CN1801979A - Method for ensuring data information safety in mobile terminal - Google Patents

Method for ensuring data information safety in mobile terminal Download PDF

Info

Publication number
CN1801979A
CN1801979A CNA2005100002370A CN200510000237A CN1801979A CN 1801979 A CN1801979 A CN 1801979A CN A2005100002370 A CNA2005100002370 A CN A2005100002370A CN 200510000237 A CN200510000237 A CN 200510000237A CN 1801979 A CN1801979 A CN 1801979A
Authority
CN
China
Prior art keywords
data information
secret
password
switch
portable terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2005100002370A
Other languages
Chinese (zh)
Other versions
CN100570622C (en
Inventor
王正伟
肖颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2005100002370A priority Critical patent/CN100570622C/en
Publication of CN1801979A publication Critical patent/CN1801979A/en
Application granted granted Critical
Publication of CN100570622C publication Critical patent/CN100570622C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

Present invention discloses a method for ensuring message safety in mobile terminal. Said method includes pre - setting safety mark to message stored in mobile terminal, said mobile terminal determining message safety mark before providing stored message to user and processing said message according to said safety mark. Said invention can successfully prevent user's mobile terminal stored message leakage.

Description

A kind of method that ensures the safety of data information in the portable terminal
Technical field
The present invention relates to the information security technology of Wireless Telecom Equipment, be specifically related to a kind of method that ensures the safety of data information in the portable terminal.
Background technology
Along with using more and more widely such as portable terminals such as mobile phones, the information of preserving on portable terminal is also more and more rich and varied, convenience for example in order to call, the user preserves phone book information on the mobile phone of being everlasting, stored telephone number and other contact methods with user-dependent household, relatives, friend etc. in this telephone directory.Except telephone number information, also may store common short message (SMS) or multimedia short message (MMS) on the mobile phone, and, also may preserve user's picture shot or video having on the mobile phone of camera, have some other data informations of also preserving the user on the mobile phone of personal digital assistant functionality, the storage of these information has brought work and convenience in life to the user.Above these information of preserving in the portable terminal generally all are some privacy informations of user, and the user does not wish that generally these leakage of information are to other people.But at present, these all information are not all well protected in portable terminal, can obtain the corresponding information of preserving at an easy rate by menu function such as, other users.
As everyone knows, the situation that present mobile phone is lost because of carelessness or stolen robbing can be found everywhere, in case other people has obtained user's mobile phone, for example telephone number, SMS, MMS, picture or video that can obtain easily storing in the mobile phone or the like information so.Because these information overwhelming majority is user's privacy, these information are in case expose, and therefore the user may suffer spiritual injury, so the user does not wish that these information are known by other people.
In addition, the moving terminal use of a certain displacement of also frequent generation uses by the side of other people because the portable terminal of oneself does not have electricity in actual life, and for example the phenomenon of other mobile communication businesses is called or carried out to colleague, classmate's or the like portable terminal.Like this, lend mobile terminal user and be kept at the interior information of this portable terminal, for example the information of telephone number, short message or the like just is exposed to the borrower fully.And as previously mentioned, having in these information all is individual's privacy greatly, even for people such as classmate, colleague, mobile phone users may not wish that they see these information of oneself yet, in order to avoid the privacy of oneself is made known publicly.
But, at present because without any encryption measures or safety precautions at the portable terminal internal information, the privacy problem of mobile phone users usually can not get ensureing that the user usually feels awkward because individual privacy exposes, worries.Therefore, how to ensure the fail safe of the data information of portable terminal storage inside, ensure user's individual privacy better, become the previous problem that presses for solution of order.
Summary of the invention
In view of this, main purpose of the present invention provides a kind of method that ensures the safety of data information in the portable terminal, checks the data information of preserving in the portable terminal to prevent other people, thereby avoids the leakage of the data information of portable terminal stored.
Above-mentioned purpose of the present invention is achieved by the following technical solutions:
A kind of method that ensures the safety of data information in the portable terminal comprises at least:
A. safe mark is set for the data information of portable terminal stored in advance;
B. portable terminal was determined the safe mark of data information before the data information that storage is provided to the user, and handled this data information according to this safe mark.
Wherein handling this data information according to this safe mark among the step b comprises: represent the data information of normal process for the value of data information that safe mark is not set or set safe mark, carry out normal process; Represent the data information of abnormality processing for the value of set safe mark, carry out abnormality processing.
Preferably, this method further comprises the step that secret password is set, further comprise when the user further obtains the data information of abnormality processing: the prompting user imports corresponding secret password, and is checking the correct back of secret password this data information of normal process of user's input; Perhaps reset or the safe mark of cancelling data information when being provided with the user, the prompting user imports corresponding secret password, and after the secret password of checking user's input is correct, carries out to reset or cancel the operation that the safe mark of this data information is provided with.
Safe mark of the present invention can be the confidential data classer's description that is used for the data information of need to be keep secret is carried out classification, this moment, this method further comprised: current confidential data classer's description is set, among the step b before coming this data information of abnormality processing according to this safe mark, whether judgement is lower than the value of the current confidential data classer's description of setting at this confidential data classer's description, if, this data information of normal process then, otherwise, come this data information of abnormality processing according to this safe mark.The safe mark here can further include the processing sign that expression is classified to the processing mode of data information, and step b is described to come this data information of abnormality processing to be meant that the processing that comprises according to safe mark indicates to come this data information of abnormality processing according to this safe mark.
Safe mark of the present invention also can be the processing sign that expression is classified to the processing mode of data information.Processing mode is not point out, use Hidden Codes to substitute prompting, part prompting, use a kind of in code word prompting, the part auditory tone cues, and the abnormality processing data information is not point out data information, use Hidden Codes to substitute prompting data information, part to point out data information, use a kind of in code word prompting data information, the corresponding part acoustic information of prompting data information.
Among the step a be: for each concrete data information record is provided with a safe mark respectively for the data information of portable terminal stored is provided with a safe mark, perhaps, perhaps a safe mark is set for all data informations for the data information of same nature is provided with a safe mark.
