CN101534502B - Mobile phone camouflaging method - Google Patents

Mobile phone camouflaging method Download PDF

Info

Publication number
CN101534502B
CN101534502B CN200810007377A CN200810007377A CN101534502B CN 101534502 B CN101534502 B CN 101534502B CN 200810007377 A CN200810007377 A CN 200810007377A CN 200810007377 A CN200810007377 A CN 200810007377A CN 101534502 B CN101534502 B CN 101534502B
Authority
CN
China
Prior art keywords
mobile phone
camouflaging
function
user
screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN200810007377A
Other languages
Chinese (zh)
Other versions
CN101534502A (en
Inventor
马红博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN200810007377A priority Critical patent/CN101534502B/en
Publication of CN101534502A publication Critical patent/CN101534502A/en
Application granted granted Critical
Publication of CN101534502B publication Critical patent/CN101534502B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The invention discloses a mobile phone camouflaging method which comprises the following steps: step one, when a mobile phone is in standby state, the mobile phone camouflaging function is started; and step two, under the condition that a user does not relieve the mobile phone camouflaging function, the operation executed by the user to the mobile phone results in the preset abnormal phenomena displayed on a mobile phone screen. The invention can effectively prevent illegal mobile phone user from executing any operations on the mobile phone, thereby protecting the personal information in the mobile phone and the property security.

