CN106022164A - Method and device for protecting information on intelligent terminal - Google Patents
Method and device for protecting information on intelligent terminal Download PDFInfo
- Publication number
- CN106022164A CN106022164A CN201610330168.8A CN201610330168A CN106022164A CN 106022164 A CN106022164 A CN 106022164A CN 201610330168 A CN201610330168 A CN 201610330168A CN 106022164 A CN106022164 A CN 106022164A
- Authority
- CN
- China
- Prior art keywords
- file
- information
- lock
- unlocked
- lock file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a method and a device for protecting information on an intelligent terminal so as to provide protection for information stored on the intelligent terminal and prevent an owner from leaking personal privacy and important information. The method comprises the following steps: displaying an unlocked folder and a locked folder on the desktop of the intelligent terminal; and when a user needs to protect certain type of information, receiving the information which needs to be protected by the user, and moving to the locked folder, wherein an access password needs to be input when the locked folder is accessed. Since the access password needs to be input when the locked folder is accessed, when the user moves the information which needs to be protected to the locked folder, a visitor needs to provide a corresponding access password to enter the folder to access information in the folder, the technical scheme provided by the invention can protect important information including personal privacy and the like in a smartphone when the smartphone of the owner is borrowed or lost, and loss of substance and/ or spirits due to the leakage of the personal privacy information of the owner can be avoided.
Description
Technical field
The invention belongs to moving communicating field, particularly relate to a kind of method protecting the upper information of intelligent terminal and dress
Put.
Background technology
Developing rapidly of mobile communication technology, especially intelligent terminal's technology so that the intelligence such as smart mobile phone is eventually
The function of end is from strength to strength, for example, it is possible to access the Internet (Internet) by intelligent terminal, permissible
By the photographic head shooting photo that intelligent terminal is built-in, and can play with the playout software that intelligent terminal installs
Audio frequency and video etc..In other words, PC (Personal Computer, PC), photographing unit and audio frequency and video are broadcast
Put the function of a lot of electronic products such as device (such as, MP3, MP4 etc.) all by the corresponding function of intelligent terminal
Replace.Just because of intelligent terminal instead of a lot of conventional electronic devices, intelligent terminal user often will much weigh
The application wanted, such as, Mobile banking, Email, instant communication software (such as, QQ, wechat etc.),
Net purchase client (such as, Taobao's client) etc. is arranged on intelligent terminal, the relevant letter applied to these
Breath also can be stored on intelligent terminal.Certainly, intelligent terminal is also possible to ground only merely as memory device,
Store some information such as picture, audio frequency and video.
Due to modern interpersonal contacts relatively frequently, closely, daily contacts are also possible to appearance and borrow
By the situation of smart mobile phone, and the picture of storage on smart mobile phone, video and with Mobile banking, electronics postal
The information that the application such as part, instant communication software, net purchase client is relevant may relate to individual privacy.In intelligence
Mobile phone is borrowed under situation, and the above-mentioned information relating to individual privacy may arbitrarily be accessed, thus makes to owner
Become material and/or spiritual loss.Additionally, when intelligent terminal surprisingly loses, these people are hidden
Personal letter breath bare bare area can be exposed to the person of picking up, and can cause the material of owner, spirit or material and spirit equally
On double loss.
But, for produced problem during the intelligent terminal such as above-mentioned use smart mobile phone, industry there is no solution party
Case.
Summary of the invention
The present invention provides a kind of method and apparatus protecting the upper information of intelligent terminal, to preserve intelligent terminal is upper
Information provide protection, prevent the leakage of owner's individual privacy, important information.
First aspect present invention provides a kind of method protecting the upper information of intelligent terminal, and described method includes:
Showing that on intelligent terminal's desktop unlocked file and lock file are pressed from both sides, described lock file is pressed from both sides
Input is needed to access password when accessed;
When user needs to protect certain information, receive described user need to information to be protected move to described in
Lock file press from both sides, described need information to be protected include in file, file or App any one or
Several.