From technical scheme of the present invention as can be seen, the data information that the present invention maintains secrecy for the needs of portable terminal stored is provided with safe mark, in showing portable terminal, at first determine this safe mark before the data information, and, perhaps carry out the demonstration of data information according to the content of the value of this safe mark according to whether having safe mark.Here for the then undesired display data information of the data information of need to be keep secret, for example do not show, perhaps use ciphertext to show, perhaps carry out part and show, no matter adopt any display packing, other users can't intactly be known the content of the data information of these needs to be keep secret.The present invention can prevent successfully that other people from checking the data information of preserving in the portable terminal like this, thereby avoids the leakage of the data information of portable terminal stored, and the spiritual injury of having avoided this leakage to cause to the user.
The present invention can provide a secret switch, for validated user, can be by the use secret password to secret switch executable operations, validated user can be closed secret switch easily when needs are checked the data information that will maintain secrecy accordingly like this, thereby can not make troubles to validated user.
Security schema among the present invention can be arranged to different classes of, also can be arranged to different ranks, and secret password can be set respectively, thereby makes application of the present invention more flexible, and provides more convenience to the user.
Tupe of the present invention can be arranged to multiple, to satisfy different custom of user and requirement.
Description of drawings
Fig. 1 is an overview flow chart of the present invention;
Fig. 2 is the flow chart of the first embodiment of the present invention;
Fig. 3 is the flow chart of the second embodiment of the present invention;
Fig. 4 is the flow chart of the third embodiment of the present invention;
Fig. 5 is the flow chart of the fourth embodiment of the present invention;
Fig. 6 is the flow chart of the fifth embodiment of the present invention.
Embodiment
The present invention is described in detail below in conjunction with the drawings and specific embodiments.
In the present invention, each the bar data information for the portable terminal stored perhaps is provided with safe mark for each class data information, can realize the purpose that the data information of portable terminal stored is maintained secrecy so easily.
Fig. 1 is an overview flow chart of the present invention, and as shown in Figure 1, in step 101, the data information for the need to be keep secret in the portable terminal is provided with safe mark in advance.
Here can safe mark be set for the data information of need to be keep secret, and the data information of not need to be keep secret is not provided with safe mark; The safe mark that representative is maintained secrecy perhaps can be set the data information of need to be keep secret, the data information of not need to be keep secret is provided with the unclassified safe mark of representative.Safe mark can be preserved together with the data information of correspondence.In general, the data information of portable terminal stored all comprises a plurality of territories, a plurality of territories of telephone number record relation that may comprise numbering, name, telephone number, phone type and user or the like for example, in the present invention, can outside these territories, add the territory of an expression safe mark again, and in newly-increased territory the storage security sign, thereby portable terminal can be judged the whether need to be keep secret of this data information according to this sign.Safe mark can be provided with at a record, such as, be provided with at every telephone number record; Also can be provided with at a group record or a table, such as, be provided with at telephone directory book.
Safe mark can be divided into two kinds: confidential data group indication and processing sign.The confidential data group indication is used for being provided with security schema, handle and indicate the set handling pattern that is used for, such as various literal display modes or various sound playing pattern, these two kinds of signs have been realized the purpose of guarantee data security of the present invention from different aspects, and these two kinds of signs can be used in combination.
In step 102, when portable terminal provides the data information of storage, at first determine the safe mark of data information correspondence.Here, presentation mode can be to show by text or image, also can point out by sound.Generally, portable terminal can trigger the operation of the data information that storage is provided after the Query Information order that receives the user, so that corresponding data information is offered the user according to certain mode by user interface facilities such as microphone or display screen.
In step 103, portable terminal carries out the processing of data information according to this safe mark, thereby realizes ensureing the data information purpose of safety.Specifically, can do abnormality processing for the data information of need to be keep secret, then can normal process for the data information of not need to be keep secret.The abnormality processing here can be carried out according to the processing mode of the security schema correspondence of confidential data group indication representative, or carries out according to the processing mode of the tupe correspondence of handling the sign representative.Described abnormality processing can be not display data information or imperfect display data information or substitute display data information or not exclusively play data information with Hidden Codes, such as " Zhang San " play " Zhang ".
Illustrate at first that below safe mark is the situation of confidential data group indication.
The confidential data group indication can be provided with different security schemas, a kind of simple situation is for the data information that needs are maintained secrecy a confidential data group indication to be set, for the data information that does not need to maintain secrecy the confidential data group indication is not set, in a single day portable terminal reads and promptly knows and need maintain secrecy to this data information after data information has the confidential data group indication like this, that is to say that promptly representing of this confidential data group indication itself will maintain secrecy to data information.In these cases, the present invention proposes as shown in Figure 2 first specific embodiment.
In step 201, the data information for the need to be keep secret in the portable terminal is provided with the confidential data group indication in advance.
In step 202, when portable terminal provides the data information of storage, determine at first whether this data information is provided with a confidential data group indication.If, execution in step 203, otherwise execution in step 204.
In step 203, this data information is carried out abnormality processing, such as, show this data information undesiredly.
In step 204, this data information is carried out normal process, such as, normally show this data information.
Pass through said method, the user can be provided with a confidential data group indication to others disclosed data information to not wishing, for other data information the confidential data group indication can be set, can realize simply and easily not wishing the safety guarantee of disclosed data information, thereby ensure user's privacy.
Perhaps, can a confidential data group indication all be set to all data informations, the data information of maintaining secrecy for needs, its confidential data group indication is provided with the value that a representative need be maintained secrecy, and the data information to not needing to maintain secrecy, its confidential data group indication is provided with a representative does not need the value of maintaining secrecy, and portable terminal is determined the whether need to be keep secret of this data information by the value that reads the confidential data group indication like this.Second embodiment has as shown in Figure 3 been proposed for this reason.
In step 301, for all data informations in the portable terminal confidential data group indication is set in advance, and the value for the data information confidential data group indication of need to be keep secret is set to represent secret value, is set to represent unclassified value for the value of the data information confidential data group indication of not need to be keep secret.
