARY OF THE INVENTION

To solve the above problem, the present disclosure relates to managing contacts in a terminal, to ensure high-level of security of contact information in a security system, realizes an interaction of the contact information between an ordinary system and the security system, and improve user experience.


Therefore, according to one aspect of the present disclosure, a management method is provided for contacts in a terminal, the terminal includes a first system and a second system. The management method includes: setting a data channel between the first system and the second system for implementing a communication; permitting the first system to read contact information in the second system through the data channel, under the condition that a current running system in the terminal is the first system; and prohibiting the second system from reading contact information in the first system through the data channel, under the condition that the current running system in the terminal is the second system.


In the above embodiment, by setting the data channel between the first system and the second system for implementing the communication, permitting the first system to read contact information in the second system through the data channel under the condition that the current running system in the terminal is the first system, and prohibiting the second system from reading contact information in the first system through the data channel under the condition that the current running system in the terminal is the second system, the contact information in the second system can be read, such as copied and moved, under the first system. The interaction between the first system and the second system in relation to the contact information can thus be realized, and a user can more conveniently transfer the contact information from the second system to the first system, and it is helpful to improve the user experience. Meanwhile, as the second system is prohibited from reading the contact information in the first system through the data channel, data security of the first system can be ensured. For example, the first system can be the security system, and the second system can be the ordinary system.


In the above embodiment, preferably, the management method further includes: determining whether the current running system of the terminal is the first system or the second system, when a command to view all contact information in the terminal is received; displaying the contact information in the first system or displaying the contact information in the first system and the contact information in the second system, under the condition that the current running system in the terminal is the first system; and displaying the contact information in the second system, under the condition that the current running system in the terminal is the second system.


In the above embodiment, the first system is based on a higher authorization, that is, the contact information stored in both of the first system and the second system can be viewed under the first system. However, the contact information stored in the first system cannot be displayed under the second system, thereby avoiding leakage of the contact information stored in the first system.


In the above embodiment, preferably, the management method further includes: displaying the contact information in the second system for selecting by the user when the current running system in the terminal is the first system and a command to move or copy the contact information from the second system to the first system is received, and moving or copying selected contact information to the first system through the data channel; and/or


displaying the contact information in the first system for selecting by the user when the current running system in the terminal is the first system and a command to move or copy the contact information from the first system to the second system is received, and moving or copying selected contact information to the second system through the data channel.


According to the above embodiment, an interaction of contact information between the first system and the second system is realized, at the same time, the security of the contact information in the first system is ensured because the contact information can be moved or copied only under the first system.


In the above embodiment, preferably, before moving or copying the selected contact information to the first system through the data channel, the management method further includes: executing a security check on the selected contact information, and permitting to move or copy the selected contact information to the first system through the data channel when the security check is passed.


In the above embodiment, by executing a security check on the selected contact information and permitting to move or copy the selected contact information to the first system through the data channel when the security check is passed, the moving of any malicious data to the first system, which can lead to data leakage of the first system, can be avoided. Thus, the security of the contact information in the first system can be more effectively ensured.


In the above embodiment, preferably, the contact information in the first system includes contact information stored in a storage space available to the first system, and the contact information in the second system includes contact information stored in a storage space available to the second system and contact information stored in a subscriber identity module (SIM) card of the terminal.


According to a second aspect of the present disclosure, a management device for contacts in a terminal is provided, the terminal includes a first system and a second system, and the management device includes: a setting unit configured to set a data channel between the first system and the second system for implementing a communication; and a processing unit configured to permit the first system to read contact information in the second system through the data channel under the condition that a current running system in the terminal is the first system, and prohibit the second system from reading contact information in the first system through the data channel under the condition that the current running system in the terminal is the second system.


