CN106295387A - A kind of safety protecting method and device - Google Patents

A kind of safety protecting method and device Download PDF

Info

Publication number
CN106295387A
CN106295387A CN201510303282.7A CN201510303282A CN106295387A CN 106295387 A CN106295387 A CN 106295387A CN 201510303282 A CN201510303282 A CN 201510303282A CN 106295387 A CN106295387 A CN 106295387A
Authority
CN
China
Prior art keywords
user
mobile terminal
entry port
safety container
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510303282.7A
Other languages
Chinese (zh)
Inventor
雷元平
周佳
杜国楹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Eren Eben Information Technology Co Ltd
Original Assignee
Beijing Eren Eben Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Eren Eben Information Technology Co Ltd filed Critical Beijing Eren Eben Information Technology Co Ltd
Priority to CN201510303282.7A priority Critical patent/CN106295387A/en
Publication of CN106295387A publication Critical patent/CN106295387A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a kind of safety protecting method for mobile terminal and device, the method includes: set up a safety container;It is provided for the entry port entering this safety container to present its interior information, and hides this entry port;Receive the entrance request entering this safety container of user's input, and resolve this entrance request, if meeting, then enter this safety container and present the information in this safety container.Under normal circumstances, the entry port of this safety container is stashed, when user needs to check the information in this safety container, first input entrance request is verified, when this entrance request is consistent with the entrance request preset, i.e. it is verified, enters this safety container.Then, even if the mobile terminal of user oneself is required by other people to check by force, owing to concealing the entry port of safety container, will not be found on this mobile terminal, with the presence of safety container, more not result in the leakage of private information in safety container.

Description

A kind of safety protecting method and device
Technical field
The present invention relates to field of computer technology, particularly to a kind of safety protecting method and device.
Background technology
In prior art, it will usually system is placed into an isolation with safety-related sensitive applications Safety container (such as sandbox) in, outside data in this safety container and application program are all with safety container Isolation of system, can effectively prevent the application process record outside safety container or intercept entering in safety container The information of journey, thus reach security protection and secret protection dual-use function.
Meanwhile, the raising day by day required information security along with people, the requirement of secret protection is also got over by user Coming the highest, most of users are it is not desirable that the sensitive information etc. oneself being placed in safety container is obtained by the 3rd people Knowing, usually oneself mobile terminal and safety container thereof are respectively provided with password, but at some in particular cases, The mobile terminal of user oneself may be required by other people to check by force, and this situation also can be the most awkward, User has to tell that password allows other people consult, but may have the office of some cores, social activity etc. in safety container Sensitive information, then can cause leakage of private information, bring more puzzlement to user.
Therefore, even if how to guarantee that the mobile terminal of user is required by other people to check by force also do not result in privacy Information leakage, has become as problem demanding prompt solution in the industry.
Summary of the invention
In view of this, the present invention provides a kind of safety protecting method and device, is applied in mobile terminal, can Even if guaranteeing that the mobile terminal of user is required by other people to check the privacy also not resulting in safety container by force Information leakage.
The embodiment of the present invention provides a kind of safety protecting method, for mobile terminal, including:
Set up a safety container;
It is provided for entering the entry port of this safety container, and hides this entry port;
Receive the entrance request entering this safety container of user's input, and resolve this entrance request, if meeting, Then enter this safety container and present the information in this safety container.
Further, at the described entry port being provided for entering this safety container this upstream end hiding After the step of mouth, also include:
Receiving the alert requests of user's input, and resolve this alert requests, if meeting, then presenting user can look for Mode to this entry port.
Further, described hide this entry port step particularly as follows:
Detect this mobile terminal the most whether to be positioned at and preset geographic area, the most automatically hide this entrance Port;
And/or, whether detection current time falls in a Preset Time region, the most automatically hides this and enters Inbound port.
Further, described hide this entry port step particularly as follows:
The first numeral sequence is inputted by the dialing keyboard of mobile terminal, if coincideing with default digital sequence, Then hide this entry port;
Or, by unconventional first hard/soft-key button tapping mobile terminal, if tapping rule with default It coincide, then hide this entry port.
Further, described hide this entry port step particularly as follows:
By mobile terminal calling or send short messages to the first fixed number, if the first fixed number with preset number Code coincide, then hide this entry port.
Further, described receive user input alert requests and resolve this alert requests, when meeting then Present user can find this entry port mode step particularly as follows:
This alert requests is to input the second numeral sequence by the dialing keyboard of mobile terminal to produce, if with in advance If digital sequence coincide, present user the most on the screen of the mobile terminal and can find the one of this entry port Or various ways;
Or, this alert requests is to be produced by unconventional second hard/soft-key button tapping mobile terminal, If coincideing with the default rule that taps, presenting user the most on the screen of the mobile terminal and can find this entry port One or more modes;
Or, this alert requests is user is produced by mobile terminal calling or send short messages to the second fixed number Raw, meeting if resolving this alert requests, presenting user the most on the screen of the mobile terminal and can find this upstream end One or more modes of mouth.
Further, this entrance is asked and is resolved in the entrance entering this safety container of the described user of reception input Request, enter this safety container when meeting and present the step of the information in this safety container, including:
After resolving this entrance request, show verification tip information, to point out described user's input validation to believe Breath;
Obtain the checking information of described user input, the checking information described user inputted and preset checking letter Breath mates, if the checking information of described user input and described preset checking information match, then enters This safety container also presents the information in this safety container.
The embodiment of the present invention provides a kind of safety device, is built in mobile terminal, including:
Set up module: set up a safety container;
Module is set: be provided for entering the entry port of this safety container;
Hide module: control to hide this entry port;
First parsing module: receive the entrance request entering this safety container of user's input, and resolve this and enter Enter request;
First presents module: when resolving this entrance request and meeting, control enter this safety container and present this Information in safety container.
Further, this safety device also includes:
Second parsing module: receive the prompting being used for reminding user how to find this entry port of user's input Request, and resolve this alert requests;
Second presents module: if when resolving this alert requests and meeting, controls to present user and can find this entrance The mode of port.
Further, in described hiding module,
Detect this mobile terminal the most whether to be positioned at and preset geographic area, the most automatically hide this entrance Port;
And/or, whether detection current time falls in a Preset Time region, the most automatically hides this and enters Inbound port.
