CN106127077A - A kind of method protecting user privacy information and terminal - Google Patents
A kind of method protecting user privacy information and terminal Download PDFInfo
- Publication number
- CN106127077A CN106127077A CN201610519218.7A CN201610519218A CN106127077A CN 106127077 A CN106127077 A CN 106127077A CN 201610519218 A CN201610519218 A CN 201610519218A CN 106127077 A CN106127077 A CN 106127077A
- Authority
- CN
- China
- Prior art keywords
- user
- guest
- operating system
- guest user
- host
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
Abstract
The invention discloses a kind of method protecting user privacy information and terminal, for the unblock screen password that the use user setup that terminal is different is different, mated by the unblock screen password unlocking screen password corresponding with host user and guest user respectively that user is inputted, judge to switch to operating system host user or guest user, when operating system is switched to guest user by host user by needs, perform the first predetermined registration operation, the related data generated operating system when host user carries out file read-write priority assignation, it is hidden processing and system settings data being backed up to the database file of application to be protected, thus realize the encryption to user privacy information.Therefore, when terminal is operated by other people, by performing the first operation so that it is other people can not arbitrarily access the information in terminal and be modified some information, thus protect user's privacy information to be in the terminal not leaked.
Description
Technical field
The present invention relates to communication technical field, in particular, relate to a kind of method protecting user privacy information and end
End.
Background technology
The feature that Android operation system is free with it, open and simple to operate, is widely used in smart mobile phone.
Currently, the function of smart mobile phone is the most complete, and people the most only use as communication tool, more of utilizes intelligence
Can mobile phone see video, play play, navigate, do shopping, chat etc..
People are when using these functions of smart mobile phone, it will usually much application are set to automated log on, such as: micro-
Letter, QQ, Alipay etc..Therefore, when smart mobile phone is lent by other people or lost, other people just can arbitrarily access mobile phone
In any information, and some information can also be modified, thus there is the hidden danger that privacy information is compromised.
Summary of the invention
In view of this, the present invention discloses a kind of method protecting user privacy information and terminal, with realize other people can not
Arbitrarily access the information in terminal and some information be modified, thus protect user's privacy information in the terminal not by
Leakage.
A kind of method protecting user privacy information, including:
Receive the unblock screen password that user is currently entered;
Described unblock screen password is unlocked screen with the first unblock screen password and second pre-seting and storing respectively
Password mates, and to judge to switch to operating system host user or guest user, wherein, described first unlocks screen
Password is corresponding with described host user, and described second unblock screen password is corresponding with described guest user;
When described unblock screen password unlocks screen password match, and the switching of described operating system last time with described second
During to described host user, described operating system is switched to guest user by described host user, and performs the first default behaviour
Making, the related data generated described operating system when described host user is protected, and described first predetermined registration operation includes:
(1) file read-write authority is set, makes described guest user cannot change and delete the number of files of described host user
According to;
(2) database file of the application to be protected chosen described host user in advance is hidden processing, and makes described visitor
People user, when accessing described application to be protected, generates new database file;
(3) system settings data library file is backed up.
Preferably, described first predetermined registration operation also includes:
The preset function being able to carry out the most described host user is hidden.
Preferably, described preset function includes:
Described host user can reduce the setting that described guest user is done, described host user can recover described in treat
Protect the data in the database file of application, and described host user can delete described guest user in operation
The data file generated.
Preferably, described first predetermined registration operation also includes:
Have arranging application the function of different password is set for described host user and described guest user carries out hidden
Hide, and when described operating system switches to described guest user, described application is set only there is described guest user arranges close
The function of code.
Preferably, described first predetermined registration operation also includes:
Record described operating system and switched to the time point of described guest user by described host user.
Preferably, also include:
Record and preserve the setting that described operating system was revised in described guest user, the literary composition increasing and/or revising
Number of packages evidence.
Preferably, unlock on screen password match, and described operating system with described first when described unblock screen password
When once switching to described guest user, also include:
Described operating system is switched to described host user by described guest user, and performs the second predetermined registration operation, right
The related data that described operating system generates when described host user carries out reduction and arranges, and described second predetermined registration operation includes:
(1) record described operating system and switched to the time point of described host user by described guest user, and recover literary composition
Part access limit;
(2) exporting the first information, described first information is used for prompting the user whether in described guest user
The system settings data library file of middle generation reduces, and when receiving the reduction instruction of user's input, recovers described master
The system settings data library file of backup in people user, and delete the described system settings data generated in described guest user
Library file, when receiving the reserve statement of user's input, retains the described system generated in described guest user and arranges number
According to library file;
(3) exporting the second information, described second information is for prompting the user whether to wait to protect described in hiding
The database file protecting application recovers, and when receiving the recovery instruction of user's input, recovers described application to be protected
Database file, and delete the related data library file generated in described guest user, when the reservation receiving user's input
During instruction, it is retained in described guest user the described related data library file generated;
(4) output the 3rd information, described 3rd information is used for prompting the user whether to need to delete described visitor
The data generated in during people user's use, when receiving the deletion instruction of user's input, use described guest described in deletion
The data generated in family, when receiving the reserve statement of user's input, retain the described number generated in described guest user
According to.
Preferably, if the described operating system last time switch to described guest user and revise described second unlock screen close
Code, also includes:
When described unblock screen password mates with amended second unlocking pin, described operating system is switched to institute
Stating guest user, otherwise, export the 4th information, described 4th information is used for pointing out unblock screen password described in user
Input error.
