CN105574417A - User information protection method and device - Google Patents

User information protection method and device Download PDF

Info

Publication number
CN105574417A
CN105574417A CN201410535819.8A CN201410535819A CN105574417A CN 105574417 A CN105574417 A CN 105574417A CN 201410535819 A CN201410535819 A CN 201410535819A CN 105574417 A CN105574417 A CN 105574417A
Authority
CN
China
Prior art keywords
camouflage
information
mobile terminal
information database
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201410535819.8A
Other languages
Chinese (zh)
Inventor
王梁磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201410535819.8A priority Critical patent/CN105574417A/en
Priority to PCT/CN2015/074126 priority patent/WO2016054892A1/en
Publication of CN105574417A publication Critical patent/CN105574417A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Abstract

The invention provides a user information protection method and device, relates to the field of mobile communication, and solves the problem of poor effect of a traditional user information protection way. The method comprises the following steps: when a situation that a mobile terminal meets a condition of triggering a disguise mode is detected, extracting a preset disguise scheme; according to the disguise scheme, generating disguise information corresponding to the true information of the mobile terminal, wherein the disguise information is stored in a disguise information database; and using the disguise information database to replace a true information database which stores true information. The technical scheme provided by the invention is suitable for an intelligent mobile terminal and realizes the flexible protection of user information.

