[go: up one dir, main page]

CN101616495A - The method and system of individual privacy in the protection mobile phone - Google Patents

The method and system of individual privacy in the protection mobile phone Download PDF

Info

Publication number
CN101616495A
CN101616495A CN200810115368A CN200810115368A CN101616495A CN 101616495 A CN101616495 A CN 101616495A CN 200810115368 A CN200810115368 A CN 200810115368A CN 200810115368 A CN200810115368 A CN 200810115368A CN 101616495 A CN101616495 A CN 101616495A
Authority
CN
China
Prior art keywords
mobile phone
client
data
incident
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810115368A
Other languages
Chinese (zh)
Inventor
李锋
党劲峰
邹仕洪
林宇
史文勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NETQIN WUXIAN (BEIJING) TECHNOLOGY Co Ltd
Original Assignee
NETQIN WUXIAN (BEIJING) TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NETQIN WUXIAN (BEIJING) TECHNOLOGY Co Ltd filed Critical NETQIN WUXIAN (BEIJING) TECHNOLOGY Co Ltd
Priority to CN200810115368A priority Critical patent/CN101616495A/en
Publication of CN101616495A publication Critical patent/CN101616495A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to protect the method and system of individual privacy in the mobile phone.Said method comprising the steps of: behind the mobile phone power-on, client background starts, operation; Monitor each incident; Carry out associative operation according to event type; After event handling finished, the client background operation continued the monitoring incident.The event type of being monitored comprises: replacing mobile phone card incident, note instruction incident, file data processing events, application program processing events, contextual model are provided with incident, delete program incident, format mobile phone/mobile phone card incident.Described system comprises client modules and server, and wherein client modules comprises: the event-monitoring module, and event processing module, communication module and data in mobile phone upgrade, back up, recover module; Server comprises communication module, personal information management module, backup/restoration module.Method and system of the present invention can be realized maximum safety protection of mobile phone privacy.