In the above embodiment, by setting the data channel between the first system and the second system for implementing the communication, permitting the first system to read contact information in the second system through the data channel under the condition that the current running system in the terminal is the first system, and prohibiting the second system from reading contact information in the first system through the data channel under the condition that the current running system in the terminal is the second system, the contact information in the second system can be read, such as copied and moved, under the first system. The interaction between the first system and the second system in relation to the contact information can thus be realized, and a user can more conveniently transfer the contact information from the second system to the first system, and it is helpful to improve the user experience. Meanwhile, as the second system is prohibited from reading the contact information in the first system through the data channel, data security of the first system can be ensured. For example, the first system can be the security system, and the second system can be the ordinary system.


In the above embodiment, preferably, the processing unit includes: a determination unit configured to determine whether the current running system of the terminal is the first system or the second system, when a command to view all contact information in the terminal is received; a first display unit configured to display the contact information in the first system or display the contact information in the first system and the contact information in the second system, under the condition that the current running system in the terminal is the first system; and the first display unit further configured to display the contact information in the second system, under the condition that the current running system in the terminal is the second system.


In the above embodiment, the first system is based on a higher authorization, that is, the contact information stored in both of the first system and the second system can be viewed under the first system. However, the contact information stored in the first system cannot be displayed under the second system, thereby avoiding leakage of the contact information stored in the first system.


In the above embodiment, preferably, the processing unit includes: a second display unit configured to display the contact information in the second system for selecting by a user when the current running system in the terminal is the first system and a command to move or copy the contact information from the second system to the first system is received, and a first execution unit configured to move or copy selected contact information to the first system through the data channel; and/or


a third display unit configured to display the contact information in the first system for selecting by the user when the current running system in the terminal is the first system and a command to move or copy the contact information from the first system to the second system is received, and a second execution unit configured to move or copy selected contact information to the second system through the data channel.


According to the above embodiment, an interaction of contact information between the first system and the second system is realized, at the same time, the security of the contact information in the first system is ensured because the contact information can be moved or copied only under the first system.


In the above embodiment, preferably, the processing unit further includes: a checking unit configured to execute a security check on the selected contact information before the first execution unit moves or copies the selected contact information to the first system through the data channel, and permit to move or copy the selected contact information to the first system through the data channel when the security check is passed.


In the above embodiment, by executing a security check on the selected contact information and permitting to move or copy the selected contact information to the first system through the data channel when the security check is passed, the moving of any malicious data to the first system, which can lead to data leakage of the first system, can be avoided. Thus, the security of the contact information in the first system can be more effectively ensured.


According to a third aspect of the present disclosure, a terminal which includes the foregoing embodiments of a management device is provided.


The above embodiments ensure high-level security of the contact information in the security system, realize the interaction of the contact information between the ordinary system and the security system, and improve user experience.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 shows a flowchart of one embodiment of a management method for contacts in a terminal, according to the present disclosure.



FIG. 2 shows a schematic diagram of one embodiment of a management device for the contacts in the terminal, according to the present disclosure.



FIG. 3 shows a schematic diagram of one embodiment of an importing process of contacts under dual systems, according to the present disclosure.





DETAILED DESCRIPTION

For clarity of illustration of objectives, features, and advantages of the present disclosure, where appropriate, the above drawings combined with detailed description illustrate the embodiments of the present disclosure. It may be appreciated that different embodiments and elements in different embodiments of the present disclosure can be combined, when there is no complicit.


The embodiments described herein are for better understanding of the present disclosure, other embodiments can also be practiced. The description is not to be considered as limiting the scope of the embodiments described herein.


In the embodiments of the present disclosure, a terminal including a first system and a second system is provided.



FIG. 1 shows a flowchart of one embodiment of a management method for contacts in a terminal, according to the present disclosure.


As shown in FIG. 1, the management method for the contacts in the terminal according to the present disclosure, includes: step 102, setting a data channel between the first system and the second system for implementing a communication; step 104, permitting the first system to read contact information in the second system through the data channel, under the condition that a current running system in the terminal is the first system; step 106, prohibiting the second system from reading contact information in the first system through the data channel, under the condition that the current running system in the terminal is the second system.