In conjunction with first aspect, in the first possible implementation of first aspect, described method also includes:
Described unlocked file and described lock file are pressed from both sides switching mutually.
In conjunction with the first possible implementation of first aspect, the realization that the second in first aspect is possible
In mode, described described unlocked file and described lock file folder switchings mutually includes:
Entering described unlocked file and detecting after described user clicks on unlocked mark, by described not
Lock file sandwiched is set to lock file folder, and presss from both sides in lock file described in entrance and detect user
Click on after locking mark, the described sandwiched of lock file is set to unlocked file.
In conjunction with the implementation that the second of first aspect is possible, in the third possible realization of first aspect
In mode, described described unlocked file is set as lock file folder include:
Lock file described in being provided for being set as accessing after lock file folder at described unlocked file
Access password during folder.
In conjunction with first aspect, first aspect the first, the second of first aspect or the of first aspect
Three kinds of possible implementations, in the 4th kind of possible implementation of first aspect, described method is also wrapped
Include:
The information that described in shielding, lock file clip pack contains.
Second aspect present invention provides a kind of device protecting the upper information of intelligent terminal, and described device includes:
Display module, for showing that on intelligent terminal's desktop unlocked file and lock file press from both sides, institute
Stating lock file folder needs input to access password when accessed;
Protection module, for when user needs to protect certain information, receiving described user will need to be protected
Information move to described in lock file folder, described need information to be protected includes file, file or App
In any one or a few.
In conjunction with second aspect, in the first possible implementation of second aspect, described device also includes:
Handover module, for pressing from both sides switching mutually by described unlocked file and described lock file.
In conjunction with the first possible implementation of second aspect, the realization that the second in second aspect is possible
In mode, described handover module includes the first setup unit and the second setup unit, described first setup unit
For entering described unlocked file and detecting after described user clicks on unlocked mark, by described not
Lock file sandwiched is set to lock file folder, and described second setup unit is for having locked literary composition described in entering
Part press from both sides and detect user click on lock mark after, the described sandwiched of lock file is set to unlocked file
Folder.
In conjunction with the implementation that the second of second aspect is possible, in the third possible realization of second aspect
In mode, described first setup unit includes:
Password arranges unit, is used for being provided for after described unlocked file is set as that lock file is pressed from both sides
Access password when lock file is pressed from both sides described in access.
In conjunction with second aspect, second aspect the first, the second of second aspect or the of second aspect
Three kinds of possible implementations, in the 4th kind of possible implementation of second aspect, described device also wraps
Include:
Information screen module, is used for the information that described in shielding, lock file clip pack contains.
Knowable to the invention described above technical scheme, the desktop of intelligent terminal shows unlocked file and
Lock file is pressed from both sides, owing to lock file folder needs input to access password when accessed, when needs are protected by user
The information protected move to described in lock file folder time, visitor needs to provide the corresponding password that accesses to enter
File accesses information therein, and therefore, the technical scheme that the present invention provides makes the smart mobile phone of owner exist
When being borrowed or lose, the important informations such as individual privacy therein are protected, it is therefore prevented that owner
Material that the leakage of people's privacy information causes and/or spiritual loss.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to enforcement
In example or description of the prior art, the required accompanying drawing used is briefly described, it should be apparent that, describe below
In accompanying drawing be only some embodiments of the present invention, for those of ordinary skill in the art, do not paying
On the premise of going out creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is that the flow process that realizes of the method for the upper information of protection intelligent terminal that the embodiment of the present invention one provides is illustrated
Figure;
Fig. 2 is showing unlocked file on intelligent terminal's desktop and having added of the embodiment of the present invention two offer
The schematic diagram of lock file;
Fig. 3 is the interface schematic diagram after the unlocked file of entrance that the embodiment of the present invention three provides;
Fig. 4 is the interface schematic diagram after the entrance lock file folder that the embodiment of the present invention four provides;
Fig. 5 is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention five provides;
Fig. 6 is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention six provides;
Fig. 7 is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention seven provides;
Fig. 8 is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention eight provides;
Fig. 9-a is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention nine provides;
Fig. 9-b is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention ten provides
Figure;
Fig. 9-c is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention 11 provides
Figure;
Fig. 9-d is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention 12 provides
Figure.
