CN108259661A - Method for protecting privacy and mobile terminal based on bluetooth connection - Google Patents
Method for protecting privacy and mobile terminal based on bluetooth connection Download PDFInfo
- Publication number
- CN108259661A CN108259661A CN201711448260.5A CN201711448260A CN108259661A CN 108259661 A CN108259661 A CN 108259661A CN 201711448260 A CN201711448260 A CN 201711448260A CN 108259661 A CN108259661 A CN 108259661A
- Authority
- CN
- China
- Prior art keywords
- blue
- bluetooth connection
- privacy
- tooth device
- bluetooth
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/005—Discovery of network devices, e.g. terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/02—Details of telephonic subscriber devices including a Bluetooth interface
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of method for protecting privacy and mobile terminal based on bluetooth connection, include the following steps:Step S10 sends and establishes the request of bluetooth connection to blue-tooth device;Step S20 if establishing bluetooth connection success with the blue-tooth device, judges whether the blue-tooth device belongs to common attachment device;If the blue-tooth device belongs to the common attachment device, privacy function is automatically closed, and privacy information is shown in step S30.The present invention solve it is in the prior art, during privacy information protection, it is low based on protection stability when breaking away and there are still privacy information is viewed by people the technical issues of.
Description
Technical field
The invention belongs to communication technology technical field more particularly to a kind of method for protecting privacy based on bluetooth connection
And mobile terminal.
Background technology
At present, with mobile communication technology fast development, the electronic equipment that mobile terminal is usually carried as people needs
Many classified papers are handled, including many privacy people communications records etc.;It is existing for secret protection, be only mobile terminal
In terms of startup, than lock screen could be solved if desired for input encrypted message;But in fact, after to unlocking screen, mobile terminal is
In complete use state, user leaves, other people's equal energy after mobile terminal is taken if as certain things at this time
Information all in mobile terminal are checked;There is a possibility that privacy information is checked;Protect stability not high.
Therefore, the prior art is to be improved.
Invention content
It is a primary object of the present invention to propose a kind of method for protecting privacy and mobile terminal based on bluetooth connection,
It is in the prior art to solve, during privacy information protection, it is low based on protection stability when breaking away and
The technical issues of there are still privacy information is viewed by people.
In order to solve the above-mentioned technical problem, the method for protecting privacy of the invention based on bluetooth connection, including following
Step:
Step S10 sends and establishes the request of bluetooth connection to blue-tooth device;
Step S20 if establishing bluetooth connection success with the blue-tooth device, judges whether the blue-tooth device belongs to common connection
Device;
If the blue-tooth device belongs to the common attachment device, privacy function is automatically closed in step S30, and by privacy information
Display.
Preferably, before the step S10, including step:
Step S1 receives user operation instruction, based on the operation start instruction Bluetooth function;
Step S2 retrieves the blue-tooth device in preset range.
Preferably, in the step S30, the common attachment device surpasses including being successfully established bluetooth connection number
Cross the bluetooth history means of 2 times.
Preferably, in the step S30, the privacy information includes hiding contact phone number and hiding contact person
Short message.
Preferably, it further includes:
Step S40, every preset time segment acknowledgement and the bluetooth connection status of the blue-tooth device;
Step S41 if the bluetooth connection status are connection failure, starts the privacy function, and the privacy is believed automatically
The dispaly state of breath is set as to show.
The present invention also provides a kind of mobile terminal, including:
Sending module establishes the request of bluetooth connection to blue-tooth device for sending;
If judgment module for establishing bluetooth connection success with the blue-tooth device, judges whether the blue-tooth device belongs to normal
Use attachment device;
If belonging to the common attachment device for the blue-tooth device, privacy function is automatically closed in closedown module, and by privacy
Presentation of information.
Preferably, it further includes:
Receiving module, for receiving user operation instruction, based on the operation start instruction Bluetooth function;
Module is retrieved, for retrieving the blue-tooth device in preset range.
