CN101754209A - Method for protecting contents of mobile phone - Google Patents
Method for protecting contents of mobile phone Download PDFInfo
- Publication number
- CN101754209A CN101754209A CN201010002644A CN201010002644A CN101754209A CN 101754209 A CN101754209 A CN 101754209A CN 201010002644 A CN201010002644 A CN 201010002644A CN 201010002644 A CN201010002644 A CN 201010002644A CN 101754209 A CN101754209 A CN 101754209A
- Authority
- CN
- China
- Prior art keywords
- information
- encrypted
- telephone number
- user
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Abstract
The invention discloses a method for protecting contents of a mobile phone, which can be used for encrypting and hiding all information related to numbers set by a user. The method comprises steps of: input numbers related information needing encrypting and hiding into an encrypted number list; scanning the whole encrypted number list; encrypting information related to all the phone numbers of the encrypted number list and storing the information in a memory; and hiding the encrypted information. Therefore, when a call or a message comes form a set number, the invention can hide such information in a secret state, and the mobile phone gives no response; and such information can be only checked in a specific checking module; thus, the information of the mobile phone is protected.
Description
Technical field
The present invention relates to communication field, especially relate to a kind of method of mobile phone message security.
Background technology
The part mobile phone has encryption function at present; mainly be divided into two kinds of encrypted forms; a kind of be information encryption mainly be exactly by an information or many setting codes are protected; protected information also remains in the middle of the information list; when anyone will open this enciphered message; just needing the input password, generally all is four numerical ciphers.Though this encipherment protection mode can play a role, but the place that the protection of privacy still is weak, at first encrypted information also remains in the middle of the tabulation, even if can't see content like this, but also know and send the people or whom called person is, basic information such as transmitting time or call time; Even if secondly the password encryption protection is arranged, also there is the risk that is decrypted, the secret grade of 4-digit number is also not enough after all, and the probability that is decrypted is also bigger.Another kind then is to lock to appointed information, prevents the mistake deletion, and everyone can browse this information, just can't delete.And present most of information encryption is merely able to encrypt to note and phone directory, and other information such as message registration, picture, multimedia messages then can't be encrypted.
We can continue deep excavating at the thinking of information encryption, and present encrypted form is to add and not close, can not effectivelyly carry out effectively secret to important and key message.Encryption requirements to the many profound levels of user can't satisfy.Need the demand that more effective cipher mode satisfies the user, in the age of nowadays pursuing privacy, dull encryption function can't satisfy the heart demand that people pursue real protection important information already.
Summary of the invention
The purpose of this invention is to provide a kind of method of protecting contents of mobile phone, farthest protect personal information.
The present invention encrypts by all information that the setting telephone number to the user is associated, and protects contents of mobile phone.
Specifically, the method for protection contents of mobile phone of the present invention may further comprise the steps:
User's handle setting telephone number related with needing information encrypted is input in the encrypted number tabulation;
Scan described encrypted number tabulation;
With all are set and are saved in memory such as the SIM cards of mobile phones after the associated information encryption of telephone numbers or in the mobile phone memory in the encrypted number tabulation.
In addition, the present invention can also be by hiding and setting the effect that telephone number associated information further improves the protection cellphone information.
Wherein, the step that encrypted information is hidden comprises, mobile phone to incoming call, whether be setting telephone number in encrypted number tabulation carry out real-time inspection, in case find it is then not respond if coming telephone number in the note.
Method of the present invention is further comprising the steps of:
The user sets in advance Crypted password;
Check the Crypted password of user's input, when the Crypted password of the Crypted password of finding input and setting mated, user's setting telephone number input was accepted in the encrypted number tabulation, otherwise did not then accept user's setting telephone number input.
Wherein, described information comprises and sets all telephone number associated information, such as note, multimedia message, communications records, cards folder etc.
Wherein, by the input cryptographic checksum enciphered message is decrypted processing, the reduction encrypted information that is to say that the user just can browse information encrypted when the input proper password and after decryption processing.
Effect of the present invention is: when the number incoming call of setting, when coming note, its information is that confidential state is hidden, and mobile phone is not done any response, thereby has improved the secret effect of information.