A kind of terminal, including:
Receive unit, for receiving the unblock screen password that user is currently entered;
First matching unit, for close with the first unblock screen pre-seting and storing respectively by described unblock screen password
Code and second unlocks screen password and mates, to judge to switch to operating system host user or guest user, wherein,
Described first unblock screen password is corresponding with described host user, and described second unlocks screen password and described guest user pair
Should;
First switch unit is for unlocking screen password match when described unblock screen password with described second and described
When the operating system last time switches to described host user, described operating system is switched to guest by described host user and uses
Family, and perform the first predetermined registration operation, the related data generated described operating system when described host user is protected, institute
State the first predetermined registration operation to include:
(1) file read-write authority is set, makes described guest user cannot change and delete the number of files of described host user
According to;
(2) database file of the application to be protected chosen described host user in advance is hidden processing, and makes described visitor
People user, when accessing described application to be protected, generates new database file;
(3) system settings data library file is backed up.
Preferably, described first predetermined registration operation also includes:
The preset function being able to carry out the most described host user is hidden.
Preferably, described host user can reduce the setting that described guest user is done, and described host user can be extensive
Data in the database file of described application to be protected, and described host user again can delete described guest user behaviour
The data file generated during work.
Preferably, described first predetermined registration operation also includes:
Have arranging application the function of different password is set for described host user and described guest user carries out hidden
Hide, and when described operating system switches to described guest user, described application is set only there is described guest user arranges close
The function of code.
Preferably, described first predetermined registration operation also includes:
Record described operating system and switched to the time point of described guest user by described host user.
Preferably, also include:
Record storage unit, for record and preserve setting that described operating system revised in described guest user,
Increase and/or the file data of amendment.
Preferably, also include:
Second switch unit is for unlocking screen password match when described unblock screen password with described first and described
When the operating system last time switches to described guest user, described operating system is switched to described owner by described guest user
User, and perform the second predetermined registration operation, the related data generated described operating system when described host user reduces
Arranging, described second predetermined registration operation includes:
(1) record described operating system and switched to the time point of described host user by described guest user, and recover literary composition
Part access limit;
(2) exporting the first information, described first information is used for prompting the user whether in described guest user
The system settings data library file of middle generation reduces, and when receiving the reduction instruction of user's input, recovers described master
The system settings data library file of backup in people user, and delete the described system settings data generated in described guest user
Library file, when receiving the reserve statement of user's input, retains the described system generated in described guest user and arranges number
According to library file;
(3) exporting the second information, described second information is for prompting the user whether to wait to protect described in hiding
The database file protecting application recovers, and when receiving the recovery instruction of user's input, recovers described application to be protected
Database file, and delete the related data library file generated in described guest user, when the reservation receiving user's input
During instruction, it is retained in described guest user the described related data library file generated;
(4) output the 3rd information, described 3rd information is used for prompting the user whether to need to delete described visitor
The data generated in during people user's use, when receiving the deletion instruction of user's input, use described guest described in deletion
The data generated in family, when receiving the reserve statement of user's input, retain the described number generated in described guest user
According to.
Preferably, also include:
Second matching unit, if switch to described guest user for the described operating system last time and revise described second
Unlock screen password, then when described unblock screen password mates with amended second unlocking pin, by described operating system
Switching to described guest user, otherwise, export the 4th information, described 4th information is used for pointing out unblock described in user
Screen Password Input mistake.
From above-mentioned technical scheme it can be seen that the invention discloses a kind of method protecting user privacy information and end
End, the use user (include host user and guest user) different for terminal arranges different unblock screen passwords, passes through
The unblock screen password unlocking screen password corresponding with host user and guest user respectively user inputted mates, and sentences
Break and operating system is switched to host user or guest user, use when operating system is switched to guest by host user by needs
During family, performing the first predetermined registration operation, the related data generated operating system when host user carries out file read-write authority and sets
Put, be hidden the database file of application to be protected processing and system settings data being backed up, thus realize right
The encryption of user privacy information.Therefore, when terminal is operated by other people, by what operating system was generated when host user
Related data carries out file read-write priority assignation, database file to application to be protected is hidden processing and setting system
Put data to back up so that it is other people can not arbitrarily access the information in terminal and be modified some information, thus protect
Protect user's privacy information in the terminal to be not leaked.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this
Inventive embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to according to
Disclosed accompanying drawing obtains other accompanying drawing.
Fig. 1 is a kind of method flow diagram protecting user privacy information disclosed in the embodiment of the present invention;
Fig. 2 is the structural representation of a kind of terminal disclosed in the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise
Embodiment, broadly falls into the scope of protection of the invention.
The embodiment of the invention discloses a kind of method protecting user privacy information and terminal, with realize other people can not be with
Meaning accesses the information in terminal and is modified some information, thus protects user's privacy information in the terminal not let out
Leakage.
Seeing Fig. 1, a kind of method flow diagram protecting user privacy information disclosed in the embodiment of the present invention, the method includes
Step:
The unblock screen password that step S11, reception user are currently entered;
Wherein, unlocking screen password can be the password being made up of numeral and/or letter, or screen sliding gesture pattern.
Step S12, by described unblock screen password respectively with pre-set and store first unblock screen password and second
Unlock screen password to mate, to judge to switch to operating system host user or guest user;
Wherein, described first unblock screen password is corresponding with described host user, and described second unlocks screen password and institute
State guest user corresponding.
