WO2012151975A1 - Procédé et dispositif permettant de cacher des informations de terminal - Google Patents

Procédé et dispositif permettant de cacher des informations de terminal Download PDF

Info

Publication number
WO2012151975A1
WO2012151975A1 PCT/CN2011/083635 CN2011083635W WO2012151975A1 WO 2012151975 A1 WO2012151975 A1 WO 2012151975A1 CN 2011083635 W CN2011083635 W CN 2011083635W WO 2012151975 A1 WO2012151975 A1 WO 2012151975A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
password
terminal
user
unauthorized
Prior art date
Application number
PCT/CN2011/083635
Other languages
English (en)
Chinese (zh)
Inventor
安昌华
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2012151975A1 publication Critical patent/WO2012151975A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Definitions

  • the present invention relates to the field of mobile communications, and in particular, to a terminal information security method and apparatus. Background technique
  • Method 1 Encrypt one or more message services with a password.
  • the password needs to be entered.
  • the above technical solution is easy to implement, but there are also obvious defects: If other people get the mobile phone, some related information of the encrypted message can be seen during the browsing process, for example: sending time, sender, etc., to a certain extent The user's personal secret was leaked.
  • Method 3 using a separate area to store contacts to be saved for the message service to be saved.
  • the advantage of this technical solution is that you can't see the related message with the contact you need to protect in the normal message viewing interface. You must enter the password to view it.
  • the above technical solutions have the following problems: There is a separate module for storing secret information, so that others can immediately determine that the mobile phone stores secret information, and is not conducive to protecting the privacy of the user.
  • the present invention provides a terminal information security method and apparatus, which solves the problem in the prior art that the use of a separate area for storing secret information enables others to easily know that the mobile phone stores secret information, thereby protecting the privacy of the user.
  • the present invention provides a method for securing a terminal information, the method comprising:
  • the normal processing of the authorization information and the unauthorized information is displayed and executed according to the operation of the logged in user in the foreground and background of the terminal.
  • the creating a first password and the at least one second password for the terminal information, and setting the authorization information and the unauthorized information according to the terminal information specifically include:
  • At least one second password is created for the terminal information, and corresponding authorization information and override information are set for the at least one second password according to the terminal information.
  • the method further includes:
  • the method further includes:
  • the interception is received. And the message related to the unauthorized information, the message forbidding the interception is displayed in the foreground of the terminal, and the intercepted message is saved to a predetermined storage area.
  • the method further includes:
  • the records in the predetermined storage area are viewed and/or operated.
  • the terminal information includes: information related to the message service, where the message service includes: a short message service, a multimedia message service, and a mail service.
  • the present invention also provides a terminal information security device, the device comprising: a creation module, a first processing module, and a second processing module;
  • a creating module configured to create a first password and at least one second password for the terminal information, and set the authorization information and the unauthorized information according to the terminal information;
  • a first processing module configured to: when the login user logs in with the second password, display, in the foreground of the terminal, information that performs normal processing on the authorization information and/or the unauthorized information according to the operation of the login user, at the terminal In the background, performing the operation of the login user on the authorization information, and intercepting the operation of the login user on the unauthorized information;
  • the second processing module is configured to display and execute normal processing of the authorization information and the unauthorized information according to the operation of the login user in the foreground and the background of the terminal when the login user logs in with the first password.
  • the creating module is specifically configured to:
  • At least one second password is created for the terminal information, and corresponding authorization information and override information are set for the at least one second password according to the terminal information.
  • the first processing module is further configured to:
  • the second processing module is further configured to:
  • the record in the predetermined storage area is viewed and/or operated.
  • FIG. 1 is a flowchart of a method for securing terminal information according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a mail sending process when a limited password is logged in.
  • FIG. 3 is a schematic structural diagram of a terminal information security apparatus according to an embodiment of the present invention.
  • the present invention provides a method and device for securing the terminal information, which is implemented by the present invention.
  • the technical solution of the example proposes the concept of password authority, that is, by distinguishing whether the password input by the user is a super password or a restricted password, respectively displaying information of different interfaces and corresponding rights and corresponding information.
  • This invention also proposes a method for processing when the restricted registrant processes the unauthorized information under the restricted password login.
  • FIG. 1 is a flowchart of a terminal information security method according to an embodiment of the present invention. As shown in FIG. 1, the terminal information security method according to an embodiment of the present invention includes the following steps. deal with:
  • Step 101 Create a first password (the above super password) and one or more second passwords (the above-mentioned restricted password) for the terminal information, and set the authorization information and the unauthorized information according to the terminal information.
  • the terminal information includes: a message.
  • step 101 the method specifically includes the following steps: 1. Creating a first password for the terminal information; 2. Logging in using the first password; 3. After logging in, creating one or more second passwords for the terminal information, and according to the terminal Information, setting corresponding authorization information and unauthorized information for one or more second passwords.
  • Step 102 When the login user logs in with the second password, in the foreground of the terminal, according to the operation of the login user, information indicating that the authorization information and/or the unauthorized information are normally processed is displayed, and in the background of the terminal, the login user is executed.
  • the operation of the authorization information intercepting the operation of the login user on the unauthorized information;
  • step 102 after the operation of the unauthorized user is intercepted by the login user, the operation performed by the login user on the unauthorized information is saved to a predetermined storage area, and the second password used by the login user to log in is recorded, where The second password logged in user does not have permission to view and/or operate the predetermined storage area.
  • the logged in user logs in with the second password, in the background of the terminal, intercepts the received The message related to the unauthorized information is prohibited from being displayed in the foreground of the terminal, and the message is saved to a predetermined storage area.
  • Step 103 When the login user logs in with the first password, the normal processing of the authorization information and the unauthorized information is displayed and executed according to the operation of the login user in the foreground and the background of the terminal.
  • the records in the predetermined storage area can be viewed and/or operated.
  • the terminal may be a computer, a mobile phone, or another personal smart terminal.
  • the user is divided into a super user and a restricted user, and the authorized user and the unauthorized contact respectively represent the password authority, and the limited user Contacts that can be contacted and contacts that cannot be contacted.
  • the technical solution according to the embodiment of the present invention specifically includes the following processing:
  • the first step is to set a super password for the message service
  • the second step is to log in with a super password and create several restricted user passwords.
  • the user logs in with the limited password, sends various service messages, and presents the sending interface and the sending process in front of the user for the authorized contact and the unauthorized contact, and there is no difference.
  • the corresponding message is not sent to the message receiving system of the unauthorized contact, but the message is stored in an unauthorized operation folder under the super user.
  • the folder records in detail which password is used for the unauthorized operation and the specific content of the unauthorized operation.
  • the user logs in with the restricted password, deletes the locally existing message, and contains the unauthorized contact and the unauthorized contact.
  • the deleted interface is the same. However, for the message containing the unauthorized contact, it needs to be saved to the unauthorized folder. When deleting, only the deletion is displayed on the interface. Actually, the message is not deleted.
  • the user logs in with a limited password and receives the message. If there is a message from an unauthorized contact, the message will not be received immediately, but in practical applications, it may be performed by other means. Notifications, for example, can be set to an alarm clock at a specified time to ensure that the super user can control all the information under any circumstances; in addition, the received message can be stored in the unauthorized folder, waiting for the super user to view And operation.
  • E-MAIL e-mail system
  • the password entered for the first time is a super password, that is, only after entering the password to enter E-MAIL, All mail is operated.
  • the owner of the mobile phone is the user 1
  • the super password set by the user 1 for the first time is ABC 123.
  • contact 1 with e-mail address zte456@sohu.com and contact 2 with e-mail address ance@tom..com are comprehensive. protection.
  • comprehensive protection means that the user 2 cannot see the E-MAIL between the contact 1 and the contact 2 and the user 1, and there is no way to send the mail to the contact 1 and the contact 2.
  • User 1 can set up a security group.
  • the password of the security group is ABC321
  • the confidential users are zte456@sohu.com and ance@tom.com, and then save and exit the EMAIL application.
  • the email can be sent to the protected E-mail address.
  • Other passwords cannot be spoofed when they log in.
  • FIG. 2 is a flowchart of a mail sending process when a password is logged in with a limited password according to an embodiment of the present invention. As shown in FIG. 2, the following processing is included:
  • step 201 the user 2 logs in to the E-MAIL application with the password of the ABC321.
  • the password corresponds to Is a restricted permission, that is, some contacts are not in the contact range of the user corresponding to the password);
  • step 202 user 2 edits the email in the E-MAIL application and then clicks Send.
  • Step 203 The sending process determines an unauthorized contact (also referred to as a restricted user) according to the login password, and determines whether the email address bar (including the sender, the CC and the Bcc) includes an unauthorized contact, and if so, executes Step 206, if not, executing step 204;
  • an unauthorized contact also referred to as a restricted user
  • the email address bar including the sender, the CC and the Bcc
  • Step 204 When there is no unauthorized contact in the mail address column, the mail is sent according to the normal process. If the sending is successful, the mail is saved to the outbox, and if the sending fails, the mail is saved to the outbox;
  • Step 205 The user 2 normally deletes the mail sent in step 204, and the deleted mail cannot be displayed when logging in with the password of the user 1.
  • Step 206 Pre-delete the unauthorized contacts from the address bar.
  • the pre-delete means that when the process is sent, the process deletes the email addresses, but in the display interface of the emails, the addresses of the unauthorized contacts still exist.
  • Step 207 After deleting the unauthorized contact, determine whether there are other contacts. If the determination is yes, go to step 208. Otherwise, go to step 209.
  • Step 208 After all the unauthorized contacts are deleted, the address bar is not empty, and the email is sent to the remaining contacts according to the normal process, and step 211 is performed.
  • Step 209 After all the unauthorized contacts are deleted, the address bar is empty. At this time, a fake sending process is performed, and the normal detecting network status on the interface is displayed. When the network is available, step 210 is performed.
  • Step 210 Display the sending progress according to the mail size and the experience value.
  • Step 211 Determine whether the email is successfully sent according to the network status. If the determination is yes, execute step 213. Otherwise, perform step 212.
  • Step 212 the interface is successfully sent, and then the mail is sent to the outbox, and the step is executed. Step 214.
  • Step 213 The sending failure is displayed on the interface, and the mail is saved to the outbox, and step 214 is performed.
  • FIG. 3 is a schematic structural diagram of a terminal information security device according to an embodiment of the present invention.
  • the terminal information security device according to the embodiment of the present invention includes: The creation module 30, the first processing module 32, and the second processing module 34 are described in detail below for each module of the embodiment of the present invention.
  • the creating module 30 is configured to create a first password and one or more second passwords for the terminal information, and set the authorization information and the unauthorized information according to the terminal information;
  • the creating module 30 is specifically configured to: create a first password for the terminal information; use the first password to log in; after logging in, create one or more second passwords for the terminal information, and according to the terminal information, one or more The second password setting corresponds to the authorization information and the unauthorized information.
  • the first processing module 32 is configured to: when the login user logs in with the second password, display, in the foreground of the terminal, information about performing normal processing on the authorization information and/or the unauthorized information according to the operation of the login user, at the terminal. In the background, performing operations on the authorization information by the login user, and intercepting the operation of the login user on the unauthorized information;
  • the first processing module 32 is further configured to: 1. After the login user logs in with the second password, and intercepts the operation of the login user to the unauthorized information, the login user performs the operation on the unauthorized information. Save to a predetermined storage area, and record the second password used by the login user to log in, wherein the user logged in with the second password does not have permission to view and/or operate the predetermined storage area; 2. The second password is logged in to the user. In the case of login, in the background of the terminal, the received message related to the unauthorized information is intercepted, the message forbidding the interception is displayed in the foreground of the terminal, and the intercepted message is saved to the predetermined storage area.
  • the second processing module 34 is configured to display and execute normal processing of the authorization information and the unauthorized information according to the operation of the login user in the foreground and the background of the terminal when the login user logs in with the first password.
  • the second processing module 34 is further configured to: when the logged in user logs in with the first password, view and/or operate the records in the predetermined storage area.
  • the foregoing device may be disposed in a computer, may be disposed in a mobile phone, or may be disposed in another personal smart terminal.
  • the user is divided into a super user and a restricted user, and the authorized user and the unauthorized contact respectively represent the password authority, and the limited user Contacts that can be contacted and contacts that cannot be contacted.
  • the technical solution according to the embodiment of the present invention specifically includes the following processing:
  • the first step is to create a module 30 to set a super password for the message service
  • the creating module 30 creates a plurality of restricted user passwords
  • the user logs in with the limited password and sends various service messages.
  • the first processing module 32 presents the sending interface and the sending process in front of the user for the authorized contact and the unauthorized contact, and there is no difference.
  • the corresponding message is not sent to the message receiving system of the unauthorized contact, but the message is stored in an unauthorized operation folder under the super user.
  • the folder records in detail which password is used for the unauthorized operation and the specific content of the unauthorized operation;
  • the user logs in with a limited password, deletes the locally existing message, and the first processing module
  • the user logs in with the limited password, and receives the message. If there is a message from the unauthorized contact, the first processing module 32 does not immediately receive the message, but in actual applications, the notification may be performed by other means, for example, By setting an alarm clock for a specified time, etc., it is possible to ensure that the super user can control all the information under any circumstances; in addition, the first processing module 32 can also store the received message in an unauthorized folder, waiting for the super user. View and operate.
  • E-MAIL e-mail system
  • the password entered for the first time is a super password, that is, only after entering the password to enter E-MAIL, All mail is operated.
  • the owner of the mobile phone is the user 1
  • the super password set by the user 1 for the first time is ABC 123.
  • contact 1 with e-mail address zte456@sohu.com and contact 2 with e-mail address ance@tom..com are comprehensive. protection. It should be noted that the above-mentioned comprehensive protection means that the user 2 cannot see the E-mail between the contact 1 and the contact 2 and the user 1, and there is no way to contact the contact. 1 and contact 2 send the message.
  • user 1 can set a security group, the password of the security group is ABC321, the secret users are zte456@sohu.com and ance@tom.com, and then save and exit the EMAIL application.
  • the sending process will still perform the normal process, that is, it will first determine whether the current network is available. If it is not available, the mail will be sent and then saved to the Outbox. . If available, the message is displayed on the interface and the progress is displayed according to the size of the message, and the message is saved to the Outbox.
  • the background sending process does not send the mail to the restricted contact, but only gives the illusion on the display interface. This ensures that only the ABC123 password can be used to log in to the protected e-mail address, and other passwords cannot be pretending to be sent.
  • step 201 the user 2 logs in to the E-MAIL application with the password of the ABC321.
  • the password corresponds to a restricted permission, which means that some contacts are not in the contact range of the user corresponding to the password);
  • step 202 user 2 edits the email in the E-MAIL application and then clicks Send.
  • Step 203 The sending process determines an unauthorized contact (also referred to as a restricted user) according to the login password, and determines whether the email address bar (including the sender, the CC and the Bcc) includes an unauthorized contact, and if so, executes Step 206, if not, executing step 204;
  • an unauthorized contact also referred to as a restricted user
  • the email address bar including the sender, the CC and the Bcc
  • Step 204 When there is no unauthorized contact in the mail address column, the mail is sent according to the normal process. If the sending is successful, the mail is saved to the outbox, and if the sending fails, the mail is saved to the outbox;
  • step 205 the user 2 normally deletes the mail sent in step 204, and the deleted mail cannot be displayed when logged in with the password of the user 1.
  • Step 206 Pre-delete the unauthorized contacts from the address bar.
  • the pre-delete means that when the process is sent, the process deletes the email addresses, but in the display interface of the emails, the addresses of the unauthorized contacts still exist.
  • Step 207 After deleting the unauthorized contact, determine whether there are other contacts. If the determination is yes, go to step 208. Otherwise, go to step 209.
  • Step 208 After all the unauthorized contacts are deleted, the address bar is not empty, and the email is sent to the remaining contacts according to the normal process, and step 211 is performed.
  • Step 209 after all the unauthorized contacts are pre-deleted, the address bar is empty, and one is executed at this time. A fake sending process is performed to display the normal network status on the display interface. When the network is available, go to step 210.
  • Step 210 Display the sending progress according to the mail size and the experience value.
  • Step 211 Determine whether the email is successfully sent according to the network status. If the determination is yes, execute step 213. Otherwise, perform step 212.
  • Step 212 The sending success is displayed on the interface, and then the mail is sent to the outbox, and step 214 is performed.
  • Step 213 The sending failure is displayed on the interface, and the mail is saved to the outbox, and step 214 is performed.
  • different passwords are set in the terminal, so that when different users log in, different display and processing are used for different login users, which solves the problem that the prior art uses separate areas to store hidden information to enable others to easily
  • the technical solution of the embodiment of the present invention can protect the private information in the user terminal from being stolen by others without revealing the hidden information.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephone Function (AREA)

Abstract

L'invention concerne un procédé permettant de cacher des informations de terminal, comprenant les étapes suivantes : créer un premier mot de passe et un ou plusieurs deuxièmes mots de passe pour des informations de terminal, et déterminer des informations autorisées et des informations non autorisées selon les informations de terminal ; lorsqu'un utilisateur ouvrant une session s'identifie avec le deuxième mot de passe, à l'avant-plan du terminal, selon une opération de l'utilisateur, afficher les informations de traitement normal des informations autorisées et/ou des informations non autorisées et, à l'arrière-plan du terminal, exécuter une opération de l'utilisateur sur les informations autorisées, et intercepter une opération de l'utilisateur sur les informations non autorisées ; lorsque l'utilisateur ouvrant une session s'identifie avec le premier mot de passe, à l'avant-plan et à l'arrière-plan du terminal, selon une opération de l'utilisateur, afficher et exécuter un traitement normal des informations autorisées et des informations non autorisées. Un dispositif destiné à cacher des informations de terminal est également décrit. La solution technique de la présente invention permet de protéger de façon sûre et transparente les informations privées contenues dans un terminal utilisateur contre le vol.
PCT/CN2011/083635 2011-07-18 2011-12-07 Procédé et dispositif permettant de cacher des informations de terminal WO2012151975A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110202001.0 2011-07-18
CN201110202001.0A CN102271332B (zh) 2011-07-18 2011-07-18 终端信息保密方法及装置

Publications (1)

Publication Number Publication Date
WO2012151975A1 true WO2012151975A1 (fr) 2012-11-15

Family

ID=45053462

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/083635 WO2012151975A1 (fr) 2011-07-18 2011-12-07 Procédé et dispositif permettant de cacher des informations de terminal

Country Status (2)

Country Link
CN (1) CN102271332B (fr)
WO (1) WO2012151975A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104753677A (zh) * 2013-12-31 2015-07-01 腾讯科技(深圳)有限公司 密码分级控制方法和系统

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457619A (zh) * 2011-12-30 2012-05-16 广东欧珀移动通信有限公司 一种手机权限密码的设置方法
CN102722663B (zh) * 2012-05-16 2015-01-07 广东欧珀移动通信有限公司 一种手持智能设备数据安全保护方法
CN103067172A (zh) * 2012-12-24 2013-04-24 珠海金山办公软件有限公司 一种信息安全管理方法及系统
CN104077508A (zh) * 2013-09-25 2014-10-01 苏州天鸣信息科技有限公司 一种解锁装置及其方法
CN106529346B (zh) * 2016-10-28 2020-02-14 企事通集团有限公司 一种保护终端隐私的方法及终端

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345963A (zh) * 2008-08-15 2009-01-14 宇龙计算机通信科技(深圳)有限公司 一种私密数据的保密方法、系统及移动终端
CN101895396A (zh) * 2010-07-14 2010-11-24 中兴通讯股份有限公司 移动终端及其加密方法

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010096814A (ko) * 2000-04-14 2001-11-08 홍기융 전자서명 인증기반 파일시스템 해킹방지용 보안커널 방법
CN100464336C (zh) * 2005-06-14 2009-02-25 华为技术有限公司 一种控制系统帐号权限的方法
CN100527893C (zh) * 2006-09-05 2009-08-12 华为技术有限公司 移动通讯终端用户的鉴权方法及移动通讯终端
CN101216904A (zh) * 2007-01-01 2008-07-09 王丹琳 一种可供多用户独立使用的电子邮箱技术
CN101227488A (zh) * 2007-01-17 2008-07-23 华为技术有限公司 一种注册式门户程序通信系统、通信装置和方法
CN101068255A (zh) * 2007-06-14 2007-11-07 杭州华三通信技术有限公司 安全外壳协议应用中的用户认证方法及装置
CN101938497B (zh) * 2010-09-26 2013-01-30 深圳大学 多级保密文档组设置方法及其文件访问控制和密钥管理用户终端、服务终端、系统和方法

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345963A (zh) * 2008-08-15 2009-01-14 宇龙计算机通信科技(深圳)有限公司 一种私密数据的保密方法、系统及移动终端
CN101895396A (zh) * 2010-07-14 2010-11-24 中兴通讯股份有限公司 移动终端及其加密方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104753677A (zh) * 2013-12-31 2015-07-01 腾讯科技(深圳)有限公司 密码分级控制方法和系统
CN104753677B (zh) * 2013-12-31 2019-02-01 腾讯科技(深圳)有限公司 密码分级控制方法和系统

Also Published As

Publication number Publication date
CN102271332A (zh) 2011-12-07
CN102271332B (zh) 2017-09-12

Similar Documents

Publication Publication Date Title
US8924724B2 (en) Document encryption and decryption
US9619659B1 (en) Systems and methods for providing information security using context-based keys
US8261093B1 (en) System, method, and computer program product for disabling a communication channel during authentication
WO2016101384A1 (fr) Procédé et appareil de traitement de sécurité de données reposant sur un commutateur double système
CA2623260C (fr) Rendu d'identification d'interet sur des messages proteges exempts d'une telle identification
CA2756523C (fr) Methode et systeme permettant de securiser des donnees d'un appareil de communication mobile
US9659165B2 (en) Method and apparatus for accessing corporate data from a mobile device
CN109412812B (zh) 数据安全处理系统、方法、装置和存储介质
US20160241530A1 (en) Systems and methods for managing access to message content
WO2017147890A1 (fr) Procédé d'affichage de message court de code de vérification et terminal mobile
WO2012151975A1 (fr) Procédé et dispositif permettant de cacher des informations de terminal
CN103390026A (zh) 一种移动智能终端安全浏览器及其工作方法
CN105975867B (zh) 一种数据处理方法
EP2840818B1 (fr) Procédé et dispositif de gestion de sécurité d'informations de terminal mobile, et terminal mobile
WO2015085906A1 (fr) Procédé et dispositif de protection de données d'entreprise
Rottermanner et al. Privacy and data protection in smartphone messengers
WO2011088660A1 (fr) Procédé et appareil pour protéger un contenu d'information d'un téléphone cellulaire
CN102685326A (zh) 一种短信加密方法、装置及移动终端
KR101267875B1 (ko) 가상 키보드를 이용한 메시지 암·복호화 장치 및 그 방법을 컴퓨터에서 실행시키기 위한 프로그램을 기록한 기록매체
US20130024931A1 (en) Downloadable communication software tool for flash memory device
WO2015085819A1 (fr) Procédé et dispositif à des fins de séparation entre le côté public et le côté privé
CN101009878A (zh) 数据保密系统及方法
Igor et al. Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals.
Schneider Improving data security in small businesses
CN102467625A (zh) 一种数据保护方法、装置及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11864942

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11864942

Country of ref document: EP

Kind code of ref document: A1