CN106973155A - A kind of mobile phone personal information security management method - Google Patents
A kind of mobile phone personal information security management method Download PDFInfo
- Publication number
- CN106973155A CN106973155A CN201710175208.0A CN201710175208A CN106973155A CN 106973155 A CN106973155 A CN 106973155A CN 201710175208 A CN201710175208 A CN 201710175208A CN 106973155 A CN106973155 A CN 106973155A
- Authority
- CN
- China
- Prior art keywords
- file
- mobile phone
- cracked
- backup
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72418—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
- H04M1/72421—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2242/00—Special services or facilities
- H04M2242/40—Data synchronization between user terminals and central server
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- General Business, Economics & Management (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A kind of mobile phone personal information security management method of disclosure of the invention, file in mobile phone is encrypted file and unencrypted file type judges, and carries out specially treated to encryption file;Judge whether cell phone password is cracked, as being cracked, encryption file is entered into backup of racking, while the mobile phone information that is cracked is sent to spare mobile phone, and file after cloud is backed up is deleted, and as not being cracked, then will not be solved information and be sent to by spare mobile phone.This method collects whether password is cracked by judging, and encryption file is entered into backup of racking, and the file of backup is deleted after notice is cracked information, ensures that file data is not lost while so being prevented from being stolen.
Description
Technical field
The present invention relates to cell phone managing system regions, specially a kind of mobile phone personal information security management method.
Background technology
The capsule information such as some personal photo, video, phone information, files can be stored in many people's mobile phones, these things
Once being known by others, deleterious effect can be brought to life or work, but these files in mobile phone have what is be stolen
Danger, current password can also be easy to crack, so the vital document that mobile phone EMS memory is put is very dangerous usually.Therefore,
It is proposed that a kind of mobile phone personal information security management method.
The content of the invention
It is an object of the invention to provide a kind of mobile phone personal information security management method, to solve in above-mentioned background technology
The problem of proposition.
To achieve the above object, the present invention provides following technical scheme:A kind of mobile phone personal information security management method, its
Step is as follows:
File is encrypted to file in mobile phone and unencrypted file type judges, and special place is carried out to encryption file
Reason;
Judge whether cell phone password is cracked, as being cracked, encryption file is entered into backup of racking, while mobile phone is broken
Solution information is sent to spare mobile phone, and the file after cloud is backed up is deleted, as not being cracked, then will not solve information send to
By spare mobile phone.
Further, the spare mobile phone can be sent by short breath and order to enter the file not being cracked to rack backup and delete
Remove.
Compared with prior art, the beneficial effects of the invention are as follows:This method by judging whether cell phone password is cracked, and
Encryption file is entered into backup of racking, the file of backup is deleted after notice is cracked information, is so prevented from what is be stolen
Ensure that file data is not lost simultaneously.
Brief description of the drawings
Fig. 1 is schematic flow sheet of the invention.
Embodiment
The technical scheme in the embodiment of the present invention will be clearly and completely described below, it is clear that described implementation
Example only a part of embodiment of the invention, rather than whole embodiments.Based on the embodiment in the present invention, this area is common
The every other embodiment that technical staff is obtained under the premise of creative work is not made, belongs to the model that the present invention is protected
Enclose.
Referring to Fig. 1, invention provides a kind of technical scheme:A kind of mobile phone personal information security management method, its step is as follows:
File is encrypted to file in mobile phone and unencrypted file type judges, and specially treated is carried out to encryption file;Judge hand
Whether secret code is cracked, as being cracked, and encryption file is entered into backup of racking, while the mobile phone information that is cracked is sent to standby
With mobile phone, and file after cloud is backed up is deleted, and is not cracked such as.
Operation principle:By judge encrypting module the document classification in mobile phone into encryption file and unencrypted file, so
Encryption file is subjected to specially treated afterwards, the siren that is cracked when mobile phone is cracked by stranger can make the judgement that is cracked,
Then the encryption file in mobile phone preferentially will be entered into backup of racking, while mobile phone is cracked by sending prompting message module
Relevant information is sent to owner specific one mobile phone, by deleting dump block by the letter in mobile phone after cloud backup is completed
Whole reset of breath is deleted, and prevents other people from stealing the information in mobile phone, and owner can also be sent by short breath with spare mobile phone and be ordered
The file not being cracked is entered to rack and backs up and deletes.The inventive method is simple, only needs first to make a distinction file, when mobile phone is close
Code is when being cracked, triggering alarm, and most encryption file enters to rack and deleted after backup at last, thus saves encryption file, makes again
File is not stolen by other people.
Although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of changes, modification can be carried out to these embodiments, replace without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
Claims (2)
1. a kind of mobile phone personal information security management method, it is characterised in that step is as follows:
File is encrypted to file in mobile phone and unencrypted file type judges, and specially treated is carried out to encryption file;
Judge whether cell phone password is cracked, as being cracked, encryption file is entered into backup of racking, while mobile phone is cracked letter
Breath is sent to spare mobile phone, and the file after cloud is backed up is deleted, and as not being cracked, then will not be solved information and be sent to standby
Use mobile phone.