With reference to the accompanying drawings the present invention is described in further detail below.
Description of drawings
Flow chart is hidden in Fig. 1 information encryption of the present invention;
Fig. 2 enciphering hiding information check, edit, delete realization flow figure.
Embodiment
All information that the present invention is associated by the number that the user is set are encrypted and are protected contents of mobile phone.
More particularly, realize method of the present invention by following steps:
User's handle is input in the encrypted number tabulation, so that utilize this setting telephone number that relevant information is encrypted with the setting telephone number that needs the enciphering hiding associating information;
Scan whole described encrypted number tabulation, promptly enciphered message module or handset program are shown in the whole encryption of traversal automatically, and all relevant information in the encrypted number tabulation are all traveled through;
Be saved in the memory after the information encryption that all setting telephone numbers in the tabulation are associated, described memory is SIM cards of mobile phones or mobile phone memory.
For reaching more secret effect, any response sent a telegram here, do not done when coming note to this mobile phone can to setting telephone number, thereby by hiding the information of sending a telegram here and coming note, reach the effect that improves confidential state.For the incoming call of hiding with come the information of note, only specificly check that module just can be checked and browse entering.That is to say that the present invention utilizes whether the enciphered message module is to set telephone number to carry out real-time inspection to the telephone number of sending a telegram here, coming in the note, in case find that both are identical, then do not respond, thereby the information of realization is hiding.
On the other hand, the present invention also can be saved in information encrypted in the hidden area of memory, so that hide information encrypted.
Method of the present invention also comprises the step that encrypted information is hidden.
Information of the present invention comprises and sets all telephone number associated information, generally includes note, multimedia message, communications records, cards folder.
Fig. 1 has shown the flow chart of realizing said method of the present invention, as shown in Figure 1, realizes that the flow process of the inventive method comprises: (1) input password; (2) judge whether the input password identical with setting code, if the correct continuation of input next step, if incorrect then finish this process; (3) user enters encrypted number tabulation, can add, deletion, edit numbers; (4) after setting finished, Automatic Program traveled through whole encrypted number tabulation, and all information that will be associated in list of numbers all travel through; (5) information that all are traversed is encrypted, and hides.Information encryption can adopt displacement to encrypt or other simple cryptographic algorithm in addition, and the information that guarantees like this to be stored on the SIM card also can't be seen enciphered message after changing mobile phone.
In addition, abuse encryption and hiding in order to prevent other people, method of the present invention is further comprising the steps of:
The user sets in advance Crypted password;
Check the Crypted password of user's input, when the Crypted password of the Crypted password of finding input and setting mated, user's setting telephone number input was accepted in the encrypted number tabulation, otherwise did not then accept user's setting telephone number input.
In addition, the present invention utilizes enciphered message module reduction encryption and hides Info.
That is to say,, need in particular module, just can check, edit and delete through the information behind the enciphering hiding.Fig. 2 is the flow chart of enciphering hiding information inspection of the present invention, editor, delet method.As shown in Figure 2, the user is as follows to the step of enciphering hiding information inspection, editor and deletion: (1) input password; (2) judge whether the input password identical with setting code, if the correct continuation of input next step, if incorrect then finish this process; (3) user enters and checks the enciphered message module, can view all enciphering hiding information; (4) in checking the enciphered message module, the user can edit and operation such as deletion at enciphered message.
The user uses the mobile phone that this design is arranged, and after carrying out encryption, the information of encipherment protection all will be hidden from information list, has only the user behind specific interface input password, just can view enciphered message.Like this, in addition anyone do not know the existence of enciphered message when seeing user's mobile phone, so farthest protects user's individual enciphered message yet.The present invention changes and the perfect cipher mode of existing communication terminal, can be profound satisfy the demand of user to enciphered message, the user's that adequately protects privacy, secret or other sensitive informations are for the user has brought safe use experience.
The above only is a kind of better embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to and replaces and improvement etc., all should be included in protection scope of the present invention.
