CN104036203A - Information security management method and information security management system - Google Patents

Information security management method and information security management system Download PDF

Info

Publication number
CN104036203A
CN104036203A CN201310073569.6A CN201310073569A CN104036203A CN 104036203 A CN104036203 A CN 104036203A CN 201310073569 A CN201310073569 A CN 201310073569A CN 104036203 A CN104036203 A CN 104036203A
Authority
CN
China
Prior art keywords
entrance
storage space
user
password
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310073569.6A
Other languages
Chinese (zh)
Inventor
雷宇
吕曾翔
陈晓波
何竞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310073569.6A priority Critical patent/CN104036203A/en
Publication of CN104036203A publication Critical patent/CN104036203A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Abstract

The invention discloses an information security management method and an information security management system and belongs to the technical field of communication. The information security management method which is applied to user equipment comprises creating storage space through a first entrance, wherein the storage space is used for storing to-be-protected information; saving a user password set for the storage space; receiving a password input through a user through a second entrance; comparing the user input password and the saved user password and entering into the storage space if the user input password is identical to the saved user password. The first entrance is different from the second entrance and the second entrance is formed in an existing application of the user equipment. The information security management system comprises a creating module, a saving module, a receiving module and a comparing module. The information security management method is used for combining the second entrance for information viewing to the existing application of the user equipment naturally, well solving the private space entrance concealing problem, greatly improving the information security and providing reliable guarantee for information security.

