CN101616495A - Method and system for protecting individual privacy in mobile phone - Google Patents

Method and system for protecting individual privacy in mobile phone Download PDF

Info

Publication number
CN101616495A
CN101616495A CN 200810115368 CN200810115368A CN101616495A CN 101616495 A CN101616495 A CN 101616495A CN 200810115368 CN200810115368 CN 200810115368 CN 200810115368 A CN200810115368 A CN 200810115368A CN 101616495 A CN101616495 A CN 101616495A
Authority
CN
Grant status
Application
Patent type
Prior art keywords
phone
client
event
data
password
Prior art date
Application number
CN 200810115368
Other languages
Chinese (zh)
Inventor
党劲峰
史文勇
锋 李
宇 林
邹仕洪
Original Assignee
网秦无限(北京)科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Abstract

The invention relates to a method and a system for protecting individual privacy in a mobile phone. The method comprises the following steps that: after a mobile phone is started up, a client back end starts and operates; events are monitored; related operation are executed according to the types of events; and after the processing of the event is finished, the client back end operates; and events are monitored continuously. The types of the monitored events comprise a mobile phone change event, a short message command event, a file data processing event, an application program processing event, a profile setting event, a program deletion event and a mobile phone/mobile phone card formatting event. The system comprises a client module and a server, wherein the client module comprises an event monitoring module, an event processing module, a communication module and a mobile phone data update and back-up and recovery module; and the server comprises a communication module, a personal information management module and a back-up/recovery module. The method and the system of the invention can realize the maximum safety protection of mobile phone privacy.

Description

保护手机中个人隐私的方法及系统 Phone privacy protection method and system

技术领域 FIELD

本发明涉及移动通信和信息安全领域,特别地涉及保护手机中个人隐私的方法及系统。 The present invention relates to the field of mobile communication and information security, particularly to a method and system for protection of privacy of personal phone.

背景技术 Background technique

随着手机终端功能的不断增强,以及无线网络带宽不断增大,移动增值服务愈发丰富,人们在手机上存储的隐私数据越来越多。 With the enhanced functionality of mobile terminals and wireless network bandwidth is increasing, mobile value-added services become more abundant, more and more people in the privacy of data stored on the phone. 同时, 手机上的数据极易被他人偷窥、窃取,而且手机的丢失率也很高,手机数据、隐私外泄的几率很大。 At the same time, the data on the phone can easily be peeping others, theft, and loss rate of mobile phones is also high, a great chance to cell phone data, privacy leakage. 针对手机上用户隐私的保护,产生了许多新技术、新方法。 For the protection of user privacy on the phone, resulting in many new technologies, new methods.

现有手机隐私保护方法主要集中在以下几种:对文件/数据进行加密隐藏;对手机远程控制;对手机的应用程序加锁。 Existing mobile phone privacy protection methods focused on the following: file / data encryption to hide; phone remote control; phone application lock.

总体来说,这些现有技术对手机上的隐私数据保护方法都比较单一、操作繁琐,而隐私泄露的途径、方式很多,因此,单一的隐私保护,其效果很难让人满意。 Generally speaking, these prior art are relatively simple approach to data protection of privacy on the phone, complicated operation, loss of privacy and a lot of ways, means, therefore, a single privacy protection, the effect is difficult to satisfactory. 比如,现有的手机防盗类软件、隐私保护类软件(如智能卫士),都无法很好的保护个人隐私。 For example, existing mobile security software category, class privacy protection software (such as smart guards) are not well protected personal privacy.

随着手机的功能越来越强大,其中存储着大量的个人私密内容(短信、照片、视频、文件等等), 一旦不小心将手机中私密内容泄漏,将可能造成自身名誉、财富极大的损失。 As mobile phones become more powerful, which stores large amounts of personal privacy content (text, photos, videos, files, etc.), once accidentally leak the contents of private phone, may cause their fame, wealth great loss. 而且,手机丢失率是较高的, 此外,手机上的内容极易被他人偷窥。 Moreover, the mobile phone loss rate is high, in addition, the contents of the phone can easily be others peeping. 由此引起的"隐私恐慌"极可能成为未来重要关注的问题。 The resulting "privacy panic" is very likely to become important future issues of concern.

发明内容 SUMMARY

本发明正是为了解决手机隐私泄露的问题,并且优于目前单一、 薄弱的手机隐私保护方法,提出了一种全面保护手机上个人隐私的方法。 The present invention was made to solve the problem of mobile phone privacy disclosure, and better than the current single, weak cell phone privacy protection method, proposed a comprehensive protection of personal privacy on the phone method. 如果该系统写入手机终端的ROM,可以实现对手机隐私的最大限度的安全保护。 If the system writes mobile terminals ROM, you can achieve maximum security cell phone privacy. 本发明提供了一种保护手机中个人隐私的方法,包括以下步骤: 手机开机后,客户端后台启动、运行;监测各事件;根据事件类型执行相关操作;事件处理结束后,客户端后台运行,继续监测事件。 The present invention provides a method of protecting the privacy of personal mobile phone, comprising the steps of: after the phone is switched on, the client back up and running; monitor the event; perform actions based on the event type; the end of the event processing, client running in the background, continue to monitor events.

本发明提供了一种根据手机卡识别码进行手机防盗方法,包括以下步骤:读取手机卡识别码;将读取的手机卡识别码与合法手机卡数据库的信息进行比对;如果没有匹配值,则锁机;如果有匹配值,则保持正常待机状态。 The present invention provides a method according to the phone card PIN mobile security method, comprising the steps of: reading the identification code phone card; if there is no matching value; phone card information identification code and the read card database of legitimate handset to compare , the lock machine; if there is a match value, a normal standby state is maintained. 合法手机卡数据库中可以存储一个或多个合法手机卡的识别码,用户能够将新手机卡设为合法手机卡,也能够随时删除某个合法手机卡。 Legitimate phone card identification code can be stored in the database one or more legitimate phone card, the user can set a new phone card legitimate phone card, can delete a legitimate phone card at any time. 锁机后可以将当前手机号码发送给服务器或安全联系人号码。 After locking the machine can send the current phone number to the server or secure a contact number. 可以通过短信、电话或无线网络的数据通道发送当前手机号码。 Yes, the data channel telephone or wireless networks to send the current mobile phone number via SMS. 在锁机的状态下,可以提示用户输入密码,如果用户无法输入正确密码,则保持锁机状态,如果用户输入密码正确,则解锁手机。 In the lock state machine, can prompt the user for a password if the user can not enter the correct password, the machine kept locked state, if the user enters the correct password, you unlock the phone. 当超过一定时长没有动作或多次输错密码,则可以自动加密隐藏手机数据。 When no action beyond a certain length of time or the wrong password multiple times, you can hide your phone automatically encrypt data. 可以由用户设定:时长、输错次数、隐藏数据类型、隐藏数据文件夹。 May be set by the user: the length, the number of transmission error, the type of hidden data, hidden data folder. 如果用户输入密码正确,则可以提示用户选择是否将本手机卡加入"合法手机卡"数据库列表中。 If the user enters the correct password, you can prompt the user to choose whether to use this phone card added to the database list of "legitimate phone Card".

本发明提供了一种远程控制的手机隐私保护的方法,包括以下步骤:用户通过任何手机向安装了客户端的手机发送短信指令,短信指令包含身份认证信息;客户端收到指令执行请求之后,查询指令格式是否正确,并进行身份认证;如果格式正确,并且身份认证成功,则根据短信内容执行短信指令;如果格式错误或身份认证失败或处理超时,则给予失败回执提醒用户。 The present invention provides a method for privacy handset remote control, comprising the steps of: a user instruction from any mobile phone to send text messages to mobile client installed, the instruction message comprising authentication information; client after receipt of a command execution request, the query instruction format is correct, and authentication; if the format is correct and the authentication is successful, the implementation of SMS commands based on message content; if malformed or authentication process fails or times out, fails to give receipts to remind the user. 用户通过发送短信指令能够进行以下的任何操作:锁机、发出报警声、备份通讯录、取回通讯录、删除所 The user can perform any of the following operations by sending SMS commands: lock machine, an alarm sound, backup contacts, address book retrieval, deletes

有手机数据、来电提醒、短信转移。 Mobile phone data, call alerts, message transfer. 短信指令执行成功后,可以通过短信或电话形式告知用户本次操作成功。 After successful execution instruction message, inform a user that the operation can be successfully via SMS or telephone.

本发明提供了一种远程控制的手机隐私保护的方法,包括以下步骤:用户向服务器发送短信指令请求,短信指令包含身份认证信息; 服务器收到请求,进行身份认证;如果认证失败,则返回错误提醒; 如果认证通过,则按照请求指令类型,向安装了客户端的手机发送指令;客户端收到指令执行请求之后,査询指令格式是否正确,并进行身份认证;如果格式正确,并且身份认证成功,则根据短信内容执行短信指令;如果格式错误或身份认证失败或处理超时,则给予失败回执提醒用户。 The present invention provides a method for privacy handset remote control, comprising the steps of: a user instruction request message to the server, the instruction message comprising authentication information; server receives the request, authenticates; If the authentication fails, an error is returned reminder; if the authentication is passed, in accordance with the request command type, the phone sends commands to the client installed; after the client receives the instruction execution request, inquiry instruction in the correct format, and authentication; if properly formatted, and authentication success , the content of the message according to SMS commands executed; if malformed or authentication process fails or times out, fails to give receipts to remind the user. 用户通过发送短信指令能够进行以下的任何操作:锁机、 发出报警声、备份通讯录、取回通讯录、删除所有手机数据、来电提醒、短信转移。 By sending an SMS user can command any of the following operations: lock machine, an alarm sound, backup contacts, address book retrieving, deleting all phone data, call reminder, short message transfer. 短信指令执行成功后,可以通过短信或电话形式告知用户本次操作成功。 After successful execution instruction message, inform a user that the operation can be successfully via SMS or telephone.

本发明提供了一种远程控制的手机隐私保护的方法,包括以下步骤:用户直接要求服务提供商帮助其发送短信指令,服务提供商在确认用户身份之后,直接触发服务器向安装了客户端的手机发送相应短信指令,短信指令包含身份认证信息;客户端收到指令执行请求之后, The present invention provides a method of privacy protection mobile phone remote control, comprising the steps of: a user directly require service providers to help them send SMS, the service provider after confirming the identity of the user, the server directly trigger the phone to send a client to install corresponding instruction message, SMS commands comprises identity authentication information; client after receipt of a command execution request,

查询指令格式是否正确,并进行身份认证;如果格式正确,并且身份认证成功,则根据短信内容执行短信指令;如果格式错误或身份认证失败或处理超时,则给予失败回执提醒用户。 Query instruction format is correct, and authentication; if the format is correct and the authentication is successful, the implementation of SMS commands based on message content; if malformed or authentication process fails or times out, fails to give receipts to remind the user. 用户通过发送短信指令能够进行以下的任何操作:锁机、发出报警声、备份通讯录、取回通 The user can perform any of the following operations by sending SMS commands: lock machine, an alarm sound, backup contacts, through retrieval

讯录、删除所有手机数据、来电提醒、短信转移。 Address book, delete all phone data, call alerts, message transfer. 短信指令执行成功后,可以通过短信或电话形式告知用户本次操作成功。 After successful execution instruction message, inform a user that the operation can be successfully via SMS or telephone.

本发明提供了一种在无网络模式(又名:离线模式或飞行模式) 下保护手机个人隐私的方法,包括以下步骤:当情景模式设置事件发生时,查询情景模式是否为无网络模式;如果情景模式为无网络模式, 则锁定手机;如果情景模式不是无网络模式,则进入所设置的情景模式。 The present invention provides a method in a non-network mode: the protection of personal privacy under the phone (also known as off-line mode or flight mode), comprising the steps of: when an event occurs profile settings, check whether the profile is no network mode; if profile is no network mode, lock the phone; if the profile is not without network mode, then enter the profile set. 在锁定手机的状态下,可以提示用户输入密码;验证输入的密码是否正确;如果用户输入密码正确,则解锁手机;如果输入密码错误, 保持锁定状态。 In the locked state of the phone you can prompt the user to enter a password; password authentication input is correct; if the user enters the correct password, you unlock the phone; if you enter the wrong password, remains locked. 当超过一定时长或多次输入密码错误,则可以自动加密隐藏手机数据。 When more than a certain length of time or the wrong password is entered multiple times, you can hide your phone automatically encrypt data. 可以由用户设定:时长、输错次数、隐藏数据类型、 隐藏数据文件夹。 May be set by the user: the length, the number of transmission error, the type of hidden data, hidden data folder. 情景模式是指手机以某种方式提醒用户有短信、彩信、电话、数据等到达或发出。 Profiles refers to mobile phones in some way to alert users to SMS, MMS, phone, data, etc. to reach or issue. 情景模式可以包括标准、无声、振动、 离线等模式。 It may include standard profiles, silent, vibration, and other off-line mode.

本发明提供了一键式快捷销毁手机数据的方法,包括以下步骤: 输入正确密码进入客户端;点击客户端中"一键销毁"的快捷按键; 客户端执行销毁操作,立即删除所有手机数据。 The present invention provides a method of quick destruction of phone data, one-click, including the following steps: enter the correct password to enter the client; click on the client "a key Destruction" shortcut key; client performs destroy operation deletes all phone data immediately. 在执行销毁操作前可以提示用户是否要销毁所有数据。 Before destroy operation can prompt the user whether or not to destroy all the data.

本发明提供了一种快捷销毁手机数据的方法,包括以下步骤:使用其他手机或在web、 wap页面发送短信指令到安装了客户端的手机, 短信指令包含身份验证信息;客户端进行身份验证;如果身份验证通过,客户端解析并执行相应指令,立即删除所有手机数据;如果没有通过身份验证,则回应失败消息。 The present invention provides a method of quick destruction phone data, comprising the steps of: using other phones or web, wap page sending SMS commands to the client installed on the phone, SMS commands containing the authentication information; client authentication; if authenticated, client parses and executes the corresponding command to delete all phone data immediately; if not authenticated, the failure to respond to the message.

本发明提供了一种对应用程序进行加密保护的方法,包括以下步骤:输入密码进入客户端;选中需要监控的应用程序,进行监控上锁; 当被选中的应用程序被点击启动时,提示用户输入密码;判断输入密码是否正确;如果输入密码错误,则保持该应用程序的锁定状态;如果取消输入密码,则返回原手机操作界面;如果输入密码正确,则解锁,可以对应用程序进行相应操作。 The present invention provides a method of encryption application, comprising the steps of: inputting the password into the client; select the need to monitor application monitor lock; when the selected application is started click, the user is prompted enter the password; determine the password is correct; if you enter the wrong password, leave the application locked state; if cancel entering a password, the original mobile phone user interface is returned; if the password is correct, unlock, can make the appropriate operation of the application . 对已加密的应用程序进行解密包括以下步骤:输入密码进入客户端;选中处于监控的应用程序,解除实时监控。 Comprising the steps of decrypting the encrypted application: Enter the password to enter the client; deselected and monitoring applications, the lifting of real-time monitoring. 应用程序可以包括:信息、电话簿、多媒体、日历、照相/ 摄像、网络、时钟应用程序。 Applications may include: information, phone book, multimedia, calendar, camera / video, web, a clock application.

本发明提供了一种手机数据的点对点无缝迁移方法,包括以下步骤:通过其他手机向安装了客户端手机发送点对点固定格式的短信指令,短信指令中包含身份认证信息;安装了客户端的手机根据指令格式及内容进行鉴权;如果通过鉴权,则按照要求将特定数据以特定格式传送给发送指令的手机;如果没有通过鉴权,则回应鉴权失败消息。 The present invention provides a method for seamless migration point data of the mobile phone, comprising the steps of: a mobile phone client SMS command sent by a point fixed format to another phone installed, message authentication command includes information; client installed mobile phone according to instruction format and content authentication; if, in accordance with the requirements of the specific command data to transmit through the phone in a particular format authentication; if not pass the authentication, the authentication failure response message.

本发明提供了一种备份手机数据的方法,包括以下步骤:输入密码进入客户端;客户端发起备份请求;服务器收到备份请求,根据识别信息进行鉴权;如果通过鉴权,则响应此请求,安装了客户端的手机开始备份数据;如果没有通过鉴权,则告知鉴权失败。 The present invention provides a method of up phone data, comprising the steps of: inputting the password into the client; a backup request initiated by the client; backup server receives the request, according to identification information for authentication; if the authentication by, in response to this request , the installation of the client's phone began to back up your data; if not pass the authentication, the authentication fails informed. 可以通过无线数据网络GPRS、 EGDE、 WIFI、 WIMAX方式备份数据。 Via wireless data network GPRS EGDE, WIFI, WIMAX backup mode, data. 可以由用户设置需要备份的数据。 Data to back up may be set by the user. 备份可以采用手动备份方式,也可以定期自动备份,可以由用户设置备份时间间隔。 Backup can be manually backup, backups may be automatically and periodically, a user may be provided by a backup time interval. 用户可以通过个人电脑、PDA 访问服务器,直接下载备份的数据。 Users can PC, PDA to access the server directly download data backup. 用户可以通过登录互联网、wap 站点,对个人信息管理服务器中备份的手机数据进行管理。 Users can, for mobile phone data backup personal information management server to manage the Internet by logging, wap sites.

本发明提供了一种通过远程控制客户端备份手机数据的方法,包括以下步骤:使用其他手机发送短信指令到安装了客户端的手机上, 短信指令注明要备份数据的类型,并包含身份验证信息;客户端收到短信指令,进行身份验证;如果没有通过身份验证,则返回身份验证失败信息;身份验证通过之后,客户端按照指令类型发起备份请求; 服务器收到备份请求,根据识别信息进行鉴权;如果通过鉴权,则响应此请求,安装了客户端的手机开始备份数据;如果没有通过鉴权, 则告知鉴权失败。 The present invention provides a method of remotely controlling a mobile phone client backup data, comprising the steps of: using another phone to send command to the client installed on the phone, SMS commands specify the type of data to be backed up, and the authentication information comprising ; client receives command messages, authentication; if not authenticated, it returns the identity authentication failure information; after authenticated, the client sends a backup request type of instruction; backup server receives the request, according to identification information Kam right; if through authentication, the response to this request, the installation of the client's phone began to back up your data; if not pass the authentication, the authentication fails informed. 可以通过无线数据网络GPRS、 EGDE、 WIFI、 WIMAX 方式备份数据。 Via wireless data network GPRS EGDE, WIFI, WIMAX backup mode, data. 可以由用户设置需要备份的数据。 Data to back up may be set by the user. 备份可以采用手动备份方式,也可以定期自动备份,可以由用户设置备份时间间隔。 Backup can be manually backup, backups may be automatically and periodically, a user may be provided by a backup time interval. 用户可以通过个人电脑、PDA访问服务器,直接下载备份的数据。 Users can PC, PDA to access the server directly download data backup. 用户可以通过登录互联网、wap站点,对个人信息管理服务器中备份的手机数据进行管理。 Users can, for mobile phone data backup personal information management server to manage the Internet by logging, wap sites.

本发明提供了一种通过服务器恢复手机数据的方法,包括以下步骤:安装了客户端的手机向服务器发起恢复数据请求;服务器进行身份鉴权;如果通过鉴权,则按照请求恢复的数据类型,将相应的数据传送给请求的手机;如果没有通过鉴权,或服务器没有数据,回应失败消息。 The present invention provides a method of recovering data through the phone server, comprising the steps of: mounting a mobile client initiates a request to restore the data server; identity authentication; if authenticated by, at the request of the recovered data type, the corresponding data to the requesting mobile phone; if there is no authentication data, or the server, returns failure message. 安装了客户端的手机可以通过无线数据网络或直接通过有线连接登陆服务器发起请求。 Phone installed client login server may be directly connected initiation request by a wired or wireless data network. 可以由用户设置要恢复的数据。 You can set the data to be restored by the user.

本发明提供了一种远程控制客户端恢复手机数据的方法,包括以下步骤:使用其他手机发送短信指令到安装了客户端的手机,短信指令注明要恢复数据的类型,并包含身份验证信息;客户端收到短信指令,进行身份验证;如果没有通过身份验证,则返回身份验证失败信息;客户端在身份认证通过之后向服务器发起恢复数据请求;服务器进行身份鉴权;如果通过鉴权,则按照请求恢复的数据类型,将相应的数据传送给请求的手机;如果没有通过鉴权,或服务器没有数据, 回应失败消息。 The present invention provides a method of controlling the remote client restore the phone data, comprising the steps of: using another phone to send command to client installed phone, SMS commands specify the type of data to be restored, and contains the authentication information; Customer client receives an SMS command to authenticate; if not authenticated, the identity verification failure message is returned; client initiates a request to the server to recover data after authentication by; server for identity authentication; if through authentication, in accordance with the type of request data recovery, transmits corresponding data to the requesting mobile phone; if there is no authentication data, or the server, returns failure message. 安装了客户端的手机可以通过无线数据网络或直接通过有线连接登陆服务器发起请求。 Phone installed client login server may be directly connected initiation request by a wired or wireless data network. 可以由用户设置要恢复的数据。 You can set the data to be restored by the user.

本发明提供了一种通过Web恢复手机数据的方法,包括以下步骤: 在web页面输入客户端密码进行身份确认,选择需要恢复的手机数据, 发起请求;服务器响应请求,下发短信指令至安装了客户端的手机, 客户端解析并执行相应指令。 The present invention provides a process for the recovery by the mobile phone Web data, comprising the steps of: inputting a web page in the client identification password, select the mobile phone you need to restore data, initiation request; the server responds to the request messages issued instructions to install the client's mobile phone, the client parses and executes the corresponding instructions. 安装了客户端的手机可以通过无线数据网络或直接通过有线连接登陆服务器发起请求。 Phone installed client login server may be directly connected initiation request by a wired or wireless data network. 可以由用户设置要恢复的数据。 You can set the data to be restored by the user.

本发明提供了一种通过Wap恢复手机数据的方法,包括以下步骤:在wap页面输入客户端密码进行身份确认,选择需要恢复的手机数据, 发起请求;服务器响应请求,下发短信指令至安装了客户端的手机, 客户端解析并执行相应指令。 The present invention provides a method of recovering data through the Wap phone, comprising the steps of: inputting wap page in the client identification password, select the mobile phone you need to restore data, initiation request; the server responds to the request messages issued instructions to install the client's mobile phone, the client parses and executes the corresponding instructions. 安装了客户端的手机可以通过无线数据网络或直接通过有线连接登陆服务器发起请求。 Phone installed client login server may be directly connected initiation request by a wired or wireless data network. 可以由用户设置要恢复的数据。 You can set the data to be restored by the user.

本发明提供了一种客户端程序自动隐藏方法,包括以下步骤:首 The present invention provides an automatic hidden client program, comprising the steps of: first

次启动客户端,完成初始化配置之后,客户端自动隐藏,在系统后台 After the time you start the client to complete the initial configuration, the client automatically hidden in the background

_运行,用户在手机自带文件系统中无法查看;输入缺省的特殊键盘组合,调出客户端入口界面;输入密码进入客户端。 _ Running, the user can not view the phone comes with a file system; enter the default special keyboard combination to bring up the client entry interface; password to enter the client. 可以由用户对调出 It can be swapped out by the user

客户端界面的特殊键盘组合进行自定义,也可以将调出客户端界面的特殊键盘组合传至服务器存储。 Special keyboard combination client interface customized, may be transmitted to bring up the special keyboard combinations server stores client interface.

本发明提供了一种防止客户端程序非法删除的方法,包括以下步 The present invention provides a method of preventing illegal delete client program, comprising the steps

骤:触发删除客户端程序操作时,提示输入密码;判断输入的密码是否正确;如果输入正确,执行删除客户端程序操作;如果输入错误, 取消执行删除操作。 Step: trigger to remove the client program operation, prompted for a password; password input judgment is correct; if the input is correct, delete the client program operation; if a mistake, cancel the delete operation.

本发明提供了一种实现格机后生存的方法,包括以下步骤:在安 The present invention provides a method for implementing the cell survival machine, comprising the steps of: Ann

装或初始化客户端的过程中,向存储卡中写入客户端的镜像文件,镜 During loading or the initialization of the client, the client writes the image file to the memory card mirror

像文件记录手机识别码信息,作为唯一标识;如果仅格式化手机,存储卡中的镜像文件发现手机中无客户端,则读取手机识别码并与之前的记录值进行比对;如果一致,则自动载入程序;如果不一致,不做任何操作;如果先格式化存储卡,将此存储卡插入手机中后,此时客户端查询存储卡是否存在镜像文件,如果发现没有,那么立即将镜像文件写入存储卡中。 Image file recorded phone identification number, a unique identification; image file format only if the phone, the memory card found no client phones, mobile phone identification code is read and compared to the value before the recording; if they are consistent, the automatic loader; if not, do not do anything; if format the memory card, this card into the phone, in which case the client queries whether there is a memory card image file, if found not, then immediately mirror file is written to the memory card.

本发明提供了一种客户端初始化方法,包括以下步骤:在客户端中配置初始化信息;用户信息注册;记录注册时所获取的手机识别码或手机卡识别码信息,并将其设为合法手机卡。 The present invention provides a method for initializing a client, comprising the steps of: initializing configuration information in the client; user information registration; phone or phone card PIN code identification information of the acquired record is registered, legitimate handset and set card. 在客户端中配置初始化信息包括:密码设置,用于身份认证;安全联系人号码设置,每次插入非法手机卡时,都将向安全联系人号码发送此时的手机号码;设置安全保护操作。 Configuring the client initialization information includes: setting a password for authentication; secure contact number is set, every time illegal card is inserted into the phone, to the security number to send a contact phone number at this time; set the security operation. 可以短信或电话形式,隐形或不隐形向安全联系人号码发送此时的手机号码。 You can SMS or telephone, invisible or not invisible sending mobile phone number at this time to secure a contact number. 安全联系人号码可以为手机号码、小灵通号码、固定电话号码。 Safety contact number can be a cell phone number, PHS number, landline number. 在插入非法手机卡时,可以进行锁机或发报警声音的安全保护操作。 When inserting illegal phone card, you can lock the machine or send security operation of the alarm sound. 用户信息注册时可以首先将手机号传送给服务器;客户端读取手机识别码或手机卡识别码,并传送给服务器;服务器根据特定算法生成唯一标识符,完成用户信息注册。 First, the phone number can be transferred to the user information registration server; client reads the identification code or a mobile phone SIM card identification code, and transmitted to the server; generating a unique identifier in accordance with a specific algorithm, the user information registration is completed. 客户端可以通过无线数据网络或话音网络向服务器传送信息。 The client may transmit information to a server through a wireless data network or voice network.

本发明提供了一种保护手机中个人隐私的系统,包括客户端模块和服务器,其中客户端模块包括:事件监控模块,事件处理模块,通信模块和手机数据更新、备份、恢复模块;服务器包括:通信模块、 个人信息管理模块、备份/恢复模块。 The present invention provides a method of protecting privacy in a mobile phone system, comprising a client module and a server, wherein the client module comprising: a module to monitor an event, the event processing module, a communication module and mobile data update, backup, recovery module; server comprising: communication module, a personal information management module, backup / restore module.

附图说明 BRIEF DESCRIPTION

图1给出了本发明的保护手机中个人隐私的方法的主流程图; 图2给出了本发明的客户端程序首次启动,初始化配置相关信息的流程图; Figure 1 shows the main flowchart of the protection method for a mobile phone according to the present invention, the privacy; FIG. 2 shows a flowchart of a client program of the present invention is first started, the initial configuration information;

图3给出了本发明的对更换手机卡事件的处理流程图; Figure 3 shows a process flow diagram for the event replacement phone card of the present invention;

图4给出了本发明的对短信远程控制指令事件的处理流程图; Figure 4 shows a process flow diagram for SMS remote control instruction event to the present invention;

图5给出了本发明的对情景模式设置事件的处理流程图; Figure 5 shows a process flow diagram for an event on the profile of the present invention;

图6给出了本发明的对文件数据加密事件的处理流程图; Figure 6 shows a process flow diagram for the event file data encrypted according to the invention;

图7给出了本发明的对文件数据解密事件的处理流程图; Figure 7 shows a process flow diagram for the event file data decrypted according to the invention;

图8给出了本发明的对应用程序加密事件的处理流程图; Figure 8 shows a process flow diagram for the application of the present invention, the encrypted event;

图9给出了本发明的对应用程序解密事件的处理流程图; Figure 9 shows a process flow diagram for the application of the decrypted event to the invention;

图IO给出了本发明的对手机数据的备份的处理流程图; IO shows a process flow diagram of FIG backup present invention on the mobile phone transactions;

图11给出了本发明的对手机数据的恢复的处理流程图; Figure 11 shows a process flow diagram of the mobile phone data recovery according to the invention;

图12给出了本发明的对手机数据的无缝迁移的处理流程图; Figure 12 shows a process flow diagram of the mobile phone seamless migration of data according to the present invention;

图13给出了本发明的对手机数据的销毁的处理流程图; Figure 13 shows a process flow diagram of the destruction of the data on the mobile phone of the present invention;

图14给出了本发明的程序自动隐藏方法的处理流程图; Process flow diagram of Figure 14 shows the method of the present invention automatically hide;

图15给出了本发明的防止非法删除的处理流程图; Figure 15 shows a process flow diagram of the present invention to prevent the illegally removed;

图16给出了本发明的格式化生存的处理流程图; Figure 16 shows a process flow diagram of the present invention, the survival of formatting;

图17给出了本发明的保护手机中个人隐私的系统的物理构成图; 图18给出了本发明的系统模块图。 Figure 17 shows a physical configuration diagram of a mobile phone according to the present invention in the protection of the privacy of the system; FIG. 18 shows a block diagram of the system according to the present invention.