Preferably, the common attachment device includes being successfully established the bluetooth history that bluetooth connection number is more than 2 times
Device.
Preferably, the privacy information includes hiding contact phone number and hiding contact person's short message.
Preferably, it further includes:
Module is confirmed, for every the bluetooth connection status of preset time segment acknowledgement and the blue-tooth device;
Starting module if being connection failure for the bluetooth connection status, starts the privacy function, and will be described hidden automatically
The dispaly state of personal letter breath is set as to show.
The invention has the advantages that:
1st, based on bluetooth connection, with final plant closure privacy function;Realization shows privacy information, safe, and does not need to be defeated
Enter password, crypticity is strong, it is not easy to find.
2nd, based in step S20, needing to judge the successful blue-tooth device of bluetooth connection has been established, if often
With attachment device, privacy function can be just closed;Improve the stability of entire guard method and protection height.
Description of the drawings
Fig. 1 is the flow diagram of first embodiment of the invention;
Fig. 2 is the flow diagram of second embodiment of the invention;
Fig. 3 is the flow diagram of third embodiment of the invention;
Fig. 4 is the structure diagram of mobile terminal in the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
With reference to figure 1, Fig. 1 is the flow diagram of first embodiment of the invention.
In order to solve the above-mentioned technical problem, the method for protecting privacy of the invention based on bluetooth connection, including following
Step:
Step S10 sends and establishes the request of bluetooth connection to blue-tooth device;
In step slo, executive agent is the mobile terminal that user often carries, and the mobile terminal includes mobile phone, intelligence
It can phone, laptop, digit broadcasting receiver, PDA (personal digital assistant) or PAD(Tablet computer).In general, it uses
Family has the function of bluetooth connection in addition to carrying the mobile terminal, the mobile terminal;User can also carry the bluetooth
Device, the blue-tooth device are a kind of short-distance communication equipments;The short distance is referred in 5 meters.First, step S10 is performed,
It sends and establishes the request of bluetooth connection to blue-tooth device;It is connected with preparing to establish with blue-tooth device.
Step S20 if establishing bluetooth connection success with the blue-tooth device, judges whether the blue-tooth device belongs to common
Attachment device;
In step S20, if establishing bluetooth connection success with the blue-tooth device, if successful connection, refer specifically to described mobile whole
Termination receives the title of the blue-tooth device;The blue-tooth device title and history bluetooth connection list are compared, judge institute
State whether blue-tooth device belongs to common attachment device;Judgment mode is, if the blue-tooth device title is to belong to the history indigo plant
In tooth connection list, then it represents that the blue-tooth device is to belong to common attachment device.Wherein, in the history bluetooth connection list
It stores and is successfully established the history blue-tooth device title that bluetooth connection number is more than 1 time with the mobile terminal.It should be noted that
, judgment mode be not limited to it is above-mentioned, wherein blue-tooth device bluetooth number or less radio-frequency hertz range as a comparison
Mode should also belong to the protection domain of the present embodiment.
If the blue-tooth device belongs to the common attachment device, privacy function is automatically closed in step S30, and by privacy
Presentation of information.
In step s 30, if the blue-tooth device belongs to the common attachment device, privacy work(is automatically closed in mobile terminal
Can, i.e., the privacy information is included in predeterminated position;The privacy information includes hiding contact phone number and hides connection
It is people's short message;The predeterminated position includes address list and information list.