2. according to the method described in claim 1, it is characterised in that enter the spare mobile phone order can be sent by short breath will not
The file being cracked, which enters to rack, to be backed up and deletes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710175208.0A CN106973155A (en) | 2017-03-22 | 2017-03-22 | A kind of mobile phone personal information security management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710175208.0A CN106973155A (en) | 2017-03-22 | 2017-03-22 | A kind of mobile phone personal information security management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106973155A true CN106973155A (en) | 2017-07-21 |
Family
ID=59330017
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710175208.0A Pending CN106973155A (en) | 2017-03-22 | 2017-03-22 | A kind of mobile phone personal information security management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106973155A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108521511A (en) * | 2018-03-30 | 2018-09-11 | 联想(北京)有限公司 | Information processing method, device and electronic equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
CN103037310A (en) * | 2012-12-14 | 2013-04-10 | 北京网秦天下科技有限公司 | Mobile terminal intelligent anti-theft method and mobile terminal |
US20140289875A1 (en) * | 2013-03-22 | 2014-09-25 | Roche Diagnostics Operations, Inc. | Method and system for ensuring sensitive data are not accessible |
CN104091119A (en) * | 2014-06-03 | 2014-10-08 | 深圳天珑无线科技有限公司 | Mobile terminal as well as protection method and protection system of data in mobile terminal |
US20150193637A1 (en) * | 2014-01-08 | 2015-07-09 | International Business Machines Corporation | Provisioning transient-controlled secure environments for viewing sensitive data |
CN106156229A (en) * | 2015-04-27 | 2016-11-23 | 宇龙计算机通信科技(深圳)有限公司 | The processing method of file, device and terminal in a kind of multiple operating system terminal |
CN106231092A (en) * | 2016-07-29 | 2016-12-14 | 哈尔滨理工大学 | A kind of phone information security protection method |
-
2017
- 2017-03-22 CN CN201710175208.0A patent/CN106973155A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
CN103037310A (en) * | 2012-12-14 | 2013-04-10 | 北京网秦天下科技有限公司 | Mobile terminal intelligent anti-theft method and mobile terminal |
US20140289875A1 (en) * | 2013-03-22 | 2014-09-25 | Roche Diagnostics Operations, Inc. | Method and system for ensuring sensitive data are not accessible |
US20150193637A1 (en) * | 2014-01-08 | 2015-07-09 | International Business Machines Corporation | Provisioning transient-controlled secure environments for viewing sensitive data |
CN104091119A (en) * | 2014-06-03 | 2014-10-08 | 深圳天珑无线科技有限公司 | Mobile terminal as well as protection method and protection system of data in mobile terminal |
CN106156229A (en) * | 2015-04-27 | 2016-11-23 | 宇龙计算机通信科技(深圳)有限公司 | The processing method of file, device and terminal in a kind of multiple operating system terminal |
CN106231092A (en) * | 2016-07-29 | 2016-12-14 | 哈尔滨理工大学 | A kind of phone information security protection method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108521511A (en) * | 2018-03-30 | 2018-09-11 | 联想(北京)有限公司 | Information processing method, device and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104540123B (en) | The method and system of mobile terminal significant data encrypted backup and safety deleting | |
WO2016101384A1 (en) | Dual-system switch based data security processing method and apparatus | |
CN102497633A (en) | Protection method for private information in cellphones | |
CN102932540A (en) | Mobile terminal and stealing prevention method thereof | |
EP2835997B1 (en) | Cell phone data encryption method and decryption method | |
CN114448727B (en) | Information processing method and system based on industrial internet identification analysis system | |
CN109063494A (en) | A kind of information of mobile terminal security protection system and means of defence | |
EP2840818B1 (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
CN103188672A (en) | Mobile terminal and data protection method thereof | |
CN102495983A (en) | Method for encrypting and decrypting data of intelligent mobile terminal in real time | |
WO2011130970A1 (en) | Device and method for protecting data of mobile terminal | |
CN100450126C (en) | Method for protecting the content of mobile phone short message | |
CN101409946A (en) | Method capable of thoroughly deleting data of mobile phone memory card | |
CN114201770A (en) | Mobile terminal data security protection method and device based on cloud control | |
CN106550357A (en) | A kind of note method for managing security, device and terminal | |
CN108830091B (en) | Method for protecting information security of intelligent terminal | |
US20120197924A1 (en) | Method and Mobile Terminal for Recycling Short Messages | |
CN106973155A (en) | A kind of mobile phone personal information security management method | |
WO2012151975A1 (en) | Method and device for concealing terminal information | |
CN104182667B (en) | Data guard method and device based on screen locking | |
WO2010133108A1 (en) | Method, system and mobile terminal for retrieving flash data of a mobile terminal | |
CN106453057A (en) | Method and terminal for preventing short message from being stolen | |
CN207099110U (en) | A kind of Intelligent terminal data encrypted backup system | |
CN103902919B (en) | A kind of method and device recovering log-on message | |
CN106686260A (en) | Personal information security management system for mobile phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170721 |
|
RJ01 | Rejection of invention patent application after publication |