CN106127077A - A kind of method protecting user privacy information and terminal - Google Patents

A kind of method protecting user privacy information and terminal Download PDF

Info

Publication number
CN106127077A
CN106127077A CN201610519218.7A CN201610519218A CN106127077A CN 106127077 A CN106127077 A CN 106127077A CN 201610519218 A CN201610519218 A CN 201610519218A CN 106127077 A CN106127077 A CN 106127077A
Authority
CN
China
Prior art keywords
user
guest
operating system
guest user
host
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610519218.7A
Other languages
Chinese (zh)
Other versions
CN106127077B (en
Inventor
肖雷
万永川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU THUNDERSOFT SOFTWARE TECHNOLOGY Co Ltd
Original Assignee
CHENGDU THUNDERSOFT SOFTWARE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU THUNDERSOFT SOFTWARE TECHNOLOGY Co Ltd filed Critical CHENGDU THUNDERSOFT SOFTWARE TECHNOLOGY Co Ltd
Priority to CN201610519218.7A priority Critical patent/CN106127077B/en
Publication of CN106127077A publication Critical patent/CN106127077A/en
Application granted granted Critical
Publication of CN106127077B publication Critical patent/CN106127077B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones

Abstract

The invention discloses a kind of method protecting user privacy information and terminal, for the unblock screen password that the use user setup that terminal is different is different, mated by the unblock screen password unlocking screen password corresponding with host user and guest user respectively that user is inputted, judge to switch to operating system host user or guest user, when operating system is switched to guest user by host user by needs, perform the first predetermined registration operation, the related data generated operating system when host user carries out file read-write priority assignation, it is hidden processing and system settings data being backed up to the database file of application to be protected, thus realize the encryption to user privacy information.Therefore, when terminal is operated by other people, by performing the first operation so that it is other people can not arbitrarily access the information in terminal and be modified some information, thus protect user's privacy information to be in the terminal not leaked.