It should be noted that host user (i.e. user user) refers to Terminal owner.
Guest user (i.e. guest user) refers to other people beyond Terminal owner.
Step S13, unlock on screen password match, and described operating system with described second when described unblock screen password
When once switching to described host user, described operating system is switched to guest user by described host user, and performs
One predetermined registration operation, the related data generated described operating system when described host user protects, and described first presets
Operation includes:
(1) file read-write authority is set, makes described guest user cannot change and delete the number of files of described host user
According to;
(2) database file of the application to be protected chosen described host user in advance is hidden processing, and makes described visitor
People user, when accessing described application to be protected, generates new database file;
Concrete, in actual applications, arranging of terminal, application (Setting) can arrange " a secret protection
List ", when operating system switches to host user, the database file of application to be protected can be added to by host user
" secret protection list ", when operating system is switched to guest user by host user, to adding in " secret protection list "
The database file of application to be protected be hidden processing, make guest user when accessing these application to be protected, it is impossible to obtain
Take any data that host user stores in this application to be protected, thus reach to protect the purpose of privacy of user.
Illustrating, when guest user opens " note application ", guest user can't see any information;Work as guest user
When opening " wechat application ", " wechat application " will not automated log on, guest user need to input new username and password.
Wherein it is possible to use the database file to application to be protected to carry out renaming process realization to application to be protected
The hiding process of database file, currently can also use other hiding processing mode, and the present invention does not limits at this.
(3) system settings data library file is backed up.
It should be noted that to the purpose of system settings data library file backup be: when system settings data library file quilt
After guest user change, when operating system switches to host user again, host user can be according to Backup Data to system
The data arranged in database file are reduced, thus ensure that host user's data in the terminal are not repaiied by guest user
Change.
In summary it can be seen, the method for protection user privacy information disclosed by the invention, the use different for terminal is used
Family (including host user and guest user) arranges different unblock screen passwords, by unblock screen password user inputted
Unblock screen password corresponding with host user and guest user respectively mates, it is judged that operating system switches to owner and uses
Family or guest user, when operating system is switched to guest user by host user by needs, perform the first predetermined registration operation, right
The related data that operating system generates when host user carries out file read-write priority assignation, data library text to application to be protected
Part is hidden processing and backing up system settings data, thus realizes the encryption to user privacy information.Therefore, when
When terminal is operated by other people, carry out file read-write authority by the related data that operating system is generated when host user and set
Put, be hidden the database file of application to be protected processing and system settings data being backed up so that it is other people are not
Can arbitrarily access the information in terminal and some information is modified, thus protecting user's privacy information in the terminal not
It is compromised.
Wherein, the unblock screen password and first being currently entered as user unlocks screen password and second and unlocks screen password
When not mating, showing that the unblock screen password that user is currently entered is bad password, now terminal can export information, with
The unblock screen code error that prompting user is currently entered.
For avoiding when operating system switches to guest user, guest user finds host user's distinctive execution function,
The first predetermined registration operation in above-described embodiment can also include:
The preset function being able to carry out only host user is hidden.
Wherein, preset function includes: (1) host user can reduce the setting that guest user is done;(2) host user's energy
Enough recover the data in the database file of application to be protected;(3) host user can delete guest user in operation
The data file generated.
Knowable to above-described embodiment, the present invention is directed to host user and guest user is provided with different operating rights, and
Host user and guest user are arranged different unblock screen passwords, is divided by the unblock screen password that user is currently entered
Do not unlock screen password with first and the second unblock screen password mates, determine and operating system is switched to host user also
It it is guest user.Application is set for avoiding guest user to find there is the merit arranging different password for host user and guest user
Can, the first predetermined registration operation in above-described embodiment can also include:
Have arranging application the function of different password is set for host user and guest user is hidden, and as behaviour
When system switches to guest user, application is set and only there is guest user the function of password is set.
For optimizing above-described embodiment further, the first predetermined registration operation can also include:
Record operating system is switched to the time point of guest user by host user.
In summary, when operating system is switched to guest user (guest user) by host user (user user), first
First, guest user can access any application in terminal, but (such as, note is applied, led to for hiding application to be protected
Words record, memorandum etc.), guest user can't see any data preserved in application to be protected;Secondly, for needing login
Application (such as Alipay, Taobao, QQ, wechat), when operating system switches to guest user, when host user, storage should
Being hidden with login account and password, guest user need to re-enter username and password;Again, when guest user is changed or deletes
During except the file data preserved in host user, information can be exported, this information be used for pointing out guest user without
Authority change or deletion this document data.
Wherein, the associative operation that guest user is carried out can also be preserved by the present invention, to facilitate host user to check.
Therefore, for optimizing above-described embodiment further, it is also possible to include step:
Record and preserve the setting that operating system was revised in guest user, the file data increasing and/or revising.
It is understood that when operating system is switched to host user by host user, operating system is switched to main
The related data generated during people user does not carry out any process.
It should be noted that when the operating system last time switches to guest user, when this still switches to guest user,
If last guest user unlocks screen password to second carried out amendment, then only when user is at the unblock screen being currently entered
When password unlocks screen password match with the second of amendment, just operating system can be switched to guest user, otherwise output the 4th
Information, the 4th information is for pointing out user the unblock screen Password Input mistake being currently entered.
