CN106973155A - A kind of mobile phone personal information security management method - Google Patents

A kind of mobile phone personal information security management method Download PDF

Info

Publication number
CN106973155A
CN106973155A CN201710175208.0A CN201710175208A CN106973155A CN 106973155 A CN106973155 A CN 106973155A CN 201710175208 A CN201710175208 A CN 201710175208A CN 106973155 A CN106973155 A CN 106973155A
Authority
CN
China
Prior art keywords
file
mobile phone
cracked
backup
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710175208.0A
Other languages
Chinese (zh)
Inventor
王琨
张军
周扬
孙占辉
吴征威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Institute for Public Safety Research Tsinghua University
Original Assignee
Hefei Institute for Public Safety Research Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Institute for Public Safety Research Tsinghua University filed Critical Hefei Institute for Public Safety Research Tsinghua University
Priority to CN201710175208.0A priority Critical patent/CN106973155A/en
Publication of CN106973155A publication Critical patent/CN106973155A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • H04M1/72421User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2242/00Special services or facilities
    • H04M2242/40Data synchronization between user terminals and central server

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • General Business, Economics & Management (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A kind of mobile phone personal information security management method of disclosure of the invention, file in mobile phone is encrypted file and unencrypted file type judges, and carries out specially treated to encryption file;Judge whether cell phone password is cracked, as being cracked, encryption file is entered into backup of racking, while the mobile phone information that is cracked is sent to spare mobile phone, and file after cloud is backed up is deleted, and as not being cracked, then will not be solved information and be sent to by spare mobile phone.This method collects whether password is cracked by judging, and encryption file is entered into backup of racking, and the file of backup is deleted after notice is cracked information, ensures that file data is not lost while so being prevented from being stolen.

Description

A kind of mobile phone personal information security management method
Technical field
The present invention relates to cell phone managing system regions, specially a kind of mobile phone personal information security management method.
Background technology
The capsule information such as some personal photo, video, phone information, files can be stored in many people's mobile phones, these things Once being known by others, deleterious effect can be brought to life or work, but these files in mobile phone have what is be stolen Danger, current password can also be easy to crack, so the vital document that mobile phone EMS memory is put is very dangerous usually.Therefore, It is proposed that a kind of mobile phone personal information security management method.
The content of the invention
It is an object of the invention to provide a kind of mobile phone personal information security management method, to solve in above-mentioned background technology The problem of proposition.
To achieve the above object, the present invention provides following technical scheme:A kind of mobile phone personal information security management method, its Step is as follows:
File is encrypted to file in mobile phone and unencrypted file type judges, and special place is carried out to encryption file Reason;
Judge whether cell phone password is cracked, as being cracked, encryption file is entered into backup of racking, while mobile phone is broken Solution information is sent to spare mobile phone, and the file after cloud is backed up is deleted, as not being cracked, then will not solve information send to By spare mobile phone.
Further, the spare mobile phone can be sent by short breath and order to enter the file not being cracked to rack backup and delete Remove.
Compared with prior art, the beneficial effects of the invention are as follows:This method by judging whether cell phone password is cracked, and Encryption file is entered into backup of racking, the file of backup is deleted after notice is cracked information, is so prevented from what is be stolen Ensure that file data is not lost simultaneously.
Brief description of the drawings
Fig. 1 is schematic flow sheet of the invention.
Embodiment
The technical scheme in the embodiment of the present invention will be clearly and completely described below, it is clear that described implementation Example only a part of embodiment of the invention, rather than whole embodiments.Based on the embodiment in the present invention, this area is common The every other embodiment that technical staff is obtained under the premise of creative work is not made, belongs to the model that the present invention is protected Enclose.
Referring to Fig. 1, invention provides a kind of technical scheme:A kind of mobile phone personal information security management method, its step is as follows: File is encrypted to file in mobile phone and unencrypted file type judges, and specially treated is carried out to encryption file;Judge hand Whether secret code is cracked, as being cracked, and encryption file is entered into backup of racking, while the mobile phone information that is cracked is sent to standby With mobile phone, and file after cloud is backed up is deleted, and is not cracked such as.
Operation principle:By judge encrypting module the document classification in mobile phone into encryption file and unencrypted file, so Encryption file is subjected to specially treated afterwards, the siren that is cracked when mobile phone is cracked by stranger can make the judgement that is cracked, Then the encryption file in mobile phone preferentially will be entered into backup of racking, while mobile phone is cracked by sending prompting message module Relevant information is sent to owner specific one mobile phone, by deleting dump block by the letter in mobile phone after cloud backup is completed Whole reset of breath is deleted, and prevents other people from stealing the information in mobile phone, and owner can also be sent by short breath with spare mobile phone and be ordered The file not being cracked is entered to rack and backs up and deletes.The inventive method is simple, only needs first to make a distinction file, when mobile phone is close Code is when being cracked, triggering alarm, and most encryption file enters to rack and deleted after backup at last, thus saves encryption file, makes again File is not stolen by other people.
Although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of changes, modification can be carried out to these embodiments, replace without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (2)