Description

The method of information security management and Information Security Management System
Technical field
The present invention relates to communication technical field, particularly a kind of method of information security management and Information Security Management System.
Background technology
At present, along with the convenient practicality of smart mobile phone, the demonstration of the feature such as powerful, also universal coming in various user groups gradually of mobile phone, causes a series of mobile phone safety problem thus.Mobile phone safety mainly refers to that use mobile phone carries out the security of the information producing in communication process, and this category information may be revealed in intentional or unintentional situation, will cause damage to cellie once reveal.Therefore, numerous terminal business, software business man etc. have proposed the solution of mobile phone message security in succession.
Comparatively common a solution is at present, for the information of need to be keep secret in mobile phone arranges cryptoguard, and utilizes a switch to remove to hide this password entrance; When this switch is in the time opening state, display password entrance, now, user can input password and enter checking of security information; When this switch is during in off status, this password entrance is hidden, thereby cannot view above-mentioned secret information.
But, there is a problem in such scheme, be exactly how this switch is hidden, if this switch can not be hidden, thereby illegal person still can decode to intercept password and steal information this switch, therefore, the reliability of this scheme is lower, and the information in mobile phone still exists unsafe problem.
Summary of the invention
The invention provides a kind of method and Information Security Management System of information security management, to improve the security of Information Security Management System internal information.Described technical scheme is as follows:
On the one hand, the invention provides a kind of method of information security management, be applied to a subscriber equipment, the method comprises:
Create a storage space by the first entrance, described storage space is for storing information to be protected;
Save as the user cipher that described storage space arranges;
Receive the password of user's input by the second entrance;
The password that compares described user's input is identical with the described user cipher of preserving, and enters described storage space;
Wherein, described the first entrance is different from described the second entrance, and described the second entrance is positioned in the existing application of described subscriber equipment.
On the other hand, the invention provides a kind of Information Security Management System, be applied to a subscriber equipment, this Information Security Management System comprises:
Creation module, for creating a storage space by the first entrance, described storage space is for storing information to be protected in described Information Security Management System;
Preserve module, the user cipher arranging for saving as described storage space;
Receiver module, for receiving the password of user's input by the second entrance;
Comparison module, identical with the described user cipher of preserving for comparing the password of described user input, enter described storage space;
Wherein, described the first entrance is different from described the second entrance, and described the second entrance is positioned in the existing application of described subscriber equipment.
The beneficial effect that technical scheme provided by the invention is brought is: create a storage space by the first entrance, described storage space is for storing information to be protected; Save as the user cipher that described storage space arranges; Receive the password of user's input by the second entrance; The password that compares described user's input is identical with the described user cipher of preserving, and enters described storage space; Wherein, described the first entrance is different from described the second entrance, and described the second entrance is positioned in the existing application of subscriber equipment; Due to; described storage space is storage space independently; described information has been carried out cryptoguard; and the first entrance separates with the second entrance, therefore, not only described information is carried out to encipherment protection; and by the second entrance ecosystem for the information of checking be combined in the existing application of subscriber equipment; well solved the hiding problem of private space entrance, the security that has greatly improved information, for the information security of subscriber equipment provides reliable guarantee.
Brief description of the drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing of required use during embodiment is described is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the method flow diagram of the information security management that provides of the embodiment of the present invention 1;
Fig. 2 is the method flow diagram of the information security management that provides of the embodiment of the present invention 2;
Fig. 3 is a kind of structural drawing of Information Security Management System that the embodiment of the present invention 3 provides;
Fig. 4 is the another kind of structural drawing of Information Security Management System that the embodiment of the present invention 3 provides.
Embodiment
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing, embodiment of the present invention is described further in detail.
The method of the information security management of the embodiment of the present invention and Information Security Management System can run on the operating system platform for Portable movable smart machine that the exploitation of Android(Google is installed), the operating system platform for Portable movable smart machine of iOS(Apple exploitation), the operating system platform for Portable movable smart machine of Windows Phone(Microsoft exploitation) etc. the subscriber equipment of operating system, this subscriber equipment can be mobile phone, palm PC, any one in panel computer etc., can comprise central processing unit in this subscriber equipment, storer, switching device, power supply, clock signal maker, image processor, combination in any in Sound Processor Unit etc., above-mentioned central processing unit, storer, switching device, power supply, clock signal maker, image processor, combination in any in Sound Processor Unit etc. is for realizing the method for information security management and the function of Information Security Management System of embodiments of the invention.
Embodiment 1
Referring to Fig. 1, the present embodiment provides a kind of method of information security management, is applied to a subscriber equipment, and the method comprises:
101: create a storage space by the first entrance, this storage space is for storing information to be protected;
102: save as the user cipher that this storage space arranges;
103: the password that receives user's input by the second entrance;
