CN101867650A - Method and device for protecting user behavior at operating terminal - Google Patents
Method and device for protecting user behavior at operating terminal Download PDFInfo
- Publication number
- CN101867650A CN101867650A CN201010180372.9A CN201010180372A CN101867650A CN 101867650 A CN101867650 A CN 101867650A CN 201010180372 A CN201010180372 A CN 201010180372A CN 101867650 A CN101867650 A CN 101867650A
- Authority
- CN
- China
- Prior art keywords
- behavior
- user
- operation behavior
- application
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention, applicable to the technical field of communication, provides a method and a device for protecting the user behavior at an operating terminal. The method comprises the following steps: receiving an inputted instruction for entering an operating behavior protection mode, and controlling a terminal to enter the operating behavior protection mode according to the instruction, wherein the instruction for entering the operating behavior protection mode is particularly one instruction or the combination of various instructions preset in a triggering/switching strategy library for switching the terminal to the operating behavior protection mode; detecting the current operating behavior of a user or the application run by a system; and carrying out the corresponding protection treatment on the current operating behavior of the user of the application run by the system according to the treatment mode preset in the treatment scheme strategy library when the behavior or application preset in an operating target strategy library is operated by the user and run by the system. Accordingly, the invention can carry out the personalized data protection on the operating behavior of the user and various applications run by the system, thus ensuring higher expandability and flexibility.
Description
Technical field
The invention belongs to communication technical field, relate in particular to the method and the device of a kind of user's of protection operating terminal behavior.
Background technology
Existing terminal, such as mobile communication terminal, generally be earlier by the artificial private contact of concrete contact in the address list is set, and then according to this concrete contact person's telephone number and email address, the information of carrying out the phone numbers associated (or addresses of items of mail) in related application (as information, message registration, mail, fast the dial etc.) data is carried out secret and is hidden.
Prior art is mainly around concrete private contact (telephone number, email address), come the data of related application are hidden processing by strong associated phone number and mailbox, in addition, must manually delete, guarantee privacy of user the data that concrete application has produced.
Summary of the invention
The object of the present invention is to provide the method for a kind of user's of protection operating terminal behavior; be intended to solve prior art when the behavior of protection user operating terminal, must come problem that the data of related application are hidden processing and must manually be deleted the data that concrete application has produced by strong associated phone number and mailbox.
The present invention is achieved in that the method for a kind of user's of protection operating terminal behavior, and described method comprises the steps:
Receive the instruction that enters the operation behavior protected mode of input, enter the operation behavior protected mode according to this commands for controlling terminal, the described instruction that enters the operation behavior protected mode is that the terminal that makes that is provided with in triggering the switchover policy storehouse in advance switches to one or more combination in the instruction of operation behavior protected mode;
Detect the application that current operation behavior of user or system are moving;
When the user is operating or system is just setting in advance in operation target strategy storehouse behavior or when using, the application that behavior of described user being operated according to the processing mode that sets in advance in the processing scheme policy library or system are moving is carried out corresponding protection and is handled.
Another object of the present invention is to provide the device of a kind of user's of protection operating terminal behavior, described device comprises:
The switching command receiving element, be used to receive the instruction that enters the operation behavior protected mode of input, enter the operation behavior protected mode according to this commands for controlling terminal, the described instruction that enters the operation behavior protected mode is that the terminal that makes that is provided with in triggering the switchover policy storehouse in advance switches to one or more combination in the instruction of operation behavior protected mode;
The current behavior detecting unit is used to detect the application that current operation behavior of user or system are moving;
The protection processing unit; be used for when the user is operating or system is just setting in advance in operation target strategy storehouse behavior or when using, the application that behavior of described user being operated according to the processing mode that sets in advance in the processing scheme policy library or system are moving is carried out corresponding protection and is handled.
In the present invention; by setting in advance a series of policy librarys; comprise and presetting or self-defined " triggering the switchover policy storehouse " that switches to protected mode; preset or " the Action Target policy library " of the application of self-defined concrete protection or behavior and preset or self-defined " the processing scheme policy library " of concrete application or behavior being protected the action of processing; in the instruction that receives be in " trigger switchover policy storehouse " switch to the switching command of protected mode the time; judge whether the application that operation behavior that the user is current or system are moving is the operation behavior or the application of presetting in " Action Target policy library "; if; then the application that the current operation behavior of user or system is being moved according to preset protection processing mode in " processing scheme policy library " is carried out corresponding protection and is handled; owing to " trigger the switchover policy storehouse "; " Action Target policy library " and " processing scheme policy library " all can set in advance as required voluntarily, so can carry out the data protection of individual character at the different application of user's operation behavior or system's operation flexibly.
Description of drawings
Fig. 1 is the FB(flow block) of the method for the protection user operating terminal behavior that provides of the embodiment of the invention;
Fig. 2 is the structured flowchart of the device of the protection user operating terminal behavior that provides of the embodiment of the invention.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with drawings and Examples.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
In embodiments of the present invention; by setting in advance a series of policy librarys; comprise and presetting or self-defined " triggering the switchover policy storehouse " that switches to protected mode; preset or " the Action Target policy library " of the application of self-defined concrete protection or behavior and preset or self-defined " the processing scheme policy library " of concrete application or behavior being protected the action of processing; in the instruction that receives be in " trigger switchover policy storehouse " switch to the switching command of protected mode the time; judge whether the application that operation behavior that the user is current or system are moving is the operation behavior or the application of presetting in " Action Target policy library "; if; then the application that the current operation behavior of user or system is being moved according to preset protection processing mode in " processing scheme policy library " is carried out corresponding protection and is handled; owing to " trigger the switchover policy storehouse "; " Action Target policy library " and " processing scheme policy library " all can set in advance as required voluntarily, so can carry out the data protection of individual character at the different application of user's operation behavior or system's operation flexibly.
Fig. 1 is the flow chart of the method for the protection user operating terminal behavior that provides of the embodiment of the invention, and details are as follows:
In step S101; receive the instruction that enters the operation behavior protected mode of input; enter the operation behavior protected mode according to this commands for controlling terminal, the described instruction that enters the operation behavior protected mode is that the terminal that makes that is provided with in triggering the switchover policy storehouse in advance switches to one or more combination in the instruction of operation behavior protected mode.
As one embodiment of the present of invention, set in advance (or self-defined) and trigger the switchover policy storehouse, store the trigger condition that protected mode is switched of carrying out that sets in advance or define in this storehouse, enter the protected mode of operation behavior by this condition triggering terminal.Can carry out the selection of multinomial trigger condition in the triggering switchover policy storehouse of user's operation behavior protection: the slip that the input password carries out mode switch, screen specific position carries out that mode switch, voice password are switched, fingerprint recognition is switched, iris verify, all kinds of switching modes (trigger condition can be one or more of above-mentioned trigger condition) are switched or the like in the acceleration transducer triggering; in addition, the trigger action behavior of switching back normal mode also can be set simultaneously.In embodiments of the present invention; triggering the switching condition that presets (or self-defined) operation fuzzy pattern in the switchover policy storehouse is " severe is rocked terminal "; when the severe that receives user input when terminal is rocked the instruction of terminal; switching working mode is a protected mode; in addition, be provided with to switch and get back to normal mode and also can adopt the instruction identical " severe is rocked terminal " with switching to protected mode.Wherein, triggering the switchover policy storehouse can carry out the upgrading of tactful content and augment by modes such as server or operation service packs.
In step S102, detect the application that current operation behavior of user or system are moving.
In step S103; when the user is operating or system is just setting in advance in operation target strategy storehouse behavior or when using, the application that behavior of described user being operated according to the processing mode that sets in advance in the processing scheme policy library or system are moving is carried out corresponding protection and is handled.
As one embodiment of the present of invention, setting in advance (or self-defined) needs protected operation behavior or uses and the concrete data that produce etc. of using).Can carry out the selection of multi-mode operation behavior and application in the Action Target policy library of user's operation behavior protection, comprise: communication process; receive and send messages; receiving and dispatching mail; WEB/WAP browses record; the historical record of search; the self-defined dictionary that input method produces (contains associational word; word frequency is adjusted); schedule; security software browsing data; the data that navigation is searched; the notepad record data; the application (Action Target can be one or more operation behaviors and the application that sets in advance or define in the Action Target policy library) that produces all kinds of record data after operation behavior or the operation related application appears in all terminals in recording data etc. basically.When system detects the behavior that the user is operating or system is just setting in advance or uses in operation target strategy storehouse, the corresponding protection processing is carried out in described user is operating or system is moving operation behavior or application according to the processing mode that sets in advance in the processing scheme policy library.Wherein set in advance (or self-defined) in the processing scheme policy library and handle concrete operations behavior or the concrete processing method of using.Wherein, being applied under the protected mode state of user's operation behavior or system's operation; in the selection handled of several data that set in advance (or self-defined) of processing scheme policy library, comprising: fully the deletion action record, hide in operation note (needing manner of decryption to consult), the backup expansion card, in the backup server or the like processing mode.Wherein, Action Target policy library and processing scheme policy library all can carry out the upgrading of tactful content and augment by server or mode such as operation service packs etc.
Be a concrete application example of the embodiment of the invention below, concrete steps are as follows:
1, preset in the policy library (or self-defined) as follows:
The instruction that switches to protected mode is set in " trigger switchover policy storehouse " is " severe is rocked terminal ", in addition, be provided with to switch and get back to normal mode and also can adopt instruction " severe is rocked terminal "; It is " communication process " that the operation behavior that need protect is set in " Action Target policy library "; The protection processing mode that " communication process " carried out is set in " processing scheme policy library " is " deletion action record fully ".
2, by " severe is rocked terminal ", the control terminal switching enters in user's operation behavior protected mode state.
3, afterwards, 07558330119 incoming call, terminal is answered, and writes down a remark information in notepad
4, check message registration, wherein 07558330119 the incoming call record, handle by " the deletion action record fully " that be provided with in the processing scheme policy library, automatically deleted, check notepad, the new recorded data that increases newly before wherein possessing (because of the application strategy that is not provided with in the policy library notepad).
5,, normal mode is got back in the terminal switching again by " severe is rocked terminal ".
The structured flowchart of the device of the protection user operating terminal behavior that Fig. 2 provides for the embodiment of the invention for convenience of explanation, only shows the relevant part of the embodiment of the invention.Wherein, the device of this protection user operating terminal behavior can be the software unit that is built in terminal, the unit of hardware cell or soft or hard combination, and this terminal can be mobile communication terminal, PC terminal etc.In the present embodiment, this device comprises: switching command receiving element 21, current behavior detecting unit 22 and protection processing unit 23.
Wherein, switching command receiving element 21 receives the instruction that enters the operation behavior protected mode of input, enter the operation behavior protected mode according to this commands for controlling terminal, the described instruction that enters the operation behavior protected mode is that the terminal that makes that is provided with in triggering the switchover policy storehouse in advance switches to one or more combination in the instruction of operation behavior protected mode;
The application that operation behavior that current behavior detecting unit 22 detection users are current or system are moving;
In addition, this device also comprises: switching command is provided with unit, protection Target Setting unit and processing mode the unit is set.
Wherein, switching command is provided with the unit and is used for being provided with in triggering switchover policy storehouse in advance making terminal switch to the instruction of operation behavior protected mode, and described instruction comprises: one or more during the slip of input password, screen specific position, voice password, fingerprint recognition, iris checking, acceleration transducer trigger;
Protection Target Setting unit is used in advance at the Action Target policy library user's operation behavior that need protect or the application of system's operation being set, and the application of user's operation behavior that described needs are protected or system's operation comprises: communication process, receive and send messages, in the data that historical record that receiving and dispatching mail, WEB/WAP are browsed record, search, self-defined dictionary, schedule, security software browsing data, navigation that input method produces are searched, notepad record data, the data of recording one or more;
Processing mode is provided with the unit and is used in advance at the processing scheme policy library processing mode to the application of user's operation behavior or system's operation being set, and the processing mode of described application to user's operation behavior or system's operation comprises: fully the deletion action record, hide in operation note, the backup expansion card, in the backup server one or more.Concrete condition does not repeat them here as mentioned above.
In embodiments of the present invention; by setting in advance a series of policy librarys; comprise and presetting or self-defined " triggering the switchover policy storehouse " that switches to protected mode; preset or " the Action Target policy library " of the application of self-defined concrete protection or behavior and preset or self-defined " the processing scheme policy library " of concrete application or behavior being protected the action of processing; in the instruction that receives be in " trigger switchover policy storehouse " switch to the switching command of protected mode the time; judge whether the application that operation behavior that the user is current or system are moving is the operation behavior or the application of presetting in " Action Target policy library "; if; then the application that automatically the current operation behavior of user or system is being moved according to preset protection processing mode in " processing scheme policy library " is carried out corresponding protection and is handled; do not need manual operations; owing to " trigger the switchover policy storehouse "; " Action Target policy library " and " processing scheme policy library " all can set in advance as required voluntarily; so can carry out the data protection of individual character at the different application of user's operation behavior or system's operation flexibly; in addition; the present invention is because the setting in each policy library is the switching behavior that concrete refinement is decomposed; the protection target; processing mode; and can conveniently use the later stage and increase service packs and network upgrade policy library and replenish and expand; possesses bigger autgmentability; in addition; terminal can preset strategy by several typical modules; also can possess bigger flexibility by the User Defined strategy protocol.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. a method of protecting the behavior of user's operating terminal is characterized in that, described method comprises the steps:
Receive the instruction that enters the operation behavior protected mode of input, enter the operation behavior protected mode according to this commands for controlling terminal, the described instruction that enters the operation behavior protected mode is that the terminal that makes that is provided with in triggering the switchover policy storehouse in advance switches to one or more combination in the instruction of operation behavior protected mode;
Detect the application that current operation behavior of user or system are moving;
When the user is operating or system is just setting in advance in operation target strategy storehouse behavior or when using, the application that behavior of described user being operated according to the processing mode that sets in advance in the processing scheme policy library or system are moving is carried out corresponding protection and is handled.
2. the method for claim 1 is characterized in that, in the instruction that enters the operation behavior protected mode of described reception input, enters before the step of operation behavior protected mode according to this commands for controlling terminal, and described method also comprises the steps:
Being provided with in triggering the switchover policy storehouse in advance makes terminal switch to the instruction of operation behavior protected mode;
The application of the user's operation behavior that need protect or system operation is set in the Action Target policy library in advance;
Processing mode to the application of user's operation behavior or system's operation is set in the processing scheme policy library in advance.
3. method as claimed in claim 2; it is characterized in that the described instruction that makes terminal switch to the operation behavior protected mode comprises: one or more during the slip of input password, screen specific position, voice password, fingerprint recognition, iris checking, acceleration transducer trigger.
4. method as claimed in claim 2; it is characterized in that the application of user's operation behavior that described needs are protected or system operation comprises: communication process, receive and send messages, in the data that historical record that receiving and dispatching mail, WEB/WAP are browsed record, search, self-defined dictionary, schedule, security software browsing data, navigation that input method produces are searched, notepad record data, the data of recording one or more.
5. method as claimed in claim 2 is characterized in that, the processing mode of described application to the operation of user's operation behavior or system comprises: fully the deletion action record, hide in operation note, the backup expansion card, in the backup server one or more.
6. a device of protecting the behavior of user's operating terminal is characterized in that, described device comprises:
The switching command receiving element, be used to receive the instruction that enters the operation behavior protected mode of input, enter the operation behavior protected mode according to this commands for controlling terminal, the described instruction that enters the operation behavior protected mode is that the terminal that makes that is provided with in triggering the switchover policy storehouse in advance switches to one or more combination in the instruction of operation behavior protected mode;
The current behavior detecting unit is used to detect the application that current operation behavior of user or system are moving;
The protection processing unit; be used for when the user is operating or system is just setting in advance in operation target strategy storehouse behavior or when using, the application that behavior of described user being operated according to the processing mode that sets in advance in the processing scheme policy library or system are moving is carried out corresponding protection and is handled.
7. device as claimed in claim 6 is characterized in that, described device also comprises:
Switching command is provided with the unit, is used for being provided with in triggering switchover policy storehouse in advance making terminal switch to the instruction of operation behavior protected mode;
Protection Target Setting unit is used in advance at the Action Target policy library user's operation behavior that need protect or the application of system's operation being set;
Processing mode is provided with the unit, is used in advance at the processing scheme policy library processing mode to the application of user's operation behavior or system's operation being set.
8. device as claimed in claim 7; it is characterized in that the described instruction that makes terminal switch to the operation behavior protected mode comprises: one or more during the slip of input password, screen specific position, voice password, fingerprint recognition, iris checking, acceleration transducer trigger.
9. device as claimed in claim 7; it is characterized in that the application of user's operation behavior that described needs are protected or system operation comprises: communication process, receive and send messages, in the data that historical record that receiving and dispatching mail, WEB/WAP are browsed record, search, self-defined dictionary, schedule, security software browsing data, navigation that input method produces are searched, notepad record data, the data of recording one or more.
10. device as claimed in claim 7, it is characterized in that the processing mode of described application to the operation of user's operation behavior or system comprises: fully the deletion action record, hide in operation note, the backup expansion card, in the backup server one or more.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010180372.9A CN101867650A (en) | 2010-05-21 | 2010-05-21 | Method and device for protecting user behavior at operating terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010180372.9A CN101867650A (en) | 2010-05-21 | 2010-05-21 | Method and device for protecting user behavior at operating terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101867650A true CN101867650A (en) | 2010-10-20 |
Family
ID=42959205
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010180372.9A Pending CN101867650A (en) | 2010-05-21 | 2010-05-21 | Method and device for protecting user behavior at operating terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101867650A (en) |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102354360A (en) * | 2011-08-18 | 2012-02-15 | 中兴通讯股份有限公司 | Device, terminal and method for preventing illegal updating of terminal |
CN102664989A (en) * | 2012-03-26 | 2012-09-12 | 中国联合网络通信集团有限公司 | Data processing method of terminal lexicon, apparatus and terminal thereof |
CN102843458A (en) * | 2011-06-23 | 2012-12-26 | 腾讯科技(深圳)有限公司 | Method and device for calling business application during call |
CN103179254A (en) * | 2011-12-23 | 2013-06-26 | 宇龙计算机通信科技(深圳)有限公司 | Desktop system accessing method and mobile terminal |
CN103207955A (en) * | 2012-01-11 | 2013-07-17 | 联想(北京)有限公司 | Method and system for protecting electronic terminal and electronic terminal |
CN103425424A (en) * | 2012-05-22 | 2013-12-04 | 北京蒙恬科技有限公司 | Handwriting input word selecting system and method |
CN103488942A (en) * | 2013-09-23 | 2014-01-01 | 北京奇虎科技有限公司 | Method and device for processing file/application program on mobile communication terminal |
CN103488950A (en) * | 2013-09-23 | 2014-01-01 | 北京奇虎科技有限公司 | Method and device for processing file/application program on mobile communication terminal |
CN103514396A (en) * | 2013-09-23 | 2014-01-15 | 北京奇虎科技有限公司 | Processing method and device for file / application program on mobile communication terminal |
CN103516753A (en) * | 2012-06-25 | 2014-01-15 | 北京新媒传信科技有限公司 | Method, server, and terminal for realizing data transmission |
CN103581439A (en) * | 2013-10-25 | 2014-02-12 | 福建伊时代信息科技股份有限公司 | Device and method for fast deleting record |
CN103595536A (en) * | 2013-11-13 | 2014-02-19 | 广东欧珀移动通信有限公司 | Password protection method and terminal based on voice recognition |
CN103679001A (en) * | 2013-12-06 | 2014-03-26 | 北京奇虎科技有限公司 | Method and device for controlling behaviors of application program in mobile communication terminal |
CN103795847A (en) * | 2012-10-31 | 2014-05-14 | 三星电子(中国)研发中心 | Method for applying traceless mode to communication terminal and communication terminal |
CN104008346A (en) * | 2013-02-27 | 2014-08-27 | 腾讯科技(深圳)有限公司 | Method and device for starting privacy mode of data processing device |
CN104200144A (en) * | 2014-09-05 | 2014-12-10 | 可牛网络技术(北京)有限公司 | Method and system for improving safety of mobile terminal |
CN104680091A (en) * | 2013-11-28 | 2015-06-03 | 英业达科技有限公司 | Mobile device protection system and method |
CN105007276A (en) * | 2015-07-29 | 2015-10-28 | 广东欧珀移动通信有限公司 | Safety verification method and system |
CN103595536B (en) * | 2013-11-13 | 2016-11-30 | 广东欧珀移动通信有限公司 | A kind of cipher code protection method based on speech recognition and terminal |
CN106203153A (en) * | 2016-06-23 | 2016-12-07 | 珠海市魅族科技有限公司 | A kind of information access control method and device |
CN106529257A (en) * | 2016-11-25 | 2017-03-22 | 维沃移动通信有限公司 | Information processing method and mobile terminal |
CN106650498A (en) * | 2016-12-28 | 2017-05-10 | 太仓红码软件技术有限公司 | Search engine history hiding method based on network security |
CN106778177A (en) * | 2016-12-28 | 2017-05-31 | 太仓红码软件技术有限公司 | A kind of search engine historical record security processing based on fingerprint monitoring |
CN107292148A (en) * | 2016-03-31 | 2017-10-24 | 宇龙计算机通信科技(深圳)有限公司 | A kind of Working mode switching method and user terminal |
WO2018018787A1 (en) * | 2016-07-28 | 2018-02-01 | 中兴通讯股份有限公司 | Password authentication method and device, mobile terminal, and computer storage medium |
CN109074171A (en) * | 2017-05-16 | 2018-12-21 | 华为技术有限公司 | Input method and electronic equipment |
WO2020103544A1 (en) * | 2018-11-23 | 2020-05-28 | Oppo广东移动通信有限公司 | Application starting method and related device |
US10936728B2 (en) | 2017-02-23 | 2021-03-02 | Red Hat, Inc. | Non-persistent mode for network connection |
US11025621B2 (en) | 2017-02-24 | 2021-06-01 | Red Hat, Inc. | Enhancing privacy of network connections |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1933629A (en) * | 2006-08-25 | 2007-03-21 | 华为技术有限公司 | Method and device for protecting user storage information in mobile terminal |
CN1968467A (en) * | 2006-06-21 | 2007-05-23 | 华为技术有限公司 | Mobile terminal and terminal user information protection method |
CN1980427A (en) * | 2005-11-30 | 2007-06-13 | 中兴通讯股份有限公司 | Device for mobile terminal to automatically deleting information, and method thereof |
WO2008137160A1 (en) * | 2007-05-07 | 2008-11-13 | Biap, Inc. | Providing personalized resources on-demand over a broadband network to consumer device applications |
CN101389100A (en) * | 2008-10-24 | 2009-03-18 | Tcl天一移动通信(深圳)有限公司 | Personal information protecting method for mobile communication terminal equipment |
CN101610309A (en) * | 2009-06-26 | 2009-12-23 | 宇龙计算机通信科技(深圳)有限公司 | A kind of portable terminal mode switch control method, system and portable terminal |
CN101616495A (en) * | 2008-06-23 | 2009-12-30 | 网秦无限(北京)科技有限公司 | The method and system of individual privacy in the protection mobile phone |
-
2010
- 2010-05-21 CN CN201010180372.9A patent/CN101867650A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1980427A (en) * | 2005-11-30 | 2007-06-13 | 中兴通讯股份有限公司 | Device for mobile terminal to automatically deleting information, and method thereof |
CN1968467A (en) * | 2006-06-21 | 2007-05-23 | 华为技术有限公司 | Mobile terminal and terminal user information protection method |
CN1933629A (en) * | 2006-08-25 | 2007-03-21 | 华为技术有限公司 | Method and device for protecting user storage information in mobile terminal |
WO2008137160A1 (en) * | 2007-05-07 | 2008-11-13 | Biap, Inc. | Providing personalized resources on-demand over a broadband network to consumer device applications |
CN101616495A (en) * | 2008-06-23 | 2009-12-30 | 网秦无限(北京)科技有限公司 | The method and system of individual privacy in the protection mobile phone |
CN101389100A (en) * | 2008-10-24 | 2009-03-18 | Tcl天一移动通信(深圳)有限公司 | Personal information protecting method for mobile communication terminal equipment |
CN101610309A (en) * | 2009-06-26 | 2009-12-23 | 宇龙计算机通信科技(深圳)有限公司 | A kind of portable terminal mode switch control method, system and portable terminal |
Cited By (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102843458A (en) * | 2011-06-23 | 2012-12-26 | 腾讯科技(深圳)有限公司 | Method and device for calling business application during call |
CN102354360A (en) * | 2011-08-18 | 2012-02-15 | 中兴通讯股份有限公司 | Device, terminal and method for preventing illegal updating of terminal |
CN102354360B (en) * | 2011-08-18 | 2016-12-14 | 中兴通讯股份有限公司 | A kind of prevent the equipment of terminal illegal update, terminal and method |
CN103179254A (en) * | 2011-12-23 | 2013-06-26 | 宇龙计算机通信科技(深圳)有限公司 | Desktop system accessing method and mobile terminal |
CN103179254B (en) * | 2011-12-23 | 2015-04-01 | 宇龙计算机通信科技(深圳)有限公司 | Desktop system accessing method and mobile terminal |
CN103207955A (en) * | 2012-01-11 | 2013-07-17 | 联想(北京)有限公司 | Method and system for protecting electronic terminal and electronic terminal |
CN103207955B (en) * | 2012-01-11 | 2016-12-14 | 联想(北京)有限公司 | A kind of method and system protecting electric terminal and a kind of electric terminal |
CN102664989A (en) * | 2012-03-26 | 2012-09-12 | 中国联合网络通信集团有限公司 | Data processing method of terminal lexicon, apparatus and terminal thereof |
CN103425424A (en) * | 2012-05-22 | 2013-12-04 | 北京蒙恬科技有限公司 | Handwriting input word selecting system and method |
CN103516753A (en) * | 2012-06-25 | 2014-01-15 | 北京新媒传信科技有限公司 | Method, server, and terminal for realizing data transmission |
CN103795847A (en) * | 2012-10-31 | 2014-05-14 | 三星电子(中国)研发中心 | Method for applying traceless mode to communication terminal and communication terminal |
CN104008346A (en) * | 2013-02-27 | 2014-08-27 | 腾讯科技(深圳)有限公司 | Method and device for starting privacy mode of data processing device |
CN103488950B (en) * | 2013-09-23 | 2017-01-25 | 北京奇虎科技有限公司 | Method and device for processing file/application program on mobile communication terminal |
CN103514396A (en) * | 2013-09-23 | 2014-01-15 | 北京奇虎科技有限公司 | Processing method and device for file / application program on mobile communication terminal |
CN103488950A (en) * | 2013-09-23 | 2014-01-01 | 北京奇虎科技有限公司 | Method and device for processing file/application program on mobile communication terminal |
CN103488942A (en) * | 2013-09-23 | 2014-01-01 | 北京奇虎科技有限公司 | Method and device for processing file/application program on mobile communication terminal |
CN103581439A (en) * | 2013-10-25 | 2014-02-12 | 福建伊时代信息科技股份有限公司 | Device and method for fast deleting record |
CN103595536A (en) * | 2013-11-13 | 2014-02-19 | 广东欧珀移动通信有限公司 | Password protection method and terminal based on voice recognition |
CN103595536B (en) * | 2013-11-13 | 2016-11-30 | 广东欧珀移动通信有限公司 | A kind of cipher code protection method based on speech recognition and terminal |
CN104680091B (en) * | 2013-11-28 | 2017-11-14 | 英业达科技有限公司 | Mobile device protects system and method |
CN104680091A (en) * | 2013-11-28 | 2015-06-03 | 英业达科技有限公司 | Mobile device protection system and method |
CN103679001A (en) * | 2013-12-06 | 2014-03-26 | 北京奇虎科技有限公司 | Method and device for controlling behaviors of application program in mobile communication terminal |
CN104200144A (en) * | 2014-09-05 | 2014-12-10 | 可牛网络技术(北京)有限公司 | Method and system for improving safety of mobile terminal |
US10515203B2 (en) | 2014-09-05 | 2019-12-24 | Conew Network Technology (Beijing) Co., Ltd. | Method and system for improving security of a mobile terminal |
CN105007276A (en) * | 2015-07-29 | 2015-10-28 | 广东欧珀移动通信有限公司 | Safety verification method and system |
CN107292148A (en) * | 2016-03-31 | 2017-10-24 | 宇龙计算机通信科技(深圳)有限公司 | A kind of Working mode switching method and user terminal |
CN106203153A (en) * | 2016-06-23 | 2016-12-07 | 珠海市魅族科技有限公司 | A kind of information access control method and device |
WO2018018787A1 (en) * | 2016-07-28 | 2018-02-01 | 中兴通讯股份有限公司 | Password authentication method and device, mobile terminal, and computer storage medium |
CN106529257B (en) * | 2016-11-25 | 2019-08-20 | 维沃移动通信有限公司 | A kind of information processing method and mobile terminal |
CN106529257A (en) * | 2016-11-25 | 2017-03-22 | 维沃移动通信有限公司 | Information processing method and mobile terminal |
CN106778177B (en) * | 2016-12-28 | 2020-05-22 | 北京人民在线网络有限公司 | Search engine historical record safety processing method based on fingerprint monitoring |
CN106650498A (en) * | 2016-12-28 | 2017-05-10 | 太仓红码软件技术有限公司 | Search engine history hiding method based on network security |
CN106778177A (en) * | 2016-12-28 | 2017-05-31 | 太仓红码软件技术有限公司 | A kind of search engine historical record security processing based on fingerprint monitoring |
CN106650498B (en) * | 2016-12-28 | 2020-04-24 | 上海移卓网络科技有限公司 | Search engine historical record hiding method based on network security |
US10936728B2 (en) | 2017-02-23 | 2021-03-02 | Red Hat, Inc. | Non-persistent mode for network connection |
US11025621B2 (en) | 2017-02-24 | 2021-06-01 | Red Hat, Inc. | Enhancing privacy of network connections |
CN109074171A (en) * | 2017-05-16 | 2018-12-21 | 华为技术有限公司 | Input method and electronic equipment |
CN109074171B (en) * | 2017-05-16 | 2021-03-30 | 华为技术有限公司 | Input method and electronic equipment |
US11086975B2 (en) | 2017-05-16 | 2021-08-10 | Huawei Technologies Co., Ltd. | Input method and electronic device |
US11625468B2 (en) | 2017-05-16 | 2023-04-11 | Huawei Technologies Co., Ltd. | Input method and electronic device |
WO2020103544A1 (en) * | 2018-11-23 | 2020-05-28 | Oppo广东移动通信有限公司 | Application starting method and related device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101867650A (en) | Method and device for protecting user behavior at operating terminal | |
CN101163347B (en) | Method and equipment for remote control mobile terminal | |
CN101110853B (en) | Portable communication equipment with loss protection function and loss protection method thereof | |
CN103220637A (en) | Mobile phone anti-theft protection method and mobile phone anti-theft protection device | |
CN104980327A (en) | Information push method and device | |
CN101523879A (en) | Method and system for associating a user profile to a caller identifier | |
CN104601818A (en) | Method and device for switching operating systems in communication process | |
CN102457606A (en) | Mobile phone and anti-theft method thereof | |
CN101384048A (en) | Information managing method and mobile terminal | |
CN106201783B (en) | A kind of data reconstruction method and device | |
CN106105168B (en) | Call forwarding method, terminal and portable electronic equipment | |
CN101610500A (en) | Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system | |
CN102946482A (en) | Method for detecting user terminal and user terminal | |
CN102810139A (en) | Secure data operation method and communication terminal | |
CN107197074A (en) | Book management method, device, storage medium and electronic equipment | |
CN107193662A (en) | A kind of information synchronization method and mobile terminal based on dual system | |
CN103458394A (en) | Mobile terminal, processing method and processing device for internal information of mobile terminal | |
JP2007312115A (en) | Mobile communication terminal device | |
CN101950233A (en) | Be used to eliminate the system and method for stroke input ambiguity | |
CN110706705A (en) | Voice control method, terminal and computer storage medium | |
CN102088694B (en) | Mobile terminal and method for downloading subscriber identity module (SIM) application | |
CN106874096A (en) | Application management method and mobile terminal based on dual system | |
CN110944318A (en) | Lock card setting method and device, storage medium and terminal | |
CN103377072A (en) | Interception processing method and mobile terminal | |
CN106502809B (en) | A kind of multi-platform application program adaptation method, device and terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20101020 |