CN101026822A - Method for protecting mobile phone private data - Google Patents
Method for protecting mobile phone private data Download PDFInfo
- Publication number
- CN101026822A CN101026822A CNA2006100384810A CN200610038481A CN101026822A CN 101026822 A CN101026822 A CN 101026822A CN A2006100384810 A CNA2006100384810 A CN A2006100384810A CN 200610038481 A CN200610038481 A CN 200610038481A CN 101026822 A CN101026822 A CN 101026822A
- Authority
- CN
- China
- Prior art keywords
- data
- normal
- mobile phone
- mode
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
Abstract
Interfaces of handset are divided into two modes: hidden and normal. A global variable parameter is setup. When being as 1, 2, n or true, the value of the parameter denotes that current mode is hidden; when being as 0, or false, the value of the parameter denotes that current mode is normal. Moreover, a parameter variable of file is set up. When being as 1, 2, n or true, the file is marked as hidden attribute; when being as 0, or false, the file is marked as normal attribute in order to save and display private data or normal data. Key in hidden cipher of handset makes switch between hidden mode and normal mode. Thus, owner of handset can look normal data and hidden data, and non-owner can only look normal data so as to protect all private data. Features are: simple operation and smart method for setting up cipher.
Description
[technical field]
The present invention relates to the method that a kind of cellphone subscriber hides mobile phone private data, it belongs to mobile communication and field of computer technology.
[background technology]
The application of current phone more and more widely.According to statistics, now China has the cellphone subscriber about 3.1 hundred million, and mobile phone has become one of most important carry-on product in people's daily life.Estimate that according to the insiders the share of high-end smartphones in 2006 will rise to 15%, regular handset will drop to 40%, and mobile phone list product value promotion is more than 10%.Along with the raising of product price ratio will make the low-end product of function singleness sell progressively atrophy, the fashion element will continue to take on the key player in the fashion trend of mobile phone products, and become the important pushing factor of mobile phone Gao Gengxin rate, and turn to development trend with multimedia intelligent, mobile phone will be broken away from the role of single communication tool, towards the intelligentized information terminal development of individual.Along with the reinforcement of cell-phone function, memory chip is strengthening, and the subscriber data of depositing in the mobile phone also is on the increase, in the mobile phone basic functions such as address list, message registration, note, multimedia message, notepad, schedule with regard in store many subscriber datas; In addition, along with making rapid progress of cell-phone function, take pictures, make a video recording, multimedia function such as recording is tending towards universal already, comprising the file that these multimedia functions are preserved in the mobile phone again.In these data, many machine masters' privacy data is often arranged, but all being mingled with normal data, these privacy datas are kept at fixedly in the catalogue.Current mobile phone Gao Kehua, superior in, its protection privacy data function but seems and lags behind very much, usually because mobile phone is used, makes machine master's individual privacy be covered all at one glance by other people.
Mobile phone protection privacy function is only limited to modes such as cell-phone lock, function lock substantially at present.Cell-phone lock is to the usufructuary protection of mobile phone, locks to mobile phone in the time of can or using mobile phone when start.In case enabled cell-phone lock, under the situation of input handset password not, can't use any function of mobile phone.Function lock is that some functional module to mobile phone locks, when using these functional modules, must first input handset password, thus accomplish protection to this function data., in case after adding cell-phone lock or function lock to mobile phone, when using mobile phone, all must input password repeatedly normal, this will bring very big inconvenience to normal use mobile phone.As the cipher code protection method of CN200510089511.6 communication terminal, utilize some characteristic of cipher mechanism and flash storing memory, realize protection to information security in the phone.The method of cell phone password protection of the present invention comprises: start cell phone password and protect this function; When the user did not do any operation to mobile phone in the fixed time, mobile phone entered the cryptoguard state automatically; True being set at of the status indication of " locking mode " in the mobile phone memory; When the normal use of attempt mobile phone, the prompting user inputs password.
The personal information protecting method of CN03112585.9 mobile phone is stored in encryption mode in the random asccess memory of power down preservation, sets or revises cell phone password and deposit read-only memory in; Add " encryption mode " submenu at Administration menu, confirm then to require " input handset password "; Behind the input setting code, the encryption mode sign is set to true, shows " encryption mode is set "; When depositing number in, mobile phone is read the value of encryption mode sign earlier, and affirmation then also is changed to true and demonstration " having encrypted storage " with " encryption mode " of address list; When searching address list, mobile phone judges earlier whether this number " encryption mode " value is true, if show " * "; Input number keyboard requires the input password; Password correctly then shows this telephone number, otherwise still shows " * "; Change non-encrypted pattern after the shutdown into.Also can set the address list restricted function.
The weak point of said method is: need specialized designs " encryption mode " submenu 1.; 2. the application of encryption mode is narrow, is only limited to address list; 3. after " address list is limited " function is enabled, can't enable address list or address list correlation function (message registration, note, incoming call identification) etc., this will influence the use of mobile phone greatly; 4. tangible " encryption mode " submenu management options that the user is many, encryption mode is to the switching complexity of non-encrypted pattern; 5. do not relate to the file group of private memory on file such as short messages stored or the mobile phone is encrypted.
