CN101026822A - Method for protecting mobile phone private data - Google Patents

Method for protecting mobile phone private data Download PDF

Info

Publication number
CN101026822A
CN101026822A CNA2006100384810A CN200610038481A CN101026822A CN 101026822 A CN101026822 A CN 101026822A CN A2006100384810 A CNA2006100384810 A CN A2006100384810A CN 200610038481 A CN200610038481 A CN 200610038481A CN 101026822 A CN101026822 A CN 101026822A
Authority
CN
China
Prior art keywords
data
normal
mobile phone
mode
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006100384810A
Other languages
Chinese (zh)
Inventor
董浩
辛晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU GAOTONG TECHNOLOGY Co Ltd
Original Assignee
JIANGSU GAOTONG TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU GAOTONG TECHNOLOGY Co Ltd filed Critical JIANGSU GAOTONG TECHNOLOGY Co Ltd
Priority to CNA2006100384810A priority Critical patent/CN101026822A/en
Publication of CN101026822A publication Critical patent/CN101026822A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

Interfaces of handset are divided into two modes: hidden and normal. A global variable parameter is setup. When being as 1, 2, n or true, the value of the parameter denotes that current mode is hidden; when being as 0, or false, the value of the parameter denotes that current mode is normal. Moreover, a parameter variable of file is set up. When being as 1, 2, n or true, the file is marked as hidden attribute; when being as 0, or false, the file is marked as normal attribute in order to save and display private data or normal data. Key in hidden cipher of handset makes switch between hidden mode and normal mode. Thus, owner of handset can look normal data and hidden data, and non-owner can only look normal data so as to protect all private data. Features are: simple operation and smart method for setting up cipher.

