CN103577761A - Method and device for processing privacy data in mobile equipment - Google Patents

Method and device for processing privacy data in mobile equipment Download PDF

Info

Publication number
CN103577761A
CN103577761A CN201310513275.0A CN201310513275A CN103577761A CN 103577761 A CN103577761 A CN 103577761A CN 201310513275 A CN201310513275 A CN 201310513275A CN 103577761 A CN103577761 A CN 103577761A
Authority
CN
China
Prior art keywords
mobile device
privacy space
entrance
data
coded lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310513275.0A
Other languages
Chinese (zh)
Other versions
CN103577761B (en
Inventor
李鹤
孟凡磊
张龙
米晓彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310513275.0A priority Critical patent/CN103577761B/en
Publication of CN103577761A publication Critical patent/CN103577761A/en
Application granted granted Critical
Publication of CN103577761B publication Critical patent/CN103577761B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The invention discloses a method and a device for processing privacy data in mobile equipment. The method comprises the steps that when the mobile equipment is connected to a computer, a first identity logged in on a mobile equipment side and a second identity logged in on a computer side are acquired; whether the first identity and the second identity are associated is judged; if so, an entry of a privacy space is displayed on the mobile equipment side; the privacy space is a disk storage space encrypted by a coded lock; when a request accessing the privacy space via the entry is received, the coded lock is displayed on the mobile equipment side; and when decryption information corresponding to the coded lock is received, data in the privacy space is displayed on the mobile equipment side. The method and the device can effectively avoid malicious privacy space access, so that the security of privacy information of a user can be ensured effectively.