Wherein, this first entrance is different from this second entrance, and this second entrance is positioned in the existing application of this subscriber equipment.
104: the password that compares described user's input is identical with this user cipher of preserving, enters this storage space.
Information to be protected in the present embodiment can be any information relevant with subscriber equipment, includes but not limited to: user's personal information, address list, note, message registration, photo, p.m.entry etc.
In the present embodiment, preferably, described user cipher is made up of numeral, and described the second entrance is positioned on the dialing keyboard of described subscriber equipment, and the password of described user's input is numeral.Certainly, described user cipher also can comprise letter or special symbol etc., and the present invention is not specifically limited this.The existing application of described subscriber equipment can be also multiple, and as note, address list, p.m.entry, browser etc., the present invention is also not specifically limited this.
Described dialing keyboard refers to the keyboard for dialling on subscriber equipment.Conventionally, on this dialing keyboard, comprise the digital keys of numeral 1 to numeral 9, also can comprise the button such as * and #.In the present invention, for the user cipher of storage space setting is made up of numeral, therefore, can complete by dialing keyboard the input of this password, simple and convenient, easily operation, and because dialing keyboard is application intrinsic in subscriber equipment, make the entrance of this storage space disguised strong, safe.
Under a kind of embodiment, the method also comprises:
After each dial-up operation finishes, judge whether this dial number is this user cipher of having preserved;
If so, forbid preserving this dial number in nearest message registration;
If not, this dial number is kept in nearest message registration as the last conversation number.
Under another kind of embodiment, after creating a storage space by the first entrance, also comprise:
If this first entrance is triggered, create a new storage space; Or,
If this first entrance is triggered and receives the password of user input, confirm that the password of described user's input enters the storage space that this password is corresponding after identical with described user cipher.
Under another embodiment, receive the password of user's input by the second entrance after, also comprise:
The numeral that compares this user's input is different from this user cipher of preserving, the numeral of this user's input is called out as dial number.
The said method that the present embodiment provides, creates a storage space by the first entrance, and described storage space is for storing information to be protected; Save as the user cipher that described storage space arranges; Receive the password of user's input by the second entrance; The password that compares described user's input is identical with the described user cipher of preserving, and enters described storage space; Wherein, described the first entrance is different from described the second entrance, and described the second entrance is positioned in the existing application of subscriber equipment; Due to; described storage space is storage space independently; described information has been carried out cryptoguard; and the first entrance separates with the second entrance, therefore, not only described information is carried out to encipherment protection; and by the second entrance ecosystem for the information of checking be combined in the existing application of subscriber equipment; well solved the hiding problem of private space entrance, the security that has greatly improved information, for the information security of subscriber equipment provides reliable guarantee.
Embodiment 2
Referring to Fig. 2, the present embodiment provides a kind of method of information security management, is applied to a subscriber equipment, and the method comprises:
201: create a storage space by the first entrance, this storage space is for storing information to be protected;
Information to be protected in the present embodiment can be any information relevant with subscriber equipment, includes but not limited to: user's personal information, address list, note, message registration, photo, p.m.entry etc.
In the present embodiment, user can create multiple storage spaces according to identical flow process, and this sentences and creates a storage space is that example describes.
Described the first entrance is an independent function in subscriber equipment, particularly, can reserve on the table the icon of this function, user can enter the first entrance by clicking this icon, certainly, can adopt alternate manner to trigger the first entrance, not do too much explanation herein.
202: save as the user cipher that this storage space arranges, this user cipher is preferably made up of numeral;
The present embodiment does not limit the length of described user cipher, as being 6,9 or 10 etc.
203: the numeral that receives user's input by the second entrance;
Wherein, this first entrance is different from this second entrance, and this second entrance is positioned on the dialing keyboard of subscriber equipment.
Described dialing keyboard refers to the keyboard for dialling on subscriber equipment.Conventionally, on this dialing keyboard, comprise the digital keys of numeral 1 to numeral 9, also can comprise the button such as * and #.In the present invention, for the password of storage space setting is made up of numeral, therefore, can complete by dialing keyboard the input of this password, simple and convenient, easily operation, and because dialing keyboard is function intrinsic in subscriber equipment, make the entrance of this storage space disguised strong, safe.
204: relatively whether the numeral of user's input is identical with the user cipher of preserving, if identical, carries out 205; If different, carry out 206;
205: enter this storage space, then carry out 207;
In this case, user enters described storage space by the second entrance on dialing keyboard, carry out this storage space the checking of information, edit, the operation such as amendment, under this state, also can adjust this storage space, as change the size of this storage space, and title etc., the present invention is not specifically limited this.
206: this numeral of user's input is called out as dial number, then carry out 207;
In this case, user uses dialing keyboard to carry out dial-up operation to call out, and does not do too much explanation herein.
207: after this dial-up operation finishes, judge whether this dial number is this user cipher of having preserved, if so, forbid preserving this dial number in nearest message registration; If not, be kept in nearest message registration this dial number as the last conversation number;
Conventionally, in message registration, all can preserve the dial number in the last dial-up operation of subscriber equipment recently, as the last conversation number, to facilitate user to check, fast call out.In the present invention, in the time that user inputs the password of storage space by dialing keyboard, can ensure the password of this input not carry out keeping records by above-mentioned judgement, thereby avoid this password to be checked, improve further the security of information.