Description

A kind of method protecting user privacy information and terminal
Technical field
The present invention relates to communication technical field, in particular, relate to a kind of method protecting user privacy information and end End.
Background technology
The feature that Android operation system is free with it, open and simple to operate, is widely used in smart mobile phone. Currently, the function of smart mobile phone is the most complete, and people the most only use as communication tool, more of utilizes intelligence Can mobile phone see video, play play, navigate, do shopping, chat etc..
People are when using these functions of smart mobile phone, it will usually much application are set to automated log on, such as: micro- Letter, QQ, Alipay etc..Therefore, when smart mobile phone is lent by other people or lost, other people just can arbitrarily access mobile phone In any information, and some information can also be modified, thus there is the hidden danger that privacy information is compromised.
Summary of the invention
In view of this, the present invention discloses a kind of method protecting user privacy information and terminal, with realize other people can not Arbitrarily access the information in terminal and some information be modified, thus protect user's privacy information in the terminal not by Leakage.
A kind of method protecting user privacy information, including:
Receive the unblock screen password that user is currently entered;
Described unblock screen password is unlocked screen with the first unblock screen password and second pre-seting and storing respectively Password mates, and to judge to switch to operating system host user or guest user, wherein, described first unlocks screen Password is corresponding with described host user, and described second unblock screen password is corresponding with described guest user;
When described unblock screen password unlocks screen password match, and the switching of described operating system last time with described second During to described host user, described operating system is switched to guest user by described host user, and performs the first default behaviour Making, the related data generated described operating system when described host user is protected, and described first predetermined registration operation includes:
(1) file read-write authority is set, makes described guest user cannot change and delete the number of files of described host user According to;
(2) database file of the application to be protected chosen described host user in advance is hidden processing, and makes described visitor People user, when accessing described application to be protected, generates new database file;
(3) system settings data library file is backed up.
Preferably, described first predetermined registration operation also includes:
The preset function being able to carry out the most described host user is hidden.
Preferably, described preset function includes:
Described host user can reduce the setting that described guest user is done, described host user can recover described in treat Protect the data in the database file of application, and described host user can delete described guest user in operation The data file generated.
Preferably, described first predetermined registration operation also includes:
Have arranging application the function of different password is set for described host user and described guest user carries out hidden Hide, and when described operating system switches to described guest user, described application is set only there is described guest user arranges close The function of code.
Preferably, described first predetermined registration operation also includes:
Record described operating system and switched to the time point of described guest user by described host user.
Preferably, also include:
Record and preserve the setting that described operating system was revised in described guest user, the literary composition increasing and/or revising Number of packages evidence.
Preferably, unlock on screen password match, and described operating system with described first when described unblock screen password When once switching to described guest user, also include:
Described operating system is switched to described host user by described guest user, and performs the second predetermined registration operation, right The related data that described operating system generates when described host user carries out reduction and arranges, and described second predetermined registration operation includes:
(1) record described operating system and switched to the time point of described host user by described guest user, and recover literary composition Part access limit;
(2) exporting the first information, described first information is used for prompting the user whether in described guest user The system settings data library file of middle generation reduces, and when receiving the reduction instruction of user's input, recovers described master The system settings data library file of backup in people user, and delete the described system settings data generated in described guest user Library file, when receiving the reserve statement of user's input, retains the described system generated in described guest user and arranges number According to library file;
(3) exporting the second information, described second information is for prompting the user whether to wait to protect described in hiding The database file protecting application recovers, and when receiving the recovery instruction of user's input, recovers described application to be protected Database file, and delete the related data library file generated in described guest user, when the reservation receiving user's input During instruction, it is retained in described guest user the described related data library file generated;
(4) output the 3rd information, described 3rd information is used for prompting the user whether to need to delete described visitor The data generated in during people user's use, when receiving the deletion instruction of user's input, use described guest described in deletion The data generated in family, when receiving the reserve statement of user's input, retain the described number generated in described guest user According to.
Preferably, if the described operating system last time switch to described guest user and revise described second unlock screen close Code, also includes:
When described unblock screen password mates with amended second unlocking pin, described operating system is switched to institute Stating guest user, otherwise, export the 4th information, described 4th information is used for pointing out unblock screen password described in user Input error.
A kind of terminal, including:
Receive unit, for receiving the unblock screen password that user is currently entered;
First matching unit, for close with the first unblock screen pre-seting and storing respectively by described unblock screen password Code and second unlocks screen password and mates, to judge to switch to operating system host user or guest user, wherein, Described first unblock screen password is corresponding with described host user, and described second unlocks screen password and described guest user pair Should;
First switch unit is for unlocking screen password match when described unblock screen password with described second and described When the operating system last time switches to described host user, described operating system is switched to guest by described host user and uses Family, and perform the first predetermined registration operation, the related data generated described operating system when described host user is protected, institute State the first predetermined registration operation to include:
(1) file read-write authority is set, makes described guest user cannot change and delete the number of files of described host user According to;
(2) database file of the application to be protected chosen described host user in advance is hidden processing, and makes described visitor People user, when accessing described application to be protected, generates new database file;
(3) system settings data library file is backed up.
Preferably, described first predetermined registration operation also includes:
The preset function being able to carry out the most described host user is hidden.
Preferably, described host user can reduce the setting that described guest user is done, and described host user can be extensive Data in the database file of described application to be protected, and described host user again can delete described guest user behaviour The data file generated during work.
Preferably, described first predetermined registration operation also includes:
Have arranging application the function of different password is set for described host user and described guest user carries out hidden Hide, and when described operating system switches to described guest user, described application is set only there is described guest user arranges close The function of code.
Preferably, described first predetermined registration operation also includes:
Record described operating system and switched to the time point of described guest user by described host user.
Preferably, also include:
Record storage unit, for record and preserve setting that described operating system revised in described guest user, Increase and/or the file data of amendment.
Preferably, also include:
Second switch unit is for unlocking screen password match when described unblock screen password with described first and described When the operating system last time switches to described guest user, described operating system is switched to described owner by described guest user User, and perform the second predetermined registration operation, the related data generated described operating system when described host user reduces Arranging, described second predetermined registration operation includes:
(1) record described operating system and switched to the time point of described host user by described guest user, and recover literary composition Part access limit;