Further, in described hiding module,
The first numeral sequence is inputted by the dialing keyboard of mobile terminal, if coincideing with default digital sequence, Then hide this entry port;
Or, by unconventional first hard/soft-key button tapping mobile terminal, if tapping rule with default It coincide, then hide this entry port.
Further, in described hiding module,
By mobile terminal calling or send short messages to the first fixed number, if the first fixed number with preset number Code coincide, then hide this entry port.
Further, in described second parsing module, receive user defeated by the dialing keyboard of mobile terminal The alert requests entering the second numeral sequence and produce, if coincideing with default digital sequence, then second presents mould Block controls to present user on the screen of the mobile terminal can find one or more modes of this entry port;
Or, in described second parsing module, receive user and tap the second of mobile terminal by unconventional Firmly/soft-key button and the alert requests that produces, if coincideing with the default rule that taps, then second presents module control System presents user on the screen of the mobile terminal and can find one or more modes of this entry port;
Or, in described second parsing module, receive user and by mobile terminal calling or send short messages to second Fixed number and the alert requests that produces, meet if resolving this alert requests, then present module control second Present user on the screen of the mobile terminal and can find one or more modes of this entry port.
Further, in described first parsing module, after resolving this entrance request, display checking carries Show information, to point out described user's input validation information;
Obtain the checking information of described user input, the checking information described user inputted and preset checking letter Breath mates;
Present in module first, if the checking information of described user input and described preset checking information phase Join, this safety container will be entered and present the information in this safety container.
Safety protecting method according to embodiments of the present invention and device, set up a safety container, in normal condition Under, the entry port of this safety container is stashed, needs to check the information in this safety container user Time, first input entrance request is verified, when this entrance request is consistent with the entrance request preset, i.e. tests Card passes through, and could enter this safety container.Use the special mode of entrance of the present embodiment, even if user is certainly Oneself mobile terminal may be required by other people to check, owing to concealing the upstream end of safety container by force Mouthful, will not be found on this mobile terminal with the presence of safety container, more not result in safety container Leakage of private information so that mobile phone users can be relievedly such as sensitive application journeys such as bank clients Sequence, or as the private data such as picture and contact person is positioned in safety container.
For the above and other objects, features and advantages of the present invention can be become apparent, cited below particularly preferably Embodiment, and coordinate institute's accompanying drawings, it is described in detail below.
Accompanying drawing explanation
The flow chart of a kind of safety protecting method that Fig. 1 provides for first embodiment of the invention;
The flow chart of a kind of safety protecting method that Fig. 2 provides for second embodiment of the invention;
The flow chart of a kind of safety protecting method that Fig. 3 provides for third embodiment of the invention;
The module diagram of a kind of safety device that Fig. 4 provides for fourth embodiment of the invention;
The module diagram of a kind of safety device that Fig. 5 provides for fifth embodiment of the invention;
Fig. 6 is second to present module and control the user that presents and can find this entrance in fifth embodiment of the invention The schematic diagram of the mode of port.
Detailed description of the invention
By further illustrating the technological means and effect that the present invention taked by realizing predetermined goal of the invention, with Lower combination accompanying drawing and preferred embodiment, to according to the detailed description of the invention of the present invention, structure, feature and merit thereof Effect, after describing in detail such as.
Safety protecting method in the present invention can be applicable to be preinstalled with Android (Android) or other similar behaviour Make in the mobile terminal of system, such as: be preinstalled with the smart mobile phone of android system, panel computer etc..
First embodiment
Referring to Fig. 1, first embodiment of the invention provides a kind of safety protecting method, and the method includes:
Step S110: set up a safety container;
Specifically, safety container refers to isolate in the application layer of operating system, i.e. share a kernel and The intermediate layer of operating system, and interface and application program can divide into two set processes, the effect that such user sees Fruit similarly is two systems.Because the data base that this two sets application program each uses is different, so table It is now that the data such as the picture seen outside safety container of data isolation, i.e. user and contact person are followed at safety container In it is seen that different.Isolate it is to be appreciated that safety container may also mean that in intermediate layer, i.e. Share a kernel, on kernel, be further added by one layer of intermediate layer, original intermediate layer and the centre newly increased The respective corresponding a set of interface of layer and application program, within one of them is defined as safety container, another is then Outside safety container.
Step S120: be provided for the entry port entering this safety container to present its interior information, and Hide this entry port;
In this step S120, first it is provided for the entrance entering this safety container to present its interior information Port, this entry port is generally preferred to wiget, why hides this wiget, is such in order to realize Purpose: even if the mobile terminal of user oneself may be required by other people to check by force, also will not be found With the presence of safety container on this mobile terminal.
Certainly, this entry port include and be not limited to the wiget being positioned on touch screen, soft dialing keyboard, one Specific region etc..
Step S130: receive the entrance request entering this safety container of user's input, and resolve this entrance Request, if meeting, then enters this safety container and presents the information in this safety container.
In this step S130, specifically, user's input the most on mobile terminals enters entering of this safety container Enter request, after this mobile terminal receives this entrance request, resolve this entrance request, such as step S1301; The entrance request the most then judging this entrance request and preset is the most consistent, meet, such as step S1302; As met, then enter this safety container, and present the information in this safety container, such as step S1303.
In this step S1301, user inputs the side entering request entering this safety container on mobile terminals Formula can be also other preset operation triggering modes, as included and be not limited to double-clicking the volume key of mobile terminal, length By power key, whipping mobile terminal, the continuous several times appointment position tapping mobile terminal screen etc..Wherein, The particular content of this preset operation also can be by User Defined.
In this step S1303, when entering safety container, can be set to be directly entered peace according to user's request Full container presents content information therein, or, first showing access into the entry port of safety container, user is led to again Cross and tap this entry port entrance safety container, or, even may be configured as first showing access into entering of safety container Inbound port, user inputs security password again could enter safety container.
After entering safety container, hang up the process outside this safety container, can effectively prevent outside safety container Application process record or intercept the information of process in container, thus play application in protection safety container And the effect of data etc. so that mobile phone users can be relievedly such as sensitive application journeys such as bank clients Sequence, or as the private data such as picture and contact person is positioned in safety container.
Safety protecting method according to embodiments of the present invention and device, under normal circumstances, by this safety container Entry port stash, when user needs to check the information in this safety container, first input enter please Ask and verify, when this entrance request is consistent with the entrance request preset, is i.e. verified, could enter This safety container.Use the special mode of entrance of the present embodiment, even if the mobile terminal of user oneself may Can be required by force to check by other people, owing to concealing the entry port of safety container, will not be found in With the presence of safety container on this mobile terminal, more do not result in the leakage of private information in safety container, will not More puzzlement is brought to user.
In other embodiments, the step hiding this entry port can specifically be: arranges a position detection step Suddenly, detect this mobile terminal and the most whether be positioned at and preset geographic area, the most automatically hide this entrance Port;And/or, a time detecting step is set, whether detection current time falls into a Preset Time region In, the most automatically hide this entry port.As, the mobile terminal of oneself can be set to every day by Zhang San 19:00-09:00 hides the entry port of safety container in distance man has an area of 200 meters automatically.
In other embodiments, can by the dialing keyboard of mobile terminal input the first numeral sequence, if with in advance If digital sequence coincide, then hide this entry port;Or, mobile terminal can be tapped by unconventional First hard/soft-key button, if coincideing with the default rule that taps, then hide this entry port.
In other are implemented, also by mobile terminal calling or send short messages to the first fixed number, if this One fixed number and the numbers match preset, then hide this entry port.In the present embodiment, the most predeterminable First fixed number, the first fixed number can be a spacing, it is also possible to for a numeric string of any digit, As long as user one calls this first fixed number or sends short messages to this first fixed number, mobile terminal can be examined Survey and identify thus hide the entry port of safety container.
Second embodiment
Referring to Fig. 2, second embodiment of the invention provides a kind of safety protecting method, and the method includes:
Step S210: set up a safety container;
Step S220: be provided for the entry port entering this safety container to present its interior information, and Hide this entry port;
Step S230: receive the alert requests of user's input, and resolve this alert requests, if meeting, then Present user and can find the mode of this entry port;This alert requests is used for reminding how user finds this entrance Port.
In this step S230, why the step for that how prompting user finds this entry port is set, is In order to improve privacy further, under normal circumstances, the entry port of this safety container stashes, Only when user needs to check the information in this safety container, just need to present this entrance on mobile terminals Port, but, user the most usually can forget the most just to find this entry port, then, is just provided with this Step S230, when forgetting, user can input alert requests, when this alert requests please with the prompting preset When asking consistent, now will present user and can find the mode of this entry port, generally, user can look for Mode to this entry port is multiple, and user may select any of which.
Step S240: receive user and select the selected request of any one in which and respond;
Step S2501: receive user and enter the entrance request of this safety container, and resolve this entrance request; This entrance request inputs according to the preset rules of chosen mode;
Step S2502: judge whether to meet;
Step S2503: if meeting, then enter this safety container and present the information in this safety container.
In step S240, user can select any one mode that can find this entry port, once selectes, Mobile terminal begins to response and presents this entry port, then, in step S2501, will receive user Entrance request according to the preset rules input of chosen that mode, say, that each upstream end The mode of mouth has all given tacit consent to preset rules, and such as, the mode of entry port is the dial key by mobile terminal Dish input the first numeral sequence, or, by unconventional first hard/soft-key button tapping mobile terminal, or, By mobile terminal calling or send short messages to first fixed number etc., then, need to follow every kind respectively and enter The preset rules of inbound port inputs entrance request to verify.
In this second embodiment, i.e. comprise secondary request checking, elaborate explanation as follows:
Under normal circumstances, the entry port of this safety container is stashed, need to enter this peace user During full container, first carrying out in first time requests verification, i.e. step S230, first input alert requests is tested Card, when this alert requests is consistent with the alert requests preset, is i.e. verified, now will present user's energy Find the mode of this entry port;Then user selects any of which mode to carry out second time requests verification, I.e. step S250 (comprises S2501, S2502, S2503), presetting according to chosen that mode Rule input enters asks to verify, when the request that enters of input is asked consistent with the entrance preset, I.e. it is verified, this safety container could be entered.
In other embodiments, receive user's input for reminding how user finds this entry port Alert requests also resolves this alert requests, then presents user when meeting and can find the mode of this entry port In step, particularly as follows: this alert requests be input the second numeral sequence by the dialing keyboard of mobile terminal and Produce, if coincideing with default digital sequence, presenting user the most on the screen of the mobile terminal and this can be found to enter One or more modes of inbound port;Or, this alert requests is to tap the of mobile terminal by unconventional Two hard/soft-key buttons and produce, if coincideing with the default rule that taps, present the most on the screen of the mobile terminal User can find one or more modes of this entry port;Or, this alert requests is that user is by mobile whole End calls or sends short messages and produces to the second fixed number, meets if resolving this alert requests, then mobile whole Present user on the screen of end and can find one or more modes of this entry port.
3rd embodiment
Referring to Fig. 3, third embodiment of the invention provides a kind of safety protecting method, the 3rd embodiment In step S310, S320 and step S110 in first embodiment, S120 identical, but in step S330 In, i.e. described receive user input enter this safety container entrance ask and resolves this entrance ask, In entering this safety container when meeting and presenting the step of the information in this safety container, including:
Step S3301: receive the entrance request entering this safety container of user's input, and resolve this entrance
Request;
Step S3302: display verification tip information, to point out user input validation information;
Step S3303: obtain the checking information of user's input, tests the checking information that user inputs with preset Card information is mated;
Step S3304: judge whether coupling;
Step S3304: if the checking information of user's input and described preset checking information match, then this enters Enter request to meet, this safety container will be entered and present the information in this safety container.
Wherein, checking information type can be, but not limited to include: character string password, graphical passwords, fingerprint, Iris etc..In this third embodiment, further increase testing of secret, safe class, only user's input Card information and preset checking information match, could enter this safety container and present the letter in this safety container Breath.
Embodiment four
Referring to Fig. 4, fourth embodiment of the invention provides a kind of safety device, is built in mobile whole End, this device includes:
Set up module 110: set up a safety container;
Module 120 is set: be provided for the entry port entering this safety container to present its interior information;
Hide module 130: control to hide this entry port;
First parsing module 140: receive the entrance request entering this safety container of user's input, and resolve This entrance is asked;
First presents module 150: when resolving this entrance request and meeting, control to enter this safety container and in The now information in this safety container.
In hiding module, detect this mobile terminal and the most whether be positioned at and preset geographic area, if so, Automatically this entry port is hidden;And/or, whether detection current time falls in a Preset Time region, if It is automatically to hide this entry port.
Or, in hiding module, input the first numeral sequence by the dialing keyboard of mobile terminal, if with in advance If digital sequence coincide, then hide this entry port;Or, tap the of mobile terminal by unconventional One hard/soft-key button, if coincideing with the default rule that taps, then hides this entry port.
Or, in hiding module, by mobile terminal calling or send short messages to the first fixed number, if first Fixed number and the numbers match preset, then hide this entry port.
It is anti-that the safety device of this 4th embodiment specifically performs safety in the first embodiment shown in Fig. 1 The step of maintaining method, here is omitted.
Embodiment five:
Referring to Fig. 5, fifth embodiment of the invention provides a kind of safety device, is built in mobile whole End, this safety device includes:
Set up module 210: set up a safety container;
Module 220 is set: be provided for the entry port entering this safety container to present its interior information;
Hide module 230: control to hide this entry port;
First parsing module 240: receive the entrance request entering this safety container of user's input, and resolve This entrance is asked;
First presents module 250: when resolving this entrance request and meeting, control to enter this safety container and in The now information in this safety container;
Second parsing module 260: what reception user inputted is used for reminding how user finds this entry port Alert requests, and resolve this alert requests;
Second presents module 270: if when resolving this alert requests and meeting, controls to present user and can find this The mode of entry port;
Select module 280: receive user and select the selected request of any one in which and respond;
So, in this fifth embodiment, it is that according to be selected that the first parsing module specifically receives user The preset rules of mode carries out the entrance request inputted, and resolves this entrance request.
In the present invention, in the second parsing module, receive user by the dialing keyboard of mobile terminal input the Two numeral sequence and the alert requests that produces, if coincideing with default digital sequence, then second presents module control System presents user on the screen of the mobile terminal and can find one or more modes of this entry port;
Or, in the second parsing module, receive user by unconventional tap mobile terminal second hard/ Soft-key button and the alert requests that produces, if coincideing with the default rule that taps, then second presents module and controls Present user on the screen of mobile terminal and can find one or more modes of this entry port;
Or, in the second parsing module, receive user by mobile terminal calling or send short messages to second fix Number and the alert requests that produces, meet if resolving this alert requests, then present module second and control moving Present user on the screen of dynamic terminal and can find one or more modes of this entry port.
Shown in Fig. 6, present module in fifth embodiment of the invention second and control the user that presents and can look for Schematic diagram to the mode of this entry port, it is seen then that second presents module controls on the screen of the mobile terminal Presenting user can find the mode of this entry port include and be not limited to: " by inputting number on dialing keyboard The mode of word string ", " by unconventional tap hard/soft-key button by the way of ", " by calling a fixed number Mode ", " by sending by the way of note to a fixed number " etc., so, user may be selected by it Middle one, as have selected " by the way of inputting numeric string on dialing keyboard ", shows dialing the most subsequently Keyboard facilitates user to input numeric string, as have selected " by unconventional tap hard/soft-key button by the way of ", Show that the display interface of soft-key button facilitates user to tap the most subsequently, but user can ignore and directly tap firmly by Key;Show that dialing keyboard facilitates user to dial the most subsequently as have selected " by the way of calling a fixed number " Marking code;Note interface is shown the most subsequently as have selected " by the way of sending note to a fixed number " Facilitate user's editing short message.Certainly, second presents module and controls the user that finally presents and can find this upstream end The mode of mouth is also that user pre-sets, and user is typically based on the custom of oneself and selects one therein or many Kind.
Further, in the safety device of a preferred embodiment, in the first parsing module, After resolving this entrance request, show verification tip information, to point out user input validation information, then obtain Take the checking information of described user input, checking information and preset checking information that user inputs are carried out Joining, if the checking information of user's input and described preset checking information match, i.e. this entrance request meets, First presents module enters safety container by controlling and presents the information in this safety container.
Realize other details of technical scheme about module each in above-mentioned safety device, refer to first real Executing the description in example and the second embodiment, here is omitted.
Safety device in above-described embodiment, sets up a safety container, under normal circumstances, by this peace The entry port of full container stashes, when user needs to enter safety container, first input entrance ask into Row checking, when this entrance request is consistent with the entrance request preset, is i.e. verified, could enter this peace Full container.Use the special mode of entrance of the present embodiment, even if the mobile terminal of user oneself is by other people Require by force to check, owing to concealing the entry port of safety container, also will will not be found in this and move end With the presence of safety container on end, more do not result in the leakage of private information in safety container so that mobile terminal User can be relievedly such as sensitive applications such as bank clients, or such as the privacy such as picture and contact person Data are positioned in safety container.
It should be noted that each embodiment in this specification all uses the mode gone forward one by one to describe, Mei Geshi Execute that example stresses is all the difference with other embodiments, identical similar portion between each embodiment Divide and see mutually.For device class embodiment, due to itself and embodiment of the method basic simlarity, institute Fairly simple with describe, relevant part sees the part of embodiment of the method and illustrates.
It should be noted that in this article, the relational terms of such as first and second or the like be used merely to by One entity or operation separate with another entity or operating space, and not necessarily require or imply these Relation or the order of any this reality is there is between entity or operation.And, term " includes ", " bag Contain " or its any other variant be intended to comprising of nonexcludability, so that include a series of key element Process, method, article or device not only include those key elements, but also include being not expressly set out Other key elements, or also include the key element intrinsic for this process, method, article or device.? In the case of there is no more restriction, statement " including ... " key element limited, it is not excluded that including The process of key element, method, article or device there is also other identical element.
It will be appreciated by those skilled in the art that all or part of step realizing above-described embodiment can be by hard Part completes, it is also possible to instructs relevant hardware by program and completes, and this program can be stored in a kind of meter In calculation machine readable storage medium storing program for executing, storage medium mentioned above can be read only memory, disk or CD etc..
Above, it is only presently preferred embodiments of the present invention, not the present invention is made any pro forma restriction, Although the present invention is disclosed above with preferred embodiment, but it is not limited to the present invention, any is familiar with basis Technical professional, in the range of without departing from technical solution of the present invention, when the technology of available the disclosure above Content is made a little change or is modified to the Equivalent embodiments of equivalent variations, as long as being without departing from the technology of the present invention Plan content, any simple modification, equivalent that above example is made by the technical spirit of the foundation present invention become Change and modify, all still falling within the range of technical solution of the present invention.

Claims (14)

1. a safety protecting method, for mobile terminal, it is characterised in that including:
Set up a safety container;
It is provided for entering the entry port of this safety container, and hides this entry port;
Receive the entrance request entering this safety container of user's input, and resolve this entrance request, if meeting, Then enter this safety container and present the information in this safety container.
Method the most according to claim 1, it is characterised in that enter this peace described being provided for After the entry port of full container the step of this entry port hiding, also include:
Receiving the alert requests of user's input, and resolve this alert requests, if meeting, then presenting user can look for Mode to this entry port.
Method the most according to claim 1 and 2, it is characterised in that described this entry port hiding Step particularly as follows:
Detect this mobile terminal the most whether to be positioned at and preset geographic area, the most automatically hide this entrance Port;
And/or, whether detection current time falls in a Preset Time region, the most automatically hides this and enters Inbound port.
Method the most according to claim 1 and 2, it is characterised in that described this entry port hiding Step particularly as follows:
The first numeral sequence is inputted by the dialing keyboard of mobile terminal, if coincideing with default digital sequence, Then hide this entry port;
Or, by unconventional first hard/soft-key button tapping mobile terminal, if tapping rule with default It coincide, then hide this entry port.
Method the most according to claim 1 and 2, it is characterised in that described this entry port hiding Step particularly as follows:
By mobile terminal calling or send short messages to the first fixed number, if the first fixed number with preset number Code coincide, then hide this entry port.
Method the most according to claim 2, it is characterised in that
The described alert requests receiving user's input also resolves this alert requests, then presents user's energy when meeting Find the step of the mode of this entry port particularly as follows:
This alert requests is to input the second numeral sequence by the dialing keyboard of mobile terminal to produce, if with in advance If digital sequence coincide, present user the most on the screen of the mobile terminal and can find the one of this entry port Or various ways;
Or, this alert requests is to be produced by unconventional second hard/soft-key button tapping mobile terminal, If coincideing with the default rule that taps, presenting user the most on the screen of the mobile terminal and can find this entry port One or more modes;
Or, this alert requests is user is produced by mobile terminal calling or send short messages to the second fixed number Raw, meeting if resolving this alert requests, presenting user the most on the screen of the mobile terminal and can find this upstream end One or more modes of mouth.
Method the most according to claim 1, it is characterised in that the entrance of described reception user input The entrance of this safety container is asked and is resolved this entrance request, enters this safety container when meeting and present this In the step of the information in safety container, including:
After resolving this entrance request, show verification tip information, to point out described user's input validation to believe Breath;
Obtain the checking information of described user input, the checking information described user inputted and preset checking letter Breath mates, if the checking information of described user input and described preset checking information match, then enters This safety container also presents the information in this safety container.
8. a safety device, is built in mobile terminal, it is characterised in that including:
Set up module: set up a safety container;
Module is set: be provided for entering the entry port of this safety container;
Hide module: control to hide this entry port;
First parsing module: receive the entrance request entering this safety container of user's input, and resolve this and enter Enter request;
First presents module: when resolving this entrance request and meeting, control enter this safety container and present this Information in safety container.
Device the most according to claim 8, it is characterised in that this safety device also includes:
Second parsing module: receive the prompting being used for reminding user how to find this entry port of user's input Request, and resolve this alert requests;
Second presents module: if when resolving this alert requests and meeting, controls to present user and can find this entrance The mode of port.
Device the most according to claim 8 or claim 9, it is characterised in that in described hiding module,
Detect this mobile terminal the most whether to be positioned at and preset geographic area, the most automatically hide this entrance Port;
And/or, whether detection current time falls in a Preset Time region, the most automatically hides this and enters Inbound port.
11. devices according to claim 8 or claim 9, it is characterised in that in described hiding module,
The first numeral sequence is inputted by the dialing keyboard of mobile terminal, if coincideing with default digital sequence, Then hide this entry port;
Or, by unconventional first hard/soft-key button tapping mobile terminal, if tapping rule with default It coincide, then hide this entry port.
12. devices according to claim 8 or claim 9, it is characterised in that in described hiding module,
By mobile terminal calling or send short messages to the first fixed number, if the first fixed number with preset number Code coincide, then hide this entry port.
13. devices according to claim 9, it is characterised in that in described second parsing module, Receive the alert requests that user is produced by the dialing keyboard input second numeral sequence of mobile terminal, if with The digital sequence preset is coincide, then second presents module and control to present user on the screen of the mobile terminal and can look for One or more modes to this entry port;
Or, in described second parsing module, receive user and tap the second of mobile terminal by unconventional Firmly/soft-key button and the alert requests that produces, if coincideing with the default rule that taps, then second presents module control System presents user on the screen of the mobile terminal and can find one or more modes of this entry port;
Or, in described second parsing module, receive user and by mobile terminal calling or send short messages to second Fixed number and the alert requests that produces, meet if resolving this alert requests, then present module control second Present user on the screen of the mobile terminal and can find one or more modes of this entry port.
14. devices according to claim 8, it is characterised in that
In described first parsing module, after resolving this entrance request, show verification tip information, with Point out described user's input validation information;
Obtain the checking information of described user input, the checking information described user inputted and preset checking letter Breath mates;
Present in module first, if the checking information of described user input and described preset checking information phase Join, this safety container will be entered and present the information in this safety container.
CN201510303282.7A 2015-06-05 2015-06-05 A kind of safety protecting method and device Pending CN106295387A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510303282.7A CN106295387A (en) 2015-06-05 2015-06-05 A kind of safety protecting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510303282.7A CN106295387A (en) 2015-06-05 2015-06-05 A kind of safety protecting method and device

