CN102497633A - Protection method for private information in cellphones - Google Patents
Protection method for private information in cellphones Download PDFInfo
- Publication number
- CN102497633A CN102497633A CN2011104202808A CN201110420280A CN102497633A CN 102497633 A CN102497633 A CN 102497633A CN 2011104202808 A CN2011104202808 A CN 2011104202808A CN 201110420280 A CN201110420280 A CN 201110420280A CN 102497633 A CN102497633 A CN 102497633A
- Authority
- CN
- China
- Prior art keywords
- backup
- privacy
- mobile phone
- information
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a protection method for private information in cellphones, which is executed after the cellphones are stolen. The protection method includes steps of reading information, such as contact persons, short message records, call records and the like in the cellphones, encrypting and compressing the information to be stored in the network server so that users can find key data and information back through the network server; and then deleting all private data and preventing the private information stored in the cellphones by the users from escaping or being decoded. The problems of incompleteness and untightness of the private information are solved by encryption, backups and automatic deletion, encrypted private backup files are uploaded to the server by means of automatic authentication and automatic uploading, so that key data can be guaranteed to be backed up and can be matched and claimed back through cellphone numbers.
Description
Technical field
The present invention relates to the mobile phone safe practice, network backup technology, the particularly backup of private data and destruction technology in the smart mobile phone.
Background technology
In view of smart mobile phone occupation rate in the world improves year by year, the information security issue on the mobile phone also more and more receives people's attention, and mobile phone is lost the privacy information that possibly cause storing in the mobile phone and revealed.Up-to-date mobile phone safety survey reports in 2011 of Nuo Dun issue point out, meet with the experience that mobile phone is lost the user of Chinese market 74%.After mobile phone was lost or be stolen, the data of storing in the protection mobile phone became the most important thing.84% victim thinks, mobile phone lose or stolen after, top it all off lose friends and family's etc. contact details, also have the adult of 31%-38% to worry privacy or sensitive information leakage.
TD joint laboratory of China Mobile of the Central China University of Science and Technology under the applicant is studied mobile phone safety protection technique under the mobile application environment, obtains a kind of invention of mobile phone private information back-up scheme.The objective of the invention is to improve the private information protective capability of mobile phone, the mobile phone that guarantees the user lose or stolen after can in time back up and delete the important information in the user mobile phone.
Present existing mobile phone fail-safe software product possesses " privacy protection mode " or " privacy space " function mostly, can select some contact person's telephone number to be set to " privacy number ".Through being provided with all relevant informations of special contact person are stashed, comprise its contact method, note and message registration etc., other people only can see does not have hiding content.
Also there is part mobile phone fail-safe software can select the mobile phone file that to encrypt, cryptoguard is set.After setting finishes, he per capita can't mobile phone on or the content of checking encryption folder on the computer.If mobile phone is lost or stolen, can remote lock or the deletion mobile phone in private data, for being stored in the sensitive information setting safe barrier together on the mobile phone.
But at present typical mobile phone security protection software scenario has following drawback:
The first, existing secret protection all is to come out to deposit separately through the data extract of the address list management software that mobile phone is carried, conversation software, note software institute maintenance and management, must use extra software to operate.In case after a contact person or a file were set to privacy, these data can't be operated through the basic software of embedded in mobile phone, increased the complexity of user's operation greatly, do not meet normal operating habit yet.
Second; Can only guarantee behind the hand-set from stolen that the privacy that part is set to contact person or the file of privacy etc. " narrow sense " is not revealed; The privacy that can not guarantee " broad sense " such as other general associated person informations, communications records is not revealed, and not protected data still can be read easily.
The 3rd, " the privacy space " in the mobile phone is though can not be checked arbitrarily that these data are still by complete being kept in the mobile phone, and the lawless person obtains still to have an opportunity to extract these data encrypted and crack behind the mobile phone.
The 4th, even all contact persons are set in " privacy space ", and AES is not easy to be cracked, and privacy is not revealed, but can not solve the problem that critical data is lost.
Can find out that from above four aspects the secret protection of existing mobile phone private scheme and imperfect, imprecision use inconvenience, and can not guarantee that critical data obtains backup and recovery.
Summary of the invention
In view of this, the present invention proposes method for protecting privacy in a kind of mobile phone, guarantee that the user is kept at privacy information in the mobile phone and does not leak or cracked.And, make the user give significant data and information for change through the webserver with storing on the webserver after the privacy information ciphered compressed.
For realizing above-mentioned purpose, the invention provides method for protecting privacy in the mobile phone, it is characterized in that; May further comprise the steps: require the input password when a) mobile phone leaves the screen locking state; B) whether the number of times of judging the password input error surpasses setting threshold, if, c then) the backup private data; D) deletion private data, e) said privacy Backup Data uploads to backup server.
1, the backup private data saves as temporary file, and concrete steps comprise:
Read All Contacts's information, use the name among the vcard3.0 format record contact person, telephone number, addresses of items of mail, instant messaging number of the account and corresponding type are temporarily saved as contact person's file;
Read message registration, make CSV format preserve information such as the other side's number of every conversation record, type of call, time of origin, duration, be temporarily saved as conversation record file;
The short message reading record makes CSV format preserve information such as the other side's number of every note record, transmitting-receiving type, time of origin, short message content, is temporarily saved as short breath record file.
2, delete the mobile phone file of contact information stored in the mobile phone, message registration, note record, setting after the completion backup immediately.
3, encrypt aforementioned each temporary file, merging is stored as the privacy backup file, and concrete steps comprise:
Temporary file (contact person's file, conversation record file, short breath record file etc.) is encrypted and is compressed, use the Zip compression algorithm to merge compression, and the telephone number that uses mobile phone as key with the encryption of AES AES, finally obtain the privacy backup file;
Delete the interim files of preserving such as described contact person's file, conversation record file, short breath record file.
4, the privacy backup file is uploaded onto the server, concrete steps comprise:
Mobile phone adopts HTTP GET agreement to sign in to backup server, and uses the parameter of cell-phone number as logging request, and the unique user identifier of server-assignment returns to mobile phone;
Mobile phone adopts the mode of HTTP POST, with multipart form encapsulation user identifier and said privacy backup file, the privacy backup file uploaded, and deletion privacy backup file.
The present invention has solved the imperfect imprecise problem of secret protection through the mode that adopts automatic encrypted backup, deletion automatically; Privacy backup file after the mode that the present invention adopts automated validation, upload automatically will be encrypted is uploaded onto the server, and guarantees that critical data can obtain backup, and can mate and recover through cell-phone number.
Can under the situation that hand-set from stolen is used, delete all private datas automatically through the present invention, guarantee that the user is kept at privacy information in the mobile phone and does not leak or cracked, and make the user give significant data and information for change through the webserver.
Description of drawings
Fig. 1 is a privacy information backup flow chart in the embodiments of the invention;
Fig. 2 uploads flow chart for the privacy backup file in the embodiment of the invention.
Embodiment
Because the secret protection of existing mobile phone private scheme and imperfect, imprecision use inconvenience, and can not guarantee that critical data obtains backing up and recovering.Information such as the contact person in the automated back-up mobile phone of the present invention, note record, message registration with storing on the webserver after the information encryption compression, make the user give significant data and information for change through the webserver.And delete all private datas automatically, guarantee that the user is kept at privacy information in the mobile phone and does not leak or cracked.
For making the object of the invention, technical scheme and advantage clearer, the present invention is made further detailed description below in conjunction with accompanying drawing.
In embodiments of the present invention, privacy information backup flow chart is as shown in Figure 1:
Name: Zhang San
Mobile phone: 12345678
Email: zhangsan139.com
Phonebook.vcf file content after then preserving is:
BFGIN:VCARD
VERSION:3.0
TEL;TYPE=CELL:12345678
N: open; Three;
FN: three
EMAIL;TYPE?HOME:zhangsan139.com
END:VCARD
Do not connect: before 139876543210 minutes
Incoming call: before 139123456781 minutes
Incoming call: before 10,086 2 minutes
Calls.csv file content after then preserving is following:
Phone,Time,Type,Duration
10086,1322553328776,1,12
13912345678,1322553372746,1,11
13987654321,1322553423813,2,0
Wherein the Phone field is represented the other side's number, and the Time field representes to call out the timestamp (apart from millisecond number on January 1st, 1900) of time of origin, and Type is that type of call (2 do not connect for 0 incoming call, 1 exhalation), Duration are the second number of call duration.
