CN104519127A - Method for protecting personal information in mobile phone - Google Patents

Method for protecting personal information in mobile phone Download PDF

Info

Publication number
CN104519127A
CN104519127A CN201410768312.7A CN201410768312A CN104519127A CN 104519127 A CN104519127 A CN 104519127A CN 201410768312 A CN201410768312 A CN 201410768312A CN 104519127 A CN104519127 A CN 104519127A
Authority
CN
China
Prior art keywords
information
mobile phone
user
clouds
personal information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410768312.7A
Other languages
Chinese (zh)
Inventor
刘立
杜一帆
韩永欣
吴煜
赵硕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201410768312.7A priority Critical patent/CN104519127A/en
Publication of CN104519127A publication Critical patent/CN104519127A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/563Data redirection of data network streams

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the fields of mobile communication technology and information security and aims to provide a method for well protecting the personal information in a mobile phone. According to the technical scheme, the method includes: all or part of the information in the mobile phone is stored in a cloud, and the mobile phone does not store information or does not store complete information; when a user needs the information, the information can be directly downloaded from the cloud, wherein the storing process is an encryption uploading process, and the downloading process is a decryption downloading process. By the method mainly applicable to mobile phone information confidentiality occasions, personal information cannot leak easily even the mobile phone is lost or stolen.