In the above embodiment, by setting the data channel between the first system and the second system for implementing the communication, permitting the first system to read contact information in the second system through the data channel under the condition that the current running system in the terminal is the first system, and prohibiting the second system from reading contact information in the first system through the data channel under the condition that the current running system in the terminal is the second system, the contact information in the second system can be read, such as copied and moved, under the first system. The interaction between the first system and the second system in relation to the contact information can thus be realized, and a user can more conveniently transfer the contact information from the second system to the first system, and it is helpful to improve the user experience. Meanwhile, as the second system is prohibited from reading the contact information in the first system through the data channel, data security of the first system can be ensured. In one embodiment, the first system can be the security system, and the second system can be the ordinary system.


In the above embodiment, preferably, the management method further includes: determining whether the current running system of the terminal is the first system or the second system, when a command to view all contact information in the terminal is received; displaying the contact information in the first system or displaying the contact information in the first system and the contact information in the second system, under the condition that the current running system in the terminal is the first system; and displaying the contact information in the second system, under the condition that the current running system in the terminal is the second system.


In the above embodiment, the first system is based on a higher authorization, that is, the contact information stored in both of the first system and the second system can be viewed under the first system. However, the contact information stored in the first system cannot be displayed under the second system, thereby avoiding leakage of the contact information stored in the first system.


In the above embodiment, preferably, the management method further includes: displaying the contact information in the second system for selecting by the user when the current running system in the terminal is the first system and a command to move or copy the contact information from the second system to the first system is received, and moving or copying selected contact information to the first system through the data channel; and/or


displaying the contact information in the first system for selecting by the user when the current running system in the terminal is the first system and a command to move or copy the contact information from the first system to the second system is received, and moving or copying selected contact information to the second system through the data channel.


According to the above embodiment, an interaction of contact information between the first system and the second system is realized, at the same time, the security of the contact information in the first system is ensured because the contact information can be moved or copied only under the first system.


In the above embodiment, preferably, before moving or copying the selected contact information to the first system through the data channel, the management method further includes: executing a security check on the selected contact information, and permitting to move or copy the selected contact information to the first system through the data channel when the security check is passed.


In the above embodiment, by executing a security check on the selected contact information and permitting to move or copy the selected contact information to the first system through the data channel when the security check is passed, the moving of any malicious data to the first system, which can lead to data leakage of the first system, can be avoided. Thus, the security of the contact information in the first system can be more effectively ensured.


In the above embodiment, preferably, the contact information in the first system includes contact information stored in a storage space available to the first system, and the contact information in the second system includes contact information stored in a storage space available to the second system and contact information stored in a subscriber identity module (SIM) card of the terminal.



FIG. 2 shows a schematic diagram of one embodiment of a management device for the contacts in the terminal according to the present disclosure.


As shown in FIG. 2, a terminal 2 includes a management device for the contacts in the terminal 200 (hereinafter referred to as “the management device 200”). The terminal 2 may be a mobile phone, a tablet computer, a personal digital assistant, a notebook computer, or other computing device. The terminal 2 further includes a storage device 210 and at least one processor 220. According to the present disclosure, The management device 200 includes a setting unit 202 and a processing unit 204. FIG. 2 illustrates only one example of the terminal 2 that may include more or fewer components than illustrated, or have a different configuration of the various components.


The at least one processor 1002 is used to execute a plurality of units (e.g., the setting unit 202 and the processing unit 204) or other units in the management device 200 and other applications, such as an operating system, installed in the terminal 2. The storage device 210 store the computerized instructions of a plurality of units or subunits in the management device 200, and one or more programs, such as the operating system and applications of the terminal 2. The storage device 210 can be any type of non-transitory computer-readable storage medium or other computer storage device, such as a hard disk drive, a compact disc, a digital video disc, a tape drive, a storage card (e.g., a memory stick, a smart media card, a compact flash card), or other suitable storage medium, for example.


The setting unit 202, the processing unit 204, and other units or subunits as described below, include computerized instructions in the form of one or more computer-readable programs that can be stored in the storage device 210 of the terminal 2, and can be implemented by the at least one processor 220.