Description

The method and system of individual privacy in the protection mobile phone
Technical field
The present invention relates to mobile communication and information security field, relate to the method and system of individual privacy in the protection mobile phone especially.
Background technology
Along with the continuous enhancing of mobile phone terminal function, and wireless network bandwidth constantly increases, and mobile phone value-added service is more abundant, and the private data that people store on mobile phone is more and more.Simultaneously, the data on the mobile phone are very easily peeped, are stolen by other people, and the Loss Rate of mobile phone is also very high, and the probability that data in mobile phone, privacy leak is very big.At the protection of privacy of user on the mobile phone, many new technologies, new method have been produced.
Existing mobile phone private guard method mainly concentrates on following several: file/data are carried out enciphering hiding; To the mobile phone Long-distance Control; Application program to mobile phone locks.
On the whole, these prior aries are all more single to the private data guard method on the mobile phone, complex operation, and approach, mode that privacy is revealed are a lot, therefore, single secret protection, its effect is difficult to satisfactory.Such as, existing antitheft mobile phone class software, secret protection class software (as SmartGuard) all can't well be protected individual privacy.
Along with the function of mobile phone from strength to strength, wherein storing a large amount of individual secret contents (note, photo, video, file or the like), in case because of carelessness secret content in the mobile phone is leaked, may cause self fame, wealth to lose greatly.And the mobile phone Loss Rate is higher, and in addition, the content on the mobile phone is very easily peeped by other people." the privacy fear " that causes thus becomes the problem of following significant concern most probably.
Summary of the invention
The present invention is just in order to solve the problem that mobile phone private is revealed, and is better than single, weak at present mobile phone private guard method, proposed the method for individual privacy on a kind of general protection mobile phone.If this system writes the ROM of mobile phone terminal, can realize maximum safety protection of mobile phone privacy.
The invention provides a kind of method of protecting individual privacy in the mobile phone, may further comprise the steps: behind the mobile phone power-on, client background starts, operation; Monitor each incident; Carry out associative operation according to event type; After event handling finished, the client background operation continued the monitoring incident.
The invention provides and a kind ofly carry out anti-theft method of mobile phone, may further comprise the steps: read the mobile phone card identification code according to the mobile phone card identification code; The mobile phone card identification code that reads and the information of legal mobile phone card database are compared; If there is not matching value, lock machine then; If matching value is arranged, then keep normal holding state.The identification code that can store one or more legal mobile phone cards in the legal mobile phone card database, the user can be made as the new cell-phone card legal mobile phone card, also can delete certain legal mobile phone card at any time.The current phone number can be sent to server or secure relationship people number behind the lock machine.The data channel that can pass through note, phone or wireless network sends the current phone number.Under the state of lock machine, can point out the user to input password, if the user can't import proper password, then keep the lock machine state, correct if the user inputs password, release mobile phone then.When surpassing not action or repeatedly input password by mistake of certain time length, enciphering hiding data in mobile phone automatically then.Can be set by the user: duration, input number of times, hiding data type, hiding data file by mistake.If it is correct that the user inputs password, then can point out the user to select whether this mobile phone card to be added in " legal mobile phone card " Database Lists.
The invention provides a kind of method of mobile phone private protection of Long-distance Control, may further comprise the steps: to the sending short message by mobile phone instruction that client has been installed, the note instruction comprises authentication information to the user by any mobile phone; Client receives whether the query statement form is correct, and carries out authentication after the instruction execution request; If correct format, and authentication success are then carried out the note instruction according to short message content; If format error or authentication failure or handle overtimely, the receipt of then failing is reminded the user.The user can carry out following any operation by sending the note instruction: lock machine, send chimes of doom, back up address list, fetch address list, delete all data in mobile phone, call reminding, note shift.After the note instruction ran succeeded, this was operated successfully can to inform the user by note or phone form.
The invention provides a kind of method of mobile phone private protection of Long-distance Control, may further comprise the steps: the user sends the note instruction request to server, and the note instruction comprises authentication information; Server is received request, carries out authentication; If authentification failure then returns error prompting; If authentication is passed through,, send instruction to the mobile phone that client has been installed then according to the request instruction type; Client receives whether the query statement form is correct, and carries out authentication after the instruction execution request; If correct format, and authentication success are then carried out the note instruction according to short message content; If format error or authentication failure or handle overtimely, the receipt of then failing is reminded the user.The user can carry out following any operation by sending the note instruction: lock machine, send chimes of doom, back up address list, fetch address list, delete all data in mobile phone, call reminding, note shift.After the note instruction ran succeeded, this was operated successfully can to inform the user by note or phone form.
The invention provides a kind of method of mobile phone private protection of Long-distance Control, may further comprise the steps: the user directly requires the service provider to help it to send the note instruction, the service provider is after confirming user identity, directly trigger server and send corresponding note instruction to the mobile phone that client has been installed, the note instruction comprises authentication information; Client receives whether the query statement form is correct, and carries out authentication after the instruction execution request; If correct format, and authentication success are then carried out the note instruction according to short message content; If format error or authentication failure or handle overtimely, the receipt of then failing is reminded the user.The user can carry out following any operation by sending the note instruction: lock machine, send chimes of doom, back up address list, fetch address list, delete all data in mobile phone, call reminding, note shift.After the note instruction ran succeeded, this was operated successfully can to inform the user by note or phone form.
The invention provides a kind of method in the following protection mobile phone individual privacy of no network schemer (having another name called: off-line mode or offline mode), may further comprise the steps: when contextual model was provided with the incident generation, whether the inquiry contextual model was no network schemer; If contextual model is no network schemer, then lock mobile phone; If contextual model is not no network schemer, then enter set contextual model.Under the state of locking mobile phone, can point out the user to input password; Whether the password of checking input is correct; If it is correct that the user inputs password, release mobile phone then; If input password mistake keeps lock-out state.When surpassing certain time length or repeatedly inputing the password mistake, enciphering hiding data in mobile phone automatically then.Can be set by the user: duration, input number of times, hiding data type, hiding data file by mistake.Contextual model is meant that mobile phone reminds the user that arrival such as note, multimedia message, phone, data are arranged in some way or send.Contextual model can comprise standard, noiseless, vibration, off-line isotype.
The invention provides the method for one-touch quick destruction data in mobile phone, may further comprise the steps: the input proper password enters client; Click the quick button of " key pin is ruined " in the client; Client executing is destroyed operation, deletes all data in mobile phone immediately.Before carrying out the destruction operation, can point out the user whether will destroy all data.
The invention provides a kind of method of quick destruction data in mobile phone, may further comprise the steps: use other mobile phones or instruct the mobile phone that client has been installed, note to instruct to comprise authentication information in web, wap page transmission note; Client is carried out authentication; If authentication is passed through, client is resolved and is carried out command adapted thereto, deletes all data in mobile phone immediately; If not by authentication, then respond failed message.
The invention provides a kind of application programs and carry out the method for encipherment protection, may further comprise the steps: the input password enters client; Choose the application program that needs monitoring, monitor and lock; When the clicked startup of selected application program, the prompting user inputs password; Judge whether the input password is correct; If import the password mistake, then keep the lock-out state of this application program; If cancellation input password then returns former mobile phone operation interface; If the input password is correct, then release can application programs be carried out corresponding operating.Encrypted applications program is decrypted may further comprise the steps: the input password enters client; Choose the application program that is in monitoring, remove monitoring in real time.Application program can comprise: information, telephone directory, multimedia, calendar, photograph/shooting, network, clock application program.
The invention provides a kind of point-to-point seamless migration method of data in mobile phone, may further comprise the steps: send the note instruction of point-to-point set form by other mobile phones to client mobile phone has been installed, comprise authentication information in the note instruction; The mobile phone that client has been installed carries out authentication according to command format and content; If by authentication, then send particular data to send instruction mobile phone with specific format as requested; If, then do not respond failed authentication message by authentication.
The invention provides a kind of method that backs up data in mobile phone, may further comprise the steps: the input password enters client; Client is initiated backup request; Server is received backup request, carries out authentication according to identifying information; If by authentication, then respond this request, the mobile phone that client has been installed begins Backup Data; If, then do not inform failed authentication by authentication.Can pass through radio data network GPRS, EGDE, WIFI, WIMAX mode Backup Data.Can be provided with by the user and need backed up data.Backup can be adopted manual backup mode, and also regular automated back-up can be provided with BACKUP TIME at interval by the user.The user can pass through PC, PDA access server, directly downloads backed up data.The user can manage the data in mobile phone that backs up in the personal information management server by login the Internet, wap website.
The invention provides a kind of method by Long-distance Control client backup data in mobile phone, may further comprise the steps: use other sending short message by mobile phone to instruct and installed on the mobile phone of client, the type of wanting Backup Data is indicated in the note instruction, and comprises authentication information; Client is received the note instruction, carries out authentication; If not by authentication, then return the authentication failure information; After authentication was passed through, client was initiated backup request according to instruction type; Server is received backup request, carries out authentication according to identifying information; If by authentication, then respond this request, the mobile phone that client has been installed begins Backup Data; If, then do not inform failed authentication by authentication.Can pass through radio data network GPRS, EGDE, WIFI, WIMAX mode Backup Data.Can be provided with by the user and need backed up data.Backup can be adopted manual backup mode, and also regular automated back-up can be provided with BACKUP TIME at interval by the user.The user can pass through PC, PDA access server, directly downloads backed up data.The user can manage the data in mobile phone that backs up in the personal information management server by login the Internet, wap website.
The invention provides a kind of method by server recovery data in mobile phone, may further comprise the steps: the mobile phone that client has been installed is initiated request for recovery data to server; Server carries out identification authentication; If by authentication,, corresponding data are sent to the mobile phone of request then according to request data recovered type; If not by authentication, or server does not have data, the response failed message.The mobile phone that client has been installed can be by radio data network or directly by wired connection game server initiation request.Can be provided with by the user and want data recovered.
The invention provides a kind of Long-distance Control client and recover the method for data in mobile phone, may further comprise the steps: use other sending short message by mobile phone to instruct the mobile phone that client has been installed, note to instruct and indicate the type of wanting restore data, and comprise authentication information; Client is received the note instruction, carries out authentication; If not by authentication, then return the authentication failure information; Client is initiated request for recovery data to server after authentication is passed through; Server carries out identification authentication; If by authentication,, corresponding data are sent to the mobile phone of request then according to request data recovered type; If not by authentication, or server does not have data, the response failed message.The mobile phone that client has been installed can be by radio data network or directly by wired connection game server initiation request.Can be provided with by the user and want data recovered.
The invention provides a kind of method of recovering data in mobile phone by Web, may further comprise the steps: carry out identity validation at web page input client password, need to select the data in mobile phone of recovery, initiate request; Server response request, transmitting short message are instructed to the mobile phone that client has been installed, and command adapted thereto is resolved and carried out to client.The mobile phone that client has been installed can be by radio data network or directly by wired connection game server initiation request.Can be provided with by the user and want data recovered.
The invention provides a kind of method of recovering data in mobile phone by Wap, may further comprise the steps: carry out identity validation at wap page input client password, need to select the data in mobile phone of recovery, initiate request; Server response request, transmitting short message are instructed to the mobile phone that client has been installed, and command adapted thereto is resolved and carried out to client.The mobile phone that client has been installed can be by radio data network or directly by wired connection game server initiation request.Can be provided with by the user and want data recovered.
The invention provides the automatic hidden method of a kind of client-side program, may further comprise the steps: start client first, finish after the initial configuration, client is hidden automatically, and at system's running background, the user carries in the file system and can't check at mobile phone; Import default special keyboard combination, access the client Entry Interface; The input password enters client.It is self-defined to be combined into row by the special keyboard that the user exchanges out client end interface, also the special keyboard combination that accesses client end interface can be reached server stores.
The invention provides a kind of method that prevents the illegal deletion of client-side program, may further comprise the steps: when triggering the operation of deletion client-side program, prompting input password; Whether the password of judging input is correct; If input is correct, carry out the operation of deletion client-side program; If input error, deletion action is carried out in cancellation.
The invention provides a kind of method of surviving behind the lattice machine of realizing, may further comprise the steps: install or the process of initialization client in, in storage card, write the image file of client, image file record handset identity code information is as unique identification; If only format mobile phone, image file in the storage card finds not have client in the mobile phone, then reads handset identity code and compares with record value before; If consistent, then automatic loader; If inconsistent, do not do any operation; If format storage card earlier, after in this storage card insertion mobile phone, whether client query this moment storage card exists image file, if find not have, so immediately image file is write in the storage card.
The invention provides a kind of client initial method, may further comprise the steps: in client, dispose initialization information; The user profile registration; Write down handset identity code or the mobile phone card identification code information obtained when registering, and it is made as legal mobile phone card.The configuration initialization information comprises in client: password setting is used for authentication; Secure relationship people's number is provided with, and when inserting illegal mobile phone card, all will send the phone number of this moment to secure relationship people number at every turn; The safeguard protection operation is set.Can note or phone form, stealth or the not stealthy phone number that sends this moment to secure relationship people number.Secure relationship people's number can be phone number, Personal Handy-phone System number, fixed telephone number.When inserting illegal mobile phone card, can carry out the safeguard protection operation of the lock machine or the alert sound of transmitting messages.Can at first send cell-phone number to server during the user profile registration; Client reads handset identity code or mobile phone card identification code, and sends server to; Server generates unique identifier according to special algorithm, finishes the user profile registration.Client can transmit information to server by radio data network or voice network.
The invention provides a kind of system that protects individual privacy in the mobile phone, comprise client modules and server, wherein client modules comprises: the event-monitoring module, and event processing module, communication module and data in mobile phone upgrade, back up, recover module; Server comprises: communication module, personal information management module, backup/restoration module.
Description of drawings
Fig. 1 has provided the main flow chart of the method for individual privacy in the protection mobile phone of the present invention;
Fig. 2 has provided client-side program of the present invention and has started first, the flow chart of initial configuration relevant information;
Fig. 3 has provided of the present invention to changing the process chart of mobile phone card incident;
Fig. 4 has provided the process chart to note remote control commands incident of the present invention;
Fig. 5 has provided the process chart that contextual model is provided with incident of the present invention;
Fig. 6 has provided the process chart to the file data encrypted event of the present invention;
Fig. 7 has provided the process chart to the decrypt file data incident of the present invention;
Fig. 8 has provided the process chart of encrypt applications incident of the present invention;
Fig. 9 has provided the process chart of application programs deciphering incident of the present invention;
Figure 10 has provided the process chart of the backup to data in mobile phone of the present invention;
Figure 11 has provided the process chart of the recovery to data in mobile phone of the present invention;
Figure 12 has provided the process chart of the seamless migration to data in mobile phone of the present invention;
Figure 13 has provided the process chart of the destruction to data in mobile phone of the present invention;
Figure 14 has provided the process chart of Automatic Program hidden method of the present invention;
Figure 15 has provided the process chart that prevents illegal deletion of the present invention;
Figure 16 has provided the process chart of format existence of the present invention;
Figure 17 has provided the physics pie graph of the system of individual privacy in the protection mobile phone of the present invention;
Figure 18 has provided system module figure of the present invention.
Embodiment
The present invention comprehensively protects all data in the mobile phone, comprises that mobile phone loses two aspect safeguard measures preceding, after losing, to reach the purpose of general protection individual privacy.
Hereinafter, the mobile phone information of mentioning comprises note, multimedia message etc.
The system of correspondence of the present invention comprises cell-phone customer terminal module and server end.Client modules is responsible for the processing to incident on all mobile phones, comprises the protection of the monitoring of mobile phone card, file and application program, the backup/restoration of data etc.Server end is responsible for storing the data in mobile phone that the user backs up, and these data are carried out all increases, deletion, function such as edited, search.
The invention provides the method for individual privacy in a kind of general protection mobile phone,, illustrate implementation method of the present invention below in conjunction with accompanying drawing.
The method of individual privacy in the protection mobile phone of the present invention may further comprise the steps: behind the mobile phone power-on, client background starts, operation; Monitor each incident; Carry out associative operation according to event type; After event handling finished, the client background operation continued the monitoring incident.Wherein the event type of being monitored comprises: replacing mobile phone card incident, note instruction incident, file data processing events, application program processing events, contextual model are provided with incident, delete program incident, format mobile phone/mobile phone memory card incident, data in mobile phone migration event, the hiding automatically incident of client-side program, or the like.
Fig. 1 has provided the main flow chart of the method for individual privacy in the protection mobile phone of the present invention.As shown in Figure 1, behind the mobile phone power-on, client background starts, operation; Monitor each incident, the event type of being monitored comprises: change mobile phone card incident, note instruction incident, file data processing events, application program processing events, contextual model incident, delete program incident, format mobile phone/mobile phone card incident etc. are set, the file data processing events comprises incidents such as the backup, recovery, destruction of file data encryption incident, decrypt file data processing events, file data; Carry out associative operation according to event type; Be finished, after event handling finished, the client background operation continued the monitoring incident.
When starting client-side program first, record mobile phone card identification code information at this moment is made as legal mobile phone card with it, and the user carries out the initialization information setting, and setting option can comprise information such as password, secure relationship people's number.After the processing of client initialization procedure finished, client-side program was at running background and begin to monitor in real time variety of event.
Fig. 2 has provided client-side program of the present invention and has started first, the flow chart of initial configuration relevant information.As example, the client initialization procedure may further comprise the steps:
Step S201: in client-side program, dispose initialization information, comprising:
A) password setting: being used for all authentications, is unique " key ".
B) secure relationship people number is provided with: when inserting illegal mobile phone card, all will send the cell-phone number of this moment with note or phone form to secure relationship people number at every turn, and can stealthy or not stealthy transmission.Secure relationship people's number can be set to phone number, Personal Handy-phone System number, fixed telephone number etc.
C) safeguard protection operation is set, carries out as lock machine, the alert sound etc. of transmitting messages when inserting illegal mobile phone card.These two kinds protection operations can combination in any, and program is given tacit consent to a kind of protection at least, as the protection of acquiescence lock machine.
Step S202: user profile registration
A) at first, by radio data network (for example, comprising modes such as GPRS, EDGE, WIMAX, WIFI, 3G) or voice network, send cell-phone number to server.
B) then, client-side program reads handset identity code (as IMEI), mobile phone card identification code (as IMSI) information, and sends server to by radio data network.
C) server generates unique identifier according to special algorithm, finishes the user profile registration.
Step S203: mobile phone card monitoring module writes down mobile phone card identification code (as the IMSI) information of being obtained when registering, and it is made as legal mobile phone card.
Step S204: program initialization is finished.Wherein, the order of step S201, S202 can be put upside down.
After initialization was finished, client was monitored variety of event all the time, and carried out corresponding operating.Below to the monitoring of each incident, handle and be described.Next be described with reference to the accompanying drawings each step.
Fig. 3 has provided of the present invention to changing the process chart of mobile phone card incident.As example, change mobile phone card incident and may further comprise the steps:
Step S301: start shooting after inserting new mobile phone card.
Step S302: read this mobile phone card identification code, and the information of itself and legal mobile phone card database is compared the identification code that can store one or more legal mobile phone cards in the legal mobile phone card database.
Step S303: whether inquiry exists the mobile phone card identification code information of coupling.
Step S303a: if find not have matching value, then lock machine.And the current phone number sent to server and secure relationship people number with note or phone form or the data channel by wireless network.
Step S303b:, then keep normal holding state if find that matching value is arranged.Change step S305 over to.
Under the state of lock machine, need input password ability release mobile phone.Step S304: whether the password of checking input is correct.
Step S304a:, then keep the lock machine state if the user can't import proper password.Do not have action or repeatedly input password (user can set time and time numerical value arbitrarily) by mistake when surpassing certain time length, data in mobile phone is enciphering hiding automatically.The user can set in client-side program: duration, hiding data type, hiding data file etc.The user also can set not hiding data file automatically.If after data file is hidden, the user imports proper password, changes step S304b so over to.
Step S304b: correct if the user inputs password, release mobile phone then, and recover data files that all are hidden.After the mobile phone release, whether the user can select this mobile phone card to be added in " legal mobile phone card " Database Lists, if insert no longer lock machine of this mobile phone card next time; If not, inserting this mobile phone card next time still can lock machine.The user can be made as the new cell-phone card legal mobile phone card (can be provided with a plurality of), also can delete certain legal mobile phone card at any time.
Step S305: change the event handling of mobile phone card and finish, client-side program is monitored in real time on the backstage.
Among the present invention, carry out following steps at note instruction incident: client receives whether short message enquiry command format is correct, and carry out authentication after the note instruction; If correct format, and authentication success are then carried out this note instruction according to this note command content; If format error or authentication failure or handle overtimely, the receipt of then failing is reminded the user.Wherein can send described note instruction by following mode:
Sent to the mobile phone that client has been installed by any mobile phone by the user, the note instruction comprises authentication information; Perhaps
At first send the note instruction by the user to server, the note instruction comprises authentication information, server is received the note instruction, carry out authentication, if authentification failure then returns error prompting, if authentication is passed through, then according to the request instruction type, to the sending short message by mobile phone instruction that client has been installed; Perhaps
The user directly requires the service provider to help it to send the note instruction, and the service provider directly triggers server and sends corresponding note instruction to the mobile phone that client has been installed after confirming user identity, and the note instruction comprises authentication information.
Fig. 4 has provided the process chart to note remote control commands incident of the present invention.As example, note remote control commands processing events may further comprise the steps:
The 1. arbitrary mobile phone of step S401a:(→ the installed mobile phone of client) user is by any sending short message by mobile phone instruction, and the note instruction comprises password.The execution of note instruction must be carried out authentication by password, otherwise can't carry out.Change step S402 over to.
The 2. arbitrary mobile phone → server of step S401b:(→ the installed mobile phone of client) user sends the note instruction request to server, comprises password in the request.Server is received request, carries out authentication, if authentification failure then returns error prompting; If pass through,, send instruction to the mobile phone that client has been installed then according to the request instruction type.Change step S402 over to.
Step S401c:(is server → installed client mobile phone 3.) user can directly require the service provider to help it to send note instruction.The service provider directly triggers server and sends corresponding note instruction to the mobile phone that client has been installed after confirming user identity.Change step S402 over to.
Step S402: client receives whether meeting query statement form is correct, and carries out authentication after the instruction execution request.
Step S402a: if success is executed instruction according to short message content.Client can or be instructed and carry out phone number with note or phone form to server or secure relationship people number, informs that instruction runs succeeded.Change step S403 over to.
Step S402b: if format error or authentication failure, the receipt of can failing is reminded.Change step S403 over to.
Step S403: the event handling of note instruction process finishes, and client-side program is monitored in real time on the backstage.
The user can carry out following any operation by sending the note instruction: lock machine, send chimes of doom, back up address list, fetch address list, delete all data in mobile phone, call reminding, note transfer etc.
Lock machine: pin mobile phone, must the release of input password ability.
Send chimes of doom: send certain sound, the caution burglar.
Backup address list: address list is backed up to server with the form of encrypting, store.
Fetch address list: whole address lists can be fetched, also the part address list can be fetched, such as, fetch the All Contacts that surname " is opened ".
Delete all data in mobile phone: all significant datas in the mobile phone are all destroyed, being comprised: information, address list, photo, video, audio frequency, document, file etc.
Call reminding: will not connect new incoming call is transmitted to the instruction of execution note with the form of mobile phone information (comprising note, multimedia message) mobile phone.
Note shifts: will newly arrive note and be forwarded to the mobile phone of carrying out the note instruction fully.
Below only be can be by sending the exemplary operations that the note instruction is carried out, operation of the present invention be not limited thereto.
After the note instruction ran succeeded, with note or phone form notification server or contact number that sets in advance or execution command mobile phone, this was operated successfully.
This method can realize the Long-distance Control to mobile phone, after mobile phone is lost, still can protect the privacy of mobile phone by number of ways, mode.
The present invention can also monitor contextual model incident is set, and the contextual model of called handset is meant that mobile phone reminds the user that arrival such as note, multimedia message, phone, data are arranged in some way or send.Common contextual model comprises standard (with sound prompting), noiseless (without any sound), vibration (reminding with mode of vibration), off-line (break away from network, can't receive/send any information and phone, some is also referred to as offline mode).
Fig. 5 has provided the process chart that contextual model is provided with incident of the present invention.As example, contextual model is provided with incident and may further comprise the steps:
Step S501: when contextual model was provided with incident generation (promptly resetting contextual model), client-side program was inquired about the contextual model of this moment immediately.
Step S502: whether the inquiry contextual model is no network (off-line/flight) pattern.
Step S502a:, then lock mobile phone if contextual model is no network (off-line/flight) pattern.
Step S502b:, then keep normal holding state if contextual model is not no network (off-line/flight) pattern.Change step S504 over to.
Under the state of locking mobile phone, need input password ability release mobile phone.Step S503: whether the password of checking input is correct.
Step S503a: if input password mistake keeps lock-out state.When surpassing certain time length or repeatedly inputing password mistake (user can set time and time numerical value arbitrarily), data in mobile phone is enciphering hiding automatically.The user can set in client-side program: duration, hiding data type, hiding data file etc.Also can set not automatic hiding data file.If after data file is hidden, the user imports proper password, changes step S503b so over to.
Step S503b: correct if the user inputs password, release mobile phone then, and recover data files that all are hidden.Change step S504 over to.
Step S504: enter set contextual model.
Step S505: contextual model is provided with event handling to be finished, and client-side program is monitored in real time on the backstage.
Break away from mobile phone under the contextual model of wireless network, i.e. off-line (or flight) pattern, mobile phone can't carry out any voice, data communication, and so, the instruction of the note of Remote mobile phone just can't arrive mobile phone, the danger that exists mobile phone private to reveal.This method is intended to when contextual model switches to off-line/offline mode, and lock machine automatically is with the protection mobile phone private.
Fig. 6 has provided the process chart to the file data encrypted event of the present invention.As example, the file data encrypted event may further comprise the steps:
Step S601: the input password enters client
Step S602: choose certain file data, encrypt.
Step S603: file destination is encrypted to stash, and stores under the hidden file directory, and uses distinctive mark it to be designated " encrypting ".The file storage of encrypting can't check in the file system that mobile phone carries to particular space, must enter under certain file directory of client just can check.
Step S604: the processing of file data encrypted event finishes, and client-side program is monitored in real time on the backstage.
The method is intended to satisfy the needs that the user protects some sensitive data.
Fig. 7 has provided the process chart to the decrypt file data incident of the present invention.As example, the decrypt file data incident may further comprise the steps:
Step S701: the input password enters client.
Step S702: under specific file directory, " encrypt " according to distinctive mark and to find the file of having encrypted.Choose certain encrypted file data, be decrypted.
Step S703: file destination is decrypted, returns in the file system that mobile phone carries, and can check.Distinctive mark cancellation in the client.
Step S704: the decrypt file data event handling finishes, and client-side program is monitored in real time on the backstage.
The method is intended to satisfy the needs that the user protects and adjusts, revises, changes some sensitive data.
Fig. 8 has provided the process chart of encrypt applications incident of the present invention.As example, the application program encrypted event may further comprise the steps:
Step S801: the input password enters client.
Step S802: choose the application program that needs monitoring, monitor and lock.Application program can comprise: all application programs such as information, telephone directory (being cards folder), multimedia, calendar, photograph/shooting, network, clock.
Step S803: when the clicked startup of selected application program, eject the password input frame.
Step S804: judge whether the input password is correct.
Step S804a: if input password mistake then keeps lock-out state.Change step S805 over to.
Step S804b: if cancellation input password then returns former mobile phone operation interface.Change step S805 over to.
Step S804c: if the input password is correct, then release can application programs be carried out corresponding operating.Change step S805 over to.
Step S805: the processing of application program encrypted event finishes, and client-side program is monitored in real time on the backstage.
The method is intended to satisfy the user to some application program, and the application program internal data protects, and to its needs of adjusting, revising, change.
Fig. 9 has provided the process chart of application programs deciphering incident of the present invention.As example, application program deciphering incident may further comprise the steps:
Step S901: the input password enters client.
Step S902: choose the application program that is in monitoring, remove monitoring in real time.
Step S903: application program deciphering event handling finishes, and client-side program is monitored in real time on the backstage.
The method is intended to satisfy the user to some application program, and the needs protected of application program internal data.
Among the present invention, the data in mobile phone migration event can comprise that mobile phone data backup incident and data in mobile phone recover incident, carry out following steps at mobile phone data backup/recovery incident: the mobile phone that client has been installed is initiated the backup/restoration request of data to server; Server is received the backup/restoration request, carries out authentication according to identifying information; If by authentication, then respond this request, beginning backup/restoration data between the mobile phone of client and the server have been installed; If by authentication, then server is not informed failed authentication.Wherein can be instructed to the note that the mobile phone that client has been installed sends the backup/restoration request by any mobile phone by the user, the note instruction comprises authentication information.Also can be instructed to the note that server sends the backup/restoration request by the user, the note instruction comprises authentication information; Server is received the note instruction, carries out authentication; If authentification failure then returns error prompting; If authentication is passed through,, send the note instruction of backup/restoration request to the mobile phone that client has been installed then according to the request instruction type.Perhaps, the user also can directly require the service provider to help its note that sends backup/restoration request instruction, the service provider directly triggers server and sends corresponding note instruction to the mobile phone that client has been installed after confirming user identity, and the note instruction comprises authentication information.
In addition, recover incident at data in mobile phone and can also carry out following steps: carry out identity validation at web or Wap page input client password, need to select the data in mobile phone of recovery, initiate request; Server response request, transmitting short message are instructed to the mobile phone that client has been installed, and command adapted thereto is resolved and carried out to client.
Figure 10 has provided the process chart of the backup to data in mobile phone of the present invention.As example, the mobile phone data backup incident may further comprise the steps:
Step S1001: the input password enters client.
Step S1002: client is initiated backup request.
Step S1003: server is received backup request, carries out authentication according to the identifying information of mobile phone, mobile phone card.
Step S1004: judge whether to pass through authentication.
Step S1004a: if, then respond this request by authentication.Change step S1005 over to.
Step S1004b: if, then inform failed authentication not by authentication.Change step S1007 over to.
Step S1005: the mobile phone that client is installed begins Backup Data, for example can pass through radio data network GPRS, EGDE, modes such as WIFI, WIMAX.The user can be provided with needs backed up data: such as, if selection information, address list, photo then back up this three types of data.
Step S1006: data backup is finished.
Step S1007: the back-up processing of data in mobile phone finishes, and client-side program is monitored in real time on the backstage.
The data that need back up or restore are set by the user.Backup can be adopted regular automated back-up, and BACKUP TIME can be prepared at interval.Also can adopt manual backup mode, BACKUP TIME is set at interval by the user.
In addition, also can back up by the Long-distance Control client:
Using arbitrary sending short message by mobile phone to instruct has installed on the mobile phone of client.The type of Backup Data has been indicated in the note instruction, comprises all types data in mobile phone, can select any or multiple.Client is received the note instruction, carries out according to instruction type after by authentication.
The method is intended to the space of extension storage data in mobile phone as much as possible, satisfies the needs that the user will carry out the data seamless migration future simultaneously.
Figure 11 has provided the process chart of the recovery to data in mobile phone of the present invention.As example, data in mobile phone recovery incident may further comprise the steps:
Step S1101: the input password enters client.
Step S1102: the mobile phone that client is installed is initiatively initiated recovery request.
Step S1103: server is received recovery request, carries out authentication according to the identifying information of mobile phone, mobile phone card.
Step S1104a: if, then respond this request by authentication.Change step S1105 over to.
Step S1104b: if, then inform failed authentication not by authentication.Change step S1107 over to.
Step S1105: the mobile phone that client is installed begins restore data, for example can pass through radio data network GPRS, EGDE, modes such as WIFI, WIMAX.The user can be provided with and want data recovered: such as, if selection information, address list, photo are then recovered this three types of data.
Step S1106: restore data is finished.Institute's data recovered can leave under the specific file directory, or imports automatically in the respective file catalogue.
Step S1107: the recovery processing of data in mobile phone finishes, and client-side program is monitored in real time on the backstage.
In addition, the mode of recovery can also comprise that the Long-distance Control client is recovered, the web request recovers, wap asks to recover.Certainly, also support directly the data retrieval on the server to terminals such as PC, PDA.
The Long-distance Control client is recovered: use arbitrary sending short message by mobile phone to instruct the mobile phone that client has been installed, client authentication by after carry out command adapted thereto.Instruction can be specified and be recovered all or part of data in mobile phone.
Web asks to recover: carry out identity validation at web page input client password, need to select the data in mobile phone of recovery, initiate request.Server response request, transmitting short message are instructed to the mobile phone that client has been installed, and command adapted thereto is resolved and carried out to client.