Description

A kind of method of protecting mobile phone private data
[technical field]
The present invention relates to the method that a kind of cellphone subscriber hides mobile phone private data, it belongs to mobile communication and field of computer technology.
[background technology]
The application of current phone more and more widely.According to statistics, now China has the cellphone subscriber about 3.1 hundred million, and mobile phone has become one of most important carry-on product in people's daily life.Estimate that according to the insiders the share of high-end smartphones in 2006 will rise to 15%, regular handset will drop to 40%, and mobile phone list product value promotion is more than 10%.Along with the raising of product price ratio will make the low-end product of function singleness sell progressively atrophy, the fashion element will continue to take on the key player in the fashion trend of mobile phone products, and become the important pushing factor of mobile phone Gao Gengxin rate, and turn to development trend with multimedia intelligent, mobile phone will be broken away from the role of single communication tool, towards the intelligentized information terminal development of individual.Along with the reinforcement of cell-phone function, memory chip is strengthening, and the subscriber data of depositing in the mobile phone also is on the increase, in the mobile phone basic functions such as address list, message registration, note, multimedia message, notepad, schedule with regard in store many subscriber datas; In addition, along with making rapid progress of cell-phone function, take pictures, make a video recording, multimedia function such as recording is tending towards universal already, comprising the file that these multimedia functions are preserved in the mobile phone again.In these data, many machine masters' privacy data is often arranged, but all being mingled with normal data, these privacy datas are kept at fixedly in the catalogue.Current mobile phone Gao Kehua, superior in, its protection privacy data function but seems and lags behind very much, usually because mobile phone is used, makes machine master's individual privacy be covered all at one glance by other people.
Mobile phone protection privacy function is only limited to modes such as cell-phone lock, function lock substantially at present.Cell-phone lock is to the usufructuary protection of mobile phone, locks to mobile phone in the time of can or using mobile phone when start.In case enabled cell-phone lock, under the situation of input handset password not, can't use any function of mobile phone.Function lock is that some functional module to mobile phone locks, when using these functional modules, must first input handset password, thus accomplish protection to this function data., in case after adding cell-phone lock or function lock to mobile phone, when using mobile phone, all must input password repeatedly normal, this will bring very big inconvenience to normal use mobile phone.As the cipher code protection method of CN200510089511.6 communication terminal, utilize some characteristic of cipher mechanism and flash storing memory, realize protection to information security in the phone.The method of cell phone password protection of the present invention comprises: start cell phone password and protect this function; When the user did not do any operation to mobile phone in the fixed time, mobile phone entered the cryptoguard state automatically; True being set at of the status indication of " locking mode " in the mobile phone memory; When the normal use of attempt mobile phone, the prompting user inputs password.
The personal information protecting method of CN03112585.9 mobile phone is stored in encryption mode in the random asccess memory of power down preservation, sets or revises cell phone password and deposit read-only memory in; Add " encryption mode " submenu at Administration menu, confirm then to require " input handset password "; Behind the input setting code, the encryption mode sign is set to true, shows " encryption mode is set "; When depositing number in, mobile phone is read the value of encryption mode sign earlier, and affirmation then also is changed to true and demonstration " having encrypted storage " with " encryption mode " of address list; When searching address list, mobile phone judges earlier whether this number " encryption mode " value is true, if show " * "; Input number keyboard requires the input password; Password correctly then shows this telephone number, otherwise still shows " * "; Change non-encrypted pattern after the shutdown into.Also can set the address list restricted function.
The weak point of said method is: need specialized designs " encryption mode " submenu 1.; 2. the application of encryption mode is narrow, is only limited to address list; 3. after " address list is limited " function is enabled, can't enable address list or address list correlation function (message registration, note, incoming call identification) etc., this will influence the use of mobile phone greatly; 4. tangible " encryption mode " submenu management options that the user is many, encryption mode is to the switching complexity of non-encrypted pattern; 5. do not relate to the file group of private memory on file such as short messages stored or the mobile phone is encrypted.
[summary of the invention]
The present invention seeks to: the problems referred to above of solution provide a kind of better protection mobile phone private data method of (or claiming individual special-purpose data).Under the prerequisite that does not influence the use of mobile phone normal function, the privacy data that mobile phone is all is protected, the machine master of making can arbitrarily check normal data and privacy data; But not the machine master can only view the normal data of mobile phone, even can't discover the existence that privacy data fully.Method of the present invention especially is suitable for various mobile or fixed meanss of communication and uses, and simple to operate, it is ingenious to establish decryption method.
The present invention is achieved in that the method for protection mobile phone private data, mobile phone interface is divided into hides and normal two kinds of patterns, and a global variable parameter is set, and parameter value is 1,2, n or true time, represents that current is stealth mode; Value is 0 or fictitious time, represents that current is normal mode; The parametric variable of a file is set again, and parameter value is 1,2, n or true time, and this document is labeled as hiding attribute; Value is 0 or fictitious time, and expression is labeled as normal attribute with this document; Be used for preserving the privacy data and the normal data of also display file respectively; The key entry of password is hidden in the switching of stealth mode and normal mode by mobile phone; Especially key in by the password of mobile phone string sign indicating number and realize; Mobile phone string sign indicating number is established close in interface or the key entry of setting interface of starting shooting, and entering the back expression current is stealth mode; Normally/switching of stealth mode also can realize by the mode of enciphering hiding menu.As key in the switching that realizes hiding and normal two kinds of patterns by mobile phone string sign indicating number.
The global variable parameter that above-mentioned global variable parameter can be a Boolean type, parameter value are true time, represent that current is stealth mode; Value represents that for fictitious time current is normal mode.
During stealth mode, be worth, call in the file mark that accesses or operate under all these stealth modes and all have hiding attribute naturally under the genuine condition.That mobile phone string sign indicating number is established is close, key in and change.Mobile phone string sign indicating number is established close in interface or the key entry of setting interface of starting shooting.
Certainly, also have other method to establish close, key feeding cipher and change to hiding attribute and normal attribute.
For the hiding number that needs are protected, in a stealth mode, create and preserve the record (comprising address list) of hiding number or use the hiding number that is provided with in the hiding address list, all be labeled as hiding attribute by hiding the relevant file of number transmitting-receiving.
The present invention is based on following basis: the first step, need separate privacy data and normal data, how distinguishing privacy data is a difficult point of this method with normal data.
