CN101415186A - Method for security protection of mobile phone information - Google Patents

Method for security protection of mobile phone information Download PDF

Info

Publication number
CN101415186A
CN101415186A CNA2008102275075A CN200810227507A CN101415186A CN 101415186 A CN101415186 A CN 101415186A CN A2008102275075 A CNA2008102275075 A CN A2008102275075A CN 200810227507 A CN200810227507 A CN 200810227507A CN 101415186 A CN101415186 A CN 101415186A
Authority
CN
China
Prior art keywords
phone
user
password
mobile phone
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008102275075A
Other languages
Chinese (zh)
Inventor
霍文旌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yiqitong It Tech Co Ltd Beijing
Original Assignee
Yiqitong It Tech Co Ltd Beijing
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yiqitong It Tech Co Ltd Beijing filed Critical Yiqitong It Tech Co Ltd Beijing
Priority to CNA2008102275075A priority Critical patent/CN101415186A/en
Publication of CN101415186A publication Critical patent/CN101415186A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a phone information security protection method, comprising the following steps: a user installs cell phone encryption software, starts cell phone protection encryption function and sets up a password for unlocking. After the user sets a password for the screen of a cell phone, a person who does not know the password is not able to unlock the phone for looking over any information. Therefore, the information in the phone is protected comprehensively and even though the phone is lost or other people touch the phone deliberately or accidentally, the phone is not unlocked with all the information being viewed. After setting a password for a file in need of privacy, the user does not have to input the protection password of the screen each time when using the phone, and when the user encrypts an important file such as a telephone directory or instant messages, one who does not know the password has no access to the correspondingly set file in the phone and further has no means to look over any information. Therefore, the important information of the cell phone is protected and the use is convenient. In this way, when the cell phone is lost or other people touch the phone deliberately or accidentally, the important file information can not be opened.