(2) exporting the first information, described first information is used for prompting the user whether in described guest user The system settings data library file of middle generation reduces, and when receiving the reduction instruction of user's input, recovers described master The system settings data library file of backup in people user, and delete the described system settings data generated in described guest user Library file, when receiving the reserve statement of user's input, retains the described system generated in described guest user and arranges number According to library file;
(3) exporting the second information, described second information is for prompting the user whether to wait to protect described in hiding The database file protecting application recovers, and when receiving the recovery instruction of user's input, recovers described application to be protected Database file, and delete the related data library file generated in described guest user, when the reservation receiving user's input During instruction, it is retained in described guest user the described related data library file generated;
(4) output the 3rd information, described 3rd information is used for prompting the user whether to need to delete described visitor The data generated in during people user's use, when receiving the deletion instruction of user's input, use described guest described in deletion The data generated in family, when receiving the reserve statement of user's input, retain the described number generated in described guest user According to.
Preferably, also include:
Second matching unit, if switch to described guest user for the described operating system last time and revise described second Unlock screen password, then when described unblock screen password mates with amended second unlocking pin, by described operating system Switching to described guest user, otherwise, export the 4th information, described 4th information is used for pointing out unblock described in user Screen Password Input mistake.
From above-mentioned technical scheme it can be seen that the invention discloses a kind of method protecting user privacy information and end End, the use user (include host user and guest user) different for terminal arranges different unblock screen passwords, passes through The unblock screen password unlocking screen password corresponding with host user and guest user respectively user inputted mates, and sentences Break and operating system is switched to host user or guest user, use when operating system is switched to guest by host user by needs During family, performing the first predetermined registration operation, the related data generated operating system when host user carries out file read-write authority and sets Put, be hidden the database file of application to be protected processing and system settings data being backed up, thus realize right The encryption of user privacy information.Therefore, when terminal is operated by other people, by what operating system was generated when host user Related data carries out file read-write priority assignation, database file to application to be protected is hidden processing and setting system Put data to back up so that it is other people can not arbitrarily access the information in terminal and be modified some information, thus protect Protect user's privacy information in the terminal to be not leaked.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this Inventive embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to according to Disclosed accompanying drawing obtains other accompanying drawing.
Fig. 1 is a kind of method flow diagram protecting user privacy information disclosed in the embodiment of the present invention;
Fig. 2 is the structural representation of a kind of terminal disclosed in the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into the scope of protection of the invention.
The embodiment of the invention discloses a kind of method protecting user privacy information and terminal, with realize other people can not be with Meaning accesses the information in terminal and is modified some information, thus protects user's privacy information in the terminal not let out Leakage.
Seeing Fig. 1, a kind of method flow diagram protecting user privacy information disclosed in the embodiment of the present invention, the method includes Step:
The unblock screen password that step S11, reception user are currently entered;
Wherein, unlocking screen password can be the password being made up of numeral and/or letter, or screen sliding gesture pattern.
Step S12, by described unblock screen password respectively with pre-set and store first unblock screen password and second Unlock screen password to mate, to judge to switch to operating system host user or guest user;
Wherein, described first unblock screen password is corresponding with described host user, and described second unlocks screen password and institute State guest user corresponding.
It should be noted that host user (i.e. user user) refers to Terminal owner.
Guest user (i.e. guest user) refers to other people beyond Terminal owner.
Step S13, unlock on screen password match, and described operating system with described second when described unblock screen password When once switching to described host user, described operating system is switched to guest user by described host user, and performs One predetermined registration operation, the related data generated described operating system when described host user protects, and described first presets Operation includes:
(1) file read-write authority is set, makes described guest user cannot change and delete the number of files of described host user According to;
(2) database file of the application to be protected chosen described host user in advance is hidden processing, and makes described visitor People user, when accessing described application to be protected, generates new database file;
Concrete, in actual applications, arranging of terminal, application (Setting) can arrange " a secret protection List ", when operating system switches to host user, the database file of application to be protected can be added to by host user " secret protection list ", when operating system is switched to guest user by host user, to adding in " secret protection list " The database file of application to be protected be hidden processing, make guest user when accessing these application to be protected, it is impossible to obtain Take any data that host user stores in this application to be protected, thus reach to protect the purpose of privacy of user.
Illustrating, when guest user opens " note application ", guest user can't see any information;Work as guest user When opening " wechat application ", " wechat application " will not automated log on, guest user need to input new username and password.
Wherein it is possible to use the database file to application to be protected to carry out renaming process realization to application to be protected The hiding process of database file, currently can also use other hiding processing mode, and the present invention does not limits at this.
(3) system settings data library file is backed up.
It should be noted that to the purpose of system settings data library file backup be: when system settings data library file quilt After guest user change, when operating system switches to host user again, host user can be according to Backup Data to system The data arranged in database file are reduced, thus ensure that host user's data in the terminal are not repaiied by guest user Change.
In summary it can be seen, the method for protection user privacy information disclosed by the invention, the use different for terminal is used Family (including host user and guest user) arranges different unblock screen passwords, by unblock screen password user inputted Unblock screen password corresponding with host user and guest user respectively mates, it is judged that operating system switches to owner and uses Family or guest user, when operating system is switched to guest user by host user by needs, perform the first predetermined registration operation, right The related data that operating system generates when host user carries out file read-write priority assignation, data library text to application to be protected Part is hidden processing and backing up system settings data, thus realizes the encryption to user privacy information.Therefore, when When terminal is operated by other people, carry out file read-write authority by the related data that operating system is generated when host user and set Put, be hidden the database file of application to be protected processing and system settings data being backed up so that it is other people are not Can arbitrarily access the information in terminal and some information is modified, thus protecting user's privacy information in the terminal not It is compromised.
Wherein, the unblock screen password and first being currently entered as user unlocks screen password and second and unlocks screen password When not mating, showing that the unblock screen password that user is currently entered is bad password, now terminal can export information, with The unblock screen code error that prompting user is currently entered.
For avoiding when operating system switches to guest user, guest user finds host user's distinctive execution function, The first predetermined registration operation in above-described embodiment can also include:
The preset function being able to carry out only host user is hidden.
Wherein, preset function includes: (1) host user can reduce the setting that guest user is done;(2) host user's energy Enough recover the data in the database file of application to be protected;(3) host user can delete guest user in operation The data file generated.
Knowable to above-described embodiment, the present invention is directed to host user and guest user is provided with different operating rights, and Host user and guest user are arranged different unblock screen passwords, is divided by the unblock screen password that user is currently entered Do not unlock screen password with first and the second unblock screen password mates, determine and operating system is switched to host user also It it is guest user.Application is set for avoiding guest user to find there is the merit arranging different password for host user and guest user Can, the first predetermined registration operation in above-described embodiment can also include:
Have arranging application the function of different password is set for host user and guest user is hidden, and as behaviour When system switches to guest user, application is set and only there is guest user the function of password is set.
For optimizing above-described embodiment further, the first predetermined registration operation can also include:
Record operating system is switched to the time point of guest user by host user.
In summary, when operating system is switched to guest user (guest user) by host user (user user), first First, guest user can access any application in terminal, but (such as, note is applied, led to for hiding application to be protected Words record, memorandum etc.), guest user can't see any data preserved in application to be protected;Secondly, for needing login Application (such as Alipay, Taobao, QQ, wechat), when operating system switches to guest user, when host user, storage should Being hidden with login account and password, guest user need to re-enter username and password;Again, when guest user is changed or deletes During except the file data preserved in host user, information can be exported, this information be used for pointing out guest user without Authority change or deletion this document data.
Wherein, the associative operation that guest user is carried out can also be preserved by the present invention, to facilitate host user to check. Therefore, for optimizing above-described embodiment further, it is also possible to include step:
Record and preserve the setting that operating system was revised in guest user, the file data increasing and/or revising.
It is understood that when operating system is switched to host user by host user, operating system is switched to main The related data generated during people user does not carry out any process.
It should be noted that when the operating system last time switches to guest user, when this still switches to guest user, If last guest user unlocks screen password to second carried out amendment, then only when user is at the unblock screen being currently entered When password unlocks screen password match with the second of amendment, just operating system can be switched to guest user, otherwise output the 4th Information, the 4th information is for pointing out user the unblock screen Password Input mistake being currently entered.
Wherein, if the unblock screen password being currently entered and first unlocks screen password match, and operating system is last When switching to guest user, for optimizing further Fig. 1 disclosed embodiment, it is also possible to include step:
Operating system is switched to host user by guest user, and performs the second predetermined registration operation, to described operating system The related data generated when described host user carries out reduction and arranges, and described second predetermined registration operation includes:
(1) record described operating system and switched to the time point of described host user by described guest user, and recover literary composition Part access limit;
(2) exporting the first information, described first information is used for prompting the user whether in described guest user The system settings data library file of middle generation reduces, and when receiving the reduction instruction of user's input, recovers described master The system settings data library file of backup in people user, and delete the described system settings data generated in described guest user Library file, when receiving the reserve statement of user's input, retains the described system generated in described guest user and arranges number According to library file;
Wherein, if the system settings data library file generated in guest user is deleted by host user, and need also Former in guest user generate system settings data library file time, host user can by arrange application " reduction guest User is arranged " function be configured application restoring operation.
(3) exporting the second information, described second information is for prompting the user whether to wait to protect described in hiding The database file protecting application recovers, and when receiving the recovery instruction of user's input, recovers described application to be protected Database file, and delete the related data library file generated in described guest user, when the reservation receiving user's input During instruction, it is retained in described guest user the described related data library file generated;
Wherein, host user can utilize " recovering the data of application in secret protection list object " of arranging application next right The database file of application to be protected recovers.
(4) output the 3rd information, described 3rd information is used for prompting the user whether to need to delete described visitor The data that people user generates during using, when receiving the deletion instruction of user's input, delete described in described guest user The data of middle generation, when receiving the reserve statement of user's input, retain the described data generated in described guest user.
It should be noted that in the present embodiment, after operating system is switched to host user by guest user, can export and carry Show that the data that information generates the need of deletion action system for pointing out host user in guest user (including: system sets Put the data generated during database file, the database file of application to be protected and guest user use), avoid with this The accumulation of garbage files in operating system, the memory space of release terminal.
Wherein, in above-described embodiment, each information all can show with the form of dialog box.
Corresponding with said method embodiment, the invention also discloses a kind of terminal.
See Fig. 2, the structural representation of a kind of terminal disclosed in the embodiment of the present invention, this terminal includes:
Receive unit 21, for receiving the unblock screen password that user is currently entered;
Wherein, unlocking screen password can be the password being made up of numeral and/or letter, or screen sliding gesture pattern.
First matching unit 22, for unlocking screen with first pre-seting and storing respectively by described unblock screen password Password and second unlocks screen password and mates, to judge to switch to operating system host user or guest user, its In, described first unblock screen password is corresponding with described host user, and described second unlocks screen password and described guest user Corresponding;
First switch unit 23, for unlocking screen password match, and institute when described unblock screen password with described second State the operating system last time when switching to described host user, described operating system is switched to guest by described host user and uses Family, and perform the first predetermined registration operation, the related data generated described operating system when described host user is protected, institute State the first predetermined registration operation to include:
(1) file read-write authority is set, makes described guest user cannot change and delete the number of files of described host user According to;
(2) database file of the application to be protected chosen described host user in advance is hidden processing, and makes described visitor People user, when accessing described application to be protected, generates new database file;
Concrete, in actual applications, arranging of terminal, application (Setting) can arrange " a secret protection List ", when operating system switches to host user, the database file of application to be protected can be added to by host user " secret protection list ", when operating system is switched to guest user by host user, to adding in " secret protection list " The database file of application to be protected be hidden processing, make guest user when accessing these application to be protected, it is impossible to obtain Take any data that host user stores in this application to be protected, thus reach to protect the purpose of privacy of user.
Illustrating, when guest user opens " note application ", guest user can't see any information;Work as guest user When opening " wechat application ", " wechat application " will not automated log on, guest user need to input new username and password.
Wherein it is possible to use the database file to application to be protected to carry out renaming process realization to application to be protected The hiding process of database file, currently can also use other hiding processing mode, and the present invention does not limits at this.
(3) system settings data library file is backed up.
It should be noted that to the purpose of system settings data library file backup be: when system settings data library file quilt After guest user change, when operating system switches to host user again, host user can be according to Backup Data to system The data arranged in database file are reduced, thus ensure that host user's data in the terminal are not repaiied by guest user Change.
In summary it can be seen, terminal disclosed by the invention, (include that host user and guest use for different use users Family) different unblock screen passwords is set, used with host user and guest respectively by the unblock screen password that user is inputted Unblock screen password corresponding to family mates, it is judged that operating system switches to host user or guest user, works as needs When operating system is switched to guest user by host user, perform the first predetermined registration operation, to operating system when host user The related data generated carries out file read-write priority assignation, database file to application to be protected is hidden processing and right System settings data backs up, thus realizes the encryption to user privacy information.Therefore, when terminal is operated by other people, File read-write priority assignation, number to application to be protected is carried out by the related data that operating system is generated when host user It is hidden processing and system settings data being backed up according to library file so that it is other people can not arbitrarily access the letter in terminal Cease and some information is modified, thus protecting user's privacy information to be in the terminal not leaked.