According to statistics, the topmost privacy data of cellphone subscriber is message registration, note and telephony feature to name/number demonstration aspect, and these data are often all relevant with some fixing number, and we are called hiding number these fixing numbers.In the mobile phone basic function, functions such as address list, telephony feature, message registration, note, multimedia message all are closely related with number.Address list may comprise machine master's hiding number, have in the telephony feature from the incoming call of hiding number or with the conversation of hiding number, the message registration of machine master and hiding number may be preserved in the message registration, the information of machine master and hiding number transmitting-receiving may be preserved in note, the multimedia message.For with number file associated or data, at first set to hide number, file or data that all are relevant with hiding number all belong to privacy data.Promptly create in stealth mode and preserve the record of hiding number or use hiding address list to write down all hiding numbers, the file of hiding the number correlation module all is labeled as hiding attribute.
In addition, also some privacy data is but irrelevant with number, also the in store machine master's of possibility privacy data.For example, take pictures, make a video recording, function such as recording, notepad, schedule, PC instrument can be saved in some data in the file system of mobile phone, just may have the data that belongs to machine master privacy in these data.
In view of this, cellphone subscriber's privacy data can be divided into the data relevant with number and with the irrelevant data of number.So,, need the branch situation to discuss in order to protect machine master's privacy data.
For the data relevant with number, only need set hiding number, just all privacy datas that are associated with hiding number and normal information data area can be separated.The key step of this method is as follows:
(1) mobile phone interface is divided into hides and normal two kinds of patterns, be used for respectively preserving and show privacy data and normal data.
(2) set the mode that only organic master knows, mobile phone is switched between stealth mode and normal mode.
(3) in stealth mode, create the record (can use hiding address list to write down all hiding numbers) of preserving hiding number.
(4) in stealth mode, create the hiding talking recording menu, be used for preserving the message registration of all and hiding number.
(5) in stealth mode, create to hide note, multimedia message menu, be used for preserving note, the multimedia message record of all and hiding number.
(6) under normal mode, if receive the incoming call of hiding number or directly dial when hiding number and conversing with hiding number, the name/number that needs to hide number shows, and message registration is saved in during hiding talking writes down.
(7) under normal mode,, can only in stealth mode, check if receive the note or the multimedia message of hiding number.
For with irrelevant file or the data of number, distinguish privacy and normal file or data and adopt following method:
1. when calling functional modules, distinguish: provide two kinds of paths of calling this module to the user, respectively privacy data and normal data are preserved and read.
2. directly distinguish when preserving: when the data of preservation, whether the prompting user is made as privacy data with this data.
3. distinguish when after preservation, reading data: when reading data, offer the method that the user transforms normal data and privacy data mutually.
Because 2nd, the 3rd kind of method can stay the clues and traces of hidden function in the mobile phone normal mode, make the general user in the normal existence that may perceive hidden information when using mobile phone, so we mainly adopt the 1st kind of method, and its row gone through.The key step of this method is as follows:
(1) mobile phone interface is divided into hides and normal two kinds of patterns, be used for respectively preserving and show privacy data and normal data.
(2) set the mode that only organic master knows, mobile phone is switched between stealth mode and normal mode.
(3) in stealth mode, add the functional module menu that to hide.
When (4) preserving file: if current be stealth mode, then this document is defined as privacy data; If current is normal mode, this document is defined as normal data.
When (5) reading file:, then show privacy data if current for stealth mode; If current is normal mode, show normal data, can not show privacy data.
Second step, for privacy data that has distinguished and normal data, need when preserving, distinguish, mainly contain following 2 kinds of modes:
A. flag attribute realizes on file.Promptly under normal mode and stealth mode, call same module, only when preserving or reading file, distinguish.When preserving file, the different attribute of mark on file; When reading file, only allow to read the file of respective attributes.
B. flag attribute realizes on module.Promptly call disparate modules under normal mode and stealth mode, these two modules can be inequality in function.
[description of drawings]
Fig. 1: the switching mode schematic diagram that is normal mode of the present invention, stealth mode
Fig. 2: be that the present invention opens address list menu schematic diagram
Fig. 3: be the preservation of writing down in the note of the present invention and read the mode schematic diagram
Fig. 4: be the preservation of Taking Pictures recording of the present invention and read the mode schematic diagram
Fig. 5: be the present invention when sending a telegram here and conversing to hiding the protected mode schematic diagram of number
Fig. 6: be the prompting mode schematic diagram that the present invention receives new message
Fig. 7: be that the present invention realizes the switching figure between each pattern
Fig. 8: be the switching figure that the present invention realizes normal mode, stealth mode
[embodiment]
Embodiment 1: a kind of method of protecting mobile phone private data.
The cell-phone function module that may comprise organic main privacy data in the mobile phone comprises: address list, message registration, note, multimedia message, take pictures, make a video recording, recording, notepad, schedule etc.For the data relevant, can privacy data and normal information data area be separated by setting the mode of hiding number with number.Normal mode offers the cell-phone function of any user, can view the normal data of all mobile phones; Stealth mode provides the mobile phone special function to the machine master, realizes the storage of mobile phone private data and reads, in order to the protection to machine master privacy data.Normally/switching of stealth mode can realize by the mode that enciphering hiding menu or encryption enter the stealth mode interface.
Use above method, the key step of this method is as follows:
(1) mobile phone interface is divided into hiding and normal two kinds of patterns, deposits privacy data and normal data respectively.The global variable g_IsHideMode of a Boolean type is set, is kept among the mobile phone EEPROM.The value of g_IsHideMode is a true time, represents that current is stealth mode; The value of gIsHideMode is a fictitious time, represents that current is normal mode; The parametric variable HideState of a file is set again, and the value of HideState is a true time, and expression is labeled as hiding attribute with this document; The value of HideState is a fictitious time, and expression is labeled as normal attribute with this document.
(2) set hiding password: at first mobile phone string sign indicating number is obtained one 6 numeral by a mathematical formulae, the default hidden password as stealth mode is kept among the mobile phone EEPROM, and will hide password and tell the machine master.
(3) realize the switching of normal mode, stealth mode in Fig. 1 mode: during start, the value of acquiescence g_IsHideMode be false, and promptly current is normal mode, and the user can use normally to mobile phone at this moment.After password+" # " hidden in dialing interface input, the value of g_IsHideMode is made as very, and opens hide menu, promptly entered stealth mode.When withdrawing from hide menu, the value with g_IsHideMode is made as vacation again, promptly turns back to normal mode again.
(4) can revise hiding password in hide menu, new hiding password must also be one 6 a numeral, and is kept among the mobile phone EEPROM.
Application when (5) representing to open the address list menu as Fig. 2: promptly current when being stealth mode if the value of g_IsHideMode is for true, open hiding address list (being that module attribute HideState is genuine address list module); If the value of g_IsHideMode is false, promptly current when be normal mode, open normal communication record (being the address list module of module attribute HideState) for vacation.The address list module of different attribute has file system separately, with storage address list record separately.
(6) hiding number is added in the hiding address list.
