CN106022164A - Method and device for protecting information on intelligent terminal - Google Patents

Method and device for protecting information on intelligent terminal Download PDF

Info

Publication number
CN106022164A
CN106022164A CN201610330168.8A CN201610330168A CN106022164A CN 106022164 A CN106022164 A CN 106022164A CN 201610330168 A CN201610330168 A CN 201610330168A CN 106022164 A CN106022164 A CN 106022164A
Authority
CN
China
Prior art keywords
file
information
lock
unlocked
lock file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610330168.8A
Other languages
Chinese (zh)
Inventor
张文学
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen G'five Zhilian Technology Co Ltd
Original Assignee
Shenzhen G'five Zhilian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen G'five Zhilian Technology Co Ltd filed Critical Shenzhen G'five Zhilian Technology Co Ltd
Priority to CN201610330168.8A priority Critical patent/CN106022164A/en
Publication of CN106022164A publication Critical patent/CN106022164A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a method and a device for protecting information on an intelligent terminal so as to provide protection for information stored on the intelligent terminal and prevent an owner from leaking personal privacy and important information. The method comprises the following steps: displaying an unlocked folder and a locked folder on the desktop of the intelligent terminal; and when a user needs to protect certain type of information, receiving the information which needs to be protected by the user, and moving to the locked folder, wherein an access password needs to be input when the locked folder is accessed. Since the access password needs to be input when the locked folder is accessed, when the user moves the information which needs to be protected to the locked folder, a visitor needs to provide a corresponding access password to enter the folder to access information in the folder, the technical scheme provided by the invention can protect important information including personal privacy and the like in a smartphone when the smartphone of the owner is borrowed or lost, and loss of substance and/ or spirits due to the leakage of the personal privacy information of the owner can be avoided.

