CN106295396A - A kind of method for secret protection and mobile terminal - Google Patents

A kind of method for secret protection and mobile terminal Download PDF

Info

Publication number
CN106295396A
CN106295396A CN201610614791.6A CN201610614791A CN106295396A CN 106295396 A CN106295396 A CN 106295396A CN 201610614791 A CN201610614791 A CN 201610614791A CN 106295396 A CN106295396 A CN 106295396A
Authority
CN
China
Prior art keywords
application program
mobile terminal
response message
privacy
geographical position
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610614791.6A
Other languages
Chinese (zh)
Inventor
张益�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610614791.6A priority Critical patent/CN106295396A/en
Publication of CN106295396A publication Critical patent/CN106295396A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a kind of method for secret protection and mobile terminal, and the method includes: obtain the position of mobile terminal;Judge whether described position is positioned at default privacy area;If described position is positioned at described default privacy area, then open geographical position privacy information protection pattern.The embodiment of the present invention can make mobile terminal open geographical position privacy information protection pattern thus protect the privacy of user, makes the safety of mobile terminal be improved.

Description

A kind of method for secret protection and mobile terminal
Technical field
The present invention relates to the communications field, particularly relate to a kind of method for secret protection and mobile terminal.
Background technology
Along with developing rapidly of electronic information technology, the application of mobile terminal is more and more extensive, and in order to meet user Various demands, increasing application program (APP, Application) installs on mobile terminals, and user can be by not Same APP completes different functions.But, the most a lot of APP can obtain the positional information of mobile terminal automatically, such as User uses microblogging APP to send a microblogging, and this microblogging will show current positional information;Or user uses chat APP sends a circle of friends message, and this message also can show current positional information.What so the privacy of user just had a leakage can Can, the safety ratio causing mobile terminal is relatively low.
Summary of the invention
The embodiment of the present invention provides a kind of method for secret protection and mobile terminal, compares solving the safety of mobile terminal Low problem.
First aspect, embodiments provides a kind of method for secret protection, it is characterised in that including:
Obtain the position of mobile terminal;
Judge whether described position is positioned at default privacy area;
If described position is positioned at described default privacy area, then open geographical position privacy information protection pattern.
Second aspect, the embodiment of the present invention also provides for a kind of mobile terminal, it is characterised in that including:
Acquisition module, for obtaining the position of mobile terminal;
First judge module, is used for judging whether described position is positioned at default privacy area;
Opening module, if be positioned at described default privacy area for described position, then open geographical position privacy information and protects Protect pattern.
So, in the embodiment of the present invention, obtain the position of mobile terminal;Judge whether described position is positioned at default privacy zone Territory;If described position is positioned at described default privacy area, then open geographical position privacy information protection pattern.So user is permissible Make mobile terminal open geographical position privacy information protection pattern thus protect the privacy of user, make the safety of mobile terminal obtain To improve.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, required in the embodiment of the present invention being described below Accompanying drawing to be used is briefly described, it should be apparent that, the accompanying drawing in describing below is only some embodiments of the present invention, For those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain according to these accompanying drawings Obtain other accompanying drawing.
Fig. 1 is the flow chart of a kind of method for secret protection that the embodiment of the present invention provides;
Fig. 2 is the flow chart of the another kind of method for secret protection that the embodiment of the present invention provides;
Fig. 3 is the structure chart of a kind of mobile terminal that the embodiment of the present invention provides;
Fig. 4 is the structure chart of the another kind of mobile terminal that the embodiment of the present invention provides;
Fig. 5 is the structure chart of the another kind of mobile terminal that the embodiment of the present invention provides;
Fig. 6 is the structure chart of a kind of mobile terminal that the embodiment of the present invention provides.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is a part of embodiment of the present invention rather than whole embodiments wholely.Based on this Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise Example, broadly falls into the scope of protection of the invention.
First embodiment
See the flow chart that Fig. 1, Fig. 1 are a kind of method for secret protection that the embodiment of the present invention provides, as it is shown in figure 1, bag Include following steps:
Step 101, the position of acquisition mobile terminal.
In the embodiment of the present invention, what the position of above-mentioned mobile terminal can be understood as mobile terminal passes through global positioning system (GPS, Global Positioning System) positions the position obtained, it is also possible to cover mobile terminal by signal Base station determines the position of mobile terminal.
Step 102, judge whether described position is positioned at default privacy area.
In the embodiment of the present invention, above-mentioned privacy area can be user-defined a certain panel region.Such as user lives Residence can be defined as privacy area, and the office space of user can also be defined as privacy area, user and some Very Important Person meeting Commercial hotel or the commercial affairs club in face can be defined as privacy area.