(7) in stealth mode, create the menu of message registration, note, multimedia message etc. and the relevant module of number, use in order to the hidden function of realizing correlation module.
The preservation of writing down in the note and read mode as shown in Figure 3:
When keeping records, need not to set a property directly is kept among the mobile phone EEPROM.
When reading and recording, promptly current when be stealth mode if the value of g_IsHideMode is true, read all note numbers and be kept at note record in the hiding address list; If the value of g_IsHideMode is false, promptly current when be normal mode, read all note numbers and be not kept at note record in the hiding address list.
In like manner, for the preservation of message registration, multimedia message record with read, also operate according to mode shown in Figure 3.
(8) in stealth mode, create take pictures, make a video recording, the menu of recording, notepad, schedule etc. and the irrelevant module of number, use in order to the hidden function of realizing correlation module.
The preservation of Taking Pictures recording and read mode as shown in Figure 4:
When keeping records, promptly current when be stealth mode if the value of gIsHideMode is true, the attribute HideState that writes down is made as very; If the value of g_IsHideMode is false, promptly current when be normal mode, the attribute HideState that writes down is made as vacation.
When reading and recording, promptly current when being stealth mode if the value of g_IsHideMode is true, read attribute HideState and be genuine record; If the value of g_IsHideMode is false, promptly current when be normal mode, read the record of attribute HideState for vacation.
In like manner, for the preservation of shooting, recording, notepad, schedule record with read, also operate according to mode shown in Figure 4.
(9) in incoming call and when conversation, need to show the other side's name or number, in order to accomplish hiding the protection of number, and will be according to handling as shown in Figure 5:
The value of g_IsHideMode is true, and is promptly current during for stealth mode: as to have comprised this number if hide in the address list, shown the corresponding name of hiding address list of caller ID; If this number is not kept at and hides in the address list and when being kept in the normal communication record, show the name of the corresponding normal communication record of caller ID.
The value of g_IsHideMode is false, and is promptly current during for normal mode: as to have comprised this number if hide in the address list, shown " unknown name " and do not show caller ID, to accomplish hiding the protection of number; If this number is not kept at and hides in the address list and when being kept in the normal communication record, show the name of the corresponding normal communication record of caller ID.(10) prompting mode of receiving new message is as shown in Figure 6:
The value of g_IsHideMode is true, and is promptly current during for stealth mode: as to have comprised this number if hide in the address list, play the new message prompt tone, and shown the new message prompt window; If this number is not kept at and hides in the address list and when being kept in the normal communication record, only play the new message prompt tone, do not show the new message prompt window, switch to stealth mode and show.
The value of g_IsHideMode is false, and is promptly current during for normal mode: as to have comprised this number if hide in the address list, play the new message prompt tone, do not shown the new message prompt window; If this number is not kept at and hides in the address list and when being kept in the normal communication record, play the new message prompt tone, show the new message prompt window.
In like manner, for the preservation of multimedia message with read, also operate according to mode shown in Figure 6.
Being preferred embodiment of the present invention only in sum, is not to be used for limiting practical range of the present invention.Be that all equivalences of doing according to the content of the present patent application claim change and modification, all should be technology category of the present invention.
Embodiment 2: a kind of method of protecting mobile phone private data.
According to the mode of embodiment 1, the machine master may need privacy data to be set to different ranks when using the mobile phone hidden function, and with open to different people, this mode for embodiment 1 can't realize.A plurality of stealth modes can be set according to the design of embodiment 1, and the password of each stealth mode is all inequality, and different people is announced different hiding passwords, can realize the function with the privacy data classification.
Use above viewpoint, the key step of this method is as follows:
(1) mobile phone interface is divided into a plurality of stealth modes and a normal mode, each stealth mode is used for depositing the different stage privacy data, and normal mode is used for depositing normal data.The global variable g_IsHideMode of an integer type is set, is kept among the mobile phone EEPROM.The value of g_IsHideMode is 1 o'clock, represents that current is stealth mode 1; The value of g_IsHideMode is 2 o'clock, represents that current is stealth mode 2; By that analogy, when the value of g_IsHideMode is n, represent that current is stealth mode n; The value of g_IsHideMode is 0 o'clock, represents that current is normal mode; The parametric variable HideState of a file is set again, and the value of HideState is 1 o'clock, and expression is labeled as this document hides attribute 1; The value of HideStat e is 2 o'clock, and expression is labeled as this document hides attribute 2; By that analogy, when the value of HideState was n, expression is labeled as this document hid attribute n; The value of HideState is 0 o'clock, and expression is labeled as normal attribute with this document.
(2) set hiding password: at first mobile phone string sign indicating number is obtained different 6 numeral by different mathematical formulaes, the default hidden password as each stealth mode is kept among the mobile phone EEPROM, and tells the machine master with all hiding passwords.
(3) realize switching between each pattern in Fig. 7 mode: during start, the value of acquiescence g_IsHideMode is 0, and promptly current be normal mode, and the user can use normally to mobile phone at this moment.Input default hidden password+" # " of any stealth mode at dialing interface after, reset the value of g_IsHideMode, and open the hide menu of this pattern, promptly entered this stealth mode.When withdrawing from hide menu, the value with g_IsHideMode is made as 0 again, promptly turns back to normal mode again.
Embodiment 3: a kind of method of protecting mobile phone private data.
According to the mode of embodiment 1, the switching of normal mode, stealth mode is the mode by the enciphering hiding menu, can certainly realize by the mode that encryption enters the stealth mode interface.
Use above method, the key step of this method is as follows:
(1) mobile phone interface is divided into hiding and normal two kinds of patterns, deposits all data (hidden information and normal data) and normal data respectively.The global variable g_IsHideMode of a Boolean type is set, is kept among the mobile phone EEPROM.The value of g_IsHideMode is a true time, represents that current is stealth mode; The value of g_IsHideMode is a fictitious time, represents that current is normal mode; The parametric variable HideState of a file is set again, and the value of HideState is a true time, and expression is labeled as hiding attribute with this document; The value of HideState is a fictitious time, and expression is labeled as normal attribute with this document.
(2) set to hide password: at first mobile phone string sign indicating number is calculated one 6 numeral or alphabetical by a mathematical formulae, for example take advantage of a numeral to get back six default hidden passwords as stealth mode, be kept among the mobile phone EEPROM, and will hide password and tell the machine master.
(3) realize the switching of normal mode, stealth mode in Fig. 8 mode.During start, the value of acquiescence g_IsHideMode is false, and promptly current is normal mode, and this moment, the user can use normally to mobile phone, and only showed normal data, also can only preserve normal data.After password+" # " hidden in the input of normal mode dialing interface, the value of g_IsHideMode is made as very, it is the current stealth mode that is, this moment, the user can use all functions of mobile phone, and demonstration is comprised all data of privacy data and normal data, also can select during preservation data is saved as privacy data or normal data.After password+" # " hidden in the input of stealth mode dialing interface, the value with g_IsHideMode was made as vacation again, promptly turns back to normal mode again.