Description

A kind of method and apparatus protecting the upper information of intelligent terminal
Technical field
The invention belongs to moving communicating field, particularly relate to a kind of method protecting the upper information of intelligent terminal and dress Put.
Background technology
Developing rapidly of mobile communication technology, especially intelligent terminal's technology so that the intelligence such as smart mobile phone is eventually The function of end is from strength to strength, for example, it is possible to access the Internet (Internet) by intelligent terminal, permissible By the photographic head shooting photo that intelligent terminal is built-in, and can play with the playout software that intelligent terminal installs Audio frequency and video etc..In other words, PC (Personal Computer, PC), photographing unit and audio frequency and video are broadcast Put the function of a lot of electronic products such as device (such as, MP3, MP4 etc.) all by the corresponding function of intelligent terminal Replace.Just because of intelligent terminal instead of a lot of conventional electronic devices, intelligent terminal user often will much weigh The application wanted, such as, Mobile banking, Email, instant communication software (such as, QQ, wechat etc.), Net purchase client (such as, Taobao's client) etc. is arranged on intelligent terminal, the relevant letter applied to these Breath also can be stored on intelligent terminal.Certainly, intelligent terminal is also possible to ground only merely as memory device, Store some information such as picture, audio frequency and video.
Due to modern interpersonal contacts relatively frequently, closely, daily contacts are also possible to appearance and borrow By the situation of smart mobile phone, and the picture of storage on smart mobile phone, video and with Mobile banking, electronics postal The information that the application such as part, instant communication software, net purchase client is relevant may relate to individual privacy.In intelligence Mobile phone is borrowed under situation, and the above-mentioned information relating to individual privacy may arbitrarily be accessed, thus makes to owner Become material and/or spiritual loss.Additionally, when intelligent terminal surprisingly loses, these people are hidden Personal letter breath bare bare area can be exposed to the person of picking up, and can cause the material of owner, spirit or material and spirit equally On double loss.
But, for produced problem during the intelligent terminal such as above-mentioned use smart mobile phone, industry there is no solution party Case.
Summary of the invention
The present invention provides a kind of method and apparatus protecting the upper information of intelligent terminal, to preserve intelligent terminal is upper Information provide protection, prevent the leakage of owner's individual privacy, important information.
First aspect present invention provides a kind of method protecting the upper information of intelligent terminal, and described method includes:
Showing that on intelligent terminal's desktop unlocked file and lock file are pressed from both sides, described lock file is pressed from both sides Input is needed to access password when accessed;
When user needs to protect certain information, receive described user need to information to be protected move to described in Lock file press from both sides, described need information to be protected include in file, file or App any one or Several.
In conjunction with first aspect, in the first possible implementation of first aspect, described method also includes:
Described unlocked file and described lock file are pressed from both sides switching mutually.
In conjunction with the first possible implementation of first aspect, the realization that the second in first aspect is possible In mode, described described unlocked file and described lock file folder switchings mutually includes:
Entering described unlocked file and detecting after described user clicks on unlocked mark, by described not Lock file sandwiched is set to lock file folder, and presss from both sides in lock file described in entrance and detect user Click on after locking mark, the described sandwiched of lock file is set to unlocked file.
In conjunction with the implementation that the second of first aspect is possible, in the third possible realization of first aspect In mode, described described unlocked file is set as lock file folder include:
Lock file described in being provided for being set as accessing after lock file folder at described unlocked file Access password during folder.
In conjunction with first aspect, first aspect the first, the second of first aspect or the of first aspect Three kinds of possible implementations, in the 4th kind of possible implementation of first aspect, described method is also wrapped Include:
The information that described in shielding, lock file clip pack contains.
Second aspect present invention provides a kind of device protecting the upper information of intelligent terminal, and described device includes:
Display module, for showing that on intelligent terminal's desktop unlocked file and lock file press from both sides, institute Stating lock file folder needs input to access password when accessed;
Protection module, for when user needs to protect certain information, receiving described user will need to be protected Information move to described in lock file folder, described need information to be protected includes file, file or App In any one or a few.
In conjunction with second aspect, in the first possible implementation of second aspect, described device also includes:
Handover module, for pressing from both sides switching mutually by described unlocked file and described lock file.
In conjunction with the first possible implementation of second aspect, the realization that the second in second aspect is possible In mode, described handover module includes the first setup unit and the second setup unit, described first setup unit For entering described unlocked file and detecting after described user clicks on unlocked mark, by described not Lock file sandwiched is set to lock file folder, and described second setup unit is for having locked literary composition described in entering Part press from both sides and detect user click on lock mark after, the described sandwiched of lock file is set to unlocked file Folder.
In conjunction with the implementation that the second of second aspect is possible, in the third possible realization of second aspect In mode, described first setup unit includes:
Password arranges unit, is used for being provided for after described unlocked file is set as that lock file is pressed from both sides Access password when lock file is pressed from both sides described in access.
In conjunction with second aspect, second aspect the first, the second of second aspect or the of second aspect Three kinds of possible implementations, in the 4th kind of possible implementation of second aspect, described device also wraps Include:
Information screen module, is used for the information that described in shielding, lock file clip pack contains.
Knowable to the invention described above technical scheme, the desktop of intelligent terminal shows unlocked file and Lock file is pressed from both sides, owing to lock file folder needs input to access password when accessed, when needs are protected by user The information protected move to described in lock file folder time, visitor needs to provide the corresponding password that accesses to enter File accesses information therein, and therefore, the technical scheme that the present invention provides makes the smart mobile phone of owner exist When being borrowed or lose, the important informations such as individual privacy therein are protected, it is therefore prevented that owner Material that the leakage of people's privacy information causes and/or spiritual loss.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to enforcement In example or description of the prior art, the required accompanying drawing used is briefly described, it should be apparent that, describe below In accompanying drawing be only some embodiments of the present invention, for those of ordinary skill in the art, do not paying On the premise of going out creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is that the flow process that realizes of the method for the upper information of protection intelligent terminal that the embodiment of the present invention one provides is illustrated Figure;
Fig. 2 is showing unlocked file on intelligent terminal's desktop and having added of the embodiment of the present invention two offer The schematic diagram of lock file;
Fig. 3 is the interface schematic diagram after the unlocked file of entrance that the embodiment of the present invention three provides;
Fig. 4 is the interface schematic diagram after the entrance lock file folder that the embodiment of the present invention four provides;
Fig. 5 is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention five provides;
Fig. 6 is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention six provides;
Fig. 7 is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention seven provides;
Fig. 8 is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention eight provides;
Fig. 9-a is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention nine provides;
Fig. 9-b is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention ten provides Figure;
Fig. 9-c is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention 11 provides Figure;
Fig. 9-d is the structural representation of the device of the upper information of protection intelligent terminal that the embodiment of the present invention 12 provides Figure.
Detailed description of the invention
For making the goal of the invention of the present invention, feature, the advantage can be the most obvious and understandable, below will knot Close the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely retouched State, it is clear that described embodiment is only a part of embodiment of the present invention, and not all embodiments.Base Embodiment in the present invention, those of ordinary skill in the art are obtained under not making creative work premise The every other embodiment obtained, broadly falls into the scope of protection of the invention.
The embodiment of the present invention provides a kind of method protecting the upper information of intelligent terminal, and described method includes: in intelligence Can show that unlocked file and lock file are pressed from both sides on terminal desktop;When user needs to protect certain information, Receive described user need to information to be protected move to described in lock file folder, described need information to be protected Including any one or a few in file, file or App, described lock file is clipped in accessed Time need to input access password.The embodiment of the present invention also provides for protecting accordingly the device of the upper information of intelligent terminal. It is described in detail individually below.
Refer to accompanying drawing 1, be the reality of the method for the upper information of protection intelligent terminal that the embodiment of the present invention one provides Existing flow process.The method of the upper information of protection intelligent terminal of accompanying drawing 1 example can be used for smart mobile phone, panel computer Deng intelligent terminal, mainly include the following steps that S101 and step S103:
S101, shows that on intelligent terminal's desktop unlocked file and lock file are pressed from both sides.
In embodiments of the present invention, file can be divided into unlocked file and lock file is pressed from both sides also It is shown on the desktop of intelligent terminal, as shown in Figure 2.Both files are except can be with explanatory note Outside its type, such as, under file, illustrate that this document folder is not with word " unlocked file " Lock file is pressed from both sides, and illustrates that this document folder is to have locked literary composition with word " lock file folder " under file Part presss from both sides, it is also possible to draws a mark on the folder of lock file, such as, as shown in Figure 2, locks A lock locked is drawn, to represent that this document folder is that lock file has been pressed from both sides on file.
In order to be further ensured that safety, in embodiments of the present invention, lock file clip pack can be shielded to contain Information, in other words, lock file clip pack contain which information, be can not for intelligent terminal's user Seeing, user does not knows wherein comprise which content, and as shown in Figure 2, lock file folder is the most Show a lock locked, and unlocked file, intelligent terminal's user is it can also be seen that wherein comprise Information, such as, comprise which App.
S102, when user needs to protect certain information, receiving user need to information to be protected move to add Lock file.
In embodiments of the present invention, user can be the owner user of intelligent terminal, it is also possible to be authorized Other validated users in addition to owner user, and need information to be protected to include file, file or App In any one or a few.Such as, if owner user does not wants to allow other people see the pictures such as individual's description, These pictures can be dragged to lock file folder;For another example, if owner user is not desired to net purchase information by other people See, can be by net purchase client, such as this App icon of Taobao's client is dragged to lock file folder. Owing to lock file folder needs input to access password when accessed, and this access password is generally used by owner Family arrange, therefore, smart mobile phone lent other people use time, without owner allow, be to cannot be introduced into The content that lock file folder access wherein comprises.
From the protection intelligent terminal of above-mentioned accompanying drawing 1 example, the method for information understands, at the desktop of intelligent terminal The unlocked file of upper display and lock file folder, owing to lock file folder needs input to visit when accessed Ask password, when user need to information to be protected move to described in lock file folder time, visitor need provide The corresponding password that accesses could enter file access information therein, therefore, the protection intelligence of accompanying drawing 1 example Can in terminal the method for information make the smart mobile phone of owner when being borrowed or lose, to individual therein The important informations such as privacy are protected, it is therefore prevented that the material that the leakage of owner's individual privacy information causes and/ Or spiritual loss.
In embodiments of the present invention, it is also possible to by unlocked file and lock file folder switching mutually, i.e. Unlocked file is changed to lock file folder, and the folder of lock file is changed to unlocked file Folder.
Specifically, for unlocked file being switched to lock file folder, can be unlocked in entrance File also detects after user clicks on unlocked mark, and unlocked file is set as lock file folder. As shown in Figure 3, after user enters unlocked file, click on the unlocked mark of display on its interface, For example, it may be a lock opened as shown in Figure 3.Detect user in system and click on unlocked mark After knowledge, unlocked file being just set as lock file folder, its detailed process is: user setup is used for Described in accessing after described unlocked file is set as the folder of lock file lock file folder time access close Code.After unlocked file being set as, lock file is pressed from both sides, unlocked mark becomes by locking mark, For example, it may be a lock locked.
For the folder of lock file is switched to unlocked file, can be specifically to enter lock file Press from both sides and detect user click on lock mark after, lock file sandwiched is set to unlocked file.As Shown in accompanying drawing 4, user enters lock file folder by inputting correct access password, detects in system User clicks on and has locked mark, such as, after a lock locked, just lock file sandwiched be set to and do not add Lock file.After lock file sandwiched is set to unlocked file, any user can will wherein comprise Information, such as, file, file or App therefrom haul out.
It should be noted that press from both sides for lock file, the access needing input to arrange in advance when accessing is close Code.When input error is higher than set point number, such as when 3 times, system can lock this lock file and press from both sides one section Time, such as 90 seconds, after when continuing with mistake by cumulative locking time.Entering lock file folder After, the information that can will wherein comprise, such as, file, file or App removal.
In order to manage lock file folder further, in embodiments of the present invention, lock file folder is being entered After, its interface provides the interface of operational access password, and user can arrange, revise or release access password. Amendment access password time, if repeatedly input error, system by locking this lock file press from both sides certain time, Again this document folder can not be carried out any operation the most within a certain period of time, access password including input, thus reach The access password set to protection user, prevents by the purpose of malicious modification.
In order to improve Consumer's Experience, when user enters the desktop of smart mobile phone and unlocks lock file folder the most After i.e. inputting correct access password, it is not necessary to input accesses password and just can access lock file folder again, Until working as the interface being switched to a non-desktop from desktop, such as, as being switched to locking screen interface, going out Screen or other App etc., this lock file folder can be locked again.
Refer to accompanying drawing 5, be the knot of the device of the upper information of protection intelligent terminal that the embodiment of the present invention five provides Structure schematic diagram.For convenience of description, illustrate only the part relevant to the embodiment of the present invention.Accompanying drawing 5 example The device of the upper information of protection intelligent terminal can be the upper information of protection intelligent terminal that previous embodiment provides The executive agent of method, it can be intelligent terminal or functional module therein.The protection of accompanying drawing 5 example The device of the upper information of intelligent terminal mainly includes display module 501 and protection module 502, and each functional module is detailed Carefully it is described as follows:
Display module 501, for showing that on intelligent terminal's desktop unlocked file and lock file press from both sides, Wherein, lock file folder needs input to access password when accessed.
Protection module 502, for when user needs to protect certain information, receiving user will need to be protected Information moves to lock file folder, and need that information to be protected includes in file, file or App is any One or more.
It should be noted that the embodiment of the device of the upper information of the protection intelligent terminal of the figures above 5 example In, the division of each functional module is merely illustrative of, can be such as corresponding hard as required in actual application The configuration requirement of part or the convenient consideration of the realization of software, and above-mentioned functions is distributed by different function moulds Block completes, and the internal structure of the device of the upper information of intelligent terminal described will be protected to be divided into different function moulds Block, to complete all or part of function described above.And, in actual application, in the present embodiment Corresponding functional module can be to be realized by corresponding hardware, it is also possible to is performed the softest by corresponding hardware Part completes, and such as, aforesaid display module, can be to have the aforementioned display on intelligent terminal's desktop of execution Unlocked file and lock file folder hardware, such as display, it is also possible to be able to carry out mutually accrued Calculation machine program thus complete general processor or other hardware devices of aforementioned function;The most aforesaid protection Module, can be carried out, when user needs to protect certain information, receiving described user and needing letter to be protected Cease the hardware of lock file folder described in moving to, such as protector, it is also possible to be to be able to carry out corresponding computer Program thus complete the general processor of aforementioned function or other hardware devices (this specification provide each Embodiment all can apply foregoing description principle).
