CN101459723A - Secret keeping processing method for mobile phone information - Google Patents
Secret keeping processing method for mobile phone information Download PDFInfo
- Publication number
- CN101459723A CN101459723A CNA2007101723385A CN200710172338A CN101459723A CN 101459723 A CN101459723 A CN 101459723A CN A2007101723385 A CNA2007101723385 A CN A2007101723385A CN 200710172338 A CN200710172338 A CN 200710172338A CN 101459723 A CN101459723 A CN 101459723A
- Authority
- CN
- China
- Prior art keywords
- file
- encrypt
- safety verification
- user
- displaying contents
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
Abstract
The invention provides a processing method for encrypting files of different formats or file holder information on a handset, which enable encrypted files to use replaced contents to display or hide and enable the encrypted file to be invisible. The active progressing effects of the invention are that the scheme is adopted to enable users to arrange encrypting aiming at any node of visible file systems of the handset, which comprise the files of different formats, or file holders, the range of protecting the intimacy is enlarged, and the security of handset information is improved. The method can arrange the replaced display contents of each encrypted file or file holder, which enables the displayed contents to be valueless information when the handset is lent or lost, which not only prevents user information from losing, but also can deceive the public without arousing suspicion, and the safety is improved. A rapid mode of encrypting and decrypting lowers the possibility of other people to know that the file belongs to secret files, simultaneously, the possibility of other people to decrypt the encrypted files is also lowered, and the safety is further improved.
Description
Technical field
The present invention relates to a kind of secret keeping processing method of cellphone information, belong to the mobile communication terminal technical field.
Background technology
At present people are more and more stronger to the dependence of portable terminals such as mobile phone, and this class communication product also becomes people's one of inseparable instrument of life of working gradually.
Can canned data on the mobile phone more and more abundanter, some senior mobile phones not only can be stored the most basic telephone directory, short message, multimedia message, message registration, information such as schedule have also been supported the file storage of other different-format, for example picture, recording, video, literal, document information such as e-book.People are to the confidentiality of information, and fail safe also just becomes an important demand.
Current a lot of technology provides the certain methods that process information is maintained secrecy on mobile phone.For example application number is 200310112047.9, the patent application of " a kind of mobile phone that improves method and this method of realization of mobile phone short message safety " by name, and application number is 02137332.9, the patent application of " a kind of method of protecting the mobile phone short message content " by name.Above-mentioned two kinds of patents all only are the encryption methods that is suitable at the short message on the mobile phone, and applicable surface is very limited.
And application number is 2000410022022.4, the patent application of " a kind of mobile phone message security method " by name.But expanded the information encrypted scope, comprised telephone directory, short message, multimedia message, message registration.But it all is by setting secret telephone number, and then is made as the information relevant with this number secret.Then inapplicable with other information that number is irrelevant.
These functions lack the secrecy processing to the file and the file of other different-format.For example the user expands the password that the file that is called txt has been preserved the different bank card with one, has perhaps preserved detail of internet bank trade or the like with the picture of expansion jpg by name.These do not wish to be seen that by other people the demand of encryption is all arranged.And when mobile phone was lent other people or demonstration unintentionally and watched to other people, wishing had certain substitute files demonstration, has so both protected the privacy of oneself, can not produce a bit suspection again when avoiding other people to know real content.
Summary of the invention
Purpose of the present invention is exactly in order to address the above problem, and the processing method that provides different-format file on a kind of mobile phone or folder information to encrypt makes encrypt file can use replacement to show or stash and makes it invisible.
To achieve these goals, the present invention has adopted following technical scheme:
The secret keeping processing method of cellphone information comprises the steps:
Step 1, according to user's input, any file on visible file catalogue tree or folder node are set and are encrypted or remove the function of encrypting;
Step 2, user are provided with the alternative displaying contents of encrypt file or file, and can browse the alternative displaying contents and the real content of encrypt file or file;
Step 3, user set the shortcut with file or file encrypting and decrypting function.
The user sets the alternative displaying contents of encrypt file or file in step 1 user's enactment document or file encrypting and decrypting function and the step 2, need at first pass through safety verification: the shortcut that triggers security settings, look password input requirement, whether authentication password is correct.
Described file can comprise picture file, audio file, video file, text, the file of different-formats such as e-book.
The alternative displaying contents of file or folder is at encrypt file or file in the step 2, and it is encrypt file or the displaying contents of file before passing through safety verification; It is common that not have the alternative displaying contents of the file or folder encrypted be exactly itself.
When the user is using in the mobile phone process, when having triggered the shortcut of safety verification, at first will inquire about whether need to input password according to user's setting, if do not need to input password, then triggered shortcut and just directly passed through safety verification; Input password if desired, just can pass through safety verification after then inputing correct password, otherwise be considered as not passing through safety verification.
At the replacement displaying contents of having set, the user can revise or remove; At not setting encrypt file or the file of replacing displaying contents, the user can add the replacement displaying contents of this document or file.
The user is before the safety verification function and shortcut of enactment document or file encrypting and decrypting, need be by password authentification, if do not pass through, then can not set or revise any shortcut, if passed through password authentification, then can set file or folder is carried out the shortcut that encrypting and decrypting is set, perhaps set the shortcut of the real content of checking encrypt file.
When the user uses mobile phone,, so just can set and encrypt or deciphering the current file or folder of choosing if passed through the safety verification of encrypting and decrypting; Behind safety verification, if the current file or folder of choosing is encrypted, then it can be removed and encrypt, be reduced to common file, under any circumstance can normally show; Behind safety verification, if the current file or folder of choosing is not provided with encryption, then it can be denoted as encrypt file, make that the real content of encrypt file or file can be hidden before not passing through safety verification; Next its alternative displaying contents also can be set, make that encrypt file or file can show with its replacement before not passing through safety verification.
Positive progressive effect of the present invention has been to adopt above scheme, makes that the user can be at any node of the visible mutation system of mobile phone, comprises that the file of different-format or file are set to encrypt, and has enlarged the scope of secret protection.Improved the confidentiality of cellphone information.
Can set the alternative displaying contents of each encrypt file or file, make that mobile phone is for public use or when losing, the content that demonstrates all is valueless information; promptly protected not losing of user profile; can hoodwink people again, do not suspected, improve fail safe.
Encrypting and decrypting and the shortcut of watching the encrypt file real content reduced other people and known that this document belongs to the possibility of classified document, also just reduced the possibility that other people wants to decode encrypt file simultaneously, further improves fail safe.
Description of drawings
Fig. 1 is enactment document of the present invention or file encrypting and decrypting schematic flow sheet
Fig. 2 is the schematic flow sheet of the present invention by safety verification
Fig. 3 sets the schematic flow sheet that shows replacement at the file or folder of encrypting among the present invention
Fig. 4 is that the present invention browses the mobile phone fileinfo at the schematic flow sheet by different situations before and after the safety verification
Fig. 5 is that the present invention sets the shortcut schematic flow sheet that triggers safety verification
Embodiment
As shown in Figure 1, when the user when browsing the mobile phone file system, if passed through the safety verification of encrypting and decrypting, so just can set and encrypt or deciphering the current file or folder chosen.
Behind safety verification, if the current file or folder of choosing is encrypted, then it can be removed and encrypt, be reduced to common file, under any circumstance can normally show.
Behind safety verification, if the current file or folder of choosing is not provided with encryption, then it can be denoted as encrypt file, make that the real content of encrypt file or file can be hidden before not passing through safety verification.Next its alternative displaying contents also can be set, make that encrypt file or file can show with its replacement before not passing through safety verification.
As shown in Figure 2, when the user has triggered the shortcut of safety verification, at first will inquire about whether need to input password according to user's setting.If do not need to input password, then triggered shortcut and just directly passed through safety verification; Input password if desired, just can pass through safety verification after then inputing correct password, otherwise be considered as not passing through safety verification.
As shown in Figure 3, set the replacement displaying contents of encrypt file or file, specifically comprise:
At the alternative displaying contents of having set, the user can revise or remove.
Do not set encrypt file or the file that substitutes displaying contents at having, the user can add the alternative displaying contents of this document or file.
Substitute the interpolation of displaying contents at every turn at encrypt file, revise, perhaps deletion all will be upgraded preservation.
As shown in Figure 4, the user is when browsing the file system of mobile phone, what at first show is the alternative displaying contents of file or folder: at the ordinary file or the file that do not have to encrypt, what show is exactly himself content: the file or folder for encrypting shows the replacement that it has configured; If encrypt file (folder) is not set replacement, then stash, make it invisible.
The user can see the encrypt file that is hidden after verifying by security settings, perhaps see the real content of encrypt file.
What Fig. 5 described is exactly the flow process of setting the shortcut that triggers safety verification.
At first the user need be by password authentification.If do not pass through, then can not set or revise any shortcut.Pass through password authentification, then can set file or folder is carried out the shortcut that encrypting and decrypting is set, perhaps set the shortcut of the real content of checking encrypt file.
Triggering shortcut is to see the most important condition of encrypt file or file, so should be to use very convenient easy row, should not be found by stranger's misoperation again.
For example the user can set the shortcut that enters encryption function or decipher function and is: the length at the file browser interface of current filesselected or file is pressed star [" * "] key, and perhaps setting long is the shortcut of checking the encrypt file real content by well [" # "] key.
Also the two can be united two into one easier memory etc.
The present invention can also be applicable to other visual informations of telephone item, short message, multimedia message, message registration, memo pad, memorandum and task dispatching of storing on the mobile phone, and its processing procedure and said method are similar.
Claims (8)
1, a kind of secret keeping processing method of cellphone information is characterized in that, comprises the steps:
Step 1, according to user's input, any file on visible file catalogue tree or folder node are set and are encrypted or remove the function of encrypting;
Step 2, user are provided with the alternative displaying contents of encrypt file or file, and can browse the alternative displaying contents and the real content of encrypt file or file;
Step 3, user set the shortcut with file or file encrypting and decrypting function.
2, the secret keeping processing method of cellphone information as claimed in claim 1, it is characterized in that, user's enactment document or file encrypting and decrypting in the described step 1, and the user sets the replacement displaying contents of encrypt file or file in the described step 2, all need at first to pass through safety verification: the shortcut that triggers security settings, look password input requirement, whether authentication password is correct.
3, the secret keeping processing method of cellphone information as claimed in claim 1 is characterized in that, described file can comprise picture file, audio file, video file, text, the file of different-formats such as e-book.
4, the secret keeping processing method of cellphone information as claimed in claim 1, it is characterized in that, the alternative displaying contents of file or folder is at encrypt file or file in the described step 2, and it is encrypt file or the displaying contents of file before passing through safety verification; It is common that not have the alternative displaying contents of the file or folder encrypted be exactly itself.
5, the secret keeping processing method of cellphone information as claimed in claim 1, it is characterized in that, when the user is using in the mobile phone process, when having triggered the shortcut of safety verification, at first will inquire about whether need to input password according to user's setting, if do not need to input password, then triggered shortcut and just directly passed through safety verification; Input password if desired, just can pass through safety verification after then inputing correct password, otherwise be considered as not passing through safety verification.
6, the secret keeping processing method of cellphone information as claimed in claim 1 is characterized in that, at the alternative displaying contents of having set, the user can revise or remove; Do not set encrypt file or the file that substitutes displaying contents at having, the user can add the alternative displaying contents of this document or file.
7, the secret keeping processing method of cellphone information as claimed in claim 1, it is characterized in that, the user is before the safety verification function and shortcut of enactment document or file encrypting and decrypting, need be by password authentification, if do not pass through, then can not set or revise any shortcut, if passed through password authentification, then can set file or folder is carried out the shortcut that encrypting and decrypting is set, perhaps set the shortcut of the real content of checking encrypt file.
8, the secret keeping processing method of cellphone information as claimed in claim 1, it is characterized in that, when the user uses mobile phone, if passed through the safety verification of encrypting and decrypting, so just can set and encrypt or deciphering: behind safety verification,, then it can be removed and encrypt if the current file or folder of choosing is encrypted to the current file or folder of choosing, be reduced to common file, under any circumstance can normally show; Behind safety verification, if the current file or folder of choosing is not provided with encryption, then it can be denoted as encrypt file, make that the real content of encrypt file or file can be hidden before not passing through safety verification; Next its alternative displaying contents also can be set, make that encrypt file or file can show with its replacement before not passing through safety verification.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007101723385A CN101459723A (en) | 2007-12-14 | 2007-12-14 | Secret keeping processing method for mobile phone information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007101723385A CN101459723A (en) | 2007-12-14 | 2007-12-14 | Secret keeping processing method for mobile phone information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101459723A true CN101459723A (en) | 2009-06-17 |
Family
ID=40770341
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2007101723385A Pending CN101459723A (en) | 2007-12-14 | 2007-12-14 | Secret keeping processing method for mobile phone information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101459723A (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101951443A (en) * | 2010-09-25 | 2011-01-19 | 宇龙计算机通信科技(深圳)有限公司 | File security method, system and mobile terminal |
CN102045450A (en) * | 2011-01-12 | 2011-05-04 | 深圳桑菲消费通信有限公司 | Method for protecting mobile phone information security |
CN102104671A (en) * | 2009-12-17 | 2011-06-22 | 深圳富泰宏精密工业有限公司 | Mobile phone and method for locking application thereof |
WO2011137868A2 (en) * | 2011-07-18 | 2011-11-10 | 华为终端有限公司 | Method and device for instantly encrypting and decrypting messages |
CN102316214A (en) * | 2011-07-26 | 2012-01-11 | 上海优思通信科技有限公司 | Privacy method for personal information and system |
CN102402651A (en) * | 2010-09-09 | 2012-04-04 | 三星电子(中国)研发中心 | Device and method for protecting information and portable terminal |
CN102655542A (en) * | 2011-03-01 | 2012-09-05 | 联想(北京)有限公司 | Method and terminal for switching terminal statuses |
WO2013075431A1 (en) * | 2011-11-22 | 2013-05-30 | 中兴通讯股份有限公司 | Method and device for protecting information in mobile terminal |
CN103338445A (en) * | 2013-06-19 | 2013-10-02 | 深圳市垦鑫达科技有限公司 | File encryption and decryption method and system |
CN103532960A (en) * | 2013-10-21 | 2014-01-22 | 上海合合信息科技发展有限公司 | Text encryption interaction method, encryption method and device, decryption method and device |
CN103559451A (en) * | 2013-10-21 | 2014-02-05 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting and displaying privacy information |
WO2014019364A1 (en) * | 2012-08-02 | 2014-02-06 | 北京网秦天下科技有限公司 | Privacy protection device and privacy protection method for mobile terminal |
WO2014166216A1 (en) * | 2013-04-09 | 2014-10-16 | 中兴通讯股份有限公司 | Display method and device |
CN104331670A (en) * | 2014-10-28 | 2015-02-04 | 小米科技有限责任公司 | Method and device for protecting private contents |
CN105912947A (en) * | 2016-03-31 | 2016-08-31 | 宇龙计算机通信科技(深圳)有限公司 | File processing method and device based on external equipment |
CN106022164A (en) * | 2016-05-18 | 2016-10-12 | 深圳市基伍智联科技有限公司 | Method and device for protecting information on intelligent terminal |
CN106951797A (en) * | 2016-01-07 | 2017-07-14 | 上海思立微电子科技有限公司 | file locking method, device and terminal |
CN109784077A (en) * | 2019-01-15 | 2019-05-21 | 深圳市趣创科技有限公司 | File security means of defence |
CN110472390A (en) * | 2019-08-15 | 2019-11-19 | 江苏建筑职业技术学院 | A method of protection computer system security |
CN111738715A (en) * | 2015-12-21 | 2020-10-02 | 阿里巴巴集团控股有限公司 | Payment code payment method and device |
CN113094672A (en) * | 2021-04-25 | 2021-07-09 | 前海金信(深圳)科技有限责任公司 | Method for automatically encrypting mobile phone data |
-
2007
- 2007-12-14 CN CNA2007101723385A patent/CN101459723A/en active Pending
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102104671A (en) * | 2009-12-17 | 2011-06-22 | 深圳富泰宏精密工业有限公司 | Mobile phone and method for locking application thereof |
CN102104671B (en) * | 2009-12-17 | 2014-02-12 | 深圳富泰宏精密工业有限公司 | Mobile phone and method for locking application thereof |
CN102402651A (en) * | 2010-09-09 | 2012-04-04 | 三星电子(中国)研发中心 | Device and method for protecting information and portable terminal |
CN101951443A (en) * | 2010-09-25 | 2011-01-19 | 宇龙计算机通信科技(深圳)有限公司 | File security method, system and mobile terminal |
CN102045450A (en) * | 2011-01-12 | 2011-05-04 | 深圳桑菲消费通信有限公司 | Method for protecting mobile phone information security |
CN102655542A (en) * | 2011-03-01 | 2012-09-05 | 联想(北京)有限公司 | Method and terminal for switching terminal statuses |
CN102334306A (en) * | 2011-07-18 | 2012-01-25 | 华为终端有限公司 | Information instant enciphering and deciphering method and device |
WO2011137868A3 (en) * | 2011-07-18 | 2012-06-14 | 华为终端有限公司 | Method and device for instantly encrypting and decrypting messages |
WO2011137868A2 (en) * | 2011-07-18 | 2011-11-10 | 华为终端有限公司 | Method and device for instantly encrypting and decrypting messages |
CN102316214A (en) * | 2011-07-26 | 2012-01-11 | 上海优思通信科技有限公司 | Privacy method for personal information and system |
WO2013075431A1 (en) * | 2011-11-22 | 2013-05-30 | 中兴通讯股份有限公司 | Method and device for protecting information in mobile terminal |
CN103136479A (en) * | 2011-11-22 | 2013-06-05 | 中兴通讯股份有限公司 | Information protection method and device of mobile terminal |
CN103581417A (en) * | 2012-08-02 | 2014-02-12 | 北京网秦天下科技有限公司 | Privacy protection device of mobile terminal and privacy protection method thereof |
WO2014019364A1 (en) * | 2012-08-02 | 2014-02-06 | 北京网秦天下科技有限公司 | Privacy protection device and privacy protection method for mobile terminal |
WO2014166216A1 (en) * | 2013-04-09 | 2014-10-16 | 中兴通讯股份有限公司 | Display method and device |
CN103338445A (en) * | 2013-06-19 | 2013-10-02 | 深圳市垦鑫达科技有限公司 | File encryption and decryption method and system |
CN103532960A (en) * | 2013-10-21 | 2014-01-22 | 上海合合信息科技发展有限公司 | Text encryption interaction method, encryption method and device, decryption method and device |
CN103559451A (en) * | 2013-10-21 | 2014-02-05 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting and displaying privacy information |
CN103532960B (en) * | 2013-10-21 | 2017-09-26 | 上海合合信息科技发展有限公司 | Decrypt device |
CN104331670A (en) * | 2014-10-28 | 2015-02-04 | 小米科技有限责任公司 | Method and device for protecting private contents |
CN111738715A (en) * | 2015-12-21 | 2020-10-02 | 阿里巴巴集团控股有限公司 | Payment code payment method and device |
CN106951797A (en) * | 2016-01-07 | 2017-07-14 | 上海思立微电子科技有限公司 | file locking method, device and terminal |
CN105912947A (en) * | 2016-03-31 | 2016-08-31 | 宇龙计算机通信科技(深圳)有限公司 | File processing method and device based on external equipment |
CN106022164A (en) * | 2016-05-18 | 2016-10-12 | 深圳市基伍智联科技有限公司 | Method and device for protecting information on intelligent terminal |
CN109784077A (en) * | 2019-01-15 | 2019-05-21 | 深圳市趣创科技有限公司 | File security means of defence |
CN110472390A (en) * | 2019-08-15 | 2019-11-19 | 江苏建筑职业技术学院 | A method of protection computer system security |
CN113094672A (en) * | 2021-04-25 | 2021-07-09 | 前海金信(深圳)科技有限责任公司 | Method for automatically encrypting mobile phone data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101459723A (en) | Secret keeping processing method for mobile phone information | |
US8145907B2 (en) | Secure data transfer | |
CN103095890B (en) | The encryption method of associated person information and communication terminal | |
CN103647784B (en) | A kind of method and apparatus of public and private isolation | |
EP2113856A1 (en) | Secure storage of user data in UICC and Smart Card enabled devices | |
CN101483861A (en) | Method for mobile phone information safety protection | |
WO2011153748A1 (en) | Method and apparatus for communicating using spurious contact information | |
US20060258333A1 (en) | Method for backing up data stored in a mobile electronic device | |
CN101478595A (en) | Mobile communication terminal data protection method | |
CN101409881A (en) | Secrecy apparatus and method for mobile phone data | |
CN101795450A (en) | Method and device for carrying out security protection on mobile phone data | |
KR101625785B1 (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
CN101252596A (en) | Method and system for protecting number information privacy | |
CA3066701A1 (en) | Controlling access to data | |
CN102572750A (en) | Method and terminal for protecting short messages | |
CN102868826A (en) | Terminal and terminal data protection method | |
Rottermanner et al. | Privacy and data protection in smartphone messengers | |
CN101437116A (en) | System and method for hiding and displaying image and sound file of image-shooting apparatus | |
WO2012151975A1 (en) | Method and device for concealing terminal information | |
WO2011088660A1 (en) | Method and apparatus for protecting cell-phone information content | |
WO2010038764A1 (en) | Encryption device, encryption method and program | |
WO2017020598A1 (en) | Contact information management method, apparatus and terminal | |
CN102883039A (en) | Method for encrypting multimedia private diary of mobile phone | |
CN103634313B (en) | Address list processing method and device, as well as mobile terminal | |
CN103002117A (en) | Phone information encryption method and phone information encryption system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20090617 |