CN109068318A - The guard method of personal information in a kind of smart phone - Google Patents

The guard method of personal information in a kind of smart phone Download PDF

Info

Publication number
CN109068318A
CN109068318A CN201810764681.7A CN201810764681A CN109068318A CN 109068318 A CN109068318 A CN 109068318A CN 201810764681 A CN201810764681 A CN 201810764681A CN 109068318 A CN109068318 A CN 109068318A
Authority
CN
China
Prior art keywords
mobile phone
information
block chain
smart phone
personal information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810764681.7A
Other languages
Chinese (zh)
Inventor
何晓行
陈璐
赵恩迪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201810764681.7A priority Critical patent/CN109068318A/en
Publication of CN109068318A publication Critical patent/CN109068318A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Abstract

The invention belongs to mobile communication technologies, information security field, and to provide a kind of method that can preferably protect personal information in mobile phone, even if mobile phone is lost or is stolen, personal information will not be revealed easily.The technical solution adopted by the present invention is that, the guard method of personal information, includes the following steps in a kind of smart phone thus, and data cached in mobile phone use process is stored in block chain in whole or in part, the Incomplete information of short period is only saved in mobile phone;When user whenever necessary, directly from block chain read downloading;Storage, downloading process are the process that the data encryption of block chain uploaded and decrypted downloading.

Description

The guard method of personal information in a kind of smart phone
Technical field
The invention belongs to mobile communication technology, information security field, personal information protection in a kind of smart phone is devised Method.
Technical background
With the development of smart phone technology, the life that people increasingly come connects each other with smart phone, video photography, Mail document, Investment & Financing, chat are all completed by smart phone.Because of the close ties of smart phone and personal lifestyle, Personal life almost all can be inquired by smart phone, be stolen or not once mobile phone loses perhaps cellphone information It may imagine.Due to data storage and mobile phone itself small volume etc., if do not take it is certain be only, the data in mobile phone are easy to It is stolen or is utilized by people.
Summary of the invention
For overcome the deficiencies in the prior art, the present invention is intended to provide a kind of that can preferably protect in smart phone The method of people's information, even if mobile phone is lost, personal information will not be stolen utilization easily.The technical side that the present invention takes thus Case is, the guard method of personal information, includes the following steps, data cached in mobile phone use process in a kind of smart phone It is stored in block chain in whole or in part, the Incomplete information of short period is only saved in mobile phone;When user whenever necessary, directly It connects and reads downloading from block chain;Storage, downloading process are the process that the data encryption of block chain uploaded and decrypted downloading.
The data of mobile phone terminal are downloaded to after use to decryption, whether are deleted by user's self-setting.
Block chain login account is using the phone number of user as account, and password is the block end of the chain to smart phone user Hold the dynamic random password sent;When reporting the loss phone number, mobile phone can not receive the dynamic random password of block end of the chain transmission.
The user information of protection includes short message, chat APP information and personal secret file.
Chat APP information includes the APP that wechat, QQ etc. will do it local datastore in mobile phone end;Personal secret File includes the personal documents such as personal diary, memorandum.
It uploads and downloading is realized using block chain data method for uploading and method for down loading, encryption function and decryption function It can be carried out by the block end of the chain.
It is compared in prior art, technical characterstic of the invention and effect:
The present invention is stored and is downloaded to the data in smart phone using block chain, thus can preferably protect intelligence The method of personal information in mobile phone, even if mobile phone is lost or is stolen, personal information data will not be revealed easily.
Detailed description of the invention
Fig. 1 is structural schematic diagram of the invention.
Specific embodiment
The present invention provides a kind of method of personal information protection in smart phone, user can believe the individual in mobile phone Breath data be stored in block chain, in mobile phone only save the short period Incomplete information, when user whenever necessary, directly from area Downloading is read in block chain.This process is related to a kind of process that block chain stores data and downloads.
The invention mainly comprises smart phones and block chain two parts.
User inputs personal information, and smart phone acquires the personal information of user, directly will be in the personal information in mobile phone It passes in block chain and is stored, block chain adds timestamp data according to the characteristic of itself and in storing data to data It is encrypted, the output information uploaded is not saved in mobile phone.When user has the information to be used to need to read from block chain When taking, relevant search information reads and is decrypted from block chain.
Wherein, it is that account is logged in that block chain, which is with cell-phone number, and when logging in block chain, block chain can give mobile phone user A dynamic password is sent, user is logged in this dynamic password.After mobile phone is lost, cell-phone number is reported the loss, mobile phone can not connect Receive the dynamic password that block chain is sent, others just can not login user block chain, cannot also check information.
Wherein, it includes short message, chat APP information and personal secret that the confidence of user, which can be the user information of protection, File.Some information are bigger, some information are smaller.
When user's upload information, the information of required storage is uploaded to block chain, block by communication interface by mobile phone Chain carries out encryption storage to information according to the transimission and storage mode of oneself.When the information required for user downloads, mobile phone is logical Communication port downloading data from block chain is crossed, is decrypted.Encryption and decryption are all the storage and reading according to block chain itself It takes mode to carry out, does not do special designing.
It is specifically described using a user as use-case.Including following steps:
The block chain interface of mobile phone terminal is logged in, addition cell-phone number, input handset number label letter corresponding with cell-phone number are clicked It ceases " user ";
Mobile phone is communicated by coffret with block chain, prompts user to input password by mobile phone display screen;
The password and account that block chain inputs user verify;
Verification can then carry out data upload and downloading after passing through;
After use, the cell-phone number of " user " in mobile phone is deleted.
For biggish data, we extract after partial information encrypts according to the importance of information and upload to cloud, so that A possibility that information in mobile phone is imperfect, and reduction is utilized.

Claims (6)

1. the guard method of personal information in a kind of smart phone, characterized in that include the following steps, in mobile phone use process It is data cached be stored in block chain in whole or in part, in mobile phone only save the short period Incomplete information;Work as user Whenever necessary, downloading is read directly from block chain;Storage, downloading process are that the data encryption of block chain uploads and decrypt downloading Process.
2. the guard method of personal information in a kind of smart phone according to claim 1, characterized in that under decryption Whether the data for being downloaded to mobile phone terminal after use, are deleted by user's self-setting.
3. the guard method of personal information in a kind of smart phone according to claim 1, characterized in that block chain is stepped on Land account is using the phone number of user as account, and password is the dynamic random that the block end of the chain is sent to smart phone user end Password;When reporting the loss phone number, mobile phone can not receive the dynamic random password of block end of the chain transmission.
4. the guard method of personal information in a kind of smart phone according to claim 1, characterized in that the use of protection Family information includes short message, chat APP information and personal secret file.
5. according to claim 1 or described in claim 4 in a kind of smart phone personal information guard method, feature It is that chat APP information includes the APP that wechat, QQ etc. will do it local datastore in mobile phone end;Personal secret file packet Include the personal documents such as personal diary, memorandum.
6. the guard method of personal information in a kind of smart phone according to claim 1, characterized in that upload and under Load realized using block chain data method for uploading and method for down loading, encryption function and decryption function by the block end of the chain into Row.
CN201810764681.7A 2018-10-08 2018-10-08 The guard method of personal information in a kind of smart phone Pending CN109068318A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810764681.7A CN109068318A (en) 2018-10-08 2018-10-08 The guard method of personal information in a kind of smart phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810764681.7A CN109068318A (en) 2018-10-08 2018-10-08 The guard method of personal information in a kind of smart phone

Publications (1)

Publication Number Publication Date
CN109068318A true CN109068318A (en) 2018-12-21

Family

ID=64816370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810764681.7A Pending CN109068318A (en) 2018-10-08 2018-10-08 The guard method of personal information in a kind of smart phone

Country Status (1)

Country Link
CN (1) CN109068318A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104519127A (en) * 2014-12-11 2015-04-15 天津大学 Method for protecting personal information in mobile phone
CN106991334A (en) * 2016-11-24 2017-07-28 阿里巴巴集团控股有限公司 A kind of method, system and device of data access
CN107820238A (en) * 2016-09-12 2018-03-20 国民技术股份有限公司 SIM card, block chain application security module, client and its method for safely carrying out

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104519127A (en) * 2014-12-11 2015-04-15 天津大学 Method for protecting personal information in mobile phone
CN107820238A (en) * 2016-09-12 2018-03-20 国民技术股份有限公司 SIM card, block chain application security module, client and its method for safely carrying out
CN106991334A (en) * 2016-11-24 2017-07-28 阿里巴巴集团控股有限公司 A kind of method, system and device of data access

Similar Documents

Publication Publication Date Title
CN102638565A (en) Mobile phone cloud encryption backup and recovery method based on cloud architecture
CN104852925A (en) Method for leakproof, secure storage and backup of data of mobile smart terminal
CN110263524A8 (en) A kind of mobile device encryption U-shield
CN102546242A (en) Cloud server based data backup and system recovery method and system utilizing same
CN104318148B (en) Portable multi-function encryption device
CN104202736A (en) Mobile terminal short message end-to-end encryption method oriented to Android system
CN103077357A (en) Method for storing private files
CN108390755B (en) Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip
CN102202297A (en) Method and device for encrypting mobile terminals
Farjamfar et al. Research Article A Review on Mobile Device's Digital Forensic Process Models
CN103577769A (en) File content safety management method and management system
CN101795315A (en) System and method for encrypting short messages by using mobile phone terminal
CN101646167A (en) Wireless network-accessing intelligent terminal and data processing method thereof
CN114026820A (en) Data uploading method, data downloading method and related equipment
CN103067897A (en) Asymmetrical mobile phone short message encryption method
KR101067146B1 (en) Method for processing encrypted message in portable terminal and portable terminal
US20170351866A1 (en) Authentication method
CN105049201A (en) Mobile equipment secret communication system based on quantum cryptography and mobile equipment secret communication method based on quantum cryptography
CN101754209A (en) Method for protecting contents of mobile phone
CN108471371A (en) A kind of intelligent domestic system and its working method
CN109068318A (en) The guard method of personal information in a kind of smart phone
US20150156173A1 (en) Communication system utilizing fingerprint information and use thereof
CN104732166A (en) Data storing and reading method and device and equipment
CN108109625B (en) Mobile phone voice recognition internal and external network transmission system and method
Judge Mobile forensics: Analysis of the messaging application signal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181221