Wap asks to recover: carry out identity validation at wap page input client password, need to select the data in mobile phone of recovery, initiate request.Server response request, transmitting short message are instructed to the mobile phone that client has been installed, and command adapted thereto is resolved and carried out to client.
The user can pass through PC, PDA etc. by the Internet access service device, and the management backed up data is directly downloaded backed up data.
Figure 12 has provided the process chart of the seamless migration to data in mobile phone of the present invention.As example, the seamless migration of data in mobile phone comprises following mode and step:
A) point-to-point seamless migration:
Step S1201A: arbitrary mobile phone sends the note instruction of point-to-point set form to client mobile phone has been installed.Comprise the necessary information that password etc. carries out authentication in the note instruction.
Step S1202A: the mobile phone that client has been installed carries out authentication according to command format and content.
Step S1203A: judge whether to pass through authentication.
Step S1203Aa: if, then send particular data to the transmission mobile phone with specific format (as note, multimedia message etc.) as requested by authentication.Change step S1204A over to.
Step S1203Ab: if, then respond failed authentication message not by authentication.Change step S1205 over to.
Step S1204A: the user can be according to setting automatic or manual with in the data importing mobile phone of receiving.
B) by the server seamless migration:
Step S1201B: the mobile phone that client has been installed is initiated request for recovery data to server.
Step S1202B: server carries out identification authentication.
Step S1203B: judge whether to pass through authentication.
Step S1203Ba:, then, send corresponding data to mobile phone according to request data recovered type if by authentication.Change step S1204B over to.
Step S1203Bb: if not by authentication, or server does not have data, the response failed message.Change step S1205 over to.
Step S1204B: the mobile phone that client is installed begins restore data, for example can be by radio data network or directly by modes such as wired connection game servers.The user can be provided with and want data recovered: such as, if selection information, address list, photo are then recovered this three types of data.
Step S1205: data migration flow process finishes.
Certainly, can irregularly reuse " backup of data in mobile phone " operation upgrades data.Also can login by the Internet, wap website, the data in mobile phone of storing in the personal information management server is managed, comprise editor, deletion, add or the like, data are upgraded.
Figure 13 has provided the process chart of the destruction to data in mobile phone of the present invention.As example, the data in mobile phone destruction event comprises following mode and step:
A) client one key is fast destroyed
Step S1301A: the input proper password enters client.
Step S1302A: click the quick button of " key pin is ruined " in the client, be used for a key pin and ruin all data.
Step S1303A: client executing is destroyed operation, deletes all data in mobile phone immediately.Change step S1304 over to.
That is, after the input proper password enters client,, then delete all data in mobile phone immediately, for example comprise information, telephone directory, message registration, multimedia, notepad, file etc. as long as click this key.With respect to the traditional data in mobile phone of deletion one by one mode, possess simple to operate, advantage efficiently, and, can avoid manual deleted data thoroughly not cause the hidden danger of revealing.
B) the Long-distance Control client is destroyed
Step S1301B: the note of using arbitrary mobile phone to send the destruction data that comprise password is instructed the mobile phone that client has been installed.Perhaps trigger the note instruction to the mobile phone that client has been installed at web, the wap page.
Step S1302B: client is carried out authentication.
Step S1303B: judge whether to pass through authentication.
Step S1303Ba: if authentication is passed through, command adapted thereto is resolved and carried out to client.Change step S1304 over to.
Step S1303Bb: if, then respond failed message not by authentication.Change step S1304 then over to.
Step S1304: the data destroying flow process finishes.
Figure 14 has provided the process chart of the automatic hidden method of client-side program of the present invention.As example, the automatic hidden method of client-side program may further comprise the steps:
Step S1401: start client-side program first, finish after the initial configuration, client-side program is hidden automatically, and at system's running background, the user carries in the file system and can't check at mobile phone.
Step S1402: import default special keyboard combination (as #123#), access the program entry interface.
Step S1403: the input password enters client-side program.
Step S1404: it is self-defined that the special keyboard that accesses program interface is combined into row, as change to #456789#.Simultaneously, the user can select the special keyboard combination at active program interface is reached (or not passing) server, so that when forgetting the activation keyboard, obtain this information by authentication.
Step S1405: this flow process finishes.
In addition, the user also can be combined into capable self-defined in the initial configuration process to the special keyboard that accesses program interface.
By the hiden application procedure operation, how to access the client-side program, other people are difficult to know the existence of client-side program, disguise is stronger except user oneself knows, better protection mobile phone and private data thereof.
Figure 15 has provided the process chart that prevents illegal deletion of the present invention.As example, prevent that the method for illegally deleting client-side program from may further comprise the steps:
Step S1501: trigger the operation of deletion client-side program.
Step S1502: prompting input password.
Step S1503: judge whether password is correct.
Step S1503a:, carry out the operation of deletion client-side program if input is correct.Change step S1504 over to.
Step S1503b: if input error, deletion action is carried out in cancellation.Change step S1504 over to.
Step S1504: this flow process finishes.
Even client-side program is detected software discovery by the third party, attempt can't be carried out by normal unloading manner delete program, must just can finish deletion action by after the correct password authentification identity of input.
For the mobile phone that has extension storage card, native system also possesses survival ability behind certain lattice machine.
Figure 16 has provided the process chart of format existence of the present invention.As example, format existence method may further comprise the steps:
Step S1601: in the process of installation or initialization client-side program, can in storage card, write the image file of client-side program.Image file can write down for example information such as handset identity code, program version numbering, and as unique identification.
A) only format mobile phone.
Step S1602A: only format mobile phone.
Step S1603A: after the lattice machine is finished, recover to start shooting behind the Default Value of cell phone system, the image file in the storage card finds not have client-side program in the mobile phone, just reads handset identity code and compares with record value before.
Step S1604Aa: if consistent, then automatic loader; Change step 1605 over to.
Step S1604Ab:, do not do any operation if inconsistent.Change step 1605 over to.
B) format storage card earlier, insert and format mobile phone in the former mobile phone again.
Step S1602B: format storage card.
Step S1603B: this storage card is inserted in mobile phone, and client-side program can be inquired about (can take place to carry out constantly or periodically according to incident) storage card and whether had image file this moment, if find not have, so immediately image file was write in the storage card.If format mobile phone again, the same S1602A~S1605 of flow process after this.Change step S1605 over to.
Step S1605: this flow process finishes.
As example, the system that the present invention relates to comprises client modules and server, describes the present invention's schematic system formation and module referring to Figure 17 and Figure 18.Figure 17 has provided the physics pie graph of the system of individual privacy in the protection mobile phone of the present invention, and its physics formation comprises: portable terminal 1710, wireless base station 1720, the Internet 1730, server 1740 that client modules is installed.
Figure 18 has provided system module figure of the present invention.Client modules 1810 comprises following submodule (referring to Figure 18): event-monitoring module 1811, event processing module 1812, communication module 1813 and data in mobile phone upgrade, back up, recover module 1814 etc.
Event-monitoring module 1811 is responsible for all kinds of incidents of monitoring, and with all kinds of incidents, comprises incident or the detected incident of client modules that system event, user trigger, gives event handling and handles.
Event processing module 1812 is responsible for the processing of all mobile phone incidents.Comprise following each submodule, in order to respectively dissimilar incidents are handled:
Mobile phone card information processing module 1815: be responsible for handling mobile phone card identification code information, comprise the legal mobile phone card information of storage, read the current phone card information, and current phone card information and legal mobile phone card storage data are compared, thus the work of triggering mobile phone locking/unlocking module;
Mobile phone locking/unlocking module 1816: according to the execution result of mobile phone card information processing module, and the command information of note command process module, to mobile phone lock, unlocking operation;
Note command process module 1817: be responsible for the processing to the note instruction, comprise: legitimacy (identity) verification, instruction are carried out, (note form) carries out receipt;
File data processing module 1818: be responsible for file data is handled, comprise: to specified file data encryption, deciphering; With
Application program processing module 1819: responsible application programs is handled, and comprising: the monitoring of application programs, encryption, deciphering.
Data in mobile phone upgrades, backs up, recovers the processing that module 1814 is responsible for data sync between processing, client and the server end of the processing of client its data, server end its data.Renewal comprises two-way renewal; Backup is meant the PIM data storehouse that client data is backed up to server end; Recovery is meant data in mobile phone is got back to client from the PIM data storehouse of server end.
Communication module 1813 charge servers and client modules is uploaded or under the breath of delivering a letter.
Server 1820 comprises with lower module: communication module 1821, personal information management module 1822, backup/restoration module 1823 etc.
Communication module 1821 charge servers 1820 and client modules 1810 is uploaded or under the breath of delivering a letter.
Personal information management module 1822 is responsible for safeguarding the personal mobile phone data, comprises renewal, deletes, revises, searches etc.
Backup/restoration module 1823 is responsible for mobile phone data backup is stored in server, or data in mobile phone is returned to mobile phone terminal from server.
Mobile terminal operating system 1830 and portable terminal hardware platform 1840 support for client modules 1810 provides the platform on basis.And the existence of client modules 1810 is not subjected to the restriction of mobile terminal operating system 1830 and portable terminal hardware platform 1840.
The Web or the wap page 1850 provide the inlet of access server 1820.
Personal information management interface 1821 provides Web or the wap page 1850 access servers 1820 and personal information has been edited, deletes, revises, searched etc. the inlet of operation.
Note instruction process interface 1852 provides the Web or the wap page 1850 to trigger the inlet of server 1820 transmitting short messages instruction.
Personal information management interface 1821 is communicated by letter with server 1820 by communication module 1853 with note instruction process interface 1852, operates accordingly.
Embodiment in the scope of the invention also comprises and is used for carrying, or has computer or portable terminal readable media that storage is used to carry out the executable instruction or the data structure of embodiments of the invention thereon.This type of computer or portable terminal readable media can be any useable medium that can be visited by the computer of general service or special purpose or portable terminal.For example be not limited to, this type of computer or portable terminal readable media can comprise RAM, ROM, EEPROM, CD-ROM or other disk storage, magnetic disc store or other magnetic storage apparatus, maybe can be used for the carrying of the form of computer or portable terminal executable instruction or data structure or store desired program code means and can be by the computer of general service or special purpose or any other medium of mobile terminal accessing.Transmit or when providing information to arrive portable terminal or computer when communicate to connect (solidus, wireless or solidus or wireless combination) by network or another, this portable terminal or computer should connect and be considered as computer or portable terminal readable media fully.Thereby any this type of connection is regarded as computer or portable terminal readable media fully.Above combination also should be contained in the scope of computer or portable terminal readable media.Computer or portable terminal executable instruction comprise, for example impels the treatment facility of the computer of general service or special purpose or portable terminal or special purpose to carry out the instruction and data of some function or one group of function.
Usually, program module comprises the routine carrying out special duty or realize special abstract data type, program, object, assembly, data structure etc.Executable instruction, relevant data structure and program module have been represented the example of the program code means of the step that is used to carry out method disclosed herein.The particular order of this type of executable instruction or relevant data structure has been represented the example of the respective process of the function that is used for realizing that these steps are described.
Those skilled in the art will recognize that and in polytype portable terminal environment, to realize the present invention.
Under spirit of the present invention or substantive characteristics, the present invention can be embodied as other specific forms.Described embodiment is only in all its bearings the present invention being described illustratively but not be used to limit the present invention.Therefore, claim rather than description before are represented as described later for scope of the present invention.Any in the claim equivalence connotation and scope in the variation done be included in the scope of the present invention.