In one embodiment, the setting unit 202 is configured to set a data channel between the first system and the second system for implementing a communication.


The processing unit 204 is configured to permit the first system to read contact information in the second system through the data channel under the condition that a current running system in the terminal is the first system, and prohibit the second system from reading contact information in the first system through the data channel under the condition that the current running system in the terminal is the second system.


In the above embodiment, by setting the data channel between the first system and the second system for implementing the communication, permitting the first system to read contact information in the second system through the data channel under the condition that the current running system in the terminal is the first system, and prohibiting the second system from reading contact information in the first system through the data channel under the condition that the current running system in the terminal is the second system, the contact information in the second system can be read, such as copied and moved, under the first system. The interaction between the first system and the second system in relation to the contact information can thus be realized, and a user can more conveniently transfer the contact information from the second system to the first system, and it is helpful to improve the user experience. Meanwhile, as the second system is prohibited from reading the contact information in the first system through the data channel, data security of the first system can be ensured. For example, the first system can be the security system, and the second system can be the ordinary system.


In the above embodiment, preferably, the processing unit 204 includes: a determination unit 204A configured to determine whether the current running system of the terminal is the first system or the second system, when a command to view all contact information in the terminal is received; a first display unit 204B configured to display the contact information in the first system or display the contact information in the first system and the contact information in the second system, when the determination module 204A determines that the current running system in the terminal is the first system; and the first display unit 204B further configured to merely display the contact information in the second system, when the determination module 204A determines that the current running system in the terminal is the second system.


In the above embodiment, the first system is based on a higher authorization, that is, the contact information stored in both of the first system and the second system can be viewed under the first system. However, the contact information stored in the first system cannot be displayed under the second system, thereby avoiding leakage of the contact information stored in the first system.


In the above embodiment, preferably, the processing unit 204 further includes: a second display unit 204C configured to display the contact information in the second system for selecting by a user when the current running system in the terminal is the first system and a command to move or copy the contact information from the second system to the first system is received, and a first execution unit 204D configured to move or copy selected contact information to the first system through the data channel; and/or


a third display unit 204E configured to display the contact information in the first system for selecting by the user when the current running system in the terminal is the first system and a command to move or copy the contact information from the first system to the second system is received, and a second execution unit 204F configured to move or copy selected contact information to the second system through the data channel.


According to the above embodiment, an interaction of contact information between the first system and the second system is realized, at the same time, the security of the contact information in the first system is ensured because the contact information can be moved or copied only under the first system.


In the above embodiment, preferably, the processing unit 204 further includes: a checking unit 204G configured to execute a security check on the selected contact information before the first execution unit 204D moves or copies the selected contact information to the first system through the data channel, and permit to move or copy the selected contact information to the first system through the data channel when the security check is passed.


In the above embodiment, by executing a security check on the selected contact information and permitting to move or copy the selected contact information to the first system through the data channel when the security check is passed, the moving of any malicious data to the first system, which can lead to data leakage of the first system, can be avoided. Thus, the security of the contact information in the first system can be more effectively ensured.


In the above embodiment, preferably, the contact information in the first system includes contact information stored in a storage space available to the first system, and the contact information in the second system includes contact information stored in a storage space available to the second system and contact information stored in a SIM card of the terminal.


In another embodiment, a terminal (not shown in FIG. 2) which includes the management device 200 shown in FIG. 2 is provided.


Combined with FIG. 3, an embodiment of a terminal including a security system and an ordinary system, is described to illustrate the present disclosure.


In the embodiment, the present disclosure provides an importing process of contacts under dual systems. The importing method can move, copy, and modify (e.g., edit or delete) contacts between the security system and the ordinary system, under a contact management menu in the security system.


Currently, both the ordinary system and the security system have a contact list, and data structures and processing methods of the contact lists are the same, thus, a batch processing operation can execute on the contacts in the ordinary system and in the security system, and no information is lost when adding or deleting contact information.



FIG. 3 shows a schematic diagram of one embodiment of an importing process of contacts under dual systems, according to the present disclosure. In one embodiment, under the security system, the contact information in both of the security system and the ordinary system can be displayed in the contact management menu of the security system. A contact in the security system has only one storage location, such as in a telephone, which is the storage space of the security system in the terminal. The ordinary system can display the contacts in three catalogs at most, namely in a telephone, in a first SIM card, and in a second SIM card. If the terminal can have more than two SIM cards, all contacts in the more than two SIM cards can be displayed. In one embodiment, information of the contacts in the first SIM card and the second SIM card can be displayed according to a SIM card checking result. No information is displayed if no SIM card is in the terminal.


In one embodiment, under the ordinary system, a contact management menu of the ordinary system does not display the contact information the security system, thereby ensuring that the security system has a higher authority for data accessing.


Although storage locations of the contacts in the security system and the ordinary system are different, however, a contact application or program can transfer contact data through a channel directly between the dual systems, and the contact application or program can add or delete the contact data according to actual storage location(s). Thus, data formatting and security during a transferring procedure can be ensured. This reduces occurrence of virus transmissions or leakage of important information efficiently.


The above embodiments of the present disclosure can solve a problem of a prior art security system, which does not read from or write to any SIM card in the terminal, and cannot support a batch processing operation on contacts transferred by using a Universal Serial Bus (USB) interface. Meanwhile, the batch processing operation on the contacts, depending on the above embodiments, can avoid data loss when a third party application is invoked to execute a synchronizing operation on the contacts. In addition, it is more flexible and efficient to execute a batch processing operation in copying, moving, and deleting contacts than a simple synchronizing operation on the contacts.


According to the above embodiments, the present disclosure provides a new management method on the contacts in the terminal, the new management method can ensure high-level security of the contact information in the security system, realize the interaction of the contact information between the ordinary system and the security system, and improve user experience.


Although certain inventive embodiments of the present disclosure have been specifically described, the present disclosure is not to be construed as being limited thereto. Various changes or modifications may be made to the present disclosure without departing from the scope and spirit of the present disclosure.