Detailed description of the invention
For making the goal of the invention of the present invention, feature, the advantage can be the most obvious and understandable, below will knot
Close the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely retouched
State, it is clear that described embodiment is only a part of embodiment of the present invention, and not all embodiments.Base
Embodiment in the present invention, those of ordinary skill in the art are obtained under not making creative work premise
The every other embodiment obtained, broadly falls into the scope of protection of the invention.
The embodiment of the present invention provides a kind of method protecting the upper information of intelligent terminal, and described method includes: in intelligence
Can show that unlocked file and lock file are pressed from both sides on terminal desktop;When user needs to protect certain information,
Receive described user need to information to be protected move to described in lock file folder, described need information to be protected
Including any one or a few in file, file or App, described lock file is clipped in accessed
Time need to input access password.The embodiment of the present invention also provides for protecting accordingly the device of the upper information of intelligent terminal.
It is described in detail individually below.
Refer to accompanying drawing 1, be the reality of the method for the upper information of protection intelligent terminal that the embodiment of the present invention one provides
Existing flow process.The method of the upper information of protection intelligent terminal of accompanying drawing 1 example can be used for smart mobile phone, panel computer
Deng intelligent terminal, mainly include the following steps that S101 and step S103:
S101, shows that on intelligent terminal's desktop unlocked file and lock file are pressed from both sides.
In embodiments of the present invention, file can be divided into unlocked file and lock file is pressed from both sides also
It is shown on the desktop of intelligent terminal, as shown in Figure 2.Both files are except can be with explanatory note
Outside its type, such as, under file, illustrate that this document folder is not with word " unlocked file "
Lock file is pressed from both sides, and illustrates that this document folder is to have locked literary composition with word " lock file folder " under file
Part presss from both sides, it is also possible to draws a mark on the folder of lock file, such as, as shown in Figure 2, locks
A lock locked is drawn, to represent that this document folder is that lock file has been pressed from both sides on file.
In order to be further ensured that safety, in embodiments of the present invention, lock file clip pack can be shielded to contain
Information, in other words, lock file clip pack contain which information, be can not for intelligent terminal's user
Seeing, user does not knows wherein comprise which content, and as shown in Figure 2, lock file folder is the most
Show a lock locked, and unlocked file, intelligent terminal's user is it can also be seen that wherein comprise
Information, such as, comprise which App.
S102, when user needs to protect certain information, receiving user need to information to be protected move to add
Lock file.
In embodiments of the present invention, user can be the owner user of intelligent terminal, it is also possible to be authorized
Other validated users in addition to owner user, and need information to be protected to include file, file or App
In any one or a few.Such as, if owner user does not wants to allow other people see the pictures such as individual's description,
These pictures can be dragged to lock file folder;For another example, if owner user is not desired to net purchase information by other people
See, can be by net purchase client, such as this App icon of Taobao's client is dragged to lock file folder.
Owing to lock file folder needs input to access password when accessed, and this access password is generally used by owner
Family arrange, therefore, smart mobile phone lent other people use time, without owner allow, be to cannot be introduced into
The content that lock file folder access wherein comprises.
From the protection intelligent terminal of above-mentioned accompanying drawing 1 example, the method for information understands, at the desktop of intelligent terminal
The unlocked file of upper display and lock file folder, owing to lock file folder needs input to visit when accessed
Ask password, when user need to information to be protected move to described in lock file folder time, visitor need provide
The corresponding password that accesses could enter file access information therein, therefore, the protection intelligence of accompanying drawing 1 example
Can in terminal the method for information make the smart mobile phone of owner when being borrowed or lose, to individual therein
The important informations such as privacy are protected, it is therefore prevented that the material that the leakage of owner's individual privacy information causes and/
Or spiritual loss.