具体实施方式本发明主要是对手机中所有数据进行全面的保护,包括手机丢失前、丢失后的两方面保护措施,以达到全面保护个人隐私的目的。 Embodiments of the present invention is mainly for mobile phones of all the data fully protected, including the former phone is lost, the loss of two protective measures in order to achieve full protection of personal privacy. 下文中,提到的手机消息,包含短信、彩信等。 Hereinafter, reference to a mobile phone message comprises SMS, MMS and the like.

本发明对应的系统包括手机客户端模块和服务器端。 Corresponding to the phone system of the invention comprises a server and a client module. 客户端模块负责对所有手机上事件的处理,包括手机卡监控、文件和应用程序的保护、数据的备份/恢复等。 The client module is responsible for handling all phone events, including the protection monitoring phone cards, files and applications, and data backup / recovery. 服务器端负责存储用户所备份的手机数据, 并对这些数据进行所有的增加、删除、编辑、查找等功能。 Cell phone user data server is responsible for storing the backup, and all of these data add, delete, edit, search and other functions.

本发明提供了一种全面保护手机中个人隐私的方法,下面结合附图,举例说明本发明的实施方法。 The present invention provides a handset full protection of personal privacy methods, the following accompanying drawings, illustrate embodiments of the method of the present invention.

本发明的保护手机中个人隐私的方法,包括以下步骤:手机开机后,客户端后台启动、运行;监测各事件;根据事件类型执行相关操作;事件处理结束后,客户端后台运行,继续监测事件。 Protect your phone present invention, a method of personal privacy includes the following steps: After the phone is switched on, the client back up and running; monitor the event; perform actions based on the event type; the end of the event processing, client running in the background, continue to monitor events . 其中所监控的事件类型包括:更换手机卡事件、短信指令事件、文件数据处理事件、应用程序处理事件、情景模式设置事件、删除程序事件、格式化手机/手机存储卡事件、手机数据迁移事件、客户端程序自动隐藏事件, 等等。 Which monitored event types include: replace the phone card event, SMS command event, event file data processing, application processing event, event profile settings, delete the program events, format the phone / phone memory card event, mobile phone data migration events, The client program automatically hide the event, and so on.

图1给出了本发明的保护手机中个人隐私的方法的主流程图。 Figure 1 shows the main flowchart of the protection method for a mobile phone of the present invention is privacy. 如图1所示,手机开机后,客户端后台启动、运行;监测各事件,所监控的事件类型包括:更换手机卡事件、短信指令事件、文件数据处理事件、应用程序处理事件、情景模式设置事件、删除程序事件、格式化手机/手机卡事件等,文件数据处理事件包括文件数据加密处理事件、 文件数据解密处理事件、文件数据的备份、恢复、销毁等事件;根据事件类型执行相关操作;执行完毕,事件处理结束后,客户端后台运行,继续监测事件。 Shown in Figure 1, after the phone is switched on, the client back up and running; monitor the event, the monitored event types include: replace the phone card event, SMS command event, event file data processing, application processing event, profile settings event, delete the program events, format the phone / phone card events, file data processing events include file encryption processing event data, file decryption processing event data, the backup file data recovery, destruction and other events; perform actions based on the type of event; is finished, the end of the event processing, client running in the background, continue to monitor events.

当首次启动客户端程序时,记录此时的手机卡识别码信息,将其设为合法手机卡,用户进行初始化信息设置,设置项可包括密码、安全联系人号码等信息。 When you first start the client program, this time recorded phone card identification number, set it legitimate phone card user to initialize information set, setting items may include password information, contact numbers and other security. 客户端初始化过程处理结束之后,客户端程序在后台运行并开始实时监控各种事件。 After the client initialization process, the client program runs in the background and start real-time monitoring of events.

图2给出了本发明的客户端程序首次启动,初始化配置相关信息的流程图。 Figure 2 shows the present invention, the client program is first started, the flowchart initial configuration information. 作为示例,客户端初始化过程包括以下步骤: As an example, the client initialization process includes the steps of:

步骤S20h在客户端程序中配置初始化信息,包括:A) 密码设置:用于所有的身份认证,是唯一的"钥匙"。 Step S20h configuration initialization information in the client program, including: A) password: for all authentication, is the only "key."

B) 安全联系人号码设置:每次插入非法手机卡时,都将向安全联系人号码以短信或电话形式发送此时的手机号,可隐形或不隐形发送。 B) Safety contact number settings: Every time illegal card is inserted into the phone, to the security of mobile phone contact number at this time send a text message or telephone number, can not be hidden or invisible sent. 安全联系人号码可设置为手机号码、小灵通号码、固定电话号码等。 Safety contact number can be set as phone numbers, PHS number, telephone number and so on.

C) 设置安全保护操作,插入非法手机卡时进行如锁机、发报警声音等。 For C) when the security set operation, the phone card is inserted into lock illegal machine, an alarm sound and the like hair. 这两种保护操作可以任意组合,程序至少默认一种保护,如默认锁机保护。 Both protection operation can be any combination of at least one protective default program, such as the default lock machine protection.

步骤S202:用户信息注册 Step S202: user registration information

A) 首先,通过无线数据网络(例如,包括GPRS、 EDGE、 WIMAX、 WIFI、 3G等方式)或话音网络,将手机号传送给服务器。 A) First, a wireless data network (e.g., including GPRS, EDGE, WIMAX, WIFI, 3G, etc.) or voice network, the phone number to the server.

B) 然后,客户端程序读取手机识别码(如IMEI)、手机卡识别码(如IMSI)信息,并通过无线数据网络传送给服务器。 B) Then, the client program reads the phone the identification code (e.g., the IMEI), Mobile card identifying code (e.g. IMSI) information, and transmitted to the server through a wireless data network.

C) 服务器根据特定算法生成唯一标识符,完成用户信息注册。 C) generating a unique identifier server according to a particular algorithm, the user information registration is completed. 步骤S203:手机卡监控模块记录注册时所获取的手机卡识别码(如 Step S203: Register the recording card phone monitoring module acquired phone card identifying code (e.g.

IMSI)信息,并将其设为合法手机卡。 IMSI) information, and set its legitimate phone card.

步骤S204:程序初始化完成。 Step S204: program initialization is complete. 其中,步骤S201、 S202的次序可以颠倒。 Wherein the step S201, the order of S202 may be reversed.

在初始化完成之后,客户端始终监控各种事件,并执行相应操作。 After initialization is complete, the client always monitor various events, and take appropriate action. 以下对各事件的监控、处理进行描述。 The following monitoring of each event, the process is described. 接下来结合附图详细说明各个步骤。 The following detailed description of the various steps in conjunction with the accompanying drawings.

图3给出了本发明的对更换手机卡事件的处理流程图。 Figure 3 shows a process flow diagram for the event replacement phone card of the present invention. 作为示例, 更换手机卡事件包括以下步骤: As an example, replace the phone card events include the following steps:

步骤S301:插入新的手机卡后开机。 Step S301: After inserting a new phone card to boot.

步骤S302:读取此手机卡识别码,并将其与合法手机卡数据库的信息进行比对,合法手机卡数据库中可存储一个或多个合法手机卡的识别码。 Step S302: reading the identification code for this mobile phone card, and to compare the information with the legitimate handset database card, phone card legal database may store a plurality of identification codes legitimate handset or card.

步骤S303:查询是否存在匹配的手机卡识别码信息。 Step S303: Query phone card identification number if there is a match. 步骤S303a:如果发现没有匹配值,则锁机。 Step S303a: If a matching value is not found, then the lock machine. 并将当前手机号码以 And current mobile phone number to

短信或电话形式或通过无线网络的数据通道发送给服务器以及安全联 SMS or telephone or sent to the server through the data channel and the associated secure wireless network

系人号码。 Person number.

步骤S303b:如果发现有匹配值,则保持正常待机状态。 Step S303b: If any match is found, a normal standby state is maintained. 转入步骤S305。 Go to Step S305.

在锁机的状态下,需要输入密码才能解锁手机。 In the lock state machine, you need to enter a password to unlock the phone. 步骤S304:验证输入的密码是否正确。 Step S304: Verify the password entered is correct.

步骤S304a:如果用户无法输入正确密码,则保持锁机状态。 Step S304a: If you can not enter the correct password, leave the lock-up state. 当超过一定时长没有动作或多次输错密码(用户可以设定任意的时间和次数 When there is no more than a certain length of time or more times the operation to enter the password (the user can set an arbitrary time and frequency

值),手机数据可以自动加密隐藏。 Value), the phone can be automatically encrypted data hidden. 用户可以在客户端程序中设定:时 Users can set the client program: when

长、隐藏数据类型、隐藏数据文件夹等。 Long, hidden data type, hidden data folders. 用户也可以设定不自动隐藏数据文件。 Users can also set does not automatically hidden data file. 若在数据文件被隐藏后,用户输入正确密码,那么转入步 If after the data file is hidden, the user enters the correct password, then transferred to step

骤S304b。 Step S304b.

步骤S304b:如果用户输入密码正确,则解锁手机,并恢复所有隐藏的数据文件。 Step S304b: If the user enters the correct password, you unlock the phone, and restore all hidden data file. 手机解锁之后,用户可以选择是否将本手机卡加入"合 After unlocking the phone, the user can choose whether to use this phone card adding "together

法手机卡"数据库列表中,如果是,下次插入此手机卡将不再锁机; Law database lists the phone card ", and if so, the next time the card is inserted into this phone will no longer lock machine;

如果否,下次插入此手机卡仍会锁机。 If not, the next time the card is inserted into this phone will lock machine. 用户可将新手机卡设为合法手机卡(可设置多个),也可以随时删除某个合法手机卡。 The user can set a new phone card legitimate phone card (can set up multiple), you can also delete a legitimate phone card at any time.

步骤S305:更换手机卡事件处理结束,客户端程序在后台实时监 Step S305: replace the phone card ending event processing, real-time monitoring client program in the background

控。 control. - -

本发明中,针对短信指令事件执行以下步骤:客户端收到短信指令之后,查询短信指令格式是否正确,并进行身份认证;如果格式正确,并且身份认证成功,则根据该短信指令内容执行该短信指令;如果格式错误或身份认证失败或处理超时,则给予失败回执提醒用户。 The present invention, perform the following steps for SMS instruction event: After the client receives the SMS command, query SMS commands in the correct format, and authentication; if the format is correct and the authentication is successful, the implementation of the SMS message based on the instruction content instruction; if malformed or authentication process fails or times out, fails to give receipts to remind the user. 其中可以通过下面的方式发送所述短信指令: Wherein the SMS commands may be transmitted in the following way:

由用户通过任何手机向安装了客户端的手机发送,短信指令包含身份认证信息;或者 By the user through any phone to send the phone to install the client, SMS commands include authentication information; or

由用户首先向服务器发送短信指令,短信指令包含身份认证信息, 服务器收到短信指令,进行身份认证,如果认证失败,则返回错误提醒,如果认证通过,则按照请求指令类型,向安装了客户端的手机发送短信指令;或者 First sent by the user to the server SMS instructions SMS instructions include authentication information, the server receives the SMS command, identity authentication, if authentication fails, an error reminder is returned if authentication is in accordance with the request command type, to install the client mobile phones to send SMS commands; or

用户直接要求服务提供商帮助其发送短信指令,服务提供商在确认用户身份之后,直接触发服务器向安装了客户端的手机发送相应的短信指令,短信指令包含身份认证信息。 Direct service providers are required to help users send SMS commands, service provider after confirming the identity of the user, directly trigger the server to send the appropriate message to the client's instructions to install the phone, SMS command contains authentication information.

图4给出了本发明的对短信远程控制指令事件的处理流程图。 Figure 4 shows a process flow diagram for SMS remote control instruction event to the present invention. 作为示例,短信远程控制指令处理事件包括以下步骤- As an example, SMS remote control instruction event process comprising the steps of -

步骤S401a:(①任一手机今安装了客户端的手机)用户通过任何 Step S401a: (① any client of a mobile phone handset now installed) by any user

手机发送短信指令,短信指令包含密码。 Phone Send SMS, SMS command contains the password. 短信指令的执行必须通过密 Message instruction executed by the secret must

码进行身份认证,否则无法执行。 Code authentication, or can not execute. 转入步骤S402。 Go to Step S402.

步骤S401b:(②任一手机今服务器今安装了客户端的手机)用户向服务器发送短信指令请求,请求中包含密码。 Step S401b: (② any one phone client this server now installed on the phone) users send SMS request to the server, the request comprising a password. 服务器收到请求,进行身份认证,如果认证失败,则返回错误提醒;如果通过,则按照请求指令类型,向安装了客户端的手机发送指令。 The server receives a request for authentication, if authentication fails, an error is returned reminder; if passed, in accordance with the request command type, to the client's mobile phone to send commands installed. 转入步骤S402。 Go to Step S402.

步骤S401c:(③服务器今安装了客户端手机)用户可以直接要求服务提供商帮助其发送短信指令。 Step S401c: (③ server now installed client phone) users can directly ask the service provider to help them send SMS commands. 服务提供商在确认用户身份之后, 直接触发服务器向安装了客户端的手机发送相应短信指令。 ISP after confirming the identity of the user, directly trigger the server to send the appropriate instructions to install the SMS client's mobile phone. 转入步骤S402。 Go to Step S402.