Claims (11)

1, the method for protection mobile phone private data is characterized in that mobile phone interface is divided into and hides and normal two kinds of patterns, and a global variable parameter is set, and parameter value is 1,2, n or true time, represents that current is stealth mode; Value is 0 or fictitious time, represents that current is normal mode; The parametric variable of a file is set again, and parameter value is 1,2, n or true time, and this document is labeled as hiding attribute; Value is 0 or fictitious time, and expression is labeled as normal attribute with this document; Be used for preserving the privacy data and the normal data of also display file respectively; The key entry of password is hidden in the switching of stealth mode and normal mode by mobile phone.
2, the method for protection mobile phone private data according to claim 1 is characterized in that the global variable parameter is the global variable parameter of Boolean type, and parameter value is a true time, represents that current is stealth mode; Value represents that for fictitious time current is normal mode.
2, the method for protection mobile phone private data according to claim 1 is characterized in that hiding password by mobile phone keys in the switching that realizes hiding and normal two kinds of patterns.
3, the method for protection mobile phone private data according to claim 1 when it is characterized in that stealth mode, is worth under the genuine condition, calls in the file mark that accesses or operate under all these stealth modes and all has hiding attribute naturally.
4, the method for protection mobile phone private data according to claim 1 is characterized in that mobile phone hides password and establish close at the start interface or set the interface and key in.
5, the method for protection mobile phone private data according to claim 1 is characterized in that mobile phone hides password and establish close, key feeding cipher and change.
6, the method for protection mobile phone private data according to claim 1, it is characterized in that for number file associated or data, at first set to hide number, file or data that all are relevant with hiding number all belong to privacy data.
7, the method for protection mobile phone private data according to claim 1, it is characterized in that for irrelevant file or the data of number, distinguish privacy and normal file or data and adopt following method:
(1) when calling functional modules, distinguishes: provide two kinds of paths of calling this module to the user, respectively privacy data and normal data are preserved and read;
(2) directly when preserving, distinguish: when the data of preservation, the prompting user, whether this data is made as privacy data,
Distinguish when (3) after preservation, reading data: when reading data, offer the method that the user transforms normal data and privacy data mutually.
8, the method for protection mobile phone private data according to claim 1 is characterized in that distinguishing privacy and normal file or data and adopts following method:
(1) mobile phone interface is divided into hides and normal two kinds of patterns, be used for respectively preserving and show privacy data and normal data; Switch between stealth mode and normal mode by mobile phone;
(2) in stealth mode, add the functional module menu that to hide;
When (3) preserving file: if current be stealth mode, then this document is defined as privacy data; If current is normal mode, this document is defined as normal data;
When (4) reading file: if current for stealth mode,, would then show privacy data; If current is normal mode, show normal data.
9, the method for protection mobile phone private data according to claim 1 is characterized in that for privacy data that has distinguished and normal data, need distinguish when preserving:
(1) flag attribute realizes on file, promptly calls same module under normal mode and stealth mode, only when preserving or reading file, distinguish, and when preserving file, the different attribute of mark on file; When reading file, only allow to read the file of respective attributes;
(2) flag attribute realizes on module.Promptly under normal mode and stealth mode, call disparate modules.
10, the method for protection mobile phone private data according to claim 1 and 2 is characterized in that the mode that enters the stealth mode interface by encryption realizes:
(1) mobile phone interface is divided into hiding and normal two kinds of patterns, deposits hidden information and normally data and normally data respectively;
(2) set to hide password: at first mobile phone string sign indicating number is calculated one 6 numeral or alphabetical by a mathematical formulae;
(3) switching of realization normal mode, stealth mode; During start, the value of the global variable parameter of acquiescence Boolean type is false, and promptly current is normal mode, only shows normal data; After password+" # " hidden in normal mode dialing interface input, the value of the global variable parameter of Boolean type is made as very, promptly current be stealth mode, this moment, the user can use all functions of mobile phone, and showed privacy data and normal data.
CNA2006100384810A 2006-02-24 2006-02-24 Method for protecting mobile phone private data Pending CN101026822A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2006100384810A CN101026822A (en) 2006-02-24 2006-02-24 Method for protecting mobile phone private data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2006100384810A CN101026822A (en) 2006-02-24 2006-02-24 Method for protecting mobile phone private data