Description

The guard method of personal information in mobile phone
Technical field
The invention belongs to mobile communication technology, information security field, more particularly relate to the improvement of personal information protecting method in mobile phone.Specifically, the guard method of personal information in mobile phone is related to.
Technical background
Along with the development of mobile phone technique, nowadays people have got used to mobile phone when computer use, and contact method, photograph video, document mail, Investment & Financing are all completed by mobile phone, and " inherent value " even exceedes mobile phone itself.It not is take notice of mobile phone itself that present most people mobile phone is lost, but information, the data inside mobile phone, once mobile phone is lost, consequence is hardly imaginable.Due to mobile phone small volume, easily lose, if do not take certain measure, after mobile phone is lost, the information in mobile phone is easily seen by people or is utilized.
Summary of the invention
For overcoming the deficiencies in the prior art, the present invention aims to provide a kind of method better can protecting personal information in mobile phone, even if mobile phone loss or stolen, personal information also can not be revealed easily.For this reason, the technical scheme that the present invention takes is, in mobile phone, the guard method of personal information, comprises the steps, leaves high in the clouds in all or part of for the information in mobile phone, does not preserve information or do not preserve complete information in mobile phone; When user whenever necessary, directly download from high in the clouds; Deposit, downloading process is the process that download was uploaded and deciphered in encryption.
After the information that deciphering is downloaded uses, by user or the information of automatically deleting download.
Wherein, high in the clouds is is account with the cell-phone number of user, and when logging in high in the clouds, cloud system can send a dynamic password to user mobile phone, and user logs in this dynamic password; After mobile phone is lost, report the loss cell-phone number, mobile phone cannot receive cloud system and send dynamic password, and others just cannot the high in the clouds of login user.
The information of user is cell-phone number information, short message, mailbox associated person information, some individual secret files of comprising user; First mobile phone terminal first can judge that the information that user needs to upload is larger information data, still less information data; For larger user profile data, first use information retrieval and abstraction module according to the keyword of user profile, extract a part of information, upload after it is encrypted; For less user profile data, directly encrypt upload user information.
Described information retrieval and abstraction module: the keyword needing Extracting Information for reading user, thus extract the partial information in user profile.
Encryption is uploaded and is deciphered download and utilizes encryption chip to realize, and encryption chip runs enciphering algorithm module.
Compared with the prior art, technical characterstic of the present invention and effect:
The present invention adopts high in the clouds to upload, downloads to obtain mode, thus better can protect the method for personal information in mobile phone, even if mobile phone loss or stolen, personal information also can not be revealed easily.
Accompanying drawing explanation
Fig. 1 is structural representation of the present invention.
Fig. 2 is that user profile encrypts the flow chart uploaded.
Fig. 3 is the flow chart that user profile deciphering is downloaded.
Embodiment
The invention provides the method for personal information protection in a kind of mobile phone, user the information in mobile phone is all or part of can leave high in the clouds in, does not preserve information or do not preserve complete information in mobile phone.When user whenever necessary, directly download from high in the clouds.This process is mainly concerned with the process that download was uploaded and deciphered in a kind of encryption.
The present invention mainly comprises mobile phone and high in the clouds two parts.
User inputs personal information, and mobile phone gathers the personal information of user, adopts cryptographic algorithm encryption, and the information after encryption is sent to high in the clouds, do not preserve information upload in mobile phone by the encrypting module of mobile phone terminal to the personal information of user with a password.When user has the informational needs that will use to download from high in the clouds, relevant search information, after downloading from high in the clouds, the encrypting module of mobile phone terminal can be decrypted to Download Info, after user uses, deletes the personal information (can automatically delete) downloaded.
Wherein, high in the clouds is is account with the cell-phone number of user, and when logging in high in the clouds, cloud system can send a dynamic password to user mobile phone, and user logs in this dynamic password.After mobile phone is lost, report the loss cell-phone number, mobile phone cannot receive cloud system and send dynamic password, and others just cannot log in your high in the clouds, also just cannot check your information.
Wherein, the information of user can be the cell-phone number information, short message, mailbox associated person information, some individual secret files etc. of user.Some information is larger, and some information is smaller.
First mobile phone terminal first can judge that the information that user needs to upload is larger information data, still less information data.For larger user profile data, first use information retrieval and abstraction module according to the keyword of user profile, extract a part of information, upload after it is encrypted.For less user profile data, directly encrypt upload user information.
When user's information upload, the information of required encryption is sent to encrypting module by communication interface by mobile phone, and upon receipt of this information, encrypting module is encrypted this information of user, then uploads.When user downloads required information, the information of download is sent to encrypting module by communication interface by mobile phone, is given the decrypts information downloaded by encrypting module.
Described information retrieval and abstraction module: the keyword needing Extracting Information for reading user, thus extract the partial information in user profile.
Described encrypting module: mainly comprise encryption chip, described encryption chip can be encrypted to user profile by cryptographic algorithm with a password.When user needs from high in the clouds Download Info, encryption chip can give with identical password the decrypts information downloaded.
Described encryption chip mainly comprises enciphering algorithm module.Wherein encryption chip can be LKT4301, USBkey etc.
Described cryptographic algorithm can be one of multiple encryption algorithms such as AES, DES, RSA, ECC or combination.
Wherein enciphering algorithm module: for user profile encryption and decryption.
For the cell-phone number information of user.
Fig. 2 is the flow chart of encryption upload procedure of the present invention, and such as user needs the cell-phone number uploading " Xiao Ming ".
Comprising following steps:
Log in the interface, high in the clouds of mobile phone terminal, click and add cell-phone number, input handset number and the label information " Xiao Ming " corresponding with cell-phone number;
Mobile phone enters encrypted state by communication interface notice encryption chip;
Encryption chip sends information to mobile phone master chip, inputs password by mobile phone display screen prompting user;
The cell-phone number of the codon pair " Xiao Ming " that encryption chip inputs with user is encrypted;
" Xiao Ming " cell-phone number after encryption and " Xiao Ming " this label information one_to_one corresponding upload to high in the clouds.Delete the cell-phone number of " Xiao Ming " in mobile phone
Fig. 3 is the flow chart of deciphering downloading process of the present invention, and such as user needs the cell-phone number downloading " Xiao Ming ".
Comprising following steps:
Log in the interface, high in the clouds of mobile phone terminal, input the label information " Xiao Ming " corresponding with cell-phone number and search for, download the cell-phone number of " Xiao Ming " of the encryption corresponding to label information " Xiao Ming ".
The enciphered message corresponding with label information is sent to encryption chip by communication interface by mobile phone, and notifies that it enters decrypted state.
Encryption chip sends information to mobile phone master chip, inputs password by mobile phone display screen display reminding user;
The cell-phone number of the codon pair " Xiao Ming " that encryption chip inputs with user is decrypted process;
After finishing using, delete the cell-phone number of " Xiao Ming " in mobile phone.
For larger data, we upload to high in the clouds according to after the importance Extraction parts information encryption of information, make the information in mobile phone imperfect, the possibility that reduction information is utilized.

Claims (6)