[summary of the invention]
The present invention seeks to: the problems referred to above of solution provide a kind of better protection mobile phone private data method of (or claiming individual special-purpose data).Under the prerequisite that does not influence the use of mobile phone normal function, the privacy data that mobile phone is all is protected, the machine master of making can arbitrarily check normal data and privacy data; But not the machine master can only view the normal data of mobile phone, even can't discover the existence that privacy data fully.Method of the present invention especially is suitable for various mobile or fixed meanss of communication and uses, and simple to operate, it is ingenious to establish decryption method.
The present invention is achieved in that the method for protection mobile phone private data, mobile phone interface is divided into hides and normal two kinds of patterns, and a global variable parameter is set, and parameter value is 1,2, n or true time, represents that current is stealth mode; Value is 0 or fictitious time, represents that current is normal mode; The parametric variable of a file is set again, and parameter value is 1,2, n or true time, and this document is labeled as hiding attribute; Value is 0 or fictitious time, and expression is labeled as normal attribute with this document; Be used for preserving the privacy data and the normal data of also display file respectively; The key entry of password is hidden in the switching of stealth mode and normal mode by mobile phone; Especially key in by the password of mobile phone string sign indicating number and realize; Mobile phone string sign indicating number is established close in interface or the key entry of setting interface of starting shooting, and entering the back expression current is stealth mode; Normally/switching of stealth mode also can realize by the mode of enciphering hiding menu.As key in the switching that realizes hiding and normal two kinds of patterns by mobile phone string sign indicating number.
The global variable parameter that above-mentioned global variable parameter can be a Boolean type, parameter value are true time, represent that current is stealth mode; Value represents that for fictitious time current is normal mode.
During stealth mode, be worth, call in the file mark that accesses or operate under all these stealth modes and all have hiding attribute naturally under the genuine condition.That mobile phone string sign indicating number is established is close, key in and change.Mobile phone string sign indicating number is established close in interface or the key entry of setting interface of starting shooting.
Certainly, also have other method to establish close, key feeding cipher and change to hiding attribute and normal attribute.
For the hiding number that needs are protected, in a stealth mode, create and preserve the record (comprising address list) of hiding number or use the hiding number that is provided with in the hiding address list, all be labeled as hiding attribute by hiding the relevant file of number transmitting-receiving.
The present invention is based on following basis: the first step, need separate privacy data and normal data, how distinguishing privacy data is a difficult point of this method with normal data.
According to statistics, the topmost privacy data of cellphone subscriber is message registration, note and telephony feature to name/number demonstration aspect, and these data are often all relevant with some fixing number, and we are called hiding number these fixing numbers.In the mobile phone basic function, functions such as address list, telephony feature, message registration, note, multimedia message all are closely related with number.Address list may comprise machine master's hiding number, have in the telephony feature from the incoming call of hiding number or with the conversation of hiding number, the message registration of machine master and hiding number may be preserved in the message registration, the information of machine master and hiding number transmitting-receiving may be preserved in note, the multimedia message.For with number file associated or data, at first set to hide number, file or data that all are relevant with hiding number all belong to privacy data.Promptly create in stealth mode and preserve the record of hiding number or use hiding address list to write down all hiding numbers, the file of hiding the number correlation module all is labeled as hiding attribute.
In addition, also some privacy data is but irrelevant with number, also the in store machine master's of possibility privacy data.For example, take pictures, make a video recording, function such as recording, notepad, schedule, PC instrument can be saved in some data in the file system of mobile phone, just may have the data that belongs to machine master privacy in these data.
In view of this, cellphone subscriber's privacy data can be divided into the data relevant with number and with the irrelevant data of number.So,, need the branch situation to discuss in order to protect machine master's privacy data.
For the data relevant with number, only need set hiding number, just all privacy datas that are associated with hiding number and normal information data area can be separated.The key step of this method is as follows:
(1) mobile phone interface is divided into hides and normal two kinds of patterns, be used for respectively preserving and show privacy data and normal data.
(2) set the mode that only organic master knows, mobile phone is switched between stealth mode and normal mode.
(3) in stealth mode, create the record (can use hiding address list to write down all hiding numbers) of preserving hiding number.
(4) in stealth mode, create the hiding talking recording menu, be used for preserving the message registration of all and hiding number.
(5) in stealth mode, create to hide note, multimedia message menu, be used for preserving note, the multimedia message record of all and hiding number.
(6) under normal mode, if receive the incoming call of hiding number or directly dial when hiding number and conversing with hiding number, the name/number that needs to hide number shows, and message registration is saved in during hiding talking writes down.
(7) under normal mode,, can only in stealth mode, check if receive the note or the multimedia message of hiding number.
For with irrelevant file or the data of number, distinguish privacy and normal file or data and adopt following method:
1. when calling functional modules, distinguish: provide two kinds of paths of calling this module to the user, respectively privacy data and normal data are preserved and read.
2. directly distinguish when preserving: when the data of preservation, whether the prompting user is made as privacy data with this data.
3. distinguish when after preservation, reading data: when reading data, offer the method that the user transforms normal data and privacy data mutually.
Because 2nd, the 3rd kind of method can stay the clues and traces of hidden function in the mobile phone normal mode, make the general user in the normal existence that may perceive hidden information when using mobile phone, so we mainly adopt the 1st kind of method, and its row gone through.The key step of this method is as follows:
(1) mobile phone interface is divided into hides and normal two kinds of patterns, be used for respectively preserving and show privacy data and normal data.
(2) set the mode that only organic master knows, mobile phone is switched between stealth mode and normal mode.
(3) in stealth mode, add the functional module menu that to hide.