Publications (1)

Publication Number Publication Date
CN101026822A true CN101026822A (en) 2007-08-29

Family

ID=38744637

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006100384810A Pending CN101026822A (en) 2006-02-24 2006-02-24 Method for protecting mobile phone private data

Country Status (1)

Country Link
CN (1) CN101026822A (en)

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753842A (en) * 2008-12-19 2010-06-23 汤姆森许可贸易公司 Display device and method aiming to protect access to audiovisual documents recorded in storage means
CN101909114A (en) * 2010-07-13 2010-12-08 中兴通讯股份有限公司 Method, device and mobile terminal for hiding information
WO2011153748A1 (en) * 2010-06-11 2011-12-15 中兴通讯股份有限公司 Method and apparatus for communicating using spurious contact information
CN102360340A (en) * 2011-09-30 2012-02-22 宇龙计算机通信科技(深圳)有限公司 Method and system for backing up and recovering private data
CN102413230A (en) * 2011-09-23 2012-04-11 宇龙计算机通信科技(深圳)有限公司 Terminal and data display method
CN102722663A (en) * 2012-05-16 2012-10-10 广东欧珀移动通信有限公司 Handheld smart device data security protection method
CN102778996A (en) * 2011-05-10 2012-11-14 宏达国际电子股份有限公司 Unlocking method and handheld electronic device using same
WO2013075431A1 (en) * 2011-11-22 2013-05-30 中兴通讯股份有限公司 Method and device for protecting information in mobile terminal
CN103369104A (en) * 2012-03-27 2013-10-23 中兴通讯股份有限公司 Method and device for realizing encrypted dialing information display, and communication terminal
CN103685266A (en) * 2013-12-10 2014-03-26 北京奇虎科技有限公司 Method and device for protecting enterprise data
CN103678962A (en) * 2012-08-30 2014-03-26 腾讯科技(深圳)有限公司 Personal information management method and device and terminal
CN103761487A (en) * 2014-01-27 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Hiding method and device of files
CN103885858A (en) * 2014-03-11 2014-06-25 惠州Tcl移动通信有限公司 Method and system for mobile phone backup and data recovery
CN104008313A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Protecting method and device of privacy information
CN104102882A (en) * 2013-04-12 2014-10-15 腾讯科技(深圳)有限公司 Protection method and device for privacy data of application program
CN104318139A (en) * 2014-10-09 2015-01-28 深圳市中兴移动通信有限公司 Intelligent terminal and method for processing data information by using same
CN104361287A (en) * 2014-11-12 2015-02-18 深圳市中兴移动通信有限公司 Method and device for switching working states of terminal
CN104424412A (en) * 2013-09-03 2015-03-18 北京三星通信技术研究有限公司 Method for protecting information in intelligent terminal, page switching method and intelligent terminal
CN104486083A (en) * 2014-12-19 2015-04-01 小米科技有限责任公司 Supervisory video processing method and device
US9047453B2 (en) 2011-05-10 2015-06-02 Htc Corporation Unlocking method, computer readable storage medium for storing thereof and handheld electrical device applying thereof
CN104915578A (en) * 2015-05-27 2015-09-16 努比亚技术有限公司 Method and device for improving operation file safety through hidden modes
WO2015143827A1 (en) * 2014-03-24 2015-10-01 中兴通讯股份有限公司 Method, apparatus and communication system for address book protection
CN105159542A (en) * 2015-09-21 2015-12-16 北京元心科技有限公司 Desktop icon display method and apparatus for intelligent device
WO2015196444A1 (en) * 2014-06-27 2015-12-30 Microsoft Technology Licensing, Llc Fast data protection using dual file systems
WO2015196448A1 (en) * 2014-06-27 2015-12-30 Microsoft Technology Licensing, Llc Data protection based on user and gesture recognition
CN105339946A (en) * 2013-06-24 2016-02-17 三星电子株式会社 Apparatus and method for providing security environment
CN106453800A (en) * 2010-11-09 2017-02-22 微软技术许可有限责任公司 Privacy in mobile device communications
CN106874718A (en) * 2016-07-27 2017-06-20 阿里巴巴集团控股有限公司 privacy processing method, device and terminal
CN107948971A (en) * 2017-11-16 2018-04-20 北京小米移动软件有限公司 Initial system and attend to anything else inter-system switching method, device, terminal and storage medium
CN107992757A (en) * 2016-10-27 2018-05-04 珠海金山办公软件有限公司 A kind of file encryption, decryption method and device
CN108650674A (en) * 2017-08-12 2018-10-12 我要家网络科技有限公司 A kind of information security enciphering hiding coding system
CN108777657A (en) * 2018-06-05 2018-11-09 广州推己科技有限公司 The implementation method that user identity state switches in social platform
CN108833657A (en) * 2013-06-19 2018-11-16 华为终端(东莞)有限公司 A kind of method and device of data and Message Processing
CN109151158A (en) * 2018-02-27 2019-01-04 石秋华 A kind of automatic hidden method of cell phone application icon
US10372937B2 (en) 2014-06-27 2019-08-06 Microsoft Technology Licensing, Llc Data protection based on user input during device boot-up, user login, and device shut-down states
US10423766B2 (en) 2014-06-27 2019-09-24 Microsoft Technology Licensing, Llc Data protection system based on user input patterns on device
US10474849B2 (en) 2014-06-27 2019-11-12 Microsoft Technology Licensing, Llc System for data protection in power off mode