From the protection intelligent terminal of above-mentioned accompanying drawing 5 example, the device of information understands, and display module is in intelligence eventually Show on the desktop of end that unlocked file and lock file are pressed from both sides, owing to lock file is pressed from both sides when accessed Access password need to be inputted, when user need to information to be protected move to described in lock file folder time, visitor Need to provide the corresponding password that accesses could enter file access information therein, therefore, accompanying drawing 5 example The device of the upper information of protection intelligent terminal make the smart mobile phone of owner when being borrowed or lose, to it In the important information such as individual privacy protected, it is therefore prevented that the leakage of owner's individual privacy information causes Material and/or spiritual loss.
The device of the upper information of protection intelligent terminal of accompanying drawing 5 example can also include handover module 601, as attached The device of the upper information of protection intelligent terminal that the embodiment of the present invention six shown in Fig. 6 provides.Handover module 601 is used In by unlocked file and lock file folder switching mutually.
The handover module 601 of accompanying drawing 6 example can also include the first setup unit 701 and the second setup unit 702, the device of the upper information of protection intelligent terminal that the embodiment of the present invention seven provides as shown in Figure 7, wherein:
First setup unit 701, for entering unlocked file and detecting user and click on unlocked mark After knowledge, described unlocked file is set as lock file folder;
Second setup unit 702, for enter lock file press from both sides and detects user click locked mark After knowledge, the described sandwiched of lock file is set to unlocked file.
First setup unit 701 of accompanying drawing 7 example can include that password arranges unit 801, such as accompanying drawing 8 institute Show the device of the upper information of protection intelligent terminal that the embodiment of the present invention eight provides.Password arrange unit 801 for It is provided for the access when unlocked file is set as after lock file is pressed from both sides accessing lock file folder close Code.
The device of the upper information of protection intelligent terminal of accompanying drawing 5 to accompanying drawing 8 any example can also include information screen Cover module 901, such as the guarantor that accompanying drawing 9-a to the embodiment of the present invention nine to embodiment 12 shown in accompanying drawing 9-d provides Protect the device of the upper information of intelligent terminal.Information screen module 901 is for shielding the letter that lock file clip pack contains Breath.
It should be noted that the contents such as mutual, the execution process of information between each module/unit of said apparatus, Due to the inventive method embodiment based on same design, its technique effect brought and the inventive method are implemented Example is identical, and particular content can be found in the narration in the inventive method embodiment, and here is omitted.
Those of ordinary skill in the art are it is to be appreciated that combine respectively showing of the embodiments described herein description The unit of example and algorithm steps, it is possible to come with the combination of electronic hardware or computer software and electronic hardware Realize.These functions perform with hardware or software mode actually, depend on the application-specific of technical scheme And design constraint.Each specifically should being used for can be used different methods to realize by professional and technical personnel Described function, but this realization is it is not considered that beyond the scope of this invention.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, and foregoing description The specific works process of system, device and unit, be referred to the corresponding process in preceding method embodiment, Do not repeat them here.
In several embodiments provided herein, it should be understood that disclosed system, device and side Method, can realize by another way.Such as, device embodiment described above is only schematically , such as, the division of described unit, be only a kind of logic function and divide, actual can have when realizing another Outer dividing mode, the most multiple unit or assembly can in conjunction with or be desirably integrated into another system, or Some features can be ignored, or does not performs.Another point, shown or discussed coupling each other or straight Connect coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit or communication connection, Can be electrical, machinery or other form.
The described unit illustrated as separating component can be or may not be physically separate, as The parts that unit shows can be or may not be physical location, i.e. may be located at a place, or Can also be distributed on multiple NE.Can select therein some or all of according to the actual needs Unit realizes the purpose of the present embodiment scheme.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, Can also be that unit is individually physically present, it is also possible to two or more unit are integrated in a unit In.
If described function realizes and as independent production marketing or use using the form of SFU software functional unit Time, can be stored in a computer read/write memory medium.Based on such understanding, the skill of the present invention Part that prior art is contributed by art scheme the most in other words or the part of this technical scheme can be with The form of software product embodies, and this computer software product is stored in a storage medium, if including Dry instruction is with so that a computer equipment (can be personal computer, server, or the network equipment Deng) perform all or part of step of method described in each embodiment of the present invention.And aforesaid storage medium bag Include: USB flash disk, portable hard drive, read only memory (ROM, Read-Only Memory), random access memory are deposited Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can store program generation The medium of code.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited to This, any those familiar with the art, in the technical scope that the invention discloses, can readily occur in Change or replacement, all should contain within protection scope of the present invention.Therefore, protection scope of the present invention should Described it is as the criterion with scope of the claims.

Claims (10)

1. the method protecting the upper information of intelligent terminal, it is characterised in that described method includes:
Showing that on intelligent terminal's desktop unlocked file and lock file are pressed from both sides, described lock file is pressed from both sides Input is needed to access password when accessed;
When user needs to protect certain information, receive described user need to information to be protected move to described in Lock file press from both sides, described need information to be protected include in file, file or App any one or Several.
2. the method for claim 1, it is characterised in that described method also includes:
Described unlocked file and described lock file are pressed from both sides switching mutually.
3. method as claimed in claim 2, it is characterised in that described by described unlocked file and institute State lock file folder switching mutually to include:
Entering described unlocked file and detecting after described user clicks on unlocked mark, by described not Lock file sandwiched is set to lock file folder, and presss from both sides in lock file described in entrance and detect user Click on after locking mark, the described sandwiched of lock file is set to unlocked file.
4. method as claimed in claim 3, it is characterised in that described by the setting of described unlocked file Include for the folder of lock file:
Lock file described in being provided for being set as accessing after lock file folder at described unlocked file Access password during folder.
5. the method as described in Claims 1-4 any one, it is characterised in that described method also includes:
The information that described in shielding, lock file clip pack contains.
6. the device protecting the upper information of intelligent terminal, it is characterised in that described device includes:
Display module, for showing that on intelligent terminal's desktop unlocked file and lock file press from both sides, institute Stating lock file folder needs input to access password when accessed;
Protection module, for when user needs to protect certain information, receiving described user will need to be protected Information move to described in lock file folder, described need information to be protected includes file, file or App In any one or a few.
7. device as claimed in claim 6, it is characterised in that described device also includes:
Handover module, for pressing from both sides switching mutually by described unlocked file and described lock file.
8. device as claimed in claim 7, it is characterised in that described handover module includes the first setting list Unit and the second setup unit;
Described first setup unit, for entering described unlocked file and detecting described user click After unlocked mark, described unlocked file is set as lock file folder;
Described second setup unit, for enter described in lock file press from both sides and detects user click add After lock mark, the described sandwiched of lock file is set to unlocked file.
9. device as claimed in claim 8, it is characterised in that described first setup unit includes:
Password arranges unit, is used for being provided for after described unlocked file is set as that lock file is pressed from both sides Access password when lock file is pressed from both sides described in access.
10. the device as described in claim 6 to 9 any one, it is characterised in that described device also includes:
Information screen module, is used for the information that described in shielding, lock file clip pack contains.
CN201610330168.8A 2016-05-18 2016-05-18 Method and device for protecting information on intelligent terminal Pending CN106022164A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610330168.8A CN106022164A (en) 2016-05-18 2016-05-18 Method and device for protecting information on intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610330168.8A CN106022164A (en) 2016-05-18 2016-05-18 Method and device for protecting information on intelligent terminal

Publications (1)

Publication Number Publication Date
CN106022164A true CN106022164A (en) 2016-10-12

Family

ID=57097727

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610330168.8A Pending CN106022164A (en) 2016-05-18 2016-05-18 Method and device for protecting information on intelligent terminal

Country Status (1)

Country Link
CN (1) CN106022164A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106599700A (en) * 2016-11-18 2017-04-26 北京奇虎科技有限公司 Method for processing application file and mobile communication terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1521418A2 (en) * 2003-10-03 2005-04-06 Nec Corporation Cellular phone and mail security processing method
CN101382981A (en) * 2008-09-23 2009-03-11 宇龙计算机通信科技(深圳)有限公司 File encrypting and decrypting method and apparatus and mobile terminal
CN101459723A (en) * 2007-12-14 2009-06-17 希姆通信息技术(上海)有限公司 Secret keeping processing method for mobile phone information
CN103488918A (en) * 2013-09-18 2014-01-01 广东欧珀移动通信有限公司 Application encrypting method and device for intelligent terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1521418A2 (en) * 2003-10-03 2005-04-06 Nec Corporation Cellular phone and mail security processing method
CN101459723A (en) * 2007-12-14 2009-06-17 希姆通信息技术(上海)有限公司 Secret keeping processing method for mobile phone information
CN101382981A (en) * 2008-09-23 2009-03-11 宇龙计算机通信科技(深圳)有限公司 File encrypting and decrypting method and apparatus and mobile terminal
CN103488918A (en) * 2013-09-18 2014-01-01 广东欧珀移动通信有限公司 Application encrypting method and device for intelligent terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106599700A (en) * 2016-11-18 2017-04-26 北京奇虎科技有限公司 Method for processing application file and mobile communication terminal

Similar Documents

Publication Publication Date Title
CN103891242B (en) System and method for profile based filtering of outgoing information in a mobile environment
CN109818935A (en) User authority control method and device, storage medium, computer equipment
CN107735807A (en) It is revoked the intelligence deletion of data
Muftic et al. Security architecture for open distributed systems
Epifani et al. Learning iOS forensics
Misra et al. Android security: attacks and defenses
US20150312249A1 (en) Password retrieval system and method involving token usage without prior knowledge of the password
CN103577732A (en) Information processing method and device and electronic device
CN107506637A (en) Information displaying method and device, terminal and readable storage medium storing program for executing
CN109657427A (en) The method and device of permission control
Vegesna Incorporating Data Mining Approaches and Knowledge Discovery Process to Cloud Computing for Maximizing Security
Mueller Security for Web Developers: Using JavaScript, HTML, and CSS
CN104169938A (en) Permission management method and permission management device
CN107122656A (en) It is a kind of that the outside method and apparatus debugged are prevented by Self-debugging
US20220164463A1 (en) Business data protection for running tasks in computer system
CN109145621A (en) Document management method and device
CN106022164A (en) Method and device for protecting information on intelligent terminal
Jaramillo et al. Virtualization techniques for mobile systems
McGraw Software security and the building security in maturity model (BSIMM)
US9805019B2 (en) System and method for universal structure preserving data masking
CN105975265A (en) Device based on improved MVP mode
WO2016176162A1 (en) Extensibility bundles for a cloud and devices suite
CN106845273B (en) A kind of method and apparatus for protecting intelligent terminal local file
CN105653904A (en) Application screen-locking processing method and apparatus as well as mobile terminal
Bott Introducing Windows 10 for IT Professionals

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161012

WD01 Invention patent application deemed withdrawn after publication