A kind of mobile phone information safety management method based on more permission modes
Technical field
The present invention relates to a kind of mobile phone information safety management methods based on more permission modes.
Background technology
As smart mobile phone is gradually universal in people live, Android mobile phone is increasingly becoming the mobile phone master that compatriots use
Stream.Now, smart mobile phone is not used for the tool of communications made a phone call and sent short messages in only people, it has independent operation system
System, user can voluntarily install the application program of the third party service providers such as software, game offer, and by this class method come constantly
Function expansion is carried out to it.
And can mobile phone be lent to kith and kin and used using during mobile phone, inevitably encountering at us, and by means of giving
Cheng Zhong, we often worry the privacy on oneself mobile phone, such as message registration, short message by other people maloperation, leakage or evils
Meaning is stolen a glance at.And had old man and child by means of being no lack of in the person of giving, we can worry again they can or can not click it is other may charge
Software or carry out it is certain cause charge operations, such as using mobile data traffic download massive dataflow and cause to pay traffic fee
With reply sends payment verification information, takes the phone for being related to property transaction.
Invention content
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of cellphone information peaces based on more permission modes
Full management method so that mobile phone can rapidly enter the second permission mode, protect the individual privacy of user, effectively improve mobile phone
Information security performance.
The purpose of the present invention is achieved through the following technical solutions:A kind of cellphone information peace based on more permission modes
Full management method, the permission mode include the first user mode and the second permission mode, and the method includes more permission modes
Safety management step:
S1:Under mobile phone black state, power key or volume key are pressed, lights the screen that Activates Phone, mobile phone loads automatically
Preset second permission mode if user is not provided with the second unlocking screen password, performs step S4;If user setting has
Two unlocking screen passwords, then mobile phone show the second unlock interface, jump to step S3;
S2:Under mobile phone black state, Home key is pressed, lights the screen that Activates Phone, mobile phone is not loaded with preset second
Permission mode starts the first user mode, if user is not provided with the first unlocking screen password, mobile phone is directly entered the first use
Family pattern if user setting has the first unlocking screen password, shows corresponding first unlock interface, it is preset that user performs this
First unlocking screen password after password match success, performs step S5;
S3:User performs the second unlocking screen password in the second unlock interface, after password match success, then performs
Step S4;
S4:Mobile phone is directly entered the second permission mode;
S5:Mobile phone is directly entered the first user mode;
S6:Again after screen locking, the first user mode or the second permission mode terminate user, and mobile phone blank screen simultaneously enters standby shape
State.
The first unlocking screen password and the second unlocking screen password are pattern solution lock password or digital solution lock password.
In the step S3, user performs third unlocking screen password in the second unlock interface, then mobile phone shows first
Unlock interface, user perform the preset first unlocking screen password, and after password match success, mobile phone is directly entered the first use
Family pattern.If user is not provided with the first unlocking screen password, user carries out other any touch operations, can be directly entered again
First user mode.
Second permission mode includes guest mode, old man's pattern, child mode and one kind or more in battery saving mode
The combination of kind, the second permission mode can directly conversion be cut from the first user mode, the mode type of the second permission mode
It sets and determines in the first user mode.
The method further includes individual privacy security management step:The individual of user is stored using independent file system
Storage is encrypted to the personal data of user in data.Personal data caused by cell phone system, including voice messaging, call
The personal data of information, short message and photograph album and user's typing mobile phone are automatically saved to the independent file system
In.
When the second permission mode is guest mode, user cannot access the independent file system.
1. under guest mode, mobile phone hides message registration, short message, notification message and photograph album automatically.
2. under guest mode, mobile phone locks the operation desktop of cell phone system automatically, operation desktop cannot be edited or be deleted,
Application icon and small tool on desktop cannot be edited, be deleted or shift position on the table.
3. under guest mode, mobile phone hides new message prompting and its content automatically.
4. under guest mode, the operation desktop of mobile phone is as the operation desktop of the first user mode.
When the second permission mode is old man's pattern or child mode, necessary answer only is distributed on mobile phone operation desktop
With icon and small tool, and mobile phone locks the operation desktop of cell phone system automatically, and operation desktop cannot be edited or be deleted, desktop
On application icon and small tool cannot be edited, deleted or shift position on the table.
File system further include for analyze in call voice and short message content whether the bursting tube containing related keyword
Unit is managed, after security managing unit, which detects, has the related keyword involved in call voice or short message content, mobile phone is sent out
Warning prompt.
The file system further includes the security managing unit for analyzing call voice and short message content, works as bursting tube
When reason unit detects the keyword with matching in keyword database, security managing unit sends out alarm and performs corresponding
Action.
In the second permission mode, after security managing unit, which is detected involved in call voice, the related keyword,
Mobile phone gives a warning prompting, and the call voice is preserved in file system.
After security managing unit, which is detected involved in short message content, the related keyword, mobile phone gives a warning prompting,
And the short message content is isolated, and prevent to perform the operation for replying the short message.
When the second permission mode is battery saving mode, necessary application icon and small is only distributed on mobile phone operation desktop
Tool, and mobile phone operation desktop only has two kinds of colors of black and white.
The beneficial effects of the invention are as follows:
1)The present invention enables to mobile phone that can rapidly enter the second permission mode, protects the individual privacy of user, may be used also
The operation for opening the second permission mode is avoided to be noticed by means of the person of giving and generate embarrassment, the present invention also uses independent file system
Personal data are stored, storage is encrypted to the personal data of user, effectively improves the information security performance of mobile phone.
2)The present invention can it is different light mobile phone screen by way of, into the first user mode and the second permission mould
Formula, and being configured in the first user mode to the second permission mode, and select to confirm the type of the second permission mode for
It is any in guest mode, old man's pattern, child mode and battery saving mode.
3)In the present invention, user also directly can be switched to first by third unlocking screen password from the second unlock interface
Unlock interface.
4)In the file system of the present invention, it is additionally arranged and whether contains for analyzing in call voice, message content, short message content
There is the security managing unit of related keyword, when security managing unit detects the keyword with matching in keyword database
When, security managing unit sends out alarm and performs corresponding action.
Description of the drawings
Fig. 1 is the flow diagram of the mobile phone information safety management method the present invention is based on more permission modes.
Specific embodiment
Technical scheme of the present invention is described in further detail below in conjunction with the accompanying drawings, but protection scope of the present invention is not limited to
It is as described below.
As shown in Figure 1, a kind of mobile phone information safety management method based on more permission modes, the permission mode includes the
One user mode and the second permission mode, second permission mode include guest mode, old man's pattern, child mode and power saving
One or more combinations in pattern, the method includes more permission mode safety management steps:
S1:Under mobile phone black state, power key or volume key are pressed, lights the screen that Activates Phone, mobile phone loads automatically
Preset second permission mode if user is not provided with the second unlocking screen password, performs step S4;If user setting has
Two unlocking screen passwords, then mobile phone show the second unlock interface, jump to step S3;
S2:Under mobile phone black state, Home key is pressed, lights the screen that Activates Phone, mobile phone is not loaded with preset second
Permission mode starts the first user mode, if user is not provided with the first unlocking screen password, mobile phone is directly entered the first use
Family pattern if user setting has the first unlocking screen password, shows corresponding first unlock interface, it is preset that user performs this
First unlocking screen password after password match success, performs step S5;
S3:User performs the second unlocking screen password in the second unlock interface, after password match success, then performs
Step S4, the second unlocking screen password can be to slide unlock, and user only need on the screen slide, you can facilitate solution
Lock;
S4:Mobile phone is directly entered the second permission mode;
S5:Mobile phone is directly entered the first user mode;
S6:Again after screen locking, the first user mode or the second permission mode terminate user, and mobile phone blank screen simultaneously enters standby shape
State.
The first unlocking screen password and the second unlocking screen password are pattern solution lock password or digital solution lock password,
Pattern solution lock password includes sliding unlock and scribing line unlock etc..
In the step S3, user performs third unlocking screen password in the second unlock interface, then mobile phone shows first
Unlock interface, user perform the preset first unlocking screen password, and after password match success, mobile phone is directly entered the first use
Family pattern;If user is not provided with the first unlocking screen password, user carries out other any touch operations, can be directly entered again
First user mode.
Wherein, when the second unlocking screen password is pattern solution lock password or digital solution lock password, third unlocking screen mouth
Enable may be some corresponding pattern solution lock password or digital solution lock password.Third unlocking screen password may be from screen
Bottom/top/left part/right part slides solution lock password to up/down/right/left.
Second permission mode being capable of the directly conversion incision from the first user mode.
The method further includes individual privacy security management step:The individual of user is stored using independent file system
Storage is encrypted to the personal data of user in data;Personal data caused by cell phone system, including voice messaging, call
The personal data of information, short message and photograph album and user's typing mobile phone are automatically saved to the independent file system
In.
The file system further includes the security managing unit for analyzing call voice and short message content, works as bursting tube
When reason unit detects the keyword with matching in keyword database, security managing unit sends out alarm and performs corresponding
Action.The keyword includes word relevant with property transaction or language etc.
Under the guest mode, user cannot access the independent file system.
1. under guest mode, mobile phone hides message registration, short message, notification message and photograph album automatically.
2. under guest mode, mobile phone locks the operation desktop of cell phone system automatically, operation desktop cannot be edited or be deleted,
Application icon and small tool on desktop cannot be edited, be deleted or shift position on the table.
3. under guest mode, mobile phone hides new message prompting and its content automatically.
4. under guest mode, the operation desktop of mobile phone is as the operation desktop of the first user mode.
Under old man's pattern, necessary application icon and small tool, and mobile phone are only distributed on mobile phone operation desktop
The operation desktop of automatic locking cell phone system, operation desktop cannot be edited or be deleted, application icon and small tool on desktop
It cannot be edited, deleted or shift position on the table.
File system further include for analyze in call voice and short message content whether the bursting tube containing related keyword
Unit is managed, after security managing unit, which detects, has the related keyword involved in call voice or short message content, mobile phone is sent out
Warning prompt.
Under the child mode, necessary application icon and small tool, and mobile phone are only distributed on mobile phone operation desktop
The operation desktop of automatic locking cell phone system, operation desktop cannot be edited or be deleted, application icon and small tool on desktop
It cannot be edited, deleted or shift position on the table.
File system further include for analyze in call voice and short message content whether the bursting tube containing related keyword
Unit is managed, after security managing unit, which is detected involved in call voice, the related keyword, mobile phone gives a warning prompting, and
The call voice is preserved in file system.
After security managing unit, which is detected involved in short message content, the related keyword, mobile phone gives a warning prompting,
And the short message content is isolated, which can not be replied and forwarded.
Under the battery saving mode, necessary application icon and small tool, and mobile phone are only distributed on mobile phone operation desktop
Operation desktop only has two kinds of colors of black and white.
In first user mode, the mobile phone of guest mode, old man's pattern, child mode and battery saving mode can be grasped
The distribution for making the application icon and small tool of desktop is configured.