Cited By (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753842A (en) * 2008-12-19 2010-06-23 汤姆森许可贸易公司 Display device and method aiming to protect access to audiovisual documents recorded in storage means
US9430679B2 (en) 2008-12-19 2016-08-30 Thomson Licensing Display device and method aiming to protect access to audiovisual documents recorded in storage means
WO2011153748A1 (en) * 2010-06-11 2011-12-15 中兴通讯股份有限公司 Method and apparatus for communicating using spurious contact information
US8433068B2 (en) 2010-06-11 2013-04-30 Zte Corporation Method and apparatus for communication based on pseudo-contact information
CN101909114A (en) * 2010-07-13 2010-12-08 中兴通讯股份有限公司 Method, device and mobile terminal for hiding information
CN106453800A (en) * 2010-11-09 2017-02-22 微软技术许可有限责任公司 Privacy in mobile device communications
US9047453B2 (en) 2011-05-10 2015-06-02 Htc Corporation Unlocking method, computer readable storage medium for storing thereof and handheld electrical device applying thereof
CN102778996A (en) * 2011-05-10 2012-11-14 宏达国际电子股份有限公司 Unlocking method and handheld electronic device using same
CN102413230B (en) * 2011-09-23 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Terminal and data display method
CN102413230A (en) * 2011-09-23 2012-04-11 宇龙计算机通信科技(深圳)有限公司 Terminal and data display method
CN102360340A (en) * 2011-09-30 2012-02-22 宇龙计算机通信科技(深圳)有限公司 Method and system for backing up and recovering private data
WO2013075431A1 (en) * 2011-11-22 2013-05-30 中兴通讯股份有限公司 Method and device for protecting information in mobile terminal
CN103136479A (en) * 2011-11-22 2013-06-05 中兴通讯股份有限公司 Information protection method and device of mobile terminal
CN103369104B (en) * 2012-03-27 2015-05-20 中兴通讯股份有限公司 Method and device for realizing encrypted dialing information display, and communication terminal
CN103369104A (en) * 2012-03-27 2013-10-23 中兴通讯股份有限公司 Method and device for realizing encrypted dialing information display, and communication terminal
CN102722663B (en) * 2012-05-16 2015-01-07 广东欧珀移动通信有限公司 Handheld smart device data security protection method
CN102722663A (en) * 2012-05-16 2012-10-10 广东欧珀移动通信有限公司 Handheld smart device data security protection method
CN103678962A (en) * 2012-08-30 2014-03-26 腾讯科技(深圳)有限公司 Personal information management method and device and terminal
CN103678962B (en) * 2012-08-30 2018-04-03 腾讯科技(深圳)有限公司 The method, apparatus and terminal of managing personal information
CN104008313B (en) * 2013-02-27 2018-02-27 腾讯科技(深圳)有限公司 The guard method of privacy information and device
CN104008313A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Protecting method and device of privacy information
CN104102882A (en) * 2013-04-12 2014-10-15 腾讯科技(深圳)有限公司 Protection method and device for privacy data of application program
CN104102882B (en) * 2013-04-12 2017-05-03 腾讯科技(深圳)有限公司 Protection method and device for privacy data of application program
CN108833657A (en) * 2013-06-19 2018-11-16 华为终端(东莞)有限公司 A kind of method and device of data and Message Processing
CN109040409A (en) * 2013-06-19 2018-12-18 华为终端(东莞)有限公司 A kind of method and device of data and Message Processing
CN109040409B (en) * 2013-06-19 2023-03-24 华为终端有限公司 Method and device for processing data and message
CN105339946A (en) * 2013-06-24 2016-02-17 三星电子株式会社 Apparatus and method for providing security environment
US10372895B2 (en) 2013-06-24 2019-08-06 Samsung Electronics Co., Ltd. Apparatus and method for providing a security environment
CN104424412A (en) * 2013-09-03 2015-03-18 北京三星通信技术研究有限公司 Method for protecting information in intelligent terminal, page switching method and intelligent terminal
WO2015085906A1 (en) * 2013-12-10 2015-06-18 北京奇虎科技有限公司 Method and device for enterprise data protection
CN103685266A (en) * 2013-12-10 2014-03-26 北京奇虎科技有限公司 Method and device for protecting enterprise data
CN103761487A (en) * 2014-01-27 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Hiding method and device of files
CN103761487B (en) * 2014-01-27 2017-03-15 宇龙计算机通信科技(深圳)有限公司 The hidden method and device of file
CN103885858A (en) * 2014-03-11 2014-06-25 惠州Tcl移动通信有限公司 Method and system for mobile phone backup and data recovery
CN103885858B (en) * 2014-03-11 2017-05-10 惠州Tcl移动通信有限公司 Method and system for mobile phone backup and data recovery
WO2015143827A1 (en) * 2014-03-24 2015-10-01 中兴通讯股份有限公司 Method, apparatus and communication system for address book protection
WO2015196448A1 (en) * 2014-06-27 2015-12-30 Microsoft Technology Licensing, Llc Data protection based on user and gesture recognition
WO2015196444A1 (en) * 2014-06-27 2015-12-30 Microsoft Technology Licensing, Llc Fast data protection using dual file systems
US10372937B2 (en) 2014-06-27 2019-08-06 Microsoft Technology Licensing, Llc Data protection based on user input during device boot-up, user login, and device shut-down states
US10423766B2 (en) 2014-06-27 2019-09-24 Microsoft Technology Licensing, Llc Data protection system based on user input patterns on device
US9697375B2 (en) 2014-06-27 2017-07-04 Microsoft Technology Licensing, Llc Fast data protection using dual file systems
US9734352B2 (en) 2014-06-27 2017-08-15 Microsoft Technology Licensing, Llc Data protection based on user and gesture recognition
US10474849B2 (en) 2014-06-27 2019-11-12 Microsoft Technology Licensing, Llc System for data protection in power off mode
CN104318139A (en) * 2014-10-09 2015-01-28 深圳市中兴移动通信有限公司 Intelligent terminal and method for processing data information by using same
CN104361287B (en) * 2014-11-12 2018-08-14 努比亚技术有限公司 Terminal operating status switching handling method and device
CN104361287A (en) * 2014-11-12 2015-02-18 深圳市中兴移动通信有限公司 Method and device for switching working states of terminal
WO2016095623A1 (en) * 2014-12-19 2016-06-23 小米科技有限责任公司 Method and apparatus for processing surveillance video
US10193875B2 (en) 2014-12-19 2019-01-29 Xiaomi Inc. Method and apparatus for controlling access to surveillance video
CN104486083A (en) * 2014-12-19 2015-04-01 小米科技有限责任公司 Supervisory video processing method and device
CN104915578A (en) * 2015-05-27 2015-09-16 努比亚技术有限公司 Method and device for improving operation file safety through hidden modes
CN105159542B (en) * 2015-09-21 2018-11-16 北京元心科技有限公司 A kind of the desktop icons display methods and device of smart machine
CN105159542A (en) * 2015-09-21 2015-12-16 北京元心科技有限公司 Desktop icon display method and apparatus for intelligent device
CN106874718A (en) * 2016-07-27 2017-06-20 阿里巴巴集团控股有限公司 privacy processing method, device and terminal
CN107992757A (en) * 2016-10-27 2018-05-04 珠海金山办公软件有限公司 A kind of file encryption, decryption method and device
CN108650674A (en) * 2017-08-12 2018-10-12 我要家网络科技有限公司 A kind of information security enciphering hiding coding system
CN107948971A (en) * 2017-11-16 2018-04-20 北京小米移动软件有限公司 Initial system and attend to anything else inter-system switching method, device, terminal and storage medium
CN109151158B (en) * 2018-02-27 2019-05-10 科之光电子科技(信丰)有限公司 A kind of automatic hidden method of cell phone application icon
CN109151158A (en) * 2018-02-27 2019-01-04 石秋华 A kind of automatic hidden method of cell phone application icon
CN108777657A (en) * 2018-06-05 2018-11-09 广州推己科技有限公司 The implementation method that user identity state switches in social platform

Similar Documents

Publication Publication Date Title
CN101026822A (en) Method for protecting mobile phone private data
CN102841755B (en) A kind of unlocking method and system of mobile communication terminal
EP2525622B1 (en) Method and apparatus for communication based on pseudo-contact information
CN101268470B (en) Portable terminal device, address book transmitter, information displaying method in portable terminal device, address book transmitting method
US8311511B2 (en) Data privacy on wireless communication terminal
CN100473193C (en) Mobile terminal with information secrecy function and secrecy method
CN101184265B (en) Method for monitoring stolen mobile terminal and mobile terminal
US20070011461A1 (en) Personal data security system and method for handheld devices
CN101287247A (en) Method for binding mobile phone to telephone card and anti-theft method for mobile phone
CN101087334B (en) Multi-user management method of mobile phone information
US7941185B2 (en) Mobile terminal and data display method by individual SIM cards
KR100695912B1 (en) Mobile device with dada hidden function and method of hiding data thereof
CN101227683B (en) Mobile terminal, system and method for securing data information
CN101222706B (en) Method for guaranteeing data information safety in mobile terminal
CN100361550C (en) A deadlock method for preventing handset from being embezzled
CN101808305A (en) Method for controlling mobile terminal for displaying communication business, system and mobile terminal
CN100570622C (en) A kind of method that ensures the safety of data information in the portable terminal
CN1738453A (en) Information encryption system and method
KR100455133B1 (en) Item property managing method for mobile phone
CN102664986A (en) Cell phone, method for powering on the cell phone and placement of power bottom thereof
JP4143076B2 (en) Mobile communication terminal with security function
CN109716277A (en) Portable information terminal and its control method
KR20100113385A (en) Apparatus and method of providing automatic lock function in mobile communication terminal
CN101998371A (en) Mobile phone antitheft technology and method
CN101304572A (en) Method for protecting privacy data of mobile telephone with multiple cards

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20070829