Description

A kind of method and apparatus of processing private data in mobile device
Technical field
The present invention relates to the technical field of information security, be specifically related to a kind of method and a kind of device of processing private data in mobile device of processing private data in mobile device.
Background technology
Fast development along with mobile communication technology, as mobile phone, panel computer and PDA(Personal Digital Assistant, personal digital assistant) etc. mobile device has been widely used in the aspects such as study, amusement, work, is playing the part of more and more important role in daily life.
Mobile device is frequently used for as modern the instrument that exchanges or keep record, because mobile device is the personal effects, the general while only has a user and uses, moreover, the frequent mobile device of user carries, and be not easy to be missed, so a large amount of individual privacy information and capsule information document has often been stored in mobile device inside, information ,Ru company bill, competitive bidding book, electronic contract that relates to privacy as secret photo, secret video etc. etc. relates to the data of secret of the trade.
User makes user be unwilling that storage individual privacy information and capsule information document cannot be transferred to other places for the dependence of mobile device to manage, but manages on mobile device.And exist at these privacy informations and capsule information document the problem of maliciously being obtained by other people, particularly when user loses mobile device, as long as normally open individual privacy information and the capsule information document that mobile device just can very easily obtain its storage, security is very poor.
Summary of the invention
In view of the above problems, the present invention has been proposed to a kind of a kind of method and corresponding a kind of device of processing private data in mobile device of processing private data in mobile device that overcomes the problems referred to above or address the above problem is at least in part provided.
According to one aspect of the present invention, a kind of method of processing private data in mobile device is provided, comprising:
When mobile device is connected to computing machine, obtains in the first sign of described mobile device side login and identify in second of described computer-side login;
Judge whether described the first sign and described the second sign are associated; If so, in described mobile device side, show the entrance in privacy space; The disk storage space of described privacy space for adopting coded lock to encrypt;
When receiving while accessing the request in described privacy space via described entrance, in described mobile device side, show described coded lock;
When receiving decryption information corresponding to described coded lock, in described mobile device side, show the data in described privacy space.
Alternatively, described coded lock comprises digital cipher lock and/or graphical passwords lock.
Alternatively, the data in described privacy space comprise image data, video data, voice data and/or document files.
Alternatively, described method also comprises:
When receive for the data in described privacy space operational order time, described data are carried out to the operation of described operational order indication.
Alternatively, described operational order comprises deletion action instruction, replicate run instruction, shearing manipulation instruction, rename operational order, selects operational order, import operation instruction and/or derive operational order.
Alternatively, described method also comprises:
When described mobile device cancellation is connected to described computing machine or closes the entrance in described privacy space, hide the entrance in described privacy space.
According to another aspect of the present invention, a kind of method of processing private data in mobile device is provided, comprising:
When acquisition is used for logining the sign in privacy space in mobile device, in described mobile device side, show the entrance in privacy space; The disk storage space of described privacy space for adopting coded lock to encrypt;
When receiving while accessing the request in described privacy space via described entrance, in described mobile device side, show described coded lock;
When receiving decryption information corresponding to described coded lock, in described mobile device side, show the data in described privacy space.
Alternatively, the entrance in described privacy space comprises the entrance in the non-privacy space of camouflage.
Alternatively, described coded lock comprises digital cipher lock and/or graphical passwords lock.
Alternatively, the data in described privacy space comprise image data, video data, voice data and/or document files.
Alternatively, described method also comprises:
When receive for the data in described privacy space operational order time, described data are carried out to the operation of described operational order indication.
Alternatively, described operational order comprises deletion action instruction, replicate run instruction, shearing manipulation instruction, rename operational order, selects operational order, import operation instruction and/or derive operational order.
Alternatively, described method also comprises:
When closing the entrance in described privacy space, hide the entrance in described privacy space.
According to another aspect of the present invention, a kind of device of processing private data in mobile device is provided, comprising:
Identifier acquisition module, is suitable for when mobile device is connected to computing machine, obtains in the first sign of described mobile device side login and identifies in second of described computer-side login;
The first entrance display module, is suitable for judging whether described the first sign and described the second sign are associated; If so, in described mobile device side, show the entrance in privacy space; The disk storage space of described privacy space for adopting coded lock to encrypt;
Coded lock display module, is suitable for, receiving while accessing the request in described privacy space via described entrance, in described mobile device side, showing described coded lock;
Data disaply moudle, is suitable for, when receiving decryption information corresponding to described coded lock, in described mobile device side, showing the data in described privacy space.
Alternatively, described coded lock comprises digital cipher lock and/or graphical passwords lock.
Alternatively, the data in described privacy space comprise image data, video data, voice data and/or document files.
Alternatively, described device also comprises:
Operational order execution module, is suitable for, when the operational order receiving for the data in described privacy space, described data being carried out to the operation of described operational order indication.
Alternatively, described operational order comprises deletion action instruction, replicate run instruction, shearing manipulation instruction, rename operational order, selects operational order, import operation instruction and/or derive operational order.
Alternatively, described device also comprises:
The first entrance is hidden module, is suitable for, when described mobile device cancellation is connected to described computing machine or closes the entrance in described privacy space, hiding the entrance in described privacy space.
According to another aspect of the present invention, a kind of device of processing private data in mobile device is provided, comprising:
The second entrance display module, is suitable in mobile device, obtaining when logining the sign in privacy space, shows the entrance in privacy space in described mobile device side; The disk storage space of described privacy space for adopting coded lock to encrypt;
Coded lock display module, is suitable for, receiving while accessing the request in described privacy space via described entrance, in described mobile device side, showing described coded lock;
Data disaply moudle, is suitable for, when receiving decryption information corresponding to described coded lock, in described mobile device side, showing the data in described privacy space.
Alternatively, the entrance in described privacy space comprises the entrance in the non-privacy space of camouflage.
Alternatively, described coded lock comprises digital cipher lock and/or graphical passwords lock.
Alternatively, the data in described privacy space comprise image data, video data, voice data and/or document files.
Alternatively, described device also comprises:
Operational order execution module, is suitable for, when the operational order receiving for the data in described privacy space, described data being carried out to the operation of described operational order indication.
Alternatively, described operational order comprises deletion action instruction, replicate run instruction, shearing manipulation instruction, rename operational order, selects operational order, import operation instruction and/or derive operational order.
Alternatively, described device also comprises:
The second entrance is hidden module, is suitable for when closing the entrance in described privacy space, hides the entrance in described privacy space.
The present invention can hide privacy space in mobile device, when identifying successfully, checking shows privacy space, the data that show privacy space when receiving the decryption information of also authentication of users input, for user, carry out follow-up processing, can effectively prevent from maliciously accessing privacy space, thereby can effectively guarantee the safety of user privacy information.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to better understand technological means of the present invention, and can be implemented according to the content of instructions, and for above and other objects of the present invention, feature and advantage can be become apparent, below especially exemplified by the specific embodiment of the present invention.
Accompanying drawing explanation
By reading below detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skills.Accompanying drawing is only for the object of preferred implementation is shown, and do not think limitation of the present invention.And in whole accompanying drawing, by identical reference symbol, represent identical parts.In the accompanying drawings:
Fig. 1 shows a kind of according to an embodiment of the invention flow chart of steps of processing the embodiment of the method 1 of private data in mobile device;
Fig. 2 shows the entrance exemplary plot in a kind of according to an embodiment of the invention privacy space;