Description

A kind of phone information security protection method
Technical field:
The present invention relates to computer software, mobile communication field, especially computer software application in mobile phone communication, particularly relate to a kind of phone information security protection method.
Background technology:
Develop rapidly along with information, mobile phone becomes one of immediate communication tool that more and more generally uses in people's life, the work, usually by mobile phone and network or communication between mobile phone, the transmission information between instant communication client and the mobile phone of saying so more specifically, perhaps mutual photos and sending messages between the mobile phone, contact or information interchange promptly make things convenient for quick again between the people like this.Yet wireless telecommunications also inevitably bring the safety problem of information when offering convenience to people.
Present most of mobile phone all has only to be encrypted the conversation of mobile phone, prevents to be eavesdropped in communication process.As: the patent No. is 200410099253.5, what adopt is to add encryption software module in the user mobile phone of required encryption, the encryption mode that encryption software module in the mobile phone is carried out between the caller and called users is set, by system's short message, make and carry out the encryption mode negotiation between calling subscriber and the called subscriber, after finishing encryption mode setting and encryption mode negotiation, carry out coded communication and encryption mode hot-swap, prevent to be eavesdropped in the communication process with this.And telephone directory, instant message and the log of user mobile phone this locality are not encrypted or protected, in case checked by others or read.Mobile phone does not have the function of encryption, if lost mobile phone like this, the lawless person can carry out all illegal activities according to the information of mobile phone, as: the lawless person helps to supplement with money by the information request contact person after stealing mobile phone, or the like or others' when under the situation that the user does not permit, checking user's mobile phone, the user can't stop its privacy of checking oneself or private data.The all information of user mobile phone does not have fail safe like this.Also make and the relatively problem of headache of user need urgent issue to be resolved.
Summary of the invention:
The present invention provides a kind of phone information security protection method for addressing the above problem weak point, comprises the steps:
S1. user installation mobile phone cipher software;
S2. the user enables mobile phone protection encryption function;
S3. the user is provided with password, release when being used for the user and using.
The user can be provided with password to file among the described step S3.
The user can be provided with the screen protection password to mobile phone screen among the described step S3.
Described password can be provided with identical, also can be set to difference.
Described select File comprises: telephone directory, note file, message registration, picture file, voice document and video file.
Described step also comprises, the user is provided with screen obsolete blanking time.
Described step comprises that also the user is provided with the pattern of screen protection.
Advantage of the present invention:
After the user is provided with the password of mobile phone screen, do not know that the people of this password can't open mobile phone, check any information of the inside.The information of mobile phone is comprehensively protected, even mobile phone is lost, perhaps other people are having a mind to or are touching mobile phone under the situation unintentionally, also all information that can not be opened and check mobile phone.
After the user is provided with password according to the file of own need to be keep secret; when the user uses mobile phone; the protection password of entr screen at every turn; after to important file encryption; as: telephone directory or instant message; do not know that the people of this password can't open the file of mobile phone relative set, more can't check any information of the inside.The protection that obtains of the important information of mobile phone so also is user-friendly to.Even mobile phone is lost like this, perhaps other people are having a mind to or are touching mobile phone under the situation unintentionally, and important fileinfo can not be opened yet.
Description of drawings:
Fig. 1 is the flow chart that user of the present invention is provided with the mobile phone screen password;
Fig. 2 is the flow chart that the user starts the mobile phone screen defencive function;
Fig. 3 is the flow chart that user of the present invention is provided with the file password;
Fig. 4 is the flow chart that the present invention starts the thin defencive function of mobile portable phone.
Embodiment:
The function that the present invention realizes: the user is provided with password cell-phone function is locked, and has only the input password to use and opens mobile phone, uses the corresponding function of mobile phone.
Elaborate below in conjunction with accompanying drawing,
As shown in Figure 1, the user is provided with the step of mobile phone screen password:
101. user installation mobile phone cipher software;
This software has added one deck shell before the program launchers of mobile phone operating system, just
Say, before mobile phone operating system starts the cell-phone function program, need this software of operation earlier.
102. the user enables mobile phone screen protection encryption function;
103. the user is provided with password;
Release when being used for the user and using.
104. the user is provided with screen obsolete blanking time;
As: be set to 5 minutes, after mobile phone did not use at interval 5 minutes, screen was in guard mode automatically.
105. the user is provided with the pattern of screen protection.
As shown in Figure 2, the user starts the process of mobile phone screen defencive function, may further comprise the steps:
201. check whether mobile phone screen protection software be installed:
If do not install, then carry out by normal;
If install, then carry out screen protection software earlier.
202. screen protection software inspection configuration sees whether this function encrypts:
If unencryption is then carried out by normal;
If encrypt, then eject password box, the prompting user need input password and carry out authentication.
203. whether the user imports password authentification successful:
If be proved to be successful, then open screen protection, use by normal;
If authentication failed, then prompting input once more if denied access is then pointed out in still failure, is withdrawed from then.
As shown in Figure 3, the user is provided with the step of mobile phone file password:
301. user installation mobile phone cipher software:
This software has added one deck shell before the program launchers of mobile phone operating system, that is to say, before mobile phone operating system starts the cell-phone function program, needs this software of operation earlier.
302. user's select File is enabled the function of cell phone password:
As telephone directory, note file, message registration etc.These configuration datas are used to that encryption software just reads and control.
303. the user is provided with password:
Release when being used for the user and using.
As shown in Figure 4, the user starts the step of cell-phone telephone book defencive function:
401. check whether mobile phone cipher software has been installed:
If do not install, then carry out by normal;
If install, then carry out encryption software earlier.
402. encryption software inspection configuration checks whether this telephone directory is encrypted:
If unencryption is then carried out by normal;
If encrypt, then when the user opens telephone directory, eject password box, the prompting user need input password and carry out authentication.
403. whether the user imports password authentification successful:
If be proved to be successful, then enter telephone directory, use by normal;
If authentication failed, then prompting input once more if denied access is then pointed out in still failure, is withdrawed from then.

Claims (7)

1. a phone information security protection method is characterized in that: comprise the steps:
S1. user installation mobile phone cipher software;
S2. the user enables mobile phone protection encryption function;
S3. the user is provided with password, release when being used for the user and using.
2. according to the described a kind of phone information security protection method of claim 1, it is characterized in that: the user can be provided with password to file among the described step S3.
3. according to the described a kind of phone information security protection method of claim 1, the user can be provided with the screen protection password to mobile phone screen among the described step S3.
4. according to claim 2 or 3 described a kind of phone information security protection method, described password can be provided with identical, also can be set to difference.
5. a kind of phone information security protection method according to claim 2 is characterized in that: described select File comprises: telephone directory, note file, message registration, picture file, voice document and video file.
6. according to the described a kind of phone information security protection method of claim 3, described step also comprises, the user is provided with screen obsolete blanking time.
7. according to claim 5 or 6 described a kind of phone information security protection method, it is characterized in that: described step comprises that also the user is provided with the pattern of screen protection.
CNA2008102275075A 2008-11-28 2008-11-28 Method for security protection of mobile phone information Pending CN101415186A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008102275075A CN101415186A (en) 2008-11-28 2008-11-28 Method for security protection of mobile phone information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008102275075A CN101415186A (en) 2008-11-28 2008-11-28 Method for security protection of mobile phone information