208: if this first entrance is triggered, create a new storage space; Or, if this first entrance is triggered and receives the password of user input, confirm that the password of described user's input enters the storage space that this password is corresponding after identical with described user cipher.
In the present embodiment, for user-friendly, the function that enters this storage space can also be provided in the first entrance, if user is correct at the first entrance input password and password, can enter the storage space that this password is corresponding, now, user can operate the information in this storage space, also can itself operate this storage space, the same with the authority of user from the second entrance enters this storage space, thereby for user provides the another kind of mode that enters this storage space, apply more flexible, and, this mode needs user to input password just to enter, therefore, also for information security provides reliable guarantee.
If above-mentioned user directly triggers the first entrance but does not input password, or, be that another user has triggered the first entrance and do not known to input what password, trigger and create a new storage space, therefore, can not impact the storage space having created, ensure the security of information.
The said method that the present embodiment provides, creates a storage space by the first entrance, and described storage space is for storing information to be protected; Save as the user cipher that described storage space arranges; Receive the password of user's input by the second entrance; The password that compares described user's input is identical with the described user cipher of preserving, and enters described storage space; Wherein, described the first entrance is different from described the second entrance, and described the second entrance is positioned in the existing application of subscriber equipment; Due to; described storage space is storage space independently; described information has been carried out cryptoguard; and the first entrance separates with the second entrance, therefore, not only described information is carried out to encipherment protection; and by the second entrance ecosystem for the information of checking be combined in the existing application of subscriber equipment; well solved the hiding problem of private space entrance, the security that has greatly improved information, for the information security of subscriber equipment provides reliable guarantee.
Embodiment 3
Referring to Fig. 3, the present embodiment provides a kind of Information Security Management System, is applied to a subscriber equipment, and this Information Security Management System comprises:
Creation module 301, for creating a storage space by the first entrance, this storage space is for storing information to be protected in this Information Security Management System;
Preserve module 302, the user cipher arranging for saving as this storage space;
Receiver module 303, for receiving the password of user's input by the second entrance;
Comparison module 304, identical with the user cipher of preserving for comparing the password of user input, enter this storage space;
Wherein, this first entrance is different from this second entrance, and this second entrance is positioned in the existing application of this subscriber equipment.
In the present embodiment, preferably, described user cipher is made up of numeral, and described the second entrance is positioned on the dialing keyboard of described subscriber equipment, and the password of described user's input is numeral.Certainly, described user cipher also can comprise letter or special symbol etc., and the present invention is not specifically limited this.The existing application of described subscriber equipment can be also multiple, and as note, address list, p.m.entry, browser etc., the present invention is also not specifically limited this.
Referring to Fig. 4, under a kind of embodiment, this Information Security Management System also comprises:
Logging modle 305, after finishing at each dial-up operation, judges whether this dial number is this user cipher of having preserved; If so, forbid preserving this dial number in nearest message registration; If not, this dial number is kept in nearest message registration as the last conversation number.
Under another kind of embodiment, creation module 301 also for:
After creating a storage space by the first entrance, if this first entrance is triggered, create a new storage space; Or, if this first entrance is triggered and receives the password of user input, confirm that the password of described user's input enters the storage space that this password is corresponding after identical with described user cipher.
Under another embodiment, comparison module 304 also for:
The numeral that compares this user's input is different from this user cipher of preserving, the numeral of this user's input is called out as dial number.
The above-mentioned Information Security Management System that the present embodiment provides can be provided by the method providing in above-mentioned either method embodiment, and detailed process is shown in the description in embodiment of the method, does not repeat herein.
The above-mentioned Information Security Management System that the present embodiment provides, creates a storage space by the first entrance, and described storage space is for storing information to be protected; Save as the user cipher that described storage space arranges; Receive the password of user's input by the second entrance; The password that compares described user's input is identical with the described user cipher of preserving, and enters described storage space; Wherein, described the first entrance is different from described the second entrance, and described the second entrance is positioned in the existing application of subscriber equipment; Due to; described storage space is storage space independently; described information has been carried out cryptoguard; and the first entrance separates with the second entrance, therefore, not only described information is carried out to encipherment protection; and by the second entrance ecosystem for the information of checking be combined in the existing application of subscriber equipment; well solved the hiding problem of private space entrance, the security that has greatly improved information, for the information security of subscriber equipment provides reliable guarantee.
One of ordinary skill in the art will appreciate that all or part of step that realizes above-described embodiment can complete by hardware, also can carry out the hardware that instruction is relevant by program completes, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium of mentioning can be ROM (read-only memory), disk or CD etc.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any amendment of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (10)

