CN101459723A - Secret keeping processing method for mobile phone information - Google Patents

Secret keeping processing method for mobile phone information Download PDF

Info

Publication number
CN101459723A
CN101459723A CNA2007101723385A CN200710172338A CN101459723A CN 101459723 A CN101459723 A CN 101459723A CN A2007101723385 A CNA2007101723385 A CN A2007101723385A CN 200710172338 A CN200710172338 A CN 200710172338A CN 101459723 A CN101459723 A CN 101459723A
Authority
CN
China
Prior art keywords
file
encrypt
safety verification
user
displaying contents
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007101723385A
Other languages
Chinese (zh)
Inventor
张迪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Simcom Ltd
Original Assignee
Shanghai Simcom Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Simcom Ltd filed Critical Shanghai Simcom Ltd
Priority to CNA2007101723385A priority Critical patent/CN101459723A/en
Publication of CN101459723A publication Critical patent/CN101459723A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The invention provides a processing method for encrypting files of different formats or file holder information on a handset, which enable encrypted files to use replaced contents to display or hide and enable the encrypted file to be invisible. The active progressing effects of the invention are that the scheme is adopted to enable users to arrange encrypting aiming at any node of visible file systems of the handset, which comprise the files of different formats, or file holders, the range of protecting the intimacy is enlarged, and the security of handset information is improved. The method can arrange the replaced display contents of each encrypted file or file holder, which enables the displayed contents to be valueless information when the handset is lent or lost, which not only prevents user information from losing, but also can deceive the public without arousing suspicion, and the safety is improved. A rapid mode of encrypting and decrypting lowers the possibility of other people to know that the file belongs to secret files, simultaneously, the possibility of other people to decrypt the encrypted files is also lowered, and the safety is further improved.

Description

The secret keeping processing method of cellphone information
Technical field
The present invention relates to a kind of secret keeping processing method of cellphone information, belong to the mobile communication terminal technical field.
Background technology
At present people are more and more stronger to the dependence of portable terminals such as mobile phone, and this class communication product also becomes people's one of inseparable instrument of life of working gradually.
Can canned data on the mobile phone more and more abundanter, some senior mobile phones not only can be stored the most basic telephone directory, short message, multimedia message, message registration, information such as schedule have also been supported the file storage of other different-format, for example picture, recording, video, literal, document information such as e-book.People are to the confidentiality of information, and fail safe also just becomes an important demand.
Current a lot of technology provides the certain methods that process information is maintained secrecy on mobile phone.For example application number is 200310112047.9, the patent application of " a kind of mobile phone that improves method and this method of realization of mobile phone short message safety " by name, and application number is 02137332.9, the patent application of " a kind of method of protecting the mobile phone short message content " by name.Above-mentioned two kinds of patents all only are the encryption methods that is suitable at the short message on the mobile phone, and applicable surface is very limited.
And application number is 2000410022022.4, the patent application of " a kind of mobile phone message security method " by name.But expanded the information encrypted scope, comprised telephone directory, short message, multimedia message, message registration.But it all is by setting secret telephone number, and then is made as the information relevant with this number secret.Then inapplicable with other information that number is irrelevant.
These functions lack the secrecy processing to the file and the file of other different-format.For example the user expands the password that the file that is called txt has been preserved the different bank card with one, has perhaps preserved detail of internet bank trade or the like with the picture of expansion jpg by name.These do not wish to be seen that by other people the demand of encryption is all arranged.And when mobile phone was lent other people or demonstration unintentionally and watched to other people, wishing had certain substitute files demonstration, has so both protected the privacy of oneself, can not produce a bit suspection again when avoiding other people to know real content.
Summary of the invention
Purpose of the present invention is exactly in order to address the above problem, and the processing method that provides different-format file on a kind of mobile phone or folder information to encrypt makes encrypt file can use replacement to show or stash and makes it invisible.
To achieve these goals, the present invention has adopted following technical scheme:
The secret keeping processing method of cellphone information comprises the steps:
Step 1, according to user's input, any file on visible file catalogue tree or folder node are set and are encrypted or remove the function of encrypting;
Step 2, user are provided with the alternative displaying contents of encrypt file or file, and can browse the alternative displaying contents and the real content of encrypt file or file;
Step 3, user set the shortcut with file or file encrypting and decrypting function.
The user sets the alternative displaying contents of encrypt file or file in step 1 user's enactment document or file encrypting and decrypting function and the step 2, need at first pass through safety verification: the shortcut that triggers security settings, look password input requirement, whether authentication password is correct.
Described file can comprise picture file, audio file, video file, text, the file of different-formats such as e-book.
The alternative displaying contents of file or folder is at encrypt file or file in the step 2, and it is encrypt file or the displaying contents of file before passing through safety verification; It is common that not have the alternative displaying contents of the file or folder encrypted be exactly itself.
When the user is using in the mobile phone process, when having triggered the shortcut of safety verification, at first will inquire about whether need to input password according to user's setting, if do not need to input password, then triggered shortcut and just directly passed through safety verification; Input password if desired, just can pass through safety verification after then inputing correct password, otherwise be considered as not passing through safety verification.
At the replacement displaying contents of having set, the user can revise or remove; At not setting encrypt file or the file of replacing displaying contents, the user can add the replacement displaying contents of this document or file.
The user is before the safety verification function and shortcut of enactment document or file encrypting and decrypting, need be by password authentification, if do not pass through, then can not set or revise any shortcut, if passed through password authentification, then can set file or folder is carried out the shortcut that encrypting and decrypting is set, perhaps set the shortcut of the real content of checking encrypt file.
When the user uses mobile phone,, so just can set and encrypt or deciphering the current file or folder of choosing if passed through the safety verification of encrypting and decrypting; Behind safety verification, if the current file or folder of choosing is encrypted, then it can be removed and encrypt, be reduced to common file, under any circumstance can normally show; Behind safety verification, if the current file or folder of choosing is not provided with encryption, then it can be denoted as encrypt file, make that the real content of encrypt file or file can be hidden before not passing through safety verification; Next its alternative displaying contents also can be set, make that encrypt file or file can show with its replacement before not passing through safety verification.
Positive progressive effect of the present invention has been to adopt above scheme, makes that the user can be at any node of the visible mutation system of mobile phone, comprises that the file of different-format or file are set to encrypt, and has enlarged the scope of secret protection.Improved the confidentiality of cellphone information.
Can set the alternative displaying contents of each encrypt file or file, make that mobile phone is for public use or when losing, the content that demonstrates all is valueless information; promptly protected not losing of user profile; can hoodwink people again, do not suspected, improve fail safe.
Encrypting and decrypting and the shortcut of watching the encrypt file real content reduced other people and known that this document belongs to the possibility of classified document, also just reduced the possibility that other people wants to decode encrypt file simultaneously, further improves fail safe.
Description of drawings
Fig. 1 is enactment document of the present invention or file encrypting and decrypting schematic flow sheet
Fig. 2 is the schematic flow sheet of the present invention by safety verification
Fig. 3 sets the schematic flow sheet that shows replacement at the file or folder of encrypting among the present invention
Fig. 4 is that the present invention browses the mobile phone fileinfo at the schematic flow sheet by different situations before and after the safety verification
Fig. 5 is that the present invention sets the shortcut schematic flow sheet that triggers safety verification
Embodiment
As shown in Figure 1, when the user when browsing the mobile phone file system, if passed through the safety verification of encrypting and decrypting, so just can set and encrypt or deciphering the current file or folder chosen.
Behind safety verification, if the current file or folder of choosing is encrypted, then it can be removed and encrypt, be reduced to common file, under any circumstance can normally show.
Behind safety verification, if the current file or folder of choosing is not provided with encryption, then it can be denoted as encrypt file, make that the real content of encrypt file or file can be hidden before not passing through safety verification.Next its alternative displaying contents also can be set, make that encrypt file or file can show with its replacement before not passing through safety verification.
As shown in Figure 2, when the user has triggered the shortcut of safety verification, at first will inquire about whether need to input password according to user's setting.If do not need to input password, then triggered shortcut and just directly passed through safety verification; Input password if desired, just can pass through safety verification after then inputing correct password, otherwise be considered as not passing through safety verification.
As shown in Figure 3, set the replacement displaying contents of encrypt file or file, specifically comprise:
At the alternative displaying contents of having set, the user can revise or remove.
Do not set encrypt file or the file that substitutes displaying contents at having, the user can add the alternative displaying contents of this document or file.
Substitute the interpolation of displaying contents at every turn at encrypt file, revise, perhaps deletion all will be upgraded preservation.
As shown in Figure 4, the user is when browsing the file system of mobile phone, what at first show is the alternative displaying contents of file or folder: at the ordinary file or the file that do not have to encrypt, what show is exactly himself content: the file or folder for encrypting shows the replacement that it has configured; If encrypt file (folder) is not set replacement, then stash, make it invisible.
The user can see the encrypt file that is hidden after verifying by security settings, perhaps see the real content of encrypt file.
What Fig. 5 described is exactly the flow process of setting the shortcut that triggers safety verification.
At first the user need be by password authentification.If do not pass through, then can not set or revise any shortcut.Pass through password authentification, then can set file or folder is carried out the shortcut that encrypting and decrypting is set, perhaps set the shortcut of the real content of checking encrypt file.
Triggering shortcut is to see the most important condition of encrypt file or file, so should be to use very convenient easy row, should not be found by stranger's misoperation again.
For example the user can set the shortcut that enters encryption function or decipher function and is: the length at the file browser interface of current filesselected or file is pressed star [" * "] key, and perhaps setting long is the shortcut of checking the encrypt file real content by well [" # "] key.
Also the two can be united two into one easier memory etc.
The present invention can also be applicable to other visual informations of telephone item, short message, multimedia message, message registration, memo pad, memorandum and task dispatching of storing on the mobile phone, and its processing procedure and said method are similar.