1. the guard method of personal information in mobile phone, is characterized in that, comprise the steps, leave high in the clouds in all or part of for the information in mobile phone, do not preserve information or do not preserve complete information in mobile phone; When user whenever necessary, directly download from high in the clouds; Deposit, downloading process is the process that download was uploaded and deciphered in encryption.
2. the guard method of personal information in mobile phone as claimed in claim 1, is characterized in that, after the information that deciphering is downloaded uses, by user or automatically delete the information downloaded.
3. the guard method of personal information in mobile phone as claimed in claim 1, is characterized in that, wherein, high in the clouds is is account with the cell-phone number of user, when logging in high in the clouds, cloud system can send a dynamic password to user mobile phone, and user logs in this dynamic password; After mobile phone is lost, report the loss cell-phone number, mobile phone cannot receive cloud system and send dynamic password, and others just cannot the high in the clouds of login user.
4. the guard method of personal information in mobile phone as claimed in claim 1, is characterized in that, the information of user is some the secret files comprising the cell-phone number information of user, short message, mailbox associated person information, individual; First mobile phone terminal first can judge that the information that user needs to upload is larger information data, still less information data; For larger user profile data, first use information retrieval and abstraction module according to the keyword of user profile, extract a part of information, upload after it is encrypted; For less user profile data, directly encrypt upload user information.
5. the guard method of personal information in mobile phone as claimed in claim 4, is characterized in that, described information retrieval and abstraction module: the keyword needing Extracting Information for reading user, thus extracts the partial information in user profile.
6. the guard method of personal information in mobile phone as claimed in claim 1, it is characterized in that, encryption is uploaded and is deciphered download and utilizes encryption chip to realize, and encryption chip runs enciphering algorithm module.
CN201410768312.7A 2014-12-11 2014-12-11 Method for protecting personal information in mobile phone Pending CN104519127A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410768312.7A CN104519127A (en) 2014-12-11 2014-12-11 Method for protecting personal information in mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410768312.7A CN104519127A (en) 2014-12-11 2014-12-11 Method for protecting personal information in mobile phone

Publications (1)

Publication Number Publication Date
CN104519127A true CN104519127A (en) 2015-04-15

Family

ID=52793830

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410768312.7A Pending CN104519127A (en) 2014-12-11 2014-12-11 Method for protecting personal information in mobile phone

Country Status (1)

Country Link
CN (1) CN104519127A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109068318A (en) * 2018-10-08 2018-12-21 重庆邮电大学 The guard method of personal information in a kind of smart phone

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070077925A1 (en) * 2005-09-30 2007-04-05 Fujitsu Limited Mobile terminal with data delete function
CN101119565A (en) * 2007-09-03 2008-02-06 华为技术有限公司 Mobile communications terminal data protection method, system and equipment
CN101606408A (en) * 2007-02-07 2009-12-16 日本电气株式会社 Communication system and communication means
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones
CN103795715A (en) * 2014-01-20 2014-05-14 冯丽娟 Privacy protection method, privacy recovery method and privacy protection system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070077925A1 (en) * 2005-09-30 2007-04-05 Fujitsu Limited Mobile terminal with data delete function
CN101606408A (en) * 2007-02-07 2009-12-16 日本电气株式会社 Communication system and communication means
CN101119565A (en) * 2007-09-03 2008-02-06 华为技术有限公司 Mobile communications terminal data protection method, system and equipment
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones
CN103795715A (en) * 2014-01-20 2014-05-14 冯丽娟 Privacy protection method, privacy recovery method and privacy protection system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109068318A (en) * 2018-10-08 2018-12-21 重庆邮电大学 The guard method of personal information in a kind of smart phone

Similar Documents

Publication Publication Date Title
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
CN100490372C (en) A method for backup and recovery of encryption key
WO2016061899A1 (en) Fingerprint decryption method and device
US9146881B2 (en) Mobile data vault
CN204595860U (en) A kind of memory device encryption bridge
WO2016086788A1 (en) Method and apparatus for encrypting/decrypting data on mobile terminal
CN103023635B (en) A kind of method of information back-up and device
CN103458382A (en) Hardware encryption transmission and storage method and system of mobile phone private short messages
CN105450395A (en) Information encryption and decryption processing method and system
US20130185569A1 (en) Data protection system and method based on cloud storage
CN104052658A (en) Privacy protection system and method based on social network
CN103618607A (en) Method for data security transmission and key exchange
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
CN103559453A (en) Hardware encryption protection method and system for cellphone data
CN111404953A (en) Message encryption method, message decryption method, related devices and related systems
CN104144174B (en) Protect method, user equipment and the server of privacy of user data
CN102572750A (en) Method and terminal for protecting short messages
CN103338106A (en) Methods and devices for ciphering and deciphering file
CN103458101B (en) The hardware encryption storage method of a kind of mobile phone privacy contact person and system
KR101358375B1 (en) Prevention security system and method for smishing
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN103916834A (en) Short message encryption method and system allowing user to have exclusive secret key
CN103945348A (en) Asymmetrical secret key short message encryption method and system
CN105847261B (en) A kind of electronic signature method based on the wireless encryption and decryption of bluetooth
CN107276961A (en) A kind of method and device based on cipher algorithm encryption and ciphertext data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150415