Claims (9)
1. method of protecting contents of mobile phone is characterized in that may further comprise the steps:
User's handle setting telephone number related with needing information encrypted is input in the encrypted number tabulation;
Scan described encrypted number tabulation;
After all set the associated information encryption of telephone number in the described encrypted number tabulation, be saved in the memory.
2. method according to claim 1 is characterized in that, also comprises the step that realization is hidden encrypted information.
3. method according to claim 2, it is characterized in that the described step that encrypted information is hidden comprises, mobile phone to incoming call, whether come telephone number in the note be that setting telephone number in the described encrypted number tabulation carries out real-time inspection, in case find it is then not respond.
4. method according to claim 1 is characterized in that, and is further comprising the steps of:
The user sets in advance Crypted password;
Check the Crypted password of user's input, when the Crypted password of the Crypted password of finding input and setting mated, user's setting telephone number input was accepted in described encrypted number tabulation, otherwise did not then accept user's setting telephone number input.
5. method according to claim 4 is characterized in that, described memory is SIM cards of mobile phones or mobile phone memory.
6. according to each described method of claim 1-4, it is characterized in that described being encrypted as utilizes displacement cryptographic algorithm or other cryptographic algorithm to information encryption.
7. method according to claim 6 is characterized in that, described information comprises and sets all telephone number associated information.
8. method according to claim 7 is characterized in that, described information comprises: note, multimedia message, communications records, cards folder.
9. method according to claim 6 is characterized in that, by the input cryptographic checksum enciphered message is decrypted processing, the reduction encrypted information.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010002644A CN101754209A (en) | 2010-01-20 | 2010-01-20 | Method for protecting contents of mobile phone |
PCT/CN2010/074601 WO2011088660A1 (en) | 2010-01-20 | 2010-06-28 | Method and apparatus for protecting cell-phone information content |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010002644A CN101754209A (en) | 2010-01-20 | 2010-01-20 | Method for protecting contents of mobile phone |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101754209A true CN101754209A (en) | 2010-06-23 |
Family
ID=42480426
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010002644A Pending CN101754209A (en) | 2010-01-20 | 2010-01-20 | Method for protecting contents of mobile phone |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101754209A (en) |
WO (1) | WO2011088660A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102223447A (en) * | 2011-06-22 | 2011-10-19 | 惠州Tcl移动通信有限公司 | Method for hiding short message content and method for viewing short message and hidden short message |
CN102572750A (en) * | 2011-12-26 | 2012-07-11 | 中兴通讯股份有限公司 | Method and terminal for protecting short messages |
WO2012155757A1 (en) * | 2011-08-09 | 2012-11-22 | 中兴通讯股份有限公司 | Short message encryption method for usim card |
CN103379451A (en) * | 2013-06-21 | 2013-10-30 | 宇龙计算机通信科技(深圳)有限公司 | Check method and system for information instantly burned after being read |
CN103678962A (en) * | 2012-08-30 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Personal information management method and device and terminal |
CN106231115A (en) * | 2016-08-29 | 2016-12-14 | 深圳市金立通信设备有限公司 | A kind of information protecting method and terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002062011A2 (en) * | 2000-11-07 | 2002-08-08 | Ericsson Inc. | Method and apparatus for masking secret multiplicands |
CN1486063A (en) * | 2002-09-28 | 2004-03-31 | 深圳市中兴通讯股份有限公司 | Method for protecting the content of mobile phone short message |
CN1561129A (en) * | 2004-03-09 | 2005-01-05 | 惠州Tcl移动通信有限公司 | Mobile phone message security method |
CN101321332A (en) * | 2007-06-08 | 2008-12-10 | 鹏智科技(深圳)有限公司 | Hand-hold communication appliance and its short message privacy method |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101254798B1 (en) * | 2006-01-23 | 2013-04-15 | 삼성전자주식회사 | Method and apparatus for hiding a telephone number and an item related there to in a terminal |