Publications (1)

Publication Number Publication Date
CN106295387A true CN106295387A (en) 2017-01-04

Family

ID=57656629

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510303282.7A Pending CN106295387A (en) 2015-06-05 2015-06-05 A kind of safety protecting method and device

Country Status (1)

Country Link
CN (1) CN106295387A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229149A (en) * 2017-12-29 2018-06-29 北京安云世纪科技有限公司 A kind of method and apparatus of data protection
CN111988282A (en) * 2020-07-30 2020-11-24 杭州超级科技有限公司 Data transmission system, method, electronic device and medium based on TCP
WO2022160789A1 (en) * 2021-02-01 2022-08-04 中国银联股份有限公司 Information processing method and apparatus

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100235831A1 (en) * 2009-03-12 2010-09-16 Arend Erich Dittmer Method for dynamic configuration of virtual machine
CN103294941A (en) * 2012-02-22 2013-09-11 腾讯科技(深圳)有限公司 Method for accessing private space and mobile device
CN103324483A (en) * 2013-06-26 2013-09-25 青岛海信移动通信技术股份有限公司 Method and device for application showing and hiding of intelligent terminal
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN103577761A (en) * 2013-10-25 2014-02-12 北京奇虎科技有限公司 Method and device for processing privacy data in mobile equipment
CN104036203A (en) * 2013-03-07 2014-09-10 腾讯科技(深圳)有限公司 Information security management method and information security management system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100235831A1 (en) * 2009-03-12 2010-09-16 Arend Erich Dittmer Method for dynamic configuration of virtual machine
CN103294941A (en) * 2012-02-22 2013-09-11 腾讯科技(深圳)有限公司 Method for accessing private space and mobile device
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN104036203A (en) * 2013-03-07 2014-09-10 腾讯科技(深圳)有限公司 Information security management method and information security management system
CN103324483A (en) * 2013-06-26 2013-09-25 青岛海信移动通信技术股份有限公司 Method and device for application showing and hiding of intelligent terminal
CN103577761A (en) * 2013-10-25 2014-02-12 北京奇虎科技有限公司 Method and device for processing privacy data in mobile equipment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229149A (en) * 2017-12-29 2018-06-29 北京安云世纪科技有限公司 A kind of method and apparatus of data protection
CN108229149B (en) * 2017-12-29 2020-11-06 北京安云世纪科技有限公司 Data protection method and device
CN111988282A (en) * 2020-07-30 2020-11-24 杭州超级科技有限公司 Data transmission system, method, electronic device and medium based on TCP
WO2022160789A1 (en) * 2021-02-01 2022-08-04 中国银联股份有限公司 Information processing method and apparatus

Similar Documents

Publication Publication Date Title
US10706173B2 (en) Method and device for displaying notification information
Mare et al. Smart devices in Airbnbs: Considering privacy and security for both guests and hosts
US9824234B2 (en) Method of protecting care information in a care provider terminal
KR102013924B1 (en) User proximity control of devices
CN110178179B (en) Voice signature for authenticating to electronic device users
JP6453524B2 (en) Techniques for entering code on a computing device
US8810365B2 (en) Random location authentication
EP3893182A1 (en) Method and device for processing child mode
WO2016045192A1 (en) Notification processing method, notification processing device, and terminal
US20120192268A1 (en) Password authentication method
WO2016015448A1 (en) Multi-system entering method, apparatus and terminal
CN104216742B (en) Brush machine control method and device based on password
CN102714676B (en) An apparatus, method, computer program and user interface
CN102968587B (en) A kind of electronic equipment and the method giving electronic equipment unlocking information for change
CN104063654B (en) The monitoring method and device of application program
CN105354489A (en) Right granting method and apparatus
US9674178B2 (en) Secure user input mode using randomized mapping between ordered sets of symbols
US10481786B2 (en) User interface for enabling access to data of a mobile device
US20140085048A1 (en) System and Method for Unlocking an Electronic Device Via a Securely Paired Remote Device
CN106453802A (en) Cipher verification method and device, and terminal
CN106127062A (en) unlocking method and device
CN108111667A (en) A kind of communication information encryption method, device and electronic equipment
US20180225456A1 (en) Enhancing security of a mobile device based on location or proximity to another device
CN106295387A (en) A kind of safety protecting method and device
US20150223056A1 (en) Mobile survey tools with added security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170104

RJ01 Rejection of invention patent application after publication