Wherein, the unblock screen password and first being currently entered as user unlocks screen password and second and unlocks screen password When not mating, showing that the unblock screen password that user is currently entered is bad password, now terminal can export information, with The unblock screen code error that prompting user is currently entered.
For avoiding when operating system switches to guest user, guest user finds host user's distinctive execution function, The first predetermined registration operation in above-described embodiment can also include:
The preset function being able to carry out only host user is hidden.
Wherein, preset function includes: (1) host user can reduce the setting that guest user is done;(2) host user's energy Enough recover the data in the database file of application to be protected;(3) host user can delete guest user in operation The data file generated.
Knowable to above-described embodiment, the present invention is directed to host user and guest user is provided with different operating rights, and Host user and guest user are arranged different unblock screen passwords, is divided by the unblock screen password that user is currently entered Do not unlock screen password with first and the second unblock screen password mates, determine and operating system is switched to host user also It it is guest user.Application is set for avoiding guest user to find there is the merit arranging different password for host user and guest user Can, the first predetermined registration operation in above-described embodiment can also include:
Have arranging application the function of different password is set for host user and guest user is hidden, and as behaviour When system switches to guest user, application is set and only there is guest user the function of password is set.
For optimizing above-described embodiment further, the first predetermined registration operation can also include:
Record operating system is switched to the time point of guest user by host user.
In summary, when operating system is switched to guest user (guest user) by host user (user user), first First, guest user can access any application in terminal, but (such as, note is applied, led to for hiding application to be protected Words record, memorandum etc.), guest user can't see any data preserved in application to be protected;Secondly, for needing login Application (such as Alipay, Taobao, QQ, wechat), when operating system switches to guest user, when host user, storage should Being hidden with login account and password, guest user need to re-enter username and password;Again, when guest user is changed or deletes During except the file data preserved in host user, information can be exported, this information be used for pointing out guest user without Authority change or deletion this document data.
Wherein, the associative operation that guest user is carried out can also be preserved by the present invention, to facilitate host user to check. Therefore, for optimizing above-described embodiment further, it is also possible to including:
Record storage unit, for record and preserve setting that described operating system revised in described guest user, Increase and/or the file data of amendment.
It is understood that when operating system is switched to host user by host user, operating system is switched to main The related data generated during people user does not carry out any process.
It should be noted that when the operating system last time switches to guest user, when this still switches to guest user, If last guest user unlocks screen password to second carried out amendment, then only when user is at the unblock screen being currently entered When password unlocks screen password match with the second of amendment, just operating system can be switched to guest user.
Therefore, for optimizing above-described embodiment further, terminal can also include:
Second matching unit, if switch to described guest user for the described operating system last time and revise described second Unlock screen password, then when described unblock screen password mates with amended second unlocking pin, by described operating system Switching to described guest user, otherwise, export the 4th information, described 4th information is used for pointing out unblock described in user Screen Password Input mistake.
Wherein, if the unblock screen password being currently entered and first unlocks screen password match, and operating system is last When switching to guest user, for optimizing Fig. 2 disclosed embodiment further, terminal can also include:
Second switch unit is for unlocking screen password match when described unblock screen password with described first and described When the operating system last time switches to described guest user, described operating system is switched to described owner by described guest user User, and perform the second predetermined registration operation, the related data generated described operating system when described host user reduces Arranging, described second predetermined registration operation includes:
(1) record described operating system and switched to the time point of described host user by described guest user, and recover literary composition Part access limit;
(2) exporting the first information, described first information is used for prompting the user whether in described guest user The system settings data library file of middle generation reduces, and when receiving the reduction instruction of user's input, recovers described master The system settings data library file of backup in people user, and delete the described system settings data generated in described guest user Library file, when receiving the reserve statement of user's input, retains the described system generated in described guest user and arranges number According to library file;
Wherein, if the system settings data library file generated in guest user is deleted by host user, and need also Former in guest user generate system settings data library file time, host user can by arrange application " reduction guest User is arranged " function be configured application restoring operation.
(3) exporting the second information, described second information is for prompting the user whether to wait to protect described in hiding The database file protecting application recovers, and when receiving the recovery instruction of user's input, recovers described application to be protected Database file, and delete the related data library file generated in described guest user, when the reservation receiving user's input During instruction, it is retained in described guest user the described related data library file generated;
Wherein, host user can utilize " recovering the data of application in secret protection list object " of arranging application next right The database file of application to be protected recovers.
(4) output the 3rd information, described 3rd information is used for prompting the user whether to need to delete described visitor The data generated in during people user's use, when receiving the deletion instruction of user's input, use described guest described in deletion The data generated in family, when receiving the reserve statement of user's input, retain the described number generated in described guest user According to.
It should be noted that in the present embodiment, after operating system is switched to host user by guest user, can export and carry Show that the data that information generates the need of deletion action system for pointing out host user in guest user (including: system sets Put the data generated during database file, the database file of application to be protected and guest user use), avoid with this The accumulation of garbage files in operating system, the memory space of release terminal.
It should be noted that the specific works principle of each ingredient in device embodiment, refer to embodiment of the method pair Should part, the present invention does not limits at this.
Finally, in addition it is also necessary to explanation, in this article, the relational terms of such as first and second or the like be used merely to by One entity or operation separate with another entity or operating space, and not necessarily require or imply these entities or operation Between exist any this reality relation or order.And, term " includes ", " comprising " or its any other variant meaning Containing comprising of nonexcludability, so that include that the process of a series of key element, method, article or equipment not only include that A little key elements, but also include other key elements being not expressly set out, or also include for this process, method, article or The key element that equipment is intrinsic.In the case of there is no more restriction, statement " including ... " key element limited, do not arrange Except there is also other identical element in including the process of described key element, method, article or equipment.
In this specification, each embodiment uses the mode gone forward one by one to describe, and what each embodiment stressed is and other The difference of embodiment, between each embodiment, identical similar portion sees mutually.
Described above to the disclosed embodiments, makes professional and technical personnel in the field be capable of or uses the present invention. Multiple amendment to these embodiments will be apparent from for those skilled in the art, as defined herein General Principle can realize without departing from the spirit or scope of the present invention in other embodiments.Therefore, the present invention It is not intended to be limited to the embodiments shown herein, and is to fit to and principles disclosed herein and features of novelty phase one The widest scope caused.

