CN103338314A - Method for realizing information safety through conversation and mobile terminal thereof - Google Patents

Method for realizing information safety through conversation and mobile terminal thereof Download PDF

Info

Publication number
CN103338314A
CN103338314A CN2013102397995A CN201310239799A CN103338314A CN 103338314 A CN103338314 A CN 103338314A CN 2013102397995 A CN2013102397995 A CN 2013102397995A CN 201310239799 A CN201310239799 A CN 201310239799A CN 103338314 A CN103338314 A CN 103338314A
Authority
CN
China
Prior art keywords
conversation
judged result
information
security
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013102397995A
Other languages
Chinese (zh)
Inventor
赵兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN2013102397995A priority Critical patent/CN103338314A/en
Publication of CN103338314A publication Critical patent/CN103338314A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a method for realizing information safety through conversation, which comprises the following steps: judging whether the incoming telephone number is a safe number or not; conducting safety operation according to the judgment result. Compared with the prior art, the method for realizing information safety through conversation provided by the invention judges whether the incoming telephone number is a safe number or not, if yes, conducting the safety operation, so as to realize the function of using mobile phone conversation function to start safety operation to protect the safety of the information in the mobile phone, the inherent nature and the system coupling of the mobile phone conversation function avoids the problem that the using of third-party software is complex in operation and easy to be unloaded, the operation is simplified, the mobile phone safety is maximally protected, and a user's experience is improved. The invention further discloses a mobile terminal realizing information safety through conversation.

Description

Utilize conversation to realize method and the portable terminal thereof of information security
Technical field
The present invention relates to the mobile communication technology field, relate more specifically to a kind of method and portable terminal thereof that utilizes conversation to realize information security.
Background technology
Along with the development of mobile phone with popularize, mobile phone has related to more user's personal information, thereby mobile phone safety just seems particularly important.Current, in order to guarantee user mobile phone stolen or can in time give or guarantee the information security of mobile phone when losing for change, people have developed the third party software of many protection mobile phone safety, as antitheft software.When mobile phone is lost or is stolen, antitheft software can send SMS Tip from the predetermined number of trend when mobile phone is changed SIM card, the owner of lost property only needs to reply different instructions after receiving note, just can make lost handset delete from trend predetermined number transmission data or with data.Yet this method depends on the installation and operation of third party software, and complex operation can't play the function of protecting mobile phone information safety if third party software is unloaded simultaneously.
Therefore, be necessary to provide a kind of method and portable terminal thereof that utilizes conversation to realize information security to overcome above-mentioned defective.
Summary of the invention
The purpose of this invention is to provide a kind of method of utilizing conversation to realize information security; protect information security in the mobile phone with the call function that utilizes mobile phone when the hand-set from stolen; complicated operation, easy unloaded problem when avoiding using third party software; thereby simplify the operation; protect mobile phone safety to greatest extent, improve the user and experience.
Another object of the present invention provides a kind of portable terminal that utilizes conversation to realize information security; protect information security in the mobile phone with the call function that utilizes mobile phone when the hand-set from stolen; complicated operation, easy unloaded problem when avoiding using third party software; thereby simplify the operation; protect mobile phone safety to greatest extent, improve the user and experience.
For achieving the above object, the invention provides a kind of method of utilizing conversation to realize information security, may further comprise the steps:
Judge whether caller ID is security number;
Carry out safety operation according to judged result.
Compared with prior art; the present invention utilizes the method for conversation realization information security to judge whether caller ID is security number when receiving incoming call; if judged result is for being; then carry out safety operation; namely realized utilizing the call function of mobile phone to start safety operation with the information security in the protection mobile phone; and because inherency and the system, coupled of mobile phone communication function; thereby complicated operation, easy unloaded problem when having avoided using third party software; simplified operation; protect mobile phone safety to greatest extent, improved user's experience.
Preferably, described safety operation is for the locking mobile phone, report to the police or deletion information automatically.
Preferably, described " carrying out safety operation according to judged result " specifically comprises:
When caller ID is described security number, the locking portable terminal;
Judge whether to set up that conversation connects and report to the police automatically or deletion information according to judged result.
Preferably, described " judge whether to set up conversation connects and report to the police automatically or deletion information according to judged result " is specially:
Judging whether to set up conversation connects;
When judged result connects for setting up conversation, unlock, receive signal from described security number with control automatic alarm from mobile terminal or deletion information;
When judged result was refusal foundation conversation connection, whether judgement was imported preset password and is reported to the police automatically according to judged result in Preset Time.
Preferably, described " judging whether caller ID is security number " also comprises before: described security number and described safety operation are set.
Correspondingly, the present invention also provides a kind of portable terminal that utilizes conversation to realize information security, comprising:
Judge module is used for judging whether caller ID is security number;
The safety operation module is used for carrying out safety operation according to judged result.
Preferably, described safety operation is for the locking portable terminal, report to the police or deletion information automatically.
Preferably, described safety operation module specifically comprises:
Lock cell is used for locking described portable terminal when caller ID is described security number;
First judging unit is used for judging whether to set up conversation and connects;
Operating unit is used for reporting to the police automatically or deletion information according to judged result.
Preferably, described operating unit specifically comprises:
The control subelement is used for judged result when described first judging unit and is when being, unlocks, receives signal from described security number to control automatic alarm from mobile terminal or deletion information;
The password judgment sub-unit, be used for when the judged result of described first judging unit for not the time, whether judgement import preset password and report to the police automatically according to judged result in Preset Time.
Preferably, described utilization conversation realizes that the portable terminal of information security also comprises:
Module is set, is used for arranging described security number and described safety operation.
By following description also by reference to the accompanying drawings, it is more clear that the present invention will become, and these accompanying drawings are used for explaining embodiments of the invention.
Description of drawings
Fig. 1 realizes the workflow diagram of method one embodiment of information security for the present invention utilizes conversation.
Fig. 2 realizes the workflow diagram of another embodiment of method of information security for the present invention utilizes conversation.
Fig. 3 realizes the structured flowchart of portable terminal one embodiment of information security for the present invention utilizes conversation.
Embodiment
With reference now to accompanying drawing, describe embodiments of the invention, the similar elements label represents similar elements in the accompanying drawing.
Please refer to Fig. 1, described the present invention and utilized conversation to realize the workflow of method one embodiment of information security.As shown in Figure 1, may further comprise the steps:
Step S101 arranges security number and safety operation; Wherein security number is mobile number or fixed line number, safety operation is the locking mobile phone, deletion information, automatic warning or three's combination in any, deletion information specific implementation process is: resetting of calling system removed interface to realize the data factory reset, thereby when losing or be stolen, can delete by mobile phone the personal information of user in the mobile phone, guarantee information security, automatically the warning detailed process is: obtain the mobile phone current location information and this positional information is sent to default recipient, wherein default recipient is security number or other the corresponding mobile phone of number or fixed lines of setting arbitrarily; The locking mobile phone namely locks personal information in the mobile phone, revealed to avoid in the mobile phone user's personal information, but cell-phone function as the conversation etc. can normally use, as: add a lock to personal information during the locking mobile phone, various personal informations such as Related Contact, note, schedule, message registration are made as secret, and information such as relative note message registration are all hidden, and have only this talent of cellphone subscriber to see, can effectively prevent from like this information leakage from ensuring information security;
Step S102 receives incoming call and the time judges whether caller ID is security number, as if judged result for being, execution in step S103 then, otherwise, execution in step S104;
Step S103 carries out safety operation;
Step S104 does not process, and is considered as general conversation.
Because the present invention utilizes conversation to realize that the method for information security is to control the execution of safety operation by the mobile phone communication function; utilize third party software to compare with prior art; because inherency and the system, coupled of call function; can't be unloaded separately; thereby can protect mobile phone safety to greatest extent, improve user's experience.
Please refer to Fig. 2, described the present invention and utilized conversation to realize the workflow of another embodiment of method of information security.As shown in Figure 2, may further comprise the steps:
Step S201 arranges security number and safety operation;
Step S202 receives incoming call and the time judges whether caller ID is security number, if judged result is for denying, and execution in step S203 then, otherwise, execution in step S204;
Step S203 does not process, and is considered as general conversation;
Step S204, the locking mobile phone;
Step S205 judges whether to set up conversation and connects, if, execution in step S206 then, otherwise, execution in step S207; Wherein setting up the conversation connection is user's incoming call answering, and refusal foundation conversation connects and comprises that the user does not connect or rejection;
Step S206 unlocks, and receives from the signal of security number to report to the police automatically or deletion information with the control mobile phone; Wherein when user mobile phone is lost or is stolen, can dial phone number by security number, after setting up the conversation connection, can control mobile phone by keyboard input digit (produce DFMF signal) in communication process by the security number mobile phone carries out and reports to the police automatically or deletion information or report to the police automatically simultaneously and delete the operation of information, and if this moment mobile phone do not lose, then can normal talking;
Step S207 judges whether to import preset password in Preset Time, if, execution in step S208 then, otherwise, execution in step S209; When not setting up the conversation connection, this moment, mobile phone was in the lock state, and the user can import preset password and unlock in Preset Time, mobile phone is returned to normal, wherein Preset Time and preset password all can be arranged by the user, as Preset Time is set is 24 hours, and preset password is 111111;
Step S208 unlocks;
Step S209 reports to the police automatically; Namely when in Preset Time, not importing preset password, carry out this safety operation of reporting to the police automatically, because may be that the user does not unlock for a long time this moment, rather than mobile phone is lost or stolen, so the time safety operation carried out be to report to the police automatically, rather than the bigger operation of destruction such as deletion information.
In the present embodiment when caller ID is security number, the locking mobile phone, judging whether to set up conversation then connects, when setting up the conversation connection, unlock, if this moment, mobile phone was lost, can send control information to control mobile phone deletion information or warning automatically by the security number mobile phone, if this moment, mobile phone was not lost, can normal talking, thereby realized that mobile phone both can not lose or when stolen and security number mobile phone normal talking, can when mobile phone is lost or be stolen, carry out safety operation again, avoid when caller ID is security number, carrying out safety operation immediately, more realistic practicality in embodiment illustrated in fig. 1.
It should be noted that; because the present invention utilizes the method for conversation realization information security can't use under the situation of SIM card replacing, mobile phone shutdown or brush machine; therefore can change to remind with existing SIM card and combine; as when SIM card is changed; mobile phone to the security number correspondence sends warning message etc., with the better protection mobile phone information safety.
Please refer to Fig. 3, described the present invention and utilized conversation to realize the structured flowchart of portable terminal one embodiment of information security.As shown in Figure 3, utilize conversation to realize that the portable terminal 100 of information security comprises:
Module 11 is set, is used for arranging security number and safety operation; Wherein security number is phone number or fixed line number, safety operation is deletion information, automatically report to the police or the locking mobile phone, deletion information specific implementation process is: resetting of calling system removed interface to realize the data factory reset, thereby when losing or be stolen, can delete by mobile phone the personal information of user in the mobile phone, guarantee information security, automatically the warning detailed process is: obtain the mobile phone current location information and this positional information is sent to default recipient, wherein default recipient is security number or other the corresponding mobile phone of number or fixed lines of setting arbitrarily, the locking mobile phone be specially the locking mobile phone in user's personal information, but cell-phone function as the conversation etc. can normally use;
Judge module 13 is used for judging whether caller ID is security number when receiving incoming call;
Safety operation module 15, be used for carrying out safety operation according to the judged result of judge module 13, concrete, safety operation module 15 comprises lock cell 151, first judging unit 153 and operating unit 155, lock cell 151 is used for when caller ID is security number, the locking mobile phone, first judging unit 153 is used for judging whether to set up conversation and connects, operating unit 155 is used for reporting to the police automatically or deletion information according to the judged result of first judging unit 153, concrete, operating unit 155 comprises control subelement 1551 and password judgment sub-unit 1553, control subelement 1551 be used for when the judged result of first judging unit 153 when being, unlock, reception is reported to the police or deletion information with the control mobile phone automatically from the signal of security number, password judgment sub-unit 1553 be used for when the judged result of first judging unit 153 for not the time, whether judgement is imported preset password and is reported to the police automatically according to judged result in Preset Time.
When the present invention utilizes conversation to realize portable terminal 100 work of information security; at first by module 11 is set security number and safety operation are set; judge by judge module 13 whether caller ID is security number afterwards; if; then by lock cell 151 locking mobile phones; first judging unit 153 judges whether to set up the conversation connection then; if; then unlock by control subelement 1551; reception is deleted information from the signal of security number with the control mobile phone or is reported to the police automatically; otherwise; then judge in Preset Time, whether to import preset password by password judgment sub-unit 1553; if, unlock, otherwise; automatically report to the police; thereby realized utilizing the call function of mobile phone to start safety operation with the information security in the protection mobile phone, complicated operation when having avoided the use third party software; unloaded problem has been simplified operation easily; protect mobile phone safety to greatest extent, improved user's experience.
Above invention has been described in conjunction with most preferred embodiment, but the present invention is not limited to the embodiment of above announcement, and should contain various modification, equivalent combinations of carrying out according to essence of the present invention.

Claims (10)

1. a method of utilizing conversation to realize information security is characterized in that, may further comprise the steps:
Judge whether caller ID is security number;
Carry out safety operation according to judged result.
2. utilization as claimed in claim 1 conversation realizes the method for information security, it is characterized in that, described safety operation is for the locking portable terminal, report to the police or deletion information automatically.
3. utilization conversation as claimed in claim 2 realizes the method for information security, it is characterized in that, described " carrying out safety operation according to judged result " specifically comprises:
When caller ID is described security number, the locking portable terminal;
Judge whether to set up that conversation connects and report to the police automatically or deletion information according to judged result.
4. utilization conversation as claimed in claim 3 realizes the method for information security, it is characterized in that, described " reporting to the police automatically or deletion information according to judged result " is specially:
When judged result connects for setting up conversation, unlock, receive signal from described security number to control described automatic alarm from mobile terminal or deletion information;
When judged result was refusal foundation conversation connection, whether judgement was imported preset password and is reported to the police automatically according to judged result in Preset Time.
5. utilization conversation as claimed in claim 1 realizes the method for information security, it is characterized in that described " judging whether caller ID is security number " also comprises before: described security number and described safety operation are set.
6. a portable terminal that utilizes conversation to realize information security is characterized in that, comprising:
Judge module is used for judging whether caller ID is security number;
The safety operation module is used for carrying out safety operation according to judged result.
7. utilization as claimed in claim 6 conversation realizes the portable terminal of information security, it is characterized in that, described safety operation is for the locking portable terminal, report to the police or deletion information automatically.
8. utilization conversation as claimed in claim 7 realizes the portable terminal of information security, it is characterized in that described safety operation module specifically comprises:
Lock cell is used for locking described portable terminal when caller ID is described security number;
First judging unit is used for judging whether to set up conversation and connects;
Operating unit is used for reporting to the police automatically or deletion information according to the judged result of described first judging unit.
9. utilization conversation as claimed in claim 8 realizes the portable terminal of information security, it is characterized in that described operating unit specifically comprises:
The control subelement is used for judged result when described first judging unit and is when being, unlocks, receives signal from described security number to control described automatic alarm from mobile terminal or deletion information;
The password judgment sub-unit, be used for when the judged result of described first judging unit for not the time, whether judgement import preset password and report to the police automatically according to judged result in Preset Time.
10. utilization conversation as claimed in claim 6 realizes the portable terminal of information security, it is characterized in that, also comprises:
Module is set, is used for arranging described security number and described safety operation.
CN2013102397995A 2013-06-17 2013-06-17 Method for realizing information safety through conversation and mobile terminal thereof Pending CN103338314A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013102397995A CN103338314A (en) 2013-06-17 2013-06-17 Method for realizing information safety through conversation and mobile terminal thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013102397995A CN103338314A (en) 2013-06-17 2013-06-17 Method for realizing information safety through conversation and mobile terminal thereof

Publications (1)

Publication Number Publication Date
CN103338314A true CN103338314A (en) 2013-10-02

Family

ID=49246405

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013102397995A Pending CN103338314A (en) 2013-06-17 2013-06-17 Method for realizing information safety through conversation and mobile terminal thereof

Country Status (1)

Country Link
CN (1) CN103338314A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065829A (en) * 2014-06-30 2014-09-24 中国联合网络通信集团有限公司 Screen locking method of mobile terminal and mobile terminal
CN104270715A (en) * 2014-10-08 2015-01-07 宁夏天纵泓光余热发电技术有限公司 Security and protection method for achieving security and protection function of mobile phone
CN104284026A (en) * 2014-10-08 2015-01-14 宁夏天纵泓光余热发电技术有限公司 Mobile phone with security and protection function
CN104301493A (en) * 2014-10-27 2015-01-21 宁夏天纵泓光余热发电技术有限公司 Method for actively returning address book based on biological characteristics
CN104320538A (en) * 2014-10-09 2015-01-28 宁夏天纵泓光余热发电技术有限公司 Mobile phone capable of actively returning address list
CN109769152A (en) * 2019-01-19 2019-05-17 深圳壹账通智能科技有限公司 Control method of electronic device, device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1694548A (en) * 2004-05-11 2005-11-09 天时达中科电子(深圳)有限公司 Method for preventing burglarious of mobile phone and anti-theft mobile phone
CN1941929A (en) * 2005-07-19 2007-04-04 爱克赛特公司 Cell phone feature for downloading information via telecommunications network
US20090029701A1 (en) * 2007-07-26 2009-01-29 Takayuki Mishima Communication system and method therefor
CN101960738A (en) * 2008-02-28 2011-01-26 思蒙株式会社 Method and system of providing personal information control service for mobile communication terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1694548A (en) * 2004-05-11 2005-11-09 天时达中科电子(深圳)有限公司 Method for preventing burglarious of mobile phone and anti-theft mobile phone
CN1941929A (en) * 2005-07-19 2007-04-04 爱克赛特公司 Cell phone feature for downloading information via telecommunications network
US20090029701A1 (en) * 2007-07-26 2009-01-29 Takayuki Mishima Communication system and method therefor
CN101960738A (en) * 2008-02-28 2011-01-26 思蒙株式会社 Method and system of providing personal information control service for mobile communication terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065829A (en) * 2014-06-30 2014-09-24 中国联合网络通信集团有限公司 Screen locking method of mobile terminal and mobile terminal
CN104065829B (en) * 2014-06-30 2016-05-18 中国联合网络通信集团有限公司 The screen locking method of mobile terminal and mobile terminal
CN104270715A (en) * 2014-10-08 2015-01-07 宁夏天纵泓光余热发电技术有限公司 Security and protection method for achieving security and protection function of mobile phone
CN104284026A (en) * 2014-10-08 2015-01-14 宁夏天纵泓光余热发电技术有限公司 Mobile phone with security and protection function
CN104320538A (en) * 2014-10-09 2015-01-28 宁夏天纵泓光余热发电技术有限公司 Mobile phone capable of actively returning address list
CN104301493A (en) * 2014-10-27 2015-01-21 宁夏天纵泓光余热发电技术有限公司 Method for actively returning address book based on biological characteristics
CN109769152A (en) * 2019-01-19 2019-05-17 深圳壹账通智能科技有限公司 Control method of electronic device, device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN103338314A (en) Method for realizing information safety through conversation and mobile terminal thereof
CN100484158C (en) Mobile communication terminal and method for operating the same
CN101141721B (en) Safety mobile telephone based communication custom
CN1302681C (en) Method for preventing burglarious of mobile phone and anti-theft mobile phone
CN103220637A (en) Mobile phone anti-theft protection method and mobile phone anti-theft protection device
CN101309136B (en) Private short message inbox, private short message protecting method and mobile terminal
CN104506711A (en) Communication information processing method and device for terminal
CN101895605A (en) Method and device for communication based on pseudo-contact information
CN101370209A (en) Information disguising method and system
CN101345789A (en) Secrecy method and apparatus for mobile terminal, and mobile terminal
CN101873395B (en) Mobile phone and urgent help seeking method thereof
CN105472093B (en) Mobile terminal call answers method for authenticating and mobile terminal
EP1251472A1 (en) Means for loss protection of a mobile terminal
CN101515968B (en) Method and device for answer the calling from communication terminal
CN104038613A (en) Method and apparatus for information security management
CN101640722A (en) Mobile phone with safety protection function and safety protection method thereof
CN102264042A (en) Method for preventing disturbance of incoming call
CN102217295A (en) Management method of voice message and device thereof
TW201517592A (en) Communication system, mobile communication apparatus and switching method of user identification information
CN101720088A (en) Method and mobile phone for preventing interception in mobile phone communicating process
US20090111439A1 (en) System and method for monitoring a monitored mobile phone
CN101478748A (en) Method and user equipment for SIM card unlocking prevention method
CN101854608A (en) Remote power-off method of mobile phones
CN103249036A (en) Mobile terminal and security calling method of mobile terminal
KR20050098571A (en) Hanging up service method for mobile communication terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20131002