步骤S402:客户端收到指令执行请求之后,会査询指令格式是否正确,并进行身份认证。 Step S402: After the client receives the instruction execution request, will check whether the correct command format, and authentication.

步骤S402a:如果成功,根据短信内容执行指令。 Step S402a: If successful, execute instructions based on message content. 客户端会向服务器或安全联系人号码或指令执行手机号码以短信或电话形式,告知指令执行成功。 The client will carry out a phone number to contact the server or security number or text message or telephone instructions to inform instruction is executed successfully. 转入步骤S403。 Go to Step S403.

歩骤S402b:如果格式错误或身份认证失败,会给予失败回执提醒。 Ho step S402b: If the format error or authentication failure, failure of receipt will be given a reminder. 转入步骤S403。 Go to Step S403.

步骤S403:短信指令处理事件处理结束,客户端程序在后台实时监控。 Step S403: SMS instruction processing end event processing, real-time monitoring client program in the background.

用户通过发送短信指令可以进行以下的任何操作:锁机、发出报 Any user can perform the following operations by sending SMS commands: lock machine, outbound messages

警声、备份通讯录、取回通讯录、删除所有手机数据、来电提醒、短信转移等。 Offbeat, contacts backup, retrieve contacts, delete all phone data, call alerts, message transfer.

锁机:锁住手机,必须输入密码才能解锁。 Lock machine: the phone is locked, you must enter the password to unlock it. 发出报警声:发出某种声音,警示窃贼。 Sound the alarm: send out a sound, burglar alarm.

备份通讯录:将通讯录以加密的形式备份至服务器,存储起来。 Contacts Backup: Backup your contacts in encrypted form to the server, stored. 取回通讯录:可以取回全部通讯录,也可以取回部分通讯录,比 Retrieving Contacts: all contacts can be retrieved and to be retrieved portion contacts than

如,取回姓"张"的所有联系人。 For example, to retrieve all contacts surname "Chang" in.

删除所有手机数据:将手机中所有重要数据全部销毁,包括:信 To delete all phone data: the phone all important data destroyed, including: letter

息、通讯录、照片、视频、音频、文档、文件等。 Information, contacts, photos, video, audio, documents, files, and so on. 来电提醒:将未接新来电以手机消息(包括短信、彩信)的形式 Calls to remind: the missed call to a new mobile phone messages (including SMS, MMS) in the form of

转发给执行短信指令的手机。 Forwarded to the phone for text messaging instructions.

短信转移:将新到达短信完全转发至执行短信指令的手机。 SMS Transfer: The Perfect Forward newly arrived text message to mobile phone SMS commands are executed. 以上仅是可通过发送短信指令执行的示意性操作,本发明的操作 These are only a schematic operation may be performed by sending SMS commands, operation of the present invention.

不限于此。 Is not limited thereto.

短信指令执行成功后,以短信或电话形式告知服务器或预先设置的联系人号码或执行指令手机,本次操作成功。 SMS instruction is executed successfully, SMS or telephone to inform the server or preset contact number or cell phone instruction execution, the success of this operation.

本方法可以实现对手机的远程控制,在手机丢失之后,仍然可以通过多种途径、方式保护手机的隐私。 This method can be implemented remote control of the phone, after the phone is lost, you can still a variety of ways, ways to protect phone privacy.

本发明还能够监控情景模式设置事件,所谓手机的情景模式,是指手机以某种方式提醒用户有短信、彩信、电话、数据等到达或发出。 The present invention is also capable of monitoring profile settings event, called the phone profile, refer to the phone in some way to alert users to SMS, MMS, phone, data, etc. to reach or issue. 常见的情景模式包括标准(以声音提醒)、无声(没有任何声音)、振动(以振动方式提醒)、离线(脱离网络,无法接收/发出任何信息和电话,有些也称为飞行模式)。 Common scenarios include standard (with sound alerts), silent (no sound), vibration (vibration to remind the way), offline (out of network, you can not receive / send any information and telephone, some also known as flight mode).

图5给出了本发明的对情景模式设置事件的处理流程图。 Figure 5 shows a process flow diagram of the profile of the event to the invention. 作为示例,情景模式设置事件包括以下步骤: As an example, the profile settings event includes the following steps:

步骤S501:当情景模式设置事件发生(即重新设置情景模式)时, 客户端程序立即查询此时的情景模式。 Step S501: When an event occurs profile settings (ie, re-set the scene mode), the client program to instantly check the profile at this time.

步骤S502:査询情景模式是否为无网络(离线/飞行)模式。 Step S502: Query scene mode is no network (offline / flight) mode.

步骤S502a:如果情景模式为无网络(离线/飞行)模式,则锁定手机。 Step S502a: If the profile is no network (offline / flight) mode, lock the phone.

步骤S502b:如果情景模式不是无网络(离线/飞行)模式,则保持正常待机状态。 Step S502b: If no profile is not the network (offline / flight) mode, a normal standby state is maintained. 转入步骤S504。 Go to Step S504.

在锁定手机的状态下,需要输入密码才能解锁手机。 In the locked state of the phone, you need to enter a password to unlock the phone. 步骤S503: 验证输入的密码是否正确。 Step S503: Verify the password entered is correct.

步骤S503a:如果输入密码错误,保持锁定状态。 Step S503a: If you enter the wrong password, remains locked. 当超过一定时长或多次输入密码错误(用户可设定任意的时间和次数值),手机数据可以 When more than a certain length or more input password is wrong (the user can set an arbitrary time and frequency values), phone can

自动加密隐藏。 Automatically encrypted hidden. 用户可以在客户端程序中设定:时长、隐藏数据类型、 Users can set the client program: long, hidden data type,

隐藏数据文件夹等。 Hidden data folders. 也可以设定不自动隐藏数据文件。 Can also be set does not automatically hidden data file. 若在数据文件 If the data file

被隐藏后,用户输入正确密码,那么转入步骤S503b。 After being hidden, the user enters the correct password, then proceeds to step S503b.

步骤S503b:如果用户输入密码正确,则解锁手机,并恢复所有隐藏的数据文件。 Step S503b: If the user enters the correct password, you unlock the phone, and restore all hidden data file. 转入步骤S504。 Go to Step S504.

歩骤S504:进入所设置的情景模式。 Ho step S504: set into the profile.

步骤S505:情景模式设置事件处理结束,客户端程序在后台实时监控。 Step S505: set the profile to the end of the event processing, real-time monitoring client program in the background.

在手机脱离无线网络的情景模式下,即离线(或飞行)模式,手机无法进行任何语音、数据通讯,那么,远程遥控手机的短信指令便无法到达手机,存在手机隐私泄露的危险。 In the mobile phone from the wireless network profile, that is offline (or flight) mode, the phone can not make any voice, data communications, then the mobile phone SMS commands remote control can not reach the phone, there is a risk of loss of privacy handset. 本方法旨在当情景模式切换至离线/飞行模式时,自动锁机,以保护手机隐私。 This method is intended when the scene mode is switched to offline / flight mode, the machine automatically lock to protect phone privacy.

图6给出了本发明的对文件数据加密事件的处理流程图。 Figure 6 shows a process flow diagram for the event file data encrypted invention. 作为示 As shown

例,文件数据加密事件包括以下步骤: Cases, file encryption event includes the following steps:

步骤S60h输入密码进入客户端 Step S60h password to enter the client

步骤S602:选中某个文件数据,进行加密。 Step S602: select a data file, is encrypted.

步骤S603:目标文件被加密隐藏起来,存储到隐蔽的文件目录下, Step S603: the target file is encrypted hidden, stored in hidden files under a directory,

并使用特殊标志将其标识为"己加密"。 And use special logo that identifies it as "own encryption." 加密过的文件存储到特定空间, 在手机自带的文件系统中无法查看,必须进入到客户端中的某个文件目录下才能查看。 Encrypted file storage to a specific space, you can not view the phone comes with a file system, you must go to the next client to view a file in the directory.

步骤S604:文件数据加密事件处理结束,客户端程序在后台实时监控。 Step S604: the end of the file data encryption event processing, real-time monitoring client program in the background.

此方法旨在满足用户对某些敏感数据进行保护的需要。 This method is designed to meet the needs of users to protect certain sensitive data.

图7给出了本发明的对文件数据解密事件的处理流程图。 Figure 7 shows a process flow diagram for the event file data decrypted according to the invention. 作为示 As shown

例,文件数据解密事件包括以下步骤: Cases, file data is decrypted event includes the following steps:

步骤S70h输入密码进入客户端。 Step S70h password to enter the client.

步骤S702:在特定文件目录下,根据特殊标志"已加密"找到已 Step S702: In particular file directory, according to the special flag "encrypted" has been found

经加密的文件。 Encrypted file. 选中某个已经被加密的文件数据,进行解密。 Select a file has been encrypted data is decrypted.

步骤S703:目标文件被解密,恢复至手机自带的文件系统中,可 Step S703: the target file is decrypted, returned to the phone comes with a file system, you can

以査看。 To see. 客户端中的特殊标志取消。 Client special cancellation mark.

步骤S704:文件数据解密事件处理结束,客户端程序在后台实时监控。 Step S704: the end of the file data decrypted event processing, real-time monitoring client program in the background.

此方法旨在满足用户对某些敏感数据进行保护以及调整、修改、 变化的需要。 This method is designed to meet the users of certain sensitive data protection and adjust, modify, need to change.

图8给出了本发明的对应用程序加密事件的处理流程图。 Figure 8 shows a process flow diagram for the application of the present invention, the encrypted event. 作为示例,应用程序加密事件包括以下步骤: 步骤S80h输入密码进入客户端。 As an example, the application encryption event includes the following steps: Step S80h password to enter the client.

步骤S802:选中需要监控的应用程序,进行监控上锁。 Step S802: Select the application you want to monitor, monitor locked. 应用程序可以包括:信息、电话簿(即名片夹)、多媒体、日历、照相/摄像、网络、时钟等所有应用程序。 Applications may include: information, phone (i.e., business card holder), multimedia, calendar, camera / video, network, applications and all other clocks.

步骤S803:当被选中的应用程序被点击启动时,弹出密码输入框。 Step S803: When the selected application is started clicking pop up the password box.

步骤S804:判断输入密码是否正确。 Step S804: judging the password is correct.

步骤S804a:如果输入密码错误,则保持锁定状态。 Step S804a: If you enter the wrong password, it remains locked. 转入步骤S805。 Go to Step S805. 步骤S804b:如果取消输入密码,则返回原手机操作界面。 Step S804b: If canceled up to enter a password, then return to the original cell phone user interface. 转入步骤S805。 Go to Step S805.

步骤S804c:如果输入密码正确,则解锁,可以对应用程序进行相应操作。 Step S804c: If the correct password, unlocking, can make the appropriate operation of the application. 转入步骤S805。 Go to Step S805.

步骤S805:应用程序加密事件处理结束,客户端程序在后台实时监控。 Step S805: encryption application event processing is finished, the client program real-time monitoring in the background.

此方法旨在满足用户对某些应用程序,以及应用程序内部数据进行保护,并且对其调整、修改、变化的需要。 This method is designed to meet the user for certain applications, as well as internal data protection applications, and require them to adjust, modify, change.

图9给出了本发明的对应用程序解密事件的处理流程图。 Figure 9 shows a process flow diagram for the application of the present invention is decrypted event. 作为示例,应用程序解密事件包括以下步骤: As an example, the application decryption event includes the following steps:

步骤S901:输入密码进入客户端。 Step S901: Enter the password to access the client.

步骤S902:选中处于监控的应用程序,解除实时监控。 Step S902: monitoring in selected applications, the lifting of real-time monitoring. 步骤S903:应用程序解密事件处理结束,客户端程序在后台实时监控。 Step S903: the application event decryption process ends, the client real-time monitoring program in the background.

此方法旨在满足用户对某些应用程序,以及应用程序内部数据进行保护的需要。 This method is designed to meet the user for certain applications, as well as internal data applications need to be protected.

本发明中,手机数据迁移事件可以包括手机数据备份事件和手机 The present invention, the mobile phone data migration events may include mobile phones and mobile phone data backup events

数据恢复事件,针对手机数据备份/恢复事件执行以下步骤:安装了客户端的手机向服务器发起备份/恢复数据请求;服务器收到备份/恢复请求,根据识别信息进行鉴权;如果通过鉴权,则响应此请求,安装了客户端的手机与服务器之间开始备份/恢复数据;如果没有通过鉴权, 则服务器告知鉴权失败。 Data Recovery events for mobile data backup / restore events, perform the following steps: Install the client's mobile phone to initiate backup / restore data request to the server; the server receives a backup / restore request, authentication based on identification information; if by authenticated, in response to this request, the installation of start backup / restore data between your phone and the server client; if not, inform the authentication server through the authentication fails. 其中可以由用户通过任何手机向安装了客户端的手机发送备份/恢复请求的短信指令,短信指令包含身份认证信息。 Which may be by the user through the client's mobile phone to any phone installed sends backup / restore SMS commands request SMS commands contain authentication information. 也可以由用户向服务器发送备份/恢复请求的短信指令,短信指令包含身份认证信息;服务器收到短信指令,进行身份认证;如果认证失败, 则返回错误提醒;如果认证通过,则按照请求指令类型,向安装了客户端的手机发送备份/恢复请求的短信指令。 May also be sent by the user to the backup server / recovery request message instruction, the instruction message comprising authentication information; SMS server receives the instruction, for authentication; if authentication fails, it returns an error alert; if the authentication is passed, in accordance with the request command type , sends backup / restore SMS commands request to install the client's mobile phone. 或者,用户也可以直接要求服务提供商帮助其发送备份/恢复请求的短信指令,服务提供商在确认用户身份之后,直接触发服务器向安装了客户端的手机发送相应的短信指令,短信指令包含身份认证信息。 Alternatively, the user can also directly ask service providers to help them send backup / restore request SMS commands, service provider after confirming the identity of the user, directly trigger the server to send the appropriate message to the client's instructions to install the phone, SMS commands include authentication information.

此外,针对手机数据恢复事件还可以执行以下步骤:在web或Wap 页面输入客户端密码进行身份确认,选择需要恢复的手机数据,发起请求;服务器响应请求,下发短信指令至安装了客户端的手机,客户端解析并执行相应指令。 In addition, for mobile phone data recovery event can perform the following steps: Enter the client password for identification in web or Wap page, select the need to restore phone data, initiated the request; the server responds to the request, the client's mobile phone at texting instructions to install The client parses and executes the corresponding instructions.

图10给出了本发明的对手机数据的备份的处理流程图。 Figure 10 shows a process flow diagram for the backup data of the mobile phone of the present invention. 作为示例, 手机数据备份事件包括以下步骤: As an example, mobile phone data backup event includes the following steps:

步骤S1001:输入密码进入客户端。 Step S1001: Enter the password to access the client.

步骤S1002:客户端发起备份请求。 Step S1002: The client initiates a backup request.

步骤S1003:服务器收到备份请求,根据手机、手机卡的识别信息 Step S1003: the backup server receives the request, according to information identifying the mobile phone, mobile phone cards

进行鉴权。 For authentication.

步骤S1004:判断是否通过鉴权。 Step S1004: by determining whether the authentication.

步骤S1004a:如果通过鉴权,则响应此请求。 Step S1004a: If authentication by, in response to this request. 转入步骤S1005。 Go to Step S1005. 步骤S1004b:如果没有通过鉴权,则告知鉴权失败。 Step S1004b: If you do not pass the authentication, the authentication fails informed. 转入步骤S1007。 Go to Step S1007.

步骤S1005:安装客户端的手机开始备份数据,例如可通过无线数 Step S1005: The phone starts to install the client backup data, for example, by wireless data

据网络GPRS、 EGDE、 WIFI、 WIMAX等方式。 According to the network GPRS, EGDE, WIFI, WIMAX and other means. 用户可设置需要备份的数据:比如,如果选择信息、通讯录、照片,则备份这三种类型数据。 The user can set the data to be backed up: for example, if you select information, contacts, photos, the three types of data backup.

步骤S1006:数据备份完成。 Step S1006: Data backup is complete.

步骤S1007:手机数据的备份处理结束,客户端程序在后台实时监控。 Step S1007: mobile phone data backup process is completed, the client real-time monitoring program in the background.

由用户设置需要备份或恢复的数据。 Setting data required by the user backed up or restored. 备份可以采用定期自动备份, 备份时间间隔可配制。 Backup may be employed regular automatic backup, the backup time interval may be formulated. 也可以采用手动备份方式,由用户设置备份时间间隔。 It may also be manually backup, the backup interval set by a user. 此外,也可以通过远程控制客户端进行备份: In addition, it can also be backed up by remote control client:

使用任一手机发送短信指令到安装了客户端的手机上。 Using any of a mobile phone to send command to the client on the phone installation. 短信指令注明了备份数据的类型,包括所有类型手机数据,可以选择任何一种或多种。 SMS commands specify the type of backup data, including all types of mobile phone data, you can choose any one or more. 客户端收到短信指令,在通过身份认证之后按照指令类型执行。 The client receives an SMS command is executed by the type of instruction after authentication.

此方法旨在尽可能的扩展存储手机数据的空间,同时满足用户未 This method is designed to expand storage space for mobile phone data as much as possible, the user is not satisfied

来进行数据无缝迁移的需要。 To the need for seamless data migration.

图11给出了本发明的对手机数据的恢复的处理流程图。 Figure 11 shows a process flow diagram of the mobile phone data recovery according to the invention. 作为示例, As an example,

手机数据恢复事件包括以下步骤: Cell phone data recovery event includes the following steps:

步骤S1101:输入密码进入客户端。 Step S1101: Enter the password to access the client.

步骤S1102:安装客户端的手机主动发起恢复请求。 Step S1102: Install the client's mobile phone initiate recovery request.

步骤S1103:服务器收到恢复请求,根据手机、手机卡的识别信息 Step S1103: restore the server receives a request, based on the identification information mobile phones, phone cards

进行鉴权。 For authentication.

步骤S1104a:如果通过鉴权,则响应此请求。 Step S1104a: If authentication by, in response to this request. 转入步骤S1105。 Go to Step S1105.

步骤S1104b:如果没有通过鉴权,则告知鉴权失败。 Step S1104b: If you do not pass the authentication, the authentication fails informed. 转入步骤 Go to Step

S1107。 S1107.

步骤S1105:安装客户端的手机开始恢复数据,例如可通过无线数 Step S1105: install the client phone began to recover the data, for example, by wireless data

据网络GPRS、 EGDE、 WIFI、 WIMAX等方式。 According to the network GPRS, EGDE, WIFI, WIMAX and other means. 用户可设置要恢复的 The user can set to be restored

数据:比如,如果选择信息、通讯录、照片,则恢复这三种类型数据。 Data: for example, if you select information, contacts, photos, the recovery of these three types of data. 步骤S1106:恢复数据完成。 Step S1106: Data recovery is complete. 所恢复的数据可存放在特定文件目录 The recovered data can be stored in a specific file directory

下,或自动导入对应文件目录中。 Next, the corresponding file or directory automatically import.

步骤S1107:手机数据的恢复处理结束,客户端程序在后台实时监控。 Step S1107: mobile phone data recovery process is completed, the client real-time monitoring program in the background.

此外,恢复的方式还可以包括远程控制客户端进行恢复、web请求恢复、wap请求恢复。 In addition, the recovery of the remote control may further include the client restoration, web request recovery, recovery WAP request. 当然,还支持直接将服务器上的数据取回至个人电脑、PDA等终端。 Of course, also supports direct data on the server to retrieve a personal computer, PDA and other terminals.

远程控制客户端进行恢复:使用任一手机发送短信指令到安装了 Remote control client for recovery: Send SMS to the phone using either installed

客户端的手机,客户端在身份认证通过之后执行相应指令。 The client's mobile phone, the client executes the corresponding instruction after authentication by. 指令可以指定恢复全部或部分手机数据。 Command can specify to restore all or part of the mobile phone data.

Web请求恢复:在web页面输入客户端密码进行身份确认,选择需要恢复的手机数据,发起请求。 Web requests to restore: Enter the web page to confirm the identity of the client password, select the need to restore phone data, initiated the request. 服务器响应请求,下发短信指令至 The server responds to the request issued to the SMS commands

22安装了客户端的手机,客户端解析并执行相应指令。 22 installed the client's mobile phone, the client parses and executes the corresponding instructions.

Wap请求恢复:在wap页面输入客户端密码进行身份确认,选择需要恢复的手机数据,发起请求。 Wap request to restore: Enter the password wap page client for identification, select the need to restore phone data, initiated the request. 服务器响应请求,下发短信指令至安装了客户端的手机,客户端解析并执行相应指令。 The server responds to the request command issued to the SMS client installed on the phone, the client parses and executes the corresponding instructions.

用户可以通过个人电脑、PDA等通过互联网访问服务器,管理备份的数据,将备份的数据直接下载。 Users can access the server through the Internet via PC, PDA, etc., management of backup data, backup data is downloaded directly.

图12给出了本发明的对手机数据的无缝迁移的处理流程图。 Figure 12 shows a process flow diagram of the mobile phone seamless migration of data according to the present invention. 作为示例,手机数据的无缝迁移包括以下的方式和步骤: As an example, mobile phone data migration seamless manner and comprises the steps of:

A) 点对点无缝迁移: A) Point seamless migration:

步骤S1201A:任一手机向安装了客户端手机发送点对点固定格式 Step S1201A: any of a mobile phone mounted to a mobile phone transmitting a P2P client fixed format

的短信指令。 SMS commands. 短信指令中包含密码等进行身份认证的必要信息。 SMS command contains the necessary information for identity authentication password.

步骤S1202A:安装了客户端的手机根据指令格式及内容进行鉴权。 Step S1202A: install the client authentication according to phone instruction format and content.

步骤S1203A:判断是否通过鉴权。 Step S1203A: by determining whether the authentication.

步骤S1203Aa:如果通过鉴权,则按照要求将特定数据以特定格式(如短信、彩信等)传送给发送手机。 Step S1203Aa: if, as required by the specific data transfer to the transmission by a mobile phone authentication in a particular format (e.g., SMS, MMS, etc.). 转入步骤S1204A。 Go to Step S1204A.

步骤S1203Ab:如果没有通过鉴权,则回应鉴权失败消息。 Step S1203Ab: If you do not pass the authentication, the response authentication failure message. 转入步骤S1205。 Go to Step S1205.

步骤S1204A:用户可以根据设定自动或手动将收到的数据导入手机中。 Step S1204A: The phone user can import data automatically or manually set to be received.

B) 通过服务器无缝迁移: B) seamless migration through the server:

步骤S1201B:安装了客户端的手机向服务器发起恢复数据请求。 Step S1201B: install the client's mobile phone to initiate a data recovery request to the server. 步骤S1202B:服务器进行身份鉴权。 Step S1202B: server for identity authentication. 步骤S1203B:判断是否通过鉴权。 Step S1203B: by determining whether the authentication.

步骤S1203Ba:如果通过鉴权,则按照请求恢复的数据类型,将相应的数据传送给手机。 Step S1203Ba: pass if authenticated, according to the data type of the request to restore the data to the respective mobile phones. 转入步骤S1204B。 Go to Step S1204B.

步骤S1203Bb:如果没有通过鉴权,或服务器没有数据,回应失败消息。 Step S1203Bb: If no data did not pass the authentication, or server fails to respond to the message. 转入步骤S1205。 Go to Step S1205.

步骤S1204B:安装客户端的手机开始恢复数据,例如可通过无线数据网络或直接通过有线连接登陆服务器等方式。 Step S1204B: install the client phone began to recover the data, for example, by a wireless data network or direct-wired connection, through a login server or the like. 用户可设置要恢复的数据:比如,如果选择信息、通讯录、照片,则恢复这三种类型数步骤S1205:数据迁移流程结束。 The user can set the data to be restored: for example, if you select information, contacts, photos, restore these three types of the number of steps S1205: data migration process ends.

当然,可以不定期再次使用"手机数据的备份"操作将数据进行 Of course, you can occasionally use "back up phone data" Operating data again

更新。 Update. 也可以登录通过互联网、wap站点,对个人信息管理服务器中 Also you can log in via the Internet, wap site, personal information management server for

存储的手机数据进行管理,包括编辑、删除、添加等等,对数据进行更新。 Store phone data management, including edit, delete, add, etc., the data are updated.

图13给出了本发明的对手机数据的销毁的处理流程图。 Figure 13 shows a process flow diagram of the destruction of the data on the mobile phone of the present invention. 作为示例, As an example,

手机数据销毁事件包括以下的方式和步骤: Phone data destruction methods and events include the following steps:

A) 客户端一键快捷销毁步骤S1301A:输入正确密码进入客户端。 A) The client quickly destroy a key step S1301A: Enter the correct password to enter the client.

步骤S1302A:点击客户端中"一键销毁"的快捷按键,用于一键 Step S1302A: Click the client "a key Destruction" shortcut key for a key

销毁所有数据。 Destroy all data.

步骤S1303A:客户端执行销毁操作,立即删除所有手机数据。 Step S1303A: client performs destroy operation deletes all phone data immediately. 转入步骤S1304。 Go to Step S1304.

艮口,在输入正确密码进入客户端之后,只要点击此键,则立即删除所有手机数据,例如包括信息、电话簿、通话记录、多媒体、记事本、文件等。 Gen mouth, after entering the correct password to enter the client, just click on this button, then immediately remove all phone data, including information such as phone book, call history, multimedia, notepad files. 相对于传统的逐一删除手机数据方式,具备操作简单、 快捷的优势,而且,可以避免手动删除数据不彻底而导致泄露的隐患。 Compared with the traditional one by one remove the phone data mode, with simple, quick advantage, and avoid manually remove hidden data is not complete and lead to leaks.

B) 远程控制客户端进行销毁 B) Remote Control Client destruction

步骤S1301B:使用任一手机发送包含密码的销毁数据的短信指令到安装了客户端的手机。 Step S1301B: using a mobile phone to send any SMS command comprising data destruction password to the client installed on the phone. 或者在web、 wap页面触发短信指令至安装了客户端的手机。 Or web, wap pages trigger SMS commands to the client installed on the phone.

步骤S1302B:客户端进行鉴权。 Step S1302B: client authentication.

步骤S1303B:判断是否通过鉴权。 Step S1303B: by determining whether the authentication.

步骤S1303Ba:如果鉴权通过,客户端解析并执行相应指令。 Step S1303Ba: if the authentication is passed, the client parses and executes the corresponding instructions. 转入步骤S1304。 Go to Step S1304.

步骤S1303Bb:如果没有通过鉴权,则回应失败消息。 Step S1303Bb: If you do not pass the authentication, the failure to respond to the message. 然后转入步骤S1304。 And then proceeds to step S1304.

步骤S1304:数据销毁流程结束。 Step S1304: data destruction process ends.

图14给出了本发明的客户端程序自动隐藏方法的处理流程图。 14 shows a process flow diagram of the present invention, the client program automatically concealment method. Make

为示例,客户端程序自动隐藏方法包括以下步骤:步骤S1401:首次启动客户端程序,完成初始化配置之后,客户端程序自动隐藏,在系统后台运行,用户在手机自带文件系统中无法査看。 As an example, the client program automatically hiding method comprises the following steps: Step S1401: first time you start the client program, after the completion of the initial configuration, the client program automatically hide, to run in the background, users can not view the file system comes with the phone.

步骤S1402:输入缺省的特殊键盘组合(如#123#),调出程序入口界面。 Step S1402: special keyboard combinations default input (e.g., # 123 #), call up the program entry interface.

步骤S1403:输入密码进入客户端程序。 Step S1403: Enter the password into the client program.

步骤S1404:对调出程序界面的特殊键盘组合进行自定义,如更改为#456789#。 Step S1404: a swap specific keyboard combination to customize the program interface, such as a change to # 456789 #. 同时,用户可以选择将激活程序界面的特殊键盘组合传至(或不传)服务器,以便在忘记激活键盘时,通过身份认证获取此 At the same time, the user can choose to activate special keyboard combination is transmitted to the program interface (or pass) server, in order to obtain this through authentication when you forget to activate the keypad

"(曰息。 "(Said information.

步骤S1405:本流程结束。 Step S1405: This process ends.

此外,用户也可以在初始化配置过程中对调出程序界面的特殊键盘组合进行自定义。 Further, the user can swap out a special keyboard combination program interface in the initialization configuration process be customized.

通过隐藏应用程序操作,除了用户自己知道如何调出客户端程序之外,他人很难知道客户端程序的存在,隐蔽性更强,更好的保护了手机及其隐私数据。 By hiding application operations, in addition to the user knows how to bring up the client outside the presence of others is difficult to know the client program, hidden stronger, better protect the privacy of phone and its data.

图15给出了本发明的防止非法删除的处理流程图。 Figure 15 shows a process flow diagram of the present invention to prevent the illegally removed. 作为示例,防止非法删除客户端程序的方法包括以下步骤: As an example, to remove the client program to prevent illegal method comprising the steps of:

步骤S1501:触发删除客户端程序操作。 Step S1501: the trigger to remove the client program operations.

步骤S1502:提示输入密码。 Step S1502: prompt for a password. 步骤S1503:判断密码是否正确。 Step S1503: to determine whether the correct password.

步骤S1503a:如果输入正确,执行删除客户端程序操作。 Step S1503a: If the input is correct, delete the client program operations. 转入步骤S1504。 Go to Step S1504.

步骤S1503b:如果输入错误,取消执行删除操作。 Step S1503b: If you make a mistake, cancel the delete operation. 转入步骤S1504。 Go to Step S1504. 步骤S1504:本流程结束。 Step S1504: This process ends.

即使客户端程序被第三方检测软件发现,企图通过正常的卸载方式删除程序是无法执行的,必须通过输入正确的密码验证身份之后, 才能完成删除操作。 Even if the client program is found, an attempt to delete the program through the normal uninstall way is unable to perform third-party testing software, you must then authenticate to complete the deletion by entering the correct password.

对于带有扩展存储卡的手机,本系统还具备一定的格机后生存能力。 For mobile phones with extended memory card, the system further includes a machine after a certain cell viability.

图16给出了本发明的格式化生存的处理流程图。 Figure 16 shows a flowchart of processing according to the present invention formatted survival. 作为示例,格式化生存方法包括以下步骤: As an example, the method comprising the steps of formatting survival:

步骤S1601:在安装或初始化客户端程序的过程中,会向存储卡中写入客户端程序的镜像文件。 Step S1601: in the initialization or during the installation of the client program, the client program will write the image file to the memory card. 镜像文件会记录例如手机识别码、程序版本编号等信息,并作为唯一标识。 Mirror file records such as phone identification number, program version number and other information, and as a unique identifier.

A) 仅格式化手机。 A) only format the phone. 步骤S1602A:仅格式化手机。 Step S1602A: only format the phone.

步骤S1603A:格机完成之后,恢复手机系统的出厂设置后开机, Step S1603A: After the completion of grid machines, after restore the phone to factory settings system boot,

存储卡中的镜像文件发现手机中无客户端程序,便读取手机识别码并与之前的记录值进行比对。 Image file on the memory card of a mobile phone found no client program, then read the phone identification code and to compare with the previous record value.

步骤S1604Aa:如果一致,则自动载入程序;转入步骤1605。 Step S1604Aa: If matched, the automatic loader; proceeds to step 1605. 步骤S1604Ab:如果不一致,不做任何操作。 Step S1604Ab: if not, do not do anything. 转入步骤1605。 Go to Step 1605.

B) 先格式化存储卡,插入原手机中再格式化手机。 B) to format the memory card was inserted into the phone and then format the phone. 步骤S1602B:格式化存储卡。 Step S1602B: formatting the memory card.

步骤S1603B:将此存储卡插入手机中,此时客户端程序会查询(可根据事件发生时刻或周期性执行)存储卡是否存在镜像文件,如果发现没有,那么立即将镜像文件写入存储卡中。 Step S1603B: this card into the phone, this time the client program will query (according to event time or periodic execution) whether there is a memory card image file, if found not, then the image file will be immediately written to the memory card . 如果再格式化手机,此后的流程同S1602A〜S1605。 If you reformat the phone, then process with S1602A~S1605. 转入步骤S1605。 Go to Step S1605.

步骤S1605:本流程结束。 Step S1605: This process ends.

作为示例,本发明涉及的系统包括客户端模块和服务器,下面参见图17和图18描述本发明示意性的系统构成和模块。 As an example, the system according to the present invention includes a client module and a server Referring now to Figure 17 and Figure 18 depicts a schematic system configuration and the module of the invention. 图17给出了本发明的保护手机中个人隐私的系统的物理构成图,其物理构成包括: 安装有客户端模块的移动终端1710、无线基站1720、互联网1730、服务器1740。 Figure 17 shows a physical configuration diagram of a mobile phone according to the present invention in the protection of privacy of the system, its physical configuration comprising: a mobile terminal mounted with a client module 1710, the radio base station 1720, the Internet 1730, the server 1740.

图18给出了本发明的系统模块图。 Figure 18 shows a block diagram of a system according to the present invention. 客户端模块1810包括以下的子模块(参见图18):事件监控模块1811,事件处理模块1812,通信模块1SB和手机数据更新、备份、恢复模块1814等。 The client module 1810 includes the following sub-modules (see Figure 18): event monitoring module 1811, the event processing module 1812, and mobile data communications module 1SB update, backup, recovery module 1814 and so on.

事件监控模块1811负责监控各类事件,并将各类事件,包括系统事件、用户触发的事件或者客户端模块检测到的事件,交给事件处理进行处理。 Event monitoring module 1811 is responsible for monitoring all types of events and all kinds of events, including system events, events triggered by the user or the client module detects events to event handlers for processing.

事件处理模块1812负责所有手机事件的处理。 Event processing module 1812 is responsible for handling all phone events. 包括以下各子模块, 用以分别对不同类型事件进行处理:手机卡信息处理模块1815:负责处理手机卡识别码信息,包括存储合法手机卡信息,读取当前手机卡信息,并对当前手机卡信息与合法手机卡存储数据进行比对,从而触发手机锁定/解锁模块的工作; Including the following sub-modules for different types of events are handled: phone card information processing module 1815: responsible for handling phone card identification number information, including memory legitimate phone card information, read the current phone card information, and current phone cards information and legitimate phone card to store data for comparison, which triggers the phone to lock / unlock operation of the module;

手机锁定/解锁模块1816:根据手机卡信息处理模块的执行结果, 以及短信指令处理模块的指令信息,对手机进行锁定、解锁操作; Mobile phone lock / unlock module 1816: According to the results of the phone card information processing module, and the SMS command processing module instruction information, the phone lock, unlocking operation;

短信指令处理模块1817:负责对短信指令的处理,包括:合法性(身份)校验、指令执行、(短信形式)执行回执; SMS command processing module 1817: Responsible for handling of SMS commands, including: the legitimacy of (identity) check, instruction execution, (text message) to perform receipt;

文件数据处理模块1818:负责对文件数据进行处理,包括:对指定文件数据加密、解密;和 File data processing module 1818: is responsible for processing the data file, comprising: a file specified data encryption, decryption; and

应用程序处理模块1819:负责对应用程序进行处理,包括:对应 Application processing module 1819: the application is responsible for processing, comprising: a corresponding

用程序的监控、加密、解密。 With the monitoring program, encryption, decryption.

手机数据更新、备份、恢复模块1814负责客户端自身数据的处理、 Mobile phone data update, backup, recovery module 1814 is responsible for handling the client's own data,

服务器端自身数据的处理、客户端与服务器端之间数据同步的处理。 Server-side data processing between the client and the server sync data processing itself.

更新包括双向的更新;备份是指将客户端数据备份至服务器端的个人 The update includes a two-way update; backup is personal client data to the backup server

信息管理数据库;恢复是指将手机数据从服务器端的个人信息管理数 Information management database; recovery is the number of the phone to manage personal information data from the server side

据库取回至客户端。 Database to retrieve the client.

通信模块1813负责服务器和客户端模块上传或者下传信息。 The communication module 1813 is responsible for the server and client module to upload or downstream information. 服务器1820包括以下模块:通信模块1821、个人信息管理模块 Server 1820 includes the following modules: communication module 1821, personal information management module

1822、备份/恢复模块1823等。 1822, backup / restore module 1823 and so on.

通信模块1821负责服务器1820和客户端模块1810上传或者下传 The communication module 1821 is responsible for server and client module 1820 1810 or upload downstream

{曰息o Said information {o

个人信息管理模块1822负责维护个人手机数据,包括更新、删除、 修改、查找等。 Personal information management module 1822 is responsible for maintaining personal cell phone data, including update, delete, modify, search and other.

备份/恢复模块1823负责将手机数据备份存储在服务器,或将手机数据从服务器恢复至手机终端。 Backup / Restore module 1823 is responsible to restore phone data backup stored on the server, or data from the server to the phone handset.

移动终端操作系统1830以及移动终端硬件平台1840,为客户端模块1810提供基础的平台支撑。 A mobile terminal and a mobile terminal 1830 operating system hardware platform 1840, the client module 1810 based platform support. 并且客户端模块1810的存在不受移动终端操作系统1830以及移动终端硬件平台1840的限制。 The client module 1810 and there is not a mobile terminal operating system 1830 and restrict the movement of the terminal hardware platform 1840.

Web或wap页面1850提供了访问服务器1820的入口。 Web page 1850 or wap access server provides access to 1820.

个人信息管理接口1821提供了Web或wap页面1850访问服务器1820并对个人信息进行编辑、删除、修改、査找等操作的入口。 Personal information management interface 1821 provides a Web server or access wap pages 1850 and 1820 of personal information to edit, delete, modify, search and other entrance operation. 短信指令处理接口1852提供了Web或wap页面1850触发服务器1820下发短信指令的入口。 SMS command processing interface 1852 provides instructions to send text messages or wap page 1850 under the Web server 1820 triggered entrance.

个人信息管理接口1821和短信指令处理接口1852通过通信模块1853与服务器1820通信,进行相应的操作。 Personal Information Management Interface 1821 interfaces 1852 and SMS communication command processing module communicating with the server 1820 through 1853, the corresponding operation.

本发明范围内的实施例也包括用于承载,或拥有存储在其上用于执行本发明的实施例的可执行指令或数据结构的计算机或移动终端可读媒体。 Embodiments within the scope of the present invention also includes a bearing, or a computer-readable medium has stored the mobile terminal or executable instructions thereon for performing embodiments of the present invention or the data structure. 此类计算机或移动终端可读媒体可以是由一般用途或特殊用途的计算机或移动终端能够访问的任何可用媒体。 Such a mobile terminal or a computer-readable medium may be any available medium by a general purpose computer or a mobile terminal or the access to the special purpose. 例如并不限于,此类计算机或移动终端可读媒体可包括RAM、ROM、EEPROM、 CD-ROM For example and without limitation, such computer-readable media, or mobile terminal may comprise RAM, ROM, EEPROM, CD-ROM

或其它光盘存储器、磁盘存储器或其它的磁存储设备、或能用于以计算机或移动终端可执行指令或数据结构的形式承载或存储所要求的程序代码手段的并且能够由一般用途或特殊用途的计算机或移动终端访问的任何其它媒体。 Or other optical disk storage, magnetic disk storage or other magnetic storage devices, or can be used to program code means executable in a computer or a mobile terminal in the form of instructions or data structures required to carry or store and can be by a general purpose or special purpose computer or mobile terminal accesses any other medium. 当通过网络或另一个通信连接(固线、无线或固线或无线的组合)传输或提供信息到移动终端或计算机时,该移动终端或计算机将该连接完全视为计算机或移动终端可读媒体。 When information is transferred or provided to the mobile terminal or a computer network or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless), the mobile computer terminal or the connection as a computer-readable medium or a mobile terminal . 从而,任何此类连接完全被视为计算机或移动终端可读媒体。 Thus, any such connection is fully regarded as a computer-readable medium or a mobile terminal. 以上的组合也应该包含于计算机或移动终端可读媒体的范围内。 Combinations of the above should also be included within the mobile terminal or in a computer-readable medium range. 计算机或移动终端可执行指令包括,例如促使一般用途或特殊用途的计算机或移动终端、 或特殊用途的处理设备执行某些功能或一组功能的指令和数据。 The mobile terminal or computer-executable instructions comprise, for example, instructions and data executed a certain function or group of functions processing apparatus causes a general purpose or special purpose computer or a mobile terminal, or a special purpose.

通常,程序模块包括执行特殊任务或实现特殊的抽象数据类型的例行程序、程序、对象、组件、数据结构等。 Generally, program modules include that perform particular tasks or implement particular abstract data types routines, programs, objects, components, data structures, and the like. 可执行指令、相关的数据结构、以及程序模块代表了用于执行本文所揭示方法的步骤的程序代码手段的示例。 Executable instructions, associated data structures, and program modules represent examples of program code means for executing steps of the methods disclosed herein, the. 此类可执行指令或相关的数据结构的特殊顺序代表了用于实现这些步骤中描绘的功能的相应过程的示例。 Special sequence of such executable instructions or associated data structures represents examples of corresponding process steps for implementing the functions depicted.

本领域技术人员将认识到可以在多种类型的移动终端环境中实现本发明。 Those skilled in the art will recognize that the present invention may be implemented in a variety of types of mobile terminal environment.

在不违背本发明精神或本质特征下,本发明可以具体化为其它特定的形式。 Without departing from the spirit or essential characteristics of the present invention, the present invention may be embodied in other specific forms. 所描述的实施例仅为从各个方面例示性地说明本发明而非用于限制本发明。 The described embodiments are merely illustrative of various aspects of the present invention illustrating the invention and not intended to limit. 因此,本发明的范围应如后述权利要求而不是之前的描述所表示。 Accordingly, the scope of the invention shall be described later as claimed in preceding description and not represented required. 任何在权利要求等效的含意和范围中所作的变化都包含在本发明的范围内。 Any changes made to the claims in the meaning and range of equivalents are included within the scope of the present invention.

Claims (20)

  1. 1、一种保护手机中个人隐私的方法,包括以下步骤: 手机开机后,客户端后台启动、运行; 监测各事件; 根据事件类型执行相关操作; 事件处理结束后,客户端后台运行,继续监测事件。 1. A method for privacy protection mobile phone, comprising the steps of: after the phone is switched on, the client back up and running; monitor the event; perform actions based on the event type; the end of the event processing, client running in the background, continue to monitor event.
  2. 2、 如权利要求1所述的方法,其中所监控的事件类型包括:更换手机卡事件、短信指令事件、文件数据处理事件、应用程序处理事件、 情景模式设置事件、删除程序事件、格式化手机/手机存储卡事件、手机数据迁移事件、客户端程序自动隐藏事件。 2. The method as claimed in claim 1, wherein the monitored event type comprising: a phone card replacement event, SMS command event, the event processing data file, the application event handling, event profile settings, delete program events, format the phone / phone memory card event, mobile phone data migration event, the client program automatically hide event.
  3. 3、 如权利要求2所述的方法,其中针对更换手机卡事件执行以下步骤:读取手机卡识别码;将读取的手机卡识别码与合法手机卡数据库的信息进行比对; 如果没有匹配值,则锁机; 如果有匹配值,则保持正常待机状态;其中在锁机的状态下,提示用户输入密码,如果用户无法输入正确密码,则保持锁机状态,和/或发报警声音的安全保护操作,如果用户输入密码正确,则解锁手机,并解除所有安全保护。 3. The method as claimed in claim 2, wherein the following steps for replacing the phone card Event: reading the identification code phone card; phone card information of the identification code and the read card database of legitimate handset for comparison; if no match value, then the lock machine; if there is a match value, is maintained normal standby state; wherein the lock status machine, the user is prompted to enter a password, if the user can not enter the correct password, the retention lock-up state, and / or send alarm sound security operation, if the user enters the correct password, unlock the phone, and to lift any security.
  4. 4、 如权利要求3所述的方法,其中在锁机的状态下以短信、电话或无线网络的数据通道将当前手机号码发送给服务器或安全联系人号码。 4. The method as claimed in claim 3, wherein the SMS, telephone or data channel of the wireless network transmits the current phone number to the security server or contact number in the lock state machine.
  5. 5、 如权利要求4所述的方法,其中如果用户输入密码正确,则提示用户选择是否将本手机卡加入"合法手机卡"数据库列表中;其中合法手机卡数据库中存储一个或多个合法手机卡的识别码, 用户能够将新手机卡设为合法手机卡,也能够随时删除某个合法手机卡。 5. The method as claimed in claim 4, wherein if the user enters the correct password, the user is prompted to select whether to present a list of phone cards into the database "legitimate handset Card"; which the legitimate handset card database storing one or more legitimate handset ID card, the user can set a new phone card legitimate phone card, you can delete a legitimate phone card at any time.
  6. 6、 如权利要求2所述的方法,其中针对短信指令事件执行以下步骤:客户端收到短信指令之后,查询短信指令格式是否正确,并进行身份认证;如果格式正确,并且身份认证成功,则根据该短信指令内容执行该短信指令;如果格式错误或身份认证失败或处理超时,则给予失败回执提醒用户。 6. The method as claimed in claim 2, wherein the step of performing the instruction for SMS Event: After the client receives an SMS command, a query command message format is correct, and authentication; if the format is correct, and the authentication is successful, according to the contents of SMS commands execute the instruction message; if malformed or authentication process fails or times out, fails to give receipts to remind the user.
  7. 7、 如权利要求6所述的方法,其中通过下面的方式发送所述短信指令:由用户通过任何手机向安装了客户端的手机发送,短信指令包含身份认证信息;或者由用户首先向服务器发送短信指令,短信指令包含身份认证信息, 服务器收到短信指令,进行身份认证,如果认证失败,则返回错误提醒,如果认证通过,则按照请求指令类型,向安装了客户端的手机发送短信指令;或者用户直接要求服务提供商帮助其发送短信指令,服务提供商在确认用户身份之后,直接触发服务器向安装了客户端的手机发送相应的短信指令,短信指令包含身份认证信息。 7. The method as claimed in claim 6, wherein the following commands send the message: The client sends a phone installed by the user from any phone, SMS commands comprises identity authentication information; or send text messages to the first server by the user instructions SMS instructions include authentication information, the server receives the SMS command, identity authentication, if authentication fails, an error is returned reminder, if authenticated, then in accordance with the request command type, to the client's mobile phone to send SMS commands installed; or the user direct service providers are required to help them send SMS, the service provider after confirming the identity of the user, directly trigger the server to send the appropriate message to the client's instructions to install the phone, SMS command contains authentication information.
  8. 8、 如权利要求7所述的方法,其中用户通过发送短信指令能够进行以下的任何操作:锁机、发出报警声、备份全部或部分手机数据、 恢复全部或部分手机数据、删除所有手机数据、来电提醒、短信转移。 8. A method as claimed in claim 7, wherein the user can send SMS by any of the following operations: lock machine, an alarm sound, all or part of cell phone data backup, restore all or part of the mobile phone data, delete all data of the phone, calls to remind, SMS transfer.
  9. 9、 如权利要求2所述的方法,其中针对情景模式设置事件执行以下步骤:当情景模式设置事件发生时,查询情景模式是否为无网络模式; 如果情景模式为无网络模式,则锁定手机;如果情景模式不是无网络模式,则进入所设置的情景模式; 其中在锁定手机的状态下,提示用户输入密码; 验证输入的密码是否正确; 如果用户输入密码正确,则解锁手机; 如果输入密码错误,保持锁定状态。 9. A method as claimed in claim 2, wherein the profile settings for the event to perform the following steps: when the event occurs profile settings, the profile query whether no network mode; if no profile is a network mode, the lock phone; If the profile is not without network mode, then enter the profile set; which in the locked phone, prompting the user to enter a password; password authentication input is correct; if the user enters the correct password, you unlock the phone; If you enter the wrong password , remains locked.
  10. 10、 如权利要求3或9所述的方法,其中当超过一定时长或多次输入密码错误,则自动加密隐藏手机数据;其中由用户设定:时长、输错次数、隐藏数据类型、隐藏数据文件夹。 10. The method according to claim 39, wherein when more than a certain length of time or more wrong password, the mobile phone will automatically hide the encrypted data; wherein the set by a user: long, wrong number, the type of hidden data, hidden data folder.
  11. 11、 如权利要求2所述的方法,其中文件数据处理事件包括文件数据加密处理事件,文件数据解密处理事件,文件数据的备份、恢复、 销毁事件,其中针对文件数据加密事件执行以下步骤:输入密码进入客户端;选中某个文件数据,进行加密,将加密的文件标识为"已加密"; 标识为"已加密"的文件被加密隐藏起来,存储到隐蔽的文件目录下;其中针对文件数据解密事件执行以下步骤: 输入密码进入客户端;在特定文件目录下,根据特殊标志"已加密"找到已经加密的文件;选中某个已经被加密的文件数据,进行解密;目标文件被解密,恢复至手机自带的文件系统中,客户端中的特殊标志取消。 11. The method as claimed in claim 2, wherein the data file comprises a file event processing event data encryption processing, decryption processing event data file, the data file backup, recovery, destruction event, wherein the following steps for the event file data encryption: Input password to enter the client; select a file data is encrypted, the encrypted file identified as "encrypted"; identified as "encrypted," the hidden file is encrypted, stored in hidden files under a directory; for which the data file decrypted event to perform the following steps: enter the password to enter the client; in a particular directory, according to the special flag "encrypted" to find the encrypted files; select a data file has been encrypted, decrypted; target file is decrypted, recovery the phone comes to the file system, the client canceled the special mark.
  12. 12、 如权利要求2所述的方法,其中针对应用程序处理事件执行以下步骤-.输入密码进入客户端;选中需要监控的应用程序,进行监控上锁; 当被选中的应用程序被点击启动时,提示用户输入密码;判断输入密码是否正确;如果输入密码错误,则保持该应用程序的锁定状态; 如果取消输入密码,则返回原手机操作界面; 如果输入密码正确,则解锁,可以对应用程序进行相应操作; 其中对已加密的应用程序进行解密包括以下步骤: 输入密码进入客户端;选中处于监控的应用程序,解除实时监控。 12. The method as claimed in claim 2, wherein the following steps for processing the application event - the client to enter a password; Select the need to monitor application for monitoring lock; when the selected application is started clicks the user is prompted to enter a password; determine the password is correct; if you enter the wrong password, leave the application locked state; if cancel entering a password, the original mobile phone user interface is returned; if the password is correct, unlock, can the application corresponding operation; wherein the encrypted decrypting applications comprising the steps of: a password into the client; selected application is monitored, releasing real-time monitoring.
  13. 13、 如权利要求2所述的方法,其中针对删除程序事件执行以下步骤-当触发删除客户端程序操作时,提示输入密码; 判断输入的密码是否正确; 如果输入正确,执行删除客户端程序操作; 如果输入错误,取消执行删除操作。 13. The method as claimed in claim 2, wherein performing the following steps for deleting a program event - when triggered to remove the client program operating, a password prompt; determines whether the input password is correct; If entered correctly, the client program delete operation ; If you make a mistake, cancel the delete operation.
  14. 14、 如权利要求2所述的方法,其中针对格式化手机/手机存储卡事件执行以下步骤:在安装或初始化客户端的过程中,向存储卡中写入客户端的镜像文件,镜像文件记录手机识别码信息,作为唯一标识;如果仅格式化手机,存储卡中的镜像文件发现手机中无客户端, 则读取手机识别码并与之前的记录值进行比对;如果一致,则自动载入程序;如果不一致,不做任何操作;如果先格式化存储卡,将此存储卡插入手机中后,此时客户端查询存储卡是否存在镜像文件,如果发现没有,那么立即将镜像文件写入存储卡中。 14. The method as claimed in claim 2, wherein the formatting for mobile / cell phone memory card event perform the following steps: during installation or initialization of the client, the client writes the image files to the memory card, the mobile phone identifies the image file recorded code information as a unique identifier; image file format only if the phone, the memory card found no client phones, mobile phone identification code is read and compared to the value before the recording; if yes, an automatic loader ; if not, do not do anything; if format the memory card, this card into the phone, in which case the client queries whether there is a memory card image file, if found not, then immediately written to the memory card image file in.
  15. 15、 如权利要求2所述的方法,其中针对客户端程序自动隐藏事件执行以下步骤:首次启动客户端,完成初始化配置之后,客户端自动隐藏,在系统后台运行,用户在手机自带文件系统中无法查看;输入缺省的特殊键盘组合,调出客户端入口界面; 输入密码进入客户端。 15. The method of claim 2, wherein for the client program automatically hide event perform the following steps: After the first time you start the client to complete the initial configuration, the client automatically hide, to run in the background, the phone comes with a user in the file system You can not see; the default input special keyboard combination to bring up the client entry interface; password to enter the client.
  16. 16、 如权利要求2所述的方法,其中手机数据迁移事件包括手机数据备份事件和手机数据恢复事件,针对手机数据备份/恢复事件执行以下歩骤:安装了客户端的手机向服务器发起备份/恢复数据请求; 服务器收到备份/恢复请求,根据识别信息进行鉴权; 如果通过鉴权,则响应此请求,安装了客户端的手机与服务器之间开始备份/恢复数据;如果没有通过鉴权,则服务器告知鉴权失败。 16. The method as claimed in claim 2, wherein the handset data migration events include cell phone data backup events and phone data recovery event for Mobile Data Backup / Restore events following ho steps of: mounting the client's mobile phone to the server to initiate a backup / restore data request; server receives a backup / restore request, according to identification information for authentication; if the authentication by, in response to this request, the installation start backup / restore data between the phone and the server client; if not pass the authentication, the server told authentication failure.
  17. 17、 如权利要求2所述的方法,其中手机数据迁移事件包括手机数据备份事件和手机数据恢复事件,针对手机数据恢复事件执行以下步骤:在web或Wap页面输入客户端密码进行身份确认,选择需要恢复的手机数据,发起请求;服务器响应请求,下发短信指令至安装了客户端的手机,客户端解析并执行相应指令。 17. A method as claimed in claim 2, wherein the event comprises a mobile phone handset data migration event data backup and data recovery event phone, perform the following steps for recovery event Mobile Data: password input client identification in the Wap or web page, select need to recover the mobile phone data, initiation request; the server responds to the request command issued to the SMS client installed on the phone, the client parses and executes the corresponding instructions.
  18. 18、 如权利要求16或17所述的方法,其中通过无线数据网络备份或恢复全部或部分手机数据。 18. The method as claimed in claim 16 or claim 17, wherein the wireless data network backup or restore all or part of the mobile phone data.
  19. 19、 一种保护手机中个人隐私的系统,包括客户端模块和服务器, 其中客户端模块包括:事件监控模块,事件处理模块,通信模块和手机数据更新、备份、恢复模块;服务器包括:通信模块、个人信息管理模块、备份/恢复模块。 19. A personal phone privacy protection systems, including client and server modules, where the client module include: event monitoring module, event processing module, communication module and mobile phone data update, backup, recovery module; server includes: a communication module , personal information management module, backup / restore module.
  20. 20、 如权利要求19所述的系统,其中事件处理模块负责所有手机事件的处理,包括手机卡信息处理模块、手机锁定/解锁模块、短信指令处理模块、文件数据处理模块、应用程序处理模块。 20. The system of claim 19, wherein the event processing module is responsible for handling all phone events, including phone card information processing module, the phone locking / unlocking module, SMS command processing module, a data file processing module, application processing module.
CN 200810115368 2008-06-23 2008-06-23 Method and system for protecting individual privacy in mobile phone CN101616495A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200810115368 CN101616495A (en) 2008-06-23 2008-06-23 Method and system for protecting individual privacy in mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200810115368 CN101616495A (en) 2008-06-23 2008-06-23 Method and system for protecting individual privacy in mobile phone

Publications (1)

Publication Number Publication Date
CN101616495A true true CN101616495A (en) 2009-12-30

Family

ID=41495796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200810115368 CN101616495A (en) 2008-06-23 2008-06-23 Method and system for protecting individual privacy in mobile phone

Country Status (1)

Country Link
CN (1) CN101616495A (en)

Cited By (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867650A (en) * 2010-05-21 2010-10-20 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting user behavior at operating terminal
CN101951570A (en) * 2010-08-25 2011-01-19 惠州Tcl移动通信有限公司 Short message box encrypting method for mobile phone and mobile phone
CN102122342A (en) * 2011-02-14 2011-07-13 惠州Tcl移动通信有限公司 Mobile phone password inputting method and mobile phone using same
CN102291715A (en) * 2010-06-18 2011-12-21 黄金富 The method of the protection of personal data and the corresponding mobile phone system
CN102387494A (en) * 2011-11-02 2012-03-21 中时瑞安(北京)网络科技有限责任公司 Android-mobile-platform-based remote automatic information exchange and control solution
CN102394968A (en) * 2011-09-16 2012-03-28 南鑫民 Safety protection system of mobile phone data
CN102411684A (en) * 2011-09-26 2012-04-11 奇智软件(北京)有限公司 Data protection method and device
CN102413456A (en) * 2011-09-02 2012-04-11 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN102685326A (en) * 2012-04-27 2012-09-19 深圳凯虹移动通信有限公司 Message encryption method and device and mobile terminal
CN102833712A (en) * 2012-08-31 2012-12-19 北京小米科技有限责任公司 Method, device, server and system for preventing information leakage and equipment
CN102999254A (en) * 2012-11-15 2013-03-27 东莞宇龙通信科技有限公司 Display control method and device for desktop icons
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
CN103067172A (en) * 2012-12-24 2013-04-24 珠海金山办公软件有限公司 Information safety management method and system
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal
CN103200169A (en) * 2013-01-30 2013-07-10 中国科学院自动化研究所 Method and system of user data protection based on proxy
CN103324887A (en) * 2013-07-05 2013-09-25 百度在线网络技术(北京)有限公司 Mobile terminal, security defense device thereof and security defense method thereof
CN103336924A (en) * 2013-07-03 2013-10-02 上海斐讯数据通信技术有限公司 Starting lock for mobile terminal application program
CN103365590A (en) * 2012-03-29 2013-10-23 三星电子株式会社 Devices and methods for unlocking a lock mode
CN103377332A (en) * 2012-04-26 2013-10-30 腾讯科技(深圳)有限公司 Application program accessing method and device
CN103488930A (en) * 2013-09-23 2014-01-01 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103488950A (en) * 2013-09-23 2014-01-01 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103530549A (en) * 2013-09-23 2014-01-22 北京奇虎科技有限公司 Method and device for processing document/application program on mobile communication terminal
CN103632107A (en) * 2012-08-23 2014-03-12 苏州慧盾信息安全科技有限公司 Mobile terminal information safety protection system and method
CN103795847A (en) * 2012-10-31 2014-05-14 三星电子(中国)研发中心 Method for applying traceless mode to communication terminal and communication terminal
CN103825999A (en) * 2012-11-19 2014-05-28 腾讯科技(深圳)有限公司 Application program function display method and device
WO2014082449A1 (en) * 2012-11-29 2014-06-05 小米科技有限责任公司 Method, device and apparatus for protecting privacy information
CN103888544A (en) * 2014-04-14 2014-06-25 北京工业大学 Android mobile phone remote information acquisition system and method
CN103929401A (en) * 2013-01-11 2014-07-16 深圳市腾讯计算机系统有限公司 Method and system for controlling modification of user's sensitive information
CN104053137A (en) * 2014-06-27 2014-09-17 可牛网络技术(北京)有限公司 Data recovery method and device
CN104091119A (en) * 2014-06-03 2014-10-08 深圳天珑无线科技有限公司 Mobile terminal as well as protection method and protection system of data in mobile terminal
CN104185174A (en) * 2014-07-17 2014-12-03 惠州Tcl移动通信有限公司 Encryption method and terminal
CN104507075A (en) * 2014-12-31 2015-04-08 徐雅星 Data protection method for loss of mobile terminal
CN104573536A (en) * 2015-01-28 2015-04-29 深圳市中兴移动通信有限公司 File protection method and device
CN104598831A (en) * 2014-12-05 2015-05-06 深圳天珑无线科技有限公司 Data security protection method and terminal
CN104955027A (en) * 2014-03-27 2015-09-30 中国移动通信集团公司 Terminal information protection method, system, network-side equipment and terminal
CN105430639A (en) * 2015-11-02 2016-03-23 小米科技有限责任公司 Information processing method and device
CN105872192A (en) * 2015-12-08 2016-08-17 乐视移动智能信息技术(北京)有限公司 Control method and device for mobile terminals
US9473936B2 (en) 2012-11-29 2016-10-18 Xiaomi Inc. Method and device for protecting privacy information
CN103457991B (en) * 2013-05-29 2017-03-15 北京奇虎科技有限公司 A terminal security system and method
US20170163816A1 (en) * 2015-12-08 2017-06-08 Le Holdings (Beijing) Co., Ltd. Mobile terminal and controlling method thereof
WO2017177789A1 (en) * 2016-04-11 2017-10-19 中兴通讯股份有限公司 Anti-theft method and device for mobile terminal
US9854444B2 (en) 2012-08-31 2017-12-26 Xiaomi Inc. Apparatus and methods for preventing information disclosure

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1621994A (en) * 2005-01-10 2005-06-01 北京太极英泰信息科技有限公司 Computer security control module and safeguard control method thereof
CN1933629A (en) * 2006-08-25 2007-03-21 华为技术有限公司 Method and device for protecting user storage information in mobile terminal
CN101039479A (en) * 2007-04-25 2007-09-19 中兴通讯股份有限公司 Handset anti-theft method
EP1883029A1 (en) * 2006-07-21 2008-01-30 Acer Incorporated Protection method for use in portable communication device
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system
CN101198119A (en) * 2006-12-09 2008-06-11 北京三星通信技术研究有限公司;三星电子株式会社 Automatic loss reporting method and portable terminal using the same

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1621994A (en) * 2005-01-10 2005-06-01 北京太极英泰信息科技有限公司 Computer security control module and safeguard control method thereof
EP1883029A1 (en) * 2006-07-21 2008-01-30 Acer Incorporated Protection method for use in portable communication device
CN1933629A (en) * 2006-08-25 2007-03-21 华为技术有限公司 Method and device for protecting user storage information in mobile terminal
CN101198119A (en) * 2006-12-09 2008-06-11 北京三星通信技术研究有限公司;三星电子株式会社 Automatic loss reporting method and portable terminal using the same
CN101039479A (en) * 2007-04-25 2007-09-19 中兴通讯股份有限公司 Handset anti-theft method
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system

Cited By (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867650A (en) * 2010-05-21 2010-10-20 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting user behavior at operating terminal
CN102291715B (en) * 2010-06-18 2015-11-25 黄金富 The method of the protection of personal data and the corresponding mobile phone system
CN102291715A (en) * 2010-06-18 2011-12-21 黄金富 The method of the protection of personal data and the corresponding mobile phone system
CN101951570A (en) * 2010-08-25 2011-01-19 惠州Tcl移动通信有限公司 Short message box encrypting method for mobile phone and mobile phone
CN102122342B (en) 2011-02-14 2014-04-02 惠州Tcl移动通信有限公司 Mobile phone password inputting method and mobile phone using same
CN102122342A (en) * 2011-02-14 2011-07-13 惠州Tcl移动通信有限公司 Mobile phone password inputting method and mobile phone using same
CN102413456A (en) * 2011-09-02 2012-04-11 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN102413456B (en) * 2011-09-02 2014-11-19 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN102394968A (en) * 2011-09-16 2012-03-28 南鑫民 Safety protection system of mobile phone data
CN102411684A (en) * 2011-09-26 2012-04-11 奇智软件(北京)有限公司 Data protection method and device
CN102411684B (en) * 2011-09-26 2015-01-07 奇智软件(北京)有限公司 Data protection method and device
CN102387494A (en) * 2011-11-02 2012-03-21 中时瑞安(北京)网络科技有限责任公司 Android-mobile-platform-based remote automatic information exchange and control solution
CN103365590A (en) * 2012-03-29 2013-10-23 三星电子株式会社 Devices and methods for unlocking a lock mode
CN103377332A (en) * 2012-04-26 2013-10-30 腾讯科技(深圳)有限公司 Application program accessing method and device
WO2013159725A1 (en) * 2012-04-26 2013-10-31 腾讯科技(深圳)有限公司 Method and apparatus for accessing application
CN103377332B (en) * 2012-04-26 2016-04-20 腾讯科技(深圳)有限公司 Method and apparatus for accessing an application
CN102685326A (en) * 2012-04-27 2012-09-19 深圳凯虹移动通信有限公司 Message encryption method and device and mobile terminal
CN103632107A (en) * 2012-08-23 2014-03-12 苏州慧盾信息安全科技有限公司 Mobile terminal information safety protection system and method
US9854444B2 (en) 2012-08-31 2017-12-26 Xiaomi Inc. Apparatus and methods for preventing information disclosure
CN102833712A (en) * 2012-08-31 2012-12-19 北京小米科技有限责任公司 Method, device, server and system for preventing information leakage and equipment
CN103795847A (en) * 2012-10-31 2014-05-14 三星电子(中国)研发中心 Method for applying traceless mode to communication terminal and communication terminal
CN102999254B (en) * 2012-11-15 2015-08-12 东莞宇龙通信科技有限公司 Display control method and apparatus of the desktop icons
CN102999254A (en) * 2012-11-15 2013-03-27 东莞宇龙通信科技有限公司 Display control method and device for desktop icons
CN103825999A (en) * 2012-11-19 2014-05-28 腾讯科技(深圳)有限公司 Application program function display method and device
US9473936B2 (en) 2012-11-29 2016-10-18 Xiaomi Inc. Method and device for protecting privacy information
WO2014082449A1 (en) * 2012-11-29 2014-06-05 小米科技有限责任公司 Method, device and apparatus for protecting privacy information
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
CN103067172A (en) * 2012-12-24 2013-04-24 珠海金山办公软件有限公司 Information safety management method and system
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal
CN103929401A (en) * 2013-01-11 2014-07-16 深圳市腾讯计算机系统有限公司 Method and system for controlling modification of user's sensitive information
CN103929401B (en) * 2013-01-11 2017-12-12 深圳市腾讯计算机系统有限公司 The method of controlling the user and system information modification sensitive
CN103200169A (en) * 2013-01-30 2013-07-10 中国科学院自动化研究所 Method and system of user data protection based on proxy
CN103457991B (en) * 2013-05-29 2017-03-15 北京奇虎科技有限公司 A terminal security system and method
CN103336924B (en) * 2013-07-03 2018-01-30 上海斐讯数据通信技术有限公司 For actuating the lock of the mobile terminal applications
CN103336924A (en) * 2013-07-03 2013-10-02 上海斐讯数据通信技术有限公司 Starting lock for mobile terminal application program
CN103324887B (en) * 2013-07-05 2016-12-28 百度在线网络技术(北京)有限公司 Security defense apparatus of the mobile terminal, method and a mobile terminal
CN103324887A (en) * 2013-07-05 2013-09-25 百度在线网络技术(北京)有限公司 Mobile terminal, security defense device thereof and security defense method thereof
CN103488950B (en) * 2013-09-23 2017-01-25 北京奇虎科技有限公司 Files on the mobile communication terminal / application processing method and apparatus
CN103488950A (en) * 2013-09-23 2014-01-01 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103530549B (en) * 2013-09-23 2016-08-24 北京奇虎科技有限公司 Files on the mobile communication terminal / application processing method and apparatus
CN103488930A (en) * 2013-09-23 2014-01-01 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103530549A (en) * 2013-09-23 2014-01-22 北京奇虎科技有限公司 Method and device for processing document/application program on mobile communication terminal
CN104955027A (en) * 2014-03-27 2015-09-30 中国移动通信集团公司 Terminal information protection method, system, network-side equipment and terminal
CN103888544A (en) * 2014-04-14 2014-06-25 北京工业大学 Android mobile phone remote information acquisition system and method
CN104091119A (en) * 2014-06-03 2014-10-08 深圳天珑无线科技有限公司 Mobile terminal as well as protection method and protection system of data in mobile terminal
CN104053137A (en) * 2014-06-27 2014-09-17 可牛网络技术(北京)有限公司 Data recovery method and device
CN104185174A (en) * 2014-07-17 2014-12-03 惠州Tcl移动通信有限公司 Encryption method and terminal
CN104598831B (en) * 2014-12-05 2018-08-21 深圳天珑无线科技有限公司 Kinds of data security protection method and terminal
CN104598831A (en) * 2014-12-05 2015-05-06 深圳天珑无线科技有限公司 Data security protection method and terminal
CN104507075A (en) * 2014-12-31 2015-04-08 徐雅星 Data protection method for loss of mobile terminal
CN104573536A (en) * 2015-01-28 2015-04-29 深圳市中兴移动通信有限公司 File protection method and device
CN105430639A (en) * 2015-11-02 2016-03-23 小米科技有限责任公司 Information processing method and device
CN105872192A (en) * 2015-12-08 2016-08-17 乐视移动智能信息技术(北京)有限公司 Control method and device for mobile terminals
WO2017096826A1 (en) * 2015-12-08 2017-06-15 乐视控股(北京)有限公司 Method and device for controlling mobile terminal
US20170163816A1 (en) * 2015-12-08 2017-06-08 Le Holdings (Beijing) Co., Ltd. Mobile terminal and controlling method thereof
WO2017177789A1 (en) * 2016-04-11 2017-10-19 中兴通讯股份有限公司 Anti-theft method and device for mobile terminal

Similar Documents

Publication Publication Date Title
US8248237B2 (en) System for mitigating the unauthorized use of a device
US20090247122A1 (en) System for monitoring the unauthorized use of a device
US20090249497A1 (en) Method for monitoring the unauthorized use of a device
US20090249460A1 (en) System for monitoring the unauthorized use of a device
US20090249443A1 (en) Method for monitoring the unauthorized use of a device
US20090253408A1 (en) Method for mitigating the unauthorized use of a device
US20130167207A1 (en) Network Acquired Behavioral Fingerprint for Authentication
US20130159699A1 (en) Password Recovery Service
US20090253410A1 (en) Method for mitigating the unauthorized use of a device
US20100062744A1 (en) Retrieving data wirelessly from a mobile device
US20090183254A1 (en) Computer Session Management Device and System
US20090253406A1 (en) System for mitigating the unauthorized use of a device
US20090298468A1 (en) System and method for deleting data in a communication device
US20120155643A1 (en) Secure protocol for peer-to-peer network
US20130091564A1 (en) Systems and methods for mitigating the unauthorized use of a device
US20090075630A1 (en) Method and Apparatus for Creating a Remotely Activated Secure Backup Service for Mobile Handsets
US20080280644A1 (en) Sim Messaging Client
US20120188064A1 (en) System and method for remotely initiating playing of sound on a mobile device
US20100014676A1 (en) Privacy management for tracked devices
US20120115441A1 (en) Methods and apparatus for access data recovery from a malfunctioning device
US20110154041A1 (en) Method to securely transfer user encryption keys and services between mobile devices
US20060095957A1 (en) System and method for providing a multi-credential authentication protocol
US20070021112A1 (en) Method and system for ensuring mobile data security
US20100227605A1 (en) Control Of A Remote Mobile Device
US20070056043A1 (en) Remote cell phone auto destruct

Legal Events

Date Code Title Description
C06 Publication
C10 Entry into substantive examination
C12 Rejection of a patent application after its publication