CN101483861A - Method for mobile phone information safety protection - Google Patents
Method for mobile phone information safety protection Download PDFInfo
- Publication number
- CN101483861A CN101483861A CNA2008102397439A CN200810239743A CN101483861A CN 101483861 A CN101483861 A CN 101483861A CN A2008102397439 A CNA2008102397439 A CN A2008102397439A CN 200810239743 A CN200810239743 A CN 200810239743A CN 101483861 A CN101483861 A CN 101483861A
- Authority
- CN
- China
- Prior art keywords
- information
- mobile phone
- contact person
- hidden
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention provides a safety protection method for mobile phone information, which comprises the following steps: the user installs mobile phone hiding software; the user opens the function of mobile phone hiding; the user sets a password for entering the program; the user marks the contacts need to be hidden through a telephone directory; the marked contacts and all the information comprising the contacts which can be found in the function table are hidden by the operating system of the mobile phone. After the user sets to hide a certain contact in the telephone directory according to the information needs to be hidden, all the information of the contact is hidden. Therefore, even if the mobile phone is lost or other people are available to the mobile phone under conscious or unconscious conditions or even open the mobile phone and the files inside such as the telephone directory, the information of the set contact cannot be found.
Description
Technical field:
The present invention relates to computer software, mobile communication field, especially computer software application in mobile phone communication, particularly relate to a kind of phone information security protection method.
Background technology:
Develop rapidly along with information, mobile phone becomes one of immediate communication tool that more and more generally uses in people's life, the work, usually by mobile phone and network or communication between mobile phone, the transmission information between instant communication client and the mobile phone of saying so more specifically, perhaps mutual photos and sending messages between the mobile phone, contact or information interchange promptly make things convenient for quick again between the people like this.Yet wireless telecommunications also inevitably bring the safety problem of information when offering convenience to people.
Present most of mobile phone all has only to be encrypted the conversation of mobile phone, prevents to be eavesdropped in communication process.As: the patent No. is 200410099253.5, what adopt is to add encryption software module in the user mobile phone of required encryption, the encryption mode that encryption software module in the mobile phone is carried out between the caller and called users is set, by system's short message, make and carry out the encryption mode negotiation between calling subscriber and the called subscriber, after finishing encryption mode setting and encryption mode negotiation, carry out coded communication and encryption mode hot-swap, prevent to be eavesdropped in the communication process with this.And telephone directory, instant message and the log of user mobile phone this locality are not encrypted or protected, in case checked by others or read.Mobile phone does not have the function of encryption, if lost mobile phone like this, the lawless person can carry out all illegal activities according to the information of mobile phone, as: the lawless person helps to supplement with money by the information request contact person after stealing mobile phone, or the like or others' when under the situation that the user does not permit, checking user's mobile phone, the user can't stop its privacy of checking oneself or private data.The all information of user mobile phone does not have fail safe like this.Also make and the relatively problem of headache of user need urgent issue to be resolved.
Also have by the safety that screen protection reaches cellphone information is set at present, perhaps single file is encrypted, such as: telephone directory, instant message etc., but such as: the spouse, and password is set also to its generation distrust.So need a kind of function that can hide Info, reach maintaining secrecy to these information.
Summary of the invention:
The present invention provides a kind of phone information security protection method for addressing the above problem weak point, comprises the steps:
S1. user installs mobile phone hiding software;
S2. the user selects to enable the function that mobile phone is hidden;
S3. the user is provided with and enters the password of this program;
S4. by the hiding contact person of telephone directory mark;
The S5 mobile phone operating system is searched all information that comprise this contact person with the contact person of mark in menu;
S6, above-mentioned information is hidden.
Described step also comprises keyboard shortcut is set, and is used for the interim quickly data that are hidden that show.
Contact person among the described step S4 can be a plurality of contact persons.
Information among the described step S4,
The name, the phone that comprise this contact person in the telephone directory;
The information that comprises this contact person of short message file the inside;
The information that comprises this contact person in the log;
The information that comprises this contact person in the multimedia document.
Associated person information in the described multimedia document is to search by the file name of picture, video, sound.
Advantage of the present invention:
The user is provided with according to the information of own need to be keep secret and hides in the telephone directory behind certain contact person, and all information of this contact person all can be hidden.Even mobile phone is lost like this, perhaps other people are having a mind to or are touching mobile phone under the situation unintentionally, even open the file in mobile phone and the mobile phone, as telephone directory, also can not find the contact person's of setting information.
Description of drawings:
Fig. 1 is the flow chart that user of the present invention is provided with contact person's hidden function;
Fig. 2 is the flow chart that the present invention starts the thin defencive function of mobile portable phone.
Embodiment:
The function that the present invention realizes: the user is provided with hidden function to the contact person of telephone directory, finds all information that relate to this contact person, hides these all information then, even if other people open mobile phone, can not find all information of this contact person.
Elaborate below in conjunction with accompanying drawing,
As shown in Figure 1, the user is provided with the step of contact person's hidden function:
101. user installs mobile phone hiding software:
This software has added one deck shell before the program launchers of mobile phone operating system, that is to say, before mobile phone operating system starts the cell-phone function program, needs this software of operation earlier.
102. the user selects to enable the function that mobile phone is hidden:
103. the user is provided with password, promptly enters the password of this program, password default is 1234, if be not provided with, anyone takes mobile phone and can be provided with;
104. the contact person that the user hides by the telephone directory mark:
This contact person can be a plurality of contact persons.
105. mobile phone operating system, is searched all information that comprise this contact person with the contact person of mark in menu.
This information comprises name, the phone of this contact person in the telephone directory;
The information that comprises this contact person of short message file the inside;
The information that comprises this contact person in the log;
The information that comprises this contact person in the multimedia document.Searching of this contact person's information is to pass through title.As: with picture name Zhang San, and above-mentioned hiding people be named as Zhang San, then this picture chance is hidden.
106. finding the information of coupling is hidden.
As shown in Figure 2, the user starts the step that mobile phone is hidden defencive function:
201. check that whether mobile phone has been installed is hidden software:
If do not install, then carry out by normal;
If install, then carry out earlier and hide software.
202. hide software inspection configuration, see whether this hidden function starts:
If do not start, then carry out by normal;
If start, then open the contact person of mobile phone setting and all information of this contact person and all cannot see.
The user can be provided with keyboard shortcut, the interim quickly data that are hidden that show.For example input " * #222# ", then prompting input password if password is correct, then shows the contact person who is hidden.
Claims (5)
1. a phone information security protection method is characterized in that: comprise the steps:
S1. user installs mobile phone hiding software;
S2. the user selects to enable the function that mobile phone is hidden;
S3. the user is provided with and enters the password of this program;
S4. by the hiding contact person of telephone directory mark;
The S5 mobile phone operating system is searched all information that comprise this contact person with the contact person of mark in menu;
S6, above-mentioned information is hidden.
2. a kind of phone information security protection method according to claim 1 is characterized in that: described step also comprises keyboard shortcut is set, and is used for the interim quickly data that are hidden that show.
3. a kind of phone information security protection method according to claim 1 is characterized in that: the contact person among the described step S4 can be a plurality of contact persons.
4. according to claim 1 or 3 described a kind of phone information security protection method, it is characterized in that: the information among the described step S4,
The name, the phone that comprise this contact person in the telephone directory;
The information that comprises this contact person of short message file the inside;
The information that comprises this contact person in the log;
The information that comprises this contact person in the multimedia document.
5. a kind of phone information security protection method according to claim 4 is characterized in that: the associated person information in the described multimedia document is to search by the file name of picture, video, sound.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008102397439A CN101483861A (en) | 2008-12-17 | 2008-12-17 | Method for mobile phone information safety protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008102397439A CN101483861A (en) | 2008-12-17 | 2008-12-17 | Method for mobile phone information safety protection |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101483861A true CN101483861A (en) | 2009-07-15 |
Family
ID=40880749
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2008102397439A Pending CN101483861A (en) | 2008-12-17 | 2008-12-17 | Method for mobile phone information safety protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101483861A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101909114A (en) * | 2010-07-13 | 2010-12-08 | 中兴通讯股份有限公司 | Method, device and mobile terminal for hiding information |
CN101951443A (en) * | 2010-09-25 | 2011-01-19 | 宇龙计算机通信科技(深圳)有限公司 | File security method, system and mobile terminal |
CN103077357A (en) * | 2013-01-18 | 2013-05-01 | 浙江长天信息技术有限公司 | Method for storing private files |
CN103377332A (en) * | 2012-04-26 | 2013-10-30 | 腾讯科技(深圳)有限公司 | Application program accessing method and device |
CN103391349A (en) * | 2012-05-09 | 2013-11-13 | 中兴通讯股份有限公司 | Method of keeping secrets of terminal and terminal |
CN103577220A (en) * | 2013-08-31 | 2014-02-12 | 成都西可科技有限公司 | System and method for opening private application or private data through NFC (near field communication) label |
CN104243712A (en) * | 2014-09-24 | 2014-12-24 | 广东欧珀移动通信有限公司 | Text message display method and system of mobile terminal |
CN104318139A (en) * | 2014-10-09 | 2015-01-28 | 深圳市中兴移动通信有限公司 | Intelligent terminal and method for processing data information by using same |
US9003544B2 (en) | 2011-07-26 | 2015-04-07 | Kaspersky Lab Zao | Efficient securing of data on mobile devices |
CN109117665A (en) * | 2013-08-14 | 2019-01-01 | 华为终端(东莞)有限公司 | Realize method for secret protection and device |
-
2008
- 2008-12-17 CN CNA2008102397439A patent/CN101483861A/en active Pending
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101909114A (en) * | 2010-07-13 | 2010-12-08 | 中兴通讯股份有限公司 | Method, device and mobile terminal for hiding information |
CN101951443A (en) * | 2010-09-25 | 2011-01-19 | 宇龙计算机通信科技(深圳)有限公司 | File security method, system and mobile terminal |
US9003544B2 (en) | 2011-07-26 | 2015-04-07 | Kaspersky Lab Zao | Efficient securing of data on mobile devices |
CN103377332B (en) * | 2012-04-26 | 2016-04-20 | 腾讯科技(深圳)有限公司 | The method of access application and device |
CN103377332A (en) * | 2012-04-26 | 2013-10-30 | 腾讯科技(深圳)有限公司 | Application program accessing method and device |
CN103391349A (en) * | 2012-05-09 | 2013-11-13 | 中兴通讯股份有限公司 | Method of keeping secrets of terminal and terminal |
CN103391349B (en) * | 2012-05-09 | 2017-02-15 | 中兴通讯股份有限公司 | Method of keeping secrets of terminal and terminal |
CN103077357A (en) * | 2013-01-18 | 2013-05-01 | 浙江长天信息技术有限公司 | Method for storing private files |
CN109117665A (en) * | 2013-08-14 | 2019-01-01 | 华为终端(东莞)有限公司 | Realize method for secret protection and device |
CN103577220A (en) * | 2013-08-31 | 2014-02-12 | 成都西可科技有限公司 | System and method for opening private application or private data through NFC (near field communication) label |
CN104243712A (en) * | 2014-09-24 | 2014-12-24 | 广东欧珀移动通信有限公司 | Text message display method and system of mobile terminal |
CN104243712B (en) * | 2014-09-24 | 2016-08-17 | 广东欧珀移动通信有限公司 | The short message display method of mobile terminal and system |
CN104318139A (en) * | 2014-10-09 | 2015-01-28 | 深圳市中兴移动通信有限公司 | Intelligent terminal and method for processing data information by using same |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101483861A (en) | Method for mobile phone information safety protection | |
JP5599854B2 (en) | System and method for caller identification customization and remote management of communication devices | |
CN101459723A (en) | Secret keeping processing method for mobile phone information | |
CN101409881A (en) | Secrecy apparatus and method for mobile phone data | |
WO2011153748A1 (en) | Method and apparatus for communicating using spurious contact information | |
CN103095890A (en) | Contact person information encryption method and communication terminal | |
JP2011517821A (en) | Method and apparatus for enabling access to contact information | |
CN101370209A (en) | Information disguising method and system | |
CN101507246A (en) | Data privacy on wireless communication terminal | |
CN100420324C (en) | Method for protecting information safety in mobile terminal | |
CN101951443A (en) | File security method, system and mobile terminal | |
CN1997188A (en) | A recognition method of the user identity and its handset | |
CN101415186A (en) | Method for security protection of mobile phone information | |
CN100459816C (en) | Encrypted information processing method and terminal | |
KR101067146B1 (en) | Method for processing encrypted message in portable terminal and portable terminal | |
CN101242273A (en) | Signature data generation method, system and mobile terminal for mobile terminal | |
JP5262939B2 (en) | Communication system, communication terminal, data transfer server, and control program | |
CN101754209A (en) | Method for protecting contents of mobile phone | |
CN103780756A (en) | Customer identification card data confidentiality method and mobile terminal thereof | |
US20150156173A1 (en) | Communication system utilizing fingerprint information and use thereof | |
CN106714147A (en) | Privacy short message protection method | |
JP2009260484A (en) | Communication device | |
JP2020004424A (en) | Method and device for protecting privacy of mobile terminal and mobile terminal | |
WO2017020598A1 (en) | Contact information management method, apparatus and terminal | |
JP2008252186A (en) | Communication apparatus and its notification method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20090715 |