Claims (16)

1. the method protecting user privacy information, it is characterised in that including:
Receive the unblock screen password that user is currently entered;
Described unblock screen password is unlocked screen password with the first unblock screen password and second pre-seting and storing respectively Mating, to judge to switch to operating system host user or guest user, wherein, described first unlocks screen password Corresponding with described host user, described second unblock screen password is corresponding with described guest user;
When described unblock screen password unlocks screen password match with described second, and the described operating system last time switches to institute When stating host user, described operating system is switched to guest user by described host user, and performs the first predetermined registration operation, right The related data that described operating system generates when described host user is protected, and described first predetermined registration operation includes:
(1) file read-write authority is set, makes described guest user cannot change and delete the file data of described host user;
(2) database file of the application to be protected chosen described host user in advance is hidden processing, and makes described guest use Family, when accessing described application to be protected, generates new database file;
(3) system settings data library file is backed up.
Method the most according to claim 1, it is characterised in that described first predetermined registration operation also includes:
The preset function being able to carry out the most described host user is hidden.
Method the most according to claim 2, it is characterised in that described preset function includes:
Described host user can reduce the setting that described guest user is done, and described host user can recover described to be protected Data in the database file of application, and described host user can delete described guest user and generate in operation Data file.
Method the most according to claim 1, it is characterised in that described first predetermined registration operation also includes:
Have arranging application the function of different password is set for described host user and described guest user is hidden, and When described operating system switches to described guest user, described application is set only there is described guest user the merit of password is set Energy.
Method the most according to claim 1, it is characterised in that described first predetermined registration operation also includes:
Record described operating system and switched to the time point of described guest user by described host user.
Method the most according to claim 1, it is characterised in that also include:
Record and preserve the setting that described operating system was revised in described guest user, the number of files increasing and/or revising According to.
Method the most according to claim 1, it is characterised in that when described unblock screen password unlocks screen with described first Password match, and when the described operating system last time switches to described guest user, also include:
Described operating system is switched to described host user by described guest user, and performs the second predetermined registration operation, to described The related data that operating system generates when described host user carries out reduction and arranges, and described second predetermined registration operation includes:
(1) record described operating system and switched to the time point of described host user by described guest user, and recover file reading Write permission;
(2) exporting the first information, described first information is used for prompting the user whether raw in described guest user The system settings data library file become reduces, and when receiving the reduction instruction of user's input, recovers to use described owner The system settings data library file of backup in family, and delete the described system settings data library text generated in described guest user Part, when receiving the reserve statement of user's input, retains the described system settings data storehouse generated in described guest user File;
(3) export the second information, described second information for prompt the user whether to hiding described to be protected should Database file recover, when receive user input recovery instruction time, recover the data of described application to be protected Library file, and delete the related data library file generated in described guest user, when the reserve statement receiving user's input Time, it is retained in described guest user the described related data library file generated;
(4) output the 3rd information, described 3rd information is used for prompting the user whether to need to delete to use described guest The data generated in during the use of family, when receiving the deletion instruction of user's input, deletion is described in described guest user The data generated, when receiving the reserve statement of user's input, retain the described data generated in described guest user.
Method the most according to claim 1, it is characterised in that if the described operating system last time switch to described guest use Described second unblock screen password is also revised in family, also includes:
When described unblock screen password mates with amended second unlocking pin, described operating system is switched to described visitor People user, otherwise, exports the 4th information, and described 4th information is used for pointing out unblock screen Password Input described in user Mistake.
9. a terminal, it is characterised in that including:
Receive unit, for receiving the unblock screen password that user is currently entered;
First matching unit, for by described unblock screen password respectively with pre-set and store first unblock screen password and Second unlocks screen password mates, to judge to switch to operating system host user or guest user, wherein, described First unblock screen password is corresponding with described host user, and described second unblock screen password is corresponding with described guest user;
First switch unit, for unlocking screen password match, and described operation when described unblock screen password with described second When the system last time switches to described host user, described operating system is switched to guest user by described host user, and Performing the first predetermined registration operation, the related data generated described operating system when described host user is protected, and described One predetermined registration operation includes:
(1) file read-write authority is set, makes described guest user cannot change and delete the file data of described host user;
(2) database file of the application to be protected chosen described host user in advance is hidden processing, and makes described guest use Family, when accessing described application to be protected, generates new database file;
(3) system settings data library file is backed up.
Terminal the most according to claim 9, it is characterised in that described first predetermined registration operation also includes:
The preset function being able to carry out the most described host user is hidden.
11. terminals according to claim 10, it is characterised in that described host user can reduce described guest user institute The setting done, described host user can recover the data in the database file of described application to be protected, and described owner User can delete the data file that described guest user generates in operation.
12. terminals according to claim 9, it is characterised in that described first predetermined registration operation also includes:
Have arranging application the function of different password is set for described host user and described guest user is hidden, and When described operating system switches to described guest user, described application is set only there is described guest user the merit of password is set Energy.
13. terminals according to claim 9, it is characterised in that described first predetermined registration operation also includes:
Record described operating system and switched to the time point of described guest user by described host user.
14. terminals according to claim 9, it is characterised in that also include:
Record storage unit, for recording and preserve setting, the increase that described operating system was revised in described guest user And/or the file data of amendment.
15. terminals according to claim 9, it is characterised in that also include:
Second switch unit, for unlocking screen password match, and described operation when described unblock screen password with described first When the system last time switches to described guest user, described operating system is switched to described owner by described guest user and uses Family, and perform the second predetermined registration operation, the related data generated described operating system when described host user carries out reduction and sets Putting, described second predetermined registration operation includes:
(1) record described operating system and switched to the time point of described host user by described guest user, and recover file reading Write permission;
(2) exporting the first information, described first information is used for prompting the user whether raw in described guest user The system settings data library file become reduces, and when receiving the reduction instruction of user's input, recovers to use described owner The system settings data library file of backup in family, and delete the described system settings data library text generated in described guest user Part, when receiving the reserve statement of user's input, retains the described system settings data storehouse generated in described guest user File;
(3) export the second information, described second information for prompt the user whether to hiding described to be protected should Database file recover, when receive user input recovery instruction time, recover the data of described application to be protected Library file, and delete the related data library file generated in described guest user, when the reserve statement receiving user's input Time, it is retained in described guest user the described related data library file generated;
(4) output the 3rd information, described 3rd information is used for prompting the user whether to need to delete to use described guest The data generated in during the use of family, when receiving the deletion instruction of user's input, deletion is described in described guest user The data generated, when receiving the reserve statement of user's input, retain the described data generated in described guest user.
16. terminals according to claim 9, it is characterised in that also include:
Second matching unit, if switching to described guest user for the described operating system last time and revising described second unblock Screen password, then, when described unblock screen password mates with amended second unlocking pin, switch described operating system To described guest user, otherwise, exporting the 4th information, described 4th information is used for pointing out unblock screen described in user Password Input mistake.
CN201610519218.7A 2016-06-30 2016-06-30 A kind of method and terminal for protecting user privacy information Active CN106127077B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610519218.7A CN106127077B (en) 2016-06-30 2016-06-30 A kind of method and terminal for protecting user privacy information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610519218.7A CN106127077B (en) 2016-06-30 2016-06-30 A kind of method and terminal for protecting user privacy information