Description

User profile guard method and device
Technical field
The present invention relates to moving communicating field, particularly relate to a kind of user profile guard method and device.
Background technology
Along with the development of current intelligent terminal, the privacy of user profile obtains the attention of more and more people.User profile is constantly revealed through various channels, and such as backstage is uploaded, and violence is checked, software of the third party monitoring etc.User profile is exposed in a large number, and individual privacy is invaded.
Make a general survey of software engineering development in recent years, a lot of software company develops corresponding safe mode.Such as blacklist, password, iris, fingerprint, privacy contact person etc.But along with the refinement that people require information protection, these functions seem fairly simple, roughly.
Summary of the invention
The invention provides a kind of user profile guard method and device, solve the problem that existing user profile protected mode effect is poor.
A kind of user profile guard method, comprising:
When detecting that mobile terminal meets the condition triggering spoofing mode, extract preset Camouflage project;
According to described Camouflage project, generate the camouflage information corresponding with the real information of described mobile terminal, described camouflage information is stored in camouflage information database;
Described camouflage information database is used to replace the real information database storing described real information.
Preferably, according to described Camouflage project, generate the camouflage information corresponding with the real information of described mobile terminal and comprise:
To detecting that mobile terminal meets the real information before the condition triggering spoofing mode, generating corresponding camouflage information, being stored in described camouflage information database;
To detect mobile terminal meet the condition triggering spoofing mode after described mobile terminal treat that the real information externally provided is tackled, and generate the camouflage information corresponding with this real information, this camouflage information inserted described camouflage information database.
Preferably, according to described Camouflage project, after generating the step of the camouflage information corresponding with the real information of described mobile terminal, also comprise:
Described real information transferred to pre-configured remote backup system or carry out back-up storage in described mobile terminal this locality.
Preferably, the method also comprises:
The condition of spoofing mode described in configure trigger, described condition at least comprises following one or more content:
The absolute geographic position of single mobile terminal, multiple mobile terminal relative distance, starts specific software, the time period, uses specific unlocking pin/pattern.
Preferably, the method also comprises:
Configure described Camouflage project, described Camouflage project comprises the real information scope of needs camouflage and generates the method for the camouflage information corresponding with real information.
Preferably, described camouflage information database has different marks and identical structure from described real information database.
Preferably, the method also comprises:
When detecting that described mobile terminal no longer meets the condition triggering spoofing mode, exit spoofing mode;
Use described real information database externally to provide information, and back up described camouflage information database.
Preferably, the method also comprises:
Again detect described mobile terminal meet trigger the condition of spoofing mode time, the camouflage information in the camouflage information database that choice for use has been preserved or generate new camouflage information.
Present invention also offers a kind of user profile protective device, comprising:
Context detection module, for when detecting that mobile terminal meets the condition triggering spoofing mode, extracts preset Camouflage project;
Camouflage information generating module, for according to described Camouflage project, generate the camouflage information corresponding with the real information of described mobile terminal, described camouflage information is stored in camouflage information database;
Camouflage information providing module, replaces for using described camouflage information database the real information database storing described real information.
Preferably, this device also comprises:
Remote backup module, carries out back-up storage for described real information being transferred to pre-configured remote backup system.
Preferably, described context detection module, also for when detecting that described mobile terminal no longer meets the condition triggering spoofing mode, exits spoofing mode;
Described camouflage information providing module, also for using described real information database externally to provide information, and backs up described camouflage information database.
The invention provides a kind of user profile guard method and device; when detecting that mobile terminal meets the condition triggering spoofing mode; extract preset Camouflage project; according to described Camouflage project; generate the camouflage information corresponding with the real information of described mobile terminal; described camouflage information is stored in camouflage information database, uses described camouflage information database to replace the real information database storing described real information and provides information to described mobile terminal outside.Achieve the flexible protection to user profile, solve the problem that existing user profile protected mode effect is poor.
Accompanying drawing explanation
The process flow diagram of a kind of user profile guard method that Fig. 1 provides for embodiments of the invention one;
The process flow diagram of a kind of user profile guard method that Fig. 2 provides for embodiments of the invention two;
The structural representation of a kind of user profile protective device that Fig. 3 provides for embodiments of the invention three.
Embodiment
Make a general survey of software engineering development in recent years, a lot of software company develops corresponding safe mode.Such as blacklist, password, iris, fingerprint, privacy contact person etc.But along with the refinement that people require information protection, these functions seem fairly simple, the technical scheme existed at present can not meet the demand of user.
In order to solve the problem, The embodiment provides a kind of user profile guard method and device.Hereinafter will be described in detail to embodiments of the invention by reference to the accompanying drawings.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combination in any mutually.
First by reference to the accompanying drawings, embodiments of the invention one are described.
Embodiments provide a kind of user profile protection system, comprise following a few part: server high in the clouds part, mobile phone hardware storage area, cell phone software control section.Positional information, rights management etc.
In conjunction with said system, the embodiment of the present invention additionally provides a kind of user profile guard method, and the flow process using the method to complete to protect user profile as shown in Figure 1, comprising:
Step 101, detect mobile terminal meet trigger the condition of spoofing mode time, extract preset Camouflage project;
In the embodiment of the present invention, need to read the personal information in mobile terminal, such as contact person, message registration, short message, geographical location information, etc., and hold the root authority of user.
Mobile terminal is monitored, after detecting the condition reaching and trigger spoofing mode, namely enters spoofing mode, and extract preset Camouflage project.
In the embodiment of the present invention, need the condition of spoofing mode described in configure trigger on mobile terminals, described condition at least comprises following one or more content:
The absolute geographic position of single mobile terminal, multiple mobile terminal relative distance, starts specific software, the time period, uses specific unlocking pin/pattern.
Above-mentioned condition can be single as triggering the condition of spoofing mode; Also multiple condition can combine and trigger, such as within late 7:00 to the 9:00 time period and the absolute geographic position of mobile terminal trigger when A area.
It should be noted that, listed trigger condition above, the PART just to trigger condition, in fact can be moved terminal detection senses and can be used as the event triggering institute's service condition, all can be used as the condition triggering this spoofing mode, the present invention is not construed as limiting this.
Be illustrated triggering spoofing mode according to condition below:
1, the condition triggered is the absolute geographic position of single mobile terminal:
Carry out pretending the switching between information database and real information database when user reaches an area (the absolute geographic position of namely preset single mobile terminal) time, some preset regions are reached by architecture/GPS/A-GPS, according to setting before, real information is revised voluntarily.Can reduce after leaving region, or the reduction of user operation mobile terminal self.
2, the condition triggered is multiple mobile terminal relative distances:
Mobile terminal A is configured with Camouflage project, after the geographic position of the destination mobile terminal of mobile terminal A and a certain mark is close to a thresholding, namely starts spoofing mode, the real information of mobile terminal A is pretended.User is needed first to specify one or several destination mobile terminals (as by mobile phone title, IMSI number etc. mark mobile terminal P), after bluetooth/wifi/ base station/GPS obtains the distance of mobile terminal A and destination mobile terminal, carry out having object to pretend information.After can leaving certain distance in the terminal of specifying as user, carry out reducing real information or reduce voluntarily with this programme.
3, the condition triggered is for starting specific software:
Can to some software under specific time period and condition, the software process that supervisory user is specified, for the part of its defence userspersonal information, guides.As pointed to false geographic position, call-information etc. that user specifies in advance, make some softward interview to be the camouflage information that user presets in advance.User can carry out null hypothesis postpone to some administrative class software, calls management software authority, such as shields phone, note etc.
Several scheme can be combined with each other by setting above, mutually forms restriction condition, such as in certain time period, and certain geographical conditions and certain software startup can enter when reaching simultaneously, or, certain time period, certain geographical conditions or certain software, only have one to meet and then can enter.
Step 102, according to described Camouflage project, generate the camouflage information corresponding with the real information of described mobile terminal, described camouflage information is stored in camouflage information database;
In the embodiment of the present invention, need to configure Camouflage project, described Camouflage project comprises the real information scope of needs camouflage and generates the method for the camouflage information corresponding with real information.
Wherein, the real information scope of needs camouflage can comprise the personal information in mobile terminal, as contact person, and message registration, short message, geographical location information etc.; Also the information that application software generates can be comprised.
The method generating the camouflage information corresponding with real information can be preset one with a certain item or camouflage information corresponding to a few real informations, real information is simply replaced; Also can be computing method, as pushed away before the time of message registration 3 hours.
This step specifically comprises:
1, to detecting that mobile terminal meets the real information before the condition triggering spoofing mode, generating corresponding camouflage information, being stored in described camouflage information database;
2, to detect mobile terminal meet the condition triggering spoofing mode after described mobile terminal treat that the real information externally provided is tackled, and generate the camouflage information corresponding with this real information, this camouflage information inserted described camouflage information database.
Described camouflage information database has different marks and identical structure from described real information database.Distinguishing camouflage information database and real information database by difference mark, such as, can be different version flags; And owing to having identical structure, mobile terminal can switch between camouflage information database and real information database, pretend information accordingly needing the call by location using certain real information.
Step 103, described real information transferred to pre-configured remote backup system or carry out back-up storage in described mobile terminal this locality;
After this Camouflage project of operation, automatically can obtain according to the Camouflage project preset the real information that camouflage information replaces amendment user, and original real information database is backed up.
This real information can be backed up at assigned address (high in the clouds/this locality stores) and encrypt.
Step 104, use described camouflage information database to replace to store the real information database of described real information;
In this step, mobile terminal reads camouflage information database, and calls the camouflage information corresponding with real information when recalls information.
Step 105, more new user interface, make camouflage information manifest.
Step 106, detect described mobile terminal no longer meet trigger the condition of spoofing mode time, exit spoofing mode.
Step 107, use described real information database externally to provide information, and back up described camouflage information database.
Preferably, when again detect described mobile terminal meet trigger the condition of spoofing mode time, can camouflage information in the camouflage information database preserved of choice for use or generate new camouflage information.Also the condition of Camouflage project and triggering spoofing mode can be reshuffled.
Below in conjunction with accompanying drawing, embodiments of the invention two are described.
Embodiments provide a kind of user profile guard method, the flow process using the method to complete to pretend user's real information as shown in Figure 2, comprising:
1, user opens scheme software, and high in the clouds provides account, and user judges whether after logging in that first time logs in, if first time, is supplied to the Camouflage project of the various a large amount of classification of user, and allows user to edit.Used camouflage information before if not first time logs in and then reads user.Camouflage project refers to modifies to some information, such as contact name, short message content, air time, geographic position etc.
2, or the many point camouflage information that preset a to selection, can leave the physical storage areas of mobile phone in an encrypted form in.
3, user uses this programme to carry out spoofing mode triggering, as above-mentioned specific embodiments, an available sets of plan, also can many sets of plan multiplexing.For scheme multiplexing can adding users to the controllability of spoofing mode.
4, user triggers the performing step of spoofing mode:
The first step: reach the entirety after condition and arrange, reach the condition of triggering at user-defined geolocation scenario after, mobile terminal under spoofing mode directly can read current contacts database, message registration database, the various private data storehouses such as note data storehouse, according to the real air time, name, short message content, based on the real informations such as calling record, unify generate corresponding camouflage information and be stored in camouflage information database according to Camouflage project preset before, information database will be pretended and replace real information database, real information database is backed up.And restart corresponding application and make the adaptive camouflage information in its interface.
Second step: when user produces new real information (such as message registration, short breath, positional information etc.) under spoofing mode, automatically tackle this real information, and generation pretends information accordingly, then proceeds as follows:
First real information is inserted into the real information database of backup, but this operation can not be shown to user.Then, this new real information is carried out after camouflage obtains camouflage information, camouflage information being inserted camouflage information database according to Camouflage project before.Refresh interface, camouflage information is embodied to user.Essentially pretend information database and real information database except a mark zone exceptionally, its structure should be all consistent.The just information changed, and and nonformat.The content of real information database also can be completely the same with the content of camouflage information database, and this Camouflage project arranged by user determined.
3rd step, after user exits spoofing mode (initiatively exit or automatically exit, user initiatively exits the option by encrypting in menu), real information database can reduce by mobile terminal, and interface refreshing is carried out in the corresponding application of notice, or restarts application/mobile phone.Camouflage information database is preserved, for the spoofing mode of next time.
5, after the condition that reaches enters spoofing mode, the encrypted backup of true meeting of user, together with Camouflage project, uploads to high in the clouds record declaration.
6, after user exits spoofing mode, this camouflage information used of user can initiatively be saved, and uploads cloud backup.After user uses spoofing mode next time, can initiatively point out user the camouflage information database record that last time uses, for the camouflage information database before user's choice for use.
Below in conjunction with accompanying drawing, embodiments of the invention three are described.
Embodiments provide a kind of user profile protective device, the structure of this device as shown in Figure 3, comprising:
Context detection module 301, for when detecting that mobile terminal meets the condition triggering spoofing mode, extracts preset Camouflage project;
Camouflage information generating module 302, for according to described Camouflage project, generate the camouflage information corresponding with the real information of described mobile terminal, described camouflage information is stored in camouflage information database;
Camouflage information providing module 303, replaces for using described camouflage information database the real information database storing described real information.
Preferably, this device also comprises:
Remote backup module 304, carries out back-up storage for described real information being transferred to pre-configured remote backup system.
Preferably, described context detection module 301, also for when detecting that described mobile terminal no longer meets the condition triggering spoofing mode, exits spoofing mode;
Preferably, described camouflage information providing module 303, also for using described real information database externally to provide information, and backs up described camouflage information database.
The embodiment provides a kind of user profile guard method and device,
When detecting that mobile terminal meets the condition triggering spoofing mode, extract preset Camouflage project, according to described Camouflage project, generate the camouflage information corresponding with the real information of described mobile terminal, described camouflage information is stored in camouflage information database, uses described camouflage information database to replace the real information database storing described real information and provides information to described mobile terminal outside.Achieve the flexible protection to user profile, solve the problem that existing user profile protected mode effect is poor.
The technical scheme that embodiments of the invention provide can refinement individual privacy aspect safe class, the true privacy of protection individual that the camouflage information provided can be stronger.Solve user know the inside story do not want to provide real information, or in ignorant situation real information reveal problem.
Camouflage information can be supplied to other people by arranging voluntarily by user freely, or without the software of the third party that I authorizes, is applicable to some occasion, reaches the maximized protection of personal information.
One of ordinary skill in the art will appreciate that all or part of step of above-described embodiment can use computer program flow process to realize, described computer program can be stored in a computer-readable recording medium, described computer program (as system, unit, device etc.) on corresponding hardware platform performs, when performing, step comprising embodiment of the method one or a combination set of.
Alternatively, all or part of step of above-described embodiment also can use integrated circuit to realize, and these steps can be made into integrated circuit modules one by one respectively, or the multiple module in them or step are made into single integrated circuit module to realize.Like this, the present invention is not restricted to any specific hardware and software combination.
Each device/functional module/functional unit in above-described embodiment can adopt general calculation element to realize, and they can concentrate on single calculation element, also can be distributed on network that multiple calculation element forms.
Each device/functional module/functional unit in above-described embodiment using the form of software function module realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.The above-mentioned computer read/write memory medium mentioned can be ROM (read-only memory), disk or CD etc.
Anyly be familiar with those skilled in the art in the technical scope that the present invention discloses, change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain described in claim.

Claims (11)

1. a user profile guard method, is characterized in that, comprising:
When detecting that mobile terminal meets the condition triggering spoofing mode, extract preset Camouflage project;
According to described Camouflage project, generate the camouflage information corresponding with the real information of described mobile terminal, described camouflage information is stored in camouflage information database;
Described camouflage information database is used to replace the real information database storing described real information.
2. user profile guard method according to claim 1, is characterized in that, according to described Camouflage project, generates the camouflage information corresponding with the real information of described mobile terminal and comprises:
To detecting that mobile terminal meets the real information before the condition triggering spoofing mode, generating corresponding camouflage information, being stored in described camouflage information database;
To detect mobile terminal meet the condition triggering spoofing mode after described mobile terminal treat that the real information externally provided is tackled, and generate the camouflage information corresponding with this real information, this camouflage information inserted described camouflage information database.
3. user profile guard method according to claim 1, is characterized in that, according to described Camouflage project, after generating the step of the camouflage information corresponding with the real information of described mobile terminal, also comprises:
Described real information transferred to pre-configured remote backup system or carry out back-up storage in described mobile terminal this locality.
4. user profile guard method according to claim 1, it is characterized in that, the method also comprises:
The condition of spoofing mode described in configure trigger, described condition at least comprises following one or more content:
The absolute geographic position of single mobile terminal, multiple mobile terminal relative distance, starts specific software, the time period, uses specific unlocking pin/pattern.
5. user profile guard method according to claim 1, it is characterized in that, the method also comprises:
Configure described Camouflage project, described Camouflage project comprises the real information scope of needs camouflage and generates the method for the camouflage information corresponding with real information.
6. user profile guard method according to claim 1, is characterized in that, described camouflage information database has different marks and identical structure from described real information database.
7. user profile guard method according to claim 1, it is characterized in that, the method also comprises:
When detecting that described mobile terminal no longer meets the condition triggering spoofing mode, exit spoofing mode;
Use described real information database externally to provide information, and back up described camouflage information database.
8. user profile guard method according to claim 7, it is characterized in that, the method also comprises:
Again detect described mobile terminal meet trigger the condition of spoofing mode time, the camouflage information in the camouflage information database that choice for use has been preserved or generate new camouflage information.
9. a user profile protective device, is characterized in that, comprising:
Context detection module, for when detecting that mobile terminal meets the condition triggering spoofing mode, extracts preset Camouflage project;
Camouflage information generating module, for according to described Camouflage project, generate the camouflage information corresponding with the real information of described mobile terminal, described camouflage information is stored in camouflage information database;
Camouflage information providing module, replaces for using described camouflage information database the real information database storing described real information.
10. user profile protective device according to claim 9, is characterized in that, this device also comprises:
Remote backup module, carries out back-up storage for described real information being transferred to pre-configured remote backup system.
11. user profile protective devices according to claim 9, is characterized in that,
Described context detection module, also for when detecting that described mobile terminal no longer meets the condition triggering spoofing mode, exits spoofing mode;
Described camouflage information providing module, also for using described real information database externally to provide information, and backs up described camouflage information database.
CN201410535819.8A 2014-10-11 2014-10-11 User information protection method and device Withdrawn CN105574417A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410535819.8A CN105574417A (en) 2014-10-11 2014-10-11 User information protection method and device
PCT/CN2015/074126 WO2016054892A1 (en) 2014-10-11 2015-03-12 Method and device for user information protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410535819.8A CN105574417A (en) 2014-10-11 2014-10-11 User information protection method and device

Publications (1)

Publication Number Publication Date
CN105574417A true CN105574417A (en) 2016-05-11

Family

ID=55652532

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410535819.8A Withdrawn CN105574417A (en) 2014-10-11 2014-10-11 User information protection method and device

Country Status (2)

Country Link
CN (1) CN105574417A (en)
WO (1) WO2016054892A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107635052A (en) * 2016-07-18 2018-01-26 中兴通讯股份有限公司 Message treatment method and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115659341B (en) * 2022-12-23 2023-03-10 中国计量大学现代科技学院 Software information safety monitoring system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101370209A (en) * 2008-09-22 2009-02-18 深圳华为通信技术有限公司 Information disguising method and system
CN102223626A (en) * 2011-06-14 2011-10-19 李明 Information steganography and security protection method based on wireless base station information

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4008380B2 (en) * 2003-04-25 2007-11-14 京セラ株式会社 Mobile device
CN101815119A (en) * 2009-12-10 2010-08-25 宇龙计算机通信科技(深圳)有限公司 Method and system for processing information of private contact person and mobile communication terminal
CN102394975B (en) * 2011-10-28 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Private contact camouflage method and mobile terminal
CN102970666A (en) * 2012-11-09 2013-03-13 广东欧珀移动通信有限公司 Method and system for disguised incoming call information for mobile terminal
CN104010272A (en) * 2014-05-12 2014-08-27 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting privacy

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101370209A (en) * 2008-09-22 2009-02-18 深圳华为通信技术有限公司 Information disguising method and system
CN102223626A (en) * 2011-06-14 2011-10-19 李明 Information steganography and security protection method based on wireless base station information

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107635052A (en) * 2016-07-18 2018-01-26 中兴通讯股份有限公司 Message treatment method and device

Also Published As

Publication number Publication date
WO2016054892A1 (en) 2016-04-14

Similar Documents

Publication Publication Date Title
US20220182820A1 (en) Method and apparatus for protecting data in a portable electronic device
CN101611599B (en) Apparatus and methods for locating, tracking and/or recovering a wireless communication device
CN105228093B (en) Intelligent mobile terminal managing and control system based on low-power consumption bluetooth
EP2476108B1 (en) Alert for real-time risk of theft or loss
CN109511089A (en) A kind of monitoring method and device
US8467808B1 (en) Mobile object location-based privacy protection
CN202617350U (en) Mobile phone safety management and control system
CN102780813A (en) Mobile terminal-based alarm method and system
CN101909126A (en) Method for monitoring state of mobile terminal and mobile terminal
WO2018207123A1 (en) Tracking and locating lost, misplaced and stolen mobile devices using anti-theft technology
CN112804240B (en) Function control method, device, server, storage medium and product
CN104239805A (en) Mobile phone antitheft method and device
CN103561384A (en) Data protection method based on geographical location information of mobile intelligent terminal
CN103945385A (en) Theft preventing method and device for mobile terminal
Hussein et al. Digital surveillance systems for tracing COVID-19: Privacy and security challenges with recommendations
WO2014095155A1 (en) Video surveillance system using mobile terminals
KR20130088942A (en) Smart-phone control system and control method based on the location information
CN105898042A (en) Information processing method and electronic device
CN105574417A (en) User information protection method and device
CN103885827B (en) Automatically switch the method and intelligent terminal of operational mode
CN103942915A (en) Portable alarm and alarm method thereof
CN109379706A (en) Anti-theft method for mobile terminal, device, system and storage medium
CN103428335A (en) Method for protecting user and cell phone
CN111049860A (en) Remote equipment centralized management and control system and method
Varade et al. Advanced women security system based on IOT

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20160511

WW01 Invention patent application withdrawn after publication