Claims (20)

1, a kind of method of protecting individual privacy in the mobile phone may further comprise the steps:
Behind the mobile phone power-on, client background starts, operation;
Monitor each incident;
Carry out associative operation according to event type;
After event handling finished, the client background operation continued the monitoring incident.
2, the method for claim 1, wherein the event type of being monitored comprises: replacing mobile phone card incident, note instruction incident, file data processing events, application program processing events, contextual model are provided with incident, delete program incident, format mobile phone/mobile phone memory card incident, data in mobile phone migration event, the hiding automatically incident of client-side program.
3, method as claimed in claim 2, wherein carry out following steps at changing mobile phone card incident:
Read the mobile phone card identification code;
The mobile phone card identification code that reads and the information of legal mobile phone card database are compared;
If there is not matching value, lock machine then;
If matching value is arranged, then keep normal holding state;
Wherein under the state of lock machine, the prompting user inputs password, if the user can't import proper password, then keeps the lock machine state, and/or the safeguard protection of the alert sound of transmitting messages operation, and is correct if the user inputs password, release mobile phone then, and remove all safeguard protections.
4, method as claimed in claim 3, wherein the data channel with note, phone or wireless network sends to server or secure relationship people number with the current phone number under the state of lock machine.
5, method as claimed in claim 4, if wherein the user to input password correct, then point out the user to select whether this mobile phone card to be added in " legal mobile phone card " Database Lists;
The identification code of the one or more legal mobile phone cards of storage in the wherein legal mobile phone card database, the user can be made as the new cell-phone card legal mobile phone card, also can delete certain legal mobile phone card at any time.
6, method as claimed in claim 2, wherein carry out following steps at note instruction incident:
Client receives whether short message enquiry command format is correct, and carry out authentication after the note instruction;
If correct format, and authentication success are then carried out this note instruction according to this note command content;
If format error or authentication failure or handle overtimely, the receipt of then failing is reminded the user.
7, method as claimed in claim 6 wherein sends described note instruction by following mode:
Sent to the mobile phone that client has been installed by any mobile phone by the user, the note instruction comprises authentication information; Perhaps
At first send the note instruction by the user to server, the note instruction comprises authentication information, server is received the note instruction, carry out authentication, if authentification failure then returns error prompting, if authentication is passed through, then according to the request instruction type, to the sending short message by mobile phone instruction that client has been installed; Perhaps
The user directly requires the service provider to help it to send the note instruction, and the service provider directly triggers server and sends corresponding note instruction to the mobile phone that client has been installed after confirming user identity, and the note instruction comprises authentication information.
8, method as claimed in claim 7, wherein the user can carry out following any operation by sending the note instruction: lock machine, send chimes of doom, back up all or part of data in mobile phone, recover all or part of data in mobile phone, delete all data in mobile phone, call reminding, note shift.
9, method as claimed in claim 2 wherein is provided with incident at contextual model and carries out following steps:
When contextual model was provided with the incident generation, whether the inquiry contextual model was no network schemer;
If contextual model is no network schemer, then lock mobile phone;
If contextual model is not no network schemer, then enter set contextual model;
Wherein under the state of locking mobile phone, the prompting user inputs password;
Whether the password of checking input is correct;
If it is correct that the user inputs password, release mobile phone then;
If input password mistake keeps lock-out state.
10, as claim 3 or 9 described methods, wherein when surpassing certain time length or repeatedly input the password mistake, then automatic enciphering hiding data in mobile phone;
Wherein be set by the user: duration, input number of times, hiding data type, hiding data file by mistake.
11, method as claimed in claim 2, wherein the file data processing events comprises file data encryption incident, the decrypt file data processing events, the backup of file data, recovery, destruction event, wherein carry out following steps at the file data encrypted event:
The input password enters client;
Choosing certain file data, encrypt, is " encrypting " with the file identification of encrypting;
Be designated encrypted the stashing of file of " encrypting ", store under the hidden file directory;
Wherein carry out following steps at the decrypt file data incident:
The input password enters client;
Under specific file directory, " encrypt " according to distinctive mark and to find the file of having encrypted;
Choose certain encrypted file data, be decrypted;
File destination is decrypted, returns in the file system that mobile phone carries the distinctive mark cancellation in the client.
12, method as claimed in claim 2, wherein carry out following steps at the application program processing events:
The input password enters client;
Choose the application program that needs monitoring, monitor and lock;
When the clicked startup of selected application program, the prompting user inputs password;
Judge whether the input password is correct;
If import the password mistake, then keep the lock-out state of this application program;
If cancellation input password then returns former mobile phone operation interface;
If the input password is correct, then release can application programs be carried out corresponding operating;
Wherein encrypted applications program is decrypted and may further comprise the steps:
The input password enters client;
Choose the application program that is in monitoring, remove monitoring in real time.
13, method as claimed in claim 2, wherein carry out following steps at the delete program incident:
When triggering the operation of deletion client-side program, prompting input password;
Whether the password of judging input is correct;
If input is correct, carry out the operation of deletion client-side program;
If input error, deletion action is carried out in cancellation.
14, method as claimed in claim 2, wherein carry out following steps at format mobile phone/mobile phone memory card incident:
In the process of installation or initialization client, in storage card, write the image file of client, image file record handset identity code information is as unique identification;
If only format mobile phone, image file in the storage card finds not have client in the mobile phone, then reads handset identity code and compares with record value before;
If consistent, then automatic loader;
If inconsistent, do not do any operation;
If format storage card earlier, after in this storage card insertion mobile phone, whether client query this moment storage card exists image file, if find not have, so immediately image file is write in the storage card.
15, method as claimed in claim 2, wherein hide incident automatically and carry out following steps at client-side program:
Start client first, finish after the initial configuration, client is hidden automatically, and at system's running background, the user carries in the file system and can't check at mobile phone;
Import default special keyboard combination, access the client Entry Interface;
The input password enters client.
16, method as claimed in claim 2, wherein the data in mobile phone migration event comprises that mobile phone data backup incident and data in mobile phone recover incident, carry out following steps at mobile phone data backup/recovery incident:
The mobile phone of client has been installed has been initiated the backup/restoration request of data to server;
Server is received the backup/restoration request, carries out authentication according to identifying information;
If by authentication, then respond this request, beginning backup/restoration data between the mobile phone of client and the server have been installed;
If by authentication, then server is not informed failed authentication.
17, method as claimed in claim 2, wherein the data in mobile phone migration event comprises that mobile phone data backup incident and data in mobile phone recover incident, carry out following steps at data in mobile phone recovery incident:
Carry out identity validation at web or Wap page input client password, need to select the data in mobile phone of recovery, initiate request;
Server response request, transmitting short message are instructed to the mobile phone that client has been installed, and command adapted thereto is resolved and carried out to client.
18, as claim 16 or 17 described methods, wherein by all or part of data in mobile phone of radio data network back up or restore.
19, a kind of system that protects individual privacy in the mobile phone comprises client modules and server, and wherein client modules comprises: the event-monitoring module, and event processing module, communication module and data in mobile phone upgrade, back up, recover module;
Server comprises: communication module, personal information management module, backup/restoration module.
20, system as claimed in claim 19, wherein event processing module is responsible for the processing of all mobile phone incidents, comprises mobile phone card information processing module, mobile phone locking/unlocking module, note command process module, file data processing module, application program processing module.
CN200810115368A 2008-06-23 2008-06-23 The method and system of individual privacy in the protection mobile phone Pending CN101616495A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810115368A CN101616495A (en) 2008-06-23 2008-06-23 The method and system of individual privacy in the protection mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810115368A CN101616495A (en) 2008-06-23 2008-06-23 The method and system of individual privacy in the protection mobile phone

Publications (1)

Publication Number Publication Date
CN101616495A true CN101616495A (en) 2009-12-30

Family

ID=41495796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810115368A Pending CN101616495A (en) 2008-06-23 2008-06-23 The method and system of individual privacy in the protection mobile phone

Country Status (1)

Country Link
CN (1) CN101616495A (en)

Cited By (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867650A (en) * 2010-05-21 2010-10-20 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting user behavior at operating terminal
CN101951570A (en) * 2010-08-25 2011-01-19 惠州Tcl移动通信有限公司 Short message box encrypting method for mobile phone and mobile phone
CN102122342A (en) * 2011-02-14 2011-07-13 惠州Tcl移动通信有限公司 Mobile phone password inputting method and mobile phone using same
CN102291715A (en) * 2010-06-18 2011-12-21 黄金富 Method and corresponding system for protecting personnel data in mobile phone
CN102387494A (en) * 2011-11-02 2012-03-21 北京邮电大学 Android-mobile-platform-based remote automatic information exchange and control solution
CN102394968A (en) * 2011-09-16 2012-03-28 南鑫民 Safety protection system of mobile phone data
CN102413456A (en) * 2011-09-02 2012-04-11 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN102411684A (en) * 2011-09-26 2012-04-11 奇智软件(北京)有限公司 Data protection method and device
CN102685326A (en) * 2012-04-27 2012-09-19 深圳凯虹移动通信有限公司 Message encryption method and device and mobile terminal
CN102833712A (en) * 2012-08-31 2012-12-19 北京小米科技有限责任公司 Method, device, server and system for preventing information leakage and equipment
CN102999254A (en) * 2012-11-15 2013-03-27 东莞宇龙通信科技有限公司 Display control method and device for desktop icons
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
CN103067172A (en) * 2012-12-24 2013-04-24 珠海金山办公软件有限公司 Information safety management method and system
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal
CN103200169A (en) * 2013-01-30 2013-07-10 中国科学院自动化研究所 Method and system of user data protection based on proxy
CN103324887A (en) * 2013-07-05 2013-09-25 百度在线网络技术(北京)有限公司 Mobile terminal, security defense device thereof and security defense method thereof
CN103336924A (en) * 2013-07-03 2013-10-02 上海斐讯数据通信技术有限公司 Starting lock for mobile terminal application program
CN103365590A (en) * 2012-03-29 2013-10-23 三星电子株式会社 Devices and methods for unlocking a lock mode
CN103377332A (en) * 2012-04-26 2013-10-30 腾讯科技(深圳)有限公司 Application program accessing method and device
CN103457991A (en) * 2013-05-29 2013-12-18 北京奇虎科技有限公司 Terminal safety protection method and system
CN103488950A (en) * 2013-09-23 2014-01-01 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103488930A (en) * 2013-09-23 2014-01-01 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103530549A (en) * 2013-09-23 2014-01-22 北京奇虎科技有限公司 Method and device for processing document/application program on mobile communication terminal
CN103632107A (en) * 2012-08-23 2014-03-12 苏州慧盾信息安全科技有限公司 Mobile terminal information safety protection system and method
CN103795847A (en) * 2012-10-31 2014-05-14 三星电子(中国)研发中心 Method for applying traceless mode to communication terminal and communication terminal
CN103825999A (en) * 2012-11-19 2014-05-28 腾讯科技(深圳)有限公司 Application program function display method and device
WO2014082449A1 (en) * 2012-11-29 2014-06-05 小米科技有限责任公司 Method, device and apparatus for protecting privacy information
CN103888544A (en) * 2014-04-14 2014-06-25 北京工业大学 Android mobile phone remote information acquisition system and method
CN103929401A (en) * 2013-01-11 2014-07-16 深圳市腾讯计算机系统有限公司 Method and system for controlling modification of user's sensitive information
CN104053137A (en) * 2014-06-27 2014-09-17 可牛网络技术(北京)有限公司 Data recovery method and device
CN104091119A (en) * 2014-06-03 2014-10-08 深圳天珑无线科技有限公司 Mobile terminal as well as protection method and protection system of data in mobile terminal
CN104185174A (en) * 2014-07-17 2014-12-03 惠州Tcl移动通信有限公司 Encryption method and terminal
CN104507075A (en) * 2014-12-31 2015-04-08 徐雅星 Data protection method for loss of mobile terminal
CN104573536A (en) * 2015-01-28 2015-04-29 深圳市中兴移动通信有限公司 File protection method and device
CN104598831A (en) * 2014-12-05 2015-05-06 深圳天珑无线科技有限公司 Data security protection method and terminal
CN104955027A (en) * 2014-03-27 2015-09-30 中国移动通信集团公司 Terminal information protection method, system, network-side equipment and terminal
CN105430639A (en) * 2015-11-02 2016-03-23 小米科技有限责任公司 Information processing method and device
CN105872192A (en) * 2015-12-08 2016-08-17 乐视移动智能信息技术(北京)有限公司 Control method and device for mobile terminals
CN105989265A (en) * 2015-02-06 2016-10-05 中兴通讯股份有限公司 Early warning method and device and terminal equipment
US9473936B2 (en) 2012-11-29 2016-10-18 Xiaomi Inc. Method and device for protecting privacy information
CN106161476A (en) * 2016-09-13 2016-11-23 成都创慧科达科技有限公司 A kind of security protection method and system of data in mobile phone
US20170163816A1 (en) * 2015-12-08 2017-06-08 Le Holdings (Beijing) Co., Ltd. Mobile terminal and controlling method thereof
WO2017177789A1 (en) * 2016-04-11 2017-10-19 中兴通讯股份有限公司 Anti-theft method and device for mobile terminal
US9854444B2 (en) 2012-08-31 2017-12-26 Xiaomi Inc. Apparatus and methods for preventing information disclosure
CN107948968A (en) * 2017-12-31 2018-04-20 陈迎春 A kind of system of mobile phone and quick unloading data
CN108174035A (en) * 2017-12-27 2018-06-15 中国地质大学(武汉) A smart phone dual mechanism remote control method, device and storage device
CN108200276A (en) * 2017-12-27 2018-06-22 中国地质大学(武汉) A kind of smart mobile phone safety protecting method, equipment and storage device
CN108573164A (en) * 2018-03-12 2018-09-25 珠海格力电器股份有限公司 File encryption and decryption method and device
CN108616652A (en) * 2018-03-29 2018-10-02 广东欧珀移动通信有限公司 Data guard method and device, terminal, computer readable storage medium
CN109041059A (en) * 2018-08-23 2018-12-18 中国联合网络通信集团有限公司 A kind of mobile terminal safety authentication method, control platform and mobile terminal
CN109413034A (en) * 2018-09-03 2019-03-01 平安科技(深圳)有限公司 Application data display methods, device, computer equipment and storage medium
CN109471756A (en) * 2018-11-16 2019-03-15 深圳市得微电子有限责任公司 Data reconstruction method, device and computer readable storage medium
CN109873747A (en) * 2017-12-05 2019-06-11 纬创资通股份有限公司 Electronic device and unlocking method thereof
CN109997141A (en) * 2016-10-24 2019-07-09 乐威指南公司 The system and method to media asset access are controlled for using two-factor authentication
CN110457079A (en) * 2019-08-12 2019-11-15 深圳联想懂的通信有限公司 Off-line control method and electronic device
CN111194029A (en) * 2014-06-20 2020-05-22 谷歌有限责任公司 Secure regulation in mobile devices
CN111314876A (en) * 2013-11-07 2020-06-19 德克斯康公司 Systems and methods for emission and continuous monitoring of analyte values
CN111310138A (en) * 2020-01-17 2020-06-19 珠海格力电器股份有限公司 Method and device for protecting equipment information security, storage medium and electronic equipment
CN112235451A (en) * 2020-10-21 2021-01-15 广州三星通信技术研究有限公司 Method and apparatus for providing alerts regarding deletion of contacts
US10936728B2 (en) 2017-02-23 2021-03-02 Red Hat, Inc. Non-persistent mode for network connection
US11025621B2 (en) 2017-02-24 2021-06-01 Red Hat, Inc. Enhancing privacy of network connections
CN113986644A (en) * 2021-08-30 2022-01-28 珠海读书郎软件科技有限公司 Deleted application list extraction method and device based on android platform
CN116167042A (en) * 2023-02-27 2023-05-26 广东白云学院 Password input method, device, terminal equipment and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1621994A (en) * 2005-01-10 2005-06-01 北京太极英泰信息科技有限公司 Computer security control module and safeguard control method thereof
CN1933629A (en) * 2006-08-25 2007-03-21 华为技术有限公司 Method and device for protecting user storage information in mobile terminal
CN101039479A (en) * 2007-04-25 2007-09-19 中兴通讯股份有限公司 A mobile phone anti-theft method
EP1883029A1 (en) * 2006-07-21 2008-01-30 Acer Incorporated Protection method for use in portable communication device
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system
CN101198119A (en) * 2006-12-09 2008-06-11 北京三星通信技术研究有限公司 Automatic loss reporting method and portable terminal for realizing the method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1621994A (en) * 2005-01-10 2005-06-01 北京太极英泰信息科技有限公司 Computer security control module and safeguard control method thereof
EP1883029A1 (en) * 2006-07-21 2008-01-30 Acer Incorporated Protection method for use in portable communication device
CN1933629A (en) * 2006-08-25 2007-03-21 华为技术有限公司 Method and device for protecting user storage information in mobile terminal
CN101198119A (en) * 2006-12-09 2008-06-11 北京三星通信技术研究有限公司 Automatic loss reporting method and portable terminal for realizing the method
CN101039479A (en) * 2007-04-25 2007-09-19 中兴通讯股份有限公司 A mobile phone anti-theft method
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system

Cited By (90)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867650A (en) * 2010-05-21 2010-10-20 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting user behavior at operating terminal
CN102291715A (en) * 2010-06-18 2011-12-21 黄金富 Method and corresponding system for protecting personnel data in mobile phone
CN102291715B (en) * 2010-06-18 2015-11-25 黄金富 The method of protection personnel data in mobile phone and corresponding system
CN101951570A (en) * 2010-08-25 2011-01-19 惠州Tcl移动通信有限公司 Short message box encrypting method for mobile phone and mobile phone
CN102122342A (en) * 2011-02-14 2011-07-13 惠州Tcl移动通信有限公司 Mobile phone password inputting method and mobile phone using same
CN102122342B (en) * 2011-02-14 2014-04-02 惠州Tcl移动通信有限公司 Mobile phone password inputting method and mobile phone using same
CN102413456A (en) * 2011-09-02 2012-04-11 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN102413456B (en) * 2011-09-02 2014-11-19 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN102394968A (en) * 2011-09-16 2012-03-28 南鑫民 Safety protection system of mobile phone data
CN102411684B (en) * 2011-09-26 2015-01-07 奇智软件(北京)有限公司 Data protection method and device
CN102411684A (en) * 2011-09-26 2012-04-11 奇智软件(北京)有限公司 Data protection method and device
CN102387494A (en) * 2011-11-02 2012-03-21 北京邮电大学 Android-mobile-platform-based remote automatic information exchange and control solution
CN103365590A (en) * 2012-03-29 2013-10-23 三星电子株式会社 Devices and methods for unlocking a lock mode
CN103377332B (en) * 2012-04-26 2016-04-20 腾讯科技(深圳)有限公司 The method of access application and device
CN103377332A (en) * 2012-04-26 2013-10-30 腾讯科技(深圳)有限公司 Application program accessing method and device
WO2013159725A1 (en) * 2012-04-26 2013-10-31 腾讯科技(深圳)有限公司 Method and apparatus for accessing application
CN102685326A (en) * 2012-04-27 2012-09-19 深圳凯虹移动通信有限公司 Message encryption method and device and mobile terminal
CN103632107A (en) * 2012-08-23 2014-03-12 苏州慧盾信息安全科技有限公司 Mobile terminal information safety protection system and method
CN102833712A (en) * 2012-08-31 2012-12-19 北京小米科技有限责任公司 Method, device, server and system for preventing information leakage and equipment
US9854444B2 (en) 2012-08-31 2017-12-26 Xiaomi Inc. Apparatus and methods for preventing information disclosure
CN103795847A (en) * 2012-10-31 2014-05-14 三星电子(中国)研发中心 Method for applying traceless mode to communication terminal and communication terminal
CN102999254B (en) * 2012-11-15 2015-08-12 东莞宇龙通信科技有限公司 The display control method of desktop icons and device
CN102999254A (en) * 2012-11-15 2013-03-27 东莞宇龙通信科技有限公司 Display control method and device for desktop icons
CN103825999A (en) * 2012-11-19 2014-05-28 腾讯科技(深圳)有限公司 Application program function display method and device
US9473936B2 (en) 2012-11-29 2016-10-18 Xiaomi Inc. Method and device for protecting privacy information
WO2014082449A1 (en) * 2012-11-29 2014-06-05 小米科技有限责任公司 Method, device and apparatus for protecting privacy information
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
CN103067172A (en) * 2012-12-24 2013-04-24 珠海金山办公软件有限公司 Information safety management method and system
CN103095890A (en) * 2012-12-31 2013-05-08 东莞宇龙通信科技有限公司 Contact person information encryption method and communication terminal
CN103929401B (en) * 2013-01-11 2017-12-12 深圳市腾讯计算机系统有限公司 Control the method and system of user sensitive information modification
CN103929401A (en) * 2013-01-11 2014-07-16 深圳市腾讯计算机系统有限公司 Method and system for controlling modification of user's sensitive information
CN103200169A (en) * 2013-01-30 2013-07-10 中国科学院自动化研究所 Method and system of user data protection based on proxy
CN103457991B (en) * 2013-05-29 2017-03-15 北京奇虎科技有限公司 A kind of terminal safety protection method and system
CN103457991A (en) * 2013-05-29 2013-12-18 北京奇虎科技有限公司 Terminal safety protection method and system
CN103336924A (en) * 2013-07-03 2013-10-02 上海斐讯数据通信技术有限公司 Starting lock for mobile terminal application program
CN103336924B (en) * 2013-07-03 2018-01-30 上海斐讯数据通信技术有限公司 Startup for application program for mobile terminal is locked
CN103324887B (en) * 2013-07-05 2016-12-28 百度在线网络技术(北京)有限公司 Prevention-Security device, method and the mobile terminal of mobile terminal
CN103324887A (en) * 2013-07-05 2013-09-25 百度在线网络技术(北京)有限公司 Mobile terminal, security defense device thereof and security defense method thereof
CN103530549B (en) * 2013-09-23 2016-08-24 北京奇虎科技有限公司 File/applied program processing method on communication terminal and device
CN103488950B (en) * 2013-09-23 2017-01-25 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103488950A (en) * 2013-09-23 2014-01-01 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103488930A (en) * 2013-09-23 2014-01-01 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103530549A (en) * 2013-09-23 2014-01-22 北京奇虎科技有限公司 Method and device for processing document/application program on mobile communication terminal
CN111314876B (en) * 2013-11-07 2022-12-30 德克斯康公司 System and method for emission and continuous monitoring of analyte values
CN111314876A (en) * 2013-11-07 2020-06-19 德克斯康公司 Systems and methods for emission and continuous monitoring of analyte values
CN104955027A (en) * 2014-03-27 2015-09-30 中国移动通信集团公司 Terminal information protection method, system, network-side equipment and terminal
CN104955027B (en) * 2014-03-27 2020-03-17 中国移动通信集团公司 Terminal information protection method, system, network side equipment and terminal
CN103888544A (en) * 2014-04-14 2014-06-25 北京工业大学 Android mobile phone remote information acquisition system and method
CN104091119A (en) * 2014-06-03 2014-10-08 深圳天珑无线科技有限公司 Mobile terminal as well as protection method and protection system of data in mobile terminal
US12026294B2 (en) 2014-06-20 2024-07-02 Google Llc Security adjustments in mobile devices
CN111194029A (en) * 2014-06-20 2020-05-22 谷歌有限责任公司 Secure regulation in mobile devices
CN111194029B (en) * 2014-06-20 2023-12-12 谷歌有限责任公司 Method, apparatus and computer readable storage medium for security adjustment
CN104053137A (en) * 2014-06-27 2014-09-17 可牛网络技术(北京)有限公司 Data recovery method and device
CN104185174A (en) * 2014-07-17 2014-12-03 惠州Tcl移动通信有限公司 Encryption method and terminal
CN104598831B (en) * 2014-12-05 2018-08-21 深圳天珑无线科技有限公司 A kind of guard method of data safety and terminal
CN104598831A (en) * 2014-12-05 2015-05-06 深圳天珑无线科技有限公司 Data security protection method and terminal
CN104507075A (en) * 2014-12-31 2015-04-08 徐雅星 Data protection method for loss of mobile terminal
CN104573536A (en) * 2015-01-28 2015-04-29 深圳市中兴移动通信有限公司 File protection method and device
CN105989265A (en) * 2015-02-06 2016-10-05 中兴通讯股份有限公司 Early warning method and device and terminal equipment
CN105430639A (en) * 2015-11-02 2016-03-23 小米科技有限责任公司 Information processing method and device
CN105430639B (en) * 2015-11-02 2019-11-19 小米科技有限责任公司 Information processing method and device
CN105872192A (en) * 2015-12-08 2016-08-17 乐视移动智能信息技术(北京)有限公司 Control method and device for mobile terminals
US20170163816A1 (en) * 2015-12-08 2017-06-08 Le Holdings (Beijing) Co., Ltd. Mobile terminal and controlling method thereof
WO2017096826A1 (en) * 2015-12-08 2017-06-15 乐视控股(北京)有限公司 Method and device for controlling mobile terminal
WO2017177789A1 (en) * 2016-04-11 2017-10-19 中兴通讯股份有限公司 Anti-theft method and device for mobile terminal
CN106161476A (en) * 2016-09-13 2016-11-23 成都创慧科达科技有限公司 A kind of security protection method and system of data in mobile phone
US12206940B2 (en) 2016-10-24 2025-01-21 Adeia Guides Inc. Systems and methods for controlling access to media assets using two-factor authentication
US12167078B2 (en) 2016-10-24 2024-12-10 Adeia Guides Inc. Systems and methods for controlling access to media assets using two-factor authentication
CN109997141B (en) * 2016-10-24 2023-10-17 乐威指南公司 Systems and methods for controlling access to media assets using two-factor authentication
CN109997141A (en) * 2016-10-24 2019-07-09 乐威指南公司 The system and method to media asset access are controlled for using two-factor authentication
US10936728B2 (en) 2017-02-23 2021-03-02 Red Hat, Inc. Non-persistent mode for network connection
US11025621B2 (en) 2017-02-24 2021-06-01 Red Hat, Inc. Enhancing privacy of network connections
CN109873747A (en) * 2017-12-05 2019-06-11 纬创资通股份有限公司 Electronic device and unlocking method thereof
CN109873747B (en) * 2017-12-05 2021-11-09 纬创资通股份有限公司 Electronic device and unlocking method thereof
CN108174035A (en) * 2017-12-27 2018-06-15 中国地质大学(武汉) A smart phone dual mechanism remote control method, device and storage device
CN108200276A (en) * 2017-12-27 2018-06-22 中国地质大学(武汉) A kind of smart mobile phone safety protecting method, equipment and storage device
CN107948968A (en) * 2017-12-31 2018-04-20 陈迎春 A kind of system of mobile phone and quick unloading data
CN108573164A (en) * 2018-03-12 2018-09-25 珠海格力电器股份有限公司 File encryption and decryption method and device
CN108616652A (en) * 2018-03-29 2018-10-02 广东欧珀移动通信有限公司 Data guard method and device, terminal, computer readable storage medium
CN108616652B (en) * 2018-03-29 2020-09-11 Oppo广东移动通信有限公司 Data protection method and device, terminal, and computer-readable storage medium
CN109041059B (en) * 2018-08-23 2022-01-21 中国联合网络通信集团有限公司 Mobile terminal security authentication method, management and control platform and mobile terminal
CN109041059A (en) * 2018-08-23 2018-12-18 中国联合网络通信集团有限公司 A kind of mobile terminal safety authentication method, control platform and mobile terminal
CN109413034A (en) * 2018-09-03 2019-03-01 平安科技(深圳)有限公司 Application data display methods, device, computer equipment and storage medium
CN109471756A (en) * 2018-11-16 2019-03-15 深圳市得微电子有限责任公司 Data reconstruction method, device and computer readable storage medium
CN110457079A (en) * 2019-08-12 2019-11-15 深圳联想懂的通信有限公司 Off-line control method and electronic device
CN111310138B (en) * 2020-01-17 2022-04-15 珠海格力电器股份有限公司 Method and device for protecting equipment information security, storage medium and electronic equipment
CN111310138A (en) * 2020-01-17 2020-06-19 珠海格力电器股份有限公司 Method and device for protecting equipment information security, storage medium and electronic equipment
CN112235451A (en) * 2020-10-21 2021-01-15 广州三星通信技术研究有限公司 Method and apparatus for providing alerts regarding deletion of contacts
CN113986644A (en) * 2021-08-30 2022-01-28 珠海读书郎软件科技有限公司 Deleted application list extraction method and device based on android platform
CN116167042A (en) * 2023-02-27 2023-05-26 广东白云学院 Password input method, device, terminal equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN101616495A (en) The method and system of individual privacy in the protection mobile phone
CN101252703B (en) Terminal data protection method, system and mobile communication terminal
CN102132526B (en) Privacy management for tracked devices
US8554176B2 (en) Method and apparatus for creating a remotely activated secure backup service for mobile handsets
CN100563391C (en) Method, system and device for data protection of mobile communication terminal equipment
US20070021112A1 (en) Method and system for ensuring mobile data security
AU2010353673B2 (en) Managing method, device and terminal for application program
KR20080017313A (en) Remote Cordless Phone Auto Destruction
US8571522B2 (en) Authentication method for the mobile terminal and a system thereof
CN102413456A (en) User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN1968471B (en) Mobile communication terminal having an enhanced data management function
Rottermanner et al. Privacy and data protection in smartphone messengers
WO2010067263A2 (en) A system for protection and backup of information in a mobile cell unit
CN105307135A (en) Mobile terminal and information protection method thereof
CN1980460A (en) Mobile terminal information resource safety security control and realizing method
JP2010146475A (en) System and method for preventing information leakage of mobile terminal, and program
CN113259092A (en) Document distributed encryption system
HK1160309B (en) Privacy management for tracked devices
WO2010131980A1 (en) Systems, methods and devices for management of a plurality of mobile devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20091230