Number: 13912345678 contents: HelloWOrld time: the morning 8:01
Number: 13987654321 contents: Have a good day! Time: the sms.csv file content of 8:01 in the morning after then preserving is:
Phone,Time,Type,Text
13912345678,1322553698991,1,HelloWOrld
13987654321,1322553687728,1,Have?a?good?day!
Wherein the Phone field is represented the other side's number, and the Time field representes to call out the timestamp (apart from millisecond number on January 1st, 1900) of time of origin, and Type is that short message type (0 outbox, 1 inbox), Text are short message content.
AES encrypts line by line and adopts this tractor driver plane No. is key, as 13900000008, if information to be encrypted does
100000,1322553698991,1,weifuywifhqidhgnmvc
13377778788,1322553687728,1, yas djkhwefqw [result after fdiqwpd encrypts is:
A4209175E2F8AB802EBFC6A2BF73C6DB340189EDC1AAEC5CEAE6687D5F088B8E958B3E0842BC897146C84BFE763D27F6;
82A24A15E7452E1EAA71CD657A2CD7559353DF69F2F0C0F8D1A4527C00470C6DFE2383B483DB9124F05CD59943A0EB229EA4E8FADD19F32FFDDD523B9C9857C9
Temporary files such as step 106, deletion phonebook.vcf, sms.csv, calls.csv, the backup.zip that only keeps after compressing is the privacy backup file.
Also designed in the present invention and a kind of the privacy backup file has been uploaded to the scheme of webserver backup, as shown in Figure 2 according to the structure chart of backup uploading system:
POST/MyTest/Register?HTTP/1.1
Content-Length:11
Content-Type:application/x-www-form-urlencoded
Host:192.168.0.105:8080
Connection:Keep-Alive
User-Agent:Dalvik/1.4.0(Linux;U;Android?2.3.7;HERO200Build/GRI40)13900000008
HTTP/1.1200OK
Content-Type:text/plain;charset=utf-8
Content-Length:18
Connection?:keep-alive
2A24A15E7452E1EAA?7
The privacy backup file is uploaded in upload file 205, and the mode of secret protection The software adopted HTTP POST with multipart form encapsulation user identifier and said privacy backup file, is uploaded the privacy backup file
POST/MyTest/UpLoadHTTP/1.1
Connection?:Keep-Alive
Charset:UTF-8
User-Agent:Dalvik/1.4.0(Linux;U;Android?2.3.7;HERO200Build/GRI40)
Host:192.168.0.105:8080
Content-Type:multipart/form-data;boundary=AaB00x
Content-Length:149
Accept-Encoding:gzip
--AaB00x
Content-disposition:form-data;name=”token”
2A24A15E7452E1EAA7
--AaB00x
Content-disposition:form-data;name=”file”filename=”backup.zip”
--the file content of backup.zip
--AaB00x
Upload and accomplish 206, after uploading the privacy backup file and accomplishing, backup server returns 200OK.
HTTP/1.1200OK
Content-Length:0
Connection?:keep-alive
In a word, the above is merely preferred embodiment of the present invention, and temporary file title, file content and field name, privacy backup file name etc. is illustrative and describes, and is not to be used to limit protection scope of the present invention.
Claims (6)
1. method for protecting privacy in the mobile phone; It is characterized in that, may further comprise the steps: require the input password when a) mobile phone leaves the screen locking state, judge b) whether the number of times of password input error surpasses setting threshold; If; C then) backup private data, d) the deletion private data e) uploads to backup server with said privacy Backup Data.
2. method according to claim 1 is characterized in that, the further step of said backup private data comprises:
Step 1, read All Contacts's information, the name among the record contact person, telephone number, addresses of items of mail, instant messaging number of the account and corresponding type are temporarily saved as contact person's file;
Step 2, read message registration, preserve the information such as the other side's number, time of origin, type of call, duration of every conversation record, being temporarily saved as conversation record file;
The information such as the other side's number, transmitting-receiving type, time of origin, short message content of every note record preserved in step 3, short message reading record, are temporarily saved as short breath record file.
3. method according to claim 2 is characterized in that, said deletion private data comprises: the mobile phone file of contact information stored, message registration, note record, setting in the deletion mobile phone.
4. method according to claim 1 is characterized in that, said privacy Backup Data is encrypted before uploading onto the server.
5. method according to claim 5 is characterized in that, carries out processed compressed before said privacy Backup Data is encrypted.
6. method according to claim 1 is characterized in that, said privacy Backup Data is uploaded to backup server, may further comprise the steps:
Sign in to said backup server, the logging request parameter is a cell-phone number, and return value is unique user identifier that said backup server distributes; Said privacy Backup Data is uploaded; No matter upload whether said privacy backup data files is all deleted in success.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104202808A CN102497633A (en) | 2011-12-14 | 2011-12-14 | Protection method for private information in cellphones |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104202808A CN102497633A (en) | 2011-12-14 | 2011-12-14 | Protection method for private information in cellphones |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102497633A true CN102497633A (en) | 2012-06-13 |
Family
ID=46189413
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011104202808A Pending CN102497633A (en) | 2011-12-14 | 2011-12-14 | Protection method for private information in cellphones |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102497633A (en) |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932540A (en) * | 2012-10-24 | 2013-02-13 | 广东欧珀移动通信有限公司 | Mobile terminal and stealing prevention method thereof |
CN103020534A (en) * | 2012-11-30 | 2013-04-03 | 北京网秦天下科技有限公司 | Method and system for managing mobile terminal |
CN103079001A (en) * | 2012-12-27 | 2013-05-01 | 东莞宇龙通信科技有限公司 | Method and device for displaying information of deleted contact by using mobile terminal |
CN103227986A (en) * | 2013-04-01 | 2013-07-31 | 南京理工大学常熟研究院有限公司 | Android platform-based privacy protection system |
CN103338445A (en) * | 2013-06-19 | 2013-10-02 | 深圳市垦鑫达科技有限公司 | File encryption and decryption method and system |
CN103559455A (en) * | 2013-09-27 | 2014-02-05 | 李天才 | Android device personal information protection method based on user identification |
CN103634313A (en) * | 2013-11-27 | 2014-03-12 | 中国科学院深圳先进技术研究院 | Address list processing method and device, as well as mobile terminal |
CN103873521A (en) * | 2012-12-14 | 2014-06-18 | 江南大学 | Cloud architecture-based mobile phone privacy file protection system and method |
CN103888416A (en) * | 2012-12-20 | 2014-06-25 | 海尔集团公司 | Method and apparatus for preventing IP information stored in terminal equipment of security and protection system from being revealed |
CN104168489A (en) * | 2014-08-20 | 2014-11-26 | 乐视网信息技术(北京)股份有限公司 | Data protection method of smart television, server and smart television |
CN104243165A (en) * | 2014-08-28 | 2014-12-24 | 电子科技大学 | Intelligent movable terminal privacy protection system and method based on intelligent bracelet |
CN104333563A (en) * | 2013-07-22 | 2015-02-04 | 联想(北京)有限公司 | Method of information processing and electronic equipment |
CN104519127A (en) * | 2014-12-11 | 2015-04-15 | 天津大学 | Method for protecting personal information in mobile phone |
CN104573536A (en) * | 2015-01-28 | 2015-04-29 | 深圳市中兴移动通信有限公司 | File protection method and device |
CN104661201A (en) * | 2013-11-19 | 2015-05-27 | 中国科学院深圳先进技术研究院 | Method, device and system for short message backup, and mobile terminal |
CN104768148A (en) * | 2015-03-11 | 2015-07-08 | 浙江翼信科技有限公司 | Message encryption method and device |
CN105072603A (en) * | 2015-06-25 | 2015-11-18 | 邱兰 | Mobile terminal equipment management method |
CN105072295A (en) * | 2015-07-29 | 2015-11-18 | 魅族科技(中国)有限公司 | Information processing method and mobile terminal |
CN105184181A (en) * | 2015-06-15 | 2015-12-23 | 北京天诚同创电气有限公司 | File encryption method, file decryption method and file encryption device |
CN105430178A (en) * | 2015-11-05 | 2016-03-23 | 上海斐讯数据通信技术有限公司 | Wristband, mobile terminal and security information processing method and system thereof, and communication system |
CN105577690A (en) * | 2016-02-01 | 2016-05-11 | 北京京东尚科信息技术有限公司 | Information security control method and system of mobile communication terminal |
CN106973155A (en) * | 2017-03-22 | 2017-07-21 | 清华大学合肥公共安全研究院 | A kind of mobile phone personal information security management method |
CN108765789A (en) * | 2018-05-22 | 2018-11-06 | 北京翔云在线数据技术有限公司 | Intelligence is opened an account robot and account-opening method |
CN109460648A (en) * | 2018-11-13 | 2019-03-12 | 广东财经大学 | A kind of computer data defence method |
CN111125792A (en) * | 2019-12-13 | 2020-05-08 | 紫光云(南京)数字技术有限公司 | Method for preventing private information leakage when mobile phone is lost |
CN112543171A (en) * | 2019-09-23 | 2021-03-23 | 上海傲觉网络科技有限公司 | Chat data acquisition encryption management system |
CN113849133A (en) * | 2021-09-29 | 2021-12-28 | 珠海格力电器股份有限公司 | Processing method and device of private data, electronic equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859677A (en) * | 2006-03-15 | 2006-11-08 | 华为技术有限公司 | Method for protecting information safety in mobile terminal |
CN101252703A (en) * | 2008-03-28 | 2008-08-27 | 宇龙计算机通信科技(深圳)有限公司 | Terminal data protecting method, system as well as mobile communication terminal |
CN101426198A (en) * | 2008-09-27 | 2009-05-06 | Tcl天一移动通信(深圳)有限公司 | Mobile phone information protecting method |
-
2011
- 2011-12-14 CN CN2011104202808A patent/CN102497633A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859677A (en) * | 2006-03-15 | 2006-11-08 | 华为技术有限公司 | Method for protecting information safety in mobile terminal |
CN101252703A (en) * | 2008-03-28 | 2008-08-27 | 宇龙计算机通信科技(深圳)有限公司 | Terminal data protecting method, system as well as mobile communication terminal |
CN101426198A (en) * | 2008-09-27 | 2009-05-06 | Tcl天一移动通信(深圳)有限公司 | Mobile phone information protecting method |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932540A (en) * | 2012-10-24 | 2013-02-13 | 广东欧珀移动通信有限公司 | Mobile terminal and stealing prevention method thereof |
CN103020534A (en) * | 2012-11-30 | 2013-04-03 | 北京网秦天下科技有限公司 | Method and system for managing mobile terminal |
CN103873521A (en) * | 2012-12-14 | 2014-06-18 | 江南大学 | Cloud architecture-based mobile phone privacy file protection system and method |
CN103888416A (en) * | 2012-12-20 | 2014-06-25 | 海尔集团公司 | Method and apparatus for preventing IP information stored in terminal equipment of security and protection system from being revealed |
CN103079001A (en) * | 2012-12-27 | 2013-05-01 | 东莞宇龙通信科技有限公司 | Method and device for displaying information of deleted contact by using mobile terminal |
CN103079001B (en) * | 2012-12-27 | 2014-11-19 | 东莞宇龙通信科技有限公司 | Method and device for displaying information of deleted contact by using mobile terminal |
CN103227986A (en) * | 2013-04-01 | 2013-07-31 | 南京理工大学常熟研究院有限公司 | Android platform-based privacy protection system |
CN103338445A (en) * | 2013-06-19 | 2013-10-02 | 深圳市垦鑫达科技有限公司 | File encryption and decryption method and system |
CN104333563A (en) * | 2013-07-22 | 2015-02-04 | 联想(北京)有限公司 | Method of information processing and electronic equipment |
CN104333563B (en) * | 2013-07-22 | 2017-12-26 | 联想(北京)有限公司 | The method and electronic equipment of a kind of information processing |
CN103559455A (en) * | 2013-09-27 | 2014-02-05 | 李天才 | Android device personal information protection method based on user identification |
CN104661201A (en) * | 2013-11-19 | 2015-05-27 | 中国科学院深圳先进技术研究院 | Method, device and system for short message backup, and mobile terminal |
CN103634313A (en) * | 2013-11-27 | 2014-03-12 | 中国科学院深圳先进技术研究院 | Address list processing method and device, as well as mobile terminal |
CN104168489A (en) * | 2014-08-20 | 2014-11-26 | 乐视网信息技术(北京)股份有限公司 | Data protection method of smart television, server and smart television |
CN104243165A (en) * | 2014-08-28 | 2014-12-24 | 电子科技大学 | Intelligent movable terminal privacy protection system and method based on intelligent bracelet |
CN104519127A (en) * | 2014-12-11 | 2015-04-15 | 天津大学 | Method for protecting personal information in mobile phone |
CN104573536A (en) * | 2015-01-28 | 2015-04-29 | 深圳市中兴移动通信有限公司 | File protection method and device |
CN104768148A (en) * | 2015-03-11 | 2015-07-08 | 浙江翼信科技有限公司 | Message encryption method and device |
CN104768148B (en) * | 2015-03-11 | 2019-01-18 | 浙江翼信科技有限公司 | A kind of message encryption method and device |
CN105184181A (en) * | 2015-06-15 | 2015-12-23 | 北京天诚同创电气有限公司 | File encryption method, file decryption method and file encryption device |
CN105072603A (en) * | 2015-06-25 | 2015-11-18 | 邱兰 | Mobile terminal equipment management method |
CN105072295A (en) * | 2015-07-29 | 2015-11-18 | 魅族科技(中国)有限公司 | Information processing method and mobile terminal |
CN105430178A (en) * | 2015-11-05 | 2016-03-23 | 上海斐讯数据通信技术有限公司 | Wristband, mobile terminal and security information processing method and system thereof, and communication system |
CN105577690A (en) * | 2016-02-01 | 2016-05-11 | 北京京东尚科信息技术有限公司 | Information security control method and system of mobile communication terminal |
CN106973155A (en) * | 2017-03-22 | 2017-07-21 | 清华大学合肥公共安全研究院 | A kind of mobile phone personal information security management method |
CN108765789A (en) * | 2018-05-22 | 2018-11-06 | 北京翔云在线数据技术有限公司 | Intelligence is opened an account robot and account-opening method |
CN109460648A (en) * | 2018-11-13 | 2019-03-12 | 广东财经大学 | A kind of computer data defence method |
CN109460648B (en) * | 2018-11-13 | 2021-06-22 | 广东财经大学 | Computer data defense method |
CN112543171A (en) * | 2019-09-23 | 2021-03-23 | 上海傲觉网络科技有限公司 | Chat data acquisition encryption management system |
CN111125792A (en) * | 2019-12-13 | 2020-05-08 | 紫光云(南京)数字技术有限公司 | Method for preventing private information leakage when mobile phone is lost |
CN113849133A (en) * | 2021-09-29 | 2021-12-28 | 珠海格力电器股份有限公司 | Processing method and device of private data, electronic equipment and storage medium |
CN113849133B (en) * | 2021-09-29 | 2023-09-12 | 珠海格力电器股份有限公司 | Processing method and device of privacy data, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102497633A (en) | Protection method for private information in cellphones | |
CN104540123B (en) | The method and system of mobile terminal significant data encrypted backup and safety deleting | |
AU2014202775B2 (en) | Privacy management for tracked devices | |
US10778837B2 (en) | System and method for tracking and archiving mobile communications | |
US9775012B2 (en) | System and method for tracking SMS messages | |
US8862129B2 (en) | Systems and methods for encrypted mobile voice communications | |
CN103647784B (en) | A kind of method and apparatus of public and private isolation | |
US20040093385A1 (en) | Memory information backup method and system for cell phone | |
CN101616495A (en) | The method and system of individual privacy in the protection mobile phone | |
CN102722427A (en) | Data information backup method and data information backup system | |
US20150072654A1 (en) | Systems And Methods For Encrypted Mobile Voice Communications | |
Botha et al. | A comparison of chat applications in terms of security and privacy | |
CN103458396A (en) | Terminal locking and unlocking method and terminal locking and unlocking system | |
CN103077357A (en) | Method for storing private files | |
CN103188230A (en) | Mobile terminal and data protection method thereof | |
CN101877848B (en) | Mobile terminal, mobile terminal data protection method and mobile terminal monitoring system | |
US8788648B2 (en) | Communication system and communication device | |
CN102404728A (en) | System and method for mobile phone tracking and privacy protection | |
WO2011088660A1 (en) | Method and apparatus for protecting cell-phone information content | |
Khweiled et al. | An improved framework for cyberbullying investigation process on WhatsApp application | |
KR101690850B1 (en) | Systems and methods for encrypted mobile voice communications | |
CN101009878A (en) | Data secrecy system and method | |
WO2012006840A1 (en) | Method and equipment for hiding information | |
CN106357413A (en) | Method for encrypting numbers with fingerprint and mobile terminal | |
CN104182706A (en) | Encryption method and encryption device of mobile terminal memory card as well as mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120613 |