CN103269402B - A kind of Mobile phone privacy protection system and guard method - Google Patents

A kind of Mobile phone privacy protection system and guard method Download PDF

Info

Publication number
CN103269402B
CN103269402B CN201310191136.0A CN201310191136A CN103269402B CN 103269402 B CN103269402 B CN 103269402B CN 201310191136 A CN201310191136 A CN 201310191136A CN 103269402 B CN103269402 B CN 103269402B
Authority
CN
China
Prior art keywords
privacy
module
mobile phone
message
unlocking pin
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310191136.0A
Other languages
Chinese (zh)
Other versions
CN103269402A (en
Inventor
商智慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Heilongjiang Huibrush Technology Co.,Ltd.
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201310191136.0A priority Critical patent/CN103269402B/en
Publication of CN103269402A publication Critical patent/CN103269402A/en
Application granted granted Critical
Publication of CN103269402B publication Critical patent/CN103269402B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present invention relates to a kind of Mobile phone privacy protection system and guard method, which includes:MIM message input module, message output module, processing module, privacy module;Described information input module, described information output module, the privacy module are connected with the processing module;Cryptographic parameter is stored in the privacy module;Described information input module gathers unlocking pin input by user, the unlocking pin is sent to the processing module, the processing module transfers the cryptographic parameter in the privacy module, and the unlocking pin and the cryptographic parameter are subjected to computing comparison, when the cryptographic parameter and the unlocking pin are inconsistent, the processing module unlocks mobile phone screen, and it sends limitation and carries out the message of privacy operations to MIM message input module and message output module, MIM message input module acquisition to be prevented to be exported and the relevant information of the privacy operations with the relevant operation information of the privacy operations and prevention message output module.

Description

A kind of Mobile phone privacy protection system and guard method
Technical field
The present invention relates to a kind of cellphone control system and control method more particularly to a kind of Mobile phone privacy protection system and guarantors Maintaining method.
Background technology
Become stronger day by day with the function of mobile phone, adjoint information content also increasingly increase comprising the person of being directed to use with The problem of information of privacy is also more and more, and particularly mobile phone private is safe for mobile phone safe have become people instantly and have extremely closed The problem of heart and attention.
At present, the secret protection of mobile phone hommization not enough, is mainly shown as following aspect:Existing to the hidden of mobile phone Private protection is main by the way of the control of main entrance, i.e. user setting unlocking pin, when carrying out mobile phone unlock, need to input unlock Password, after correct unlocking pin is inputted, can normal use mobile phone institute it is functional;When inputting incorrect password, then It needs to carry out Password Input again, any function of mobile phone cannot be used if it can not input correct password.Such privacy Protected mode limits the normal use of non-privacy content in mobile phone too much while privacy is protected.
As it can be seen that although above-mentioned mobile phone private guard method plays an important role of to protect privacy, the mode of secret protection Underaction, the undue use for limiting cell-phone function, is not suitable for the needs for meeting diversification.
Chinese patent(Publication number:CN102497633A)A kind of guard method of privacy information in mobile phone is disclosed, is being examined It measures after hand-set from stolen is used and starts to perform, including:The information such as contact person, short message record, the message registration in mobile phone are read, will be believed It is stored after encryption for information compression onto network server, allows users to give critical data and information for change by network server.So After delete all private datas, ensure that user is stored in the privacy information in mobile phone and does not leak and cracked.The patent is although right Privacy information can be protected, but not protected for the privacy function of mobile phone, and accordingly, there exist certain limitations Property.
The content of the invention
In view of the above problems, the present invention provides a kind of Mobile phone privacy protection system and guard method.
The technical proposal for solving the technical problem of the invention is:
A kind of Mobile phone privacy protection system, wherein, including:It is MIM message input module, message output module, processing module, hidden Private module;
Described information input module, described information output module, the privacy module are connected with the processing module;
Cryptographic parameter is stored in the privacy module;
Described information input module gathers unlocking pin input by user, which is sent to the processing mould Block, the processing module transfer the cryptographic parameter in the privacy module, and by the unlocking pin and the cryptographic parameter into Row computing compares, and when the cryptographic parameter and the unlocking pin are inconsistent, the processing module unlocks mobile phone screen, and The message of limitation progress privacy operations is sent to MIM message input module and message output module, MIM message input module to be prevented to gather Operation information relevant with the privacy operations and prevention message output module export and the relevant information of the privacy operations.
The intimacy protection system, wherein, the processing module includes execution unit, arithmetic element and control unit;
Described control unit is used to transfer the cryptographic parameter in the privacy module;The arithmetic element is used for the solution Lock cipher and the cryptographic parameter carry out computing comparison;Described control unit limits the message used to described information for transmission Input module and described information output module are to control the function of described information input module and described information output module.
The intimacy protection system, wherein, the privacy operations include display, the active of privacy function of privacy information Use the passive use with privacy function.
The intimacy protection system, wherein, the display of the privacy information includes:Show message registration, display history Short message;The active use of the privacy function includes:It calls, send short message, application program installs and uninstalls;It is described hidden The passive use of private function includes:Incoming call answering receives short message, the notice of application program.
A kind of mobile phone private guard method, wherein, the described method includes:
Step 1, when mobile phone is under screen lock state, after the power key of mobile phone is pressed, unlock circle is presented in mobile phone screen Face;
Step 2, acquisition unlocking pin input by user;
Step 3 calls cryptographic parameter, and the unlocking pin and the cryptographic parameter is compared, when the password When parameter is consistent with the unlocking pin, step 4 is carried out, but without step 5;When the cryptographic parameter and the unlocking pin When inconsistent, 5 are entered step;
Step 4 is unlocked mobile phone screen, and mobile phone can be used normally;
Step 5 sends limitation and carries out the message of privacy operations to described information input module and described information output module, Described information input module, which is received after the limitation carries out the message of privacy operations, stops acquisition and the relevant operation of privacy operations Information, described information output module, which is received after the limitation carries out the message of privacy operations, to be stopped exporting privacy information.
The mobile phone private guard method, wherein, the method further includes:It follows the steps below before step 1:Institute It states and secret protection state parameter is also stored in privacy module;
When the secret protection state parameter is set on, mobile phone is carried out using the method for the step 1~step 5 The mobile phone private protection;
When the secret protection state parameter is set off, the mobile phone private is carried out to mobile phone using following steps Protection:
After the power key of mobile phone is pressed, unlock interface is presented in mobile phone screen;MIM message input module acquisition user's input Unlocking pin, be sent in the processing module;The processing module calls the cryptographic parameter in the privacy module, and will The unlocking pin and the cryptographic parameter are compared;When the cryptographic parameter is consistent with the unlocking pin, the place Reason module is unlocked mobile phone screen, and mobile phone can carry out normal use;When the cryptographic parameter and the unlocking pin not When consistent, the processing module is not unlocked mobile phone screen, and sends a request to described information output module, described information Output module exports the information for re-entering password.
The mobile phone private guard method, wherein, privacy settings parameter, the privacy are stored in the privacy module Privacy application program and non-privacy application program defined in arrange parameter are privacy behaviour to the operation that privacy application program carries out Make, be normal operating to the operation that non-privacy application program carries out.
The mobile phone private guard method, wherein, the displays of privacy operations including privacy information, privacy function Actively using the passive use with privacy function.
The mobile phone private guard method, wherein, the display of the privacy information includes:Show message registration, display History short message;The active use of the privacy function includes:It calls, send short message, application program installs and uninstalls;Institute Stating the passive use of privacy function includes:Incoming call answering receives short message, the notice of application program.
Above-mentioned technical proposal has the following advantages that or advantageous effect:
The present invention be directed to conventional mobile phone unlocking screen shortcoming, by mobile phone user input unlocking pin correctly with It is no, with determine mobile phone carry out it is limited use or normal use, can allow in addition to mobile phone owner other people limited use mobile phone Function, avoid in addition to mobile phone owner other people use the content for being related to mobile phone owner's privacy, preventing mobile phone private While information-leakage, it is ensured that the normal use of the non-privacy function of mobile phone.
Description of the drawings
With reference to appended attached drawing, more fully to describe the embodiment of the present invention.However, appended attached drawing be merely to illustrate and It illustrates, and is not meant to limit the scope of the invention.
Fig. 1 is the structure diagram of the Mobile phone privacy protection system in the present invention;
Fig. 2 is the flow diagram in the method for the present invention embodiment;
Fig. 3 is that the mobile phone in the method for the present invention embodiment is in when secret protection state is opened to display history short message progress The limited flow diagram used;
Fig. 4 is that the mobile phone in the method for the present invention embodiment is in when secret protection state is opened to display message registration progress The limited flow diagram used;
Fig. 5 is that the mobile phone in the method for the present invention embodiment is limited when being in the unlatching of secret protection state to calling The flow diagram used;
Fig. 6 is that the mobile phone in the method for the present invention embodiment is limited when being in the unlatching of secret protection state to sending short message The flow diagram used;
Fig. 7 is that the mobile phone in the method for the present invention embodiment is in when secret protection state is opened to change mobile phone setting progress The limited flow diagram used;
Fig. 8 is that the mobile phone in the method for the present invention embodiment is in when secret protection state is opened to installing or unloading using journey Sequence carries out the limited flow diagram used;
Fig. 9 is that the mobile phone in the method for the present invention embodiment is limited when being in the unlatching of secret protection state to receiving calls The flow diagram used;
Figure 10 be mobile phone in the method for the present invention embodiment be in when secret protection state is opened to receive short message carry out by Limit the flow diagram used;
Figure 11 is that the mobile phone in the method for the present invention embodiment is in when secret protection state is opened to showing that application program is led to Know and carry out the limited flow diagram used.
Specific embodiment
The present invention provides a kind of Mobile phone privacy protection system and guard method, can be applied to the unlocking link after mobile phone screen locking Section.
Mobile phone privacy protection system in the present invention includes:MIM message input module, message output module, processing module and Privacy module;Wherein, MIM message input module, message output module, privacy module are connected respectively with processing module, such as Fig. 1 institutes Show.
MIM message input module is used to gather the operation requests of user;Message output module is used to believe the data of interior of mobile phone Breath is exported;Processing module includes execution unit, arithmetic element, control unit, wherein, execution unit is used to transfer in mobile phone Content in disparate modules, arithmetic element are used to carry out the comparison and judgement of data, and control unit is used for the function in mobile phone It is controlled;Cryptographic parameter is stored in privacy module, which is the encrypted message set in mobile phone.
MIM message input module gathers unlocking pin input by user, which is sent to processing module, handles mould Block transfers the cryptographic parameter in privacy module, and unlocking pin and cryptographic parameter are carried out computing comparison, when cryptographic parameter and solution When lock cipher is inconsistent, processing module unlocks mobile phone screen, and the message for sending limitation progress privacy operations is inputted to information Module and message output module, MIM message input module to be prevented to gather operation information relevant with privacy operations and prevents information defeated Go out module output and the relevant information of privacy operations.
Mobile phone private guard method in the present invention is the protection side formed based on above-mentioned Mobile phone privacy protection system Method below illustrates the mobile phone private guard method in the present invention.
The method for secret protection mainly includes the content of three aspects:1st, message registration, short message, application notification are prevented Etc. privacy contents display;2nd, forbid calling, send the active for the privacy functions such as installing and uninstalling of short message, application program It uses;3rd, the passive use for receiving calls, receiving short message, receiving the privacy functions such as application notification is forbidden.
Mobile phone private guard method comprises the following steps:
Step 1, when mobile phone is under screen lock state, after the power key of mobile phone is pressed, unlock circle is presented in mobile phone screen Face;
Step 2, MIM message input module gather unlocking pin input by user, are sent in the processing module;
Step 3, the processing module call the cryptographic parameter in the privacy module, and by the unlocking pin and described Cryptographic parameter is compared, and when the cryptographic parameter is consistent with the unlocking pin, carries out step 4, but without step 5; When the cryptographic parameter and the unlocking pin are inconsistent, 5 are entered step;
Step 4, the processing module are unlocked mobile phone screen, and mobile phone can be used normally;
Step 5, the processing module send limitation and carry out the message of privacy operations to described information input module and described Message output module, described information input module, which is received after the limit value carries out the message of privacy operations, stops acquisition and privacy behaviour Make relevant operation information, described information output module, which is received after the limitation carries out the message of privacy operations, to be stopped believing privacy Breath is exported.
Following steps can be also set before step 1:Secret protection state parameter is also stored in the privacy module;
When the secret protection state parameter is set on, mobile phone is carried out using the method for the step 1~step 5 The mobile phone private protection;
When the secret protection state parameter is set off, the mobile phone private is carried out to mobile phone using following steps Protection:
After the power key of mobile phone is pressed, unlock interface is presented in mobile phone screen;MIM message input module acquisition user's input Unlocking pin, be sent in the processing module;The processing module calls the cryptographic parameter in the privacy module, and will The unlocking pin and the cryptographic parameter are compared;When the cryptographic parameter is consistent with the unlocking pin, the place Reason module is unlocked mobile phone screen, and mobile phone can carry out normal use;When the cryptographic parameter and the unlocking pin not When consistent, the processing module is not unlocked mobile phone screen, and sends a request to described information output module, described information Output module exports the information for re-entering password.
The above method is described in detail with reference to specific embodiments and the drawings.
As shown in Fig. 2, when mobile phone is under screen lock state, after the power key of mobile phone is pressed, solution is presented in mobile phone screen Lock interface;The unlocking pin of the user of MIM message input module acquisition at this time, and it is sent to processing module;Execution list in processing module First elder generation's invoking privacy mould secret protection state parameter in the block is into processing module;Arithmetic element in processing module judges that this is hidden Whether private guard mode parameter is in opening;
When secret protection state is in opening, continues to transfer privacy information by the execution unit in processing module and deposit For Chu Mo cryptographic parameters in the block into processing module, the arithmetic element in processing module carries out the cryptographic parameter and unlocking pin It compares;When inconsistent, processing module is unlocked mobile phone screen, at this point, user enters limited use state;When consistent When, mobile phone screen is unlocked by processing module, at this point, user enters normal operating condition.
When secret protection state is closed, continues to transfer privacy information by the execution unit in processing module and deposit For Chu Mo cryptographic parameters in the block into processing module, the arithmetic element in processing module carries out the cryptographic parameter and unlocking pin It compares;When inconsistent, the control unit in processing module prevents the unlock of mobile phone, and by message output module output again Input the message of password;When consistent, the control unit control in processing module is unlocked mobile phone, at this point, user is into just Normal use state.
Limited use mentioned in the above method refers to that user is forbidden to carry out the content for being related to privacy in mobile phone The relevant operation divulged a secret may be caused, which specifically includes:1st, message registration, short message, application notification etc. are prevented The display of privacy content;2nd, forbid calling, send short message, the active for the privacy functions such as installing and uninstalling of application program makes With;3rd, the passive use for receiving calls, receiving short message, receiving the privacy functions such as application notification is forbidden.
The limited use in the above method is described in detail below in conjunction with the accompanying drawings.
(1)Show that the relevant operation of privacy information is asked when MIM message input module collects requirement(Such as the reading of history short message It takes, the reading of message registration etc.)When, if mobile phone is in limited use state at this time, MIM message input module sends the request To processing module, the message that processing module transmission limitation progress privacy information exports is to message output module, message output module Stopping exports privacy information.Wherein, camouflage information can be preferably set in privacy module, by processing module Execution unit transfers corresponding Camouflaged data in privacy information memory module, and is sent to message output module, defeated by information Go out module to export the Camouflaged data;The Camouflaged data could be provided as clear data etc..
Specially:a)As shown in figure 3, when MIM message input module collects requirement and reads the operation requests of history short message, If mobile phone is in limited use state at this time, MIM message input module sends the request to processing module, in processing module Execution unit transfers the clear data in privacy information memory module, and is sent to message output module, and mould is exported by information Block exports the clear data;If mobile phone is not in limited use state at this time, normal to read history short message;b)Such as figure Shown in 4, when MIM message input module, which collects requirement, reads the operation requests of message registration, if mobile phone is in limited use at this time State, then MIM message input module send the request to processing module, the execution unit in processing module is transferred privacy information and is deposited Chu Mo clear datas in the block, and message output module is sent to, the clear data is exported by message output module; If mobile phone is not in limited use state at this time, normal to read message registration.
(2)When MIM message input module collects requirement the relevant operation of privacy function is actively used to ask(Change mobile phone is set It puts, call, send short message, installing and uninstalling application program etc.)When, if mobile phone is in limited use state at this time, believe Breath input module sends the request to processing module, and the control unit in processing module forbids MIM message input module acquisition and main It is dynamic to use the relevant operation information of privacy function.
Specially:a)As shown in figure 5, when MIM message input module collects the operation requests that requirement is called, at this time If mobile phone is in limited use state, MIM message input module sends the request to processing module, the control in processing module Unit cancels the operation requests called, and sends report an error prompt message to information output unit simultaneously, defeated by information Go out unit to export the prompt message that reports an error;If mobile phone is not in limited use state at this time, normally call;b) As shown in fig. 6, when MIM message input module collects requirement and sends the operation requests of short message, if mobile phone is in limited use at this time State, then MIM message input module send the request to processing module, the control unit in processing module cancels the transmission short message Operation requests, and send report an error prompt message simultaneously(It can not send)It, will by information output unit to information output unit The prompt message that reports an error is exported;If mobile phone is not in limited use state at this time, normal to send short message;c)Such as Fig. 7 institutes Show, when MIM message input module collects the operation requests that requirement change mobile phone is set, if mobile phone uses shape in limited at this time State, then MIM message input module send the request to processing module, the control unit in processing module forbids MIM message input module The operation information that acquisition change mobile phone is set makes mobile phone refuse to respond the operation that change mobile phone is set;If mobile phone is not at this time Limited use state, the then normally setting of change mobile phone;d)As shown in figure 8, when MIM message input module collect requirement installation or When unloading the operation requests of application program, if mobile phone is in limited use state at this time, MIM message input module sends out the request Give processing module, the control unit in processing module cancels the installation or unloads the operation requests of application program, and sends out simultaneously It delivers newspaper wrong prompt message(It can not install or unload)To information output unit, this is included by prompt message by information output unit It is exported;If mobile phone is not in limited use state, normal mounting or unloading application program at this time.
(3)When MIM message input module collects the passive using request of privacy function(It such as receives calls, receives short message, answers With the related announcement information of program)When, if mobile phone is in limited use state at this time, MIM message input module sends the request To processing module, the control unit in processing module forbids message output module output with privacy function passively using relevant Data.
Specially:a)As shown in figure 9, when MIM message input module collects the operation requests for needing to receive calls, at this time If mobile phone is in limited use state, MIM message input module sends the request to processing module, the control in processing module Unit forbids message output module to export the prompt message to receive calls, and the message that will newly send a telegram here prevents display;Hand at this time If machine is not in limited use state, normally receive calls;b)As shown in Figure 10, connect when MIM message input module collects needs When receiving the operation requests of short message, if mobile phone is in limited use state at this time, MIM message input module sends the request to place Module is managed, the control unit in processing module forbids message output module to export the notification information of the reception new information, Ji Jiangxin The notification information of message prevents display;If mobile phone, which is in, at this time is not limited use state, short message is normally received;c)Such as Figure 11 institutes Show, when MIM message input module, which collects, needs the notice for showing application program request, if mobile phone uses shape in limited at this time State, then MIM message input module send the request to processing module, the control unit in processing module forbids message output module Export the notification information of the application program;Wherein, privacy settings parameter can be preferably stored in privacy module, which sets Put parameter definition privacy program and non-privacy application program;It needs to show application program when MIM message input module collects During notice request, the execution unit in processing module transfers privacy settings parameter in privacy module into processing module, processing Mould running unit in the block judge according to the individual character privacy settings judge need show notice request the application program whether be Privacy application program;When the application program is privacy application program, the control unit in processing module forbids information to export mould Block exports the notification information of the application program, i.e., the notification information of the application program is prevented display by this;If mobile phone is not located at this time In the notice of limited use state, then normal display application program.
For a person skilled in the art, after reading above description, various changes and modifications undoubtedly will be evident. Therefore, appended claims should regard whole variations and modifications of the true intention and scope that cover the present invention as.It is weighing The scope and content of any and all equivalence, are all considered as still belonging to the intent and scope of the invention in the range of sharp claim.

Claims (8)

1. a kind of Mobile phone privacy protection system, which is characterized in that including:MIM message input module, message output module, processing mould Block, privacy module;
Described information input module, described information output module, the privacy module are connected with the processing module;
Cryptographic parameter is stored in the privacy module;
Described information input module gathers unlocking pin input by user, which is sent to the processing module, institute It states processing module and transfers cryptographic parameter in the privacy module, and the unlocking pin and the cryptographic parameter are subjected to computing It compares, when the cryptographic parameter and the unlocking pin are inconsistent, the processing module unlocks mobile phone screen, and sends limit System carries out the message of privacy operations to MIM message input module and message output module, with prevent MIM message input module acquisition with it is described The relevant operation information of privacy operations and prevention message output module export and the relevant information of the privacy operations;
The privacy operations include calling and receiving calls;
The processing module includes execution unit, arithmetic element and control unit;
The execution unit elder generation invoking privacy mould secret protection state parameter in the block is used to transfer described into processing module Cryptographic parameter in privacy module;The arithmetic element is used to the unlocking pin and the cryptographic parameter carrying out computing ratio It is right;Described control unit is for sending the message that uses of limitation to described information input module and described information output module to control The function of described information input module and described information output module processed.
2. intimacy protection system as described in claim 1, which is characterized in that the privacy operations include the aobvious of privacy information Show, the active use of privacy function and the passive use of privacy function.
3. intimacy protection system as claimed in claim 2, which is characterized in that the display of the privacy information includes:Display is logical Words record, display history short message;The active use of the privacy function includes:It calls, send short message, the peace of application program Loading and unloading carries;The passive use of the privacy function includes:Incoming call answering receives short message, the notice of application program.
4. a kind of mobile phone private guard method for applying the system as described in any one in claims 1 to 3, which is characterized in that The described method includes:
Step 1, when mobile phone is under screen lock state, after the power key of mobile phone is pressed, unlock interface is presented in mobile phone screen;
Step 2, acquisition unlocking pin input by user;
Step 3 calls cryptographic parameter, and the unlocking pin and the cryptographic parameter is compared, when the cryptographic parameter When consistent with the unlocking pin, step 4 is carried out, but without step 5;When the cryptographic parameter and the unlocking pin differ During cause, 5 are entered step;
Step 4 is unlocked mobile phone screen, and mobile phone can be used normally;
Step 5 sends the message for limiting progress privacy operations to described information input module and described information output module, described MIM message input module, which is received after the limitation carries out the message of privacy operations, stops acquisition and the relevant operation information of privacy operations, Described information output module, which is received after the limitation carries out the message of privacy operations, to be stopped exporting privacy information.
5. mobile phone private guard method as claimed in claim 4, which is characterized in that the method further includes:Before step 1 It follows the steps below:Secret protection state parameter is also stored in the privacy module;
When the secret protection state parameter is set on, mobile phone is using described in the method progress of the step 1~step 5 Mobile phone private is protected;
When the secret protection state parameter is set off, the mobile phone private guarantor is carried out to mobile phone using following steps Shield:
After the power key of mobile phone is pressed, unlock interface is presented in mobile phone screen;MIM message input module gathers solution input by user Lock cipher is sent in the processing module;The processing module calls the cryptographic parameter in the privacy module, and by described in Unlocking pin and the cryptographic parameter are compared;When the cryptographic parameter is consistent with the unlocking pin, the processing mould Block is unlocked mobile phone screen, and mobile phone can carry out normal use;When the cryptographic parameter and the unlocking pin are inconsistent When, the processing module is not unlocked mobile phone screen, and sends a request to described information output module, described information output Module exports the information for re-entering password.
6. mobile phone private guard method as claimed in claim 4, which is characterized in that be stored with privacy in the privacy module and set Put parameter, privacy application program and non-privacy application program defined in the privacy settings parameter, to privacy application program into Capable operation is privacy operations, is normal operating to the operation that non-privacy application program carries out.
7. mobile phone private guard method as claimed in claim 4, which is characterized in that the privacy operations include privacy information It has been shown that, the active use of privacy function and the passive use of privacy function.
8. mobile phone private guard method as claimed in claim 7, which is characterized in that the display of the privacy information includes:It is aobvious Show message registration, display history short message;The active use of the privacy function includes:It calls, send short message, application program Install and uninstall;The passive use of the privacy function includes:Incoming call answering receives short message, the notice of application program.
CN201310191136.0A 2013-05-21 2013-05-21 A kind of Mobile phone privacy protection system and guard method Active CN103269402B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310191136.0A CN103269402B (en) 2013-05-21 2013-05-21 A kind of Mobile phone privacy protection system and guard method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310191136.0A CN103269402B (en) 2013-05-21 2013-05-21 A kind of Mobile phone privacy protection system and guard method

Publications (2)

Publication Number Publication Date
CN103269402A CN103269402A (en) 2013-08-28
CN103269402B true CN103269402B (en) 2018-05-25

Family

ID=49013011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310191136.0A Active CN103269402B (en) 2013-05-21 2013-05-21 A kind of Mobile phone privacy protection system and guard method

Country Status (1)

Country Link
CN (1) CN103269402B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104427089B (en) * 2013-08-21 2017-02-08 上海晨兴希姆通电子科技有限公司 Mobile terminal and mobile terminal authority management method
CN104158947A (en) * 2014-07-30 2014-11-19 张剑文 Mobile phone privacy protecting system
CN104363343B (en) * 2014-11-14 2018-04-10 东莞宇龙通信科技有限公司 Caller identification method and device
CN105791529A (en) * 2014-12-24 2016-07-20 芯讯通无线科技(上海)有限公司 Mobile terminal and control method thereof
CN104598784A (en) * 2014-12-29 2015-05-06 联想(北京)有限公司 Information processing method and electronic device
CN107026935B (en) * 2016-10-28 2020-10-02 珠海格力电器股份有限公司 Mobile device and permission control method and device of mobile device
CN108091332A (en) * 2017-12-27 2018-05-29 盯盯拍(深圳)技术股份有限公司 Method of speech processing based on automobile data recorder and the voice processing apparatus based on automobile data recorder
CN113778576A (en) * 2020-06-10 2021-12-10 北京小米移动软件有限公司 Voice call processing method, device, terminal and storage medium
CN117155687A (en) * 2023-09-19 2023-12-01 广州市容大计算机科技有限公司 Management system and method for protecting privacy account

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101409881A (en) * 2007-10-12 2009-04-15 深圳富泰宏精密工业有限公司 Secrecy apparatus and method for mobile phone data
CN102457619A (en) * 2011-12-30 2012-05-16 广东欧珀移动通信有限公司 Method for setting permission password for mobile phone
CN102778996A (en) * 2011-05-10 2012-11-14 宏达国际电子股份有限公司 Unlocking method and handheld electronic device using same
CN102855426A (en) * 2012-08-03 2013-01-02 广东欧珀移动通信有限公司 User management method based on Android
CN102968343A (en) * 2012-11-14 2013-03-13 广东欧珀移动通信有限公司 Method and system for switching users

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8463234B2 (en) * 2006-07-18 2013-06-11 Kt Corporation Method for providing security services by using mobile terminal password and mobile terminal thereof
CN102932540B (en) * 2012-10-24 2014-05-14 广东欧珀移动通信有限公司 Mobile terminal and stealing prevention method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101409881A (en) * 2007-10-12 2009-04-15 深圳富泰宏精密工业有限公司 Secrecy apparatus and method for mobile phone data
CN102778996A (en) * 2011-05-10 2012-11-14 宏达国际电子股份有限公司 Unlocking method and handheld electronic device using same
CN102457619A (en) * 2011-12-30 2012-05-16 广东欧珀移动通信有限公司 Method for setting permission password for mobile phone
CN102855426A (en) * 2012-08-03 2013-01-02 广东欧珀移动通信有限公司 User management method based on Android
CN102968343A (en) * 2012-11-14 2013-03-13 广东欧珀移动通信有限公司 Method and system for switching users

Also Published As

Publication number Publication date
CN103269402A (en) 2013-08-28

Similar Documents

Publication Publication Date Title
CN103269402B (en) A kind of Mobile phone privacy protection system and guard method
CN103890768B (en) Reliable communication between medical treatment device and its remote control
US9396325B2 (en) Provisioning an app on a device and implementing a keystore
US7784088B2 (en) Method and system for managing delayed user authentication
CN110651270B (en) Data access method and device
US10685142B2 (en) External resource control of mobile devices
CN103577750B (en) Privacy authority management method and device
CN103312676B (en) Terminal, server and terminal safety management method
US20080034217A1 (en) Security For A Personal Communication Device
US20140040622A1 (en) Secure unlocking and recovery of a locked wrapped app on a mobile device
US20140245379A1 (en) System and method for enforcing a policy for an authenticator device
CN109460660A (en) A kind of mobile device safety management system
CN105848134A (en) Virtual SIM (Subscriber Identity Module) card management device, communication terminal, access control method and management method
CN102413221B (en) Method for protecting privacy information and mobile terminal
CN101511083B (en) Authentication method and terminal for telecom smart card
CN105847305A (en) Safe processing and accessing method of cloud resource
CN102859930A (en) Method for providing active security authentication, and terminal and system for supporting same
CN109344588A (en) Safety certifying method and terminal device
CN107466031A (en) A kind of method and terminal for protecting data
CN104038613A (en) Method and apparatus for information security management
CN106254329A (en) For the method protecting computer network security
CN104376240A (en) Method for processing information and electronic equipment
Sikder et al. A survey on android security: development and deployment hindrance and best practices
CN101308700A (en) Divulging secret prevention U disk
CN108154026B (en) Root-free and non-invasive secure communication method and system based on Android system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201125

Address after: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Jiji Intellectual Property Operation Co.,Ltd.

Address before: 201616 Shanghai city Songjiang District Guangfulin road 4855 Lane 20, No. 90

Patentee before: Phicomm (Shanghai) Co.,Ltd.

TR01 Transfer of patent right
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20130828

Assignee: ZHEJIANG SUPCON TECHNOLOGY Co.,Ltd.

Assignor: Hangzhou Jiji Intellectual Property Operation Co.,Ltd.

Contract record no.: X2021330000762

Denomination of invention: A mobile phone privacy protection system and protection method

Granted publication date: 20180525

License type: Common License

Record date: 20211117

Application publication date: 20130828

Assignee: Hangzhou Bolian Intelligent Technology Co.,Ltd.

Assignor: Hangzhou Jiji Intellectual Property Operation Co.,Ltd.

Contract record no.: X2021330000761

Denomination of invention: A mobile phone privacy protection system and protection method

Granted publication date: 20180525

License type: Common License

Record date: 20211117

EE01 Entry into force of recordation of patent licensing contract
TR01 Transfer of patent right

Effective date of registration: 20230105

Address after: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee after: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Address before: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee before: Hangzhou Jiji Intellectual Property Operation Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240605

Address after: 402-407, China Resources Building, Nangang District, Harbin City, Heilongjiang Province, 150001

Patentee after: Heilongjiang Huibrush Technology Co.,Ltd.

Country or region after: China

Address before: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee before: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Country or region before: China