In step 302, when portable terminal provides the data information of storage, at first read the value of the confidential data group indication of this data information correspondence.And judge this value whether represent secret, if, execution in step 303, otherwise execution in step 304.
In step 303, this data information is carried out abnormality processing, such as, show this data information undesiredly.
In step 304, this data information is carried out normal process, such as, normally show this data information.
The user uses for convenience, the present invention further provides a secret switch.Its flow chart as shown in Figure 4.
Fig. 4 shows the flow process of the third embodiment of the present invention.In step 401, the data information for the need to be keep secret in the portable terminal is provided with the confidential data group indication in advance.Perhaps be set to the value of need to be keep secret, be set to the value of not need to be keep secret for the data information confidential data group indication of not need to be keep secret for the data information confidential data group indication of need to be keep secret.
In step 402, a secret switch is set in portable terminal in advance.The effect of secret switch is to determine whether to allow the data information execute exception to the portable terminal stored to handle, and secret switch generally is kept on the memory of portable terminal.
In step 403, when portable terminal provides the data information of storage, at first obtain the value of secret switch.
In step 404, portable terminal is judged secret switch whether for opening, if, execution in step 405 and subsequent step thereof; Otherwise direct data information in step 407 normal process portable terminal stored.
In step 405, portable terminal determines whether data information has the confidential data group indication, and perhaps whether the value of confidential data group indication is represented and will be maintained secrecy.If, make abnormality processing in the content of step 406 pair this data information, such as, the content of undesired ground display data information; Otherwise the content at step 407 pair this data information is made normal process, such as, the normal display data information content.
Perhaps, the 4th embodiment as shown in Figure 5 also can at first determine whether the confidential data group indication, determines that under the situation with confidential data group indication whether secret switch is opened, and can play and the 3rd embodiment similar effects again.
In step 501, the data information for the need to be keep secret in the portable terminal is provided with the confidential data group indication in advance.Perhaps be set to the value of need to be keep secret, be set to the value of not need to be keep secret for the data information confidential data group indication of not need to be keep secret for the data information confidential data group indication of need to be keep secret
In step 502, a secret switch is set in portable terminal in advance.The effect of secret switch is to determine whether to allow the data information execute exception to the portable terminal stored to handle, and secret switch generally is kept on the memory of portable terminal.
In step 503, when portable terminal provided the data information of storage, portable terminal determined whether data information has the confidential data group indication, and perhaps whether the value of confidential data group indication is represented and will be maintained secrecy.If, execution in step 504 and subsequent step thereof; Otherwise direct execution in step 507.
In step 504, portable terminal reads the value of secret switch.
In step 505, portable terminal is judged secret switch whether for opening, if, execution in step 506; Otherwise execution in step 507.
In step 506, the content of this data information is made abnormality processing, such as, the content of undesired ground display data information.
In step 507, the content of this data information is made normal process, such as, normally show the content of this data information.
A secret switch setup menu can be set, and for secret switch, mobile phone users can be provided with by the menu that portable terminal provides and revise flexibly.In order to prevent other people setting or modification, in this embodiment a secret password can be set further in the memory of portable terminal, and in the memory of portable terminal, preserve this secret password secret switch.When the user is provided with or revises secret switch, can require the user at first to import a secret password.Portable terminal judges whether the secret password of user's input is correct then, such as, judge whether the secret password of the secret password of user input and setting is identical, if identical, then allow the user to be provided with or to revise secret switch, otherwise do not allow the user to be provided with or to revise secret switch.Can guarantee to have only the user could carry out the setting of secret switch and the operation of modification like this.
Below by an object lesson explanation the foregoing description.
If user's portable terminal stored 10 telephone number records, the user thinks that wherein 8 telephone number records are important informations and be unwilling that others checks, the record of two other telephone number then is unessential relatively information.The user can think that the back of important 8 telephone number records adds a confidential data group indication like this, and does not add the confidential data group indication after the record of two other telephone number, perhaps adds the unclassified confidential data group indication of expression.Here the user is provided with the confidential data group indication and can be undertaken by the menu that portable terminal provides.
And, a secret switch is set on portable terminal, user oneself is provided with a secret password, and this secret password is kept on the memory of portable terminal.The user sets in advance secret switch for opening, and just to allowing corresponding data information execute exception is handled.When the user need check all telephone number records, at first the menu that provides by portable terminal was revised secret switch, and at this moment portable terminal can point out the user to import secret password.
After the secret password that receives user's input, portable terminal judges whether user input correct, if correct, then with the status modifier of secret switch for closing, just do not allow the data information execute exception is handled, and allow the user arbitrarily to obtain such as checking complete content.The information that at this moment will normally show 10 telephone number records, the user can check own complete data information of being preserved like this.
If portable terminal judges that the secret password of user's input is incorrect, perhaps the user does not revise secret switch, promptly the state of secret switch is still for opening, portable terminal can read so has 8 telephone number records to be provided with need to be keep secret in 10 telephone number records, portable terminal may only show remaining two telephone number records like this, and not shows that 8 important telephone number records.
In the above-described embodiments, the value of confidential data group indication is divided into the security schema and two kinds of the open modes of representing not need to be keep secret of representing need to be keep secret, in actual conditions, can the value of confidential data group indication be provided with more flexibly, promptly, multiple subpattern can be set for security schema.For example; multiple security schema can be set; these security schemas comprise relatives' pattern, friend's pattern, client's pattern or the like; and by selecting different security schemas; obtain the information under the different security schemas, or conversely speaking, by selecting different security schemas; make that the information under the different security schemas is handled singularly, thereby protect these information.Can certainly think that open mode is a kind of special security schema, but in narrating in the back, unless stated otherwise, security schema does not comprise open mode.
The different security schema of above-mentioned selection can be undertaken by the collection of maintaining secrecy is set.With need to be keep secret just the corresponding security schema of abnormality processing put into and maintain secrecy to concentrate, and will need the normal pattern that shows to get rid of outside the collection of maintaining secrecy.The present invention proposes the 5th embodiment as shown in Figure 6 for this reason.