If the described position of step 103 is positioned at described default privacy area, then open geographical position privacy information protection mould Formula.
In the embodiment of the present invention, if above-mentioned described position is positioned at described default privacy area and is understood that.Such as use Family oneself house of definition is privacy area, and user is in hidden with any one position inside house of mobile terminal Private region, when user leaves the house of oneself with mobile terminal, the position of this mobile terminal is just no longer at privacy area.
In the embodiment of the present invention, above-mentioned unlatching geographical position privacy information protection pattern, can be that mobile terminal carries A kind of pattern that function is opened, it is also possible to be that mobile terminal downloads certain specific software to open this pattern.Mobile terminal exists Under the privacy information protection pattern of geographical position, can protect the privacy information of user, privacy information can be the position of mobile terminal Confidence breath or other relevant information.
In the embodiment of the present invention, above-mentioned mobile terminal any can possess the mobile end of characteristics of human body's acquisition component and screen End, such as: mobile phone, panel computer (Tablet Personal Computer), kneetop computer (Laptop Computer), Personal digital assistant (personal digital assistant is called for short PDA), mobile Internet access device (Mobile Internet Device, MID) or Wearable device (Wearable Device) etc..
A kind of method for secret protection of the embodiment of the present invention, obtains the position of mobile terminal;Judge whether position, described position In default privacy area;If described position is positioned at described default privacy area, then open geographical position privacy information protection pattern. So user can make mobile terminal open geographical position privacy information protection pattern when entering privacy area, thus protects use The privacy at family, makes the safety of mobile terminal be improved.
Second embodiment
See the flow chart that Fig. 2, Fig. 2 are the another kind of method for secret protection that the embodiment of the present invention provides, as in figure 2 it is shown, Comprise the following steps:
Step 201, the position of acquisition mobile terminal.
In the embodiment of the present invention, the position of above-mentioned mobile terminal can be understood as being obtained by GPS location of mobile terminal Position, it is also possible to be to cover the base station of mobile terminal by signal to determine the position of mobile terminal.
Step 202, judge whether described position is positioned at default privacy area.
In the embodiment of the present invention, above-mentioned privacy area can be user-defined a certain panel region.Such as user lives Residence can be defined as privacy area, and the office space of user can also be defined as privacy area, user and some Very Important Person meeting Commercial hotel or the commercial affairs club in face can be defined as privacy area.
If the described position of step 203 is positioned at described default privacy area, then open geographical position privacy information protection mould Formula.
In the embodiment of the present invention, if above-mentioned described position is positioned at described default privacy area and is understood that.Such as use Family oneself house of definition is privacy area, and user is in hidden with any one position inside house of mobile terminal Private region, when user leaves the house of oneself with mobile terminal, the position of this mobile terminal is just no longer at privacy area.
In the embodiment of the present invention, above-mentioned unlatching geographical position privacy information protection pattern, can be that mobile terminal carries A kind of pattern that function is opened, it is also possible to be that mobile terminal downloads certain specific software to open this pattern.Mobile terminal exists Under the privacy information protection pattern of geographical position, can protect the privacy information of user, privacy information can be the position of mobile terminal Confidence breath or other relevant information.
The information acquisition request that step 204, reception application program send, described information acquisition request is used for obtaining geographical position Put privacy information.
In the embodiment of the present invention, above-mentioned application program can be chat application, microblogging application program, Bank application journey Sequence or sports application.These application programs have the possibility obtaining customer mobile terminal geographical position privacy information.Example The positional information of mobile terminal can be shown as user uses chat application to send out a circle of friends, use microblogging application program to send out Article one, microblogging can show the positional information of mobile terminal, uses sports application messaging also can show the position of mobile terminal Information.
Step 205, to described application program return response message, described response message include encryption described geographical position Privacy information, or the content of described response message is empty.
In the embodiment of the present invention, above-mentioned application program can be chat application, microblogging application program, Bank application journey Sequence or sports application.
In the embodiment of the present invention, the described geographical position privacy information of above-mentioned encryption, or the content of described response message For sky, wherein encryption can take different AESs, such as: data encryption standard algorithm, information-summary AES, Advanced encryption algorithm or public key encryption algorithm etc., be not construed as limiting this present embodiment.The content of above-mentioned response message is empty, It is appreciated that and does not returns, it is understood that for returning a null value to application program.