Claims
  • 1. A management method for contacts in a terminal, the terminal comprising a first system and a second system, the management method comprising: setting a data channel between the first system and the second system for implementing a communication;permitting the first system to read contact information in the second system through the data channel, under the condition that a current running system in the terminal is the first system; andprohibiting the second system from reading contact information in the first system through the data channel, under the condition that the current running system in the terminal is the second system.
  • 2. The management method of claim 1, further comprising: determining whether the current running system of the terminal is the first system or the second system, when a command to view all contact information in the terminal is received;displaying the contact information in the first system or displaying the contact information in the first system and the contact information in the second system, under the condition that the current running system in the terminal is the first system; anddisplaying the contact information in the second system, under the condition that the current running system in the terminal is the second system.
  • 3. The management method of claim 1, further comprising: displaying the contact information in the second system for selecting by a user when the current running system in the terminal is the first system and a command to move or copy the contact information from the second system to the first system is received, and moving or copying selected contact information to the first system through the data channel; and/ordisplaying the contact information in the first system for selecting by the user when the current running system in the terminal is the first system and a command to move or copy the contact information from the first system to the second system is received, and moving or copying selected contact information to the second system through the data channel.
  • 4. The management method of claim 3, before moving or copying the selected contact information to the first system through the data channel, further comprising: executing a security check on the selected contact information, and permitting to move or copy the selected contact information to the first system through the data channel when the security check is passed.
  • 5. The management method of claim 1, wherein the contact information in the first system comprises contact information stored in a storage space available to the first system, and the contact information in the second system comprises contact information stored in a storage space available to the second system and contact information stored in a subscriber identity module (SIM) card of the terminal.
  • 6. A terminal, comprising: a first system and a second system;at least one processor; anda storage device storing a plurality of instructions, which when executed by the processor, causes the at least one processor to:set a data channel between the first system and the second system for implementing a communication; andpermit the first system to read contact information in the second system through the data channel under the condition that a current running system in the terminal is the first system, and prohibit the second system from reading contact information in the first system through the data channel under the condition that the current running system in the terminal is the second system.
  • 7. The terminal of claim 6, wherein the at least one processor further: determines whether the current running system of the terminal is the first system or the second system, when a command to view all contact information in the terminal is received;displays the contact information in the first system or display the contact information in the first system and the contact information in the second system, under the condition that the current running system in the terminal is the first system; anddisplays the contact information in the second system, under the condition that the current running system in the terminal is the second system.
  • 8. The terminal of claim 6, wherein the at least one processor further: displays the contact information in the second system for selecting by a user when the current running system in the terminal is the first system and a command to move or copy the contact information from the second system to the first system is received, and moves or copies selected contact information to the first system through the data channel; and/ordisplays the contact information in the first system for selecting by the user when the current running system in the terminal is the first system and a command to move or copy the contact information from the first system to the second system is received, and moves or copies selected contact information to the second system through the data channel.
  • 9. The terminal of claim 8, wherein the at least one processor further: executes a security check on the selected contact information before the first execution unit moves or copies the selected contact information to the first system through the data channel, and permits to move or copy the selected contact information to the first system through the data channel when the security check is passed.
  • 10. The terminal of claim 6, wherein the contact information in the first system comprises contact information stored in a storage space available to the first system, and the contact information in the second system comprises contact information stored in a storage space available to the second system and contact information stored in a subscriber identity module (SIM) card of the terminal.
  • 11. A non-transitory storage medium having stored thereon instructions that, when executed by a processor of a terminal, causes the terminal to perform a management method for contacts in the terminal, the terminal comprising a first system and a second system, the management method comprising: setting a data channel between the first system and the second system for implementing a communication;permitting the first system to read contact information in the second system through the data channel, under the condition that a current running system in the terminal is the first system; andprohibiting the second system from reading contact information in the first system through the data channel, under the condition that the current running system in the terminal is the second system.
  • 12. The non-transitory storage medium of claim 11, wherein the management method further comprises: determining whether the current running system of the terminal is the first system or the second system, when a command to view all contact information in the terminal is received;displaying the contact information in the first system or displaying the contact information in the first system and the contact information in the second system, under the condition that the current running system in the terminal is the first system; anddisplaying the contact information in the second system, under the condition that the current running system in the terminal is the second system.
  • 13. The non-transitory storage medium of claim 11, wherein the management method further comprises: displaying the contact information in the second system for selecting by a user when the current running system in the terminal is the first system and a command to move or copy the contact information from the second system to the first system is received, and moving or copying selected contact information to the first system through the data channel; and/ordisplaying the contact information in the first system for selecting by the user when the current running system in the terminal is the first system and a command to move or copy the contact information from the first system to the second system is received, and moving or copying selected contact information to the second system through the data channel.
  • 14. The non-transitory storage medium of claim 13, before moving or copying the selected contact information to the first system through the data channel, wherein the management method further comprises: executing a security check on the selected contact information, and permitting to move or copy the selected contact information to the first system through the data channel when the security check is passed.
  • 15. The non-transitory storage medium of claim 11, wherein the contact information in the first system comprises contact information stored in a storage space available to the first system, and the contact information in the second system comprises contact information stored in a storage space available to the second system and contact information stored in a subscriber identity module (SIM) card of the terminal.
Priority Claims (1)
Number Date Country Kind
201510018533.7 Jan 2015 CN national
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation-in-part of International Application No. PCT/CN2015/072010, filed on Jan. 30, 2015. This application claims priority of Chinese Patent Application No. 201510018533.7, entitled “management method and management device and terminal for contacts in terminal,” filed on Jan. 14, 2015 in the SIPO (State Intellectual Property Office of the People's Republic of China), the entire contents of which are incorporated by reference herein.

Continuation in Parts (1)
Number Date Country
Parent PCT/CN2015/072010 Jan 2015 US
Child 15378052 US