Wherein, if the unblock screen password being currently entered and first unlocks screen password match, and operating system is last
When switching to guest user, for optimizing further Fig. 1 disclosed embodiment, it is also possible to include step:
Operating system is switched to host user by guest user, and performs the second predetermined registration operation, to described operating system
The related data generated when described host user carries out reduction and arranges, and described second predetermined registration operation includes:
(1) record described operating system and switched to the time point of described host user by described guest user, and recover literary composition
Part access limit;
(2) exporting the first information, described first information is used for prompting the user whether in described guest user
The system settings data library file of middle generation reduces, and when receiving the reduction instruction of user's input, recovers described master
The system settings data library file of backup in people user, and delete the described system settings data generated in described guest user
Library file, when receiving the reserve statement of user's input, retains the described system generated in described guest user and arranges number
According to library file;
Wherein, if the system settings data library file generated in guest user is deleted by host user, and need also
Former in guest user generate system settings data library file time, host user can by arrange application " reduction guest
User is arranged " function be configured application restoring operation.
(3) exporting the second information, described second information is for prompting the user whether to wait to protect described in hiding
The database file protecting application recovers, and when receiving the recovery instruction of user's input, recovers described application to be protected
Database file, and delete the related data library file generated in described guest user, when the reservation receiving user's input
During instruction, it is retained in described guest user the described related data library file generated;
Wherein, host user can utilize " recovering the data of application in secret protection list object " of arranging application next right
The database file of application to be protected recovers.
(4) output the 3rd information, described 3rd information is used for prompting the user whether to need to delete described visitor
The data that people user generates during using, when receiving the deletion instruction of user's input, delete described in described guest user
The data of middle generation, when receiving the reserve statement of user's input, retain the described data generated in described guest user.
It should be noted that in the present embodiment, after operating system is switched to host user by guest user, can export and carry
Show that the data that information generates the need of deletion action system for pointing out host user in guest user (including: system sets
Put the data generated during database file, the database file of application to be protected and guest user use), avoid with this
The accumulation of garbage files in operating system, the memory space of release terminal.
Wherein, in above-described embodiment, each information all can show with the form of dialog box.
Corresponding with said method embodiment, the invention also discloses a kind of terminal.
See Fig. 2, the structural representation of a kind of terminal disclosed in the embodiment of the present invention, this terminal includes:
Receive unit 21, for receiving the unblock screen password that user is currently entered;
Wherein, unlocking screen password can be the password being made up of numeral and/or letter, or screen sliding gesture pattern.
First matching unit 22, for unlocking screen with first pre-seting and storing respectively by described unblock screen password
Password and second unlocks screen password and mates, to judge to switch to operating system host user or guest user, its
In, described first unblock screen password is corresponding with described host user, and described second unlocks screen password and described guest user
Corresponding;
First switch unit 23, for unlocking screen password match, and institute when described unblock screen password with described second
State the operating system last time when switching to described host user, described operating system is switched to guest by described host user and uses
Family, and perform the first predetermined registration operation, the related data generated described operating system when described host user is protected, institute
State the first predetermined registration operation to include:
(1) file read-write authority is set, makes described guest user cannot change and delete the number of files of described host user
According to;
(2) database file of the application to be protected chosen described host user in advance is hidden processing, and makes described visitor
People user, when accessing described application to be protected, generates new database file;
Concrete, in actual applications, arranging of terminal, application (Setting) can arrange " a secret protection
List ", when operating system switches to host user, the database file of application to be protected can be added to by host user
" secret protection list ", when operating system is switched to guest user by host user, to adding in " secret protection list "
The database file of application to be protected be hidden processing, make guest user when accessing these application to be protected, it is impossible to obtain
Take any data that host user stores in this application to be protected, thus reach to protect the purpose of privacy of user.
Illustrating, when guest user opens " note application ", guest user can't see any information;Work as guest user
When opening " wechat application ", " wechat application " will not automated log on, guest user need to input new username and password.
Wherein it is possible to use the database file to application to be protected to carry out renaming process realization to application to be protected
The hiding process of database file, currently can also use other hiding processing mode, and the present invention does not limits at this.
(3) system settings data library file is backed up.
It should be noted that to the purpose of system settings data library file backup be: when system settings data library file quilt
After guest user change, when operating system switches to host user again, host user can be according to Backup Data to system
The data arranged in database file are reduced, thus ensure that host user's data in the terminal are not repaiied by guest user
Change.
In summary it can be seen, terminal disclosed by the invention, (include that host user and guest use for different use users
Family) different unblock screen passwords is set, used with host user and guest respectively by the unblock screen password that user is inputted
Unblock screen password corresponding to family mates, it is judged that operating system switches to host user or guest user, works as needs
When operating system is switched to guest user by host user, perform the first predetermined registration operation, to operating system when host user
The related data generated carries out file read-write priority assignation, database file to application to be protected is hidden processing and right
System settings data backs up, thus realizes the encryption to user privacy information.Therefore, when terminal is operated by other people,
File read-write priority assignation, number to application to be protected is carried out by the related data that operating system is generated when host user
It is hidden processing and system settings data being backed up according to library file so that it is other people can not arbitrarily access the letter in terminal
Cease and some information is modified, thus protecting user's privacy information to be in the terminal not leaked.
Wherein, the unblock screen password and first being currently entered as user unlocks screen password and second and unlocks screen password
When not mating, showing that the unblock screen password that user is currently entered is bad password, now terminal can export information, with
The unblock screen code error that prompting user is currently entered.
