CN102497633A - Protection method for private information in cellphones - Google Patents

Protection method for private information in cellphones Download PDF

Info

Publication number
CN102497633A
CN102497633A CN2011104202808A CN201110420280A CN102497633A CN 102497633 A CN102497633 A CN 102497633A CN 2011104202808 A CN2011104202808 A CN 2011104202808A CN 201110420280 A CN201110420280 A CN 201110420280A CN 102497633 A CN102497633 A CN 102497633A
Authority
CN
China
Prior art keywords
backup
privacy
mobile phone
information
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011104202808A
Other languages
Chinese (zh)
Inventor
余鑫
梁生耀
张睿
张庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN2011104202808A priority Critical patent/CN102497633A/en
Publication of CN102497633A publication Critical patent/CN102497633A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a protection method for private information in cellphones, which is executed after the cellphones are stolen. The protection method includes steps of reading information, such as contact persons, short message records, call records and the like in the cellphones, encrypting and compressing the information to be stored in the network server so that users can find key data and information back through the network server; and then deleting all private data and preventing the private information stored in the cellphones by the users from escaping or being decoded. The problems of incompleteness and untightness of the private information are solved by encryption, backups and automatic deletion, encrypted private backup files are uploaded to the server by means of automatic authentication and automatic uploading, so that key data can be guaranteed to be backed up and can be matched and claimed back through cellphone numbers.

Description

Method for protecting privacy in the mobile phone
Technical field
The present invention relates to the mobile phone safe practice, network backup technology, the particularly backup of private data and destruction technology in the smart mobile phone.
Background technology
In view of smart mobile phone occupation rate in the world improves year by year, the information security issue on the mobile phone also more and more receives people's attention, and mobile phone is lost the privacy information that possibly cause storing in the mobile phone and revealed.Up-to-date mobile phone safety survey reports in 2011 of Nuo Dun issue point out, meet with the experience that mobile phone is lost the user of Chinese market 74%.After mobile phone was lost or be stolen, the data of storing in the protection mobile phone became the most important thing.84% victim thinks, mobile phone lose or stolen after, top it all off lose friends and family's etc. contact details, also have the adult of 31%-38% to worry privacy or sensitive information leakage.
TD joint laboratory of China Mobile of the Central China University of Science and Technology under the applicant is studied mobile phone safety protection technique under the mobile application environment, obtains a kind of invention of mobile phone private information back-up scheme.The objective of the invention is to improve the private information protective capability of mobile phone, the mobile phone that guarantees the user lose or stolen after can in time back up and delete the important information in the user mobile phone.
Present existing mobile phone fail-safe software product possesses " privacy protection mode " or " privacy space " function mostly, can select some contact person's telephone number to be set to " privacy number ".Through being provided with all relevant informations of special contact person are stashed, comprise its contact method, note and message registration etc., other people only can see does not have hiding content.
Also there is part mobile phone fail-safe software can select the mobile phone file that to encrypt, cryptoguard is set.After setting finishes, he per capita can't mobile phone on or the content of checking encryption folder on the computer.If mobile phone is lost or stolen, can remote lock or the deletion mobile phone in private data, for being stored in the sensitive information setting safe barrier together on the mobile phone.
But at present typical mobile phone security protection software scenario has following drawback:
The first, existing secret protection all is to come out to deposit separately through the data extract of the address list management software that mobile phone is carried, conversation software, note software institute maintenance and management, must use extra software to operate.In case after a contact person or a file were set to privacy, these data can't be operated through the basic software of embedded in mobile phone, increased the complexity of user's operation greatly, do not meet normal operating habit yet.
Second; Can only guarantee behind the hand-set from stolen that the privacy that part is set to contact person or the file of privacy etc. " narrow sense " is not revealed; The privacy that can not guarantee " broad sense " such as other general associated person informations, communications records is not revealed, and not protected data still can be read easily.
The 3rd, " the privacy space " in the mobile phone is though can not be checked arbitrarily that these data are still by complete being kept in the mobile phone, and the lawless person obtains still to have an opportunity to extract these data encrypted and crack behind the mobile phone.
The 4th, even all contact persons are set in " privacy space ", and AES is not easy to be cracked, and privacy is not revealed, but can not solve the problem that critical data is lost.
Can find out that from above four aspects the secret protection of existing mobile phone private scheme and imperfect, imprecision use inconvenience, and can not guarantee that critical data obtains backup and recovery.
Summary of the invention
In view of this, the present invention proposes method for protecting privacy in a kind of mobile phone, guarantee that the user is kept at privacy information in the mobile phone and does not leak or cracked.And, make the user give significant data and information for change through the webserver with storing on the webserver after the privacy information ciphered compressed.
For realizing above-mentioned purpose, the invention provides method for protecting privacy in the mobile phone, it is characterized in that; May further comprise the steps: require the input password when a) mobile phone leaves the screen locking state; B) whether the number of times of judging the password input error surpasses setting threshold, if, c then) the backup private data; D) deletion private data, e) said privacy Backup Data uploads to backup server.
1, the backup private data saves as temporary file, and concrete steps comprise:
Read All Contacts's information, use the name among the vcard3.0 format record contact person, telephone number, addresses of items of mail, instant messaging number of the account and corresponding type are temporarily saved as contact person's file;
Read message registration, make CSV format preserve information such as the other side's number of every conversation record, type of call, time of origin, duration, be temporarily saved as conversation record file;
The short message reading record makes CSV format preserve information such as the other side's number of every note record, transmitting-receiving type, time of origin, short message content, is temporarily saved as short breath record file.
2, delete the mobile phone file of contact information stored in the mobile phone, message registration, note record, setting after the completion backup immediately.
3, encrypt aforementioned each temporary file, merging is stored as the privacy backup file, and concrete steps comprise:
Temporary file (contact person's file, conversation record file, short breath record file etc.) is encrypted and is compressed, use the Zip compression algorithm to merge compression, and the telephone number that uses mobile phone as key with the encryption of AES AES, finally obtain the privacy backup file;
Delete the interim files of preserving such as described contact person's file, conversation record file, short breath record file.
4, the privacy backup file is uploaded onto the server, concrete steps comprise:
Mobile phone adopts HTTP GET agreement to sign in to backup server, and uses the parameter of cell-phone number as logging request, and the unique user identifier of server-assignment returns to mobile phone;
Mobile phone adopts the mode of HTTP POST, with multipart form encapsulation user identifier and said privacy backup file, the privacy backup file uploaded, and deletion privacy backup file.
The present invention has solved the imperfect imprecise problem of secret protection through the mode that adopts automatic encrypted backup, deletion automatically; Privacy backup file after the mode that the present invention adopts automated validation, upload automatically will be encrypted is uploaded onto the server, and guarantees that critical data can obtain backup, and can mate and recover through cell-phone number.
Can under the situation that hand-set from stolen is used, delete all private datas automatically through the present invention, guarantee that the user is kept at privacy information in the mobile phone and does not leak or cracked, and make the user give significant data and information for change through the webserver.
Description of drawings
Fig. 1 is a privacy information backup flow chart in the embodiments of the invention;
Fig. 2 uploads flow chart for the privacy backup file in the embodiment of the invention.
Embodiment
Because the secret protection of existing mobile phone private scheme and imperfect, imprecision use inconvenience, and can not guarantee that critical data obtains backing up and recovering.Information such as the contact person in the automated back-up mobile phone of the present invention, note record, message registration with storing on the webserver after the information encryption compression, make the user give significant data and information for change through the webserver.And delete all private datas automatically, guarantee that the user is kept at privacy information in the mobile phone and does not leak or cracked.
For making the object of the invention, technical scheme and advantage clearer, the present invention is made further detailed description below in conjunction with accompanying drawing.
In embodiments of the present invention, privacy information backup flow chart is as shown in Figure 1:
Step 101, backup contact person read the associated person information in the mobile phone earlier, and the form of associated person information with VCARD are saved in the text document.If contact person's information is:
Name: Zhang San
Mobile phone: 12345678
Email: zhangsan139.com
Phonebook.vcf file content after then preserving is:
BFGIN:VCARD
VERSION:3.0
TEL;TYPE=CELL:12345678
N: open; Three;
FN: three
EMAIL;TYPE?HOME:zhangsan139.com
END:VCARD
Step 102, backup log read all address list informations and are saved in the text document with the CSV form.If three following log information are arranged in the mobile phone:
Do not connect: before 139876543210 minutes
Incoming call: before 139123456781 minutes
Incoming call: before 10,086 2 minutes
Calls.csv file content after then preserving is following:
Phone,Time,Type,Duration
10086,1322553328776,1,12
13912345678,1322553372746,1,11
13987654321,1322553423813,2,0
Wherein the Phone field is represented the other side's number, and the Time field representes to call out the timestamp (apart from millisecond number on January 1st, 1900) of time of origin, and Type is that type of call (2 do not connect for 0 incoming call, 1 exhalation), Duration are the second number of call duration.
Step 103, message backup read all notes and are saved in the text document with the CSV form.If following 2 note records are arranged in the mobile phone:
Number: 13912345678 contents: HelloWOrld time: the morning 8:01
Number: 13987654321 contents: Have a good day! Time: the sms.csv file content of 8:01 in the morning after then preserving is:
Phone,Time,Type,Text
13912345678,1322553698991,1,HelloWOrld
13987654321,1322553687728,1,Have?a?good?day!
Wherein the Phone field is represented the other side's number, and the Time field representes to call out the timestamp (apart from millisecond number on January 1st, 1900) of time of origin, and Type is that short message type (0 outbox, 1 inbox), Text are short message content.
Step 104, deletion private data, phone directory, communications records, the note record in the calling system API deletion mobile phone successively.Being operating as in the corresponding A ndroid mobile phone deleted all records in three databases such as raw contact, sms, calls.
Step 105, ciphered compressed privacy backup file; The mode that phonebook.vcf, sms.csv, the calls.csv file that the front is produced adopts AES to encrypt is line by line respectively encrypted, and the file after will encrypting obtains a privacy backup file backup.zip with zip merging compression.
AES encrypts line by line and adopts this tractor driver plane No. is key, as 13900000008, if information to be encrypted does
100000,1322553698991,1,weifuywifhqidhgnmvc
13377778788,1322553687728,1, yas djkhwefqw [result after fdiqwpd encrypts is:
A4209175E2F8AB802EBFC6A2BF73C6DB340189EDC1AAEC5CEAE6687D5F088B8E958B3E0842BC897146C84BFE763D27F6;
82A24A15E7452E1EAA71CD657A2CD7559353DF69F2F0C0F8D1A4527C00470C6DFE2383B483DB9124F05CD59943A0EB229EA4E8FADD19F32FFDDD523B9C9857C9
Temporary files such as step 106, deletion phonebook.vcf, sms.csv, calls.csv, the backup.zip that only keeps after compressing is the privacy backup file.
Step 107, upload the privacy backup file, backup.zip is uploaded on the webserver back up, in order to the usefulness of recovery in the future.Idiographic flow can be used HTTP POST method, and Figure of description 2 has been described a kind of method for uploading.
Step 108, deletion privacy backup file are promptly deleted the backup.zip file, make the residual data of no any privacy information in the mobile phone.
Also designed in the present invention and a kind of the privacy backup file has been uploaded to the scheme of webserver backup, as shown in Figure 2 according to the structure chart of backup uploading system:
Secret protection software 201, the privacy of promptly carrying out the present invention's design backs up the mobile phone terminal software of flow process.This software is monitored mobile phone state in real time, monitor hand-set from stolen with after begin to carry out the described privacy information backup of Figure of description 1 flow process, up to obtaining privacy backup file backup.zip.
Backup server 202, the web server of storage privacy of user backup file is through http agreement and secret protection software communication.
Land 203; Secret protection software at first sends HTTP POST request to backup server when uploading the privacy backup file; Sign in to backup server; And be the parameter of logging request with cell-phone number (for example 13900000008), request server distributes unique user identifier to return to secret protection software.The message particular content is:
POST/MyTest/Register?HTTP/1.1
Content-Length:11
Content-Type:application/x-www-form-urlencoded
Host:192.168.0.105:8080
Connection:Keep-Alive
User-Agent:Dalvik/1.4.0(Linux;U;Android?2.3.7;HERO200Build/GRI40)13900000008
Distribution marker 204, backup server returns unique user identifier (for example 2A24A15E7452E1EAA7) of distribution through 200OK, and message content is:
HTTP/1.1200OK
Content-Type:text/plain;charset=utf-8
Content-Length:18
Connection?:keep-alive
2A24A15E7452E1EAA?7
The privacy backup file is uploaded in upload file 205, and the mode of secret protection The software adopted HTTP POST with multipart form encapsulation user identifier and said privacy backup file, is uploaded the privacy backup file
POST/MyTest/UpLoadHTTP/1.1
Connection?:Keep-Alive
Charset:UTF-8
User-Agent:Dalvik/1.4.0(Linux;U;Android?2.3.7;HERO200Build/GRI40)
Host:192.168.0.105:8080
Content-Type:multipart/form-data;boundary=AaB00x
Content-Length:149
Accept-Encoding:gzip
--AaB00x
Content-disposition:form-data;name=”token”
2A24A15E7452E1EAA7
--AaB00x
Content-disposition:form-data;name=”file”filename=”backup.zip”
--the file content of backup.zip
--AaB00x
Upload and accomplish 206, after uploading the privacy backup file and accomplishing, backup server returns 200OK.
HTTP/1.1200OK
Content-Length:0
Connection?:keep-alive
In a word, the above is merely preferred embodiment of the present invention, and temporary file title, file content and field name, privacy backup file name etc. is illustrative and describes, and is not to be used to limit protection scope of the present invention.

Claims (6)

1. method for protecting privacy in the mobile phone; It is characterized in that, may further comprise the steps: require the input password when a) mobile phone leaves the screen locking state, judge b) whether the number of times of password input error surpasses setting threshold; If; C then) backup private data, d) the deletion private data e) uploads to backup server with said privacy Backup Data.
2. method according to claim 1 is characterized in that, the further step of said backup private data comprises:
Step 1, read All Contacts's information, the name among the record contact person, telephone number, addresses of items of mail, instant messaging number of the account and corresponding type are temporarily saved as contact person's file;
Step 2, read message registration, preserve the information such as the other side's number, time of origin, type of call, duration of every conversation record, being temporarily saved as conversation record file;
The information such as the other side's number, transmitting-receiving type, time of origin, short message content of every note record preserved in step 3, short message reading record, are temporarily saved as short breath record file.
3. method according to claim 2 is characterized in that, said deletion private data comprises: the mobile phone file of contact information stored, message registration, note record, setting in the deletion mobile phone.
4. method according to claim 1 is characterized in that, said privacy Backup Data is encrypted before uploading onto the server.
5. method according to claim 5 is characterized in that, carries out processed compressed before said privacy Backup Data is encrypted.
6. method according to claim 1 is characterized in that, said privacy Backup Data is uploaded to backup server, may further comprise the steps:
Sign in to said backup server, the logging request parameter is a cell-phone number, and return value is unique user identifier that said backup server distributes; Said privacy Backup Data is uploaded; No matter upload whether said privacy backup data files is all deleted in success.
CN2011104202808A 2011-12-14 2011-12-14 Protection method for private information in cellphones Pending CN102497633A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011104202808A CN102497633A (en) 2011-12-14 2011-12-14 Protection method for private information in cellphones

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011104202808A CN102497633A (en) 2011-12-14 2011-12-14 Protection method for private information in cellphones

Publications (1)

Publication Number Publication Date
CN102497633A true CN102497633A (en) 2012-06-13

Family

ID=46189413

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011104202808A Pending CN102497633A (en) 2011-12-14 2011-12-14 Protection method for private information in cellphones

Country Status (1)

Country Link
CN (1) CN102497633A (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932540A (en) * 2012-10-24 2013-02-13 广东欧珀移动通信有限公司 Mobile terminal and stealing prevention method thereof
CN103020534A (en) * 2012-11-30 2013-04-03 北京网秦天下科技有限公司 Method and system for managing mobile terminal
CN103079001A (en) * 2012-12-27 2013-05-01 东莞宇龙通信科技有限公司 Method and device for displaying information of deleted contact by using mobile terminal
CN103227986A (en) * 2013-04-01 2013-07-31 南京理工大学常熟研究院有限公司 Android platform-based privacy protection system
CN103338445A (en) * 2013-06-19 2013-10-02 深圳市垦鑫达科技有限公司 File encryption and decryption method and system
CN103559455A (en) * 2013-09-27 2014-02-05 李天才 Android device personal information protection method based on user identification
CN103634313A (en) * 2013-11-27 2014-03-12 中国科学院深圳先进技术研究院 Address list processing method and device, as well as mobile terminal
CN103873521A (en) * 2012-12-14 2014-06-18 江南大学 Cloud architecture-based mobile phone privacy file protection system and method
CN103888416A (en) * 2012-12-20 2014-06-25 海尔集团公司 Method and apparatus for preventing IP information stored in terminal equipment of security and protection system from being revealed
CN104168489A (en) * 2014-08-20 2014-11-26 乐视网信息技术(北京)股份有限公司 Data protection method of smart television, server and smart television
CN104243165A (en) * 2014-08-28 2014-12-24 电子科技大学 Intelligent movable terminal privacy protection system and method based on intelligent bracelet
CN104333563A (en) * 2013-07-22 2015-02-04 联想(北京)有限公司 Method of information processing and electronic equipment
CN104519127A (en) * 2014-12-11 2015-04-15 天津大学 Method for protecting personal information in mobile phone
CN104573536A (en) * 2015-01-28 2015-04-29 深圳市中兴移动通信有限公司 File protection method and device
CN104661201A (en) * 2013-11-19 2015-05-27 中国科学院深圳先进技术研究院 Method, device and system for short message backup, and mobile terminal
CN104768148A (en) * 2015-03-11 2015-07-08 浙江翼信科技有限公司 Message encryption method and device
CN105072603A (en) * 2015-06-25 2015-11-18 邱兰 Mobile terminal equipment management method
CN105072295A (en) * 2015-07-29 2015-11-18 魅族科技(中国)有限公司 Information processing method and mobile terminal
CN105184181A (en) * 2015-06-15 2015-12-23 北京天诚同创电气有限公司 File encryption method, file decryption method and file encryption device
CN105430178A (en) * 2015-11-05 2016-03-23 上海斐讯数据通信技术有限公司 Wristband, mobile terminal and security information processing method and system thereof, and communication system
CN105577690A (en) * 2016-02-01 2016-05-11 北京京东尚科信息技术有限公司 Information security control method and system of mobile communication terminal
CN106973155A (en) * 2017-03-22 2017-07-21 清华大学合肥公共安全研究院 A kind of mobile phone personal information security management method
CN108765789A (en) * 2018-05-22 2018-11-06 北京翔云在线数据技术有限公司 Intelligence is opened an account robot and account-opening method
CN109460648A (en) * 2018-11-13 2019-03-12 广东财经大学 A kind of computer data defence method
CN111125792A (en) * 2019-12-13 2020-05-08 紫光云(南京)数字技术有限公司 Method for preventing private information leakage when mobile phone is lost
CN112543171A (en) * 2019-09-23 2021-03-23 上海傲觉网络科技有限公司 Chat data acquisition encryption management system
CN113849133A (en) * 2021-09-29 2021-12-28 珠海格力电器股份有限公司 Processing method and device of private data, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859677A (en) * 2006-03-15 2006-11-08 华为技术有限公司 Method for protecting information safety in mobile terminal
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN101426198A (en) * 2008-09-27 2009-05-06 Tcl天一移动通信(深圳)有限公司 Mobile phone information protecting method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859677A (en) * 2006-03-15 2006-11-08 华为技术有限公司 Method for protecting information safety in mobile terminal
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN101426198A (en) * 2008-09-27 2009-05-06 Tcl天一移动通信(深圳)有限公司 Mobile phone information protecting method

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932540A (en) * 2012-10-24 2013-02-13 广东欧珀移动通信有限公司 Mobile terminal and stealing prevention method thereof
CN103020534A (en) * 2012-11-30 2013-04-03 北京网秦天下科技有限公司 Method and system for managing mobile terminal
CN103873521A (en) * 2012-12-14 2014-06-18 江南大学 Cloud architecture-based mobile phone privacy file protection system and method
CN103888416A (en) * 2012-12-20 2014-06-25 海尔集团公司 Method and apparatus for preventing IP information stored in terminal equipment of security and protection system from being revealed
CN103079001A (en) * 2012-12-27 2013-05-01 东莞宇龙通信科技有限公司 Method and device for displaying information of deleted contact by using mobile terminal
CN103079001B (en) * 2012-12-27 2014-11-19 东莞宇龙通信科技有限公司 Method and device for displaying information of deleted contact by using mobile terminal
CN103227986A (en) * 2013-04-01 2013-07-31 南京理工大学常熟研究院有限公司 Android platform-based privacy protection system
CN103338445A (en) * 2013-06-19 2013-10-02 深圳市垦鑫达科技有限公司 File encryption and decryption method and system
CN104333563A (en) * 2013-07-22 2015-02-04 联想(北京)有限公司 Method of information processing and electronic equipment
CN104333563B (en) * 2013-07-22 2017-12-26 联想(北京)有限公司 The method and electronic equipment of a kind of information processing
CN103559455A (en) * 2013-09-27 2014-02-05 李天才 Android device personal information protection method based on user identification
CN104661201A (en) * 2013-11-19 2015-05-27 中国科学院深圳先进技术研究院 Method, device and system for short message backup, and mobile terminal
CN103634313A (en) * 2013-11-27 2014-03-12 中国科学院深圳先进技术研究院 Address list processing method and device, as well as mobile terminal
CN104168489A (en) * 2014-08-20 2014-11-26 乐视网信息技术(北京)股份有限公司 Data protection method of smart television, server and smart television
CN104243165A (en) * 2014-08-28 2014-12-24 电子科技大学 Intelligent movable terminal privacy protection system and method based on intelligent bracelet
CN104519127A (en) * 2014-12-11 2015-04-15 天津大学 Method for protecting personal information in mobile phone
CN104573536A (en) * 2015-01-28 2015-04-29 深圳市中兴移动通信有限公司 File protection method and device
CN104768148A (en) * 2015-03-11 2015-07-08 浙江翼信科技有限公司 Message encryption method and device
CN104768148B (en) * 2015-03-11 2019-01-18 浙江翼信科技有限公司 A kind of message encryption method and device
CN105184181A (en) * 2015-06-15 2015-12-23 北京天诚同创电气有限公司 File encryption method, file decryption method and file encryption device
CN105072603A (en) * 2015-06-25 2015-11-18 邱兰 Mobile terminal equipment management method
CN105072295A (en) * 2015-07-29 2015-11-18 魅族科技(中国)有限公司 Information processing method and mobile terminal
CN105430178A (en) * 2015-11-05 2016-03-23 上海斐讯数据通信技术有限公司 Wristband, mobile terminal and security information processing method and system thereof, and communication system
CN105577690A (en) * 2016-02-01 2016-05-11 北京京东尚科信息技术有限公司 Information security control method and system of mobile communication terminal
CN106973155A (en) * 2017-03-22 2017-07-21 清华大学合肥公共安全研究院 A kind of mobile phone personal information security management method
CN108765789A (en) * 2018-05-22 2018-11-06 北京翔云在线数据技术有限公司 Intelligence is opened an account robot and account-opening method
CN109460648A (en) * 2018-11-13 2019-03-12 广东财经大学 A kind of computer data defence method
CN109460648B (en) * 2018-11-13 2021-06-22 广东财经大学 Computer data defense method
CN112543171A (en) * 2019-09-23 2021-03-23 上海傲觉网络科技有限公司 Chat data acquisition encryption management system
CN111125792A (en) * 2019-12-13 2020-05-08 紫光云(南京)数字技术有限公司 Method for preventing private information leakage when mobile phone is lost
CN113849133A (en) * 2021-09-29 2021-12-28 珠海格力电器股份有限公司 Processing method and device of private data, electronic equipment and storage medium
CN113849133B (en) * 2021-09-29 2023-09-12 珠海格力电器股份有限公司 Processing method and device of privacy data, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN102497633A (en) Protection method for private information in cellphones
CN104540123B (en) The method and system of mobile terminal significant data encrypted backup and safety deleting
AU2014202775B2 (en) Privacy management for tracked devices
US10778837B2 (en) System and method for tracking and archiving mobile communications
US9775012B2 (en) System and method for tracking SMS messages
US8862129B2 (en) Systems and methods for encrypted mobile voice communications
CN103647784B (en) A kind of method and apparatus of public and private isolation
US20040093385A1 (en) Memory information backup method and system for cell phone
CN101616495A (en) The method and system of individual privacy in the protection mobile phone
CN102722427A (en) Data information backup method and data information backup system
US20150072654A1 (en) Systems And Methods For Encrypted Mobile Voice Communications
Botha et al. A comparison of chat applications in terms of security and privacy
CN103458396A (en) Terminal locking and unlocking method and terminal locking and unlocking system
CN103077357A (en) Method for storing private files
CN103188230A (en) Mobile terminal and data protection method thereof
CN101877848B (en) Mobile terminal, mobile terminal data protection method and mobile terminal monitoring system
US8788648B2 (en) Communication system and communication device
CN102404728A (en) System and method for mobile phone tracking and privacy protection
WO2011088660A1 (en) Method and apparatus for protecting cell-phone information content
Khweiled et al. An improved framework for cyberbullying investigation process on WhatsApp application
KR101690850B1 (en) Systems and methods for encrypted mobile voice communications
CN101009878A (en) Data secrecy system and method
WO2012006840A1 (en) Method and equipment for hiding information
CN106357413A (en) Method for encrypting numbers with fingerprint and mobile terminal
CN104182706A (en) Encryption method and encryption device of mobile terminal memory card as well as mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120613