CN101754467A (en) * | 2008-12-22 | 2010-06-23 | 康佳集团股份有限公司 | Realizing method of privacy protection for dual-card cell phone |
-
2010
- 2010-01-20 CN CN201010002644A patent/CN101754209A/en active Pending
- 2010-06-28 WO PCT/CN2010/074601 patent/WO2011088660A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002062011A2 (en) * | 2000-11-07 | 2002-08-08 | Ericsson Inc. | Method and apparatus for masking secret multiplicands |
CN1486063A (en) * | 2002-09-28 | 2004-03-31 | 深圳市中兴通讯股份有限公司 | Method for protecting the content of mobile phone short message |
CN1561129A (en) * | 2004-03-09 | 2005-01-05 | 惠州Tcl移动通信有限公司 | Mobile phone message security method |
CN101321332A (en) * | 2007-06-08 | 2008-12-10 | 鹏智科技(深圳)有限公司 | Hand-hold communication appliance and its short message privacy method |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102223447A (en) * | 2011-06-22 | 2011-10-19 | 惠州Tcl移动通信有限公司 | Method for hiding short message content and method for viewing short message and hidden short message |
CN102223447B (en) * | 2011-06-22 | 2013-12-11 | 惠州Tcl移动通信有限公司 | Method for hiding short message content and method for viewing short message and hidden short message |
WO2012155757A1 (en) * | 2011-08-09 | 2012-11-22 | 中兴通讯股份有限公司 | Short message encryption method for usim card |
CN102572750A (en) * | 2011-12-26 | 2012-07-11 | 中兴通讯股份有限公司 | Method and terminal for protecting short messages |
CN103678962A (en) * | 2012-08-30 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Personal information management method and device and terminal |
CN103678962B (en) * | 2012-08-30 | 2018-04-03 | 腾讯科技(深圳)有限公司 | The method, apparatus and terminal of managing personal information |
CN103379451A (en) * | 2013-06-21 | 2013-10-30 | 宇龙计算机通信科技(深圳)有限公司 | Check method and system for information instantly burned after being read |
CN103379451B (en) * | 2013-06-21 | 2017-09-08 | 宇龙计算机通信科技(深圳)有限公司 | The inspection method and its system of burn-after-reading information |
CN106231115A (en) * | 2016-08-29 | 2016-12-14 | 深圳市金立通信设备有限公司 | A kind of information protecting method and terminal |
Also Published As
Publication number | Publication date |
---|---|
WO2011088660A1 (en) | 2011-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101662765B (en) | Encryption system and method of short message of mobile telephone | |
US7992006B2 (en) | Smart card data protection method and system thereof | |
US9807065B2 (en) | Wireless device and computer readable medium for storing a message in a wireless device | |
CN105450395A (en) | Information encryption and decryption processing method and system | |
CN104662870A (en) | Data security management system | |
CN102781001A (en) | Method for encrypting built-in file of mobile terminal and mobile terminal | |
CN103458382A (en) | Hardware encryption transmission and storage method and system of mobile phone private short messages | |
US20140079219A1 (en) | System and a method enabling secure transmission of sms | |
CN101674575A (en) | Method for protecting security of mobile communication terminal data and device thereof | |
CN101754209A (en) | Method for protecting contents of mobile phone | |
CN104468937A (en) | Data encryption and decryption methods and devices for mobile terminal and protection system | |
CN102075615A (en) | Method for sending and receiving short messages and subscriber identity module (SIM) | |
CN101895396A (en) | Mobile terminal and encryption method thereof | |
CN102572750A (en) | Method and terminal for protecting short messages | |
CN107666395A (en) | One population file management method, user terminal, group chat system | |
CN101795315A (en) | System and method for encrypting short messages by using mobile phone terminal | |
CN100450126C (en) | Method for protecting the content of mobile phone short message | |
KR101067146B1 (en) | Method for processing encrypted message in portable terminal and portable terminal | |
CN106027530A (en) | Instant message encryption system based on smartphone and implementation method thereof | |
CN104955029A (en) | Address book protection method, address book protection device and communication system | |
CN105279447A (en) | Method and device for data encryption, and method and device for data decryption | |
US9277403B2 (en) | Authentication method and device | |
CN101415185A (en) | Mobile terminal, method and system for keeping secret of platform-striding information | |
CN102833243A (en) | Communication system making use of fingerprint information and application of communication system | |
CN101420430B (en) | Methods and apparatus for information security protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20100623 |