When (4) preserving file: if current be stealth mode, then this document is defined as privacy data; If current is normal mode, this document is defined as normal data.
When (5) reading file:, then show privacy data if current for stealth mode; If current is normal mode, show normal data, can not show privacy data.
Second step, for privacy data that has distinguished and normal data, need when preserving, distinguish, mainly contain following 2 kinds of modes:
A. flag attribute realizes on file.Promptly under normal mode and stealth mode, call same module, only when preserving or reading file, distinguish.When preserving file, the different attribute of mark on file; When reading file, only allow to read the file of respective attributes.
B. flag attribute realizes on module.Promptly call disparate modules under normal mode and stealth mode, these two modules can be inequality in function.
[description of drawings]
Fig. 1: the switching mode schematic diagram that is normal mode of the present invention, stealth mode
Fig. 2: be that the present invention opens address list menu schematic diagram
Fig. 3: be the preservation of writing down in the note of the present invention and read the mode schematic diagram
Fig. 4: be the preservation of Taking Pictures recording of the present invention and read the mode schematic diagram
Fig. 5: be the present invention when sending a telegram here and conversing to hiding the protected mode schematic diagram of number
Fig. 6: be the prompting mode schematic diagram that the present invention receives new message
Fig. 7: be that the present invention realizes the switching figure between each pattern
Fig. 8: be the switching figure that the present invention realizes normal mode, stealth mode
[embodiment]
Embodiment 1: a kind of method of protecting mobile phone private data.
The cell-phone function module that may comprise organic main privacy data in the mobile phone comprises: address list, message registration, note, multimedia message, take pictures, make a video recording, recording, notepad, schedule etc.For the data relevant, can privacy data and normal information data area be separated by setting the mode of hiding number with number.Normal mode offers the cell-phone function of any user, can view the normal data of all mobile phones; Stealth mode provides the mobile phone special function to the machine master, realizes the storage of mobile phone private data and reads, in order to the protection to machine master privacy data.Normally/switching of stealth mode can realize by the mode that enciphering hiding menu or encryption enter the stealth mode interface.
Use above method, the key step of this method is as follows:
(1) mobile phone interface is divided into hiding and normal two kinds of patterns, deposits privacy data and normal data respectively.The global variable g_IsHideMode of a Boolean type is set, is kept among the mobile phone EEPROM.The value of g_IsHideMode is a true time, represents that current is stealth mode; The value of gIsHideMode is a fictitious time, represents that current is normal mode; The parametric variable HideState of a file is set again, and the value of HideState is a true time, and expression is labeled as hiding attribute with this document; The value of HideState is a fictitious time, and expression is labeled as normal attribute with this document.
(2) set hiding password: at first mobile phone string sign indicating number is obtained one 6 numeral by a mathematical formulae, the default hidden password as stealth mode is kept among the mobile phone EEPROM, and will hide password and tell the machine master.
(3) realize the switching of normal mode, stealth mode in Fig. 1 mode: during start, the value of acquiescence g_IsHideMode be false, and promptly current is normal mode, and the user can use normally to mobile phone at this moment.After password+" # " hidden in dialing interface input, the value of g_IsHideMode is made as very, and opens hide menu, promptly entered stealth mode.When withdrawing from hide menu, the value with g_IsHideMode is made as vacation again, promptly turns back to normal mode again.
(4) can revise hiding password in hide menu, new hiding password must also be one 6 a numeral, and is kept among the mobile phone EEPROM.
Application when (5) representing to open the address list menu as Fig. 2: promptly current when being stealth mode if the value of g_IsHideMode is for true, open hiding address list (being that module attribute HideState is genuine address list module); If the value of g_IsHideMode is false, promptly current when be normal mode, open normal communication record (being the address list module of module attribute HideState) for vacation.The address list module of different attribute has file system separately, with storage address list record separately.
(6) hiding number is added in the hiding address list.
(7) in stealth mode, create the menu of message registration, note, multimedia message etc. and the relevant module of number, use in order to the hidden function of realizing correlation module.
The preservation of writing down in the note and read mode as shown in Figure 3:
When keeping records, need not to set a property directly is kept among the mobile phone EEPROM.
When reading and recording, promptly current when be stealth mode if the value of g_IsHideMode is true, read all note numbers and be kept at note record in the hiding address list; If the value of g_IsHideMode is false, promptly current when be normal mode, read all note numbers and be not kept at note record in the hiding address list.
In like manner, for the preservation of message registration, multimedia message record with read, also operate according to mode shown in Figure 3.
(8) in stealth mode, create take pictures, make a video recording, the menu of recording, notepad, schedule etc. and the irrelevant module of number, use in order to the hidden function of realizing correlation module.
The preservation of Taking Pictures recording and read mode as shown in Figure 4:
When keeping records, promptly current when be stealth mode if the value of gIsHideMode is true, the attribute HideState that writes down is made as very; If the value of g_IsHideMode is false, promptly current when be normal mode, the attribute HideState that writes down is made as vacation.
When reading and recording, promptly current when being stealth mode if the value of g_IsHideMode is true, read attribute HideState and be genuine record; If the value of g_IsHideMode is false, promptly current when be normal mode, read the record of attribute HideState for vacation.
In like manner, for the preservation of shooting, recording, notepad, schedule record with read, also operate according to mode shown in Figure 4.
(9) in incoming call and when conversation, need to show the other side's name or number, in order to accomplish hiding the protection of number, and will be according to handling as shown in Figure 5:
The value of g_IsHideMode is true, and is promptly current during for stealth mode: as to have comprised this number if hide in the address list, shown the corresponding name of hiding address list of caller ID; If this number is not kept at and hides in the address list and when being kept in the normal communication record, show the name of the corresponding normal communication record of caller ID.
The value of g_IsHideMode is false, and is promptly current during for normal mode: as to have comprised this number if hide in the address list, shown " unknown name " and do not show caller ID, to accomplish hiding the protection of number; If this number is not kept at and hides in the address list and when being kept in the normal communication record, show the name of the corresponding normal communication record of caller ID.(10) prompting mode of receiving new message is as shown in Figure 6:
The value of g_IsHideMode is true, and is promptly current during for stealth mode: as to have comprised this number if hide in the address list, play the new message prompt tone, and shown the new message prompt window; If this number is not kept at and hides in the address list and when being kept in the normal communication record, only play the new message prompt tone, do not show the new message prompt window, switch to stealth mode and show.
The value of g_IsHideMode is false, and is promptly current during for normal mode: as to have comprised this number if hide in the address list, play the new message prompt tone, do not shown the new message prompt window; If this number is not kept at and hides in the address list and when being kept in the normal communication record, play the new message prompt tone, show the new message prompt window.
In like manner, for the preservation of multimedia message with read, also operate according to mode shown in Figure 6.
Being preferred embodiment of the present invention only in sum, is not to be used for limiting practical range of the present invention.Be that all equivalences of doing according to the content of the present patent application claim change and modification, all should be technology category of the present invention.
Embodiment 2: a kind of method of protecting mobile phone private data.
According to the mode of embodiment 1, the machine master may need privacy data to be set to different ranks when using the mobile phone hidden function, and with open to different people, this mode for embodiment 1 can't realize.A plurality of stealth modes can be set according to the design of embodiment 1, and the password of each stealth mode is all inequality, and different people is announced different hiding passwords, can realize the function with the privacy data classification.
Use above viewpoint, the key step of this method is as follows:
(1) mobile phone interface is divided into a plurality of stealth modes and a normal mode, each stealth mode is used for depositing the different stage privacy data, and normal mode is used for depositing normal data.The global variable g_IsHideMode of an integer type is set, is kept among the mobile phone EEPROM.The value of g_IsHideMode is 1 o'clock, represents that current is stealth mode 1; The value of g_IsHideMode is 2 o'clock, represents that current is stealth mode 2; By that analogy, when the value of g_IsHideMode is n, represent that current is stealth mode n; The value of g_IsHideMode is 0 o'clock, represents that current is normal mode; The parametric variable HideState of a file is set again, and the value of HideState is 1 o'clock, and expression is labeled as this document hides attribute 1; The value of HideStat e is 2 o'clock, and expression is labeled as this document hides attribute 2; By that analogy, when the value of HideState was n, expression is labeled as this document hid attribute n; The value of HideState is 0 o'clock, and expression is labeled as normal attribute with this document.
(2) set hiding password: at first mobile phone string sign indicating number is obtained different 6 numeral by different mathematical formulaes, the default hidden password as each stealth mode is kept among the mobile phone EEPROM, and tells the machine master with all hiding passwords.
(3) realize switching between each pattern in Fig. 7 mode: during start, the value of acquiescence g_IsHideMode is 0, and promptly current be normal mode, and the user can use normally to mobile phone at this moment.Input default hidden password+" # " of any stealth mode at dialing interface after, reset the value of g_IsHideMode, and open the hide menu of this pattern, promptly entered this stealth mode.When withdrawing from hide menu, the value with g_IsHideMode is made as 0 again, promptly turns back to normal mode again.
Embodiment 3: a kind of method of protecting mobile phone private data.
According to the mode of embodiment 1, the switching of normal mode, stealth mode is the mode by the enciphering hiding menu, can certainly realize by the mode that encryption enters the stealth mode interface.
Use above method, the key step of this method is as follows:
(1) mobile phone interface is divided into hiding and normal two kinds of patterns, deposits all data (hidden information and normal data) and normal data respectively.The global variable g_IsHideMode of a Boolean type is set, is kept among the mobile phone EEPROM.The value of g_IsHideMode is a true time, represents that current is stealth mode; The value of g_IsHideMode is a fictitious time, represents that current is normal mode; The parametric variable HideState of a file is set again, and the value of HideState is a true time, and expression is labeled as hiding attribute with this document; The value of HideState is a fictitious time, and expression is labeled as normal attribute with this document.
(2) set to hide password: at first mobile phone string sign indicating number is calculated one 6 numeral or alphabetical by a mathematical formulae, for example take advantage of a numeral to get back six default hidden passwords as stealth mode, be kept among the mobile phone EEPROM, and will hide password and tell the machine master.
(3) realize the switching of normal mode, stealth mode in Fig. 8 mode.During start, the value of acquiescence g_IsHideMode is false, and promptly current is normal mode, and this moment, the user can use normally to mobile phone, and only showed normal data, also can only preserve normal data.After password+" # " hidden in the input of normal mode dialing interface, the value of g_IsHideMode is made as very, it is the current stealth mode that is, this moment, the user can use all functions of mobile phone, and demonstration is comprised all data of privacy data and normal data, also can select during preservation data is saved as privacy data or normal data.After password+" # " hidden in the input of stealth mode dialing interface, the value with g_IsHideMode was made as vacation again, promptly turns back to normal mode again.
Claims (11)
1, the method for protection mobile phone private data is characterized in that mobile phone interface is divided into and hides and normal two kinds of patterns, and a global variable parameter is set, and parameter value is 1,2, n or true time, represents that current is stealth mode; Value is 0 or fictitious time, represents that current is normal mode; The parametric variable of a file is set again, and parameter value is 1,2, n or true time, and this document is labeled as hiding attribute; Value is 0 or fictitious time, and expression is labeled as normal attribute with this document; Be used for preserving the privacy data and the normal data of also display file respectively; The key entry of password is hidden in the switching of stealth mode and normal mode by mobile phone.
2, the method for protection mobile phone private data according to claim 1 is characterized in that the global variable parameter is the global variable parameter of Boolean type, and parameter value is a true time, represents that current is stealth mode; Value represents that for fictitious time current is normal mode.
2, the method for protection mobile phone private data according to claim 1 is characterized in that hiding password by mobile phone keys in the switching that realizes hiding and normal two kinds of patterns.
3, the method for protection mobile phone private data according to claim 1 when it is characterized in that stealth mode, is worth under the genuine condition, calls in the file mark that accesses or operate under all these stealth modes and all has hiding attribute naturally.
4, the method for protection mobile phone private data according to claim 1 is characterized in that mobile phone hides password and establish close at the start interface or set the interface and key in.
5, the method for protection mobile phone private data according to claim 1 is characterized in that mobile phone hides password and establish close, key feeding cipher and change.
6, the method for protection mobile phone private data according to claim 1, it is characterized in that for number file associated or data, at first set to hide number, file or data that all are relevant with hiding number all belong to privacy data.
7, the method for protection mobile phone private data according to claim 1, it is characterized in that for irrelevant file or the data of number, distinguish privacy and normal file or data and adopt following method:
(1) when calling functional modules, distinguishes: provide two kinds of paths of calling this module to the user, respectively privacy data and normal data are preserved and read;
(2) directly when preserving, distinguish: when the data of preservation, the prompting user, whether this data is made as privacy data,
Distinguish when (3) after preservation, reading data: when reading data, offer the method that the user transforms normal data and privacy data mutually.
8, the method for protection mobile phone private data according to claim 1 is characterized in that distinguishing privacy and normal file or data and adopts following method:
(1) mobile phone interface is divided into hides and normal two kinds of patterns, be used for respectively preserving and show privacy data and normal data; Switch between stealth mode and normal mode by mobile phone;
(2) in stealth mode, add the functional module menu that to hide;
When (3) preserving file: if current be stealth mode, then this document is defined as privacy data; If current is normal mode, this document is defined as normal data;
When (4) reading file: if current for stealth mode,, would then show privacy data; If current is normal mode, show normal data.
9, the method for protection mobile phone private data according to claim 1 is characterized in that for privacy data that has distinguished and normal data, need distinguish when preserving:
(1) flag attribute realizes on file, promptly calls same module under normal mode and stealth mode, only when preserving or reading file, distinguish, and when preserving file, the different attribute of mark on file; When reading file, only allow to read the file of respective attributes;
(2) flag attribute realizes on module.Promptly under normal mode and stealth mode, call disparate modules.
10, the method for protection mobile phone private data according to claim 1 and 2 is characterized in that the mode that enters the stealth mode interface by encryption realizes:
(1) mobile phone interface is divided into hiding and normal two kinds of patterns, deposits hidden information and normally data and normally data respectively;
(2) set to hide password: at first mobile phone string sign indicating number is calculated one 6 numeral or alphabetical by a mathematical formulae;
(3) switching of realization normal mode, stealth mode; During start, the value of the global variable parameter of acquiescence Boolean type is false, and promptly current is normal mode, only shows normal data; After password+" # " hidden in normal mode dialing interface input, the value of the global variable parameter of Boolean type is made as very, promptly current be stealth mode, this moment, the user can use all functions of mobile phone, and showed privacy data and normal data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006100384810A CN101026822A (en) | 2006-02-24 | 2006-02-24 | Method for protecting mobile phone private data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006100384810A CN101026822A (en) | 2006-02-24 | 2006-02-24 | Method for protecting mobile phone private data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101026822A true CN101026822A (en) | 2007-08-29 |
Family
ID=38744637
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2006100384810A Pending CN101026822A (en) | 2006-02-24 | 2006-02-24 | Method for protecting mobile phone private data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101026822A (en) |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101753842A (en) * | 2008-12-19 | 2010-06-23 | 汤姆森许可贸易公司 | Display device and method aiming to protect access to audiovisual documents recorded in storage means |
CN101909114A (en) * | 2010-07-13 | 2010-12-08 | 中兴通讯股份有限公司 | Method, device and mobile terminal for hiding information |
WO2011153748A1 (en) * | 2010-06-11 | 2011-12-15 | 中兴通讯股份有限公司 | Method and apparatus for communicating using spurious contact information |
CN102360340A (en) * | 2011-09-30 | 2012-02-22 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for backing up and recovering private data |
CN102413230A (en) * | 2011-09-23 | 2012-04-11 | 宇龙计算机通信科技(深圳)有限公司 | Terminal and data display method |
CN102722663A (en) * | 2012-05-16 | 2012-10-10 | 广东欧珀移动通信有限公司 | Handheld smart device data security protection method |
CN102778996A (en) * | 2011-05-10 | 2012-11-14 | 宏达国际电子股份有限公司 | Unlocking method and handheld electronic device using same |
WO2013075431A1 (en) * | 2011-11-22 | 2013-05-30 | 中兴通讯股份有限公司 | Method and device for protecting information in mobile terminal |
CN103369104A (en) * | 2012-03-27 | 2013-10-23 | 中兴通讯股份有限公司 | Method and device for realizing encrypted dialing information display, and communication terminal |
CN103685266A (en) * | 2013-12-10 | 2014-03-26 | 北京奇虎科技有限公司 | Method and device for protecting enterprise data |
CN103678962A (en) * | 2012-08-30 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Personal information management method and device and terminal |
CN103761487A (en) * | 2014-01-27 | 2014-04-30 | 宇龙计算机通信科技(深圳)有限公司 | Hiding method and device of files |
CN103885858A (en) * | 2014-03-11 | 2014-06-25 | 惠州Tcl移动通信有限公司 | Method and system for mobile phone backup and data recovery |
CN104008313A (en) * | 2013-02-27 | 2014-08-27 | 腾讯科技(深圳)有限公司 | Protecting method and device of privacy information |
CN104102882A (en) * | 2013-04-12 | 2014-10-15 | 腾讯科技(深圳)有限公司 | Protection method and device for privacy data of application program |
CN104318139A (en) * | 2014-10-09 | 2015-01-28 | 深圳市中兴移动通信有限公司 | Intelligent terminal and method for processing data information by using same |
CN104361287A (en) * | 2014-11-12 | 2015-02-18 | 深圳市中兴移动通信有限公司 | Method and device for switching working states of terminal |
CN104424412A (en) * | 2013-09-03 | 2015-03-18 | 北京三星通信技术研究有限公司 | Method for protecting information in intelligent terminal, page switching method and intelligent terminal |
CN104486083A (en) * | 2014-12-19 | 2015-04-01 | 小米科技有限责任公司 | Supervisory video processing method and device |
US9047453B2 (en) | 2011-05-10 | 2015-06-02 | Htc Corporation | Unlocking method, computer readable storage medium for storing thereof and handheld electrical device applying thereof |
CN104915578A (en) * | 2015-05-27 | 2015-09-16 | 努比亚技术有限公司 | Method and device for improving operation file safety through hidden modes |
WO2015143827A1 (en) * | 2014-03-24 | 2015-10-01 | 中兴通讯股份有限公司 | Method, apparatus and communication system for address book protection |
CN105159542A (en) * | 2015-09-21 | 2015-12-16 | 北京元心科技有限公司 | Desktop icon display method and apparatus for intelligent device |
WO2015196444A1 (en) * | 2014-06-27 | 2015-12-30 | Microsoft Technology Licensing, Llc | Fast data protection using dual file systems |
WO2015196448A1 (en) * | 2014-06-27 | 2015-12-30 | Microsoft Technology Licensing, Llc | Data protection based on user and gesture recognition |
CN105339946A (en) * | 2013-06-24 | 2016-02-17 | 三星电子株式会社 | Apparatus and method for providing security environment |
CN106453800A (en) * | 2010-11-09 | 2017-02-22 | 微软技术许可有限责任公司 | Privacy in mobile device communications |
CN106874718A (en) * | 2016-07-27 | 2017-06-20 | 阿里巴巴集团控股有限公司 | privacy processing method, device and terminal |
CN107948971A (en) * | 2017-11-16 | 2018-04-20 | 北京小米移动软件有限公司 | Initial system and attend to anything else inter-system switching method, device, terminal and storage medium |
CN107992757A (en) * | 2016-10-27 | 2018-05-04 | 珠海金山办公软件有限公司 | A kind of file encryption, decryption method and device |
CN108650674A (en) * | 2017-08-12 | 2018-10-12 | 我要家网络科技有限公司 | A kind of information security enciphering hiding coding system |
CN108777657A (en) * | 2018-06-05 | 2018-11-09 | 广州推己科技有限公司 | The implementation method that user identity state switches in social platform |
CN108833657A (en) * | 2013-06-19 | 2018-11-16 | 华为终端(东莞)有限公司 | A kind of method and device of data and Message Processing |
CN109151158A (en) * | 2018-02-27 | 2019-01-04 | 石秋华 | A kind of automatic hidden method of cell phone application icon |
US10372937B2 (en) | 2014-06-27 | 2019-08-06 | Microsoft Technology Licensing, Llc | Data protection based on user input during device boot-up, user login, and device shut-down states |
US10423766B2 (en) | 2014-06-27 | 2019-09-24 | Microsoft Technology Licensing, Llc | Data protection system based on user input patterns on device |
US10474849B2 (en) | 2014-06-27 | 2019-11-12 | Microsoft Technology Licensing, Llc | System for data protection in power off mode |
-
2006
- 2006-02-24 CN CNA2006100384810A patent/CN101026822A/en active Pending
Cited By (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101753842A (en) * | 2008-12-19 | 2010-06-23 | 汤姆森许可贸易公司 | Display device and method aiming to protect access to audiovisual documents recorded in storage means |
US9430679B2 (en) | 2008-12-19 | 2016-08-30 | Thomson Licensing | Display device and method aiming to protect access to audiovisual documents recorded in storage means |
WO2011153748A1 (en) * | 2010-06-11 | 2011-12-15 | 中兴通讯股份有限公司 | Method and apparatus for communicating using spurious contact information |
US8433068B2 (en) | 2010-06-11 | 2013-04-30 | Zte Corporation | Method and apparatus for communication based on pseudo-contact information |
CN101909114A (en) * | 2010-07-13 | 2010-12-08 | 中兴通讯股份有限公司 | Method, device and mobile terminal for hiding information |
CN106453800A (en) * | 2010-11-09 | 2017-02-22 | 微软技术许可有限责任公司 | Privacy in mobile device communications |
US9047453B2 (en) | 2011-05-10 | 2015-06-02 | Htc Corporation | Unlocking method, computer readable storage medium for storing thereof and handheld electrical device applying thereof |
CN102778996A (en) * | 2011-05-10 | 2012-11-14 | 宏达国际电子股份有限公司 | Unlocking method and handheld electronic device using same |
CN102413230B (en) * | 2011-09-23 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | Terminal and data display method |
CN102413230A (en) * | 2011-09-23 | 2012-04-11 | 宇龙计算机通信科技(深圳)有限公司 | Terminal and data display method |
CN102360340A (en) * | 2011-09-30 | 2012-02-22 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for backing up and recovering private data |
WO2013075431A1 (en) * | 2011-11-22 | 2013-05-30 | 中兴通讯股份有限公司 | Method and device for protecting information in mobile terminal |
CN103136479A (en) * | 2011-11-22 | 2013-06-05 | 中兴通讯股份有限公司 | Information protection method and device of mobile terminal |
CN103369104B (en) * | 2012-03-27 | 2015-05-20 | 中兴通讯股份有限公司 | Method and device for realizing encrypted dialing information display, and communication terminal |
CN103369104A (en) * | 2012-03-27 | 2013-10-23 | 中兴通讯股份有限公司 | Method and device for realizing encrypted dialing information display, and communication terminal |
CN102722663B (en) * | 2012-05-16 | 2015-01-07 | 广东欧珀移动通信有限公司 | Handheld smart device data security protection method |
CN102722663A (en) * | 2012-05-16 | 2012-10-10 | 广东欧珀移动通信有限公司 | Handheld smart device data security protection method |
CN103678962A (en) * | 2012-08-30 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Personal information management method and device and terminal |
CN103678962B (en) * | 2012-08-30 | 2018-04-03 | 腾讯科技(深圳)有限公司 | The method, apparatus and terminal of managing personal information |
CN104008313B (en) * | 2013-02-27 | 2018-02-27 | 腾讯科技(深圳)有限公司 | The guard method of privacy information and device |
CN104008313A (en) * | 2013-02-27 | 2014-08-27 | 腾讯科技(深圳)有限公司 | Protecting method and device of privacy information |
CN104102882A (en) * | 2013-04-12 | 2014-10-15 | 腾讯科技(深圳)有限公司 | Protection method and device for privacy data of application program |
CN104102882B (en) * | 2013-04-12 | 2017-05-03 | 腾讯科技(深圳)有限公司 | Protection method and device for privacy data of application program |
CN108833657A (en) * | 2013-06-19 | 2018-11-16 | 华为终端(东莞)有限公司 | A kind of method and device of data and Message Processing |
CN109040409A (en) * | 2013-06-19 | 2018-12-18 | 华为终端(东莞)有限公司 | A kind of method and device of data and Message Processing |
CN109040409B (en) * | 2013-06-19 | 2023-03-24 | 华为终端有限公司 | Method and device for processing data and message |
CN105339946A (en) * | 2013-06-24 | 2016-02-17 | 三星电子株式会社 | Apparatus and method for providing security environment |
US10372895B2 (en) | 2013-06-24 | 2019-08-06 | Samsung Electronics Co., Ltd. | Apparatus and method for providing a security environment |
CN104424412A (en) * | 2013-09-03 | 2015-03-18 | 北京三星通信技术研究有限公司 | Method for protecting information in intelligent terminal, page switching method and intelligent terminal |
WO2015085906A1 (en) * | 2013-12-10 | 2015-06-18 | 北京奇虎科技有限公司 | Method and device for enterprise data protection |
CN103685266A (en) * | 2013-12-10 | 2014-03-26 | 北京奇虎科技有限公司 | Method and device for protecting enterprise data |
CN103761487A (en) * | 2014-01-27 | 2014-04-30 | 宇龙计算机通信科技(深圳)有限公司 | Hiding method and device of files |
CN103761487B (en) * | 2014-01-27 | 2017-03-15 | 宇龙计算机通信科技(深圳)有限公司 | The hidden method and device of file |
CN103885858A (en) * | 2014-03-11 | 2014-06-25 | 惠州Tcl移动通信有限公司 | Method and system for mobile phone backup and data recovery |
CN103885858B (en) * | 2014-03-11 | 2017-05-10 | 惠州Tcl移动通信有限公司 | Method and system for mobile phone backup and data recovery |
WO2015143827A1 (en) * | 2014-03-24 | 2015-10-01 | 中兴通讯股份有限公司 | Method, apparatus and communication system for address book protection |
WO2015196448A1 (en) * | 2014-06-27 | 2015-12-30 | Microsoft Technology Licensing, Llc | Data protection based on user and gesture recognition |
WO2015196444A1 (en) * | 2014-06-27 | 2015-12-30 | Microsoft Technology Licensing, Llc | Fast data protection using dual file systems |
US10372937B2 (en) | 2014-06-27 | 2019-08-06 | Microsoft Technology Licensing, Llc | Data protection based on user input during device boot-up, user login, and device shut-down states |
US10423766B2 (en) | 2014-06-27 | 2019-09-24 | Microsoft Technology Licensing, Llc | Data protection system based on user input patterns on device |
US9697375B2 (en) | 2014-06-27 | 2017-07-04 | Microsoft Technology Licensing, Llc | Fast data protection using dual file systems |
US9734352B2 (en) | 2014-06-27 | 2017-08-15 | Microsoft Technology Licensing, Llc | Data protection based on user and gesture recognition |
US10474849B2 (en) | 2014-06-27 | 2019-11-12 | Microsoft Technology Licensing, Llc | System for data protection in power off mode |
CN104318139A (en) * | 2014-10-09 | 2015-01-28 | 深圳市中兴移动通信有限公司 | Intelligent terminal and method for processing data information by using same |
CN104361287B (en) * | 2014-11-12 | 2018-08-14 | 努比亚技术有限公司 | Terminal operating status switching handling method and device |
CN104361287A (en) * | 2014-11-12 | 2015-02-18 | 深圳市中兴移动通信有限公司 | Method and device for switching working states of terminal |
WO2016095623A1 (en) * | 2014-12-19 | 2016-06-23 | 小米科技有限责任公司 | Method and apparatus for processing surveillance video |
US10193875B2 (en) | 2014-12-19 | 2019-01-29 | Xiaomi Inc. | Method and apparatus for controlling access to surveillance video |
CN104486083A (en) * | 2014-12-19 | 2015-04-01 | 小米科技有限责任公司 | Supervisory video processing method and device |
CN104915578A (en) * | 2015-05-27 | 2015-09-16 | 努比亚技术有限公司 | Method and device for improving operation file safety through hidden modes |
CN105159542B (en) * | 2015-09-21 | 2018-11-16 | 北京元心科技有限公司 | A kind of the desktop icons display methods and device of smart machine |
CN105159542A (en) * | 2015-09-21 | 2015-12-16 | 北京元心科技有限公司 | Desktop icon display method and apparatus for intelligent device |
CN106874718A (en) * | 2016-07-27 | 2017-06-20 | 阿里巴巴集团控股有限公司 | privacy processing method, device and terminal |
CN107992757A (en) * | 2016-10-27 | 2018-05-04 | 珠海金山办公软件有限公司 | A kind of file encryption, decryption method and device |
CN108650674A (en) * | 2017-08-12 | 2018-10-12 | 我要家网络科技有限公司 | A kind of information security enciphering hiding coding system |
CN107948971A (en) * | 2017-11-16 | 2018-04-20 | 北京小米移动软件有限公司 | Initial system and attend to anything else inter-system switching method, device, terminal and storage medium |
CN109151158B (en) * | 2018-02-27 | 2019-05-10 | 科之光电子科技(信丰)有限公司 | A kind of automatic hidden method of cell phone application icon |
CN109151158A (en) * | 2018-02-27 | 2019-01-04 | 石秋华 | A kind of automatic hidden method of cell phone application icon |
CN108777657A (en) * | 2018-06-05 | 2018-11-09 | 广州推己科技有限公司 | The implementation method that user identity state switches in social platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101026822A (en) | Method for protecting mobile phone private data | |
CN102841755B (en) | A kind of unlocking method and system of mobile communication terminal | |
EP2525622B1 (en) | Method and apparatus for communication based on pseudo-contact information | |
CN101268470B (en) | Portable terminal device, address book transmitter, information displaying method in portable terminal device, address book transmitting method | |
US8311511B2 (en) | Data privacy on wireless communication terminal | |
CN100473193C (en) | Mobile terminal with information secrecy function and secrecy method | |
CN101184265B (en) | Method for monitoring stolen mobile terminal and mobile terminal | |
US20070011461A1 (en) | Personal data security system and method for handheld devices | |
CN101287247A (en) | Method for binding mobile phone to telephone card and anti-theft method for mobile phone | |
CN101087334B (en) | Multi-user management method of mobile phone information | |
US7941185B2 (en) | Mobile terminal and data display method by individual SIM cards | |
KR100695912B1 (en) | Mobile device with dada hidden function and method of hiding data thereof | |
CN101227683B (en) | Mobile terminal, system and method for securing data information | |
CN101222706B (en) | Method for guaranteeing data information safety in mobile terminal | |
CN100361550C (en) | A deadlock method for preventing handset from being embezzled | |
CN101808305A (en) | Method for controlling mobile terminal for displaying communication business, system and mobile terminal | |
CN100570622C (en) | A kind of method that ensures the safety of data information in the portable terminal | |
CN1738453A (en) | Information encryption system and method | |
KR100455133B1 (en) | Item property managing method for mobile phone | |
CN102664986A (en) | Cell phone, method for powering on the cell phone and placement of power bottom thereof | |
JP4143076B2 (en) | Mobile communication terminal with security function | |
CN109716277A (en) | Portable information terminal and its control method | |
KR20100113385A (en) | Apparatus and method of providing automatic lock function in mobile communication terminal | |
CN101998371A (en) | Mobile phone antitheft technology and method | |
CN101304572A (en) | Method for protecting privacy data of mobile telephone with multiple cards |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20070829 |