1. a method for information security management, is characterized in that, is applied to a subscriber equipment, and described method comprises:
Create storage space by the first entrance, described storage space is for storing information to be protected;
Save as the user cipher that described storage space arranges;
Receive the password of user's input by the second entrance;
The password that compares described user's input is identical with the described user cipher of preserving, and enters described storage space;
Wherein, described the first entrance is different from described the second entrance, and described the second entrance is positioned in the existing application of described subscriber equipment.
2. method according to claim 1, is characterized in that, described user cipher is made up of numeral, and described the second entrance is positioned on the dialing keyboard of described subscriber equipment, and the password of described user's input is numeral.
3. method according to claim 2, is characterized in that, described method also comprises:
After each dial-up operation finishes, judge whether this dial number is the described user cipher of having preserved;
If so, forbid preserving this dial number in nearest message registration;
If not, this dial number is kept in nearest message registration as the last conversation number.
4. method according to claim 1, is characterized in that, after creating a storage space, also comprises by the first entrance:
If described the first entrance is triggered, create a new storage space; Or,
If described the first entrance is triggered and receives the password of user input, confirm that the password of described user's input enters the storage space that described password is corresponding after identical with described user cipher.
5. method according to claim 2, is characterized in that, after receiving the password of user's input, also comprises by the second entrance:
The numeral that compares described user's input is different from the described user cipher of preserving, and the numeral of described user's input is called out as dial number.
6. an Information Security Management System, is characterized in that, is applied to a subscriber equipment, and described Information Security Management System comprises:
Creation module, for creating a storage space by the first entrance, described storage space is for storing information to be protected in described Information Security Management System;
Preserve module, the user cipher arranging for saving as described storage space;
Receiver module, for receiving the password of user's input by the second entrance;
Comparison module, identical with the described user cipher of preserving for comparing the password of described user input, enter described storage space;
Wherein, described the first entrance is different from described the second entrance, and described the second entrance is positioned in the existing application of described subscriber equipment.
7. Information Security Management System according to claim 6, is characterized in that, described user cipher is made up of numeral, and described the second entrance is positioned on the dialing keyboard of described subscriber equipment, and the password of described user's input is numeral.
8. Information Security Management System according to claim 7, is characterized in that, described Information Security Management System also comprises:
Logging modle, after finishing at each dial-up operation, judges whether this dial number is the described user cipher of having preserved; If so, forbid preserving this dial number in nearest message registration; If not, this dial number is kept in nearest message registration as the last conversation number.
9. Information Security Management System according to claim 6, is characterized in that, described creation module also for:
After creating a storage space by the first entrance, if described the first entrance is triggered, create a new storage space; Or, if described the first entrance is triggered and receives the password of user input, confirm that the password of described user's input enters the storage space that described password is corresponding after identical with described user cipher.
10. Information Security Management System according to claim 7, is characterized in that, described comparison module also for:
The numeral that compares described user's input is different from the described user cipher of preserving, and the numeral of described user's input is called out as dial number.
CN201310073569.6A 2013-03-07 2013-03-07 Information security management method and information security management system Pending CN104036203A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310073569.6A CN104036203A (en) 2013-03-07 2013-03-07 Information security management method and information security management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310073569.6A CN104036203A (en) 2013-03-07 2013-03-07 Information security management method and information security management system