Publications (2)

Publication Number Publication Date
CN106127077A true CN106127077A (en) 2016-11-16
CN106127077B CN106127077B (en) 2019-04-23

Family

ID=57468332

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610519218.7A Active CN106127077B (en) 2016-06-30 2016-06-30 A kind of method and terminal for protecting user privacy information

Country Status (1)

Country Link
CN (1) CN106127077B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106506786A (en) * 2016-12-27 2017-03-15 努比亚技术有限公司 The terminal and method of protection user privacy information
CN106599678A (en) * 2016-12-05 2017-04-26 北京小米移动软件有限公司 Screen unlocking method and equipment
CN107355140A (en) * 2017-08-31 2017-11-17 浙江蚂蚁精密科技有限公司 A kind of Inner door lock for caring about privacy of user
CN108521511A (en) * 2018-03-30 2018-09-11 联想(北京)有限公司 Information processing method, device and electronic equipment
CN108540654A (en) * 2018-03-22 2018-09-14 维沃移动通信有限公司 A kind of operating method and mobile terminal of mobile terminal
CN108810268A (en) * 2018-06-04 2018-11-13 珠海格力电器股份有限公司 The treating method and apparatus of operation note
CN111459784A (en) * 2020-04-08 2020-07-28 广州三星通信技术研究有限公司 Terminal operation processing method and device
CN112306563A (en) * 2020-11-03 2021-02-02 深圳软牛科技有限公司 Method, device, equipment and storage medium for resetting IOS screen use time password