As shown in Figure 6, in step 601, data information for the need to be keep secret in the portable terminal is provided with the confidential data group indication in advance, perhaps be set to the value of need to be keep secret, be set to the value of not need to be keep secret for the data information confidential data group indication of not need to be keep secret for the data information confidential data group indication of need to be keep secret.Described security schema can be concrete subpattern, such as relatives' pattern, friend's pattern, client's pattern or the like.Can be with the subpattern or the open mode of the corresponding different security schema of different confidential data group indication value.Such as, when confidential data group indication value is binary value 00000000, corresponding unclassified open mode; When confidential data group indication value is binary value 00000001, corresponding relatives' pattern; When confidential data group indication value is binary value 00000010, corresponding friend's pattern; When confidential data group indication value is binary value 00000100, corresponding client's pattern.
In step 602, the collection of maintaining secrecy is set in portable terminal in advance, and the pattern of need to be keep secret is added the collection of maintaining secrecy.Such as, the collection of maintaining secrecy is represented with a variable, represent that with variate-value 00000000 secret concentrating do not add any security schema, represent that with variate-value 00000001 secret concentrating added relatives' pattern, represent that with variate-value 00000011 secret concentrating added relatives' pattern and friend's pattern, represent that with variate-value 00000101 secret concentrating added relatives' pattern and client's pattern, represent that with variate-value 00000111 secret concentrating added relatives' pattern, friend's pattern and client's pattern, representing to maintain secrecy to concentrate with variate-value 11111111 adds all security schemas.
The effect that collects of maintaining secrecy is to determine that its pattern that is comprised is to be allowed to the pattern that execute exception is handled, thereby, maintain secrecy when concentrating at this at the pairing security schema of value of the confidential data group indication of a data information, when this data information is provided, can allow it is carried out abnormality processing, such as the information that shows this data undesiredly.Secret collection generally is kept on the memory of portable terminal.
In step 603, when portable terminal provides the data information of storage, at first read the confidential data group indication of data information correspondence.
In step 604, portable terminal is determined the confidential data group indication of data information, promptly whether corresponding security schema, such as, whether the value of judging the confidential data group indication greater than 0, if greater than 0, and expression is corresponding security schema, such as, corresponding relatives' pattern or friend's pattern or client's pattern; If equal 0, then corresponding open mode.If corresponding a security schema, then execution in step 605 and subsequent step thereof; If there is not the confidential data group indication, promptly represent not need to be keep secret, the perhaps corresponding open mode of the confidential data group indication of this data information is then at this data information of step 607 normal process, such as the content of normal display data information.
In step 605, portable terminal reads the information of the collection of maintaining secrecy, and determines whether the security schema of the confidential data group indication correspondence of data information is included in secret concentrating.If, execution in step 606, otherwise execution in step 607.
In step 606, the complete content of this data information is made abnormality processing, such as, the content of undesired ground display data information.
In step 607, the content of this data information is made normal process, such as, the complete content of display data information.
The collection setup menu of maintaining secrecy can be set, and for the collection of maintaining secrecy, mobile phone users can be provided with by the menu that portable terminal provides and revise flexibly.In order to prevent other people setting or modification, can in the memory of portable terminal, further preserve secret password in this embodiment at whole secret collection to the collection of maintaining secrecy.When the user is provided with or revises secret collection, can require the user at first to import a secret password.Whether portable terminal judges whether the secret password of user's input is correct then, such as identical with the secret password of oneself preserving, if correct, then allow the user to be provided with or to revise the collection of maintaining secrecy, otherwise do not allow the user to be provided with or to revise the collection of maintaining secrecy.
Among the present invention, a total secret switch can be set at all data informations of portable terminal stored, and a total secret password being set at all data informations of portable terminal stored, the secret password of the secret password of data information correspondence and total secret switch correspondence is total secret password here.
Perhaps, a secret switch of son can be set respectively at the data information of different nature of portable terminal stored, data information of different nature at the portable terminal stored is provided with a sub-secret password respectively, for example for short message is provided with a secret switch of son and corresponding sub-secret password, for telephone directory is provided with secret switch of another height and corresponding sub-secret password.And further set up the corresponding relation of sub-secret password and sub secret switch, the secret password of the secret password of data information correspondence and sub secret switch correspondence comprises sub-secret password here.
Perhaps, total secret switch and sub secret switch can be set simultaneously, and total secret password and sub-secret password are set respectively simultaneously, the secret password of the secret password of data information correspondence and sub secret switch correspondence comprises sub-secret password and total secret password here.
In safe mark is to be used under the situation of confidential data group indication that the data information of need to be keep secret is classified, confidential data classification switch can be set respectively at the different classes of data information of portable terminal stored, a confidential data classification password be set respectively at the different classes of data information of portable terminal stored.For example be switch of information setting of friend's pattern, be another switch of information setting of client's pattern.And further set up the corresponding relation of confidential data classification password and confidential data classification switch.The secret password of the secret password of the data information correspondence here and confidential data classification switch correspondence comprises confidential data classification password.
In this case, the data information of different nature that may further include at the portable terminal stored is provided with a sub-secret password respectively and a secret switch of son is set, the secret password of the secret switch correspondence of son comprises sub-secret password, and the secret password of the secret password of data information correspondence and confidential data classification switch correspondence further comprises corresponding sub-secret password.
In this case, a total secret password also can be set at all data informations of portable terminal stored and a total secret switch is set, the secret password of total secret switch correspondence is described total secret password, and the secret password of the secret password of data information correspondence and confidential data classification switch correspondence further comprises total secret password.
Certainly, confidential data classification switch, sub secret switch and total secret switch can be set simultaneously, and corresponding secret password is set simultaneously.At this moment, the secret password of the secret password of data information correspondence and confidential data classification switch correspondence comprises confidential data classification password, sub-secret password and total secret password.
Be appreciated that, secret collection is only used for a kind of mode of judging whether secret switch is opened, with subpattern from maintain secrecy to concentrate get rid of come out matter in fact just with the state of secret switch from opening the process of closing that is revised as, otherwise, subpattern join maintain secrecy to concentrate its essence just with the state of secret switch from closing the process of opening that is revised as.
The security schema here can be the mutual exclusion type, just the user once can only select a subpattern to get rid of outside the collection of maintaining secrecy from multiple subpattern, and other subpattern all must be included among the collection of maintaining secrecy, just can only forbid the pairing data information of a kind of safe mark of security schema correspondence is carried out abnormality processing, such as, the user can only see the wherein complete data information of a spermotype from multiple subpattern.Also for example, after the user has selected relatives' pattern, just can not select friend's pattern or client's pattern, that is to say that on behalf of the data information record of friend's pattern or client's pattern, safe mark will can intactly do not shown; Equally, if in a single day the user selects friend's pattern, just can not select relatives' pattern or client's pattern.By the mutual exclusion of security schema, can realize that different subpatterns can only show wherein a kind of simultaneously, and can not intactly show multiple simultaneously.
In addition, security schema also can be a compatible type, just allows the user simultaneously in the concentrated multiple subpattern of getting rid of of maintaining secrecy.For example allow the user simultaneously in concentrated relatives' pattern and the friend's pattern got rid of of maintaining secrecy, the user it will be appreciated that on behalf of the data information record of relatives' pattern, safe mark, safe mark represent the data information record of friend's pattern and the data information record that safe mark is represented open mode like this, and on behalf of the data information of client's pattern, safe mark write down and will can intactly do not shown.
In addition, security schema also can be the classification type, for example one-level security schema, secondary security schema, three grades of security schemas, level Four security schema or the like, narration for convenience, the value of the safe mark of regulation one-level security schema correspondence is 1, the value of the safe mark of secondary security schema correspondence is that the value of the safe mark of 2,3 security schema correspondences is 3, and the rest may be inferred.Here, we can be higher than the secondary security schema by regulation upper level security schema, and the secondary security schema is higher than three grades of security schemas, by that analogy.After the user has selected other security schema of level, when terminal is given information information, judge this data information correspondence the safe mark correspondence security schema be superior to this other security schema of level that the user selects the time, when the safe mark value of also promptly judging this data information correspondence is less than or equal to the value of safe mark of other security schema correspondence of this grade that the user selects, portable terminal is done abnormality processing to this data information, otherwise does normal process.
Like this, after the user had selected other security schema of level, portable terminal was providing this rank pairing data information, all made abnormality processing for being greater than or equal to this other data information of level, such as show these information undesiredly.
In the middle of the reality, can be by a current security classification variable be set, and select different security schemas by different values being set for this variable.
Equally, for hierarchical pattern,, also can a secret password be set respectively at each hierarchical security pattern with aforementioned the same.When portable terminal is selected other security schema of level the user, such as the user when the value of current security classification variable is set, the pairing secret password of other security schema of level that can require the user to import to be provided with, portable terminal judge when the password of user's input with consistent corresponding to the secret password of other security schema of level that will be provided with after, other security schema of this level of permission selection.
The above-mentioned safe mark that illustrated is the situation of confidential data group indication, and going on to say safe mark below is the situation of handling sign.Handle sign in order to distinguish the portable terminal information processing mode of giving information, such as, when the user checks data information, can be provided with by code word prompting or imperfect prompting etc. for the auditory tone cues information mode, can be provided with by Hidden Codes for screen display mode and substitute demonstration or imperfect demonstration or the like.
With confidential data group indication correspondence, similar with first embodiment, for the data information of not need to be keep secret set handling sign or the normal process sign is set not then, data information for need to be keep secret can be provided with an abnormality processing sign, the abnormality processing sign can have varied, such as, do not show, substitute demonstration, part demonstration or the like with Hidden Codes.Portable terminal will indicate according to the processing to this data information setting and carry out corresponding process operations when giving information information.Such as: when giving information information, portable terminal judges that the processing that data information has is masked as " not showing ", and then portable terminal will not show this data information, and the user also can't see these information from screen at all; Portable terminal is judged when the processing that data information has is masked as " using Hidden Codes to substitute shows ", then portable terminal will use corresponding Hidden Codes to substitute this data information of demonstration, the user sees that from screen this data information is some Hidden Codes, such as, be shown as a string asterisk " * "; Portable terminal is judged when the processing that data information has is masked as " part shows ", then portable terminal will show the part of this data information, remainder does not show, or using corresponding Hidden Codes to substitute the remainder that shows this data information, the user sees that from screen this data information is incomplete.
Handling sign can be provided with each bar data information record, such as, a numbering directory record is provided with; Also can one group of data information be provided with as a table, such as, all records of a numbering directory are provided with; So also can be provided with to data information.
Similar with the 3rd embodiment, the 4th embodiment, a processing switch also can be set.When handling switch opens, the setting of handling sign comes into force, that is, when giving information information, be provided with according to the value of handling sign.When the processing switch cuts out, when giving information information, will ignore the situation that is provided with of handling sign, promptly handle according to the normal process mode.Use for convenience, a processing switch password can further be set, when the value of user's set handling switch, portable terminal prompting user inputs and handles the switch password, and whether the processing switch password of judging user's input is correct, if incorrect, then refuses the operation of set handling switch value, otherwise, carry out the operation of set handling switch value.
Handling switch can be provided with at all processing signs, promptly to all processing signs, a processing switch is set; Also can handle sign and be provided with, promptly each be handled sign a processing switch is set at each.The corresponding switch password of handling also can be provided with at each processing switch of handling sign.
In the middle of the reality, handle sign and can be arranged to not show, show that Hidden Codes, part show, point out code word, the imperfect information of prompting or the like.Portable terminal will indicate according to the processing to this data information setting and carry out corresponding process operations when giving information information.
