CN104519127A - Method for protecting personal information in mobile phone - Google Patents
Method for protecting personal information in mobile phone Download PDFInfo
- Publication number
- CN104519127A CN104519127A CN201410768312.7A CN201410768312A CN104519127A CN 104519127 A CN104519127 A CN 104519127A CN 201410768312 A CN201410768312 A CN 201410768312A CN 104519127 A CN104519127 A CN 104519127A
- Authority
- CN
- China
- Prior art keywords
- information
- mobile phone
- user
- clouds
- personal information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/563—Data redirection of data network streams
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Telephone Function (AREA)
- Information Transfer Between Computers (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention belongs to the fields of mobile communication technology and information security and aims to provide a method for well protecting the personal information in a mobile phone. According to the technical scheme, the method includes: all or part of the information in the mobile phone is stored in a cloud, and the mobile phone does not store information or does not store complete information; when a user needs the information, the information can be directly downloaded from the cloud, wherein the storing process is an encryption uploading process, and the downloading process is a decryption downloading process. By the method mainly applicable to mobile phone information confidentiality occasions, personal information cannot leak easily even the mobile phone is lost or stolen.
Description
Technical field
The invention belongs to mobile communication technology, information security field, more particularly relate to the improvement of personal information protecting method in mobile phone.Specifically, the guard method of personal information in mobile phone is related to.
Technical background
Along with the development of mobile phone technique, nowadays people have got used to mobile phone when computer use, and contact method, photograph video, document mail, Investment & Financing are all completed by mobile phone, and " inherent value " even exceedes mobile phone itself.It not is take notice of mobile phone itself that present most people mobile phone is lost, but information, the data inside mobile phone, once mobile phone is lost, consequence is hardly imaginable.Due to mobile phone small volume, easily lose, if do not take certain measure, after mobile phone is lost, the information in mobile phone is easily seen by people or is utilized.
Summary of the invention
For overcoming the deficiencies in the prior art, the present invention aims to provide a kind of method better can protecting personal information in mobile phone, even if mobile phone loss or stolen, personal information also can not be revealed easily.For this reason, the technical scheme that the present invention takes is, in mobile phone, the guard method of personal information, comprises the steps, leaves high in the clouds in all or part of for the information in mobile phone, does not preserve information or do not preserve complete information in mobile phone; When user whenever necessary, directly download from high in the clouds; Deposit, downloading process is the process that download was uploaded and deciphered in encryption.
After the information that deciphering is downloaded uses, by user or the information of automatically deleting download.
Wherein, high in the clouds is is account with the cell-phone number of user, and when logging in high in the clouds, cloud system can send a dynamic password to user mobile phone, and user logs in this dynamic password; After mobile phone is lost, report the loss cell-phone number, mobile phone cannot receive cloud system and send dynamic password, and others just cannot the high in the clouds of login user.
The information of user is cell-phone number information, short message, mailbox associated person information, some individual secret files of comprising user; First mobile phone terminal first can judge that the information that user needs to upload is larger information data, still less information data; For larger user profile data, first use information retrieval and abstraction module according to the keyword of user profile, extract a part of information, upload after it is encrypted; For less user profile data, directly encrypt upload user information.
Described information retrieval and abstraction module: the keyword needing Extracting Information for reading user, thus extract the partial information in user profile.
Encryption is uploaded and is deciphered download and utilizes encryption chip to realize, and encryption chip runs enciphering algorithm module.
Compared with the prior art, technical characterstic of the present invention and effect:
The present invention adopts high in the clouds to upload, downloads to obtain mode, thus better can protect the method for personal information in mobile phone, even if mobile phone loss or stolen, personal information also can not be revealed easily.
Accompanying drawing explanation
Fig. 1 is structural representation of the present invention.
Fig. 2 is that user profile encrypts the flow chart uploaded.
Fig. 3 is the flow chart that user profile deciphering is downloaded.
Embodiment
The invention provides the method for personal information protection in a kind of mobile phone, user the information in mobile phone is all or part of can leave high in the clouds in, does not preserve information or do not preserve complete information in mobile phone.When user whenever necessary, directly download from high in the clouds.This process is mainly concerned with the process that download was uploaded and deciphered in a kind of encryption.
The present invention mainly comprises mobile phone and high in the clouds two parts.
User inputs personal information, and mobile phone gathers the personal information of user, adopts cryptographic algorithm encryption, and the information after encryption is sent to high in the clouds, do not preserve information upload in mobile phone by the encrypting module of mobile phone terminal to the personal information of user with a password.When user has the informational needs that will use to download from high in the clouds, relevant search information, after downloading from high in the clouds, the encrypting module of mobile phone terminal can be decrypted to Download Info, after user uses, deletes the personal information (can automatically delete) downloaded.
Wherein, high in the clouds is is account with the cell-phone number of user, and when logging in high in the clouds, cloud system can send a dynamic password to user mobile phone, and user logs in this dynamic password.After mobile phone is lost, report the loss cell-phone number, mobile phone cannot receive cloud system and send dynamic password, and others just cannot log in your high in the clouds, also just cannot check your information.
Wherein, the information of user can be the cell-phone number information, short message, mailbox associated person information, some individual secret files etc. of user.Some information is larger, and some information is smaller.
First mobile phone terminal first can judge that the information that user needs to upload is larger information data, still less information data.For larger user profile data, first use information retrieval and abstraction module according to the keyword of user profile, extract a part of information, upload after it is encrypted.For less user profile data, directly encrypt upload user information.
When user's information upload, the information of required encryption is sent to encrypting module by communication interface by mobile phone, and upon receipt of this information, encrypting module is encrypted this information of user, then uploads.When user downloads required information, the information of download is sent to encrypting module by communication interface by mobile phone, is given the decrypts information downloaded by encrypting module.
Described information retrieval and abstraction module: the keyword needing Extracting Information for reading user, thus extract the partial information in user profile.
Described encrypting module: mainly comprise encryption chip, described encryption chip can be encrypted to user profile by cryptographic algorithm with a password.When user needs from high in the clouds Download Info, encryption chip can give with identical password the decrypts information downloaded.
Described encryption chip mainly comprises enciphering algorithm module.Wherein encryption chip can be LKT4301, USBkey etc.
Described cryptographic algorithm can be one of multiple encryption algorithms such as AES, DES, RSA, ECC or combination.
Wherein enciphering algorithm module: for user profile encryption and decryption.
For the cell-phone number information of user.
Fig. 2 is the flow chart of encryption upload procedure of the present invention, and such as user needs the cell-phone number uploading " Xiao Ming ".
Comprising following steps:
Log in the interface, high in the clouds of mobile phone terminal, click and add cell-phone number, input handset number and the label information " Xiao Ming " corresponding with cell-phone number;
Mobile phone enters encrypted state by communication interface notice encryption chip;
Encryption chip sends information to mobile phone master chip, inputs password by mobile phone display screen prompting user;
The cell-phone number of the codon pair " Xiao Ming " that encryption chip inputs with user is encrypted;
" Xiao Ming " cell-phone number after encryption and " Xiao Ming " this label information one_to_one corresponding upload to high in the clouds.Delete the cell-phone number of " Xiao Ming " in mobile phone
Fig. 3 is the flow chart of deciphering downloading process of the present invention, and such as user needs the cell-phone number downloading " Xiao Ming ".
Comprising following steps:
Log in the interface, high in the clouds of mobile phone terminal, input the label information " Xiao Ming " corresponding with cell-phone number and search for, download the cell-phone number of " Xiao Ming " of the encryption corresponding to label information " Xiao Ming ".
The enciphered message corresponding with label information is sent to encryption chip by communication interface by mobile phone, and notifies that it enters decrypted state.
Encryption chip sends information to mobile phone master chip, inputs password by mobile phone display screen display reminding user;
The cell-phone number of the codon pair " Xiao Ming " that encryption chip inputs with user is decrypted process;
After finishing using, delete the cell-phone number of " Xiao Ming " in mobile phone.
For larger data, we upload to high in the clouds according to after the importance Extraction parts information encryption of information, make the information in mobile phone imperfect, the possibility that reduction information is utilized.
Claims (6)
1. the guard method of personal information in mobile phone, is characterized in that, comprise the steps, leave high in the clouds in all or part of for the information in mobile phone, do not preserve information or do not preserve complete information in mobile phone; When user whenever necessary, directly download from high in the clouds; Deposit, downloading process is the process that download was uploaded and deciphered in encryption.
2. the guard method of personal information in mobile phone as claimed in claim 1, is characterized in that, after the information that deciphering is downloaded uses, by user or automatically delete the information downloaded.
3. the guard method of personal information in mobile phone as claimed in claim 1, is characterized in that, wherein, high in the clouds is is account with the cell-phone number of user, when logging in high in the clouds, cloud system can send a dynamic password to user mobile phone, and user logs in this dynamic password; After mobile phone is lost, report the loss cell-phone number, mobile phone cannot receive cloud system and send dynamic password, and others just cannot the high in the clouds of login user.
4. the guard method of personal information in mobile phone as claimed in claim 1, is characterized in that, the information of user is some the secret files comprising the cell-phone number information of user, short message, mailbox associated person information, individual; First mobile phone terminal first can judge that the information that user needs to upload is larger information data, still less information data; For larger user profile data, first use information retrieval and abstraction module according to the keyword of user profile, extract a part of information, upload after it is encrypted; For less user profile data, directly encrypt upload user information.
5. the guard method of personal information in mobile phone as claimed in claim 4, is characterized in that, described information retrieval and abstraction module: the keyword needing Extracting Information for reading user, thus extracts the partial information in user profile.
6. the guard method of personal information in mobile phone as claimed in claim 1, it is characterized in that, encryption is uploaded and is deciphered download and utilizes encryption chip to realize, and encryption chip runs enciphering algorithm module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410768312.7A CN104519127A (en) | 2014-12-11 | 2014-12-11 | Method for protecting personal information in mobile phone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410768312.7A CN104519127A (en) | 2014-12-11 | 2014-12-11 | Method for protecting personal information in mobile phone |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104519127A true CN104519127A (en) | 2015-04-15 |
Family
ID=52793830
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410768312.7A Pending CN104519127A (en) | 2014-12-11 | 2014-12-11 | Method for protecting personal information in mobile phone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104519127A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109068318A (en) * | 2018-10-08 | 2018-12-21 | 重庆邮电大学 | The guard method of personal information in a kind of smart phone |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070077925A1 (en) * | 2005-09-30 | 2007-04-05 | Fujitsu Limited | Mobile terminal with data delete function |
CN101119565A (en) * | 2007-09-03 | 2008-02-06 | 华为技术有限公司 | Mobile communications terminal data protection method, system and equipment |
CN101606408A (en) * | 2007-02-07 | 2009-12-16 | 日本电气株式会社 | Communication system and communication means |
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
CN103795715A (en) * | 2014-01-20 | 2014-05-14 | 冯丽娟 | Privacy protection method, privacy recovery method and privacy protection system |
-
2014
- 2014-12-11 CN CN201410768312.7A patent/CN104519127A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070077925A1 (en) * | 2005-09-30 | 2007-04-05 | Fujitsu Limited | Mobile terminal with data delete function |
CN101606408A (en) * | 2007-02-07 | 2009-12-16 | 日本电气株式会社 | Communication system and communication means |
CN101119565A (en) * | 2007-09-03 | 2008-02-06 | 华为技术有限公司 | Mobile communications terminal data protection method, system and equipment |
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
CN103795715A (en) * | 2014-01-20 | 2014-05-14 | 冯丽娟 | Privacy protection method, privacy recovery method and privacy protection system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109068318A (en) * | 2018-10-08 | 2018-12-21 | 重庆邮电大学 | The guard method of personal information in a kind of smart phone |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105760764B (en) | Encryption and decryption method and device for embedded storage device file and terminal | |
CN100490372C (en) | A method for backup and recovery of encryption key | |
WO2016061899A1 (en) | Fingerprint decryption method and device | |
US9146881B2 (en) | Mobile data vault | |
CN204595860U (en) | A kind of memory device encryption bridge | |
WO2016086788A1 (en) | Method and apparatus for encrypting/decrypting data on mobile terminal | |
CN103023635B (en) | A kind of method of information back-up and device | |
CN103458382A (en) | Hardware encryption transmission and storage method and system of mobile phone private short messages | |
CN105450395A (en) | Information encryption and decryption processing method and system | |
US20130185569A1 (en) | Data protection system and method based on cloud storage | |
CN104052658A (en) | Privacy protection system and method based on social network | |
CN103618607A (en) | Method for data security transmission and key exchange | |
US9276748B2 (en) | Data-encrypting method and decrypting method for a mobile phone | |
CN103559453A (en) | Hardware encryption protection method and system for cellphone data | |
CN111404953A (en) | Message encryption method, message decryption method, related devices and related systems | |
CN104144174B (en) | Protect method, user equipment and the server of privacy of user data | |
CN102572750A (en) | Method and terminal for protecting short messages | |
CN103338106A (en) | Methods and devices for ciphering and deciphering file | |
CN103458101B (en) | The hardware encryption storage method of a kind of mobile phone privacy contact person and system | |
KR101358375B1 (en) | Prevention security system and method for smishing | |
CN105279447A (en) | Method and device for data encryption, and method and device for data decryption | |
CN103916834A (en) | Short message encryption method and system allowing user to have exclusive secret key | |
CN103945348A (en) | Asymmetrical secret key short message encryption method and system | |
CN105847261B (en) | A kind of electronic signature method based on the wireless encryption and decryption of bluetooth | |
CN107276961A (en) | A kind of method and device based on cipher algorithm encryption and ciphertext data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150415 |