CN101867650A - Method and device for protecting user behavior at operating terminal - Google Patents

Method and device for protecting user behavior at operating terminal Download PDF

Info

Publication number
CN101867650A
CN101867650A CN201010180372.9A CN201010180372A CN101867650A CN 101867650 A CN101867650 A CN 101867650A CN 201010180372 A CN201010180372 A CN 201010180372A CN 101867650 A CN101867650 A CN 101867650A
Authority
CN
China
Prior art keywords
behavior
user
operation behavior
application
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201010180372.9A
Other languages
Chinese (zh)
Inventor
郦伟强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201010180372.9A priority Critical patent/CN101867650A/en
Publication of CN101867650A publication Critical patent/CN101867650A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention, applicable to the technical field of communication, provides a method and a device for protecting the user behavior at an operating terminal. The method comprises the following steps: receiving an inputted instruction for entering an operating behavior protection mode, and controlling a terminal to enter the operating behavior protection mode according to the instruction, wherein the instruction for entering the operating behavior protection mode is particularly one instruction or the combination of various instructions preset in a triggering/switching strategy library for switching the terminal to the operating behavior protection mode; detecting the current operating behavior of a user or the application run by a system; and carrying out the corresponding protection treatment on the current operating behavior of the user of the application run by the system according to the treatment mode preset in the treatment scheme strategy library when the behavior or application preset in an operating target strategy library is operated by the user and run by the system. Accordingly, the invention can carry out the personalized data protection on the operating behavior of the user and various applications run by the system, thus ensuring higher expandability and flexibility.

Description

A kind of method and device of protecting the behavior of user's operating terminal
Technical field
The invention belongs to communication technical field, relate in particular to the method and the device of a kind of user's of protection operating terminal behavior.
Background technology
Existing terminal, such as mobile communication terminal, generally be earlier by the artificial private contact of concrete contact in the address list is set, and then according to this concrete contact person's telephone number and email address, the information of carrying out the phone numbers associated (or addresses of items of mail) in related application (as information, message registration, mail, fast the dial etc.) data is carried out secret and is hidden.
Prior art is mainly around concrete private contact (telephone number, email address), come the data of related application are hidden processing by strong associated phone number and mailbox, in addition, must manually delete, guarantee privacy of user the data that concrete application has produced.
Summary of the invention
The object of the present invention is to provide the method for a kind of user's of protection operating terminal behavior; be intended to solve prior art when the behavior of protection user operating terminal, must come problem that the data of related application are hidden processing and must manually be deleted the data that concrete application has produced by strong associated phone number and mailbox.
The present invention is achieved in that the method for a kind of user's of protection operating terminal behavior, and described method comprises the steps:
Receive the instruction that enters the operation behavior protected mode of input, enter the operation behavior protected mode according to this commands for controlling terminal, the described instruction that enters the operation behavior protected mode is that the terminal that makes that is provided with in triggering the switchover policy storehouse in advance switches to one or more combination in the instruction of operation behavior protected mode;
Detect the application that current operation behavior of user or system are moving;
When the user is operating or system is just setting in advance in operation target strategy storehouse behavior or when using, the application that behavior of described user being operated according to the processing mode that sets in advance in the processing scheme policy library or system are moving is carried out corresponding protection and is handled.
Another object of the present invention is to provide the device of a kind of user's of protection operating terminal behavior, described device comprises:
The switching command receiving element, be used to receive the instruction that enters the operation behavior protected mode of input, enter the operation behavior protected mode according to this commands for controlling terminal, the described instruction that enters the operation behavior protected mode is that the terminal that makes that is provided with in triggering the switchover policy storehouse in advance switches to one or more combination in the instruction of operation behavior protected mode;
The current behavior detecting unit is used to detect the application that current operation behavior of user or system are moving;
The protection processing unit; be used for when the user is operating or system is just setting in advance in operation target strategy storehouse behavior or when using, the application that behavior of described user being operated according to the processing mode that sets in advance in the processing scheme policy library or system are moving is carried out corresponding protection and is handled.
In the present invention; by setting in advance a series of policy librarys; comprise and presetting or self-defined " triggering the switchover policy storehouse " that switches to protected mode; preset or " the Action Target policy library " of the application of self-defined concrete protection or behavior and preset or self-defined " the processing scheme policy library " of concrete application or behavior being protected the action of processing; in the instruction that receives be in " trigger switchover policy storehouse " switch to the switching command of protected mode the time; judge whether the application that operation behavior that the user is current or system are moving is the operation behavior or the application of presetting in " Action Target policy library "; if; then the application that the current operation behavior of user or system is being moved according to preset protection processing mode in " processing scheme policy library " is carried out corresponding protection and is handled; owing to " trigger the switchover policy storehouse "; " Action Target policy library " and " processing scheme policy library " all can set in advance as required voluntarily, so can carry out the data protection of individual character at the different application of user's operation behavior or system's operation flexibly.
Description of drawings
Fig. 1 is the FB(flow block) of the method for the protection user operating terminal behavior that provides of the embodiment of the invention;
Fig. 2 is the structured flowchart of the device of the protection user operating terminal behavior that provides of the embodiment of the invention.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with drawings and Examples.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
In embodiments of the present invention; by setting in advance a series of policy librarys; comprise and presetting or self-defined " triggering the switchover policy storehouse " that switches to protected mode; preset or " the Action Target policy library " of the application of self-defined concrete protection or behavior and preset or self-defined " the processing scheme policy library " of concrete application or behavior being protected the action of processing; in the instruction that receives be in " trigger switchover policy storehouse " switch to the switching command of protected mode the time; judge whether the application that operation behavior that the user is current or system are moving is the operation behavior or the application of presetting in " Action Target policy library "; if; then the application that the current operation behavior of user or system is being moved according to preset protection processing mode in " processing scheme policy library " is carried out corresponding protection and is handled; owing to " trigger the switchover policy storehouse "; " Action Target policy library " and " processing scheme policy library " all can set in advance as required voluntarily, so can carry out the data protection of individual character at the different application of user's operation behavior or system's operation flexibly.
Fig. 1 is the flow chart of the method for the protection user operating terminal behavior that provides of the embodiment of the invention, and details are as follows:
In step S101; receive the instruction that enters the operation behavior protected mode of input; enter the operation behavior protected mode according to this commands for controlling terminal, the described instruction that enters the operation behavior protected mode is that the terminal that makes that is provided with in triggering the switchover policy storehouse in advance switches to one or more combination in the instruction of operation behavior protected mode.
As one embodiment of the present of invention, set in advance (or self-defined) and trigger the switchover policy storehouse, store the trigger condition that protected mode is switched of carrying out that sets in advance or define in this storehouse, enter the protected mode of operation behavior by this condition triggering terminal.Can carry out the selection of multinomial trigger condition in the triggering switchover policy storehouse of user's operation behavior protection: the slip that the input password carries out mode switch, screen specific position carries out that mode switch, voice password are switched, fingerprint recognition is switched, iris verify, all kinds of switching modes (trigger condition can be one or more of above-mentioned trigger condition) are switched or the like in the acceleration transducer triggering; in addition, the trigger action behavior of switching back normal mode also can be set simultaneously.In embodiments of the present invention; triggering the switching condition that presets (or self-defined) operation fuzzy pattern in the switchover policy storehouse is " severe is rocked terminal "; when the severe that receives user input when terminal is rocked the instruction of terminal; switching working mode is a protected mode; in addition, be provided with to switch and get back to normal mode and also can adopt the instruction identical " severe is rocked terminal " with switching to protected mode.Wherein, triggering the switchover policy storehouse can carry out the upgrading of tactful content and augment by modes such as server or operation service packs.
In step S102, detect the application that current operation behavior of user or system are moving.
In step S103; when the user is operating or system is just setting in advance in operation target strategy storehouse behavior or when using, the application that behavior of described user being operated according to the processing mode that sets in advance in the processing scheme policy library or system are moving is carried out corresponding protection and is handled.
As one embodiment of the present of invention, setting in advance (or self-defined) needs protected operation behavior or uses and the concrete data that produce etc. of using).Can carry out the selection of multi-mode operation behavior and application in the Action Target policy library of user's operation behavior protection, comprise: communication process; receive and send messages; receiving and dispatching mail; WEB/WAP browses record; the historical record of search; the self-defined dictionary that input method produces (contains associational word; word frequency is adjusted); schedule; security software browsing data; the data that navigation is searched; the notepad record data; the application (Action Target can be one or more operation behaviors and the application that sets in advance or define in the Action Target policy library) that produces all kinds of record data after operation behavior or the operation related application appears in all terminals in recording data etc. basically.When system detects the behavior that the user is operating or system is just setting in advance or uses in operation target strategy storehouse, the corresponding protection processing is carried out in described user is operating or system is moving operation behavior or application according to the processing mode that sets in advance in the processing scheme policy library.Wherein set in advance (or self-defined) in the processing scheme policy library and handle concrete operations behavior or the concrete processing method of using.Wherein, being applied under the protected mode state of user's operation behavior or system's operation; in the selection handled of several data that set in advance (or self-defined) of processing scheme policy library, comprising: fully the deletion action record, hide in operation note (needing manner of decryption to consult), the backup expansion card, in the backup server or the like processing mode.Wherein, Action Target policy library and processing scheme policy library all can carry out the upgrading of tactful content and augment by server or mode such as operation service packs etc.
Be a concrete application example of the embodiment of the invention below, concrete steps are as follows:
1, preset in the policy library (or self-defined) as follows:
The instruction that switches to protected mode is set in " trigger switchover policy storehouse " is " severe is rocked terminal ", in addition, be provided with to switch and get back to normal mode and also can adopt instruction " severe is rocked terminal "; It is " communication process " that the operation behavior that need protect is set in " Action Target policy library "; The protection processing mode that " communication process " carried out is set in " processing scheme policy library " is " deletion action record fully ".
2, by " severe is rocked terminal ", the control terminal switching enters in user's operation behavior protected mode state.
3, afterwards, 07558330119 incoming call, terminal is answered, and writes down a remark information in notepad
4, check message registration, wherein 07558330119 the incoming call record, handle by " the deletion action record fully " that be provided with in the processing scheme policy library, automatically deleted, check notepad, the new recorded data that increases newly before wherein possessing (because of the application strategy that is not provided with in the policy library notepad).
5,, normal mode is got back in the terminal switching again by " severe is rocked terminal ".
The structured flowchart of the device of the protection user operating terminal behavior that Fig. 2 provides for the embodiment of the invention for convenience of explanation, only shows the relevant part of the embodiment of the invention.Wherein, the device of this protection user operating terminal behavior can be the software unit that is built in terminal, the unit of hardware cell or soft or hard combination, and this terminal can be mobile communication terminal, PC terminal etc.In the present embodiment, this device comprises: switching command receiving element 21, current behavior detecting unit 22 and protection processing unit 23.
Wherein, switching command receiving element 21 receives the instruction that enters the operation behavior protected mode of input, enter the operation behavior protected mode according to this commands for controlling terminal, the described instruction that enters the operation behavior protected mode is that the terminal that makes that is provided with in triggering the switchover policy storehouse in advance switches to one or more combination in the instruction of operation behavior protected mode;
The application that operation behavior that current behavior detecting unit 22 detection users are current or system are moving;
Protection processing unit 23 is used for when the user is operating or system is just setting in advance in operation target strategy storehouse behavior or when using, and the corresponding protection processing is carried out in the application that behavior of described user being operated according to the processing mode that sets in advance in the processing scheme policy library or system are moving.
In addition, this device also comprises: switching command is provided with unit, protection Target Setting unit and processing mode the unit is set.
Wherein, switching command is provided with the unit and is used for being provided with in triggering switchover policy storehouse in advance making terminal switch to the instruction of operation behavior protected mode, and described instruction comprises: one or more during the slip of input password, screen specific position, voice password, fingerprint recognition, iris checking, acceleration transducer trigger;
Protection Target Setting unit is used in advance at the Action Target policy library user's operation behavior that need protect or the application of system's operation being set, and the application of user's operation behavior that described needs are protected or system's operation comprises: communication process, receive and send messages, in the data that historical record that receiving and dispatching mail, WEB/WAP are browsed record, search, self-defined dictionary, schedule, security software browsing data, navigation that input method produces are searched, notepad record data, the data of recording one or more;
Processing mode is provided with the unit and is used in advance at the processing scheme policy library processing mode to the application of user's operation behavior or system's operation being set, and the processing mode of described application to user's operation behavior or system's operation comprises: fully the deletion action record, hide in operation note, the backup expansion card, in the backup server one or more.Concrete condition does not repeat them here as mentioned above.
In embodiments of the present invention; by setting in advance a series of policy librarys; comprise and presetting or self-defined " triggering the switchover policy storehouse " that switches to protected mode; preset or " the Action Target policy library " of the application of self-defined concrete protection or behavior and preset or self-defined " the processing scheme policy library " of concrete application or behavior being protected the action of processing; in the instruction that receives be in " trigger switchover policy storehouse " switch to the switching command of protected mode the time; judge whether the application that operation behavior that the user is current or system are moving is the operation behavior or the application of presetting in " Action Target policy library "; if; then the application that automatically the current operation behavior of user or system is being moved according to preset protection processing mode in " processing scheme policy library " is carried out corresponding protection and is handled; do not need manual operations; owing to " trigger the switchover policy storehouse "; " Action Target policy library " and " processing scheme policy library " all can set in advance as required voluntarily; so can carry out the data protection of individual character at the different application of user's operation behavior or system's operation flexibly; in addition; the present invention is because the setting in each policy library is the switching behavior that concrete refinement is decomposed; the protection target; processing mode; and can conveniently use the later stage and increase service packs and network upgrade policy library and replenish and expand; possesses bigger autgmentability; in addition; terminal can preset strategy by several typical modules; also can possess bigger flexibility by the User Defined strategy protocol.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a method of protecting the behavior of user's operating terminal is characterized in that, described method comprises the steps:
Receive the instruction that enters the operation behavior protected mode of input, enter the operation behavior protected mode according to this commands for controlling terminal, the described instruction that enters the operation behavior protected mode is that the terminal that makes that is provided with in triggering the switchover policy storehouse in advance switches to one or more combination in the instruction of operation behavior protected mode;
Detect the application that current operation behavior of user or system are moving;
When the user is operating or system is just setting in advance in operation target strategy storehouse behavior or when using, the application that behavior of described user being operated according to the processing mode that sets in advance in the processing scheme policy library or system are moving is carried out corresponding protection and is handled.
2. the method for claim 1 is characterized in that, in the instruction that enters the operation behavior protected mode of described reception input, enters before the step of operation behavior protected mode according to this commands for controlling terminal, and described method also comprises the steps:
Being provided with in triggering the switchover policy storehouse in advance makes terminal switch to the instruction of operation behavior protected mode;
The application of the user's operation behavior that need protect or system operation is set in the Action Target policy library in advance;
Processing mode to the application of user's operation behavior or system's operation is set in the processing scheme policy library in advance.
3. method as claimed in claim 2; it is characterized in that the described instruction that makes terminal switch to the operation behavior protected mode comprises: one or more during the slip of input password, screen specific position, voice password, fingerprint recognition, iris checking, acceleration transducer trigger.
4. method as claimed in claim 2; it is characterized in that the application of user's operation behavior that described needs are protected or system operation comprises: communication process, receive and send messages, in the data that historical record that receiving and dispatching mail, WEB/WAP are browsed record, search, self-defined dictionary, schedule, security software browsing data, navigation that input method produces are searched, notepad record data, the data of recording one or more.
5. method as claimed in claim 2 is characterized in that, the processing mode of described application to the operation of user's operation behavior or system comprises: fully the deletion action record, hide in operation note, the backup expansion card, in the backup server one or more.
6. a device of protecting the behavior of user's operating terminal is characterized in that, described device comprises:
The switching command receiving element, be used to receive the instruction that enters the operation behavior protected mode of input, enter the operation behavior protected mode according to this commands for controlling terminal, the described instruction that enters the operation behavior protected mode is that the terminal that makes that is provided with in triggering the switchover policy storehouse in advance switches to one or more combination in the instruction of operation behavior protected mode;
The current behavior detecting unit is used to detect the application that current operation behavior of user or system are moving;
The protection processing unit; be used for when the user is operating or system is just setting in advance in operation target strategy storehouse behavior or when using, the application that behavior of described user being operated according to the processing mode that sets in advance in the processing scheme policy library or system are moving is carried out corresponding protection and is handled.
7. device as claimed in claim 6 is characterized in that, described device also comprises:
Switching command is provided with the unit, is used for being provided with in triggering switchover policy storehouse in advance making terminal switch to the instruction of operation behavior protected mode;
Protection Target Setting unit is used in advance at the Action Target policy library user's operation behavior that need protect or the application of system's operation being set;
Processing mode is provided with the unit, is used in advance at the processing scheme policy library processing mode to the application of user's operation behavior or system's operation being set.
8. device as claimed in claim 7; it is characterized in that the described instruction that makes terminal switch to the operation behavior protected mode comprises: one or more during the slip of input password, screen specific position, voice password, fingerprint recognition, iris checking, acceleration transducer trigger.
9. device as claimed in claim 7; it is characterized in that the application of user's operation behavior that described needs are protected or system operation comprises: communication process, receive and send messages, in the data that historical record that receiving and dispatching mail, WEB/WAP are browsed record, search, self-defined dictionary, schedule, security software browsing data, navigation that input method produces are searched, notepad record data, the data of recording one or more.
10. device as claimed in claim 7, it is characterized in that the processing mode of described application to the operation of user's operation behavior or system comprises: fully the deletion action record, hide in operation note, the backup expansion card, in the backup server one or more.
CN201010180372.9A 2010-05-21 2010-05-21 Method and device for protecting user behavior at operating terminal Pending CN101867650A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010180372.9A CN101867650A (en) 2010-05-21 2010-05-21 Method and device for protecting user behavior at operating terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010180372.9A CN101867650A (en) 2010-05-21 2010-05-21 Method and device for protecting user behavior at operating terminal

Publications (1)

Publication Number Publication Date
CN101867650A true CN101867650A (en) 2010-10-20

Family

ID=42959205

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010180372.9A Pending CN101867650A (en) 2010-05-21 2010-05-21 Method and device for protecting user behavior at operating terminal

Country Status (1)

Country Link
CN (1) CN101867650A (en)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102354360A (en) * 2011-08-18 2012-02-15 中兴通讯股份有限公司 Device, terminal and method for preventing illegal updating of terminal
CN102664989A (en) * 2012-03-26 2012-09-12 中国联合网络通信集团有限公司 Data processing method of terminal lexicon, apparatus and terminal thereof
CN102843458A (en) * 2011-06-23 2012-12-26 腾讯科技(深圳)有限公司 Method and device for calling business application during call
CN103179254A (en) * 2011-12-23 2013-06-26 宇龙计算机通信科技(深圳)有限公司 Desktop system accessing method and mobile terminal
CN103207955A (en) * 2012-01-11 2013-07-17 联想(北京)有限公司 Method and system for protecting electronic terminal and electronic terminal
CN103425424A (en) * 2012-05-22 2013-12-04 北京蒙恬科技有限公司 Handwriting input word selecting system and method
CN103488942A (en) * 2013-09-23 2014-01-01 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103488950A (en) * 2013-09-23 2014-01-01 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103514396A (en) * 2013-09-23 2014-01-15 北京奇虎科技有限公司 Processing method and device for file / application program on mobile communication terminal
CN103516753A (en) * 2012-06-25 2014-01-15 北京新媒传信科技有限公司 Method, server, and terminal for realizing data transmission
CN103581439A (en) * 2013-10-25 2014-02-12 福建伊时代信息科技股份有限公司 Device and method for fast deleting record
CN103595536A (en) * 2013-11-13 2014-02-19 广东欧珀移动通信有限公司 Password protection method and terminal based on voice recognition
CN103679001A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for controlling behaviors of application program in mobile communication terminal
CN103795847A (en) * 2012-10-31 2014-05-14 三星电子(中国)研发中心 Method for applying traceless mode to communication terminal and communication terminal
CN104008346A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Method and device for starting privacy mode of data processing device
CN104200144A (en) * 2014-09-05 2014-12-10 可牛网络技术(北京)有限公司 Method and system for improving safety of mobile terminal
CN104680091A (en) * 2013-11-28 2015-06-03 英业达科技有限公司 Mobile device protection system and method
CN105007276A (en) * 2015-07-29 2015-10-28 广东欧珀移动通信有限公司 Safety verification method and system
CN103595536B (en) * 2013-11-13 2016-11-30 广东欧珀移动通信有限公司 A kind of cipher code protection method based on speech recognition and terminal
CN106203153A (en) * 2016-06-23 2016-12-07 珠海市魅族科技有限公司 A kind of information access control method and device
CN106529257A (en) * 2016-11-25 2017-03-22 维沃移动通信有限公司 Information processing method and mobile terminal
CN106650498A (en) * 2016-12-28 2017-05-10 太仓红码软件技术有限公司 Search engine history hiding method based on network security
CN106778177A (en) * 2016-12-28 2017-05-31 太仓红码软件技术有限公司 A kind of search engine historical record security processing based on fingerprint monitoring
CN107292148A (en) * 2016-03-31 2017-10-24 宇龙计算机通信科技(深圳)有限公司 A kind of Working mode switching method and user terminal
WO2018018787A1 (en) * 2016-07-28 2018-02-01 中兴通讯股份有限公司 Password authentication method and device, mobile terminal, and computer storage medium
CN109074171A (en) * 2017-05-16 2018-12-21 华为技术有限公司 Input method and electronic equipment
WO2020103544A1 (en) * 2018-11-23 2020-05-28 Oppo广东移动通信有限公司 Application starting method and related device
US10936728B2 (en) 2017-02-23 2021-03-02 Red Hat, Inc. Non-persistent mode for network connection
US11025621B2 (en) 2017-02-24 2021-06-01 Red Hat, Inc. Enhancing privacy of network connections

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1933629A (en) * 2006-08-25 2007-03-21 华为技术有限公司 Method and device for protecting user storage information in mobile terminal
CN1968467A (en) * 2006-06-21 2007-05-23 华为技术有限公司 Mobile terminal and terminal user information protection method
CN1980427A (en) * 2005-11-30 2007-06-13 中兴通讯股份有限公司 Device for mobile terminal to automatically deleting information, and method thereof
WO2008137160A1 (en) * 2007-05-07 2008-11-13 Biap, Inc. Providing personalized resources on-demand over a broadband network to consumer device applications
CN101389100A (en) * 2008-10-24 2009-03-18 Tcl天一移动通信(深圳)有限公司 Personal information protecting method for mobile communication terminal equipment
CN101610309A (en) * 2009-06-26 2009-12-23 宇龙计算机通信科技(深圳)有限公司 A kind of portable terminal mode switch control method, system and portable terminal
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 The method and system of individual privacy in the protection mobile phone

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980427A (en) * 2005-11-30 2007-06-13 中兴通讯股份有限公司 Device for mobile terminal to automatically deleting information, and method thereof
CN1968467A (en) * 2006-06-21 2007-05-23 华为技术有限公司 Mobile terminal and terminal user information protection method
CN1933629A (en) * 2006-08-25 2007-03-21 华为技术有限公司 Method and device for protecting user storage information in mobile terminal
WO2008137160A1 (en) * 2007-05-07 2008-11-13 Biap, Inc. Providing personalized resources on-demand over a broadband network to consumer device applications
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 The method and system of individual privacy in the protection mobile phone
CN101389100A (en) * 2008-10-24 2009-03-18 Tcl天一移动通信(深圳)有限公司 Personal information protecting method for mobile communication terminal equipment
CN101610309A (en) * 2009-06-26 2009-12-23 宇龙计算机通信科技(深圳)有限公司 A kind of portable terminal mode switch control method, system and portable terminal

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843458A (en) * 2011-06-23 2012-12-26 腾讯科技(深圳)有限公司 Method and device for calling business application during call
CN102354360A (en) * 2011-08-18 2012-02-15 中兴通讯股份有限公司 Device, terminal and method for preventing illegal updating of terminal
CN102354360B (en) * 2011-08-18 2016-12-14 中兴通讯股份有限公司 A kind of prevent the equipment of terminal illegal update, terminal and method
CN103179254A (en) * 2011-12-23 2013-06-26 宇龙计算机通信科技(深圳)有限公司 Desktop system accessing method and mobile terminal
CN103179254B (en) * 2011-12-23 2015-04-01 宇龙计算机通信科技(深圳)有限公司 Desktop system accessing method and mobile terminal
CN103207955A (en) * 2012-01-11 2013-07-17 联想(北京)有限公司 Method and system for protecting electronic terminal and electronic terminal
CN103207955B (en) * 2012-01-11 2016-12-14 联想(北京)有限公司 A kind of method and system protecting electric terminal and a kind of electric terminal
CN102664989A (en) * 2012-03-26 2012-09-12 中国联合网络通信集团有限公司 Data processing method of terminal lexicon, apparatus and terminal thereof
CN103425424A (en) * 2012-05-22 2013-12-04 北京蒙恬科技有限公司 Handwriting input word selecting system and method
CN103516753A (en) * 2012-06-25 2014-01-15 北京新媒传信科技有限公司 Method, server, and terminal for realizing data transmission
CN103795847A (en) * 2012-10-31 2014-05-14 三星电子(中国)研发中心 Method for applying traceless mode to communication terminal and communication terminal
CN104008346A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Method and device for starting privacy mode of data processing device
CN103488950B (en) * 2013-09-23 2017-01-25 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103514396A (en) * 2013-09-23 2014-01-15 北京奇虎科技有限公司 Processing method and device for file / application program on mobile communication terminal
CN103488950A (en) * 2013-09-23 2014-01-01 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103488942A (en) * 2013-09-23 2014-01-01 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103581439A (en) * 2013-10-25 2014-02-12 福建伊时代信息科技股份有限公司 Device and method for fast deleting record
CN103595536A (en) * 2013-11-13 2014-02-19 广东欧珀移动通信有限公司 Password protection method and terminal based on voice recognition
CN103595536B (en) * 2013-11-13 2016-11-30 广东欧珀移动通信有限公司 A kind of cipher code protection method based on speech recognition and terminal
CN104680091B (en) * 2013-11-28 2017-11-14 英业达科技有限公司 Mobile device protects system and method
CN104680091A (en) * 2013-11-28 2015-06-03 英业达科技有限公司 Mobile device protection system and method
CN103679001A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for controlling behaviors of application program in mobile communication terminal
CN104200144A (en) * 2014-09-05 2014-12-10 可牛网络技术(北京)有限公司 Method and system for improving safety of mobile terminal
US10515203B2 (en) 2014-09-05 2019-12-24 Conew Network Technology (Beijing) Co., Ltd. Method and system for improving security of a mobile terminal
CN105007276A (en) * 2015-07-29 2015-10-28 广东欧珀移动通信有限公司 Safety verification method and system
CN107292148A (en) * 2016-03-31 2017-10-24 宇龙计算机通信科技(深圳)有限公司 A kind of Working mode switching method and user terminal
CN106203153A (en) * 2016-06-23 2016-12-07 珠海市魅族科技有限公司 A kind of information access control method and device
WO2018018787A1 (en) * 2016-07-28 2018-02-01 中兴通讯股份有限公司 Password authentication method and device, mobile terminal, and computer storage medium
CN106529257B (en) * 2016-11-25 2019-08-20 维沃移动通信有限公司 A kind of information processing method and mobile terminal
CN106529257A (en) * 2016-11-25 2017-03-22 维沃移动通信有限公司 Information processing method and mobile terminal
CN106778177B (en) * 2016-12-28 2020-05-22 北京人民在线网络有限公司 Search engine historical record safety processing method based on fingerprint monitoring
CN106650498A (en) * 2016-12-28 2017-05-10 太仓红码软件技术有限公司 Search engine history hiding method based on network security
CN106778177A (en) * 2016-12-28 2017-05-31 太仓红码软件技术有限公司 A kind of search engine historical record security processing based on fingerprint monitoring
CN106650498B (en) * 2016-12-28 2020-04-24 上海移卓网络科技有限公司 Search engine historical record hiding method based on network security
US10936728B2 (en) 2017-02-23 2021-03-02 Red Hat, Inc. Non-persistent mode for network connection
US11025621B2 (en) 2017-02-24 2021-06-01 Red Hat, Inc. Enhancing privacy of network connections
CN109074171A (en) * 2017-05-16 2018-12-21 华为技术有限公司 Input method and electronic equipment
CN109074171B (en) * 2017-05-16 2021-03-30 华为技术有限公司 Input method and electronic equipment
US11086975B2 (en) 2017-05-16 2021-08-10 Huawei Technologies Co., Ltd. Input method and electronic device
US11625468B2 (en) 2017-05-16 2023-04-11 Huawei Technologies Co., Ltd. Input method and electronic device
WO2020103544A1 (en) * 2018-11-23 2020-05-28 Oppo广东移动通信有限公司 Application starting method and related device

Similar Documents

Publication Publication Date Title
CN101867650A (en) Method and device for protecting user behavior at operating terminal
CN101163347B (en) Method and equipment for remote control mobile terminal
CN101110853B (en) Portable communication equipment with loss protection function and loss protection method thereof
CN103220637A (en) Mobile phone anti-theft protection method and mobile phone anti-theft protection device
CN104980327A (en) Information push method and device
CN101523879A (en) Method and system for associating a user profile to a caller identifier
CN104601818A (en) Method and device for switching operating systems in communication process
CN102457606A (en) Mobile phone and anti-theft method thereof
CN101384048A (en) Information managing method and mobile terminal
CN106201783B (en) A kind of data reconstruction method and device
CN106105168B (en) Call forwarding method, terminal and portable electronic equipment
CN101610500A (en) Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system
CN102946482A (en) Method for detecting user terminal and user terminal
CN102810139A (en) Secure data operation method and communication terminal
CN107197074A (en) Book management method, device, storage medium and electronic equipment
CN107193662A (en) A kind of information synchronization method and mobile terminal based on dual system
CN103458394A (en) Mobile terminal, processing method and processing device for internal information of mobile terminal
JP2007312115A (en) Mobile communication terminal device
CN101950233A (en) Be used to eliminate the system and method for stroke input ambiguity
CN110706705A (en) Voice control method, terminal and computer storage medium
CN102088694B (en) Mobile terminal and method for downloading subscriber identity module (SIM) application
CN106874096A (en) Application management method and mobile terminal based on dual system
CN110944318A (en) Lock card setting method and device, storage medium and terminal
CN103377072A (en) Interception processing method and mobile terminal
CN106502809B (en) A kind of multi-platform application program adaptation method, device and terminal device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20101020