The embodiment of the present invention, by opening geographical position privacy information protection pattern, and returns encryption to application program Geographical position privacy information or null value, make application program cannot read the geographical location information of mobile terminal, user's is hidden Private is protected, and the safety of mobile terminal is improved.
Optionally, described judge whether described position is positioned at default privacy area, including:
Judge whether the position of described mobile terminal is less than predetermined threshold value with the distance of predeterminated position, if, it is determined that institute Position is in described default privacy area.
In the embodiment of the present invention, above-mentioned predeterminated position can be a user-defined position, and any user feels to close Suitable position can be defined as predeterminated position.Above-mentioned predetermined threshold value can be defined as 10 meters, 20 meters or 30 meters, as long as use Family thinks that suitable distance can be defined as predetermined threshold value.
Optionally, described geographical position privacy information includes such as the next item down or multinomial:
Phone number, global position system GPS information and International Mobile Station Equipment Identification.
In the embodiment of the present invention, above-mentioned International Mobile Station Equipment Identification is exactly the authority's mark identifying mobile terminal ownership and character Will.It has unique 15 identity strings number, and this string number can be made up of English and numeral, the international shifting between each mobile terminal Dynamic device identification is all unique, and the International Mobile Station Equipment Identification between different mobile terminal will not repeat.
Optionally, after the information acquisition request that described reception application program sends, described return to described application program Before returning response message, described method also includes:
Judging whether described application program is to preset application program, wherein, described default application program is for being not turned on When stating geographical position privacy information protection pattern, have permission the application program in the geographical position obtaining described mobile terminal;
Described to described application program return response message, including:
If described application program is for presetting application program, then return described response message to described application program;
If described application program for presetting application program, does not the most return described response message to described application program.
In the embodiment of the present invention, above-mentioned default application program, when being not turned on geographical position privacy information protection pattern, is The geographical location information of mobile terminal can be obtained.This default application program can be the application program that mobile terminal carries, This application program has the authority obtaining geographical location information;Or this default application program can also be the application journey that user downloads Sequence, then user pre-sets some or whole application program has permission the geographical location information obtaining mobile terminal.
In the embodiment of the present invention, above-mentioned judge that whether described application program is to preset application program.Such as, there are 4 application Program, application program 1, application program 2, application program 3 and application program 4.User can pre-set application program 1 and application Program 2 has permission the geographical position obtaining mobile terminal, application program 3 and application program 4 lack of competence and obtains the ground of mobile terminal Reason position.After application program 1 or application program 2 are judged, return response to application program 1 and application program 2 and disappear Breath;After application program 3 or application program 4 are judged, do not return response message to application program 3 and application program 4.
The embodiment of the present invention, obtains the position of mobile terminal;Judge whether described position is positioned at default privacy area;If institute Position in described default privacy area, then opens geographical position privacy information protection pattern;Receive what application program sent Information acquisition request, described information acquisition request is used for obtaining geographical position privacy information;Response is returned to described application program Message, described response message includes the described geographical position privacy information of encryption, or the content of described response message is empty.Logical Cross unlatching geographical position privacy information protection pattern, and return geographical position privacy information or the sky of encryption to application program Value, makes application program cannot read the geographical location information of mobile terminal, and the privacy of user is protected, the safety of mobile terminal Property is improved.
3rd embodiment
Seeing Fig. 3, Fig. 3 is the structure chart that the present invention implements a kind of mobile terminal provided, as it is shown on figure 3, mobile terminal 300 include acquisition module 301, the first judge module 302, opening module 303, wherein:
Acquisition module 301, for obtaining the position of mobile terminal;
First judge module 302, is used for judging whether described position is positioned at default privacy area;
Opening module 303, if be positioned at described default privacy area for described position, then opens geographical position privacy information Protected mode.
Optionally, described first judge module 302 is for judging the position of described mobile terminal and the distance of predeterminated position Whether less than predetermined threshold value, if, it is determined that described position is positioned at described default privacy area.