When giving information information, portable terminal judges that the processing that data information has is masked as " not showing ", and then portable terminal will not show this data information, and the user also can't see these information from screen at all; Portable terminal judges when the processing that data information has is masked as " using Hidden Codes to substitute shows " that then portable terminal will use alternative this data information that shows of corresponding Hidden Codes, and the user sees that from screen this data information is some Hidden Codes; Portable terminal is judged when the processing that data information has is masked as " part shows ", then portable terminal will be according to the shielding rules of setting, a part that shows this data information, remainder does not show, or using corresponding Hidden Codes to substitute the remainder that shows this data information, the user sees that from screen this data information is incomplete.Portable terminal judges that the processing that data information has is masked as " prompting code word ", and then portable terminal will use code word to replace this data information to point out, such as, " Zhang San " said " Jiang Sheng "; Portable terminal judges that the processing that data information has is masked as " pointing out imperfect information ", and then portable terminal will be pointed out the part voice messaging of this data information.
For Hidden Codes, can be a string star " * " character, also can be a string random character, such as, a string random number word string.The actual information number of characters that the number of characters of Hidden Codes not necessarily will equal to be hidden.Such as, for one 11 number " 15501234567 ", if Hidden Codes are a string star " * ", then can be " * * * " or " * * * * * * * * * * * ", if Hidden Codes are a string random characters, then can be random string " 5823 " or " 15623879863 ".Obviously, write down when showing when the used for mobile terminal Hidden Codes substitute the actual data information that will show, other people are the actual content information that can't obtain this data.And, when Hidden Codes are random number, have certain duplicity toward contact, those cankered people are taken in, thereby, protect information security more effectively.
For the section processes sign, its shielding rules can be a part of information of display data information record only, and remainder does not show, perhaps, a part of information of display data information record, and, use Hidden Codes to substitute demonstration to remainder, such as, for one 11 number " 15501234567 ", the shielding rules here can be three on the head that only shows number, and then 8 will not show, that is, be shown as " 155 "; Or show three on the head of number, and be shown as Hidden Codes with back 8, such as, be shown as " 155*** ", or " 15513572468 ", wherein " 13572468 " are random strings.
In the middle of the reality, handling sign can be used in combination with the confidential data group indication.For example safe mark is set to open mode, maintains secrecy and does not show, maintains secrecy and shows Hidden Codes, maintains secrecy and a kind of in showing etc. of part, is set to perhaps that relatives' pattern and part show or client's pattern does not show.When the safe mark that reads data information record when portable terminal is represented open mode, will normally show this data information record; The safe mark representative that reads data information record when portable terminal is maintained secrecy and when not showing, when secret switch opens, do not carry out any demonstration, if for example this data information is recorded as a telephone number record, then the user will not know to also have so telephone number record when checking telephone directory book; The safe mark representative that reads data information record when portable terminal is maintained secrecy and when showing Hidden Codes, in secret switch opens, when promptly secret collection value comprises this safe mark, to use the user can't know that one group of Hidden Codes character of precise meaning shows, if for example this data information is recorded as a telephone number record, then this telephone number record of seeing when checking telephone directory book of user is a string asterisk: " * * * * * * * * * * * "; The safe mark representative that reads data information record when portable terminal is maintained secrecy and part when showing, when secret switch opens, will use the user can't know that one group of character of precise meaning substitutes the partial content of display data information record, for example a certain telephone number record seeing when checking telephone directory book of user is that literal or numeral add a string asterisk: " opening * * ", " 138******** ", here literal of Xian Shiing or digital being provided with and can being provided with by the user also can be adopted default setting or generation at random by portable terminal.The safe mark that reads data information record when portable terminal represent relatives' pattern and when partly showing, when secret collection value comprises relatives' pattern, the secret switch that is relatives' mode safety sign correspondence will use the user can't know that one group of character of precise meaning replaces the partial content of display data information record when opening; The safe mark that reads data information record when portable terminal represent client's pattern and when not showing, does not carry out any demonstration when comprising client's pattern maintaining secrecy to collect.
The safe mark of above-mentioned explanation is to be provided with at the concrete data information of each bar, also can a safe mark be set in actual the use at a class data information unification, for example a safe mark of representing open mode is set, the safe mark that a representative is maintained secrecy and shown ciphertext is set at short message at telephone number.Other users can normally check all telephone number informations in the customer mobile terminal like this, and it will be appreciated that a series of asterisk when checking short message, and can not correctly read the content of short message.Certainly can understand, a safe mark is set and a safe mark is set and to carry out simultaneously at the concrete data information of each bar at a class data information.
In the middle of the reality, substitute situation about showing for incomplete demonstration or use Hidden Codes, portable terminal can also be when the user further checks this data information, it (can be the security schema of confidential data group indication representative that the prompting user imports a pattern at this safe mark representative, can be the tupe of handling the sign representative) password that is provided with, and after judging that the user inputs correct password, normally show this data information, otherwise, still undesired this data information of demonstration.Such as, when the user checks numbering directory, portable terminal because a certain numbering directory recording setting safe mark and shown a string Hidden Codes, when the user moved to cursor this number record and further checks this record, portable terminal ejected a dialog box, and the prompting user inputs password, the password correspondence of user input during the pattern of safe mark correspondence that should record, portable terminal normally shows this data information, otherwise it is constant that portable terminal keeps Hidden Codes to show.Be appreciated that the present invention can be provided with secret password at security schema, and secret switch is not set, when the user need further check these information, undertaken by secret password.Equally, can secret password be set, and set handling switch not when the user need further check these information, is undertaken by handling password at tupe.Correspondingly, having increased secret switch or handled switch, only is that the user checks large batch of security information and uses for convenience.
In addition, safe mark of the present invention can directly be a password.When safe mark is sky, the not need to be keep secret of data information that expression is corresponding; When safe mark is not empty but during a password, the data information need to be keep secret that expression is corresponding, and before the user checks this data information, need the user to input correct password, the value that just needs to import correct safe mark can be to check.
The data information of the portable terminal stored of mentioning among the present invention comprises the data information of portable terminal storage itself, also comprises the data information of storing on the subscriber card in the portable terminal.
Be appreciated that the above only for preferred embodiment of the present invention, or not within the spirit and principles in the present invention not all in order to restriction the present invention, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (19)