Fig. 3 shows the entrance in a kind of according to an embodiment of the invention privacy space and hides exemplary plot;
Fig. 4 shows a kind of exemplary plot of coded lock according to an embodiment of the invention;
Fig. 5 shows the surface chart in a kind of according to an embodiment of the invention privacy space;
Fig. 6 shows a kind of according to an embodiment of the invention flow chart of steps of processing the embodiment of the method 2 of private data in mobile device;
Fig. 7 shows the pseudo-loading port exemplary plot in a kind of according to an embodiment of the invention privacy space;
Fig. 8 shows a kind of according to an embodiment of the invention structured flowchart of processing the device embodiment 1 of private data in mobile device; And,
Fig. 9 shows a kind of according to an embodiment of the invention structured flowchart of processing the device embodiment 2 of private data in mobile device.
Embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown exemplary embodiment of the present disclosure in accompanying drawing, yet should be appreciated that and can realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order more thoroughly to understand the disclosure that these embodiment are provided, and can by the scope of the present disclosure complete convey to those skilled in the art.
With reference to Fig. 1, show a kind of according to an embodiment of the invention flow chart of steps of processing the embodiment of the method 1 of private data in mobile device, specifically can comprise the steps:
Step 101, when mobile device is connected to computing machine, obtains in the first sign of described mobile device side login and identifies in second of described computer-side login;
It should be noted that, mobile device can be the various mobile devices such as panel computer, personal digital assistant, mobile phone, and the embodiment of the present invention is not restricted this.
Mobile device can be by data line or the WIFI(Wi-Fi communication technology) be connected in computing machine.
The first sign and the second sign can be active user's user ID, can be for logging in identical platform or logging in respectively different platforms.To identify can be user account to the first sign and second particularly, can be also self-defining identification information, and such as the authority information of picture, encryption etc., the embodiment of the present invention is not limited this.
In a preferred embodiment of the present invention, described coded lock can comprise digital cipher lock and/or graphical passwords lock.
Digital cipher lock can be the coded lock that adopts numeral to be encrypted and decipher, and graphical passwords lock can be the coded lock that adopts figure to be encrypted and to decipher.
It should be noted that, for further reducing taking of resource, in mobile device side, can judge whether the first sign has corresponding privacy space, if, carry out when mobile device is connected to computing machine, obtain in the first sign of described mobile device side login and the second step identifying of logining in described computer-side.
Particularly, can in the first sign, configure a field and carry out mark, with first of this field, identify and represent that it has privacy space.On distinct device, by the communication between the first sign and the second sign, can obtain the information whether the first sign has logical privacy space.
Step 102, judges whether described the first sign and described the second sign are associated; If so, in described mobile device side, show the entrance in privacy space; The disk storage space of described privacy space for adopting coded lock to encrypt;
At server side, can for example, to the first sign of user data and the second sign design a plurality of (5-10), login tag field (ifSignIn1-10), and for the memo field (memo) of recording conversation.When user adopts respectively the first sign and the second sign to login, login tag field 1 and login tag field 2 are endowed respectively corresponding device identification " phone " and " PC ", the communication information of distinct device is recorded in " memo " memo field, in the communication information, have device identification, the equipment of logining the first sign and the second sign all can read.
The first sign and the second sign can be the user ID being associated, two different user ID that for example bundle by checking, and especially, the first sign and the second sign can be same user ID.
In specific implementation, can judge in mobile device side, extract the user data of the first sign correspondence, in described user data, search described the second sign and whether be associated with described the first sign; Or, judge that whether the first sign is identical with the second sign.
Also can judge from the server side of the first sign correspondence, soon the first sign and the second sign are sent to server side, and described server side is used for judging whether described the first sign and described the second sign are associated; And the judged result returned of reception server side.When checking the first sign and the second sign are when be associated, can show in mobile device side the entrance in privacy space, be specifically as follows the icon of shortcut or file etc., user can manage the data in privacy space by this entrance.For example, as shown in Figure 2, can be at the entrance " privacy file " in " file management " interface display privacy space.
The embodiment of the present invention can, by the evaluation of the user ID that is associated on mobile device and computing machine, can improve the security in privacy space.Certainly, as shown in Figure 3, when verifying that the first sign and the second sign are not the user ID being associated, in mobile device side, do not show the entrance in privacy space.
Step 103, when receiving while accessing the request in described privacy space via described entrance, shows described coded lock in described mobile device side;
For example, in Fig. 2, the entrance in privacy space " privacy file " side is provided with function button " release is checked ", when user clicks " release is checked ", is equivalent to receive the request of accessing described privacy space via described entrance.
As shown in Figure 4, when user clicks " release is checked " the request access privacy space in Fig. 2, eject a new interface, prompting active user need to input the decryption information of digital cipher lock or graphical passwords lock.
Step 104, when receiving decryption information corresponding to described coded lock, shows the data in described privacy space in described mobile device side.
Decryption information can be that user makes an appointment for password is decoded, for example agreement or reappoint after deciphering in using first.When coded lock is digital cipher lock, decryption information can be digital decrypted information; When coded lock is graphical passwords lock, decryption information can be figure decryption information; When password confidential information can be for digital decrypted information and graphical passwords lock, decryption information can be digital decrypted information and figure decryption information.
As shown in Figure 5, when the entrance in privacy space is opened, can show the catalogue in privacy space, for example " photo wallpaper ", " music recording " and " video file ", subprime directory or data can be stored in catalogue the inside.
In specific implementation, the data in privacy space can comprise image data, video data, voice data and/or document files.
After user is decrypted coded lock, just can the data in privacy space be managed.
In a preferred embodiment of the present invention, can also comprise the steps:
Step 105, when receive for the data in described privacy space operational order time, described data are carried out to the operation of described operational order indication.
In specific implementation, described operational order can comprise deletion action instruction, replicate run instruction, shearing manipulation instruction, rename operational order, selects operational order, import operation instruction and/or derive operational order.
Wherein, select operational order can comprise full selection operation instruction and not selection operation instruction entirely.
The operation of deletion action instruction indication can be for deleting the operation of data (can be file, file);
The operation of replicate run instruction indication can be the operation of copy data (can be file, file);
The operation of shearing manipulation instruction indication can be for shearing the operation of data (can be file, file);
The operation of rename operational order indication can be carried out the operation of rename for logarithm according to (can be file, file);
The operation of selecting operational order indication can be the operation of selection data (can be file, file), wherein, the operation of full selection operation instruction indication can be for selecting the operation of total data (can be file, file), and the operation of complete not selection operation instruction indication can be all unselected operations of total data (can be file, file);
The operation of import operation instruction indication can be added to for data being added to (can be file, file) operation in privacy space; Particularly, the data (can be file, file) of selecting can be moved in the disk storage space of this employing coded lock encryption;
The operation of deriving operational order indication can be the operation that data (can be file, file) are removed from privacy space; Particularly, the disk storage space that the data (can be file, file) of selecting can be encrypted from this employing coded lock, move to the position of appointment.
Certainly; aforesaid operations instruction is just as example; when implementing the embodiment of the present invention; can other operational orders be set according to actual conditions; for example arrange coded lock decryption information, give decryption information, protection operational order (as suspended release when continuous three input decryption information mistakes) etc. for change, the embodiment of the present invention is not limited this.In addition, except aforesaid operations instruction, those skilled in the art can also adopt other operational order by actual needs, and the embodiment of the present invention is not limited this yet.
In a preferred embodiment of the present invention, can also comprise the steps:
Step 106, when described mobile device cancellation is connected to described computing machine or closes the entrance in described privacy space, hides the entrance in described privacy space.