Optionally, as shown in Figure 4, described mobile terminal 300 also includes:
Receiver module 304, for receiving the information acquisition request that application program sends, described information acquisition request is used for obtaining Take geographical position privacy information;
Returning module 305, for returning response message to described application program, described response message includes the described of encryption Geographical position privacy information, or the content of described response message is empty.
Optionally, described geographical position privacy information includes such as the next item down or multinomial:
Phone number, global position system GPS information and International Mobile Station Equipment Identification.
Optionally, as it is shown in figure 5, described mobile terminal 300 also includes:
Second judge module 306, is used for judging whether described application program is to preset application program, wherein, described default Application program, for when being not turned on described geographical position privacy information protection pattern, has permission the geography obtaining described mobile terminal The application program of position;
If for described second judge module 306, described return module 305 judges that described application program is as presetting application journey Sequence, returns described response message to described application program;
If for described second judge module 306, described return module 305 judges that described application program is not as presetting application Program, does not returns described response message to described application program.
Mobile terminal 300 is capable of each process that in the embodiment of the method for Fig. 1 to Fig. 2, mobile terminal realizes, for keeping away Exempt to repeat, repeat no more here.
The mobile terminal 300 of the embodiment of the present invention, obtains the position of mobile terminal;Judge whether described position is positioned at default Privacy area;If described position is positioned at described default privacy area, then open geographical position privacy information protection pattern.So use Family can make mobile terminal open geographical position privacy information protection pattern when entering privacy area, thus protects that user's is hidden Private, makes the safety of mobile terminal be improved.
4th embodiment
Seeing Fig. 6, Fig. 6 is the structure chart that the present invention implements the mobile terminal provided, and as shown in Figure 6, mobile terminal 600 wraps Include: at least one processor 601, memorizer 602, at least one network interface 604 and user interface 603.In mobile terminal 600 Each assembly be coupled by bus system 605.It is understood that bus system 605 is for realizing between these assemblies Connect communication.Bus system 605, in addition to including data/address bus, also includes power bus, controls bus and status signal bus in addition. But for the sake of understanding explanation, in figure 6 various buses are all designated as bus system 605.
Wherein, user interface 603 can include display, keyboard or pointing device (such as, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
The memorizer 602 being appreciated that in the embodiment of the present invention can be volatile memory or nonvolatile memory, Maybe can include volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable P ROM, EPROM), Electrically Erasable Read Only Memory (Electrically EP ROM, EEPROM) Or flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and it is used as outside Cache.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous D RAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SD RAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SD RAM, ESDRAM), synchronize even Connect dynamic random access memory (Synchlink D RAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memorizer 602 of system and method described herein is intended to include but not limited to these Memorizer with arbitrarily other applicable type.
In some embodiments, memorizer 602 stores following element, executable module or data structure, or Their subset of person, or their superset: operating system 6021 and application program 6022.
Wherein, operating system 6021, comprise various system program, such as ccf layer, core library layer, driving layer etc., be used for Realize various basic business and process hardware based task.Application program 6022, comprises various application program, such as media Player (Media Player), browser (Browser) etc., be used for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 6022.
In embodiments of the present invention, by calling program or the instruction of memorizer 602 storage, concrete, can be application The program stored in program 6022 or instruction, processor 601 is used for: obtain the position of mobile terminal;
Judge whether described position is positioned at default privacy area;
If described position is positioned at described default privacy area, then open geographical position privacy information protection pattern.
The method that the invention described above embodiment discloses can apply in processor 601, or is realized by processor 601. Processor 601 is probably a kind of IC chip, has the disposal ability of signal.During realizing, said method each Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 601 or software form.Above-mentioned process Device 601 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic, Discrete hardware components.Can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.General The processor etc. that processor can be microprocessor or this processor can also be any routine.In conjunction with embodiment of the present invention institute The step of disclosed method can be embodied directly in hardware decoding processor and perform, or with the hardware in decoding processor And software module combination execution completes.Software module may be located at random access memory, and flash memory, read only memory are able to programme read-only In the storage medium that this areas such as memorizer or electrically erasable programmable memorizer, depositor are ripe.This storage medium is positioned at Memorizer 602, processor 601 reads the information in memorizer 602, completes the step of said method in conjunction with its hardware.
It is understood that embodiments described herein can use hardware, software, firmware, middleware, microcode or its Combination realizes.Realizing for hardware, processing unit can be implemented in one or more special IC (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, Controller, microcontroller, microprocessor, for performing in other electronic unit or a combination thereof of herein described function.
Software is realized, can be realized herein by the module (such as process, function etc.) performing function described herein Described technology.Software code is storable in performing in memorizer and by processor.Memorizer can within a processor or Processor is outside to be realized.
Optionally, processor 601 performs described to judge whether described position is positioned at default privacy area, including:
Judge whether the position of described mobile terminal is less than predetermined threshold value with the distance of predeterminated position, if, it is determined that institute Position is in described default privacy area.
Optionally, after the privacy information protection pattern of described unlatching geographical position, processor 601 is additionally operable to:
Receiving the information acquisition request that application program sends, described information acquisition request is used for obtaining geographical position privacy letter Breath;
Returning response message to described application program, described response message includes the described geographical position privacy letter of encryption Cease, or the content of described response message is empty.
Optionally, processor 601 performs described geographical position privacy information and includes such as the next item down or multinomial:
Phone number, global position system GPS information and International Mobile Station Equipment Identification.
Optionally, after the information acquisition request that described reception application program sends, described return to described application program Before returning response message, processor 601 is additionally operable to:
Judging whether described application program is to preset application program, wherein, described default application program is for being not turned on When stating geographical position privacy information protection pattern, have permission the application program in the geographical position obtaining described mobile terminal;
Described to described application program return response message, including:
If described application program is for presetting application program, then return described response message to described application program;
If described application program for presetting application program, does not the most return described response message to described application program.
Mobile terminal 600 is capable of each process that in previous embodiment, mobile terminal realizes, for avoiding repeating, here Repeat no more.
The mobile terminal 600 of the embodiment of the present invention, obtains the position of mobile terminal;Judge whether described position is positioned at default Privacy area;If described position is positioned at described default privacy area, then open geographical position privacy information protection pattern.So use Family can make mobile terminal open geographical position privacy information protection pattern when entering privacy area, thus protects that user's is hidden Private, makes the safety of mobile terminal be improved.
Those of ordinary skill in the art are it is to be appreciated that combine the list of each example that the embodiments described herein describes Unit and algorithm steps, it is possible to being implemented in combination in of electronic hardware or computer software and electronic hardware.These functions are actually Perform with hardware or software mode, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel Each specifically should being used for can be used different methods to realize described function, but this realization is it is not considered that exceed The scope of the present invention.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, the system of foregoing description, The specific works process of device and unit, is referred to the corresponding process in preceding method embodiment, does not repeats them here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can be passed through other Mode realizes.Such as, device embodiment described above is only schematically, such as, the division of described unit, it is only A kind of logic function divides, actual can have when realizing other dividing mode, the most multiple unit or assembly can in conjunction with or Person is desirably integrated into another system, or some features can be ignored, or does not performs.Another point, shown or discussed is mutual Between coupling direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit or communication link Connect, can be electrical, machinery or other form.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize embodiment of the present invention scheme Purpose.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.
If described function is using the form realization of SFU software functional unit and as independent production marketing or use, permissible It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is the most in other words The part contributing prior art or the part of this technical scheme can embody with the form of software product, this meter Calculation machine software product is stored in a storage medium, including some instructions with so that a computer equipment (can be individual People's computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention. And aforesaid storage medium includes: USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. are various can store program code Medium.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited thereto, and any Those familiar with the art, in the technical scope that the invention discloses, can readily occur in change or replace, should contain Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with scope of the claims.

Claims (10)

1. a method for secret protection, it is characterised in that including:
Obtain the position of mobile terminal;
Judge whether described position is positioned at default privacy area;
If described position is positioned at described default privacy area, then open geographical position privacy information protection pattern.
2. the method for claim 1, it is characterised in that described judge whether described position is positioned at default privacy area, Including:
Judge whether the position of described mobile terminal is less than predetermined threshold value with the distance of predeterminated position, if, it is determined that institute's rheme Setting in described default privacy area.
3. the method as according to any one of claim 1 to 2, it is characterised in that at described unlatching geographical position privacy information After protected mode, described method also includes:
Receiving the information acquisition request that application program sends, described information acquisition request is used for obtaining geographical position privacy information;
Returning response message to described application program, described response message includes the described geographical position privacy information of encryption, or The content of response message described in person is empty.
4. method as claimed in claim 3, it is characterised in that described geographical position privacy information includes such as the next item down or many :
Phone number, global position system GPS information and International Mobile Station Equipment Identification.
5. method as claimed in claim 3, it is characterised in that the information acquisition request sent at described reception application program it After, described before described application program returns response message, described method also includes:
Judge that whether described application program is to preset application program, wherein, described default application program for be not turned on described During reason location privacy information protection mode, have permission the application program in the geographical position obtaining described mobile terminal;
Described to described application program return response message, including:
If described application program is for presetting application program, then return described response message to described application program;
If described application program for presetting application program, does not the most return described response message to described application program.
6. a mobile terminal, it is characterised in that including:
Acquisition module, for obtaining the position of mobile terminal;
First judge module, is used for judging whether described position is positioned at default privacy area;
Opening module, if be positioned at described default privacy area for described position, then opens geographical position privacy information protection mould Formula.
7. mobile terminal as claimed in claim 6, it is characterised in that described first judge module is used for judging described movement eventually Whether the position of end is less than predetermined threshold value with the distance of predeterminated position, if, it is determined that described position is positioned at described default privacy Region.
8. the mobile terminal as according to any one of claim 6 to 7, it is characterised in that described mobile terminal also includes:
Receiver module, for receiving the information acquisition request that application program sends, described information acquisition request is used for obtaining geography Location privacy information;
Returning module, for returning response message to described application program, described response message includes the described geographical position of encryption Put privacy information, or the content of described response message is empty.
9. mobile terminal as claimed in claim 8, it is characterised in that described geographical position privacy information include such as the next item down or Person is multinomial:
Phone number, global position system GPS information and International Mobile Station Equipment Identification.
10. mobile terminal as claimed in claim 8, it is characterised in that described mobile terminal also includes:
Second judge module, is used for judging whether described application program is to preset application program, wherein, described default application program For when being not turned on described geographical position privacy information protection pattern, have permission obtain described mobile terminal geographical position should Use program;
If for described second judge module, described return module judges that described application program, as presetting application program, is answered to described Described response message is returned by program;
If for described second judge module, described return module judges that described application program is not as presetting application program, not to institute State application program and return described response message.
CN201610614791.6A 2016-07-29 2016-07-29 A kind of method for secret protection and mobile terminal Pending CN106295396A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610614791.6A CN106295396A (en) 2016-07-29 2016-07-29 A kind of method for secret protection and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610614791.6A CN106295396A (en) 2016-07-29 2016-07-29 A kind of method for secret protection and mobile terminal