1. a kind of mobile phone personal information security management method, it is characterised in that step is as follows:
File is encrypted to file in mobile phone and unencrypted file type judges, and specially treated is carried out to encryption file;
Judge whether cell phone password is cracked, as being cracked, encryption file is entered into backup of racking, while mobile phone is cracked letter Breath is sent to spare mobile phone, and the file after cloud is backed up is deleted, and as not being cracked, then will not be solved information and be sent to standby Use mobile phone.
2. according to the method described in claim 1, it is characterised in that enter the spare mobile phone order can be sent by short breath will not The file being cracked, which enters to rack, to be backed up and deletes.
CN201710175208.0A 2017-03-22 2017-03-22 A kind of mobile phone personal information security management method Pending CN106973155A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710175208.0A CN106973155A (en) 2017-03-22 2017-03-22 A kind of mobile phone personal information security management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710175208.0A CN106973155A (en) 2017-03-22 2017-03-22 A kind of mobile phone personal information security management method

Publications (1)

Publication Number Publication Date
CN106973155A true CN106973155A (en) 2017-07-21

Family

ID=59330017

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710175208.0A Pending CN106973155A (en) 2017-03-22 2017-03-22 A kind of mobile phone personal information security management method

Country Status (1)

Country Link
CN (1) CN106973155A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108521511A (en) * 2018-03-30 2018-09-11 联想(北京)有限公司 Information processing method, device and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
US20140289875A1 (en) * 2013-03-22 2014-09-25 Roche Diagnostics Operations, Inc. Method and system for ensuring sensitive data are not accessible
CN104091119A (en) * 2014-06-03 2014-10-08 深圳天珑无线科技有限公司 Mobile terminal as well as protection method and protection system of data in mobile terminal
US20150193637A1 (en) * 2014-01-08 2015-07-09 International Business Machines Corporation Provisioning transient-controlled secure environments for viewing sensitive data
CN106156229A (en) * 2015-04-27 2016-11-23 宇龙计算机通信科技(深圳)有限公司 The processing method of file, device and terminal in a kind of multiple operating system terminal
CN106231092A (en) * 2016-07-29 2016-12-14 哈尔滨理工大学 A kind of phone information security protection method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
US20140289875A1 (en) * 2013-03-22 2014-09-25 Roche Diagnostics Operations, Inc. Method and system for ensuring sensitive data are not accessible
US20150193637A1 (en) * 2014-01-08 2015-07-09 International Business Machines Corporation Provisioning transient-controlled secure environments for viewing sensitive data
CN104091119A (en) * 2014-06-03 2014-10-08 深圳天珑无线科技有限公司 Mobile terminal as well as protection method and protection system of data in mobile terminal
CN106156229A (en) * 2015-04-27 2016-11-23 宇龙计算机通信科技(深圳)有限公司 The processing method of file, device and terminal in a kind of multiple operating system terminal
CN106231092A (en) * 2016-07-29 2016-12-14 哈尔滨理工大学 A kind of phone information security protection method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108521511A (en) * 2018-03-30 2018-09-11 联想(北京)有限公司 Information processing method, device and electronic equipment

Similar Documents

Publication Publication Date Title
CN104540123B (en) The method and system of mobile terminal significant data encrypted backup and safety deleting
WO2016101384A1 (en) Dual-system switch based data security processing method and apparatus
CN102497633A (en) Protection method for private information in cellphones
CN102932540A (en) Mobile terminal and stealing prevention method thereof
EP2835997B1 (en) Cell phone data encryption method and decryption method
CN114448727B (en) Information processing method and system based on industrial internet identification analysis system
CN109063494A (en) A kind of information of mobile terminal security protection system and means of defence
EP2840818B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN103188672A (en) Mobile terminal and data protection method thereof
CN102495983A (en) Method for encrypting and decrypting data of intelligent mobile terminal in real time
WO2011130970A1 (en) Device and method for protecting data of mobile terminal
CN100450126C (en) Method for protecting the content of mobile phone short message
CN101409946A (en) Method capable of thoroughly deleting data of mobile phone memory card
CN114201770A (en) Mobile terminal data security protection method and device based on cloud control
CN106550357A (en) A kind of note method for managing security, device and terminal
CN108830091B (en) Method for protecting information security of intelligent terminal
US20120197924A1 (en) Method and Mobile Terminal for Recycling Short Messages
CN106973155A (en) A kind of mobile phone personal information security management method
WO2012151975A1 (en) Method and device for concealing terminal information
CN104182667B (en) Data guard method and device based on screen locking
WO2010133108A1 (en) Method, system and mobile terminal for retrieving flash data of a mobile terminal
CN106453057A (en) Method and terminal for preventing short message from being stolen
CN207099110U (en) A kind of Intelligent terminal data encrypted backup system
CN103902919B (en) A kind of method and device recovering log-on message
CN106686260A (en) Personal information security management system for mobile phone

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170721

RJ01 Rejection of invention patent application after publication