The content of the invention
In view of the above problems, the present invention provides a kind of Mobile phone privacy protection system and guard method.
The technical proposal for solving the technical problem of the invention is:
A kind of Mobile phone privacy protection system, wherein, including:It is MIM message input module, message output module, processing module, hidden
Private module;
Described information input module, described information output module, the privacy module are connected with the processing module;
Cryptographic parameter is stored in the privacy module;
Described information input module gathers unlocking pin input by user, which is sent to the processing mould
Block, the processing module transfer the cryptographic parameter in the privacy module, and by the unlocking pin and the cryptographic parameter into
Row computing compares, and when the cryptographic parameter and the unlocking pin are inconsistent, the processing module unlocks mobile phone screen, and
The message of limitation progress privacy operations is sent to MIM message input module and message output module, MIM message input module to be prevented to gather
Operation information relevant with the privacy operations and prevention message output module export and the relevant information of the privacy operations.
The intimacy protection system, wherein, the processing module includes execution unit, arithmetic element and control unit;
Described control unit is used to transfer the cryptographic parameter in the privacy module;The arithmetic element is used for the solution
Lock cipher and the cryptographic parameter carry out computing comparison;Described control unit limits the message used to described information for transmission
Input module and described information output module are to control the function of described information input module and described information output module.
The intimacy protection system, wherein, the privacy operations include display, the active of privacy function of privacy information
Use the passive use with privacy function.
The intimacy protection system, wherein, the display of the privacy information includes:Show message registration, display history
Short message;The active use of the privacy function includes:It calls, send short message, application program installs and uninstalls;It is described hidden
The passive use of private function includes:Incoming call answering receives short message, the notice of application program.
A kind of mobile phone private guard method, wherein, the described method includes:
Step 1, when mobile phone is under screen lock state, after the power key of mobile phone is pressed, unlock circle is presented in mobile phone screen
Face;
Step 2, acquisition unlocking pin input by user;
Step 3 calls cryptographic parameter, and the unlocking pin and the cryptographic parameter is compared, when the password
When parameter is consistent with the unlocking pin, step 4 is carried out, but without step 5;When the cryptographic parameter and the unlocking pin
When inconsistent, 5 are entered step;
Step 4 is unlocked mobile phone screen, and mobile phone can be used normally;
Step 5 sends limitation and carries out the message of privacy operations to described information input module and described information output module,
Described information input module, which is received after the limitation carries out the message of privacy operations, stops acquisition and the relevant operation of privacy operations
Information, described information output module, which is received after the limitation carries out the message of privacy operations, to be stopped exporting privacy information.
The mobile phone private guard method, wherein, the method further includes:It follows the steps below before step 1:Institute
It states and secret protection state parameter is also stored in privacy module;
When the secret protection state parameter is set on, mobile phone is carried out using the method for the step 1~step 5
The mobile phone private protection;
When the secret protection state parameter is set off, the mobile phone private is carried out to mobile phone using following steps
Protection:
After the power key of mobile phone is pressed, unlock interface is presented in mobile phone screen;MIM message input module acquisition user's input
Unlocking pin, be sent in the processing module;The processing module calls the cryptographic parameter in the privacy module, and will
The unlocking pin and the cryptographic parameter are compared;When the cryptographic parameter is consistent with the unlocking pin, the place
Reason module is unlocked mobile phone screen, and mobile phone can carry out normal use;When the cryptographic parameter and the unlocking pin not
When consistent, the processing module is not unlocked mobile phone screen, and sends a request to described information output module, described information
Output module exports the information for re-entering password.
The mobile phone private guard method, wherein, privacy settings parameter, the privacy are stored in the privacy module
Privacy application program and non-privacy application program defined in arrange parameter are privacy behaviour to the operation that privacy application program carries out
Make, be normal operating to the operation that non-privacy application program carries out.
The mobile phone private guard method, wherein, the displays of privacy operations including privacy information, privacy function
Actively using the passive use with privacy function.