In embodiments of the present invention, it is also possible to by unlocked file and lock file folder switching mutually, i.e.
Unlocked file is changed to lock file folder, and the folder of lock file is changed to unlocked file
Folder.
Specifically, for unlocked file being switched to lock file folder, can be unlocked in entrance
File also detects after user clicks on unlocked mark, and unlocked file is set as lock file folder.
As shown in Figure 3, after user enters unlocked file, click on the unlocked mark of display on its interface,
For example, it may be a lock opened as shown in Figure 3.Detect user in system and click on unlocked mark
After knowledge, unlocked file being just set as lock file folder, its detailed process is: user setup is used for
Described in accessing after described unlocked file is set as the folder of lock file lock file folder time access close
Code.After unlocked file being set as, lock file is pressed from both sides, unlocked mark becomes by locking mark,
For example, it may be a lock locked.
For the folder of lock file is switched to unlocked file, can be specifically to enter lock file
Press from both sides and detect user click on lock mark after, lock file sandwiched is set to unlocked file.As
Shown in accompanying drawing 4, user enters lock file folder by inputting correct access password, detects in system
User clicks on and has locked mark, such as, after a lock locked, just lock file sandwiched be set to and do not add
Lock file.After lock file sandwiched is set to unlocked file, any user can will wherein comprise
Information, such as, file, file or App therefrom haul out.
It should be noted that press from both sides for lock file, the access needing input to arrange in advance when accessing is close
Code.When input error is higher than set point number, such as when 3 times, system can lock this lock file and press from both sides one section
Time, such as 90 seconds, after when continuing with mistake by cumulative locking time.Entering lock file folder
After, the information that can will wherein comprise, such as, file, file or App removal.
In order to manage lock file folder further, in embodiments of the present invention, lock file folder is being entered
After, its interface provides the interface of operational access password, and user can arrange, revise or release access password.
Amendment access password time, if repeatedly input error, system by locking this lock file press from both sides certain time,
Again this document folder can not be carried out any operation the most within a certain period of time, access password including input, thus reach
The access password set to protection user, prevents by the purpose of malicious modification.
In order to improve Consumer's Experience, when user enters the desktop of smart mobile phone and unlocks lock file folder the most
After i.e. inputting correct access password, it is not necessary to input accesses password and just can access lock file folder again,
Until working as the interface being switched to a non-desktop from desktop, such as, as being switched to locking screen interface, going out
Screen or other App etc., this lock file folder can be locked again.
Refer to accompanying drawing 5, be the knot of the device of the upper information of protection intelligent terminal that the embodiment of the present invention five provides
Structure schematic diagram.For convenience of description, illustrate only the part relevant to the embodiment of the present invention.Accompanying drawing 5 example
The device of the upper information of protection intelligent terminal can be the upper information of protection intelligent terminal that previous embodiment provides
The executive agent of method, it can be intelligent terminal or functional module therein.The protection of accompanying drawing 5 example
The device of the upper information of intelligent terminal mainly includes display module 501 and protection module 502, and each functional module is detailed
Carefully it is described as follows:
Display module 501, for showing that on intelligent terminal's desktop unlocked file and lock file press from both sides,
Wherein, lock file folder needs input to access password when accessed.
Protection module 502, for when user needs to protect certain information, receiving user will need to be protected
Information moves to lock file folder, and need that information to be protected includes in file, file or App is any
One or more.
It should be noted that the embodiment of the device of the upper information of the protection intelligent terminal of the figures above 5 example
In, the division of each functional module is merely illustrative of, can be such as corresponding hard as required in actual application
The configuration requirement of part or the convenient consideration of the realization of software, and above-mentioned functions is distributed by different function moulds
Block completes, and the internal structure of the device of the upper information of intelligent terminal described will be protected to be divided into different function moulds
Block, to complete all or part of function described above.And, in actual application, in the present embodiment
Corresponding functional module can be to be realized by corresponding hardware, it is also possible to is performed the softest by corresponding hardware
Part completes, and such as, aforesaid display module, can be to have the aforementioned display on intelligent terminal's desktop of execution
Unlocked file and lock file folder hardware, such as display, it is also possible to be able to carry out mutually accrued
Calculation machine program thus complete general processor or other hardware devices of aforementioned function;The most aforesaid protection
Module, can be carried out, when user needs to protect certain information, receiving described user and needing letter to be protected
Cease the hardware of lock file folder described in moving to, such as protector, it is also possible to be to be able to carry out corresponding computer
Program thus complete the general processor of aforementioned function or other hardware devices (this specification provide each
Embodiment all can apply foregoing description principle).
From the protection intelligent terminal of above-mentioned accompanying drawing 5 example, the device of information understands, and display module is in intelligence eventually
Show on the desktop of end that unlocked file and lock file are pressed from both sides, owing to lock file is pressed from both sides when accessed
Access password need to be inputted, when user need to information to be protected move to described in lock file folder time, visitor
Need to provide the corresponding password that accesses could enter file access information therein, therefore, accompanying drawing 5 example
The device of the upper information of protection intelligent terminal make the smart mobile phone of owner when being borrowed or lose, to it
In the important information such as individual privacy protected, it is therefore prevented that the leakage of owner's individual privacy information causes
Material and/or spiritual loss.
The device of the upper information of protection intelligent terminal of accompanying drawing 5 example can also include handover module 601, as attached
The device of the upper information of protection intelligent terminal that the embodiment of the present invention six shown in Fig. 6 provides.Handover module 601 is used
In by unlocked file and lock file folder switching mutually.
The handover module 601 of accompanying drawing 6 example can also include the first setup unit 701 and the second setup unit
702, the device of the upper information of protection intelligent terminal that the embodiment of the present invention seven provides as shown in Figure 7, wherein:
First setup unit 701, for entering unlocked file and detecting user and click on unlocked mark
After knowledge, described unlocked file is set as lock file folder;
Second setup unit 702, for enter lock file press from both sides and detects user click locked mark
After knowledge, the described sandwiched of lock file is set to unlocked file.
First setup unit 701 of accompanying drawing 7 example can include that password arranges unit 801, such as accompanying drawing 8 institute
Show the device of the upper information of protection intelligent terminal that the embodiment of the present invention eight provides.Password arrange unit 801 for
It is provided for the access when unlocked file is set as after lock file is pressed from both sides accessing lock file folder close
Code.
The device of the upper information of protection intelligent terminal of accompanying drawing 5 to accompanying drawing 8 any example can also include information screen
Cover module 901, such as the guarantor that accompanying drawing 9-a to the embodiment of the present invention nine to embodiment 12 shown in accompanying drawing 9-d provides
Protect the device of the upper information of intelligent terminal.Information screen module 901 is for shielding the letter that lock file clip pack contains
Breath.
It should be noted that the contents such as mutual, the execution process of information between each module/unit of said apparatus,
Due to the inventive method embodiment based on same design, its technique effect brought and the inventive method are implemented
Example is identical, and particular content can be found in the narration in the inventive method embodiment, and here is omitted.
Those of ordinary skill in the art are it is to be appreciated that combine respectively showing of the embodiments described herein description
The unit of example and algorithm steps, it is possible to come with the combination of electronic hardware or computer software and electronic hardware
Realize.These functions perform with hardware or software mode actually, depend on the application-specific of technical scheme
And design constraint.Each specifically should being used for can be used different methods to realize by professional and technical personnel
Described function, but this realization is it is not considered that beyond the scope of this invention.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, and foregoing description
The specific works process of system, device and unit, be referred to the corresponding process in preceding method embodiment,
Do not repeat them here.
In several embodiments provided herein, it should be understood that disclosed system, device and side
Method, can realize by another way.Such as, device embodiment described above is only schematically
, such as, the division of described unit, be only a kind of logic function and divide, actual can have when realizing another
Outer dividing mode, the most multiple unit or assembly can in conjunction with or be desirably integrated into another system, or
Some features can be ignored, or does not performs.Another point, shown or discussed coupling each other or straight
Connect coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit or communication connection,
Can be electrical, machinery or other form.
The described unit illustrated as separating component can be or may not be physically separate, as
The parts that unit shows can be or may not be physical location, i.e. may be located at a place, or
Can also be distributed on multiple NE.Can select therein some or all of according to the actual needs
Unit realizes the purpose of the present embodiment scheme.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit,
Can also be that unit is individually physically present, it is also possible to two or more unit are integrated in a unit
In.
If described function realizes and as independent production marketing or use using the form of SFU software functional unit
Time, can be stored in a computer read/write memory medium.Based on such understanding, the skill of the present invention
Part that prior art is contributed by art scheme the most in other words or the part of this technical scheme can be with
The form of software product embodies, and this computer software product is stored in a storage medium, if including
Dry instruction is with so that a computer equipment (can be personal computer, server, or the network equipment
Deng) perform all or part of step of method described in each embodiment of the present invention.And aforesaid storage medium bag
Include: USB flash disk, portable hard drive, read only memory (ROM, Read-Only Memory), random access memory are deposited
Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can store program generation
The medium of code.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited to
This, any those familiar with the art, in the technical scope that the invention discloses, can readily occur in
Change or replacement, all should contain within protection scope of the present invention.Therefore, protection scope of the present invention should
Described it is as the criterion with scope of the claims.
Claims (10)
1. the method protecting the upper information of intelligent terminal, it is characterised in that described method includes:
Showing that on intelligent terminal's desktop unlocked file and lock file are pressed from both sides, described lock file is pressed from both sides
Input is needed to access password when accessed;
When user needs to protect certain information, receive described user need to information to be protected move to described in
Lock file press from both sides, described need information to be protected include in file, file or App any one or
Several.
2. the method for claim 1, it is characterised in that described method also includes:
Described unlocked file and described lock file are pressed from both sides switching mutually.
3. method as claimed in claim 2, it is characterised in that described by described unlocked file and institute
State lock file folder switching mutually to include:
Entering described unlocked file and detecting after described user clicks on unlocked mark, by described not
Lock file sandwiched is set to lock file folder, and presss from both sides in lock file described in entrance and detect user
Click on after locking mark, the described sandwiched of lock file is set to unlocked file.
4. method as claimed in claim 3, it is characterised in that described by the setting of described unlocked file
Include for the folder of lock file:
Lock file described in being provided for being set as accessing after lock file folder at described unlocked file
Access password during folder.
5. the method as described in Claims 1-4 any one, it is characterised in that described method also includes:
The information that described in shielding, lock file clip pack contains.
6. the device protecting the upper information of intelligent terminal, it is characterised in that described device includes:
Display module, for showing that on intelligent terminal's desktop unlocked file and lock file press from both sides, institute
Stating lock file folder needs input to access password when accessed;
Protection module, for when user needs to protect certain information, receiving described user will need to be protected
Information move to described in lock file folder, described need information to be protected includes file, file or App
In any one or a few.
7. device as claimed in claim 6, it is characterised in that described device also includes:
Handover module, for pressing from both sides switching mutually by described unlocked file and described lock file.
8. device as claimed in claim 7, it is characterised in that described handover module includes the first setting list
Unit and the second setup unit;
Described first setup unit, for entering described unlocked file and detecting described user click
After unlocked mark, described unlocked file is set as lock file folder;
Described second setup unit, for enter described in lock file press from both sides and detects user click add
After lock mark, the described sandwiched of lock file is set to unlocked file.
9. device as claimed in claim 8, it is characterised in that described first setup unit includes:
Password arranges unit, is used for being provided for after described unlocked file is set as that lock file is pressed from both sides
Access password when lock file is pressed from both sides described in access.
10. the device as described in claim 6 to 9 any one, it is characterised in that described device also includes:
Information screen module, is used for the information that described in shielding, lock file clip pack contains.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610330168.8A CN106022164A (en) | 2016-05-18 | 2016-05-18 | Method and device for protecting information on intelligent terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610330168.8A CN106022164A (en) | 2016-05-18 | 2016-05-18 | Method and device for protecting information on intelligent terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106022164A true CN106022164A (en) | 2016-10-12 |
Family
ID=57097727
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610330168.8A Pending CN106022164A (en) | 2016-05-18 | 2016-05-18 | Method and device for protecting information on intelligent terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106022164A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106599700A (en) * | 2016-11-18 | 2017-04-26 | 北京奇虎科技有限公司 | Method for processing application file and mobile communication terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1521418A2 (en) * | 2003-10-03 | 2005-04-06 | Nec Corporation | Cellular phone and mail security processing method |
CN101382981A (en) * | 2008-09-23 | 2009-03-11 | 宇龙计算机通信科技(深圳)有限公司 | File encrypting and decrypting method and apparatus and mobile terminal |
CN101459723A (en) * | 2007-12-14 | 2009-06-17 | 希姆通信息技术(上海)有限公司 | Secret keeping processing method for mobile phone information |
CN103488918A (en) * | 2013-09-18 | 2014-01-01 | 广东欧珀移动通信有限公司 | Application encrypting method and device for intelligent terminal |
-
2016
- 2016-05-18 CN CN201610330168.8A patent/CN106022164A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1521418A2 (en) * | 2003-10-03 | 2005-04-06 | Nec Corporation | Cellular phone and mail security processing method |
CN101459723A (en) * | 2007-12-14 | 2009-06-17 | 希姆通信息技术(上海)有限公司 | Secret keeping processing method for mobile phone information |
CN101382981A (en) * | 2008-09-23 | 2009-03-11 | 宇龙计算机通信科技(深圳)有限公司 | File encrypting and decrypting method and apparatus and mobile terminal |
CN103488918A (en) * | 2013-09-18 | 2014-01-01 | 广东欧珀移动通信有限公司 | Application encrypting method and device for intelligent terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106599700A (en) * | 2016-11-18 | 2017-04-26 | 北京奇虎科技有限公司 | Method for processing application file and mobile communication terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103891242B (en) | System and method for profile based filtering of outgoing information in a mobile environment | |
CN109818935A (en) | User authority control method and device, storage medium, computer equipment | |
CN107735807A (en) | It is revoked the intelligence deletion of data | |
Muftic et al. | Security architecture for open distributed systems | |
Epifani et al. | Learning iOS forensics | |
Misra et al. | Android security: attacks and defenses | |
US20150312249A1 (en) | Password retrieval system and method involving token usage without prior knowledge of the password | |
CN103577732A (en) | Information processing method and device and electronic device | |
CN107506637A (en) | Information displaying method and device, terminal and readable storage medium storing program for executing | |
CN109657427A (en) | The method and device of permission control | |
Vegesna | Incorporating Data Mining Approaches and Knowledge Discovery Process to Cloud Computing for Maximizing Security | |
Mueller | Security for Web Developers: Using JavaScript, HTML, and CSS | |
CN104169938A (en) | Permission management method and permission management device | |
CN107122656A (en) | It is a kind of that the outside method and apparatus debugged are prevented by Self-debugging | |
US20220164463A1 (en) | Business data protection for running tasks in computer system | |
CN109145621A (en) | Document management method and device | |
CN106022164A (en) | Method and device for protecting information on intelligent terminal | |
Jaramillo et al. | Virtualization techniques for mobile systems | |
McGraw | Software security and the building security in maturity model (BSIMM) | |
US9805019B2 (en) | System and method for universal structure preserving data masking | |
CN105975265A (en) | Device based on improved MVP mode | |
WO2016176162A1 (en) | Extensibility bundles for a cloud and devices suite | |
CN106845273B (en) | A kind of method and apparatus for protecting intelligent terminal local file | |
CN105653904A (en) | Application screen-locking processing method and apparatus as well as mobile terminal | |
Bott | Introducing Windows 10 for IT Professionals |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20161012 |
|
WD01 | Invention patent application deemed withdrawn after publication |