Based on above-mentioned, advantageous effect is:Based on bluetooth connection as premise mode, using final plant closure privacy function as knot
Fruit;Realization shows privacy information, safe, and does not need to input password, and crypticity is strong, it is not easy to find;It is existing not
It is that a kind of novelty is very high in having using this step of bluetooth connection as method for secret protection, it is easy to operate, it is common by user
Mode;Based in step S20, needing to judge the successful blue-tooth device of bluetooth connection has been established, if common connect
Connection device can just close privacy function;Improve the stability of entire guard method and protection height.Detailed process is as follows,
As shown in Fig. 2, before the step S10, including step:Step S1 receives user operation instruction, based on the operational order
Start Bluetooth function;Step S2 retrieves the blue-tooth device in preset range.More specifically, user carry mobile terminal and
Blue-tooth device, blue-tooth device can be the electronic equipment that three-dimensional dimension is less than 10 centimetres, when needing to check privacy information, user
The Bluetooth function of mobile terminal can be started, to send BlueTooth request to the blue-tooth device, if user needs to check privacy
Information need to only start blue-tooth device, for example be switched on;Then after blue-tooth device receives the request, i.e., with the movement eventually
Bluetooth connection is established, and blue-tooth device title is sent to the mobile terminal in end, to prompt successful connection;It is mobile at this time whole
End compares the blue-tooth device title and the history bluetooth connection list, if finally confirming, the blue-tooth device is to belong to
In the history bluetooth connection list, then privacy function is closed, and privacy information is shown;Privacy is completed to check;It is also privacy
Means of information protection.
Wherein, in the step S30, the common attachment device was more than including being successfully established bluetooth connection number
The bluetooth history means of 2 times;And it is stored in the history bluetooth connection list and is successfully established bluetooth with the mobile terminal
The history blue-tooth device title that number is more than 1 time is connected, this preferred embodiment is defined the common attachment device, with
Improve stability and the safety of the confirmation process in step S20.
In execution of step S30, i.e. the privacy function of mobile terminal is turned off, and privacy information is shown in predeterminated position;
With reference to figure 3, as shown in figure 3, being further included after the step S30:
Step S40, every preset time segment acknowledgement and the bluetooth connection status of the blue-tooth device;
Step S41 if the bluetooth connection status are connection failure, starts the privacy function, and the privacy is believed automatically
The dispaly state of breath is set as to show.
This preferred embodiment, be in order to start privacy function in user after, if as emergency events, for example go to lavatory
Institute goes to take take-away;It needs to leave mobile terminal for a period of time, at this time since the privacy information of mobile terminal is disclosed, shows
Show in predeterminated position;It is that can not carry out secret protection that i.e. this section, which leaves the mobile terminal time,;Suppression or user leave behind movement
Terminal is left together, as long as user carries away blue-tooth device, because blue-tooth device, which is an existing three-dimensional dimension, is less than 10
Centimetre electronic equipment;It is easy to carry for mobile terminal;When the blue-tooth device leaves together with user, institute
The distance for stating blue-tooth device and the mobile terminal is more than pre-determined distance, and the pre-determined distance is 5 meters;So that the two was established
Bluetooth connection fails;Then mobile terminal starts the privacy function automatically, and the dispaly state of the privacy information is set as
It can not show;Complete the protection for the privacy information;This preferred embodiment be in order to deal with emergency case, with improve for
The stability of privacy information protection.
With reference to figure 4, the present invention also provides a kind of mobile terminal 200, including:
Sending module 100 establishes the request of bluetooth connection to blue-tooth device for sending;
If judgment module 110 for establishing bluetooth connection success with the blue-tooth device, judges whether the blue-tooth device belongs to
Common attachment device;
If belonging to the common attachment device for the blue-tooth device, privacy function is automatically closed, and will in closedown module 120
Privacy information is shown.
Preferably, it further includes:
Receiving module, for receiving user operation instruction, based on the operation start instruction Bluetooth function;
Module is retrieved, for retrieving the blue-tooth device in preset range.
Preferably, the common attachment device includes being successfully established the bluetooth history that bluetooth connection number is more than 2 times
Device.
Preferably, the privacy information includes hiding contact phone number and hiding contact person's short message.
Preferably, it further includes:
Module is confirmed, for every the bluetooth connection status of preset time segment acknowledgement and the blue-tooth device;
Starting module if being connection failure for the bluetooth connection status, starts the privacy function, and will be described hidden automatically
The dispaly state of personal letter breath is set as to show.