1. method that ensures the safety of data information in the portable terminal comprises at least:
A. safe mark is set for the data information of portable terminal stored in advance;
B. portable terminal was determined the safe mark of data information before the data information that storage is provided to the user, and handled this data information according to this safe mark.
2. method according to claim 1, it is characterized in that, handling this data information according to this safe mark described in the step b comprises: represent the data information of normal process for the value of data information that safe mark is not set or set safe mark, carry out normal process; Represent the data information of abnormality processing for the value of set safe mark, carry out abnormality processing.
3. method according to claim 2, it is characterized in that, this method further comprises the step that secret password is set, further comprise when the user further obtains the data information of abnormality processing: the prompting user imports corresponding secret password, and is checking the correct back of secret password this data information of normal process of user's input; Perhaps reset or the safe mark of cancelling data information when being provided with the user, the prompting user imports corresponding secret password, and after the secret password of checking user's input is correct, carries out to reset or cancel the operation that the safe mark of this data information is provided with.
4. method according to claim 3, it is characterized in that, this method further comprises the step that a secret switch is set, further comprise before this data information of abnormality processing coming among the step b: judge whether corresponding secret switch closes according to this safe mark, if close, this data information of normal process then, otherwise, come this data information of abnormality processing according to this safe mark.
5. method according to claim 4, it is characterized in that, this method further comprises the step of the state of revising secret switch, further comprised before the state of revising secret switch: the prompting user imports the secret password of this secret switch correspondence, and is checking the operation that the user imports the state of correct this secret switch of back execution modification.
6. method according to claim 5, it is characterized in that, the described secret password that is provided with is that all data informations at the portable terminal stored are provided with a total secret password, described secret switch is set is that all data informations at the portable terminal stored are provided with a total secret switch, and the secret password of the secret password of described data information correspondence and total secret switch correspondence is described total secret password.
7. method according to claim 5, it is characterized in that, the described secret password that is provided with is that data information of different nature at the portable terminal stored is provided with a sub-secret password respectively, it is described that secret switch is set is that data information of different nature at the portable terminal stored is provided with a secret switch of son respectively, this method further comprises the corresponding relation of setting up sub-secret password and sub secret switch, and the secret password of the secret password of described data information correspondence and sub secret switch correspondence comprises described sub-secret password.
8. method according to claim 7, it is characterized in that, this method comprises that further all data informations at the portable terminal stored are provided with a total secret password and a total secret switch is set, the secret password of described total secret switch correspondence is described total secret password, and the secret password of the secret password of described data information correspondence and sub secret switch correspondence further comprises total secret password.
9. method according to claim 5, it is characterized in that, described safe mark is to be used for confidential data group indication that the data information of need to be keep secret is classified, the described secret password that is provided with is that different classes of data information at the portable terminal stored is provided with a confidential data classification password respectively, it is described that secret switch is set is that different classes of data information at the portable terminal stored is provided with a confidential data classification switch respectively, this method further comprises the corresponding relation of setting up confidential data classification password and confidential data classification switch, and the secret password of the secret password of described data information correspondence and confidential data classification switch correspondence comprises described confidential data classification password.
10. method according to claim 9, it is characterized in that, this method comprises that further the data information of different nature at the portable terminal stored is provided with a sub-secret password respectively and a secret switch of son is set, the secret password of the secret switch correspondence of described son comprises described sub-secret password, and the secret password of the secret password of described data information correspondence and confidential data classification switch correspondence further comprises corresponding sub-secret password.
11. according to claim 9 or 10 described methods, it is characterized in that, this method comprises that further all data informations at the portable terminal stored are provided with a total secret password and a total secret switch is set, the secret password of described total secret switch correspondence is described total secret password, and the secret password of the secret password of described data information correspondence and confidential data classification switch correspondence further comprises total secret password.
12. method according to claim 9, it is characterized in that, this method further comprises and is provided with that only to allow a confidential data classification switch in the described confidential data classification switch simultaneously be closed condition, perhaps comprises being provided with that to allow more than a confidential data classification switch simultaneously be closed condition.
13. method according to claim 2, it is characterized in that, described safe mark is the confidential data classer's description that is used for the data information of need to be keep secret is carried out classification, this method further comprises: current confidential data classer's description is set, among the step b before coming this data information of abnormality processing according to this safe mark, whether judgement is lower than the value of the current confidential data classer's description of setting at this confidential data classer's description, if, this data information of normal process then, otherwise, come this data information of abnormality processing according to this safe mark.
14. method according to claim 13 is characterized in that, a secret password further is set, when the current confidential data classer's description value of change, the prompting user imports the secret password of setting, and check the user import correct after, carry out the operation of the current confidential data classer's description value of change.
15. according to claim 9 or 13 described methods, it is characterized in that, described safe mark further comprises the processing sign that expression is classified to the processing mode of data information, and step b is described to come this data information of abnormality processing to be meant that the processing that comprises according to safe mark indicates to come this data information of abnormality processing according to this safe mark.
16. method according to claim 2 is characterized in that, described safe mark is the processing sign that expression is classified to the processing mode of data information.
17. method according to claim 16, it is characterized in that, described processing mode is not point out, use Hidden Codes to substitute prompting, part prompting, use a kind of in code word prompting, the part auditory tone cues, and described abnormality processing data information is not point out data information, use Hidden Codes to substitute prompting data information, part to point out data information, use a kind of in code word prompting data information, the corresponding part acoustic information of prompting data information.
18. method according to claim 1, it is characterized in that, among the step a be: for each concrete data information record is provided with a safe mark respectively for the data information of portable terminal stored is provided with a safe mark, perhaps, perhaps a safe mark is set for all data informations for the data information of same nature is provided with a safe mark.
19. method according to claim 1 and 2 is characterized in that, described safe mark is a password.
CNB2005100002370A 2005-01-05 2005-01-05 A kind of method that ensures the safety of data information in the portable terminal Active CN100570622C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100002370A CN100570622C (en) 2005-01-05 2005-01-05 A kind of method that ensures the safety of data information in the portable terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100002370A CN100570622C (en) 2005-01-05 2005-01-05 A kind of method that ensures the safety of data information in the portable terminal