When mobile device is extracted from computing machine, ADB(install on computers for connecting the program of mobile phone) can pass a parameter to computing machine.And be user's manual-lock during the entrance of closing privacy space, be to carry out shutoff operation by input function.When identifying this parameter or function, just can know the entrance that mobile device cancellation is connected to computing machine or closes privacy space.
When user is complete to the data processing in privacy space, can disconnect the entrance that is connected or closes privacy space of mobile device and computing machine, now can hide the entrance in privacy space.When user is again during request access privacy space, need again to input decryption information.
The present invention can hide privacy space in mobile device, when identifying successfully, checking shows privacy space, the data that show privacy space when receiving the decryption information of also authentication of users input, for user, carry out follow-up processing, can effectively prevent from maliciously accessing privacy space, thereby can effectively guarantee the safety of user privacy information.
For embodiment of the method, for simple description, therefore it is all expressed as to a series of combination of actions, but those skilled in the art should know, the embodiment of the present invention is not subject to the restriction of described sequence of movement, because according to the embodiment of the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in instructions all belongs to preferred embodiment, and related action might not be that the embodiment of the present invention is necessary.
With reference to Fig. 6, show a kind of according to an embodiment of the invention flow chart of steps of processing the embodiment of the method 2 of private data in mobile device, specifically can comprise the steps:
Step 601, when acquisition is used for logining the sign in privacy space in mobile device, shows the entrance in privacy space in described mobile device side; The disk storage space of described privacy space for adopting coded lock to encrypt;
It should be noted that, mobile device can not need to be connected on other equipment such as computing machine, during the current sign of logining privacy space, just can show the entrance in privacy space.
In a preferred embodiment of the present invention, described coded lock can comprise digital cipher lock and/or graphical passwords lock.
In a preferred embodiment of the present invention, the entrance in described privacy space can comprise the entrance in the non-privacy space of camouflage.
In specific implementation, the entrance in privacy space can be arranged in the intrinsic catalogue of mobile device by user, and such as first class catalogue, second-level directory, three grades of catalogues etc. adopts the icon in non-indication privacy space and word to show.For example, as shown in Figure 7, can in second-level directory corresponding to the first class catalogue " storage card " at " file management " interface, the entrance in a privacy space be set, particularly, adopt the icon of camera and title " photo wallpaper " to show, pretend.
The embodiment of the present invention can be pretended the entrance in privacy space, further improves the security in privacy space.
Step 602, when receiving while accessing the request in described privacy space via described entrance, shows described coded lock in described mobile device side;
For example, in the entrance in the privacy space shown in Fig. 7, when user clicks the catalogue of " photo wallpaper ", be equivalent to receive the request in access described privacy space, just can lock at mobile device side display password.
Step 603, when receiving decryption information corresponding to described coded lock, shows the data in described privacy space in described mobile device side.
In specific implementation, the data in privacy space can comprise image data, video data, voice data and/or document files.
In a preferred embodiment of the present invention, can also comprise the steps:
Step 604, when receive for the data in described privacy space operational order time, described data are carried out to the operation of described operational order indication.
In specific implementation, described operational order can comprise deletion action instruction, replicate run instruction, shearing manipulation instruction, rename operational order, selects operational order, import operation instruction and/or derive operational order.
In a preferred embodiment of the present invention, can also comprise the steps:
Step 605, when closing the entrance in described privacy space, hides the entrance in described privacy space.
When user is disposed data in privacy space, the entrance that can close privacy space, now, hides the entrance in privacy space.When user is again during request access privacy space, need again to input decryption information.
The present invention can hide privacy space in mobile device, when identifying successfully, checking shows privacy space, the data that show privacy space when receiving the decryption information of also authentication of users input, for user, carry out follow-up processing, can effectively prevent from maliciously accessing privacy space, thereby can effectively guarantee the safety of user privacy information.
With reference to Fig. 8, show a kind of according to an embodiment of the invention structured flowchart of processing the device embodiment 1 of private data in mobile device, specifically can comprise as lower module:
Identifier acquisition module 801, is suitable for when mobile device is connected to computing machine, obtains in the first sign of described mobile device side login and identifies in second of described computer-side login;
The first entrance display module 802, is suitable for judging whether described the first sign and described the second sign are associated; If so, in described mobile device side, show the entrance in privacy space; The disk storage space of described privacy space for adopting coded lock to encrypt;
Coded lock display module 803, is suitable for, receiving while accessing the request in described privacy space via described entrance, in described mobile device side, showing described coded lock;
Data disaply moudle 804, is suitable for, when receiving decryption information corresponding to described coded lock, in described mobile device side, showing the data in described privacy space.
In a preferred embodiment of the present invention, described coded lock can comprise digital cipher lock and/or graphical passwords lock.
In a preferred embodiment of the present invention, the data in described privacy space can comprise image data, video data, voice data and/or document files.
In a preferred embodiment of the present invention, can also comprise as lower module:
Operational order execution module, is suitable for, when the operational order receiving for the data in described privacy space, described data being carried out to the operation of described operational order indication.
In a preferred embodiment of the present invention, described operational order can comprise deletion action instruction, replicate run instruction, shearing manipulation instruction, rename operational order, selects operational order, import operation instruction and/or derive operational order.
In a preferred embodiment of the present invention, can also comprise as lower module:
The first entrance is hidden module, is suitable for, when described mobile device cancellation is connected to described computing machine or closes the entrance in described privacy space, hiding the entrance in described privacy space.
With reference to Fig. 9, show a kind of according to an embodiment of the invention structured flowchart of processing the device embodiment 2 of private data in mobile device, specifically can comprise as lower module:
The second entrance display module 901, is suitable in mobile device, obtaining when logining the sign in privacy space, shows the entrance in privacy space in described mobile device side; The disk storage space of described privacy space for adopting coded lock to encrypt;
Coded lock display module 902, is suitable for, receiving while accessing the request in described privacy space via described entrance, in described mobile device side, showing described coded lock;
Data disaply moudle 903, is suitable for, when receiving decryption information corresponding to described coded lock, in described mobile device side, showing the data in described privacy space.
In a preferred embodiment of the present invention, the entrance in described privacy space can comprise the entrance in the non-privacy space of camouflage.
In a preferred embodiment of the present invention, described coded lock can comprise digital cipher lock and/or graphical passwords lock.
In a preferred embodiment of the present invention, the data in described privacy space can comprise image data, video data, voice data and/or document files.
In a preferred embodiment of the present invention, can also comprise as lower module:
Operational order execution module, is suitable for, when the operational order receiving for the data in described privacy space, described data being carried out to the operation of described operational order indication.
In a preferred embodiment of the present invention, described operational order can comprise deletion action instruction, replicate run instruction, shearing manipulation instruction, rename operational order, selects operational order, import operation instruction and/or derive operational order.
In a preferred embodiment of the present invention, can also comprise as lower module:
The second entrance is hidden module, is suitable for when closing the entrance in described privacy space, hides the entrance in described privacy space.
For device embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, relevant part is referring to the part explanation of embodiment of the method.
The algorithm providing at this is intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with demonstration.Various general-purpose systems also can with based on using together with this teaching.According to description above, it is apparent constructing the desired structure of this type systematic.In addition, the present invention is not also for any certain programmed language.It should be understood that and can utilize various programming languages to realize content of the present invention described here, and the description of above language-specific being done is in order to disclose preferred forms of the present invention.
In the instructions that provided herein, a large amount of details have been described.Yet, can understand, embodiments of the invention can not put into practice in the situation that there is no these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the above in the description of exemplary embodiment of the present invention, each feature of the present invention is grouped together into single embodiment, figure or sometimes in its description.Yet, the method for the disclosure should be construed to the following intention of reflection: the present invention for required protection requires than the more feature of feature of clearly recording in each claim.Or rather, as reflected in claims below, inventive aspect is to be less than all features of disclosed single embodiment above.Therefore, claims of following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can the module in the equipment in embodiment are adaptively changed and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and can put them into a plurality of submodules or subelement or sub-component in addition.At least some in such feature and/or process or unit are mutually repelling, and can adopt any combination to combine all processes or the unit of disclosed all features in this instructions (comprising claim, summary and the accompanying drawing followed) and disclosed any method like this or equipment.Unless clearly statement in addition, in this instructions (comprising claim, summary and the accompanying drawing followed) disclosed each feature can be by providing identical, be equal to or the alternative features of similar object replaces.
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature rather than further feature included in other embodiment, the combination of the feature of different embodiment means within scope of the present invention and forms different embodiment.For example, in the following claims, the one of any of embodiment required for protection can be used with array mode arbitrarily.
All parts embodiment of the present invention can realize with hardware, or realizes with the software module moved on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that and can use in practice microprocessor or digital signal processor (DSP) to realize according to the some or all functions of the some or all parts in the equipment of processing private data in mobile device of the embodiment of the present invention.The present invention for example can also be embodied as, for carrying out part or all equipment or device program (, computer program and computer program) of method as described herein.Realizing program of the present invention and can be stored on computer-readable medium like this, or can there is the form of one or more signal.Such signal can be downloaded and obtain from internet website, or provides on carrier signal, or provides with any other form.
It should be noted above-described embodiment the present invention will be described rather than limit the invention, and those skilled in the art can design alternative embodiment in the situation that do not depart from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed as element or step in the claims.Being positioned at word " " before element or " one " does not get rid of and has a plurality of such elements.The present invention can be by means of including the hardware of some different elements and realizing by means of the computing machine of suitably programming.In having enumerated the unit claim of some devices, several in these devices can be to carry out imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title by these word explanations.
The invention discloses A1, a kind of method of processing private data in mobile device, comprising:
When mobile device is connected to computing machine, obtains in the first sign of described mobile device side login and identify in second of described computer-side login;
Judge whether described the first sign and described the second sign are associated; If so, in described mobile device side, show the entrance in privacy space; The disk storage space of described privacy space for adopting coded lock to encrypt;
When receiving while accessing the request in described privacy space via described entrance, in described mobile device side, show described coded lock;
When receiving decryption information corresponding to described coded lock, in described mobile device side, show the data in described privacy space.
A2, the method as described in A1, described coded lock comprises digital cipher lock and/or graphical passwords lock.
A3, the method as described in A1, the data in described privacy space comprise image data, video data, voice data and/or document files.
A4, the method as described in A1 or A2 or A3, also comprise:
When receive for the data in described privacy space operational order time, described data are carried out to the operation of described operational order indication.
A5, the method as described in A4, described operational order comprises deletion action instruction, replicate run instruction, shearing manipulation instruction, rename operational order, selects operational order, import operation instruction and/or derive operational order.
A6, the method as described in A1 or A2 or A3 or A5, also comprise:
When described mobile device cancellation is connected to described computing machine or closes the entrance in described privacy space, hide the entrance in described privacy space.
The invention also discloses B7, a kind of method of processing private data in mobile device, comprising:
When acquisition is used for logining the sign in privacy space in mobile device, in described mobile device side, show the entrance in privacy space; The disk storage space of described privacy space for adopting coded lock to encrypt;
When receiving while accessing the request in described privacy space via described entrance, in described mobile device side, show described coded lock;
When receiving decryption information corresponding to described coded lock, in described mobile device side, show the data in described privacy space.
B8, the method as described in B7, the entrance in described privacy space comprises the entrance in the non-privacy space of camouflage.
B9, the method as described in B7, described coded lock comprises digital cipher lock and/or graphical passwords lock.
B10, the method as described in B7, the data in described privacy space comprise image data, video data, voice data and/or document files.
B11, the method as described in B7 or B8 or B9 or B10, also comprise:
When receive for the data in described privacy space operational order time, described data are carried out to the operation of described operational order indication.
B12, the method as described in B11, described operational order comprises deletion action instruction, replicate run instruction, shearing manipulation instruction, rename operational order, selects operational order, import operation instruction and/or derive operational order.
B13, the method as described in B7 or B8 or B9 or B10 or B12, also comprise:
When closing the entrance in described privacy space, hide the entrance in described privacy space.
The invention also discloses C14, a kind of device of processing private data in mobile device, comprising:
Identifier acquisition module, is suitable for when mobile device is connected to computing machine, obtains in the first sign of described mobile device side login and identifies in second of described computer-side login;
The first entrance display module, is suitable for judging whether described the first sign and described the second sign are associated; If so, in described mobile device side, show the entrance in privacy space; The disk storage space of described privacy space for adopting coded lock to encrypt;
Coded lock display module, is suitable for, receiving while accessing the request in described privacy space via described entrance, in described mobile device side, showing described coded lock;
Data disaply moudle, is suitable for, when receiving decryption information corresponding to described coded lock, in described mobile device side, showing the data in described privacy space.
C15, the device as described in C14, described coded lock comprises digital cipher lock and/or graphical passwords lock.
C16, the device as described in C14, the data in described privacy space comprise image data, video data, voice data and/or document files.
C17, the device as described in C14 or C15 or C16, also comprise:
Operational order execution module, is suitable for, when the operational order receiving for the data in described privacy space, described data being carried out to the operation of described operational order indication.
C18, the device as described in C17, described operational order comprises deletion action instruction, replicate run instruction, shearing manipulation instruction, rename operational order, selects operational order, import operation instruction and/or derive operational order.
C19, the device as described in C14 or C15 or C16 or C18, also comprise:
The first entrance is hidden module, is suitable for, when described mobile device cancellation is connected to described computing machine or closes the entrance in described privacy space, hiding the entrance in described privacy space.
The invention also discloses D20, a kind of device of processing private data in mobile device, comprising:
The second entrance display module, is suitable in mobile device, obtaining when logining the sign in privacy space, shows the entrance in privacy space in described mobile device side; The disk storage space of described privacy space for adopting coded lock to encrypt;
Coded lock display module, is suitable for, receiving while accessing the request in described privacy space via described entrance, in described mobile device side, showing described coded lock;
Data disaply moudle, is suitable for, when receiving decryption information corresponding to described coded lock, in described mobile device side, showing the data in described privacy space.
D21, the device as described in D20, the entrance in described privacy space comprises the entrance in the non-privacy space of camouflage.
D22, the device as described in D20, described coded lock comprises digital cipher lock and/or graphical passwords lock.
D23, the device as described in D20, the data in described privacy space comprise image data, video data, voice data and/or document files.
D24, the device as described in D20 or D21 or D22 or D23, also comprise:
Operational order execution module, is suitable for, when the operational order receiving for the data in described privacy space, described data being carried out to the operation of described operational order indication.
D25, the device as described in D24, described operational order comprises deletion action instruction, replicate run instruction, shearing manipulation instruction, rename operational order, selects operational order, import operation instruction and/or derive operational order.
D26, the device as described in D20 or D21 or D22 or D23 or D25, also comprise:
The second entrance is hidden module, is suitable for when closing the entrance in described privacy space, hides the entrance in described privacy space.

Claims (10)

1. in mobile device, process a method for private data, comprising:
When mobile device is connected to computing machine, obtains in the first sign of described mobile device side login and identify in second of described computer-side login;
Judge whether described the first sign and described the second sign are associated; If so, in described mobile device side, show the entrance in privacy space; The disk storage space of described privacy space for adopting coded lock to encrypt;
When receiving while accessing the request in described privacy space via described entrance, in described mobile device side, show described coded lock;
When receiving decryption information corresponding to described coded lock, in described mobile device side, show the data in described privacy space.
2. the method for claim 1, is characterized in that, also comprises:
When receive for the data in described privacy space operational order time, described data are carried out to the operation of described operational order indication.
3. method as claimed in claim 2, is characterized in that, described operational order comprises deletion action instruction, replicate run instruction, shearing manipulation instruction, rename operational order, selects operational order, import operation instruction and/or derive operational order.
4. the method as described in claim 1 or 2 or 3, is characterized in that, also comprises:
When described mobile device cancellation is connected to described computing machine or closes the entrance in described privacy space, hide the entrance in described privacy space.
5. in mobile device, process a method for private data, comprising:
When acquisition is used for logining the sign in privacy space in mobile device, in described mobile device side, show the entrance in privacy space; The disk storage space of described privacy space for adopting coded lock to encrypt;
When receiving while accessing the request in described privacy space via described entrance, in described mobile device side, show described coded lock;
When receiving decryption information corresponding to described coded lock, in described mobile device side, show the data in described privacy space.
6. method as claimed in claim 5, is characterized in that, the entrance in described privacy space comprises the entrance in the non-privacy space of camouflage.
7. the method as described in claim 5 or 6, is characterized in that, also comprises:
When receive for the data in described privacy space operational order time, described data are carried out to the operation of described operational order indication.
8. the method as described in claim 5 or 6, is characterized in that, also comprises:
When closing the entrance in described privacy space, hide the entrance in described privacy space.
9. in mobile device, process a device for private data, comprising:
Identifier acquisition module, is suitable for when mobile device is connected to computing machine, obtains in the first sign of described mobile device side login and identifies in second of described computer-side login;
The first entrance display module, is suitable for judging whether described the first sign and described the second sign are associated; If so, in described mobile device side, show the entrance in privacy space; The disk storage space of described privacy space for adopting coded lock to encrypt;
Coded lock display module, is suitable for, receiving while accessing the request in described privacy space via described entrance, in described mobile device side, showing described coded lock;
Data disaply moudle, is suitable for, when receiving decryption information corresponding to described coded lock, in described mobile device side, showing the data in described privacy space.
10. in mobile device, process a device for private data, comprising:
The second entrance display module, is suitable in mobile device, obtaining when logining the sign in privacy space, shows the entrance in privacy space in described mobile device side; The disk storage space of described privacy space for adopting coded lock to encrypt;
Coded lock display module, is suitable for, receiving while accessing the request in described privacy space via described entrance, in described mobile device side, showing described coded lock;
Data disaply moudle, is suitable for, when receiving decryption information corresponding to described coded lock, in described mobile device side, showing the data in described privacy space.
CN201310513275.0A 2013-10-25 2013-10-25 A kind of method and apparatus for processing private data in a mobile device Active CN103577761B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310513275.0A CN103577761B (en) 2013-10-25 2013-10-25 A kind of method and apparatus for processing private data in a mobile device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310513275.0A CN103577761B (en) 2013-10-25 2013-10-25 A kind of method and apparatus for processing private data in a mobile device

Publications (2)

Publication Number Publication Date
CN103577761A true CN103577761A (en) 2014-02-12
CN103577761B CN103577761B (en) 2017-04-05

Family

ID=50049522

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310513275.0A Active CN103577761B (en) 2013-10-25 2013-10-25 A kind of method and apparatus for processing private data in a mobile device

Country Status (1)

Country Link
CN (1) CN103577761B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104090922A (en) * 2014-06-20 2014-10-08 北京奇虎科技有限公司 Method and device for clearing privacy data
CN104615956A (en) * 2015-03-04 2015-05-13 浪潮集团有限公司 Method for distinguishing and encrypting storage devices
CN105373740A (en) * 2014-08-14 2016-03-02 中国移动通信集团公司 Terminal information protection method and terminal
CN105678180A (en) * 2015-11-30 2016-06-15 上海闻泰电子科技有限公司 Privacy protection system
CN105912951A (en) * 2016-04-15 2016-08-31 北京小米移动软件有限公司 Data migration method and device
CN105912947A (en) * 2016-03-31 2016-08-31 宇龙计算机通信科技(深圳)有限公司 File processing method and device based on external equipment
CN106096432A (en) * 2016-05-26 2016-11-09 北京金山安全软件有限公司 Permission setting method and device
CN106156646A (en) * 2015-04-03 2016-11-23 北京搜狗科技发展有限公司 A kind of information call method and electronic equipment
CN106295387A (en) * 2015-06-05 2017-01-04 北京壹人壹本信息科技有限公司 A kind of safety protecting method and device
CN107040540A (en) * 2017-04-20 2017-08-11 北京奇虎科技有限公司 A kind of cloud private data display methods and device, server and mobile terminal
CN107066868A (en) * 2017-03-28 2017-08-18 北京洋浦伟业科技发展有限公司 A kind of data guard method and device of identity-based certification
CN107392039A (en) * 2017-09-22 2017-11-24 华北理工大学 Computer hard disk data encrypting method and its device
CN108573161A (en) * 2017-03-13 2018-09-25 北京贝塔科技股份有限公司 Encryption method, application lock and electronic equipment
CN109271764A (en) * 2018-08-30 2019-01-25 北京珠穆朗玛移动通信有限公司 Private data guard method, mobile terminal and storage medium
WO2023071990A1 (en) * 2021-10-27 2023-05-04 北京琥珀创想科技有限公司 Privacy protection method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1708160A (en) * 2005-05-27 2005-12-14 上海贝豪通讯电子有限公司 Mobile communication terminal capable of carrying out encrypting to user information and method thereof
US20120076299A1 (en) * 2010-09-23 2012-03-29 Oliver Koemmerling Method for the encrypted transmission of data from a mobile date storage device to a stationary device as well as data encryption adapter
CN102917348A (en) * 2012-10-30 2013-02-06 广东欧珀移动通信有限公司 Intelligent multi-user mobile phone and logging method thereof
CN103002117A (en) * 2011-09-15 2013-03-27 胡光力 Phone information encryption method and phone information encryption system
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1708160A (en) * 2005-05-27 2005-12-14 上海贝豪通讯电子有限公司 Mobile communication terminal capable of carrying out encrypting to user information and method thereof
US20120076299A1 (en) * 2010-09-23 2012-03-29 Oliver Koemmerling Method for the encrypted transmission of data from a mobile date storage device to a stationary device as well as data encryption adapter
CN103002117A (en) * 2011-09-15 2013-03-27 胡光力 Phone information encryption method and phone information encryption system
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN102917348A (en) * 2012-10-30 2013-02-06 广东欧珀移动通信有限公司 Intelligent multi-user mobile phone and logging method thereof

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104090922B (en) * 2014-06-20 2017-12-12 北京奇虎科技有限公司 A kind of method and apparatus for clearing up private data
CN104090922A (en) * 2014-06-20 2014-10-08 北京奇虎科技有限公司 Method and device for clearing privacy data
CN105373740A (en) * 2014-08-14 2016-03-02 中国移动通信集团公司 Terminal information protection method and terminal
CN104615956A (en) * 2015-03-04 2015-05-13 浪潮集团有限公司 Method for distinguishing and encrypting storage devices
CN106156646B (en) * 2015-04-03 2020-09-22 北京搜狗科技发展有限公司 Information calling method and electronic equipment
CN106156646A (en) * 2015-04-03 2016-11-23 北京搜狗科技发展有限公司 A kind of information call method and electronic equipment
CN106295387A (en) * 2015-06-05 2017-01-04 北京壹人壹本信息科技有限公司 A kind of safety protecting method and device
CN105678180A (en) * 2015-11-30 2016-06-15 上海闻泰电子科技有限公司 Privacy protection system
CN105912947A (en) * 2016-03-31 2016-08-31 宇龙计算机通信科技(深圳)有限公司 File processing method and device based on external equipment
EP3232316B1 (en) * 2016-04-15 2023-09-27 Beijing Xiaomi Mobile Software Co., Ltd. Method and device for data migration
US20170300260A1 (en) * 2016-04-15 2017-10-19 Beijing Xiaomi Mobile Software Co., Ltd. Method, device and computer-readable storage medium for data migration
CN105912951A (en) * 2016-04-15 2016-08-31 北京小米移动软件有限公司 Data migration method and device
CN106096432A (en) * 2016-05-26 2016-11-09 北京金山安全软件有限公司 Permission setting method and device
CN108573161B (en) * 2017-03-13 2022-02-18 北京贝塔科技股份有限公司 Encryption method, application lock and electronic equipment
CN108573161A (en) * 2017-03-13 2018-09-25 北京贝塔科技股份有限公司 Encryption method, application lock and electronic equipment
CN107066868A (en) * 2017-03-28 2017-08-18 北京洋浦伟业科技发展有限公司 A kind of data guard method and device of identity-based certification
CN107040540B (en) * 2017-04-20 2020-06-09 北京安云世纪科技有限公司 Cloud privacy data display method and device, server and mobile terminal
CN107040540A (en) * 2017-04-20 2017-08-11 北京奇虎科技有限公司 A kind of cloud private data display methods and device, server and mobile terminal
CN107392039B (en) * 2017-09-22 2020-06-30 华北理工大学 Computer hard disk data encryption method and device
CN107392039A (en) * 2017-09-22 2017-11-24 华北理工大学 Computer hard disk data encrypting method and its device
CN109271764A (en) * 2018-08-30 2019-01-25 北京珠穆朗玛移动通信有限公司 Private data guard method, mobile terminal and storage medium
CN109271764B (en) * 2018-08-30 2023-10-17 北京珠穆朗玛移动通信有限公司 Private data protection method, mobile terminal and storage medium
WO2023071990A1 (en) * 2021-10-27 2023-05-04 北京琥珀创想科技有限公司 Privacy protection method and system

Also Published As

Publication number Publication date
CN103577761B (en) 2017-04-05

Similar Documents

Publication Publication Date Title
CN103577761A (en) Method and device for processing privacy data in mobile equipment
US11593055B2 (en) Selective screen sharing
US20200394327A1 (en) Data security compliance for mobile device applications
EP3259678B1 (en) Device and systems to securely remotely access, manage and store an enterprise's data, using employees' mobile devices
US11030351B2 (en) Secure data display
CN101529366B (en) Identification and visualization of trusted user interface objects
US10615966B2 (en) Selective content security using visual hashing
Parekh et al. An analysis of security challenges in cloud computing
CN103617382A (en) Privacy protection method and device
JP2016528841A (en) System and method for identifying compromised private keys
Hassan Digital forensics basics: A practical guide using Windows OS
JP2017534951A (en) System and method for renewing ownership factor certificates
US10958687B2 (en) Generating false data for suspicious users
JP6511161B2 (en) Data file protection
US9275206B2 (en) Managing sensitive information
CN106030527B (en) By the system and method for application notification user available for download
Carlo et al. Information security for journalists
Vecchiato et al. The perils of android security configuration
CN103729604A (en) User access area method and device
Saharan et al. Digital and cyber forensics: A contemporary evolution in forensic sciences
Rai et al. Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices
Vickermon Bring your own device to work
US11526633B2 (en) Media exfiltration prevention system
Mittal Attribute based encryption for secure data access in cloud
US11443030B2 (en) Method to encode and decode otherwise unrecorded private credentials, terms, phrases, or sentences

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220725

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: Room 112, block D, No. 28, Xinjiekou outer street, Xicheng District, Beijing 100088 (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.