Above-mentioned mobile terminal is corresponding with the method for protecting privacy based on bluetooth connection;Institute in the mobile terminal
Comprising module be that by the module or electronics of each step of method for protecting privacy based on bluetooth connection
Element;Therefore the embodiment that mobile terminal is included is also and the embodiment in the method for protecting privacy based on bluetooth connection
It is corresponding;It is not discussed herein, but can realize the dress of each step of method for protecting privacy based on bluetooth connection
It puts or module is within the scope of protection of the invention.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be embodied in the form of software product, which is stored in a storage medium
(Such as ROM/RAM, magnetic disc, CD)In, it is used including some instructions so that a station terminal equipment(Can be mobile phone, computer takes
Business device, air conditioner or the network equipment etc.)Perform the method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure or equivalent flow shift that bright specification and accompanying drawing content are made directly or indirectly is used in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of method for protecting privacy based on bluetooth connection, which is characterized in that include the following steps:
Step S10 sends and establishes the request of bluetooth connection to blue-tooth device;
Step S20 if establishing bluetooth connection success with the blue-tooth device, judges whether the blue-tooth device belongs to common connection
Device;
If the blue-tooth device belongs to the common attachment device, privacy function is automatically closed in step S30, and by privacy information
Display.
2. the method for protecting privacy based on bluetooth connection as described in claim 1, which is characterized in that in the step S10
Before, including step:
Step S1 receives user operation instruction, based on the operation start instruction Bluetooth function;
Step S2 retrieves the blue-tooth device in preset range.
3. the method for protecting privacy based on bluetooth connection as described in claim 1, which is characterized in that in the step S30
In, the common attachment device includes being successfully established the bluetooth history means that bluetooth connection number is more than 2 times.
4. the method for protecting privacy based on bluetooth connection as described in claim 1, which is characterized in that in the step S30
In, the privacy information includes hiding contact phone number and hiding contact person's short message.
5. the method for protecting privacy based on bluetooth connection as described in claim 1, which is characterized in that further include:
Step S40, every preset time segment acknowledgement and the bluetooth connection status of the blue-tooth device;
Step S41 if the bluetooth connection status are connection failure, starts the privacy function, and the privacy is believed automatically
The dispaly state of breath is set as to show.
6. a kind of mobile terminal, which is characterized in that including:
Sending module establishes the request of bluetooth connection to blue-tooth device for sending;
If judgment module for establishing bluetooth connection success with the blue-tooth device, judges whether the blue-tooth device belongs to normal
Use attachment device;
If belonging to the common attachment device for the blue-tooth device, privacy function is automatically closed in closedown module, and by privacy
Presentation of information.
7. mobile terminal as claimed in claim 6, which is characterized in that further include:
Receiving module, for receiving user operation instruction, based on the operation start instruction Bluetooth function;
Module is retrieved, for retrieving the blue-tooth device in preset range.
8. mobile terminal as claimed in claim 6, which is characterized in that the common attachment device includes being successfully established bluetooth
Connect the bluetooth history means that number is more than 2 times.
9. mobile terminal as claimed in claim 6, which is characterized in that the privacy information include hide contact phone number and
Hide contact person's short message.
10. mobile terminal as claimed in claim 9, which is characterized in that further include:
Module is confirmed, for every the bluetooth connection status of preset time segment acknowledgement and the blue-tooth device;
Starting module if being connection failure for the bluetooth connection status, starts the privacy function, and will be described hidden automatically
The dispaly state of personal letter breath is set as to show.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711448260.5A CN108259661A (en) | 2017-12-27 | 2017-12-27 | Method for protecting privacy and mobile terminal based on bluetooth connection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711448260.5A CN108259661A (en) | 2017-12-27 | 2017-12-27 | Method for protecting privacy and mobile terminal based on bluetooth connection |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108259661A true CN108259661A (en) | 2018-07-06 |
Family
ID=62723075
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711448260.5A Pending CN108259661A (en) | 2017-12-27 | 2017-12-27 | Method for protecting privacy and mobile terminal based on bluetooth connection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108259661A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110558945A (en) * | 2019-09-10 | 2019-12-13 | 重庆大学 | infant sleep monitoring system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102394673A (en) * | 2011-11-17 | 2012-03-28 | 深圳市中兴移动通信有限公司 | Ordering method of bluetooth devices and system thereof |
CN104091133A (en) * | 2014-04-17 | 2014-10-08 | 中兴通讯股份有限公司 | Method for protecting security of terminal, terminal and system |
CN104657643A (en) * | 2015-03-13 | 2015-05-27 | 广东欧珀移动通信有限公司 | Privacy protection method, wearable device and mobile terminal |
US20160073218A1 (en) * | 2014-09-04 | 2016-03-10 | Quanta Computer Inc. | Method and system for establishing a bluetooth connection |
CN106603805A (en) * | 2015-10-20 | 2017-04-26 | 中兴通讯股份有限公司 | Method of controlling private data, terminal, and wearable device |
-
2017
- 2017-12-27 CN CN201711448260.5A patent/CN108259661A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102394673A (en) * | 2011-11-17 | 2012-03-28 | 深圳市中兴移动通信有限公司 | Ordering method of bluetooth devices and system thereof |
CN104091133A (en) * | 2014-04-17 | 2014-10-08 | 中兴通讯股份有限公司 | Method for protecting security of terminal, terminal and system |
US20160073218A1 (en) * | 2014-09-04 | 2016-03-10 | Quanta Computer Inc. | Method and system for establishing a bluetooth connection |
CN104657643A (en) * | 2015-03-13 | 2015-05-27 | 广东欧珀移动通信有限公司 | Privacy protection method, wearable device and mobile terminal |
CN106603805A (en) * | 2015-10-20 | 2017-04-26 | 中兴通讯股份有限公司 | Method of controlling private data, terminal, and wearable device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110558945A (en) * | 2019-09-10 | 2019-12-13 | 重庆大学 | infant sleep monitoring system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104468611B (en) | The data safety processing method and device switched based on dual system | |
JP6571203B2 (en) | Privacy protection method and protection device for mobile terminal, and mobile terminal | |
CN104657643A (en) | Privacy protection method, wearable device and mobile terminal | |
CN104732125B (en) | The display methods and terminal of encryption information | |
CN102375651A (en) | Method for unlocking portable electronic equipment | |
CN101304453A (en) | Mobile terminal as well as method and system for data privacy | |
CN106878231A (en) | Method, user terminal and system for realizing secure user data transmission | |
CN103392328A (en) | Communication terminal work remote control server and method and communication terminal | |
CN103152705A (en) | Method, device and system for processing short message | |
CN101384048A (en) | Information managing method and mobile terminal | |
CN103780759A (en) | GSM anti-theft function type smart lock APP operation guiding method | |
CN104252374A (en) | Program control method and device on basis of architecture change | |
CN105320880A (en) | Terminal control method and apparatus | |
CN107908974A (en) | A kind of method and terminal for protecting privacy of user | |
CN103577220A (en) | System and method for opening private application or private data through NFC (near field communication) label | |
CN102801731A (en) | Method and device for protecting data | |
CN106934303A (en) | Trusted operating system based on credible chip creates the system and method for trusted process | |
CN105743917A (en) | Message transmitting method and terminal | |
CN104243708A (en) | Mobile terminal and anti-theft method and device of mobile terminal | |
CN108259661A (en) | Method for protecting privacy and mobile terminal based on bluetooth connection | |
CN105224274A (en) | A kind of information processing method and electronic equipment | |
CN104156653B (en) | A kind of application guard method and the device of mobile terminal | |
CN104408360A (en) | Encryption equipment and method based on mobile terminal | |
WO2017020598A1 (en) | Contact information management method, apparatus and terminal | |
CN106874795A (en) | A kind of tamper machine method of mobile terminal, device and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180706 |
|
RJ01 | Rejection of invention patent application after publication |