The mobile phone private guard method, wherein, the display of the privacy information includes:Show message registration, display
History short message;The active use of the privacy function includes:It calls, send short message, application program installs and uninstalls;Institute
Stating the passive use of privacy function includes:Incoming call answering receives short message, the notice of application program.
Above-mentioned technical proposal has the following advantages that or advantageous effect:
The present invention be directed to conventional mobile phone unlocking screen shortcoming, by mobile phone user input unlocking pin correctly with
It is no, with determine mobile phone carry out it is limited use or normal use, can allow in addition to mobile phone owner other people limited use mobile phone
Function, avoid in addition to mobile phone owner other people use the content for being related to mobile phone owner's privacy, preventing mobile phone private
While information-leakage, it is ensured that the normal use of the non-privacy function of mobile phone.
Specific embodiment
The present invention provides a kind of Mobile phone privacy protection system and guard method, can be applied to the unlocking link after mobile phone screen locking
Section.
Mobile phone privacy protection system in the present invention includes:MIM message input module, message output module, processing module and
Privacy module;Wherein, MIM message input module, message output module, privacy module are connected respectively with processing module, such as Fig. 1 institutes
Show.
MIM message input module is used to gather the operation requests of user;Message output module is used to believe the data of interior of mobile phone
Breath is exported;Processing module includes execution unit, arithmetic element, control unit, wherein, execution unit is used to transfer in mobile phone
Content in disparate modules, arithmetic element are used to carry out the comparison and judgement of data, and control unit is used for the function in mobile phone
It is controlled;Cryptographic parameter is stored in privacy module, which is the encrypted message set in mobile phone.
MIM message input module gathers unlocking pin input by user, which is sent to processing module, handles mould
Block transfers the cryptographic parameter in privacy module, and unlocking pin and cryptographic parameter are carried out computing comparison, when cryptographic parameter and solution
When lock cipher is inconsistent, processing module unlocks mobile phone screen, and the message for sending limitation progress privacy operations is inputted to information
Module and message output module, MIM message input module to be prevented to gather operation information relevant with privacy operations and prevents information defeated
Go out module output and the relevant information of privacy operations.
Mobile phone private guard method in the present invention is the protection side formed based on above-mentioned Mobile phone privacy protection system
Method below illustrates the mobile phone private guard method in the present invention.
The method for secret protection mainly includes the content of three aspects:1st, message registration, short message, application notification are prevented
Etc. privacy contents display;2nd, forbid calling, send the active for the privacy functions such as installing and uninstalling of short message, application program
It uses;3rd, the passive use for receiving calls, receiving short message, receiving the privacy functions such as application notification is forbidden.
Mobile phone private guard method comprises the following steps:
Step 1, when mobile phone is under screen lock state, after the power key of mobile phone is pressed, unlock circle is presented in mobile phone screen
Face;
Step 2, MIM message input module gather unlocking pin input by user, are sent in the processing module;
Step 3, the processing module call the cryptographic parameter in the privacy module, and by the unlocking pin and described
Cryptographic parameter is compared, and when the cryptographic parameter is consistent with the unlocking pin, carries out step 4, but without step 5;
When the cryptographic parameter and the unlocking pin are inconsistent, 5 are entered step;
Step 4, the processing module are unlocked mobile phone screen, and mobile phone can be used normally;
Step 5, the processing module send limitation and carry out the message of privacy operations to described information input module and described
Message output module, described information input module, which is received after the limit value carries out the message of privacy operations, stops acquisition and privacy behaviour
Make relevant operation information, described information output module, which is received after the limitation carries out the message of privacy operations, to be stopped believing privacy
Breath is exported.
Following steps can be also set before step 1:Secret protection state parameter is also stored in the privacy module;
When the secret protection state parameter is set on, mobile phone is carried out using the method for the step 1~step 5
The mobile phone private protection;
When the secret protection state parameter is set off, the mobile phone private is carried out to mobile phone using following steps
Protection:
After the power key of mobile phone is pressed, unlock interface is presented in mobile phone screen;MIM message input module acquisition user's input
Unlocking pin, be sent in the processing module;The processing module calls the cryptographic parameter in the privacy module, and will
The unlocking pin and the cryptographic parameter are compared;When the cryptographic parameter is consistent with the unlocking pin, the place
Reason module is unlocked mobile phone screen, and mobile phone can carry out normal use;When the cryptographic parameter and the unlocking pin not
When consistent, the processing module is not unlocked mobile phone screen, and sends a request to described information output module, described information
Output module exports the information for re-entering password.
The above method is described in detail with reference to specific embodiments and the drawings.
As shown in Fig. 2, when mobile phone is under screen lock state, after the power key of mobile phone is pressed, solution is presented in mobile phone screen
Lock interface;The unlocking pin of the user of MIM message input module acquisition at this time, and it is sent to processing module;Execution list in processing module
First elder generation's invoking privacy mould secret protection state parameter in the block is into processing module;Arithmetic element in processing module judges that this is hidden
Whether private guard mode parameter is in opening;
When secret protection state is in opening, continues to transfer privacy information by the execution unit in processing module and deposit
For Chu Mo cryptographic parameters in the block into processing module, the arithmetic element in processing module carries out the cryptographic parameter and unlocking pin
It compares;When inconsistent, processing module is unlocked mobile phone screen, at this point, user enters limited use state;When consistent
When, mobile phone screen is unlocked by processing module, at this point, user enters normal operating condition.
When secret protection state is closed, continues to transfer privacy information by the execution unit in processing module and deposit
For Chu Mo cryptographic parameters in the block into processing module, the arithmetic element in processing module carries out the cryptographic parameter and unlocking pin
It compares;When inconsistent, the control unit in processing module prevents the unlock of mobile phone, and by message output module output again
Input the message of password;When consistent, the control unit control in processing module is unlocked mobile phone, at this point, user is into just
Normal use state.
Limited use mentioned in the above method refers to that user is forbidden to carry out the content for being related to privacy in mobile phone
The relevant operation divulged a secret may be caused, which specifically includes:1st, message registration, short message, application notification etc. are prevented
The display of privacy content;2nd, forbid calling, send short message, the active for the privacy functions such as installing and uninstalling of application program makes
With;3rd, the passive use for receiving calls, receiving short message, receiving the privacy functions such as application notification is forbidden.
The limited use in the above method is described in detail below in conjunction with the accompanying drawings.
(1)Show that the relevant operation of privacy information is asked when MIM message input module collects requirement(Such as the reading of history short message
It takes, the reading of message registration etc.)When, if mobile phone is in limited use state at this time, MIM message input module sends the request
To processing module, the message that processing module transmission limitation progress privacy information exports is to message output module, message output module
Stopping exports privacy information.Wherein, camouflage information can be preferably set in privacy module, by processing module
Execution unit transfers corresponding Camouflaged data in privacy information memory module, and is sent to message output module, defeated by information
Go out module to export the Camouflaged data;The Camouflaged data could be provided as clear data etc..
Specially:a)As shown in figure 3, when MIM message input module collects requirement and reads the operation requests of history short message,
If mobile phone is in limited use state at this time, MIM message input module sends the request to processing module, in processing module
Execution unit transfers the clear data in privacy information memory module, and is sent to message output module, and mould is exported by information
Block exports the clear data;If mobile phone is not in limited use state at this time, normal to read history short message;b)Such as figure
Shown in 4, when MIM message input module, which collects requirement, reads the operation requests of message registration, if mobile phone is in limited use at this time
State, then MIM message input module send the request to processing module, the execution unit in processing module is transferred privacy information and is deposited
Chu Mo clear datas in the block, and message output module is sent to, the clear data is exported by message output module;
If mobile phone is not in limited use state at this time, normal to read message registration.
(2)When MIM message input module collects requirement the relevant operation of privacy function is actively used to ask(Change mobile phone is set
It puts, call, send short message, installing and uninstalling application program etc.)When, if mobile phone is in limited use state at this time, believe
Breath input module sends the request to processing module, and the control unit in processing module forbids MIM message input module acquisition and main
It is dynamic to use the relevant operation information of privacy function.
Specially:a)As shown in figure 5, when MIM message input module collects the operation requests that requirement is called, at this time
If mobile phone is in limited use state, MIM message input module sends the request to processing module, the control in processing module
Unit cancels the operation requests called, and sends report an error prompt message to information output unit simultaneously, defeated by information
Go out unit to export the prompt message that reports an error;If mobile phone is not in limited use state at this time, normally call;b)
As shown in fig. 6, when MIM message input module collects requirement and sends the operation requests of short message, if mobile phone is in limited use at this time
State, then MIM message input module send the request to processing module, the control unit in processing module cancels the transmission short message
Operation requests, and send report an error prompt message simultaneously(It can not send)It, will by information output unit to information output unit
The prompt message that reports an error is exported;If mobile phone is not in limited use state at this time, normal to send short message;c)Such as Fig. 7 institutes
Show, when MIM message input module collects the operation requests that requirement change mobile phone is set, if mobile phone uses shape in limited at this time
State, then MIM message input module send the request to processing module, the control unit in processing module forbids MIM message input module
The operation information that acquisition change mobile phone is set makes mobile phone refuse to respond the operation that change mobile phone is set;If mobile phone is not at this time
Limited use state, the then normally setting of change mobile phone;d)As shown in figure 8, when MIM message input module collect requirement installation or
When unloading the operation requests of application program, if mobile phone is in limited use state at this time, MIM message input module sends out the request
Give processing module, the control unit in processing module cancels the installation or unloads the operation requests of application program, and sends out simultaneously
It delivers newspaper wrong prompt message(It can not install or unload)To information output unit, this is included by prompt message by information output unit
It is exported;If mobile phone is not in limited use state, normal mounting or unloading application program at this time.
(3)When MIM message input module collects the passive using request of privacy function(It such as receives calls, receives short message, answers
With the related announcement information of program)When, if mobile phone is in limited use state at this time, MIM message input module sends the request
To processing module, the control unit in processing module forbids message output module output with privacy function passively using relevant
Data.
Specially:a)As shown in figure 9, when MIM message input module collects the operation requests for needing to receive calls, at this time
If mobile phone is in limited use state, MIM message input module sends the request to processing module, the control in processing module
Unit forbids message output module to export the prompt message to receive calls, and the message that will newly send a telegram here prevents display;Hand at this time
If machine is not in limited use state, normally receive calls;b)As shown in Figure 10, connect when MIM message input module collects needs
When receiving the operation requests of short message, if mobile phone is in limited use state at this time, MIM message input module sends the request to place
Module is managed, the control unit in processing module forbids message output module to export the notification information of the reception new information, Ji Jiangxin
The notification information of message prevents display;If mobile phone, which is in, at this time is not limited use state, short message is normally received;c)Such as Figure 11 institutes
Show, when MIM message input module, which collects, needs the notice for showing application program request, if mobile phone uses shape in limited at this time
State, then MIM message input module send the request to processing module, the control unit in processing module forbids message output module
Export the notification information of the application program;Wherein, privacy settings parameter can be preferably stored in privacy module, which sets
Put parameter definition privacy program and non-privacy application program;It needs to show application program when MIM message input module collects
During notice request, the execution unit in processing module transfers privacy settings parameter in privacy module into processing module, processing
Mould running unit in the block judge according to the individual character privacy settings judge need show notice request the application program whether be
Privacy application program;When the application program is privacy application program, the control unit in processing module forbids information to export mould
Block exports the notification information of the application program, i.e., the notification information of the application program is prevented display by this;If mobile phone is not located at this time
In the notice of limited use state, then normal display application program.
For a person skilled in the art, after reading above description, various changes and modifications undoubtedly will be evident.
Therefore, appended claims should regard whole variations and modifications of the true intention and scope that cover the present invention as.It is weighing
The scope and content of any and all equivalence, are all considered as still belonging to the intent and scope of the invention in the range of sharp claim.