Publications (1)

Publication Number Publication Date
CN101415186A true CN101415186A (en) 2009-04-22

Family

ID=40595435

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008102275075A Pending CN101415186A (en) 2008-11-28 2008-11-28 Method for security protection of mobile phone information

Country Status (1)

Country Link
CN (1) CN101415186A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901320A (en) * 2010-07-29 2010-12-01 广东欧珀电子工业有限公司 Data leakage prevention method for electronic book reader
CN102457619A (en) * 2011-12-30 2012-05-16 广东欧珀移动通信有限公司 Method for setting permission password for mobile phone
CN102722663A (en) * 2012-05-16 2012-10-10 广东欧珀移动通信有限公司 Handheld smart device data security protection method
CN103077357A (en) * 2013-01-18 2013-05-01 浙江长天信息技术有限公司 Method for storing private files
CN103729604A (en) * 2013-11-18 2014-04-16 北京奇虎科技有限公司 User access area method and device
CN103902920A (en) * 2012-12-27 2014-07-02 联想(北京)有限公司 Information processing method and electronic device
CN106484292A (en) * 2016-09-29 2017-03-08 珠海市魅族科技有限公司 A kind of unlocking screen method and device

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901320A (en) * 2010-07-29 2010-12-01 广东欧珀电子工业有限公司 Data leakage prevention method for electronic book reader
CN102457619A (en) * 2011-12-30 2012-05-16 广东欧珀移动通信有限公司 Method for setting permission password for mobile phone
CN102722663A (en) * 2012-05-16 2012-10-10 广东欧珀移动通信有限公司 Handheld smart device data security protection method
CN102722663B (en) * 2012-05-16 2015-01-07 广东欧珀移动通信有限公司 Handheld smart device data security protection method
CN103902920A (en) * 2012-12-27 2014-07-02 联想(北京)有限公司 Information processing method and electronic device
CN103077357A (en) * 2013-01-18 2013-05-01 浙江长天信息技术有限公司 Method for storing private files
CN103729604A (en) * 2013-11-18 2014-04-16 北京奇虎科技有限公司 User access area method and device
CN103729604B (en) * 2013-11-18 2016-11-23 北京奇虎科技有限公司 A kind of method and apparatus in customer access area territory
CN106484292A (en) * 2016-09-29 2017-03-08 珠海市魅族科技有限公司 A kind of unlocking screen method and device

Similar Documents

Publication Publication Date Title
US7689231B2 (en) Territorial enforcement of device functionality
CN101483861A (en) Method for mobile phone information safety protection
CN101415186A (en) Method for security protection of mobile phone information
CN103647784B (en) A kind of method and apparatus of public and private isolation
CN102006358A (en) Mobile phone private communication management system and method
CN101304453A (en) Mobile terminal as well as method and system for data privacy
JP2004102682A (en) Terminal lock system and terminal lock method
CN101345789A (en) Secrecy method and apparatus for mobile terminal, and mobile terminal
CN101409881A (en) Secrecy apparatus and method for mobile phone data
CN103037370A (en) Portable storage device and identity authentication method
CN1997188A (en) A recognition method of the user identity and its handset
CN101478595A (en) Mobile communication terminal data protection method
CN103581378A (en) Smart phone high in safety performance
CN106231115A (en) A kind of information protecting method and terminal
CN104427089A (en) Mobile terminal and mobile terminal authority management method
EP2840818B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN106231092A (en) A kind of phone information security protection method
CN106357678A (en) Cloud encryption storage method for intelligent terminal and intelligent terminal
CN106100980A (en) Instant messaging communication means end to end and device
CN100459816C (en) Encrypted information processing method and terminal
CN102521169B (en) Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk
CN105787319A (en) Iris recognition-based portable terminal and method for same
CN101754209A (en) Method for protecting contents of mobile phone
CN103780756A (en) Customer identification card data confidentiality method and mobile terminal thereof
JP2009081487A (en) Security terminal unit, computer program, and information communication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20090422