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008065692A (en) * 2006-09-08 2008-03-21 Toshiba Corp Portable telephone set
CN101282535A (en) * 2008-05-16 2008-10-08 中兴通讯股份有限公司 Method and apparatus for protecting mobile terminal private information
CN102215237A (en) * 2011-06-16 2011-10-12 武汉桃杏网络科技有限责任公司 Implementation method for grade-based passive registered real-name alumni service
CN103488924A (en) * 2013-09-26 2014-01-01 小米科技有限责任公司 Terminal unlocking processing method, device and equipment
CN103699830A (en) * 2013-12-30 2014-04-02 中科创达软件股份有限公司 Operating system unlocking method and operating system unlocking device
CN104134024A (en) * 2014-07-24 2014-11-05 广东欧珀移动通信有限公司 Mobile terminal privacy protection method and system
CN104301539A (en) * 2014-10-21 2015-01-21 四川盟宝实业有限公司 Information protecting method
CN105279423A (en) * 2014-06-12 2016-01-27 中兴通讯股份有限公司 Password management method and password management device
US20160070777A1 (en) * 2014-09-04 2016-03-10 Visual Mobile Technologies, Inc. System and method for content collection, cataloging, and collaboration

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008065692A (en) * 2006-09-08 2008-03-21 Toshiba Corp Portable telephone set
CN101282535A (en) * 2008-05-16 2008-10-08 中兴通讯股份有限公司 Method and apparatus for protecting mobile terminal private information
CN102215237A (en) * 2011-06-16 2011-10-12 武汉桃杏网络科技有限责任公司 Implementation method for grade-based passive registered real-name alumni service
CN103488924A (en) * 2013-09-26 2014-01-01 小米科技有限责任公司 Terminal unlocking processing method, device and equipment
CN103699830A (en) * 2013-12-30 2014-04-02 中科创达软件股份有限公司 Operating system unlocking method and operating system unlocking device
CN105279423A (en) * 2014-06-12 2016-01-27 中兴通讯股份有限公司 Password management method and password management device
CN104134024A (en) * 2014-07-24 2014-11-05 广东欧珀移动通信有限公司 Mobile terminal privacy protection method and system
US20160070777A1 (en) * 2014-09-04 2016-03-10 Visual Mobile Technologies, Inc. System and method for content collection, cataloging, and collaboration
CN104301539A (en) * 2014-10-21 2015-01-21 四川盟宝实业有限公司 Information protecting method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106599678A (en) * 2016-12-05 2017-04-26 北京小米移动软件有限公司 Screen unlocking method and equipment
CN106599678B (en) * 2016-12-05 2019-08-30 北京小米移动软件有限公司 Unlocking screen method and apparatus
CN106506786A (en) * 2016-12-27 2017-03-15 努比亚技术有限公司 The terminal and method of protection user privacy information
CN107355140A (en) * 2017-08-31 2017-11-17 浙江蚂蚁精密科技有限公司 A kind of Inner door lock for caring about privacy of user
CN108540654A (en) * 2018-03-22 2018-09-14 维沃移动通信有限公司 A kind of operating method and mobile terminal of mobile terminal
WO2019179312A1 (en) * 2018-03-22 2019-09-26 维沃移动通信有限公司 Mobile terminal operation method and mobile terminal
CN108521511A (en) * 2018-03-30 2018-09-11 联想(北京)有限公司 Information processing method, device and electronic equipment
CN108810268A (en) * 2018-06-04 2018-11-13 珠海格力电器股份有限公司 The treating method and apparatus of operation note
CN111459784A (en) * 2020-04-08 2020-07-28 广州三星通信技术研究有限公司 Terminal operation processing method and device
CN112306563A (en) * 2020-11-03 2021-02-02 深圳软牛科技有限公司 Method, device, equipment and storage medium for resetting IOS screen use time password
CN112306563B (en) * 2020-11-03 2023-11-17 深圳软牛科技有限公司 Method, device, equipment and storage medium for resetting IOS screen using time password

Also Published As

Publication number Publication date
CN106127077B (en) 2019-04-23

Similar Documents

Publication Publication Date Title
CN106127077B (en) A kind of method and terminal for protecting user privacy information
CN102254124B (en) A kind of information of mobile terminal security protection system and method
CN103902862A (en) Mobile device management method and device and mobile device
US7257717B2 (en) Method with the functions of virtual space and data encryption and invisibility
CN102043927B (en) Data divulgence protection method for computer system
CN103106372A (en) Lightweight class privacy data encryption method and system for Android system
CN100446024C (en) Protection method and system of electronic document
CN103366107A (en) Method, device and mobile phone for protecting access permission of application program
CN101533452B (en) Method for protecting cipher of USB interface
CN103366797A (en) Design method of security U disk by employing wireless authentication terminal for authorizing authentication, encryption and decryption
CN101916342A (en) Secure mobile storage device and method for realizing secure data exchange by using same
CN104267982A (en) Application program start control system and method
CN104573536A (en) File protection method and device
CN105025165A (en) Interface unlocking method and system corresponding to multiple passwords
JP2019531564A (en) Method and system for blocking phishing or ransomware attacks
CN103390125A (en) Design method for safe and mobile storage controller authorized and encrypted/decrypted by wireless terminal
CN103577732A (en) Information processing method and device and electronic device
CN105224194B (en) A kind of data processing method and terminal
JP6231504B2 (en) Method, apparatus and mobile terminal for information security management of mobile terminal
CN103198247A (en) Computer safety protection method and computer safety protection system
CN103324874A (en) Verification method and electronic device
CN105094652A (en) Touch screen unlocking method and device, electronic equipment, display and mobile terminal
CN104361297B (en) A kind of file encryption-decryption method based on (SuSE) Linux OS
CN101271507B (en) File hiding method, system and device based on USB equipment
CN103049705A (en) Virtualization based method, terminal and system for secure storage

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant