CN104346579A - Method, device and system for protecting private information of mobile terminal - Google Patents

Method, device and system for protecting private information of mobile terminal Download PDF

Info

Publication number
CN104346579A
CN104346579A CN201410592312.6A CN201410592312A CN104346579A CN 104346579 A CN104346579 A CN 104346579A CN 201410592312 A CN201410592312 A CN 201410592312A CN 104346579 A CN104346579 A CN 104346579A
Authority
CN
China
Prior art keywords
mobile terminal
private data
user
delete processing
protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410592312.6A
Other languages
Chinese (zh)
Inventor
刘洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING DIGITAL GRID TECHNOLOGY Co Ltd
Original Assignee
BEIJING DIGITAL GRID TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING DIGITAL GRID TECHNOLOGY Co Ltd filed Critical BEIJING DIGITAL GRID TECHNOLOGY Co Ltd
Priority to CN201410592312.6A priority Critical patent/CN104346579A/en
Publication of CN104346579A publication Critical patent/CN104346579A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses a method, a device and a system for protecting the private information of a mobile terminal. The method comprises the following steps: monitoring the behavior event of the mobile terminal; judging whether the behavior event of the mobile terminal triggers a deleting processing condition or not; if the condition is triggered, popping up a problem reserved by a user and receiving an answer input by the user; judging whether the answer input by the user is correct or not; if the answer is not correct, carrying out deleting processing on the mobile terminal as per a previously set deleting range. The problem in the prior art that private data is deleted when unlocking passwords are used or a SIM (Subscriber Identity Module) card is changed or taken out is solved by the method of the application. Flow fees can also be saved when the private data is backed up by the mobile terminal through the previous setting of a range of sending the private information, timing is carried out on the process of sending primate information, and after preset time is exceeded, deleting processing is carried out on the mobile terminal no matter whether sending is finished or not. After the method is used for deleting the private data in the mobile terminal, the writing operation of random data is also carried out on the mobile terminal.

Description

A kind of methods, devices and systems protecting mobile terminal private data
Technical field
The application relates to the secret protection field of mobile terminal, protects the method for mobile terminal private data, a kind of device for the protection of mobile terminal private data and a kind of system for the protection of mobile terminal private data in particular to a kind of.
Background technology
There is the mobile terminal of data-handling capacity, be widely used.User often stores much important data message in the terminal, comprises individual address, p.m.entry, photo, video, schedule, note etc. and relates to a lot of important personal information of user.Mobile terminal has become the requisite instrument that people carry with, but due to the portability of mobile terminal, once loss or used by other people, can there is the potential safety hazard of private data leakage, therefore the protection of individual privacy data is further important.
In prior art, the mode of the private data of protection user is generally: the private data needing in mobile terminal device to protect, as individual address, p.m.entry, photo, video, schedule, note etc., be encapsulated in one or more secret protection program, if check private data, need to click the secret protection program on mobile terminal device, this secret protection program can point out user to input password, user enters this secret protection program again after inputting correct password, check relevant private data; Or be the mobile terminal setting unlocking pin and Password Input number of times threshold values of user, when described mobile terminal detect user unlock the frequency of failure exceed threshold values time, delete local private data after the private data of mobile terminal is backuped to server; Or when taking out or change SIM card, after the private data of mobile terminal is backuped to server, delete local private data; Mobile terminal lose or stolen time, can remote lock or the private data deleted in mobile terminal.
Prior art protects the private data data of user, also bring some problems: in prior art, one of mode protecting user privacy information is that user uses secret protection program simultaneously, but private data do not deleted when using secret protection program but private data be hidden in secret protection program, access to your password and protect, when the mobile terminal of user is lost or is stolen, although can to a certain degree protect private data data not reveal, but the problem that critical data is lost can not be solved, and lawless person obtain mobile terminal after still have an opportunity to crack and extract these privacy informations carrying out protecting that accesses to your password, secondly, be mobile terminal setting unlocking pin, current mobile terminal majority be touch-screen, and user is owing to touch or maloperation is easy to reach the threshold value inputting number of times by mistake, thus deletion private data, trouble is caused to user, moreover user, when changing phone number or other situations and needing take out and change SIM card, easily causes too and deletes private data by mistake, although user can be similarly adds to use and bear for private data backups, in the above prior art, although can carry out the backup of data, not pointed, there will be situation about some ancillary datas also being backuped to together in server or mailbox, adding users campus network, brings puzzlement when also checking Backup Data to user, although delete private data in local mobile terminal in the above prior art, by data recovery technique, the privacy information deleted can be restored, the leakage of private data can be caused equally.
Summary of the invention
The application provides a kind of and protects the method for mobile terminal private data, a kind of device for the protection of mobile terminal private data and a kind of system for the protection of mobile terminal private data, to solve the problem of the secret protection of existing mobile terminal.
The embodiment of the present application provides a kind of method protecting mobile terminal private data, and described method comprises:
Monitor the behavior event of mobile terminal;
Judge whether the behavior event of described mobile terminal triggers the condition of delete processing;
If so, then eject the problem reserved of user and receive the answer of user's input, if not, then continuing the behavior event monitoring described mobile terminal;
Judge that whether the answer that user inputs is correct;
If incorrect, then according to the deletion scope pre-set, delete processing is carried out to described mobile terminal, if correctly, then continue the behavior event monitoring described mobile terminal.
Optionally, before the step of the behavior event of described monitoring mobile terminal, also comprise the steps:
Reserved problem is set and fills in the answer of described reserved problem;
The address receiving information back is set;
The scope of configuration information passback;
The condition triggering delete processing is set;
The deletion scope of delete processing is set.
Optionally, the address of described reception information back specifically comprises:
One or more in the account number of email address, phone number or bitcom.
Optionally, the condition of described triggering delete processing specifically comprises:
When mobile terminal leaves screen lock state, the password of input or the number of times of track mistake inputted on the touchscreen exceed predetermined threshold value, or mobile terminal changes one or more in SIM card;
The setting means of described predetermined threshold value comprises:
The predetermined threshold value given tacit consent in user's selective system;
Or using the numerical value of user's input as predetermined threshold value.
Optionally, describedly arrange when triggering the condition of delete processing, if having selected mobile terminal to change SIM card option, then also need the IMSI number carrying out reading SIM card in current mobile terminal and the step stored.
Optionally, the recognition methods of described mobile terminal replacing SIM card is:
Read the IMSI number of the SIM card after changing;
Judge that whether described IMSI number is identical with the IMSI number prestored;
If different, be then considered as having changed SIM card, if identical, be then considered as not changing SIM card.
Optionally, the deletion scope of described delete processing specifically comprises:
Mobile terminal factory reset (remove all customer data, comprise the setting of user and the usage data of application program), or one or more inside and outside format mobile terminal in storage card.
Optionally, before the described deletion scope pre-set according to user carries out delete processing step to described mobile terminal, also comprise the steps:
Private data in described mobile terminal is sent to the address of the information back binding setting in advance.
Optionally, when described private data being sent to the address of the information back binding setting in advance, after exceeding predetermined time, no matter whether be sent completely and all delete processing carried out to described mobile terminal;
The setting means of described predetermined time comprises:
The predetermined time of giving tacit consent in user's selective system;
Or using the numerical value of user's input as predetermined time.
Optionally, after the described deletion scope pre-set according to user to carry out the step of delete processing to described mobile terminal, also comprise:
Carry out described mobile terminal, in the scope of delete processing, carrying out the write of random data.
Accordingly, the embodiment of the present application additionally provides a kind of device for the protection of mobile terminal private data, and described device comprises:
Monitoring behavior event module, for monitoring the behavior event of mobile terminal;
Judgement behavior event module, for judging whether the behavior event of described mobile terminal triggers the condition of delete processing;
Receiver Problem module is proposed, for ejecting problem that user reserves and receiving the answer of user's input;
Whether decision problem module is correct for judging the answer that user inputs;
Removing module, for carrying out delete processing according to the deletion scope pre-set to described mobile terminal.
Optionally, also comprise:
Problem module, for arranging reserved problem and filling in the answer of described reserved problem;
Information back receiver module, for arranging the address receiving information back;
Information back range module, for the scope of configuration information passback;
Select trigger condition module, for arranging the condition triggering delete processing;
Delete range module, for arranging the deletion scope of delete processing.
Optionally, described information back receiver module, specifically for arranging one or more in the account number of the email address, phone number or the bitcom that receive private data.
Optionally, also comprise:
SIM card preserves module, for reading the IMSI number of SIM card in current mobile terminal and storing.
Optionally, described SIM card preservation module also comprises:
SIM card reading unit, for reading the IMSI number of the SIM card after replacing;
IMSI number judging unit, for judging that whether described IMSI number is identical with the IMSI number prestored.
Optionally, described deletion range module (removes all customer data specifically for selecting to carry out mobile terminal factory reset, comprise the setting of user and the usage data of application program), or one or more inside and outside format mobile terminal in storage card.
Optionally, also comprise:
Sending module, for being sent to the address of the information back binding setting in advance by the private data in described mobile terminal.
Optionally, described sending module also comprises:
Timing unit, for being sent to the process timing of the address of the information back binding setting in advance to described private data;
Setup times unit, for predetermined time of giving tacit consent in selective system or using the numerical value of user's input as predetermined time.
Optionally, also comprise:
Random data writing module, in the scope of delete processing, carries out the write of random data for carrying out described mobile terminal.
In addition, the application also provides a kind of system for the protection of mobile terminal private data, comprising: the device for the protection of mobile terminal private data described in above-mentioned any one.
The beneficial effect that the technical scheme that the embodiment of the present application provides is brought is:
The method for the protection of mobile terminal private data that the application provides, by setting reserved problem, solve owing to touching the threshold value thus the problem of deleting private data that reach input number of times with maloperation by mistake when mobile terminal in prior art uses unlocking pin, and solve the problem of by mistake deleting private data caused when changing or take out SIM card; Simultaneously, the method for the protection of mobile terminal private data that the application provides can also make to save campus network during mobile terminal backup private data by presetting the scope sending private data, and for sending private data to mailbox or the timing of mobile terminal process of binding setting in advance, after exceeding predetermined time, no matter whether be sent completely and all delete processing carried out to described mobile terminal; After the private data using described method to delete in mobile terminal, also mobile terminal will be carried out to the write operation of random data.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present application or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, the accompanying drawing that the following describes is only some embodiments recorded in the application, for those of ordinary skill in the art, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 shows according to the process flow diagram of the application for the protection of the embodiment of the method for mobile terminal private data;
Fig. 2 shows according to the schematic diagram of the application for the protection of the embodiment of the device of mobile terminal private data;
Fig. 3 shows according to the schematic diagram of the application for the protection of the embodiment of the system of mobile terminal private data.
Embodiment
The embodiment of the present application provides a kind of method for the protection of mobile terminal private data, a kind of device for the protection of mobile terminal private data and a kind of system for the protection of mobile terminal private data.
In order to above-mentioned purpose, the feature and advantage of the application more clearly can be understood, below in conjunction with the drawings and specific embodiments, the application is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the application.But the application can be much different from alternate manner described here to implement, those skilled in the art can when doing similar popularization without prejudice to when the application's intension, and therefore the application is by the restriction of following public concrete enforcement.
In this application, a kind of method for the protection of mobile terminal private data, a kind of device for the protection of mobile terminal private data and a kind of system for the protection of mobile terminal private data is provided.Be described in detail one by one in the following embodiments.
Please refer to Fig. 1, it illustrates the process flow diagram of the embodiment of a kind of method for the protection of mobile terminal private data of the application.Described method comprises the steps:
Step 101, monitors the behavior event of mobile terminal.
The method of the present embodiment, monitors the behavior event in described mobile terminal, and the behavior event of described mobile terminal comprises the operation in mobile terminal.Such as, user opens a certain application program in the terminal, and the process opening described application program is just called a behavior event.
Before the step of the behavior event of described monitoring mobile terminal, also need to arrange described mobile terminal.Specifically, first, reserved problem is set and fills in the answer of described reserved problem; Secondly, the address receiving information back is set; Then, the scope of configuration information passback; Then, the condition triggering delete processing is set; Finally, the deletion scope of delete processing is set.
Describedly reserved problem be set and fill in the answer of described reserved problem, comprising: the problem that user pre-sets and specific answer.User inputs the stem of problem in question box, in answer frame, then input the answer of problem, clicks " preservation " after input.Such as, after user clicks and arranges, eject prompting frame " automatically remove once open, customer problem answer that kindly remember it, to avoid maloperation " and after user determines, input a problem only having oneself to know the answer, and input specific answer for described problem.By mistake the object arranging reserved problem prevents mobile terminal from deleting private data owing to causing when touching the threshold value thus deletion private data and replacing or taking-up SIM card that reach unblock input number of times with maloperation by mistake.
The described address arranging reception information back, comprising: arrange one or more in the account number of email address, phone number or bitcom.The address of described reception information back is selected according to actual conditions by user, and the address receiving private data just lists and uses maximum communication modes at present, and user also can adopt other modes to send private data, in this no limit.Such as, user fills in 123456@yahoo.com as the email address receiving private data in address field, fills in 13425678900 as the phone number receiving private data.Arranging the object of address receiving information back is to make user give private data in described loss mobile terminal for change after losing mobile terminal.
The scope of configuration information passback is the private data that user chooses in advance in the terminal, comprising: associated person information, name, telephone number, addresses of items of mail etc. in record contact person; Message registration, records the other party number, time of origin, type of call, duration etc. of every bar call record; Note record, records the other party number, tranceive type, time of origin, short message content etc. of the record of every bar note; Bitcom record, buddy list, chat message in record bitcom; Multimedia messages, the picture in record move terminal, video, audio frequency etc.Such as, user has chosen associated person information and note record in check box, then, when sending private data, only can send the associated person information in mobile terminal and note record, other information then can not send.The object arranging range of transmission mobile terminal preparation is sent during private data save campus network.
Described setting triggers the condition of delete processing, comprising: when mobile terminal leaves screen lock state, and the password of input or the number of times of track mistake inputted on the touchscreen exceed predetermined threshold value, or mobile terminal changes one or more in SIM card.The setting means of described predetermined threshold value comprises: the predetermined threshold value given tacit consent in user's selective system; Or using the numerical value of user's input as predetermined threshold value.The mode that described mobile terminal leaves screen lock state is selected according to actual conditions by user, access to your password, PIN code and track just list and use maximum unlocking manners at present, user also can adopt the locking of other checking unlocking manner removing screen, in this no limit.User chooses the condition triggering delete processing in check box, such as, the number of times that user has chosen unlocking screen mistake exceedes predetermined threshold options, as the condition triggering delete processing, and to set threshold value be 10 times, when user carries out unlocking screen, when the number of times of mistake is more than 10 times, system ejects reserved problem.
If described mobile terminal is mobile phone, selects when setting out the condition of delete processing, to have chosen mobile terminal and change SIM card option arranging, then also need the IMSI number carrying out reading SIM card in current mobile terminal and the step stored.The recognition methods that mobile terminal changes SIM card is: the IMSI number reading the SIM card after changing; Judge that whether described IMSI number is identical with the IMSI number prestored; If different, be then considered as having changed SIM card, and eject reserved problem; If identical, be then considered as not changing SIM card.
The described deletion scope arranging delete processing, comprising: mobile terminal factory reset (remove all customer data, comprise the setting of user and the usage data of application program), or one or more inside and outside format mobile terminal in storage card.User chooses the scope of delete processing in check box.Factory reset function can be provided by mobile terminal system itself, also can be provided by the application program be arranged on mobile terminal system.Inside and outside format mobile terminal, memory card function also can be provided by mobile terminal system itself, also can be provided by the application program be arranged on mobile terminal system.Such as, factory reset function provides for mobile terminal system itself, and inside and outside format mobile terminal, memory card function is provided by the application program be arranged on mobile terminal system.Such as, be that mobile phone is illustrated with mobile terminal, if the scope of delete processing that user chooses is mobile terminal factory reset option, then perform factory reset, factory reset can use the function carried in existing cell phone system.
Step 103, judges whether the behavior event of described mobile terminal triggers the condition of delete processing.
The condition of described triggering delete processing comprises: when mobile terminal leaves screen lock state, the password of input or the number of times of track mistake inputted on the touchscreen exceed predetermined threshold value, or mobile terminal changes one or more in SIM card, if the behavior event of mobile terminal is one of condition of above-mentioned delete processing, then illustrate that described mobile terminal triggers delete processing, then enter step 105, if not, then continue the behavior event monitoring described mobile terminal, return step 101.Such as, user on the touchscreen input trajectory pattern unlocks, whether the touch-screen of mobile terminal detects user and has inputted, if touch-screen detects that the finger of user leaves touch-screen, think that unlocking track input terminates, and judge the unblock track that inputs whether with correct unblock path matching, if coupling, judge to unlock successfully, otherwise judgement unlocks unsuccessfully, if the number of times of mistake is more than 10 times, then the behavior event of mobile terminal triggers the condition of delete processing.
Step 105, if so, then ejects the problem reserved of user and receives the answer of user's input.
If the behavior event of described mobile terminal triggers the condition of delete processing, then eject the problem that user reserves on the screen of the mobile terminal, user uses the touch-screen on mobile terminal or physical button in answer frame, input the answer of reserved problem.
Step 107, judges that whether the answer that user inputs is correct.
Judge that whether the specific answer that answer that user inputs and user reserve is consistent, if inconsistent, then enter step 109, if unanimously, then continue the behavior event monitoring described mobile terminal, return step 101.
Step 109, if incorrect, then the deletion scope pre-set according to user carries out delete processing to described mobile terminal.
If the specific answer that the answer of user's input and user reserve is inconsistent, then the deletion scope pre-set according to user carries out delete processing to described mobile terminal.Described deletion scope, comprising: the mobile terminal factory reset (remove all customer data, comprise the setting of user and the usage data of application program) that user chooses, or one or more inside and outside format mobile terminal in storage card.Such as, user has only chosen storage card inside and outside format mobile terminal when selecting, then the usage data of the setting and application program of only deleting the data user inside and outside mobile terminal in storage card when carrying out delete processing then can not be deleted.
Before in the deletion scope pre-set according to user described mobile terminal being carried out to the step of delete processing, also need the private data in described mobile terminal to be sent to the mailbox or mobile terminal of binding setting in advance.Described private data, comprising: associated person information, name, telephone number, addresses of items of mail etc. in record contact person; Message registration, records the other party number, time of origin, type of call, duration etc. of every bar call record; Note record, records the other party number, tranceive type, time of origin, short message content etc. of the record of every bar note; Bitcom record, buddy list, chat message in record bitcom; Multimedia messages, the picture in record move terminal, video, audio frequency etc.The take over party of private data is that user fills in the account number of email address, phone number or bitcom in advance.
When private data being sent to the address of the information back binding setting in advance, also need to carry out timing to process of transmitting.Specifically, when described private data being sent to the address of the information back binding setting in advance, after exceeding predetermined time, no matter whether be sent completely and all delete processing carried out to described mobile terminal.Described predetermined time adopts one of following scheme: the predetermined time of giving tacit consent in user's selective system; Or using the numerical value of user's input as predetermined time.
After the deletion scope pre-set according to user to carry out the step of delete processing to described mobile terminal, also need to carry out, in the scope of delete processing, carrying out the write operation of random data to described mobile terminal.The write of described random data is at least carried out once described mobile terminal.Such as, after mobile terminal carries out delete processing, the mode of mobile terminal being carried out to the storage space random data write of delete processing carries out write operation, thus realizes the storage space of format mobile terminal; In the process, more to the write operation number of times of the random data that mobile terminal carries out, security is higher.The object of carrying out the write of random data prevents from being restored by the private data deleted by data recovery technique, can cause the leakage of private data.
In the above-described embodiment, provide a kind of method protecting mobile terminal private data, correspond, the application also provides a kind of device protecting mobile terminal private data.Please refer to Fig. 2, it is a kind of embodiment schematic diagram protecting the device of mobile terminal private data of the application.Because device embodiment is substantially similar to embodiment of the method, so describe fairly simple, relevant part illustrates see the part of embodiment of the method.The device embodiment of following description is only schematic.
A kind of device protecting mobile terminal private data of the present embodiment, comprising: monitor behavior event module 201, for monitoring the behavior event of mobile terminal; Judgement behavior event module 203, for judging whether the behavior event of described mobile terminal triggers the condition of delete processing; Receiver Problem module 205 is proposed, for ejecting problem that user reserves and receiving the answer of user's input; Whether decision problem module 207 is correct for judging the answer that user inputs; Removing module 209, carries out delete processing for the deletion scope pre-set according to user to described mobile terminal.
Optionally, also comprise:
Problem module, for arranging reserved problem and filling in the answer of described reserved problem;
Information back receiver module, for arranging the address receiving information back;
Information back range module, for the scope of configuration information passback;
Select trigger condition module, for arranging the condition triggering delete processing;
Delete range module, for arranging the deletion scope of delete processing.
Optionally, described information back receiver module, specifically for arranging one or more in the account number of the email address, phone number or the bitcom that receive private data.
Optionally, also comprise:
SIM card preserves module, for reading the IMSI number of SIM card in current mobile terminal and storing.
Optionally, described SIM card preservation module also comprises:
SIM card reading unit, for reading the IMSI number of the SIM card after replacing;
IMSI number judging unit, for judging that whether described IMSI number is identical with the IMSI number prestored.
Optionally, described deletion range module (removes all customer data specifically for selecting to carry out mobile terminal factory reset, comprise the setting of user and the usage data of application program), or one or more inside and outside format mobile terminal in storage card.
Optionally, also comprise:
Sending module, for being sent to the address of the information back binding setting in advance by the private data in described mobile terminal.
Optionally, described sending module also comprises:
Timing unit, for being sent to the process timing of the address of the information back binding setting in advance to described private data;
Setup times unit, for predetermined time of giving tacit consent in selective system or using the numerical value of user's input as predetermined time.
Optionally, also comprise:
Random data writing module, in the scope of delete processing, carries out the write of random data for carrying out described mobile terminal.
Present invention also provides a kind of system for the protection of mobile terminal private data, as shown in Figure 3, this system comprises a kind of device 301 for the protection of mobile terminal private data described in above-described embodiment.The described device 301 for the protection of mobile terminal private data, can be arranged on mobile terminal, but be not limited to this equipment, can be any equipment of the method that can realize above-mentioned protection mobile terminal private data, comprise: PC, handheld device, electronic plane, personal digital assistant (PDA), mobile phone, network home appliance (network appliances), camera, video camera, smart mobile phone, network base station, media player, navigator, electronic mail equipment, game station, the combination of automatic information system (entertainment systems such as with control panel) and aforementioned device.Such as: the Plant arrangement of protection mobile terminal private data is on mobile phone; reserved problem can be set and fill in the answer of described reserved problem, the condition triggering delete processing and deletion scope; and perform the method for protection mobile terminal private data, the private data in mobile phone just can be protected not to be stolen.
In one typically configuration, computing equipment comprises one or more processor (CPU), input/output interface, network interface and internal memory.
Internal memory may comprise the volatile memory in computer-readable medium, and the forms such as random access memory (RAM) and/or Nonvolatile memory, as ROM (read-only memory) (ROM) or flash memory (flash RAM).Internal memory is the example of computer-readable medium.
1, computer-readable medium comprises permanent and impermanency, removable and non-removable media can be stored to realize information by any method or technology.Information can be computer-readable instruction, data structure, the module of program or other data.The example of the storage medium of computing machine comprises, but be not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic RAM (DRAM), the random access memory (RAM) of other types, ROM (read-only memory) (ROM), Electrically Erasable Read Only Memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc ROM (read-only memory) (CD-ROM), digital versatile disc (DVD) or other optical memory, magnetic magnetic tape cassette, tape magnetic rigid disk stores or other magnetic storage apparatus or any other non-transmitting medium, can be used for storing the information can accessed by computing equipment.According to defining herein, computer-readable medium does not comprise non-temporary computer readable media (transitory media), as data-signal and the carrier wave of modulation.
2, it will be understood by those skilled in the art that the embodiment of the application can be provided as method, system or computer program.Therefore, the application can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the application can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disk memory, CD-ROM, optical memory etc.) of computer usable program code.
Although the application with preferred embodiment openly as above; but it is not for limiting the application; any those skilled in the art are not departing from the spirit and scope of the application; can make possible variation and amendment, the scope that therefore protection domain of the application should define with the application's claim is as the criterion.

Claims (12)

1. protect a method for mobile terminal private data, it is characterized in that, comprising:
Monitor the behavior event of mobile terminal;
Judge whether the behavior event of described mobile terminal triggers the condition of delete processing;
If so, then eject the problem reserved of user and receive the answer of user's input, if not, then continuing the behavior event monitoring described mobile terminal;
Judge that whether the answer that user inputs is correct;
If incorrect, then according to the deletion scope pre-set, delete processing is carried out to described mobile terminal, if correctly, then continue the behavior event monitoring described mobile terminal.
2. the method for protection mobile terminal private data according to claim 1, is characterized in that, before the step of the behavior event of described monitoring mobile terminal, also comprises the steps:
Reserved problem is set and fills in the answer of described reserved problem;
The address receiving information back is set;
The scope of configuration information passback;
The condition triggering delete processing is set;
The deletion scope of delete processing is set.
3. the method for protection mobile terminal private data according to claim 2, is characterized in that, the address of described reception information back specifically comprises:
One or more in the account number of email address, phone number or bitcom.
4. the method for protection mobile terminal private data according to claim 2, is characterized in that, the condition of described triggering delete processing specifically comprises:
When mobile terminal leaves screen lock state, the password of input or the number of times of track mistake inputted on the touchscreen exceed predetermined threshold value, or mobile terminal changes one or more in SIM card;
The setting means of described predetermined threshold value comprises:
The predetermined threshold value given tacit consent in user's selective system;
Or using the numerical value of user's input as predetermined threshold value.
5. the method for the protection mobile terminal private data according to claim 2 or 4; it is characterized in that; describedly arrange when triggering the condition of delete processing, if having selected mobile terminal to change SIM card option, then also need the IMSI number carrying out reading SIM card in current mobile terminal and the step stored.
6. the method for protection mobile terminal private data according to claim 4, is characterized in that, the recognition methods that described mobile terminal changes SIM card is:
Read the IMSI number of the SIM card after changing;
Judge that whether described IMSI number is identical with the IMSI number prestored;
If different, be then considered as having changed SIM card, if identical, be then considered as not changing SIM card.
7. the method for protection mobile terminal private data according to claim 2, is characterized in that, the deletion scope of described delete processing specifically comprises:
One or more inside and outside mobile terminal factory reset or format mobile terminal in storage card.
8. the method for protection mobile terminal private data according to claim 1, is characterized in that, before the described deletion scope pre-set according to user carries out delete processing step to described mobile terminal, also comprises the steps:
Private data in described mobile terminal is sent to the address of the information back binding setting in advance.
9. the method for protection mobile terminal private data according to claim 8, it is characterized in that, when described private data being sent to the address of the information back binding setting in advance, after exceeding predetermined time, no matter whether be sent completely and all delete processing carried out to described mobile terminal;
The setting means of described predetermined time comprises:
The predetermined time of giving tacit consent in user's selective system;
Or using the numerical value of user's input as predetermined time.
10. the method for protection mobile terminal private data according to claim 1, is characterized in that, after the described deletion scope pre-set according to user to carry out the step of delete processing to described mobile terminal, also comprises:
Carry out described mobile terminal, in the scope of delete processing, carrying out the write of random data.
11. 1 kinds for the protection of the device of mobile terminal private data, is characterized in that, comprising:
Monitoring behavior event module, for monitoring the behavior event of mobile terminal;
Judgement behavior event module, for judging whether the behavior event of described mobile terminal triggers the condition of delete processing;
Receiver Problem module is proposed, for ejecting problem that user reserves and receiving the answer of user's input;
Whether decision problem module is correct for judging the answer that user inputs;
Removing module, for carrying out delete processing according to the deletion scope pre-set to described mobile terminal.
12. 1 kinds, for the protection of the system of mobile terminal private data, is characterized in that, described system comprises the device for the protection of mobile terminal private data described in the claims 11.
CN201410592312.6A 2014-10-29 2014-10-29 Method, device and system for protecting private information of mobile terminal Pending CN104346579A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410592312.6A CN104346579A (en) 2014-10-29 2014-10-29 Method, device and system for protecting private information of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410592312.6A CN104346579A (en) 2014-10-29 2014-10-29 Method, device and system for protecting private information of mobile terminal

Publications (1)

Publication Number Publication Date
CN104346579A true CN104346579A (en) 2015-02-11

Family

ID=52502159

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410592312.6A Pending CN104346579A (en) 2014-10-29 2014-10-29 Method, device and system for protecting private information of mobile terminal

Country Status (1)

Country Link
CN (1) CN104346579A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104899118A (en) * 2015-06-26 2015-09-09 上海斐讯数据通信技术有限公司 Method and system for recovering deleted privacy data
CN105184184A (en) * 2015-08-06 2015-12-23 上海与德通讯技术有限公司 Anti-theft method for terminal data
CN105530356A (en) * 2015-12-21 2016-04-27 珠海格力电器股份有限公司 Mobile communication terminal and data protection method and apparatus thereof
CN105718272A (en) * 2016-02-22 2016-06-29 青岛海信移动通信技术股份有限公司 Method for restoring factory settings of terminal and terminal
CN106022160A (en) * 2016-05-13 2016-10-12 北京小米移动软件有限公司 Method and apparatuses for deleting user data
CN106231584A (en) * 2016-07-28 2016-12-14 广东欧珀移动通信有限公司 The processing method of a kind of terminal data, device and mobile terminal
CN106603625A (en) * 2016-11-04 2017-04-26 广东欧珀移动通信有限公司 Data protection method and device
CN108920941A (en) * 2018-07-11 2018-11-30 北京奇安信科技有限公司 To the management-control method and device of feature operation in mobile device
WO2019061383A1 (en) * 2017-09-30 2019-04-04 陈银芳 Data destruction method for smart phone and related product
CN110032898A (en) * 2019-04-11 2019-07-19 Oppo广东移动通信有限公司 Data clearing method, device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1606474A (en) * 2001-12-21 2005-04-13 昭和电工株式会社 Highly active photocatalyst particles, method of production therefor, and use thereof
CN101656966A (en) * 2009-09-01 2010-02-24 成都市华为赛门铁克科技有限公司 Data protection method of mobile terminal, device thereof and mobile terminal
CN104102864A (en) * 2014-07-30 2014-10-15 宇龙计算机通信科技(深圳)有限公司 Terminal screen locking password resetting method, resetting system and terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1606474A (en) * 2001-12-21 2005-04-13 昭和电工株式会社 Highly active photocatalyst particles, method of production therefor, and use thereof
CN101656966A (en) * 2009-09-01 2010-02-24 成都市华为赛门铁克科技有限公司 Data protection method of mobile terminal, device thereof and mobile terminal
CN104102864A (en) * 2014-07-30 2014-10-15 宇龙计算机通信科技(深圳)有限公司 Terminal screen locking password resetting method, resetting system and terminal

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104899118A (en) * 2015-06-26 2015-09-09 上海斐讯数据通信技术有限公司 Method and system for recovering deleted privacy data
CN105184184A (en) * 2015-08-06 2015-12-23 上海与德通讯技术有限公司 Anti-theft method for terminal data
CN105530356A (en) * 2015-12-21 2016-04-27 珠海格力电器股份有限公司 Mobile communication terminal and data protection method and apparatus thereof
CN105530356B (en) * 2015-12-21 2018-06-01 珠海格力电器股份有限公司 Communication terminal and its data guard method and device
CN105718272A (en) * 2016-02-22 2016-06-29 青岛海信移动通信技术股份有限公司 Method for restoring factory settings of terminal and terminal
CN106022160A (en) * 2016-05-13 2016-10-12 北京小米移动软件有限公司 Method and apparatuses for deleting user data
CN106231584A (en) * 2016-07-28 2016-12-14 广东欧珀移动通信有限公司 The processing method of a kind of terminal data, device and mobile terminal
CN106603625A (en) * 2016-11-04 2017-04-26 广东欧珀移动通信有限公司 Data protection method and device
CN106603625B (en) * 2016-11-04 2020-03-03 Oppo广东移动通信有限公司 Data protection method and device
WO2019061383A1 (en) * 2017-09-30 2019-04-04 陈银芳 Data destruction method for smart phone and related product
CN108920941A (en) * 2018-07-11 2018-11-30 北京奇安信科技有限公司 To the management-control method and device of feature operation in mobile device
CN110032898A (en) * 2019-04-11 2019-07-19 Oppo广东移动通信有限公司 Data clearing method, device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104346579A (en) Method, device and system for protecting private information of mobile terminal
CN104601324B (en) A kind of verification method, terminal and system for application
KR102307665B1 (en) identity authentication
US20220385471A1 (en) Mobile Terminal Privacy Protection Method and Protection Apparatus, and Mobile Terminal
US10515203B2 (en) Method and system for improving security of a mobile terminal
US8811965B2 (en) System and method for automatic data security back-up and control for mobile devices
CN104540123B (en) The method and system of mobile terminal significant data encrypted backup and safety deleting
US7574235B2 (en) Mobile communication apparatus having anti-theft and auto-notification functions
CN105530356B (en) Communication terminal and its data guard method and device
US9378344B2 (en) Method and apparatus for protecting information based on data card
CN106210238B (en) Short message storage method and device
CN103413102A (en) Secret data management device and secret data management method as well as mobile terminal
CN103840944A (en) Short message authentication method, server and system
CN102917098A (en) Method and device for preventing important linkman from being wrongly deleted
CN113609497B (en) Data protection method and device
CN105574376A (en) Screen unlocking device, system and method
CN105868621A (en) A password resetting method and device
CN111414605B (en) Unlocking method and device of embedded security unit, electronic equipment and storage medium
CN102594979A (en) Information processing method and device
CN106031202A (en) Information transmitting method and device and information receiving method and device
CN107172602B (en) Data security protection method and device for mobile terminal
CN106791171B (en) Card locking method and device of mobile terminal and mobile terminal
US10165089B2 (en) System and method for automatic data security, back-up and control for mobile devices
CN107704337A (en) Method, mobile terminal and the device with store function of factory reset
JP6938579B2 (en) Mobile device privacy protection methods and devices, as well as mobile devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
CB02 Change of applicant information

Address after: 100020, Beijing, Chaoyang District No. 25 East Third Ring Road, 10 floor, building

Applicant after: Beijing Digital Tianyu Science & Technology Co., Ltd.

Address before: 100020, Beijing, Chaoyang District No. 25 East Third Ring Road, 10 floor, building

Applicant before: BEIJING DIGITAL GRID TECHNOLOGY CO., LTD.

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: BEIJING SHUZI TIANYU TECHNOLOGY CO., LTD. TO: BEIJING DIGITAL GRID TECHNOLOGY CO., LTD.

C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150211

RJ01 Rejection of invention patent application after publication