For avoiding when operating system switches to guest user, guest user finds host user's distinctive execution function,
The first predetermined registration operation in above-described embodiment can also include:
The preset function being able to carry out only host user is hidden.
Wherein, preset function includes: (1) host user can reduce the setting that guest user is done;(2) host user's energy
Enough recover the data in the database file of application to be protected;(3) host user can delete guest user in operation
The data file generated.
Knowable to above-described embodiment, the present invention is directed to host user and guest user is provided with different operating rights, and
Host user and guest user are arranged different unblock screen passwords, is divided by the unblock screen password that user is currently entered
Do not unlock screen password with first and the second unblock screen password mates, determine and operating system is switched to host user also
It it is guest user.Application is set for avoiding guest user to find there is the merit arranging different password for host user and guest user
Can, the first predetermined registration operation in above-described embodiment can also include:
Have arranging application the function of different password is set for host user and guest user is hidden, and as behaviour
When system switches to guest user, application is set and only there is guest user the function of password is set.
For optimizing above-described embodiment further, the first predetermined registration operation can also include:
Record operating system is switched to the time point of guest user by host user.
In summary, when operating system is switched to guest user (guest user) by host user (user user), first
First, guest user can access any application in terminal, but (such as, note is applied, led to for hiding application to be protected
Words record, memorandum etc.), guest user can't see any data preserved in application to be protected;Secondly, for needing login
Application (such as Alipay, Taobao, QQ, wechat), when operating system switches to guest user, when host user, storage should
Being hidden with login account and password, guest user need to re-enter username and password;Again, when guest user is changed or deletes
During except the file data preserved in host user, information can be exported, this information be used for pointing out guest user without
Authority change or deletion this document data.
Wherein, the associative operation that guest user is carried out can also be preserved by the present invention, to facilitate host user to check.
Therefore, for optimizing above-described embodiment further, it is also possible to including:
Record storage unit, for record and preserve setting that described operating system revised in described guest user,
Increase and/or the file data of amendment.
It is understood that when operating system is switched to host user by host user, operating system is switched to main
The related data generated during people user does not carry out any process.
It should be noted that when the operating system last time switches to guest user, when this still switches to guest user,
If last guest user unlocks screen password to second carried out amendment, then only when user is at the unblock screen being currently entered
When password unlocks screen password match with the second of amendment, just operating system can be switched to guest user.
Therefore, for optimizing above-described embodiment further, terminal can also include:
Second matching unit, if switch to described guest user for the described operating system last time and revise described second
Unlock screen password, then when described unblock screen password mates with amended second unlocking pin, by described operating system
Switching to described guest user, otherwise, export the 4th information, described 4th information is used for pointing out unblock described in user
Screen Password Input mistake.
Wherein, if the unblock screen password being currently entered and first unlocks screen password match, and operating system is last
When switching to guest user, for optimizing Fig. 2 disclosed embodiment further, terminal can also include:
Second switch unit is for unlocking screen password match when described unblock screen password with described first and described
When the operating system last time switches to described guest user, described operating system is switched to described owner by described guest user
User, and perform the second predetermined registration operation, the related data generated described operating system when described host user reduces
Arranging, described second predetermined registration operation includes:
(1) record described operating system and switched to the time point of described host user by described guest user, and recover literary composition
Part access limit;
(2) exporting the first information, described first information is used for prompting the user whether in described guest user
The system settings data library file of middle generation reduces, and when receiving the reduction instruction of user's input, recovers described master
The system settings data library file of backup in people user, and delete the described system settings data generated in described guest user
Library file, when receiving the reserve statement of user's input, retains the described system generated in described guest user and arranges number
According to library file;
Wherein, if the system settings data library file generated in guest user is deleted by host user, and need also
Former in guest user generate system settings data library file time, host user can by arrange application " reduction guest
User is arranged " function be configured application restoring operation.
(3) exporting the second information, described second information is for prompting the user whether to wait to protect described in hiding
The database file protecting application recovers, and when receiving the recovery instruction of user's input, recovers described application to be protected
Database file, and delete the related data library file generated in described guest user, when the reservation receiving user's input
During instruction, it is retained in described guest user the described related data library file generated;
Wherein, host user can utilize " recovering the data of application in secret protection list object " of arranging application next right
The database file of application to be protected recovers.
(4) output the 3rd information, described 3rd information is used for prompting the user whether to need to delete described visitor
The data generated in during people user's use, when receiving the deletion instruction of user's input, use described guest described in deletion
The data generated in family, when receiving the reserve statement of user's input, retain the described number generated in described guest user
According to.
It should be noted that in the present embodiment, after operating system is switched to host user by guest user, can export and carry
Show that the data that information generates the need of deletion action system for pointing out host user in guest user (including: system sets
Put the data generated during database file, the database file of application to be protected and guest user use), avoid with this
The accumulation of garbage files in operating system, the memory space of release terminal.
It should be noted that the specific works principle of each ingredient in device embodiment, refer to embodiment of the method pair
Should part, the present invention does not limits at this.
Finally, in addition it is also necessary to explanation, in this article, the relational terms of such as first and second or the like be used merely to by
One entity or operation separate with another entity or operating space, and not necessarily require or imply these entities or operation
Between exist any this reality relation or order.And, term " includes ", " comprising " or its any other variant meaning
Containing comprising of nonexcludability, so that include that the process of a series of key element, method, article or equipment not only include that
A little key elements, but also include other key elements being not expressly set out, or also include for this process, method, article or
The key element that equipment is intrinsic.In the case of there is no more restriction, statement " including ... " key element limited, do not arrange
Except there is also other identical element in including the process of described key element, method, article or equipment.
In this specification, each embodiment uses the mode gone forward one by one to describe, and what each embodiment stressed is and other
The difference of embodiment, between each embodiment, identical similar portion sees mutually.
Described above to the disclosed embodiments, makes professional and technical personnel in the field be capable of or uses the present invention.
Multiple amendment to these embodiments will be apparent from for those skilled in the art, as defined herein
General Principle can realize without departing from the spirit or scope of the present invention in other embodiments.Therefore, the present invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and principles disclosed herein and features of novelty phase one
The widest scope caused.
Claims (16)
1. the method protecting user privacy information, it is characterised in that including:
Receive the unblock screen password that user is currently entered;
Described unblock screen password is unlocked screen password with the first unblock screen password and second pre-seting and storing respectively
Mating, to judge to switch to operating system host user or guest user, wherein, described first unlocks screen password
Corresponding with described host user, described second unblock screen password is corresponding with described guest user;
When described unblock screen password unlocks screen password match with described second, and the described operating system last time switches to institute
When stating host user, described operating system is switched to guest user by described host user, and performs the first predetermined registration operation, right
The related data that described operating system generates when described host user is protected, and described first predetermined registration operation includes:
(1) file read-write authority is set, makes described guest user cannot change and delete the file data of described host user;
(2) database file of the application to be protected chosen described host user in advance is hidden processing, and makes described guest use
Family, when accessing described application to be protected, generates new database file;
(3) system settings data library file is backed up.
Method the most according to claim 1, it is characterised in that described first predetermined registration operation also includes:
The preset function being able to carry out the most described host user is hidden.
Method the most according to claim 2, it is characterised in that described preset function includes:
Described host user can reduce the setting that described guest user is done, and described host user can recover described to be protected
Data in the database file of application, and described host user can delete described guest user and generate in operation
Data file.
Method the most according to claim 1, it is characterised in that described first predetermined registration operation also includes:
Have arranging application the function of different password is set for described host user and described guest user is hidden, and
When described operating system switches to described guest user, described application is set only there is described guest user the merit of password is set
Energy.
Method the most according to claim 1, it is characterised in that described first predetermined registration operation also includes:
Record described operating system and switched to the time point of described guest user by described host user.
Method the most according to claim 1, it is characterised in that also include:
Record and preserve the setting that described operating system was revised in described guest user, the number of files increasing and/or revising
According to.
Method the most according to claim 1, it is characterised in that when described unblock screen password unlocks screen with described first
Password match, and when the described operating system last time switches to described guest user, also include:
Described operating system is switched to described host user by described guest user, and performs the second predetermined registration operation, to described
The related data that operating system generates when described host user carries out reduction and arranges, and described second predetermined registration operation includes:
(1) record described operating system and switched to the time point of described host user by described guest user, and recover file reading
Write permission;
(2) exporting the first information, described first information is used for prompting the user whether raw in described guest user
The system settings data library file become reduces, and when receiving the reduction instruction of user's input, recovers to use described owner
The system settings data library file of backup in family, and delete the described system settings data library text generated in described guest user
Part, when receiving the reserve statement of user's input, retains the described system settings data storehouse generated in described guest user
File;
(3) export the second information, described second information for prompt the user whether to hiding described to be protected should
Database file recover, when receive user input recovery instruction time, recover the data of described application to be protected
Library file, and delete the related data library file generated in described guest user, when the reserve statement receiving user's input
Time, it is retained in described guest user the described related data library file generated;
(4) output the 3rd information, described 3rd information is used for prompting the user whether to need to delete to use described guest
The data generated in during the use of family, when receiving the deletion instruction of user's input, deletion is described in described guest user
The data generated, when receiving the reserve statement of user's input, retain the described data generated in described guest user.
Method the most according to claim 1, it is characterised in that if the described operating system last time switch to described guest use
Described second unblock screen password is also revised in family, also includes:
When described unblock screen password mates with amended second unlocking pin, described operating system is switched to described visitor
People user, otherwise, exports the 4th information, and described 4th information is used for pointing out unblock screen Password Input described in user
Mistake.
9. a terminal, it is characterised in that including:
Receive unit, for receiving the unblock screen password that user is currently entered;
First matching unit, for by described unblock screen password respectively with pre-set and store first unblock screen password and
Second unlocks screen password mates, to judge to switch to operating system host user or guest user, wherein, described
First unblock screen password is corresponding with described host user, and described second unblock screen password is corresponding with described guest user;
First switch unit, for unlocking screen password match, and described operation when described unblock screen password with described second
When the system last time switches to described host user, described operating system is switched to guest user by described host user, and
Performing the first predetermined registration operation, the related data generated described operating system when described host user is protected, and described
One predetermined registration operation includes:
(1) file read-write authority is set, makes described guest user cannot change and delete the file data of described host user;
(2) database file of the application to be protected chosen described host user in advance is hidden processing, and makes described guest use
Family, when accessing described application to be protected, generates new database file;
(3) system settings data library file is backed up.
Terminal the most according to claim 9, it is characterised in that described first predetermined registration operation also includes:
The preset function being able to carry out the most described host user is hidden.
11. terminals according to claim 10, it is characterised in that described host user can reduce described guest user institute
The setting done, described host user can recover the data in the database file of described application to be protected, and described owner
User can delete the data file that described guest user generates in operation.
12. terminals according to claim 9, it is characterised in that described first predetermined registration operation also includes:
Have arranging application the function of different password is set for described host user and described guest user is hidden, and
When described operating system switches to described guest user, described application is set only there is described guest user the merit of password is set
Energy.
13. terminals according to claim 9, it is characterised in that described first predetermined registration operation also includes:
Record described operating system and switched to the time point of described guest user by described host user.
14. terminals according to claim 9, it is characterised in that also include:
Record storage unit, for recording and preserve setting, the increase that described operating system was revised in described guest user
And/or the file data of amendment.
15. terminals according to claim 9, it is characterised in that also include:
Second switch unit, for unlocking screen password match, and described operation when described unblock screen password with described first
When the system last time switches to described guest user, described operating system is switched to described owner by described guest user and uses
Family, and perform the second predetermined registration operation, the related data generated described operating system when described host user carries out reduction and sets
Putting, described second predetermined registration operation includes:
(1) record described operating system and switched to the time point of described host user by described guest user, and recover file reading
Write permission;
(2) exporting the first information, described first information is used for prompting the user whether raw in described guest user
The system settings data library file become reduces, and when receiving the reduction instruction of user's input, recovers to use described owner
The system settings data library file of backup in family, and delete the described system settings data library text generated in described guest user
Part, when receiving the reserve statement of user's input, retains the described system settings data storehouse generated in described guest user
File;
(3) export the second information, described second information for prompt the user whether to hiding described to be protected should
Database file recover, when receive user input recovery instruction time, recover the data of described application to be protected
Library file, and delete the related data library file generated in described guest user, when the reserve statement receiving user's input
Time, it is retained in described guest user the described related data library file generated;
(4) output the 3rd information, described 3rd information is used for prompting the user whether to need to delete to use described guest
The data generated in during the use of family, when receiving the deletion instruction of user's input, deletion is described in described guest user
The data generated, when receiving the reserve statement of user's input, retain the described data generated in described guest user.
16. terminals according to claim 9, it is characterised in that also include:
Second matching unit, if switching to described guest user for the described operating system last time and revising described second unblock
Screen password, then, when described unblock screen password mates with amended second unlocking pin, switch described operating system
To described guest user, otherwise, exporting the 4th information, described 4th information is used for pointing out unblock screen described in user
Password Input mistake.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610519218.7A CN106127077B (en) | 2016-06-30 | 2016-06-30 | A kind of method and terminal for protecting user privacy information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610519218.7A CN106127077B (en) | 2016-06-30 | 2016-06-30 | A kind of method and terminal for protecting user privacy information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106127077A true CN106127077A (en) | 2016-11-16 |
CN106127077B CN106127077B (en) | 2019-04-23 |
Family
ID=57468332
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610519218.7A Active CN106127077B (en) | 2016-06-30 | 2016-06-30 | A kind of method and terminal for protecting user privacy information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106127077B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106506786A (en) * | 2016-12-27 | 2017-03-15 | 努比亚技术有限公司 | The terminal and method of protection user privacy information |
CN106599678A (en) * | 2016-12-05 | 2017-04-26 | 北京小米移动软件有限公司 | Screen unlocking method and equipment |
CN107355140A (en) * | 2017-08-31 | 2017-11-17 | 浙江蚂蚁精密科技有限公司 | A kind of Inner door lock for caring about privacy of user |
CN108521511A (en) * | 2018-03-30 | 2018-09-11 | 联想(北京)有限公司 | Information processing method, device and electronic equipment |
CN108540654A (en) * | 2018-03-22 | 2018-09-14 | 维沃移动通信有限公司 | A kind of operating method and mobile terminal of mobile terminal |
CN108810268A (en) * | 2018-06-04 | 2018-11-13 | 珠海格力电器股份有限公司 | The treating method and apparatus of operation note |
CN111459784A (en) * | 2020-04-08 | 2020-07-28 | 广州三星通信技术研究有限公司 | Terminal operation processing method and device |
CN112306563A (en) * | 2020-11-03 | 2021-02-02 | 深圳软牛科技有限公司 | Method, device, equipment and storage medium for resetting IOS screen use time password |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008065692A (en) * | 2006-09-08 | 2008-03-21 | Toshiba Corp | Portable telephone set |
CN101282535A (en) * | 2008-05-16 | 2008-10-08 | 中兴通讯股份有限公司 | Method and apparatus for protecting mobile terminal private information |
CN102215237A (en) * | 2011-06-16 | 2011-10-12 | 武汉桃杏网络科技有限责任公司 | Implementation method for grade-based passive registered real-name alumni service |
CN103488924A (en) * | 2013-09-26 | 2014-01-01 | 小米科技有限责任公司 | Terminal unlocking processing method, device and equipment |
CN103699830A (en) * | 2013-12-30 | 2014-04-02 | 中科创达软件股份有限公司 | Operating system unlocking method and operating system unlocking device |
CN104134024A (en) * | 2014-07-24 | 2014-11-05 | 广东欧珀移动通信有限公司 | Mobile terminal privacy protection method and system |
CN104301539A (en) * | 2014-10-21 | 2015-01-21 | 四川盟宝实业有限公司 | Information protecting method |
CN105279423A (en) * | 2014-06-12 | 2016-01-27 | 中兴通讯股份有限公司 | Password management method and password management device |
US20160070777A1 (en) * | 2014-09-04 | 2016-03-10 | Visual Mobile Technologies, Inc. | System and method for content collection, cataloging, and collaboration |
-
2016
- 2016-06-30 CN CN201610519218.7A patent/CN106127077B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008065692A (en) * | 2006-09-08 | 2008-03-21 | Toshiba Corp | Portable telephone set |
CN101282535A (en) * | 2008-05-16 | 2008-10-08 | 中兴通讯股份有限公司 | Method and apparatus for protecting mobile terminal private information |
CN102215237A (en) * | 2011-06-16 | 2011-10-12 | 武汉桃杏网络科技有限责任公司 | Implementation method for grade-based passive registered real-name alumni service |
CN103488924A (en) * | 2013-09-26 | 2014-01-01 | 小米科技有限责任公司 | Terminal unlocking processing method, device and equipment |
CN103699830A (en) * | 2013-12-30 | 2014-04-02 | 中科创达软件股份有限公司 | Operating system unlocking method and operating system unlocking device |
CN105279423A (en) * | 2014-06-12 | 2016-01-27 | 中兴通讯股份有限公司 | Password management method and password management device |
CN104134024A (en) * | 2014-07-24 | 2014-11-05 | 广东欧珀移动通信有限公司 | Mobile terminal privacy protection method and system |
US20160070777A1 (en) * | 2014-09-04 | 2016-03-10 | Visual Mobile Technologies, Inc. | System and method for content collection, cataloging, and collaboration |
CN104301539A (en) * | 2014-10-21 | 2015-01-21 | 四川盟宝实业有限公司 | Information protecting method |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106599678A (en) * | 2016-12-05 | 2017-04-26 | 北京小米移动软件有限公司 | Screen unlocking method and equipment |
CN106599678B (en) * | 2016-12-05 | 2019-08-30 | 北京小米移动软件有限公司 | Unlocking screen method and apparatus |
CN106506786A (en) * | 2016-12-27 | 2017-03-15 | 努比亚技术有限公司 | The terminal and method of protection user privacy information |
CN107355140A (en) * | 2017-08-31 | 2017-11-17 | 浙江蚂蚁精密科技有限公司 | A kind of Inner door lock for caring about privacy of user |
CN108540654A (en) * | 2018-03-22 | 2018-09-14 | 维沃移动通信有限公司 | A kind of operating method and mobile terminal of mobile terminal |
WO2019179312A1 (en) * | 2018-03-22 | 2019-09-26 | 维沃移动通信有限公司 | Mobile terminal operation method and mobile terminal |
CN108521511A (en) * | 2018-03-30 | 2018-09-11 | 联想(北京)有限公司 | Information processing method, device and electronic equipment |
CN108810268A (en) * | 2018-06-04 | 2018-11-13 | 珠海格力电器股份有限公司 | The treating method and apparatus of operation note |
CN111459784A (en) * | 2020-04-08 | 2020-07-28 | 广州三星通信技术研究有限公司 | Terminal operation processing method and device |
CN112306563A (en) * | 2020-11-03 | 2021-02-02 | 深圳软牛科技有限公司 | Method, device, equipment and storage medium for resetting IOS screen use time password |
CN112306563B (en) * | 2020-11-03 | 2023-11-17 | 深圳软牛科技有限公司 | Method, device, equipment and storage medium for resetting IOS screen using time password |
Also Published As
Publication number | Publication date |
---|---|
CN106127077B (en) | 2019-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106127077B (en) | A kind of method and terminal for protecting user privacy information | |
CN102254124B (en) | A kind of information of mobile terminal security protection system and method | |
CN103902862A (en) | Mobile device management method and device and mobile device | |
US7257717B2 (en) | Method with the functions of virtual space and data encryption and invisibility | |
CN102043927B (en) | Data divulgence protection method for computer system | |
CN103106372A (en) | Lightweight class privacy data encryption method and system for Android system | |
CN100446024C (en) | Protection method and system of electronic document | |
CN103366107A (en) | Method, device and mobile phone for protecting access permission of application program | |
CN101533452B (en) | Method for protecting cipher of USB interface | |
CN103366797A (en) | Design method of security U disk by employing wireless authentication terminal for authorizing authentication, encryption and decryption | |
CN101916342A (en) | Secure mobile storage device and method for realizing secure data exchange by using same | |
CN104267982A (en) | Application program start control system and method | |
CN104573536A (en) | File protection method and device | |
CN105025165A (en) | Interface unlocking method and system corresponding to multiple passwords | |
JP2019531564A (en) | Method and system for blocking phishing or ransomware attacks | |
CN103390125A (en) | Design method for safe and mobile storage controller authorized and encrypted/decrypted by wireless terminal | |
CN103577732A (en) | Information processing method and device and electronic device | |
CN105224194B (en) | A kind of data processing method and terminal | |
JP6231504B2 (en) | Method, apparatus and mobile terminal for information security management of mobile terminal | |
CN103198247A (en) | Computer safety protection method and computer safety protection system | |
CN103324874A (en) | Verification method and electronic device | |
CN105094652A (en) | Touch screen unlocking method and device, electronic equipment, display and mobile terminal | |
CN104361297B (en) | A kind of file encryption-decryption method based on (SuSE) Linux OS | |
CN101271507B (en) | File hiding method, system and device based on USB equipment | |
CN103049705A (en) | Virtualization based method, terminal and system for secure storage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |