CN101483861A - Method for mobile phone information safety protection - Google Patents

Method for mobile phone information safety protection Download PDF

Info

Publication number
CN101483861A
CN101483861A CNA2008102397439A CN200810239743A CN101483861A CN 101483861 A CN101483861 A CN 101483861A CN A2008102397439 A CNA2008102397439 A CN A2008102397439A CN 200810239743 A CN200810239743 A CN 200810239743A CN 101483861 A CN101483861 A CN 101483861A
Authority
CN
China
Prior art keywords
information
mobile phone
contact person
hidden
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008102397439A
Other languages
Chinese (zh)
Inventor
霍文旌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yiqitong It Tech Co Ltd Beijing
Original Assignee
Yiqitong It Tech Co Ltd Beijing
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yiqitong It Tech Co Ltd Beijing filed Critical Yiqitong It Tech Co Ltd Beijing
Priority to CNA2008102397439A priority Critical patent/CN101483861A/en
Publication of CN101483861A publication Critical patent/CN101483861A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a safety protection method for mobile phone information, which comprises the following steps: the user installs mobile phone hiding software; the user opens the function of mobile phone hiding; the user sets a password for entering the program; the user marks the contacts need to be hidden through a telephone directory; the marked contacts and all the information comprising the contacts which can be found in the function table are hidden by the operating system of the mobile phone. After the user sets to hide a certain contact in the telephone directory according to the information needs to be hidden, all the information of the contact is hidden. Therefore, even if the mobile phone is lost or other people are available to the mobile phone under conscious or unconscious conditions or even open the mobile phone and the files inside such as the telephone directory, the information of the set contact cannot be found.

Description

A kind of phone information security protection method
Technical field:
The present invention relates to computer software, mobile communication field, especially computer software application in mobile phone communication, particularly relate to a kind of phone information security protection method.
Background technology:
Develop rapidly along with information, mobile phone becomes one of immediate communication tool that more and more generally uses in people's life, the work, usually by mobile phone and network or communication between mobile phone, the transmission information between instant communication client and the mobile phone of saying so more specifically, perhaps mutual photos and sending messages between the mobile phone, contact or information interchange promptly make things convenient for quick again between the people like this.Yet wireless telecommunications also inevitably bring the safety problem of information when offering convenience to people.
Present most of mobile phone all has only to be encrypted the conversation of mobile phone, prevents to be eavesdropped in communication process.As: the patent No. is 200410099253.5, what adopt is to add encryption software module in the user mobile phone of required encryption, the encryption mode that encryption software module in the mobile phone is carried out between the caller and called users is set, by system's short message, make and carry out the encryption mode negotiation between calling subscriber and the called subscriber, after finishing encryption mode setting and encryption mode negotiation, carry out coded communication and encryption mode hot-swap, prevent to be eavesdropped in the communication process with this.And telephone directory, instant message and the log of user mobile phone this locality are not encrypted or protected, in case checked by others or read.Mobile phone does not have the function of encryption, if lost mobile phone like this, the lawless person can carry out all illegal activities according to the information of mobile phone, as: the lawless person helps to supplement with money by the information request contact person after stealing mobile phone, or the like or others' when under the situation that the user does not permit, checking user's mobile phone, the user can't stop its privacy of checking oneself or private data.The all information of user mobile phone does not have fail safe like this.Also make and the relatively problem of headache of user need urgent issue to be resolved.
Also have by the safety that screen protection reaches cellphone information is set at present, perhaps single file is encrypted, such as: telephone directory, instant message etc., but such as: the spouse, and password is set also to its generation distrust.So need a kind of function that can hide Info, reach maintaining secrecy to these information.
Summary of the invention:
The present invention provides a kind of phone information security protection method for addressing the above problem weak point, comprises the steps:
S1. user installs mobile phone hiding software;
S2. the user selects to enable the function that mobile phone is hidden;
S3. the user is provided with and enters the password of this program;
S4. by the hiding contact person of telephone directory mark;
The S5 mobile phone operating system is searched all information that comprise this contact person with the contact person of mark in menu;
S6, above-mentioned information is hidden.
Described step also comprises keyboard shortcut is set, and is used for the interim quickly data that are hidden that show.
Contact person among the described step S4 can be a plurality of contact persons.
Information among the described step S4,
The name, the phone that comprise this contact person in the telephone directory;
The information that comprises this contact person of short message file the inside;
The information that comprises this contact person in the log;
The information that comprises this contact person in the multimedia document.
Associated person information in the described multimedia document is to search by the file name of picture, video, sound.
Advantage of the present invention:
The user is provided with according to the information of own need to be keep secret and hides in the telephone directory behind certain contact person, and all information of this contact person all can be hidden.Even mobile phone is lost like this, perhaps other people are having a mind to or are touching mobile phone under the situation unintentionally, even open the file in mobile phone and the mobile phone, as telephone directory, also can not find the contact person's of setting information.
Description of drawings:
Fig. 1 is the flow chart that user of the present invention is provided with contact person's hidden function;
Fig. 2 is the flow chart that the present invention starts the thin defencive function of mobile portable phone.
Embodiment:
The function that the present invention realizes: the user is provided with hidden function to the contact person of telephone directory, finds all information that relate to this contact person, hides these all information then, even if other people open mobile phone, can not find all information of this contact person.
Elaborate below in conjunction with accompanying drawing,
As shown in Figure 1, the user is provided with the step of contact person's hidden function:
101. user installs mobile phone hiding software:
This software has added one deck shell before the program launchers of mobile phone operating system, that is to say, before mobile phone operating system starts the cell-phone function program, needs this software of operation earlier.
102. the user selects to enable the function that mobile phone is hidden:
103. the user is provided with password, promptly enters the password of this program, password default is 1234, if be not provided with, anyone takes mobile phone and can be provided with;
104. the contact person that the user hides by the telephone directory mark:
This contact person can be a plurality of contact persons.
105. mobile phone operating system, is searched all information that comprise this contact person with the contact person of mark in menu.
This information comprises name, the phone of this contact person in the telephone directory;
The information that comprises this contact person of short message file the inside;
The information that comprises this contact person in the log;
The information that comprises this contact person in the multimedia document.Searching of this contact person's information is to pass through title.As: with picture name Zhang San, and above-mentioned hiding people be named as Zhang San, then this picture chance is hidden.
106. finding the information of coupling is hidden.
As shown in Figure 2, the user starts the step that mobile phone is hidden defencive function:
201. check that whether mobile phone has been installed is hidden software:
If do not install, then carry out by normal;
If install, then carry out earlier and hide software.
202. hide software inspection configuration, see whether this hidden function starts:
If do not start, then carry out by normal;
If start, then open the contact person of mobile phone setting and all information of this contact person and all cannot see.
The user can be provided with keyboard shortcut, the interim quickly data that are hidden that show.For example input " * #222# ", then prompting input password if password is correct, then shows the contact person who is hidden.

Claims (5)

1. a phone information security protection method is characterized in that: comprise the steps:
S1. user installs mobile phone hiding software;
S2. the user selects to enable the function that mobile phone is hidden;
S3. the user is provided with and enters the password of this program;
S4. by the hiding contact person of telephone directory mark;
The S5 mobile phone operating system is searched all information that comprise this contact person with the contact person of mark in menu;
S6, above-mentioned information is hidden.
2. a kind of phone information security protection method according to claim 1 is characterized in that: described step also comprises keyboard shortcut is set, and is used for the interim quickly data that are hidden that show.
3. a kind of phone information security protection method according to claim 1 is characterized in that: the contact person among the described step S4 can be a plurality of contact persons.
4. according to claim 1 or 3 described a kind of phone information security protection method, it is characterized in that: the information among the described step S4,
The name, the phone that comprise this contact person in the telephone directory;
The information that comprises this contact person of short message file the inside;
The information that comprises this contact person in the log;
The information that comprises this contact person in the multimedia document.
5. a kind of phone information security protection method according to claim 4 is characterized in that: the associated person information in the described multimedia document is to search by the file name of picture, video, sound.
CNA2008102397439A 2008-12-17 2008-12-17 Method for mobile phone information safety protection Pending CN101483861A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008102397439A CN101483861A (en) 2008-12-17 2008-12-17 Method for mobile phone information safety protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008102397439A CN101483861A (en) 2008-12-17 2008-12-17 Method for mobile phone information safety protection

Publications (1)

Publication Number Publication Date
CN101483861A true CN101483861A (en) 2009-07-15

Family

ID=40880749

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008102397439A Pending CN101483861A (en) 2008-12-17 2008-12-17 Method for mobile phone information safety protection

Country Status (1)

Country Link
CN (1) CN101483861A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101909114A (en) * 2010-07-13 2010-12-08 中兴通讯股份有限公司 Method, device and mobile terminal for hiding information
CN101951443A (en) * 2010-09-25 2011-01-19 宇龙计算机通信科技(深圳)有限公司 File security method, system and mobile terminal
CN103077357A (en) * 2013-01-18 2013-05-01 浙江长天信息技术有限公司 Method for storing private files
CN103377332A (en) * 2012-04-26 2013-10-30 腾讯科技(深圳)有限公司 Application program accessing method and device
CN103391349A (en) * 2012-05-09 2013-11-13 中兴通讯股份有限公司 Method of keeping secrets of terminal and terminal
CN103577220A (en) * 2013-08-31 2014-02-12 成都西可科技有限公司 System and method for opening private application or private data through NFC (near field communication) label
CN104243712A (en) * 2014-09-24 2014-12-24 广东欧珀移动通信有限公司 Text message display method and system of mobile terminal
CN104318139A (en) * 2014-10-09 2015-01-28 深圳市中兴移动通信有限公司 Intelligent terminal and method for processing data information by using same
US9003544B2 (en) 2011-07-26 2015-04-07 Kaspersky Lab Zao Efficient securing of data on mobile devices
CN109117665A (en) * 2013-08-14 2019-01-01 华为终端(东莞)有限公司 Realize method for secret protection and device

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101909114A (en) * 2010-07-13 2010-12-08 中兴通讯股份有限公司 Method, device and mobile terminal for hiding information
CN101951443A (en) * 2010-09-25 2011-01-19 宇龙计算机通信科技(深圳)有限公司 File security method, system and mobile terminal
US9003544B2 (en) 2011-07-26 2015-04-07 Kaspersky Lab Zao Efficient securing of data on mobile devices
CN103377332B (en) * 2012-04-26 2016-04-20 腾讯科技(深圳)有限公司 The method of access application and device
CN103377332A (en) * 2012-04-26 2013-10-30 腾讯科技(深圳)有限公司 Application program accessing method and device
CN103391349A (en) * 2012-05-09 2013-11-13 中兴通讯股份有限公司 Method of keeping secrets of terminal and terminal
CN103391349B (en) * 2012-05-09 2017-02-15 中兴通讯股份有限公司 Method of keeping secrets of terminal and terminal
CN103077357A (en) * 2013-01-18 2013-05-01 浙江长天信息技术有限公司 Method for storing private files
CN109117665A (en) * 2013-08-14 2019-01-01 华为终端(东莞)有限公司 Realize method for secret protection and device
CN103577220A (en) * 2013-08-31 2014-02-12 成都西可科技有限公司 System and method for opening private application or private data through NFC (near field communication) label
CN104243712A (en) * 2014-09-24 2014-12-24 广东欧珀移动通信有限公司 Text message display method and system of mobile terminal
CN104243712B (en) * 2014-09-24 2016-08-17 广东欧珀移动通信有限公司 The short message display method of mobile terminal and system
CN104318139A (en) * 2014-10-09 2015-01-28 深圳市中兴移动通信有限公司 Intelligent terminal and method for processing data information by using same

Similar Documents

Publication Publication Date Title
CN101483861A (en) Method for mobile phone information safety protection
JP5599854B2 (en) System and method for caller identification customization and remote management of communication devices
CN101459723A (en) Secret keeping processing method for mobile phone information
CN101409881A (en) Secrecy apparatus and method for mobile phone data
WO2011153748A1 (en) Method and apparatus for communicating using spurious contact information
CN103095890A (en) Contact person information encryption method and communication terminal
JP2011517821A (en) Method and apparatus for enabling access to contact information
CN101370209A (en) Information disguising method and system
CN101507246A (en) Data privacy on wireless communication terminal
CN100420324C (en) Method for protecting information safety in mobile terminal
CN101951443A (en) File security method, system and mobile terminal
CN1997188A (en) A recognition method of the user identity and its handset
CN101415186A (en) Method for security protection of mobile phone information
CN100459816C (en) Encrypted information processing method and terminal
KR101067146B1 (en) Method for processing encrypted message in portable terminal and portable terminal
CN101242273A (en) Signature data generation method, system and mobile terminal for mobile terminal
JP5262939B2 (en) Communication system, communication terminal, data transfer server, and control program
CN101754209A (en) Method for protecting contents of mobile phone
CN103780756A (en) Customer identification card data confidentiality method and mobile terminal thereof
US20150156173A1 (en) Communication system utilizing fingerprint information and use thereof
CN106714147A (en) Privacy short message protection method
JP2009260484A (en) Communication device
JP2020004424A (en) Method and device for protecting privacy of mobile terminal and mobile terminal
WO2017020598A1 (en) Contact information management method, apparatus and terminal
JP2008252186A (en) Communication apparatus and its notification method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20090715