Publications (1)

Publication Number Publication Date
CN106295396A true CN106295396A (en) 2017-01-04

Family

ID=57663541

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610614791.6A Pending CN106295396A (en) 2016-07-29 2016-07-29 A kind of method for secret protection and mobile terminal

Country Status (1)

Country Link
CN (1) CN106295396A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106933979A (en) * 2017-02-16 2017-07-07 北京奇虎科技有限公司 A kind of position information processing method, device and mobile terminal
CN106940650A (en) * 2017-02-16 2017-07-11 北京奇虎科技有限公司 The data capture method and mobile terminal of a kind of mobile terminal
CN108809990A (en) * 2018-06-14 2018-11-13 北京中飞艾维航空科技有限公司 A kind of crowdsourcing data safety encryption method, server and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103686600A (en) * 2013-11-27 2014-03-26 深圳酷派技术有限公司 Terminal and information protection method
CN104581625A (en) * 2014-11-12 2015-04-29 华中科技大学 Position privacy protection method and system based on particle size control
CN104780501A (en) * 2014-01-13 2015-07-15 腾讯科技(深圳)有限公司 Location privacy protection method and device
CN104834878A (en) * 2015-05-12 2015-08-12 小米科技有限责任公司 Terminal information display method and device
CN105791516A (en) * 2014-12-22 2016-07-20 华为技术有限公司 Terminal position information protection method and intelligent terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103686600A (en) * 2013-11-27 2014-03-26 深圳酷派技术有限公司 Terminal and information protection method
CN104780501A (en) * 2014-01-13 2015-07-15 腾讯科技(深圳)有限公司 Location privacy protection method and device
CN104581625A (en) * 2014-11-12 2015-04-29 华中科技大学 Position privacy protection method and system based on particle size control
CN105791516A (en) * 2014-12-22 2016-07-20 华为技术有限公司 Terminal position information protection method and intelligent terminal
CN104834878A (en) * 2015-05-12 2015-08-12 小米科技有限责任公司 Terminal information display method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106933979A (en) * 2017-02-16 2017-07-07 北京奇虎科技有限公司 A kind of position information processing method, device and mobile terminal
CN106940650A (en) * 2017-02-16 2017-07-11 北京奇虎科技有限公司 The data capture method and mobile terminal of a kind of mobile terminal
CN108809990A (en) * 2018-06-14 2018-11-13 北京中飞艾维航空科技有限公司 A kind of crowdsourcing data safety encryption method, server and storage medium
CN108809990B (en) * 2018-06-14 2021-06-29 北京中飞艾维航空科技有限公司 Crowdsourcing data security encryption method, server and storage medium

Similar Documents

Publication Publication Date Title
US10528770B2 (en) System and method for remotely initiating lost mode on a computing device
US20160261586A1 (en) Identity Authentication Method And Device And Storage Medium
CN105229485A (en) Multifactor location verification
CN107169329A (en) A kind of method for protecting privacy, mobile terminal and computer-readable recording medium
CN106485164A (en) A kind of image processing method and mobile terminal
CN106844604A (en) The information providing method and mobile terminal of electronic map
CN106022196A (en) Information sharing method and intelligent terminal
CN104737194A (en) Device and method for sharing content using the same
TW200931336A (en) System and method for collecting and organizing popular near real-time data in a virtual geographic grid
CN103686600B (en) Terminal and information protecting method
CN105874464A (en) Systems and methods for introducing variation in sub-system output signals to prevent device fingerprinting
CN106778393A (en) A kind of information processing method and mobile terminal
CN106131000B (en) Identifying code fill method and its mobile terminal
CN105303100A (en) Verification method and device of application program startup
CN106295396A (en) A kind of method for secret protection and mobile terminal
CN106503506A (en) A kind of method for information display and electronic equipment
CN105871695A (en) Emoji sending method and device
CN112446995A (en) Identity information registration processing method, device, equipment and system
CN107479886A (en) A kind of method for information display and mobile terminal
CN106210293A (en) A kind of information processing method and mobile terminal
CN109791552B (en) Re-ranking search results using a hybrid learning model
CN106293334A (en) A kind of message prompt method and mobile terminal
CN107483490B (en) A kind of login method and terminal of application
CN106529262A (en) Data protection method for mobile terminal and mobile terminal
CN107609422B (en) A kind of file management method and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170104