Claims (8)

1, a kind of secret keeping processing method of cellphone information is characterized in that, comprises the steps:
Step 1, according to user's input, any file on visible file catalogue tree or folder node are set and are encrypted or remove the function of encrypting;
Step 2, user are provided with the alternative displaying contents of encrypt file or file, and can browse the alternative displaying contents and the real content of encrypt file or file;
Step 3, user set the shortcut with file or file encrypting and decrypting function.
2, the secret keeping processing method of cellphone information as claimed in claim 1, it is characterized in that, user's enactment document or file encrypting and decrypting in the described step 1, and the user sets the replacement displaying contents of encrypt file or file in the described step 2, all need at first to pass through safety verification: the shortcut that triggers security settings, look password input requirement, whether authentication password is correct.
3, the secret keeping processing method of cellphone information as claimed in claim 1 is characterized in that, described file can comprise picture file, audio file, video file, text, the file of different-formats such as e-book.
4, the secret keeping processing method of cellphone information as claimed in claim 1, it is characterized in that, the alternative displaying contents of file or folder is at encrypt file or file in the described step 2, and it is encrypt file or the displaying contents of file before passing through safety verification; It is common that not have the alternative displaying contents of the file or folder encrypted be exactly itself.
5, the secret keeping processing method of cellphone information as claimed in claim 1, it is characterized in that, when the user is using in the mobile phone process, when having triggered the shortcut of safety verification, at first will inquire about whether need to input password according to user's setting, if do not need to input password, then triggered shortcut and just directly passed through safety verification; Input password if desired, just can pass through safety verification after then inputing correct password, otherwise be considered as not passing through safety verification.
6, the secret keeping processing method of cellphone information as claimed in claim 1 is characterized in that, at the alternative displaying contents of having set, the user can revise or remove; Do not set encrypt file or the file that substitutes displaying contents at having, the user can add the alternative displaying contents of this document or file.
7, the secret keeping processing method of cellphone information as claimed in claim 1, it is characterized in that, the user is before the safety verification function and shortcut of enactment document or file encrypting and decrypting, need be by password authentification, if do not pass through, then can not set or revise any shortcut, if passed through password authentification, then can set file or folder is carried out the shortcut that encrypting and decrypting is set, perhaps set the shortcut of the real content of checking encrypt file.
8, the secret keeping processing method of cellphone information as claimed in claim 1, it is characterized in that, when the user uses mobile phone, if passed through the safety verification of encrypting and decrypting, so just can set and encrypt or deciphering: behind safety verification,, then it can be removed and encrypt if the current file or folder of choosing is encrypted to the current file or folder of choosing, be reduced to common file, under any circumstance can normally show; Behind safety verification, if the current file or folder of choosing is not provided with encryption, then it can be denoted as encrypt file, make that the real content of encrypt file or file can be hidden before not passing through safety verification; Next its alternative displaying contents also can be set, make that encrypt file or file can show with its replacement before not passing through safety verification.
CNA2007101723385A 2007-12-14 2007-12-14 Secret keeping processing method for mobile phone information Pending CN101459723A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007101723385A CN101459723A (en) 2007-12-14 2007-12-14 Secret keeping processing method for mobile phone information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007101723385A CN101459723A (en) 2007-12-14 2007-12-14 Secret keeping processing method for mobile phone information

Publications (1)

Publication Number Publication Date
CN101459723A true CN101459723A (en) 2009-06-17

Family

ID=40770341

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007101723385A Pending CN101459723A (en) 2007-12-14 2007-12-14 Secret keeping processing method for mobile phone information

Country Status (1)

Country Link
CN (1) CN101459723A (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951443A (en) * 2010-09-25 2011-01-19 宇龙计算机通信科技(深圳)有限公司 File security method, system and mobile terminal
CN102045450A (en) * 2011-01-12 2011-05-04 深圳桑菲消费通信有限公司 Method for protecting mobile phone information security
CN102104671A (en) * 2009-12-17 2011-06-22 深圳富泰宏精密工业有限公司 Mobile phone and method for locking application thereof
WO2011137868A2 (en) * 2011-07-18 2011-11-10 华为终端有限公司 Method and device for instantly encrypting and decrypting messages
CN102316214A (en) * 2011-07-26 2012-01-11 上海优思通信科技有限公司 Privacy method for personal information and system
CN102402651A (en) * 2010-09-09 2012-04-04 三星电子(中国)研发中心 Device and method for protecting information and portable terminal
CN102655542A (en) * 2011-03-01 2012-09-05 联想(北京)有限公司 Method and terminal for switching terminal statuses
WO2013075431A1 (en) * 2011-11-22 2013-05-30 中兴通讯股份有限公司 Method and device for protecting information in mobile terminal
CN103338445A (en) * 2013-06-19 2013-10-02 深圳市垦鑫达科技有限公司 File encryption and decryption method and system
CN103532960A (en) * 2013-10-21 2014-01-22 上海合合信息科技发展有限公司 Text encryption interaction method, encryption method and device, decryption method and device
CN103559451A (en) * 2013-10-21 2014-02-05 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting and displaying privacy information
WO2014019364A1 (en) * 2012-08-02 2014-02-06 北京网秦天下科技有限公司 Privacy protection device and privacy protection method for mobile terminal
WO2014166216A1 (en) * 2013-04-09 2014-10-16 中兴通讯股份有限公司 Display method and device
CN104331670A (en) * 2014-10-28 2015-02-04 小米科技有限责任公司 Method and device for protecting private contents
CN105912947A (en) * 2016-03-31 2016-08-31 宇龙计算机通信科技(深圳)有限公司 File processing method and device based on external equipment
CN106022164A (en) * 2016-05-18 2016-10-12 深圳市基伍智联科技有限公司 Method and device for protecting information on intelligent terminal
CN106951797A (en) * 2016-01-07 2017-07-14 上海思立微电子科技有限公司 file locking method, device and terminal
CN109784077A (en) * 2019-01-15 2019-05-21 深圳市趣创科技有限公司 File security means of defence
CN110472390A (en) * 2019-08-15 2019-11-19 江苏建筑职业技术学院 A method of protection computer system security
CN111738715A (en) * 2015-12-21 2020-10-02 阿里巴巴集团控股有限公司 Payment code payment method and device
CN113094672A (en) * 2021-04-25 2021-07-09 前海金信(深圳)科技有限责任公司 Method for automatically encrypting mobile phone data

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102104671A (en) * 2009-12-17 2011-06-22 深圳富泰宏精密工业有限公司 Mobile phone and method for locking application thereof
CN102104671B (en) * 2009-12-17 2014-02-12 深圳富泰宏精密工业有限公司 Mobile phone and method for locking application thereof
CN102402651A (en) * 2010-09-09 2012-04-04 三星电子(中国)研发中心 Device and method for protecting information and portable terminal
CN101951443A (en) * 2010-09-25 2011-01-19 宇龙计算机通信科技(深圳)有限公司 File security method, system and mobile terminal
CN102045450A (en) * 2011-01-12 2011-05-04 深圳桑菲消费通信有限公司 Method for protecting mobile phone information security
CN102655542A (en) * 2011-03-01 2012-09-05 联想(北京)有限公司 Method and terminal for switching terminal statuses
CN102334306A (en) * 2011-07-18 2012-01-25 华为终端有限公司 Information instant enciphering and deciphering method and device
WO2011137868A3 (en) * 2011-07-18 2012-06-14 华为终端有限公司 Method and device for instantly encrypting and decrypting messages
WO2011137868A2 (en) * 2011-07-18 2011-11-10 华为终端有限公司 Method and device for instantly encrypting and decrypting messages
CN102316214A (en) * 2011-07-26 2012-01-11 上海优思通信科技有限公司 Privacy method for personal information and system
WO2013075431A1 (en) * 2011-11-22 2013-05-30 中兴通讯股份有限公司 Method and device for protecting information in mobile terminal
CN103136479A (en) * 2011-11-22 2013-06-05 中兴通讯股份有限公司 Information protection method and device of mobile terminal
CN103581417A (en) * 2012-08-02 2014-02-12 北京网秦天下科技有限公司 Privacy protection device of mobile terminal and privacy protection method thereof
WO2014019364A1 (en) * 2012-08-02 2014-02-06 北京网秦天下科技有限公司 Privacy protection device and privacy protection method for mobile terminal
WO2014166216A1 (en) * 2013-04-09 2014-10-16 中兴通讯股份有限公司 Display method and device
CN103338445A (en) * 2013-06-19 2013-10-02 深圳市垦鑫达科技有限公司 File encryption and decryption method and system
CN103532960A (en) * 2013-10-21 2014-01-22 上海合合信息科技发展有限公司 Text encryption interaction method, encryption method and device, decryption method and device
CN103559451A (en) * 2013-10-21 2014-02-05 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting and displaying privacy information
CN103532960B (en) * 2013-10-21 2017-09-26 上海合合信息科技发展有限公司 Decrypt device
CN104331670A (en) * 2014-10-28 2015-02-04 小米科技有限责任公司 Method and device for protecting private contents
CN111738715A (en) * 2015-12-21 2020-10-02 阿里巴巴集团控股有限公司 Payment code payment method and device
CN106951797A (en) * 2016-01-07 2017-07-14 上海思立微电子科技有限公司 file locking method, device and terminal
CN105912947A (en) * 2016-03-31 2016-08-31 宇龙计算机通信科技(深圳)有限公司 File processing method and device based on external equipment
CN106022164A (en) * 2016-05-18 2016-10-12 深圳市基伍智联科技有限公司 Method and device for protecting information on intelligent terminal
CN109784077A (en) * 2019-01-15 2019-05-21 深圳市趣创科技有限公司 File security means of defence
CN110472390A (en) * 2019-08-15 2019-11-19 江苏建筑职业技术学院 A method of protection computer system security
CN113094672A (en) * 2021-04-25 2021-07-09 前海金信(深圳)科技有限责任公司 Method for automatically encrypting mobile phone data

Similar Documents

Publication Publication Date Title
CN101459723A (en) Secret keeping processing method for mobile phone information
US8145907B2 (en) Secure data transfer
CN103095890B (en) The encryption method of associated person information and communication terminal
CN103647784B (en) A kind of method and apparatus of public and private isolation
EP2113856A1 (en) Secure storage of user data in UICC and Smart Card enabled devices
CN101483861A (en) Method for mobile phone information safety protection
WO2011153748A1 (en) Method and apparatus for communicating using spurious contact information
US20060258333A1 (en) Method for backing up data stored in a mobile electronic device
CN101478595A (en) Mobile communication terminal data protection method
CN101409881A (en) Secrecy apparatus and method for mobile phone data
CN101795450A (en) Method and device for carrying out security protection on mobile phone data
KR101625785B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN101252596A (en) Method and system for protecting number information privacy
CA3066701A1 (en) Controlling access to data
CN102572750A (en) Method and terminal for protecting short messages
CN102868826A (en) Terminal and terminal data protection method
Rottermanner et al. Privacy and data protection in smartphone messengers
CN101437116A (en) System and method for hiding and displaying image and sound file of image-shooting apparatus
WO2012151975A1 (en) Method and device for concealing terminal information
WO2011088660A1 (en) Method and apparatus for protecting cell-phone information content
WO2010038764A1 (en) Encryption device, encryption method and program
WO2017020598A1 (en) Contact information management method, apparatus and terminal
CN102883039A (en) Method for encrypting multimedia private diary of mobile phone
CN103634313B (en) Address list processing method and device, as well as mobile terminal
CN103002117A (en) Phone information encryption method and phone information encryption system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20090617