Publications (1)

Publication Number Publication Date
CN104036203A true CN104036203A (en) 2014-09-10

Family

ID=51466970

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310073569.6A Pending CN104036203A (en) 2013-03-07 2013-03-07 Information security management method and information security management system

Country Status (1)

Country Link
CN (1) CN104036203A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295387A (en) * 2015-06-05 2017-01-04 北京壹人壹本信息科技有限公司 A kind of safety protecting method and device
CN107395880A (en) * 2017-07-14 2017-11-24 腾讯科技(深圳)有限公司 Method for information display, device and terminal
CN107948971A (en) * 2017-11-16 2018-04-20 北京小米移动软件有限公司 Initial system and attend to anything else inter-system switching method, device, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1477890A (en) * 2003-06-18 2004-02-25 �ż��� Personal information protection method for handset
CN101123767A (en) * 2007-08-02 2008-02-13 深圳市杰普林数码科技有限公司 A child mobile phone and its using method
CN101232534A (en) * 2008-02-25 2008-07-30 宇龙计算机通信科技(深圳)有限公司 Apparatus and method for limiting mobile terminal to store communication record
CN102572068A (en) * 2010-12-20 2012-07-11 康佳集团股份有限公司 Method and system for locking phone book in mobile terminal, and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1477890A (en) * 2003-06-18 2004-02-25 �ż��� Personal information protection method for handset
CN101123767A (en) * 2007-08-02 2008-02-13 深圳市杰普林数码科技有限公司 A child mobile phone and its using method
CN101232534A (en) * 2008-02-25 2008-07-30 宇龙计算机通信科技(深圳)有限公司 Apparatus and method for limiting mobile terminal to store communication record
CN102572068A (en) * 2010-12-20 2012-07-11 康佳集团股份有限公司 Method and system for locking phone book in mobile terminal, and mobile terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295387A (en) * 2015-06-05 2017-01-04 北京壹人壹本信息科技有限公司 A kind of safety protecting method and device
CN107395880A (en) * 2017-07-14 2017-11-24 腾讯科技(深圳)有限公司 Method for information display, device and terminal
CN107948971A (en) * 2017-11-16 2018-04-20 北京小米移动软件有限公司 Initial system and attend to anything else inter-system switching method, device, terminal and storage medium

Similar Documents

Publication Publication Date Title
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN105574437B (en) Method and device for protecting privacy information and electronic equipment
US10771455B2 (en) System and method for enabling secure authentication
EP3240254A1 (en) Dual-system switch based data security processing method and apparatus
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
US20140245457A1 (en) Method and device for initiating privacy mode of data processing apparatus
CN104008313A (en) Protecting method and device of privacy information
WO2014169600A1 (en) Method, device and terminal for processing hidden file folder
WO2014131308A1 (en) Method and device for initiating privacy mode of data processing apparatus
CN103902862A (en) Mobile device management method and device and mobile device
CN103294941A (en) Method for accessing private space and mobile device
US20120204268A1 (en) Method and apparatus for protecting information based on data card
CN105701414A (en) Method and device for multiplexing electronic equipment based on multiple accounts and electronic equipment
CN103034417A (en) Unlocking method for touch screen and terminal equipment
CN106203011A (en) The method and apparatus entering operating system desktop
WO2017008415A1 (en) Apparatus and method for launching mobile applications from a lock screen
CN103019608A (en) Unlocking method of touch screen terminal and touch screen terminal
CN108932086A (en) Display methods, device and the storage medium of application interface
US7975309B2 (en) Systems and methods for securing data in an electronic apparatus
WO2017193645A1 (en) Method and apparatus for displaying data, and terminal
CN104036203A (en) Information security management method and information security management system
JP2019510303A (en) Icon processing method and apparatus for application
CN104966017A (en) Password input protection system and method
CN103678969A (en) Lock releasing method of electronic device, and apparatus thereof
WO2019090702A1 (en) Terminal security protection method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140910

RJ01 Rejection of invention patent application after publication