Description

Mobile phone camouflaging method
Technical field
The present invention relates to mobile phone, more specifically, relate to a kind of camouflage method of mobile phone.
Background technology
High speed development along with mobile communication; Requisite contact instrument during mobile phone has day by day become people's routine work and lived; And wherein there are a large amount of personal information, for example message registration, address list, short message, picture, short-movie, even mobile TV, Mobile banking etc.To mobile phone corresponding secrecy provision is set, the protection personal information security is just particularly important.
The secrecy provision of mobile phone has following several types at present.A kind of is to prevent that through simply being provided with mobile phone from being used by illegal, for example: the user cipher protection is set, the PIN code protection is set.These two kinds generally is when mobile phone power-on, to carry out authentication, follow-up in the cell phone standby use revival not.Cryptoguard when also having standby in addition, keypad lock etc.These several kinds lost efficacy then possibly after pulling out battery, start shooting again the time.In addition, the use for this software of doing shopping as mobile phone also has authentication.If but to this step, in fact the cellphone subscriber is bearing great risk.Under many situation, need more hidden, the more efficiently precautionary measures.
Therefore, need a kind of solution of mobile phone camouflaging, can solve the problem in the above-mentioned correlation technique.
Summary of the invention
The objective of the invention is to, when user mobile phone is in standby interface, cell phone keyboard/screen response is encrypted; Make the disabled user have no way of learning the keyboard/screen response of mobile phone; Make it abandon taking further operation, thus protection cellphone subscriber personal information, property safety.
According to the present invention, a kind of mobile phone camouflaging method is provided, may further comprise the steps: step 1 when mobile phone is in holding state, starts the mobile phone camouflaging function; And step 2, do not remove the user under the situation of mobile phone camouflaging function, in response to the user to showing the anomaly preset on the screen that operates in mobile phone of mobile phone.
Wherein, anomaly comprises: unusual character, mess code and the unusual picture that presets.
Step 2 may further comprise the steps: do not remove the user under the situation of mobile phone camouflaging function; Any operation of mobile phone being carried out in response to the user; On the screen of mobile phone, show mess code or unusual character; And after the user surpasses pre-determined number to the operation of mobile phone, on the screen of mobile phone, show the unusual picture that presets.
The unusual picture that presets comprises: blank screen, white screen, funnel flashes and power-down rebooting.
Pretend function with manual or automated manner starting hand-set, and remove the mobile phone camouflaging function through the password that input is preset.
When having started the mobile phone camouflaging function, incoming call is carried out normal response process.
Through the present invention, can prevent any operation that illegal cellphone subscriber carries out mobile phone effectively, thus the personal information in the protection mobile phone, and property safety.
Other features and advantages of the present invention will be set forth in specification subsequently, and, partly from specification, become obvious, perhaps understand through embodiment of the present invention.The object of the invention can be realized through the structure that in the specification of being write, claims and accompanying drawing, is particularly pointed out and obtained with other advantages.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 shows the flow chart according to the mobile phone camouflaging method of the embodiment of the invention; And
Fig. 2 shows the state exchange sketch map according to the mobile phone camouflaging function of the embodiment of the invention.
Embodiment
To combine accompanying drawing to specify embodiments of the invention below.
Fig. 1 shows the flow chart according to the mobile phone camouflaging method of the embodiment of the invention.With reference to Fig. 1, the mobile phone camouflaging method of this embodiment may further comprise the steps: step S102 when mobile phone is in holding state, starts the mobile phone camouflaging function; And step S104, do not remove the user under the situation of mobile phone camouflaging function, in response to the user to showing the anomaly preset on the screen that operates in mobile phone of mobile phone.
Wherein, anomaly comprises: unusual character, mess code and the unusual picture that presets.
Step S104 may further comprise the steps: do not remove the user under the situation of mobile phone camouflaging function; Any operation of mobile phone being carried out in response to the user; On the screen of mobile phone, show mess code or unusual character; And after the user surpasses pre-determined number to the operation of mobile phone, on the screen of mobile phone, show the unusual picture that presets.
The unusual picture that presets comprises: blank screen, white screen, funnel flashes and power-down rebooting.
Pretend function with manual or automated manner starting hand-set, and remove the mobile phone camouflaging function through the password that input is preset.
When having started the mobile phone camouflaging function, incoming call is carried out normal response process.
An alternative embodiment of the invention is described below.
In this embodiment, designed a kind of mobile phone camouflaging function, be downloaded in the mobile phone hardware as the part of handset program.When mobile phone is in standby interface, open this camouflage function.At this moment any operation to keyboard shows as anomaly on screen: for example 1 is blank screen, the analogue mobile phone off-mode; The 2nd, show mess code, simulation LCD distress condition; The 3rd, the unusual animation that screen display presets, the analogue mobile phone catastrophe failure, for example power-down rebooting/sight crashes/waits.If the disabled user does not know the keyboard password that the user presets, then have no way of operating this mobile phone.Even cycle power perhaps pulls out battery and starts shooting again, after start, open the keyboard/screen encryption function automatically, the disabled user can't use this mobile phone in the same old way.So just can prevent the leakage of personal information in the mobile phone effectively, can also reduce of the circulation of illegal mobile phone in market.
Below in conjunction with Fig. 2 another embodiment of the present invention is described.Camouflage method in the present embodiment is mainly concerned with the programming in the cell phone software, comprises substantially: the camouflage function is launched/releasing/concealment cipher setting of camouflage function and modification.
The setting of one concealment cipher and modification
Mobile phone is in the holding state of normal mode, after the concealment cipher that input is preset, in the camouflage function interface that ejects, selects the concealment cipher editor.Before the new concealment cipher of input, whether the checking Old Password is correct earlier.If Old Password is incorrect, abandon further operation; If Old Password is correct, then further import new password and affirmation.
Two camouflage functions are launched flow process
At first, be at mobile phone under the holding state of normal mode, after the input concealment cipher, eject the camouflage function interface: comprise that the camouflage function launches/concealment cipher editor etc.;
Secondly, the cellphone subscriber selects to pretend function and opens and confirm that then mobile phone is initially located in the camouflage state;
Next, if user's input concealment cipher can be closed the camouflage function, make mobile phone recover normal display state; If user's input is not concealment cipher, then mobile phone all through program, is shown as unusual character at random, mess code for each keyboard operation of input; If after the keyboard operation number of times reaches some; Still do not untie the camouflage function, then pretend function upgrading, be shown as white screen/blank screen/or funnel occurs and flash/unusual pictures such as analogue mobile phone power-down rebooting; In order to the deception disabled user, finally let disabled user's abort operation.Because the camouflage function is to mobile phone, even the user has changed the UIM/SIM/USIM card, perhaps switching on and shutting down again also can't normally be used.
Three camouflage functions are removed flow process
At first, mobile phone is under the camouflage function initiate mode, and no matter whether interface display is unusual.The user ignores the demonstration of mobile phone, directly imports correct concealment cipher, can remove the camouflage state.
In addition, launching just of function of camouflage pretended the mobile phone interface display, and incoming call is got final product according to the response process under the normal mode.
In above basic function/basic procedure, can also strengthen the camouflage function, for example: increase and open the camouflage function automatically, the on-keyboard operating time surpassed certain hour for example 1 minute or 3 minutes, opened the camouflage function automatically; The input concealment cipher is opened the camouflage function immediately, imports concealment cipher once more and then closes the camouflage function immediately; Under the camouflage function opening, the response that comes note is carried out self-defined or the like.
Through the present invention, can prevent any operation that illegal cellphone subscriber carries out mobile phone effectively, thus the personal information in the protection mobile phone, and property safety.
The above is merely the preferred embodiments of the present invention, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (7)

1. a mobile phone camouflaging method is characterized in that, may further comprise the steps:
Step 1 when mobile phone is in holding state, starts the mobile phone camouflaging function; And
Step 2 is not removed the user under the situation of said mobile phone camouflaging function, in response to said user to showing the anomaly preset on the screen that operates in said mobile phone of said mobile phone;
Wherein, showing that the anomaly preset comprises shows that the unusual animation that presets is with the analogue mobile phone catastrophe failure.
2. method according to claim 1 is characterized in that, said anomaly comprises: unusual character, mess code and the unusual picture that presets.
3. method according to claim 2 is characterized in that, said step 2 may further comprise the steps:
Do not remove said user under the situation of said mobile phone camouflaging function; Any operation of said mobile phone being carried out in response to said user; On the screen of said mobile phone, show said mess code or said unusual character; And after said user surpasses pre-determined number to the operation of said mobile phone, on the screen of said mobile phone, show the said unusual picture that presets.
4. method according to claim 3 is characterized in that, the said unusual picture that presets comprises: blank screen, white screen, funnel flashes and power-down rebooting.
5. method according to claim 1 is characterized in that, manually or automatically opens said mobile phone camouflaging function.
6. according to each described method in the claim 1 to 5, it is characterized in that, when having started said mobile phone camouflaging function, incoming call is carried out normal response process.
7. according to each described method in the claim 1 to 5, it is characterized in that, remove said mobile phone camouflaging function through the password that input is preset.
CN200810007377A 2008-03-12 2008-03-12 Mobile phone camouflaging method Active CN101534502B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810007377A CN101534502B (en) 2008-03-12 2008-03-12 Mobile phone camouflaging method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810007377A CN101534502B (en) 2008-03-12 2008-03-12 Mobile phone camouflaging method

Publications (2)

Publication Number Publication Date
CN101534502A CN101534502A (en) 2009-09-16
CN101534502B true CN101534502B (en) 2012-09-05

Family

ID=41104841

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810007377A Active CN101534502B (en) 2008-03-12 2008-03-12 Mobile phone camouflaging method

Country Status (1)

Country Link
CN (1) CN101534502B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632108B (en) * 2013-09-13 2017-01-25 广东明创软件科技有限公司 Method and mobile terminal for improving safety of contact person information
CN105208211B (en) * 2015-09-29 2019-02-12 努比亚技术有限公司 A kind of privacy protection device, method and mobile terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1708160A (en) * 2005-05-27 2005-12-14 上海贝豪通讯电子有限公司 Mobile communication terminal capable of carrying out encrypting to user information and method thereof
CN1735247A (en) * 2004-07-28 2006-02-15 展讯通信(上海)有限公司 Password protection method for mobile communication terminal
CN1955872A (en) * 2005-10-28 2007-05-02 腾讯科技(深圳)有限公司 Protection method of operation interface
CN1980428A (en) * 2005-11-30 2007-06-13 中兴通讯股份有限公司 Method for mobile terminal to automatically encipher and automatically protect subscriber identifying module

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1735247A (en) * 2004-07-28 2006-02-15 展讯通信(上海)有限公司 Password protection method for mobile communication terminal
CN1708160A (en) * 2005-05-27 2005-12-14 上海贝豪通讯电子有限公司 Mobile communication terminal capable of carrying out encrypting to user information and method thereof
CN1955872A (en) * 2005-10-28 2007-05-02 腾讯科技(深圳)有限公司 Protection method of operation interface
CN1980428A (en) * 2005-11-30 2007-06-13 中兴通讯股份有限公司 Method for mobile terminal to automatically encipher and automatically protect subscriber identifying module

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JP特开2006-067130A 2006.03.09

Also Published As

Publication number Publication date
CN101534502A (en) 2009-09-16

Similar Documents

Publication Publication Date Title
CN103391374B (en) Dual system terminal supporting seamless switching
CN1262137C (en) Method for guaranteeing mobile communication terminal safety
CN100473194C (en) Handset anti-theft method
EP3528160B1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
US8718602B2 (en) Method and system for remote control of smart card
CN104732125B (en) The display methods and terminal of encryption information
CN107168699A (en) application program repairing method and terminal device
CN106681813A (en) Method and device for system management
CN105430738B (en) A kind of method and device for initiating registration
CN101534502B (en) Mobile phone camouflaging method
CN102340750A (en) Method for retrieving password of mobile phone private space
CN101409944A (en) Method and apparatus for encrypting keyboard
CN105930730A (en) Terminal system security update method and apparatus in trusted execution environment
CN103685676B (en) The information processing method of blue tooth submachine, separated mobile terminal and blue tooth submachine
CN102413243A (en) Method and system for realizing mobile phone information safety protection mechanism
CN108134994A (en) The SIM card of Double-puzzle operation
US9439024B2 (en) Chip card, end unit with chip card and method for modifying a chip card
CN109446785B (en) A kind of memory management method of smart card and its personal data
KR20070103956A (en) One-time password generating device for authentication using time synchronous mode with detachably mounting type handphone and method thereof
CN101127995A (en) An information processing method for phone-card separated mobile terminal
CN102833728B (en) Based on the SIM card information guard method of handset starting information and IMEI information
US20060229062A1 (en) Protection method using a password verifying schedule for a mobile communication device
CN101697643B (en) Method and device for backing up information in intelligent card for mobile communication terminal
CN105528538B (en) The starting method and starter of terminal system
KR100950662B1 (en) A method of certifying smart card for Identification Module using Network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant