CN104915578A - Method and device for improving operation file safety through hidden modes - Google Patents

Method and device for improving operation file safety through hidden modes Download PDF

Info

Publication number
CN104915578A
CN104915578A CN201510280458.1A CN201510280458A CN104915578A CN 104915578 A CN104915578 A CN 104915578A CN 201510280458 A CN201510280458 A CN 201510280458A CN 104915578 A CN104915578 A CN 104915578A
Authority
CN
China
Prior art keywords
file
stealth mode
mode
mobile terminal
under described
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510280458.1A
Other languages
Chinese (zh)
Inventor
陈睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201510280458.1A priority Critical patent/CN104915578A/en
Publication of CN104915578A publication Critical patent/CN104915578A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1066Hiding content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a method and device for improving operation file safety through hidden modes, and belongs to the technical field of communication. The method includes the steps that the first hidden mode is built in a mobile terminal and is started; file operation is performed in the first hidden mode, and after the file operation is finished, a file is stored under the first hidden mode. Different hidden modes correspond to different file visibilities, and deletion, modification and copy of the hidden modes of the file are disclosed so that the file can be encrypted and hidden, and accordingly convenience, efficiency and safety of the file operation are improved.

Description

A kind of stealth mode that utilizes is to improve method and the device of operation file safety
Technical field
The present invention relates to communication technical field, particularly relate to a kind of stealth mode that utilizes to improve method and the device of operation file safety.
Background technology
Along with the development of mobile terminal, file encryption has become the requisite security function of terminal with hiding, although this function can bring guarantee to user information safety, but still bring certain negative effect to the experience of user, as some files of company are put into mobile phone by user, when user fears that mobile phone is lost, these files can be revealed, so user is file encryption and hides, now user must select each file, then encrypt separately and hide, and when user wishes to increase some files, must again also encrypt and hide by filesselected again, the obvious like this experience to user exerts a certain influence, when certain file will want the used time in different occasion, user or all preserve portion in the encryption and hidden file of several different occasion, when seeing certain occasion file, open the file that this occasion is relevant.(as user has taken several photos, these photos are still not relevant with work again with when living relevant, if user wants check that the encryption of work and hidden file also check these photos, and these photos are kept in life, then user again must to decipher life relevant; If user has in the relevant encryption of live and work and hidden file, there is waste storage space like this).
Summary of the invention
Fundamental purpose of the present invention is to propose a kind of stealth mode that utilizes to improve method and the device of operation file safety, by the corresponding different file observability of different stealth modes, thus improves the convenience of file operation, high efficiency and security.
The technical scheme that the present invention solves the problems of the technologies described above is as follows:
According to an aspect of the present invention, a kind of stealth mode that utilizes provided, to improve the method for operation file safety, comprising:
Set up the first stealth mode at mobile terminal, and open described first stealth mode;
File operation is carried out, after described file operation completes, under described file is kept at described first stealth mode under described first stealth mode.
Preferably, describedly set up the first stealth mode at mobile terminal, and after opening described first stealth mode, under described first stealth mode, carry out file operation, after described file operation completes, also comprise before described file being kept under described first stealth mode:
For described first stealth mode arranges password.
Preferably, describedly under described first stealth mode, carry out file operation, after described file operation completes, also comprise after described file being kept under described first stealth mode:
The second stealth mode is set up, by the file copy under described first stealth mode under described second stealth mode at mobile terminal.
Preferably, describedly under described first stealth mode, carry out file operation, after described file operation completes, also comprise after described file being kept under described first stealth mode:
Deletion action is carried out to the file under described first stealth mode; Or,
To the file under described first stealth mode modify stealth mode operation.
Preferably, describedly set up the second stealth mode at mobile terminal, also comprise after under the file copy under described first stealth mode to described second stealth mode:
Described file is operated, after described file operation completes, under described file is kept at described first stealth mode and described second stealth mode simultaneously.
According to another aspect of the present invention, provide a kind of stealth mode that utilizes to improve the device of operation file safety, comprising:
First sets up module, for setting up the first stealth mode at mobile terminal, and opens described first stealth mode;
First preserves module, carries out file operation, after described file operation completes, under described file is kept at described first stealth mode under described first stealth mode.
Preferably, also comprise:
Password arranges module, for arranging password for described first stealth mode.
Preferably, also comprise:
Second sets up module, for setting up the second stealth mode at mobile terminal, by the file copy under described first stealth mode under described second stealth mode.
Preferably, also comprise:
Deletion action module, for carrying out deletion action to the file under described first stealth mode; Or,
Retouching operation module, to the file under described first stealth mode modify stealth mode operation.
Preferably, also comprise:
Second preserves module, for operating described file, after described file operation completes, under described file is kept at described first stealth mode and described second stealth mode simultaneously.
The invention provides a kind of stealth mode that utilizes to improve method and the device of operation file safety, the method comprises: set up the first stealth mode at mobile terminal, and opens described first stealth mode; File operation is carried out under described first stealth mode, after described file operation completes, under described file is kept at described first stealth mode, the present invention is by the corresponding different file observability of different stealth modes, and propose the stealth mode of file deletion, revise and copy and file is encrypted and hides, thus improve the convenience of file operation, high efficiency and security.
Accompanying drawing explanation
Fig. 1 is the hardware configuration schematic diagram of the mobile terminal realizing each embodiment of the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is that a kind of stealth mode that utilizes of embodiments of the invention one is to improve the process flow diagram of the method for operation file safety;
Fig. 4 is that a kind of stealth mode that utilizes of embodiments of the invention two is to improve the process flow diagram of the method for operation file safety;
Fig. 5 is that a kind of stealth mode that utilizes of embodiments of the invention three is to improve the process flow diagram of the method for operation file safety;
Fig. 6 is that a kind of stealth mode that utilizes of embodiments of the invention four is to improve the exemplary block diagram of the device of operation file safety;
Fig. 7 is that a kind of stealth mode that utilizes of embodiments of the invention five is to improve the exemplary block diagram of the device of operation file safety;
Fig. 8 is that a kind of stealth mode that utilizes of embodiments of the invention six is to improve the exemplary block diagram of the device of operation file safety.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further with reference to accompanying drawing.
Embodiment
Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.Mobile terminal can be implemented in a variety of manners.Such as, the terminal described in the present invention can comprise the such as mobile terminal of mobile phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP (portable media player), guider etc. and the fixed terminal of such as digital TV, desk-top computer etc.Below, suppose that terminal is mobile terminal.But it will be appreciated by those skilled in the art that except the element except being used in particular for mobile object, structure according to the embodiment of the present invention also can be applied to the terminal of fixed type.
Fig. 1 is the hardware configuration signal of the mobile terminal realizing each embodiment of the present invention.
Mobile terminal 100 can comprise wireless communication unit 110, A/V (audio/video) input block 120, user input unit 130, sensing cell 140, output unit 150, storer 160, interface unit 170, controller 180 and power supply unit 190 etc.Fig. 1 shows the mobile terminal with various assembly, it should be understood that, does not require to implement all assemblies illustrated.Can alternatively implement more or less assembly.Will be discussed in more detail below the element of mobile terminal.
Wireless communication unit 110 generally includes one or more assembly, and it allows the wireless communication between mobile terminal 100 and wireless communication system or network.Such as, wireless communication unit can comprise at least one in broadcast reception module 111, mobile communication module 112, wireless Internet module 113, short range communication module 114 and positional information module 115.
Broadcast reception module 111 via broadcast channel from external broadcasting management server receiving broadcast signal and/or broadcast related information.Broadcast channel can comprise satellite channel and/or terrestrial channel.Broadcast management server can be generate and send the server of broadcast singal and/or broadcast related information or the broadcast singal generated before receiving and/or broadcast related information and send it to the server of terminal.Broadcast singal can comprise TV broadcast singal, radio signals, data broadcasting signal etc.And broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast related information also can provide via mobile communications network, and in this case, broadcast related information can be received by mobile communication module 112.Broadcast singal can exist in a variety of manners, such as, it can exist with the form of the electronic service guidebooks (ESG) of the electronic program guides of DMB (DMB) (EPG), digital video broadcast-handheld (DVB-H) etc.Broadcast reception module 111 can by using the broadcast of various types of broadcast system Received signal strength.Especially, broadcast reception module 111 can by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video broadcasting-hand-held (DVB-H), forward link media (MediaFLO @) Radio Data System, received terrestrial digital broadcasting integrated service (ISDB-T) etc. digit broadcasting system receive digital broadcasting.Broadcast reception module 111 can be constructed to be applicable to providing the various broadcast system of broadcast singal and above-mentioned digit broadcasting system.The broadcast singal received via broadcast reception module 111 and/or broadcast related information can be stored in storer 160 (or storage medium of other type).
Radio signal is sent at least one in base station (such as, access point, Node B etc.), exterior terminal and server and/or receives radio signals from it by mobile communication module 112.Various types of data that such radio signal can comprise voice call signal, video calling signal or send according to text and/or Multimedia Message and/or receive.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.This module can be inner or be externally couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by this module can comprise WLAN (WLAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave access), HSDPA (high-speed downlink packet access) etc.
Short range communication module 114 is the modules for supporting junction service.Some examples of short-range communication technology comprise bluetooth tM, radio-frequency (RF) identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), purple honeybee tMetc..
Positional information module 115 is the modules of positional information for checking or obtain mobile terminal.The typical case of positional information module is GPS (GPS).According to current technology, GPS module 115 calculates from the range information of three or more satellite and correct time information and for the Information application triangulation calculated, thus calculates three-dimensional current location information according to longitude, latitude and pin-point accuracy.Current, the method for calculating position and temporal information uses three satellites and by using the error of the position that goes out of an other satellite correction calculation and temporal information.In addition, GPS module 115 can carry out computing velocity information by Continuous plus current location information in real time.
A/V input block 120 is for audio reception or vision signal.A/V input block 120 can comprise camera 121 and microphone 1220, and the view data of camera 121 to the static images obtained by image capture apparatus in Video Capture pattern or image capture mode or video processes.Picture frame after process may be displayed on display module 151.Picture frame after camera 121 processes can be stored in storer 160 (or other storage medium) or via wireless communication unit 110 and send, and can provide two or more cameras 1210 according to the structure of mobile terminal.Such acoustic processing can via microphones sound (voice data) in telephone calling model, logging mode, speech recognition mode etc. operational mode, and can be voice data by microphone 122.Audio frequency (voice) data after process can be converted to the formatted output that can be sent to mobile communication base station via mobile communication module 112 when telephone calling model.Microphone 122 can be implemented various types of noise and eliminate (or suppress) algorithm and receiving and sending to eliminate (or suppression) noise or interference that produce in the process of sound signal.
User input unit 130 can generate key input data to control the various operations of mobile terminal according to the order of user's input.User input unit 130 allows user to input various types of information, and keyboard, the young sheet of pot, touch pad (such as, detecting the touch-sensitive assembly of the change of the resistance, pressure, electric capacity etc. that cause owing to being touched), roller, rocking bar etc. can be comprised.Especially, when touch pad is superimposed upon on display module 151 as a layer, touch-screen can be formed.
Sensing cell 140 detects the current state of mobile terminal 100, (such as, mobile terminal 100 open or close state), the position of mobile terminal 100, user for mobile terminal 100 contact (namely, touch input) presence or absence, the orientation of mobile terminal 100, the acceleration or deceleration of mobile terminal 100 move and direction etc., and generate order or the signal of the operation for controlling mobile terminal 100.Such as, when mobile terminal 100 is embodied as sliding-type mobile phone, sensing cell 140 can sense this sliding-type phone and open or close.In addition, whether whether sensing cell 140 can detect power supply unit 190 provides electric power or interface unit 170 to couple with external device (ED).Sensing cell 140 can comprise proximity transducer 1410 and will be described this in conjunction with touch-screen below.
Interface unit 170 is used as at least one external device (ED) and is connected the interface that can pass through with mobile terminal 100.Such as, external device (ED) can comprise wired or wireless head-band earphone port, external power source (or battery charger) port, wired or wireless FPDP, memory card port, for connecting the port, audio frequency I/O (I/O) port, video i/o port, ear port etc. of the device with identification module.Identification module can be that storage uses the various information of mobile terminal 100 for authentication of users and can comprise subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) etc.In addition, the device (hereinafter referred to " recognition device ") with identification module can take the form of smart card, and therefore, recognition device can be connected with mobile terminal 100 via port or other coupling arrangement.Interface unit 170 may be used for receive from external device (ED) input (such as, data message, electric power etc.) and the input received be transferred to the one or more element in mobile terminal 100 or may be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 100 is connected with external base, interface unit 170 can be used as to allow by it electric power to be provided to the path of mobile terminal 100 from base or can be used as the path that allows to be transferred to mobile terminal by it from the various command signals of base input.The various command signal inputted from base or electric power can be used as and identify whether mobile terminal is arranged on the signal base exactly.Output unit 150 is constructed to provide output signal (such as, sound signal, vision signal, alarm signal, vibration signal etc.) with vision, audio frequency and/or tactile manner.Output unit 150 can comprise display module 151, dio Output Modules 152, alarm modules 153 etc.
Display module 151 may be displayed on the information of process in mobile terminal 100.Such as, when mobile terminal 100 is in telephone calling model, display module 151 can show with call or other communicate (such as, text messaging, multimedia file are downloaded etc.) be correlated with user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling pattern or image capture mode, display module 151 can the image of display capture and/or the image of reception, UI or GUI that video or image and correlation function are shown etc.
Meanwhile, when display module 151 and touch pad as a layer superposed on one another to form touch-screen time, display module 151 can be used as input media and output unit.Display module 151 can comprise at least one in liquid crystal display (LCD), thin film transistor (TFT) LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc.Some in these displays can be constructed to transparence and watch from outside to allow user, and this can be called transparent display, and typical transparent display can be such as TOLED (transparent organic light emitting diode) display etc.According to the specific embodiment wanted, mobile terminal 100 can comprise two or more display modules (or other display device), such as, mobile terminal can comprise outside display module (not shown) and inner display module (not shown).Touch-screen can be used for detecting touch input pressure and touch input position and touch and inputs area.
When dio Output Modules 152 can be under the isotypes such as call signal receiving mode, call mode, logging mode, speech recognition mode, broadcast reception mode at mobile terminal, voice data convert audio signals that is that wireless communication unit 110 is received or that store in storer 160 and exporting as sound.And dio Output Modules 152 can provide the audio frequency relevant to the specific function that mobile terminal 100 performs to export (such as, call signal receives sound, message sink sound etc.).Dio Output Modules 152 can comprise loudspeaker, hummer etc.
Alarm modules 153 can provide and export that event informed to mobile terminal 100.Typical event can comprise calling reception, message sink, key signals input, touch input etc.Except audio or video exports, alarm modules 153 can provide in a different manner and export with the generation of notification event.Such as, alarm modules 153 can provide output with the form of vibration, when receive calling, message or some other enter communication (incomingcommunication) time, alarm modules 153 can provide sense of touch to export (that is, vibrating) to notify to user.By providing such sense of touch to export, even if when the mobile phone of user is in the pocket of user, user also can identify the generation of various event.Alarm modules 153 also can provide the output of the generation of notification event via display module 151 or dio Output Modules 152.
Storer 160 software program that can store process and the control operation performed by controller 180 etc., or temporarily can store oneself through exporting the data (such as, telephone directory, message, still image, video etc.) that maybe will export.And, storer 160 can store about when touch be applied to touch-screen time the vibration of various modes that exports and the data of sound signal.
Storer 160 can comprise the storage medium of at least one type, described storage medium comprises flash memory, hard disk, multimedia card, card-type storer (such as, SD or DX storer etc.), random access storage device (RAM), static random-access memory (SRAM), ROM (read-only memory) (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc.And mobile terminal 100 can be connected the memory function of execute store 160 network storage device with by network cooperates.
Controller 180 controls the overall operation of mobile terminal usually.Such as, controller 180 performs the control relevant to voice call, data communication, video calling etc. and process.In addition, controller 180 can comprise the multi-media module 1810 for reproducing (or playback) multi-medium data, and multi-media module 1810 can be configured in controller 180, or can be configured to be separated with controller 180.Controller 180 can pattern recognition process, is identified as character or image so that input is drawn in the handwriting input performed on the touchscreen or picture.
Power supply unit 190 receives external power or internal power and provides each element of operation and the suitable electric power needed for assembly under the control of controller 180.
Various embodiment described herein can to use such as computer software, the computer-readable medium of hardware or its any combination implements.For hardware implementation, embodiment described herein can by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), processor, controller, microcontroller, microprocessor, being designed at least one performed in the electronic unit of function described herein and implementing, in some cases, such embodiment can be implemented in controller 180.For implement software, the embodiment of such as process or function can be implemented with allowing the independent software module performing at least one function or operation.Software code can be implemented by the software application (or program) write with any suitable programming language, and software code can be stored in storer 160 and to be performed by controller 180.
So far, oneself is through the mobile terminal according to its functional description.Below, for the sake of brevity, by the slide type mobile terminal that describes in various types of mobile terminals of such as folded form, board-type, oscillating-type, slide type mobile terminal etc. exemplarily.Therefore, the present invention can be applied to the mobile terminal of any type, and is not limited to slide type mobile terminal.
Mobile terminal 100 as shown in Figure 1 can be constructed to utilize and send the such as wired and wireless communication system of data via frame or grouping and satellite-based communication system operates.
Describe wherein according to the communication system that mobile terminal of the present invention can operate referring now to Fig. 2.
Such communication system can use different air interfaces and/or Physical layer.Such as, the air interface used by communication system comprises such as frequency division multiple access (FDMA), time division multiple access (TDMA) (TDMA), CDMA (CDMA) and universal mobile telecommunications system (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc.As non-limiting example, description below relates to cdma communication system, but such instruction is equally applicable to the system of other type.
With reference to figure 2, cdma wireless communication system can comprise multiple mobile terminal 100, multiple base station (BS) 270, base station controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is constructed to form interface with Public Switched Telephony Network (PSTN) 290.MSC280 is also constructed to form interface with the BSC275 that can be couple to base station 270 via back haul link.Back haul link can construct according to any one in some interfaces that oneself knows, described interface comprises such as E1/T1, ATM, IP, PPP, frame relay, HDSL, ADSL or xDSL.Will be appreciated that system as shown in Figure 2 can comprise multiple BSC2750.
Each BS270 can serve one or more subregion (or region), by multidirectional antenna or point to specific direction each subregion of antenna cover radially away from BS270.Or each subregion can by two or more antenna covers for diversity reception.Each BS270 can be constructed to support multiple parallel compensate, and each parallel compensate has specific frequency spectrum (such as, 1.25MHz, 5MHz etc.).
Subregion can be called as CDMA Channel with intersecting of parallel compensate.BS270 also can be called as base station transceiver subsystem (BTS) or other equivalent terms.Under these circumstances, term " base station " may be used for broadly representing single BSC275 and at least one BS270.Base station also can be called as " cellular station ".Or each subregion of particular B S270 can be called as multiple cellular station.
As shown in Figure 2, broadcast singal is sent to the mobile terminal 100 at operate within systems by broadcsting transmitter (BT) 295.Broadcast reception module 111 as shown in Figure 1 is arranged on mobile terminal 100 and sentences the broadcast singal receiving and sent by BT295.In fig. 2, several GPS (GPS) satellite 300 is shown.Satellite 300 helps at least one in the multiple mobile terminal 100 in location.
In fig. 2, depict multiple satellite 300, but understand, the satellite of any number can be utilized to obtain useful locating information.GPS module 115 as shown in Figure 1 is constructed to coordinate to obtain the locating information wanted with satellite 300 usually.Substitute GPS tracking technique or outside GPS tracking technique, can use can other technology of position of tracking mobile terminal.In addition, at least one gps satellite 300 optionally or extraly can process satellite dmb transmission.
As a typical operation of wireless communication system, BS270 receives the reverse link signal from various mobile terminal 100.Mobile terminal 100 participates in call usually, information receiving and transmitting communicates with other type.Each reverse link signal that certain base station 270 receives is processed by particular B S270.The data obtained are forwarded to relevant BSC275.BSC provides call Resourse Distribute and comprises the mobile management function of coordination of the soft switching process between BS270.The data received also are routed to MSC280 by BSC275, and it is provided for the extra route service forming interface with PSTN290.Similarly, PSTN290 and MSC280 forms interface, and MSC and BSC275 forms interface, and BSC275 correspondingly control BS270 so that forward link signals is sent to mobile terminal 100.
Based on above-mentioned mobile terminal hardware configuration and communication system, each embodiment of the inventive method is proposed.
Touch operation method of the present invention, is specially adapted to narrow frame or Rimless mobile terminal, first the Touch Zone of mobile terminal is divided into special subregion and common subregion same as the prior art, and distributes an input equipment for each subregion; When receiving touch control operation, judging which subregion this touch control operation occurs in, when occurring in special subregion, then reporting touch control operation by the input equipment corresponding to special subregion, when occurring in common subregion, then report touch control operation by the input equipment corresponding to common subregion; Finally, mobile terminal carries out special processing to the touch control operation that the input equipment corresponding to special subregion reports, and the touch control operation reported the input equipment corresponding to common subregion, as prior art, carries out normal process.
Describedly special processing is carried out to touch control operation can be understood as unconventional process or improper process are carried out to touch control operation, as ignored this touch control operation, generating special efficacy according to this touch control operation, or other processing mode self-defining.For example, unconventional process or improper process, can do following understanding: further when user clicks a certain application icon, and normal process or conventional processing start this application, and improper process or unconventional process are then to start this application.
Be described in detail below by way of specific embodiment.
Embodiment one
Fig. 3 is that a kind of stealth mode that utilizes of embodiments of the invention one is to improve the process flow diagram of the method for operation file safety, a kind of stealth mode that utilizes of the present embodiment is described to improve the method for operation file safety below in conjunction with Fig. 3, as shown in Figure 3, utilize stealth mode to improve a method for operation file safety, comprising:
S10, set up the first stealth mode at mobile terminal, and open described first stealth mode;
S20, under described first stealth mode, carry out file operation, after described file operation completes, under described file is kept at described first stealth mode.
In the present embodiment, after described step S10, also comprise before step S20:
S11, password is set for described first stealth mode.
In the present embodiment, by the method for the corresponding different file observability of different stealth modes, and propose the stealth mode of file deletion, revise and copy and file is encrypted and hides, thus improve the convenience of file operation, high efficiency and security.
In the present embodiment, the scene that described stealth mode is corresponding different, as: conference model, tourism pattern etc., user's operation in this mode comprise as: take pictures, record, upload file etc., after operation completes, user has clicked, and now the file operation under this pattern is all recorded by terminal.
When if user will wish to proceed operation in this mode, (meeting as user does not also end, need to continue operation), user can enter this pattern, and continue operation, if user finds certain file not still under this pattern and be also want visible under other stealth modes, then user can certain stealth mode newly-built, then operation file, such system not only can record in this mode, also can under newly-built pattern record.
Embodiment two
Fig. 4 is that a kind of stealth mode that utilizes of the present embodiment is to improve the process flow diagram of the method for operation file safety; As shown in Figure 4, also comprise after described step S20:
S30, set up the second stealth mode at mobile terminal, by the file copy under described first stealth mode under described second stealth mode.
In the present embodiment, also comprise after described step S30:
S31, described file to be operated, after described file operation completes, under described file is kept at described first stealth mode and described second stealth mode simultaneously.
Embodiment three
Fig. 5 is that a kind of stealth mode that utilizes of the present embodiment is to improve the process flow diagram of the method for operation file safety; As shown in Figure 5, also comprise after described step S20:
S40, deletion action is carried out to the file under described first stealth mode; Or,
To the file under described first stealth mode modify stealth mode operation.
In the present embodiment, user also can delete the file under certain stealth mode, and after deleted under this pattern, then file does not just only possess visible feature in this mode.The stealth mode of certain file also can be revised or copy as another and hide by user, if it is invisible to revise then proterotype, another pattern is visible, and words two patterns copied are all visible.
Embodiment four
Fig. 6 is that a kind of stealth mode that utilizes of the present embodiment is to improve the exemplary block diagram of the device of operation file safety; As shown in Figure 6, a kind of stealth mode that utilizes, to improve the device of operation file safety, comprising:
First sets up module 10, for setting up the first stealth mode at mobile terminal, and opens described first stealth mode;
First preserves module 20, carries out file operation, after described file operation completes, under described file is kept at described first stealth mode under described first stealth mode.
In the present embodiment, also comprise:
Password arranges module 30, for arranging password for described first stealth mode.
Embodiment five
Fig. 7 is that a kind of stealth mode that utilizes of the present embodiment is to improve the exemplary block diagram of the device of operation file safety; As shown in Figure 7, a kind of stealth mode that utilizes also comprises to the device improving operation file safety:
Second sets up module 40, for setting up the second stealth mode at mobile terminal, by the file copy under described first stealth mode under described second stealth mode;
Second preserves module 50, for operating described file, after described file operation completes, under described file is kept at described first stealth mode and described second stealth mode simultaneously.
Embodiment six
Fig. 8 is that a kind of stealth mode that utilizes of the present embodiment is to improve the exemplary block diagram of the device of operation file safety; As shown in Figure 8, a kind of stealth mode that utilizes also comprises to the device improving operation file safety:
Deletion action module 60, for carrying out deletion action to the file under described first stealth mode; Or,
Retouching operation module 70, to the file under described first stealth mode modify stealth mode operation.
It should be noted that, in this article, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or device and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or device.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the device comprising this key element and also there is other identical element.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that above-described embodiment method can add required general hardware platform by software and realize, hardware can certainly be passed through, but in a lot of situation, the former is better embodiment.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product is stored in a storage medium (as ROM/RAM, magnetic disc, CD), comprising some instructions in order to make a station terminal equipment (can be mobile phone, computing machine, server, air conditioner, or the network equipment etc.) perform method described in each embodiment of the present invention.
These are only the preferred embodiments of the present invention; not thereby the scope of the claims of the present invention is limited; every utilize instructions of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (10)

1. utilize stealth mode to improve a method for operation file safety, it is characterized in that, comprising:
Set up the first stealth mode at mobile terminal, and open described first stealth mode;
File operation is carried out, after described file operation completes, under described file is kept at described first stealth mode under described first stealth mode.
2. a kind of stealth mode that utilizes according to claim 1 is to improve the method for operation file safety, it is characterized in that, describedly set up the first stealth mode at mobile terminal, and after opening described first stealth mode, file operation is carried out under described first stealth mode, after described file operation completes, also comprise before described file being kept under described first stealth mode:
For described first stealth mode arranges password.
3. a kind of stealth mode that utilizes according to claim 2 is to improve the method for operation file safety, it is characterized in that, describedly under described first stealth mode, carry out file operation, after described file operation completes, also comprise after described file being kept under described first stealth mode:
The second stealth mode is set up, by the file copy under described first stealth mode under described second stealth mode at mobile terminal.
4. a kind of stealth mode that utilizes according to claim 2 is to improve the method for operation file safety, it is characterized in that, describedly under described first stealth mode, carry out file operation, after described file operation completes, also comprise after described file being kept under described first stealth mode:
Deletion action is carried out to the file under described first stealth mode; Or,
To the file under described first stealth mode modify stealth mode operation.
5. a kind of stealth mode that utilizes according to claim 3 is to improve the method for operation file safety, it is characterized in that, describedly set up the second stealth mode at mobile terminal, also comprise after under the file copy under described first stealth mode to described second stealth mode:
Described file is operated, after described file operation completes, under described file is kept at described first stealth mode and described second stealth mode simultaneously.
6. utilize stealth mode to improve a device for operation file safety, it is characterized in that, comprising:
First sets up module, for setting up the first stealth mode at mobile terminal, and opens described first stealth mode;
First preserves module, carries out file operation, after described file operation completes, under described file is kept at described first stealth mode under described first stealth mode.
7. a kind of stealth mode that utilizes according to claim 6 is to improve the device of operation file safety, it is characterized in that, also comprises:
Password arranges module, for arranging password for described first stealth mode.
8. a kind of stealth mode that utilizes according to claim 7 is to improve the device of operation file safety, it is characterized in that, also comprises:
Second sets up module, for setting up the second stealth mode at mobile terminal, by the file copy under described first stealth mode under described second stealth mode.
9. a kind of stealth mode that utilizes according to claim 7 is to improve the device of operation file safety, it is characterized in that, also comprises:
Deletion action module, for carrying out deletion action to the file under described first stealth mode; Or,
Retouching operation module, to the file under described first stealth mode modify stealth mode operation.
10. a kind of stealth mode that utilizes according to claim 8 is to improve the device of operation file safety, it is characterized in that, also comprises:
Second preserves module, for operating described file, after described file operation completes, under described file is kept at described first stealth mode and described second stealth mode simultaneously.
CN201510280458.1A 2015-05-27 2015-05-27 Method and device for improving operation file safety through hidden modes Pending CN104915578A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510280458.1A CN104915578A (en) 2015-05-27 2015-05-27 Method and device for improving operation file safety through hidden modes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510280458.1A CN104915578A (en) 2015-05-27 2015-05-27 Method and device for improving operation file safety through hidden modes

Publications (1)

Publication Number Publication Date
CN104915578A true CN104915578A (en) 2015-09-16

Family

ID=54084639

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510280458.1A Pending CN104915578A (en) 2015-05-27 2015-05-27 Method and device for improving operation file safety through hidden modes

Country Status (1)

Country Link
CN (1) CN104915578A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453056A (en) * 2016-10-28 2017-02-22 努比亚技术有限公司 Mobile terminal and method for safely sharing picture

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101026822A (en) * 2006-02-24 2007-08-29 江苏高通科技实业有限公司 Method for protecting mobile phone private data
CN101025708A (en) * 2006-02-24 2007-08-29 环达电脑(上海)有限公司 Computer system dehugging method capable of automatically adapting different operating environments
CN101526961A (en) * 2009-03-30 2009-09-09 毛国红 Method for establishing multi-user file system in operating system
CN103347116A (en) * 2012-11-09 2013-10-09 北京深思洛克软件技术股份有限公司 System and method for setting multi-security modes in smart phone
US20130266141A1 (en) * 2012-04-10 2013-10-10 Won-Tae Kim Mobile device, method of processing an input in a mobile device and electronic payment method using a mobile device
CN103390026A (en) * 2013-06-20 2013-11-13 中国软件与技术服务股份有限公司 Mobile intelligent terminal security browser and working method thereof
CN103559455A (en) * 2013-09-27 2014-02-05 李天才 Android device personal information protection method based on user identification
CN103885858A (en) * 2014-03-11 2014-06-25 惠州Tcl移动通信有限公司 Method and system for mobile phone backup and data recovery
CN104008346A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Method and device for starting privacy mode of data processing device
CN104615951A (en) * 2015-02-13 2015-05-13 联想(北京)有限公司 Information processing method and mobile terminal

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101026822A (en) * 2006-02-24 2007-08-29 江苏高通科技实业有限公司 Method for protecting mobile phone private data
CN101025708A (en) * 2006-02-24 2007-08-29 环达电脑(上海)有限公司 Computer system dehugging method capable of automatically adapting different operating environments
CN101526961A (en) * 2009-03-30 2009-09-09 毛国红 Method for establishing multi-user file system in operating system
US20130266141A1 (en) * 2012-04-10 2013-10-10 Won-Tae Kim Mobile device, method of processing an input in a mobile device and electronic payment method using a mobile device
CN103347116A (en) * 2012-11-09 2013-10-09 北京深思洛克软件技术股份有限公司 System and method for setting multi-security modes in smart phone
CN104008346A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Method and device for starting privacy mode of data processing device
CN103390026A (en) * 2013-06-20 2013-11-13 中国软件与技术服务股份有限公司 Mobile intelligent terminal security browser and working method thereof
CN103559455A (en) * 2013-09-27 2014-02-05 李天才 Android device personal information protection method based on user identification
CN103885858A (en) * 2014-03-11 2014-06-25 惠州Tcl移动通信有限公司 Method and system for mobile phone backup and data recovery
CN104615951A (en) * 2015-02-13 2015-05-13 联想(北京)有限公司 Information processing method and mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453056A (en) * 2016-10-28 2017-02-22 努比亚技术有限公司 Mobile terminal and method for safely sharing picture

Similar Documents

Publication Publication Date Title
CN104951206A (en) Icon hiding method and device
CN105183308A (en) Picture display method and apparatus
CN104850259A (en) Combination operation method, combination operation apparatus, touch screen operating method and electronic device
CN104808944A (en) Touch operation induction method and device
CN104793849A (en) Application icon display method and device
CN104883658A (en) Virtual card information processing method and system
CN104735255A (en) Split screen display method and system
CN105094555A (en) Method and device for switching application program through swipe gesture
CN104850799A (en) Mobile terminal and method of hiding data in mobile terminal
CN104731512A (en) Method, device and terminal for sharing pictures
CN105208011A (en) Verification system and method
CN105095790A (en) Hidden object view method and device
CN104951236A (en) Wallpaper configuration method for terminal device, and terminal device
CN104850325A (en) Mobile terminal application processing method and device
CN104811865A (en) Audio output method, device and system
CN104732162A (en) File encryption processing method and device
CN104834863A (en) Wi-Fi password storage method and apparatus
CN104794104A (en) Multimedia document generating method and device
CN104932697A (en) Gesture unlocking method and device
CN104658535A (en) Voice control method and device
CN104898940A (en) Picture processing method and device
CN105138871A (en) Unlocking method and apparatus for mobile terminal and mobile terminal
CN105138880A (en) Processing apparatus and method for terminal operation data
CN104914998A (en) Mobile terminal and multi-gesture desktop operation method and device thereof
CN105261054A (en) Device and method for compositing audio GIF image

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150916

RJ01 Rejection of invention patent application after publication