CN104902074B - A kind of mobile phone information safety management method based on more permission modes - Google Patents

A kind of mobile phone information safety management method based on more permission modes Download PDF

Info

Publication number
CN104902074B
CN104902074B CN201510192917.0A CN201510192917A CN104902074B CN 104902074 B CN104902074 B CN 104902074B CN 201510192917 A CN201510192917 A CN 201510192917A CN 104902074 B CN104902074 B CN 104902074B
Authority
CN
China
Prior art keywords
mobile phone
user
mode
permission
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510192917.0A
Other languages
Chinese (zh)
Other versions
CN104902074A (en
Inventor
董滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information and Data Security Solutions Co Ltd
Original Assignee
Sichuan Jinying Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Jinying Technology Co Ltd filed Critical Sichuan Jinying Technology Co Ltd
Priority to CN201510192917.0A priority Critical patent/CN104902074B/en
Publication of CN104902074A publication Critical patent/CN104902074A/en
Application granted granted Critical
Publication of CN104902074B publication Critical patent/CN104902074B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)

Abstract

The invention discloses a kind of mobile phone information safety management methods based on more permission modes, under mobile phone black state, it presses power key or volume key lights the screen that Activates Phone, if user is not provided with the second unlocking screen password, mobile phone is directly entered the second permission mode;If user setting has the second unlocking screen password, mobile phone shows the second unlock interface, and user inputs the second unlocking screen password, then mobile phone is directly entered the second permission mode;Under mobile phone black state, it presses Home key and lights the screen that Activates Phone, if user is not provided with the first unlocking screen password, then mobile phone is directly entered the first user mode, if user setting has the first unlocking screen password, corresponding first unlock interface is shown, user performs the preset first unlocking screen password, after password match success, mobile phone is directly entered the first user mode;Again after screen locking, the first user mode or the second permission mode terminate user, and mobile phone blank screen simultaneously enters standby mode.

Description

A kind of mobile phone information safety management method based on more permission modes
Technical field
The present invention relates to a kind of mobile phone information safety management methods based on more permission modes.
Background technology
As smart mobile phone is gradually universal in people live, Android mobile phone is increasingly becoming the mobile phone master that compatriots use Stream.Now, smart mobile phone is not used for the tool of communications made a phone call and sent short messages in only people, it has independent operation system System, user can voluntarily install the application program of the third party service providers such as software, game offer, and by this class method come constantly Function expansion is carried out to it.
And can mobile phone be lent to kith and kin and used using during mobile phone, inevitably encountering at us, and by means of giving Cheng Zhong, we often worry the privacy on oneself mobile phone, such as message registration, short message by other people maloperation, leakage or evils Meaning is stolen a glance at.And had old man and child by means of being no lack of in the person of giving, we can worry again they can or can not click it is other may charge Software or carry out it is certain cause charge operations, such as using mobile data traffic download massive dataflow and cause to pay traffic fee With reply sends payment verification information, takes the phone for being related to property transaction.
Invention content
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of cellphone information peaces based on more permission modes Full management method so that mobile phone can rapidly enter the second permission mode, protect the individual privacy of user, effectively improve mobile phone Information security performance.
The purpose of the present invention is achieved through the following technical solutions:A kind of cellphone information peace based on more permission modes Full management method, the permission mode include the first user mode and the second permission mode, and the method includes more permission modes Safety management step:
S1:Under mobile phone black state, power key or volume key are pressed, lights the screen that Activates Phone, mobile phone loads automatically Preset second permission mode if user is not provided with the second unlocking screen password, performs step S4;If user setting has Two unlocking screen passwords, then mobile phone show the second unlock interface, jump to step S3;
S2:Under mobile phone black state, Home key is pressed, lights the screen that Activates Phone, mobile phone is not loaded with preset second Permission mode starts the first user mode, if user is not provided with the first unlocking screen password, mobile phone is directly entered the first use Family pattern if user setting has the first unlocking screen password, shows corresponding first unlock interface, it is preset that user performs this First unlocking screen password after password match success, performs step S5;
S3:User performs the second unlocking screen password in the second unlock interface, after password match success, then performs Step S4;
S4:Mobile phone is directly entered the second permission mode;
S5:Mobile phone is directly entered the first user mode;
S6:Again after screen locking, the first user mode or the second permission mode terminate user, and mobile phone blank screen simultaneously enters standby shape State.
The first unlocking screen password and the second unlocking screen password are pattern solution lock password or digital solution lock password.
In the step S3, user performs third unlocking screen password in the second unlock interface, then mobile phone shows first Unlock interface, user perform the preset first unlocking screen password, and after password match success, mobile phone is directly entered the first use Family pattern.If user is not provided with the first unlocking screen password, user carries out other any touch operations, can be directly entered again First user mode.
Second permission mode includes guest mode, old man's pattern, child mode and one kind or more in battery saving mode The combination of kind, the second permission mode can directly conversion be cut from the first user mode, the mode type of the second permission mode It sets and determines in the first user mode.
The method further includes individual privacy security management step:The individual of user is stored using independent file system Storage is encrypted to the personal data of user in data.Personal data caused by cell phone system, including voice messaging, call The personal data of information, short message and photograph album and user's typing mobile phone are automatically saved to the independent file system In.
When the second permission mode is guest mode, user cannot access the independent file system.
1. under guest mode, mobile phone hides message registration, short message, notification message and photograph album automatically.
2. under guest mode, mobile phone locks the operation desktop of cell phone system automatically, operation desktop cannot be edited or be deleted, Application icon and small tool on desktop cannot be edited, be deleted or shift position on the table.
3. under guest mode, mobile phone hides new message prompting and its content automatically.
4. under guest mode, the operation desktop of mobile phone is as the operation desktop of the first user mode.
When the second permission mode is old man's pattern or child mode, necessary answer only is distributed on mobile phone operation desktop With icon and small tool, and mobile phone locks the operation desktop of cell phone system automatically, and operation desktop cannot be edited or be deleted, desktop On application icon and small tool cannot be edited, deleted or shift position on the table.
File system further include for analyze in call voice and short message content whether the bursting tube containing related keyword Unit is managed, after security managing unit, which detects, has the related keyword involved in call voice or short message content, mobile phone is sent out Warning prompt.
The file system further includes the security managing unit for analyzing call voice and short message content, works as bursting tube When reason unit detects the keyword with matching in keyword database, security managing unit sends out alarm and performs corresponding Action.
In the second permission mode, after security managing unit, which is detected involved in call voice, the related keyword, Mobile phone gives a warning prompting, and the call voice is preserved in file system.
After security managing unit, which is detected involved in short message content, the related keyword, mobile phone gives a warning prompting, And the short message content is isolated, and prevent to perform the operation for replying the short message.
When the second permission mode is battery saving mode, necessary application icon and small is only distributed on mobile phone operation desktop Tool, and mobile phone operation desktop only has two kinds of colors of black and white.
The beneficial effects of the invention are as follows:
1)The present invention enables to mobile phone that can rapidly enter the second permission mode, protects the individual privacy of user, may be used also The operation for opening the second permission mode is avoided to be noticed by means of the person of giving and generate embarrassment, the present invention also uses independent file system Personal data are stored, storage is encrypted to the personal data of user, effectively improves the information security performance of mobile phone.
2)The present invention can it is different light mobile phone screen by way of, into the first user mode and the second permission mould Formula, and being configured in the first user mode to the second permission mode, and select to confirm the type of the second permission mode for It is any in guest mode, old man's pattern, child mode and battery saving mode.
3)In the present invention, user also directly can be switched to first by third unlocking screen password from the second unlock interface Unlock interface.
4)In the file system of the present invention, it is additionally arranged and whether contains for analyzing in call voice, message content, short message content There is the security managing unit of related keyword, when security managing unit detects the keyword with matching in keyword database When, security managing unit sends out alarm and performs corresponding action.
Description of the drawings
Fig. 1 is the flow diagram of the mobile phone information safety management method the present invention is based on more permission modes.
Specific embodiment
Technical scheme of the present invention is described in further detail below in conjunction with the accompanying drawings, but protection scope of the present invention is not limited to It is as described below.
As shown in Figure 1, a kind of mobile phone information safety management method based on more permission modes, the permission mode includes the One user mode and the second permission mode, second permission mode include guest mode, old man's pattern, child mode and power saving One or more combinations in pattern, the method includes more permission mode safety management steps:
S1:Under mobile phone black state, power key or volume key are pressed, lights the screen that Activates Phone, mobile phone loads automatically Preset second permission mode if user is not provided with the second unlocking screen password, performs step S4;If user setting has Two unlocking screen passwords, then mobile phone show the second unlock interface, jump to step S3;
S2:Under mobile phone black state, Home key is pressed, lights the screen that Activates Phone, mobile phone is not loaded with preset second Permission mode starts the first user mode, if user is not provided with the first unlocking screen password, mobile phone is directly entered the first use Family pattern if user setting has the first unlocking screen password, shows corresponding first unlock interface, it is preset that user performs this First unlocking screen password after password match success, performs step S5;
S3:User performs the second unlocking screen password in the second unlock interface, after password match success, then performs Step S4, the second unlocking screen password can be to slide unlock, and user only need on the screen slide, you can facilitate solution Lock;
S4:Mobile phone is directly entered the second permission mode;
S5:Mobile phone is directly entered the first user mode;
S6:Again after screen locking, the first user mode or the second permission mode terminate user, and mobile phone blank screen simultaneously enters standby shape State.
The first unlocking screen password and the second unlocking screen password are pattern solution lock password or digital solution lock password, Pattern solution lock password includes sliding unlock and scribing line unlock etc..
In the step S3, user performs third unlocking screen password in the second unlock interface, then mobile phone shows first Unlock interface, user perform the preset first unlocking screen password, and after password match success, mobile phone is directly entered the first use Family pattern;If user is not provided with the first unlocking screen password, user carries out other any touch operations, can be directly entered again First user mode.
Wherein, when the second unlocking screen password is pattern solution lock password or digital solution lock password, third unlocking screen mouth Enable may be some corresponding pattern solution lock password or digital solution lock password.Third unlocking screen password may be from screen Bottom/top/left part/right part slides solution lock password to up/down/right/left.
Second permission mode being capable of the directly conversion incision from the first user mode.
The method further includes individual privacy security management step:The individual of user is stored using independent file system Storage is encrypted to the personal data of user in data;Personal data caused by cell phone system, including voice messaging, call The personal data of information, short message and photograph album and user's typing mobile phone are automatically saved to the independent file system In.
The file system further includes the security managing unit for analyzing call voice and short message content, works as bursting tube When reason unit detects the keyword with matching in keyword database, security managing unit sends out alarm and performs corresponding Action.The keyword includes word relevant with property transaction or language etc.
Under the guest mode, user cannot access the independent file system.
1. under guest mode, mobile phone hides message registration, short message, notification message and photograph album automatically.
2. under guest mode, mobile phone locks the operation desktop of cell phone system automatically, operation desktop cannot be edited or be deleted, Application icon and small tool on desktop cannot be edited, be deleted or shift position on the table.
3. under guest mode, mobile phone hides new message prompting and its content automatically.
4. under guest mode, the operation desktop of mobile phone is as the operation desktop of the first user mode.
Under old man's pattern, necessary application icon and small tool, and mobile phone are only distributed on mobile phone operation desktop The operation desktop of automatic locking cell phone system, operation desktop cannot be edited or be deleted, application icon and small tool on desktop It cannot be edited, deleted or shift position on the table.
File system further include for analyze in call voice and short message content whether the bursting tube containing related keyword Unit is managed, after security managing unit, which detects, has the related keyword involved in call voice or short message content, mobile phone is sent out Warning prompt.
Under the child mode, necessary application icon and small tool, and mobile phone are only distributed on mobile phone operation desktop The operation desktop of automatic locking cell phone system, operation desktop cannot be edited or be deleted, application icon and small tool on desktop It cannot be edited, deleted or shift position on the table.
File system further include for analyze in call voice and short message content whether the bursting tube containing related keyword Unit is managed, after security managing unit, which is detected involved in call voice, the related keyword, mobile phone gives a warning prompting, and The call voice is preserved in file system.
After security managing unit, which is detected involved in short message content, the related keyword, mobile phone gives a warning prompting, And the short message content is isolated, which can not be replied and forwarded.
Under the battery saving mode, necessary application icon and small tool, and mobile phone are only distributed on mobile phone operation desktop Operation desktop only has two kinds of colors of black and white.
In first user mode, the mobile phone of guest mode, old man's pattern, child mode and battery saving mode can be grasped The distribution for making the application icon and small tool of desktop is configured.

Claims (9)

1. a kind of mobile phone information safety management method based on more permission modes, the permission mode include the first user mode and Second permission mode, it is characterised in that:The method includes more permission mode safety management steps:
S1:Under mobile phone black state, power key or volume key are pressed, lights the screen that Activates Phone, loading is default automatically for mobile phone The second permission mode, if user is not provided with the second unlocking screen password, perform step S4;If user setting has the second screen Curtain solves lock password, then mobile phone shows the second unlock interface, jumps to step S3;
S2:Under mobile phone black state, Home key is pressed, lights the screen that Activates Phone, mobile phone is not loaded with preset second permission Pattern starts the first user mode, if user is not provided with the first unlocking screen password, mobile phone is directly entered first user's mould Formula if user setting has the first unlocking screen password, shows corresponding first unlock interface, user perform this preset first Unlocking screen password after password match success, performs step S5;
S3:User performs the second unlocking screen password in the second unlock interface, after password match success, then performs step S4;
S4:Mobile phone is directly entered the second permission mode;
S5:Mobile phone is directly entered the first user mode;
S6:Again after screen locking, the first user mode or the second permission mode terminate user, and mobile phone blank screen simultaneously enters standby mode;
The method further includes individual privacy security management step:A number of user is stored using independent file system According to storage is encrypted to the personal data of user;Personal data caused by cell phone system, including voice messaging, call letter Breath, short message and the personal data of photograph album and user's typing mobile phone are automatically saved in the independent file system.
2. a kind of mobile phone information safety management method based on more permission modes according to claim 1, it is characterised in that: The first unlocking screen password and the second unlocking screen password are pattern solution lock password or digital solution lock password.
3. a kind of mobile phone information safety management method based on more permission modes according to claim 1, it is characterised in that: In the step S3, user performs third unlocking screen password in the second unlock interface, then mobile phone shows the first unlock circle Face, user perform the preset first unlocking screen password, and after password match success, mobile phone is directly entered first user's mould Formula;If user is not provided with the first unlocking screen password, user carries out other any touch operations, can be directly entered first again User mode.
4. a kind of mobile phone information safety management method based on more permission modes according to claim 1, it is characterised in that: Second permission mode includes one or more combinations in guest mode, old man's pattern, child mode and battery saving mode, Second permission mode can directly conversion be cut from the first user mode, and the mode type of the second permission mode is in the first user It sets and determines in pattern.
5. a kind of mobile phone information safety management method based on more permission modes according to claim 1, it is characterised in that: When the second permission mode is guest mode, user cannot access the independent file system;
1. under guest mode, mobile phone hides message registration, short message, notification message and photograph album automatically;
2. under guest mode, mobile phone locks the operation desktop of cell phone system automatically, operation desktop cannot be edited or be deleted, desktop On application icon and small tool cannot be edited, deleted or shift position on the table;
3. under guest mode, mobile phone hides new message prompting and its content automatically;
4. under guest mode, the operation desktop of mobile phone is as the operation desktop of the first user mode.
6. a kind of mobile phone information safety management method based on more permission modes according to claim 1, it is characterised in that: When the second permission mode is old man's pattern or child mode, be only distributed on mobile phone operation desktop necessary application icon and Small tool, and mobile phone locks the operation desktop of cell phone system automatically, operation desktop cannot be edited or be deleted, the application on desktop Icon and small tool cannot be edited, be deleted or shift position on the table;File system further includes to analyze call voice With in short message content whether the security managing unit containing related keyword, when security managing unit detects call voice or short After having the related keyword involved in letter content, mobile phone gives a warning prompting.
7. a kind of mobile phone information safety management method based on more permission modes according to claim 1, it is characterised in that: The file system further includes the security managing unit for analyzing call voice and short message content, when security managing unit is examined When measuring the keyword with matching in keyword database, security managing unit sends out alarm and performs corresponding action.
8. a kind of mobile phone information safety management method based on more permission modes according to claim 7, it is characterised in that: In the second permission mode, after security managing unit, which is detected involved in call voice, the related keyword, mobile phone is sent out Warning prompt, and the call voice is preserved in file system;
After security managing unit, which is detected involved in short message content, the related keyword, mobile phone gives a warning prompting, and every From the short message content, and prevent to perform the operation for replying the short message.
9. a kind of mobile phone information safety management method based on more permission modes according to claim 1, it is characterised in that: When the second permission mode is battery saving mode, necessary application icon and small tool is only distributed on mobile phone operation desktop, and Mobile phone operation desktop only has two kinds of colors of black and white.
CN201510192917.0A 2015-04-22 2015-04-22 A kind of mobile phone information safety management method based on more permission modes Active CN104902074B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510192917.0A CN104902074B (en) 2015-04-22 2015-04-22 A kind of mobile phone information safety management method based on more permission modes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510192917.0A CN104902074B (en) 2015-04-22 2015-04-22 A kind of mobile phone information safety management method based on more permission modes

Publications (2)

Publication Number Publication Date
CN104902074A CN104902074A (en) 2015-09-09
CN104902074B true CN104902074B (en) 2018-06-19

Family

ID=54034465

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510192917.0A Active CN104902074B (en) 2015-04-22 2015-04-22 A kind of mobile phone information safety management method based on more permission modes

Country Status (1)

Country Link
CN (1) CN104902074B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105677214A (en) * 2015-12-30 2016-06-15 小米科技有限责任公司 Application management method and apparatus
CN105681564A (en) * 2016-01-25 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Message reminding method and device
CN105868648B (en) * 2016-03-28 2019-06-04 珠海格力电器股份有限公司 Mobile terminal and data processing method and device for mobile terminal guest mode
CN106055941A (en) * 2016-05-24 2016-10-26 珠海市魅族科技有限公司 Terminal method and apparatus
CN109460655B (en) * 2018-09-20 2021-08-03 中兴通讯股份有限公司 Electronic device control method and device, electronic device and storage medium
CN109740000B (en) * 2018-12-25 2023-11-21 维沃移动通信有限公司 Multimedia file processing method and mobile terminal
CN110020265A (en) * 2019-02-25 2019-07-16 贵州格物数据有限公司 A kind of the short message URL analysis system and method for big data based on memory
CN113378145B (en) * 2021-08-11 2021-12-07 深圳市美迪声科技有限公司 Unlocking method and system of electronic product

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1710974A (en) * 2005-05-20 2005-12-21 上海贝豪通讯电子有限公司 Mobile communication terminal apparatus capable of protecting customer information and method thereof
CN102375651A (en) * 2010-08-13 2012-03-14 Tcl集团股份有限公司 Method for unlocking portable electronic equipment
CN102547709A (en) * 2010-12-23 2012-07-04 康佳集团股份有限公司 Method and mobile phone for identifying fraud short messages
CN103577732A (en) * 2012-07-24 2014-02-12 联想(北京)有限公司 Information processing method and device and electronic device
CN103793636B (en) * 2012-11-01 2017-12-22 华为技术有限公司 A kind of method of equipment and protection equipment privacy
US9195388B2 (en) * 2013-03-15 2015-11-24 Apple Inc. Specifying applications to share in a shared access mode
CN104184874A (en) * 2013-05-20 2014-12-03 边策 Method for switching mobile phone modes based on multiple unlocking conditions, and mobile phone thereof
CN104301539A (en) * 2014-10-21 2015-01-21 四川盟宝实业有限公司 Information protecting method

Also Published As

Publication number Publication date
CN104902074A (en) 2015-09-09

Similar Documents

Publication Publication Date Title
CN104902074B (en) A kind of mobile phone information safety management method based on more permission modes
CN104967748B (en) A kind of method of safety operation application service
CN101034988B (en) Network login authentication protection device and its using method
US20130335193A1 (en) Electronic wireless lock
CN102413221B (en) Method for protecting privacy information and mobile terminal
CN104537291A (en) Screen interface unlocking method and screen interface unlocking device
CN103559455A (en) Android device personal information protection method based on user identification
CN107864144A (en) Obtain method and device, computer installation and the storage medium of dynamic password
CN105025165A (en) Interface unlocking method and system corresponding to multiple passwords
CN101415075A (en) Digital camera with fingerprint identification function and use method thereof
CN205121680U (en) Bluetooth lock system based on intelligent terminal
CN101247579A (en) Method for locking mobile communication terminal through Bluetooth earphone
CN1997188A (en) A recognition method of the user identity and its handset
US20140099923A1 (en) Subscriber device unlock
CN103324874A (en) Verification method and electronic device
CN103581435A (en) Interaction method for entering visitor mode in OS of Android smartphone
CN105809007A (en) Privacy protection method and device
CN106126994A (en) The user management method of a kind of mobile terminal and system
CN104574616A (en) Intelligent electronic door lock control method and control device
WO2012092733A1 (en) Locking network terminal, network side device and unlocking method thereof
CN106127005A (en) The user management method of a kind of mobile terminal and system
CN204375038U (en) A kind of intelligent electronic lock control device
CN101895829A (en) Method and system for retrieving FLASH data from mobile telephone, and mobile telephone
CN106453057B (en) A kind of method and terminal for preventing short message to be stolen
CN108509783B (en) Intelligent terminal application program management system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20180522

Address after: 610000 No. 1, 17 floor, 1 1 Tianfu street, Chengdu high tech Zone, Sichuan

Applicant after: Sichuan Jinying Technology Co., Ltd.

Address before: 610000 199 Sichuan Qingyang Industrial Development Zone, Chengdu, Qingyang.

Applicant before: Moral Science and Technology Ltd. of Sichuan Holley

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190507

Address after: Room 1, Room 2, Lane 15, 1412, Yunduan Road, Nicheng, Pudong New Area, Shanghai, 20106

Patentee after: Shanghai view security information technology Limited by Share Ltd

Address before: 610000 No. 1, 17 floor, 1 1 Tianfu street, Chengdu high tech Zone, Sichuan

Patentee before: Sichuan Jinying Technology Co., Ltd.

TR01 Transfer of patent right