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN2007101677086A Division CN101222706B (en) 2005-01-05 2005-01-05 Method for guaranteeing data information safety in mobile terminal

Publications (2)

Publication Number Publication Date
CN1801979A true CN1801979A (en) 2006-07-12
CN100570622C CN100570622C (en) 2009-12-16

Family

ID=36811677

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100002370A Active CN100570622C (en) 2005-01-05 2005-01-05 A kind of method that ensures the safety of data information in the portable terminal

Country Status (1)

Country Link
CN (1) CN100570622C (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895605A (en) * 2010-06-11 2010-11-24 中兴通讯股份有限公司 Method and device for communication based on pseudo-contact information
CN103023649A (en) * 2012-11-29 2013-04-03 北京小米科技有限责任公司 Method, device and equipment for protecting privacy information
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN104978502A (en) * 2015-07-10 2015-10-14 上海斐讯数据通信技术有限公司 System and method for encrypting local file of intelligent terminal
US9473936B2 (en) 2012-11-29 2016-10-18 Xiaomi Inc. Method and device for protecting privacy information
CN107205092A (en) * 2017-06-14 2017-09-26 捷开通讯(深圳)有限公司 Storage device, mobile terminal and its speech security player method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895605A (en) * 2010-06-11 2010-11-24 中兴通讯股份有限公司 Method and device for communication based on pseudo-contact information
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN103366105B (en) * 2012-03-29 2018-06-15 宇龙计算机通信科技(深圳)有限公司 The implementation method and communication terminal of private space
CN103023649A (en) * 2012-11-29 2013-04-03 北京小米科技有限责任公司 Method, device and equipment for protecting privacy information
US9473936B2 (en) 2012-11-29 2016-10-18 Xiaomi Inc. Method and device for protecting privacy information
CN104978502A (en) * 2015-07-10 2015-10-14 上海斐讯数据通信技术有限公司 System and method for encrypting local file of intelligent terminal
CN107205092A (en) * 2017-06-14 2017-09-26 捷开通讯(深圳)有限公司 Storage device, mobile terminal and its speech security player method
CN107205092B (en) * 2017-06-14 2021-04-23 捷开通讯(深圳)有限公司 Storage device, mobile terminal and voice secret playing method thereof

Also Published As

Publication number Publication date
CN100570622C (en) 2009-12-16

Similar Documents

Publication Publication Date Title
US8311511B2 (en) Data privacy on wireless communication terminal
CN101052190A (en) Anti-theft method for mobile terminal and anti-theft mobile terminal
US20060158436A1 (en) User interface with augmented searching characteristics
CN1677418A (en) Electronic mail creating apparatus and method of the same, portable terminal, and computer program product for electronic mail creating apparatus
CN1838694A (en) Selectable state machine user interface system
US20120115435A1 (en) Privacy in Mobile Device Communications
CN1602600A (en) Content processing apparatus and content protection program
CN101917513A (en) Method and device for implementing graded display of privacy information
CN1662086A (en) Mobile communicating device
CN101031115A (en) Method for searching SMS contactor and its usage
CN1871572A (en) Binding content to a user
CN1792077A (en) Mobile communication terminal
CN101222706B (en) Method for guaranteeing data information safety in mobile terminal
CN1258949C (en) Wireless telephone and wireless telephone system
CN101483861A (en) Method for mobile phone information safety protection
CN1801979A (en) Method for ensuring data information safety in mobile terminal
CN1698060A (en) Portable information terminal
CN111046199B (en) Method for adding white-out to image and electronic equipment
CN1182323A (en) Method of restricting duration of telephone calls and telephone implementing such method
CN1719921A (en) Data deleting preventing method for mobile communication terminal
CN1284121C (en) Method for generating graphic representation in mobile terminal
JP2008160745A (en) Portable terminal and program
CN101227683B (en) Mobile terminal, system and method for securing data information
Shavers et al. Hiding behind the keyboard: uncovering covert communication methods with forensic analysis
CN1773488A (en) Information terminal device having secret function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant