CN101754209A - Method for protecting contents of mobile phone - Google Patents
Method for protecting contents of mobile phone Download PDFInfo
- Publication number
- CN101754209A CN101754209A CN201010002644A CN201010002644A CN101754209A CN 101754209 A CN101754209 A CN 101754209A CN 201010002644 A CN201010002644 A CN 201010002644A CN 201010002644 A CN201010002644 A CN 201010002644A CN 101754209 A CN101754209 A CN 101754209A
- Authority
- CN
- China
- Prior art keywords
- information
- encrypted
- user
- mobile phone
- telephone number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
本发明公开了一种保护手机信息内容的方法,对用户设定的号码相关联的所有信息进行加密,并且隐藏,包括:用户把与需要加密隐藏信息关联的电话号码输入到加密号码列表中;扫描整个所述加密号码列表;将列表中所有电话号码所关联的信息加密后保存到存储器中;以及对已加密信息进行隐藏。因此当设定的号码来电、来短信时,本发明可以使信息为保密状态隐藏,手机不做任何响应,只有在进入特定查看模块才能查看浏览,从而实现手机信息内容的保护。
The invention discloses a method for protecting the information content of a mobile phone, which encrypts and hides all the information associated with the number set by the user, including: the user inputs the phone number associated with the information to be encrypted and hidden into the encrypted number list; Scanning the entire encrypted number list; encrypting information associated with all phone numbers in the list and storing it in a memory; and hiding the encrypted information. Therefore, when the set number calls or text messages, the present invention can make the information hidden in a confidential state, and the mobile phone does not respond.
Description
技术领域technical field
本发明涉及通讯领域,尤其是涉及一种手机信息保密的方法。The invention relates to the communication field, in particular to a method for keeping mobile phone information secret.
背景技术Background technique
目前部分手机有加密功能,主要分为两种加密形式,一种是信息的加密主要就是通过将一条信息或者多条设定密码进行保护,被保护的信息还保持在信息列表当中,当任何人要打开该加密信息,就需要输入密码,一般都是四位的数字密码。这种加密保护方式虽然能起到一定的作用,但是对隐私的保护还是有欠缺的地方,首先被加密信息还保持在列表当中,这样即便看不到内容,但也知道发出人或者呼叫人是谁,发送时间或呼叫时间等基本的信息;其次即便有密码加密保护,也存在被破译的风险,毕竟四位数字的加密等级还不足,被破译的机率也较大。另一种则是给指定信息加锁,防止误删除,所有人都可以浏览该信息,只是无法删除。而且目前大多数信息加密只能够给短信和电话本进行加密,其他的信息如通话记录、图片、多媒体信息则无法加密。At present, some mobile phones have encryption functions, which are mainly divided into two types of encryption. One is the encryption of information, which is mainly protected by setting a password for one piece of information or multiple pieces of information. The protected information is still kept in the information list. When anyone To open the encrypted information, you need to enter a password, usually a four-digit numeric password. Although this encryption protection method can play a certain role, there are still deficiencies in the protection of privacy. First, the encrypted information is still kept in the list, so that even if you cannot see the content, you can still know who the sender or caller is. Basic information such as who, sending time or call time; Secondly, even if there is password encryption protection, there is a risk of being deciphered. After all, the encryption level of four digits is not enough, and the probability of being deciphered is relatively high. The other is to lock the specified information to prevent accidental deletion. Everyone can browse the information, but it cannot be deleted. Moreover, most information encryption can only encrypt text messages and phonebooks at present, and other information such as call records, pictures, and multimedia information cannot be encrypted.
针对信息加密的思路我们可以继续深入的挖掘一下,目前的加密形式是加而不密,不能够很有效的对重要和关键信息进行有效保密。对用户许多深层次的加密需求无法满足。需要有更有效的加密方式来满足用户的需求,在如今追求隐私的年代,单调的加密功能早已无法满足人们追求真正保护重要信息的内心诉求。For the idea of information encryption, we can continue to dig deeper. The current encryption form is encryption but not encryption, which cannot effectively keep important and key information confidential. Many deep-seated encryption needs of users cannot be met. More effective encryption methods are needed to meet the needs of users. In today's era of pursuing privacy, monotonous encryption functions have long been unable to meet people's inner demands for truly protecting important information.
发明内容Contents of the invention
本发明的目的是提供一种保护手机信息内容的方法,最大程度的保护个人信息。The purpose of the present invention is to provide a method for protecting mobile phone information content, which can protect personal information to the greatest extent.
本发明通过对用户的设定电话号码相关联的所有信息进行加密,来保护手机信息内容。The invention protects the information content of the mobile phone by encrypting all the information associated with the user's set phone number.
具体地说,本发明的保护手机信息内容的方法包括以下步骤:Specifically, the method for protecting mobile phone information content of the present invention comprises the following steps:
用户把与需要加密的信息关联的设定电话号码输入到加密号码列表中;The user enters the set phone number associated with the information to be encrypted into the encrypted number list;
扫描所述加密号码列表;scan said list of encrypted numbers;
将加密号码列表中所有设定电话号码所关联的信息加密后保存到存储器如手机SIM卡中或手机存储器中。The information associated with all set phone numbers in the encrypted number list is encrypted and stored in a memory such as a mobile phone SIM card or a mobile phone memory.
此外,本发明还可以通过隐藏与设定电话号码关联的信息来进一步提高保护手机信息的效果。In addition, the present invention can further improve the effect of protecting mobile phone information by hiding the information associated with the set phone number.
其中,对已加密信息隐藏的步骤包括,手机对来电、来短信中的电话号码是否为加密号码列表中的设定电话号码进行实时检查,一旦发现是,则不进行响应。Wherein, the step of hiding the encrypted information includes that the mobile phone checks in real time whether the phone number in the incoming call or text message is the set phone number in the encrypted number list, and if it is found, it does not respond.
本发明的方法还包括以下步骤:Method of the present invention also comprises the following steps:
用户预先设置加密密码;The user presets the encrypted password;
检查用户输入的加密密码,当发现输入的加密密码与设置的加密密码匹配时,加密号码列表接受用户的设定电话号码输入,反之则不接受用户的设定电话号码输入。Check the encrypted password entered by the user. When the encrypted password entered matches the encrypted password set, the encrypted number list accepts the user's set phone number input, otherwise it does not accept the user's set phone number input.
其中,所述信息包括与设定电话号码关联的所有信息,比如短信、彩信、通信记录、名片夹等。Wherein, the information includes all information associated with the set phone number, such as short messages, multimedia messages, communication records, business card holders and the like.
其中,通过输入密码检验和对加密信息进行解密处理,还原已加密信息,也就是说当输入正确密码并经解密处理之后,用户就可以浏览已加密的信息。Among them, the encrypted information is restored by verifying the input password and decrypting the encrypted information, that is to say, after inputting the correct password and decrypting, the user can browse the encrypted information.
本发明的效果是:当设定的号码来电、来短信时,其信息为保密状态隐藏,手机不做任何响应,从而提高了信息的保密效果。The effect of the invention is: when a set number calls or a short message, the information is hidden in a confidential state, and the mobile phone does not make any response, thereby improving the confidentiality effect of the information.
下面根据附图对本发明作进一步详细说明。The present invention will be described in further detail below according to the accompanying drawings.
附图说明Description of drawings
图1本发明信息加密隐藏流程图;Fig. 1 information encryption hiding flowchart of the present invention;
图2加密隐藏信息的查看、编辑、删除实现流程图。Figure 2 is a flow chart of viewing, editing, and deleting encrypted hidden information.
具体实施方式Detailed ways
本发明通过对用户设定的号码相关联的所有信息进行加密来保护手机信息内容。The invention protects the information content of the mobile phone by encrypting all the information associated with the number set by the user.
更具体地说,通过以下步骤实现本发明的方法:More specifically, realize the method of the present invention through the following steps:
用户把与需要加密隐藏信息关联的设定电话号码输入到加密号码列表中,以便利用该设定电话号码对相关信息进行加密;The user enters the set phone number associated with the hidden information that needs to be encrypted into the encrypted number list, so that the set phone number can be used to encrypt the relevant information;
扫描整个所述加密号码列表,即加密信息模块或手机程序自动遍历整个加密里表,将加密号码列表中相关的所有信息全部遍历;Scan the entire encrypted number list, that is, the encrypted information module or the mobile phone program automatically traverses the entire encrypted internal table, and traverses all relevant information in the encrypted number list;
将列表中所有设定电话号码所关联的信息加密后保存到存储器中,所述存储器是手机SIM卡或者手机存储器。The information associated with all set phone numbers in the list is encrypted and stored in a memory, and the memory is a mobile phone SIM card or a mobile phone memory.
为达到更加的保密效果,本手机可以对设定电话号码在来电、来短信时不做任何响应,从而通过隐藏来电和来短信的信息,达到提高保密状态的效果。对于隐藏的来电和来短信的信息,只有在进入特定查看模块才能查看浏览。也就是说,本发明利用加密信息模块对来电、来短信中的电话号码是否为设定电话号码进行实时检查,一旦发现两者相同,则不进行响应,从而实现信息的隐藏。In order to achieve a more confidential effect, the mobile phone can not respond to the set phone number when an incoming call or a text message is received, thereby achieving the effect of improving the confidentiality by hiding the information of the incoming call and incoming text message. For the information of hidden incoming calls and incoming text messages, only after entering a specific viewing module can viewing and browsing be performed. That is to say, the present invention utilizes the encrypted information module to check in real time whether the phone number in the incoming call or short message is the set phone number, and once the two are found to be the same, no response is made, thereby realizing the hiding of information.
另一方面,本发明也可以把已加密的信息保存到存储器的隐藏区域中,以便隐藏已加密的信息。On the other hand, the present invention can also store the encrypted information in a hidden area of the memory so as to hide the encrypted information.
本发明的方法还包括将已加密信息进行隐藏的步骤。The method of the present invention also includes the step of hiding the encrypted information.
本发明所述信息包括与设定电话号码关联的所有信息,通常包括短信、彩信、通信记录、名片夹。The information described in the present invention includes all information associated with the set phone number, usually including short messages, multimedia messages, communication records, and name card holders.
图1显示了实现本发明上述方法的流程图,如图1所示,实现本发明方法的流程包括:(1)输入密码;(2)判断输入密码与设定密码是否相同,如果输入正确继续下一步,如果不正确则结束此次进程;(3)用户进入加密号码列表,可以添加、删除、编辑号码;(4)设定完毕后,程序自动遍历整个加密号码列表,将于号码列表中相关联的所有信息全部遍历;(5)将所有遍历到的信息进行加密,并且隐藏。另外信息加密可以采用位移加密或者其他简单的加密算法,这样保证存储在SIM卡上的信息在更换手机后也无法看到加密信息。Fig. 1 has shown the flow chart that realizes above-mentioned method of the present invention, as shown in Fig. 1, the flow process that realizes method of the present invention comprises: (1) input password; (2) judge whether input password is identical with setting password, continue if input correctly In the next step, if it is incorrect, the process will end; (3) The user enters the encrypted number list, and can add, delete, and edit numbers; (4) After the setting is completed, the program automatically traverses the entire encrypted number list, and will be displayed in the number list All associated information is traversed; (5) All traversed information is encrypted and hidden. In addition, information encryption can adopt displacement encryption or other simple encryption algorithms, so as to ensure that the information stored on the SIM card cannot be seen after changing the mobile phone.
另外,为了防止他人滥用加密和隐藏,本发明的方法还包括以下步骤:In addition, in order to prevent others from abusing encryption and concealment, the method of the present invention also includes the following steps:
用户预先设置加密密码;The user presets the encrypted password;
检查用户输入的加密密码,当发现输入的加密密码与设置的加密密码匹配时,加密号码列表接受用户的设定电话号码输入,反之则不接受用户的设定电话号码输入。Check the encrypted password entered by the user. When the encrypted password entered matches the encrypted password set, the encrypted number list accepts the user's set phone number input, otherwise it does not accept the user's set phone number input.
此外,本发明利用加密信息模块还原加密和隐藏信息。In addition, the present invention utilizes the encrypted information module to restore encrypted and hidden information.
也就是说,经过加密隐藏后的信息,需要在特定模块中才能查看、编辑和删除。图2为本发明的加密隐藏信息查看、编辑、删除方法的流程图。如图2所示,用户对加密隐藏信息查看、编辑和删除的步骤如下:(1)输入密码;(2)判断输入密码与设定密码是否相同,如果输入正确继续下一步,如果不正确则结束此次进程;(3)用户进入查看加密信息模块,可以查看到所有加密隐藏信息;(4)在查看加密信息模块中,用户可以针对加密信息进行编辑和删除等操作。That is to say, the encrypted and hidden information needs to be viewed, edited and deleted in a specific module. Fig. 2 is a flow chart of the method for viewing, editing and deleting encrypted hidden information of the present invention. As shown in Figure 2, the user checks, edits and deletes the encrypted hidden information as follows: (1) input password; End this process; (3) the user enters the encrypted information viewing module, and can view all encrypted hidden information; (4) in the encrypted information viewing module, the user can edit and delete the encrypted information.
用户使用有该设计的手机,在进行加密处理后,加密保护的信息都将从信息列表中被隐藏掉,只有用户在特定界面输入密码后,才能查看到加密信息。这样的话,另外的任何人在看用户的手机时,根本不知道加密信息的存在,这样也最大程度的保护用户的个人加密信息。本发明改变和完善了现有移动通讯终端的加密方式,能够深层次的满足用户对加密信息的需求,充分保护用户的隐私、机密或其他敏感信息,为使用者带来了安全的使用感受。When the user uses a mobile phone with this design, after the encryption process is performed, the encrypted information will be hidden from the information list. Only after the user enters the password on a specific interface can the encrypted information be viewed. In this way, when other people look at the user's mobile phone, they will not know the existence of encrypted information at all, which also protects the user's personal encrypted information to the greatest extent. The invention changes and perfects the encryption method of the existing mobile communication terminal, can deeply satisfy the user's demand for encrypted information, fully protect the user's privacy, confidentiality or other sensitive information, and bring the user a safe use experience.
以上所述仅为本发明的一种较佳实施方式,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换及改进等,都应该包含在本发明的保护范围内。The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention. Any modifications, equivalent replacements and improvements made within the spirit and principles of the present invention should be included in the present invention. within the scope of protection.
Claims (9)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201010002644A CN101754209A (en) | 2010-01-20 | 2010-01-20 | Method for protecting contents of mobile phone |
| PCT/CN2010/074601 WO2011088660A1 (en) | 2010-01-20 | 2010-06-28 | Method and apparatus for protecting cell-phone information content |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201010002644A CN101754209A (en) | 2010-01-20 | 2010-01-20 | Method for protecting contents of mobile phone |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN101754209A true CN101754209A (en) | 2010-06-23 |
Family
ID=42480426
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201010002644A Pending CN101754209A (en) | 2010-01-20 | 2010-01-20 | Method for protecting contents of mobile phone |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN101754209A (en) |
| WO (1) | WO2011088660A1 (en) |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102223447A (en) * | 2011-06-22 | 2011-10-19 | 惠州Tcl移动通信有限公司 | Method for hiding short message content and method for viewing short message and hidden short message |
| CN102572750A (en) * | 2011-12-26 | 2012-07-11 | 中兴通讯股份有限公司 | Method and terminal for protecting short messages |
| WO2012155757A1 (en) * | 2011-08-09 | 2012-11-22 | 中兴通讯股份有限公司 | Short message encryption method for usim card |
| CN103379451A (en) * | 2013-06-21 | 2013-10-30 | 宇龙计算机通信科技(深圳)有限公司 | Check method and system for information instantly burned after being read |
| CN103678962A (en) * | 2012-08-30 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Personal information management method and device and terminal |
| CN106231115A (en) * | 2016-08-29 | 2016-12-14 | 深圳市金立通信设备有限公司 | A kind of information protecting method and terminal |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2002062011A2 (en) * | 2000-11-07 | 2002-08-08 | Ericsson Inc. | Method and apparatus for masking secret multiplicands |
| CN1486063A (en) * | 2002-09-28 | 2004-03-31 | 深圳市中兴通讯股份有限公司 | Method for protecting the content of mobile phone short message |
| CN1561129A (en) * | 2004-03-09 | 2005-01-05 | 惠州Tcl移动通信有限公司 | Mobile phone message security method |
| CN101321332A (en) * | 2007-06-08 | 2008-12-10 | 鹏智科技(深圳)有限公司 | Hand-hold communication appliance and its short message privacy method |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR101254798B1 (en) * | 2006-01-23 | 2013-04-15 | 삼성전자주식회사 | Method and apparatus for hiding a telephone number and an item related there to in a terminal |
| CN101754467A (en) * | 2008-12-22 | 2010-06-23 | 康佳集团股份有限公司 | Realizing method of privacy protection for dual-card cell phone |
-
2010
- 2010-01-20 CN CN201010002644A patent/CN101754209A/en active Pending
- 2010-06-28 WO PCT/CN2010/074601 patent/WO2011088660A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2002062011A2 (en) * | 2000-11-07 | 2002-08-08 | Ericsson Inc. | Method and apparatus for masking secret multiplicands |
| CN1486063A (en) * | 2002-09-28 | 2004-03-31 | 深圳市中兴通讯股份有限公司 | Method for protecting the content of mobile phone short message |
| CN1561129A (en) * | 2004-03-09 | 2005-01-05 | 惠州Tcl移动通信有限公司 | Mobile phone message security method |
| CN101321332A (en) * | 2007-06-08 | 2008-12-10 | 鹏智科技(深圳)有限公司 | Hand-hold communication appliance and its short message privacy method |
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102223447A (en) * | 2011-06-22 | 2011-10-19 | 惠州Tcl移动通信有限公司 | Method for hiding short message content and method for viewing short message and hidden short message |
| CN102223447B (en) * | 2011-06-22 | 2013-12-11 | 惠州Tcl移动通信有限公司 | Method for hiding short message content and method for viewing short message and hidden short message |
| WO2012155757A1 (en) * | 2011-08-09 | 2012-11-22 | 中兴通讯股份有限公司 | Short message encryption method for usim card |
| CN102572750A (en) * | 2011-12-26 | 2012-07-11 | 中兴通讯股份有限公司 | Method and terminal for protecting short messages |
| CN103678962A (en) * | 2012-08-30 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Personal information management method and device and terminal |
| CN103678962B (en) * | 2012-08-30 | 2018-04-03 | 腾讯科技(深圳)有限公司 | The method, apparatus and terminal of managing personal information |
| CN103379451A (en) * | 2013-06-21 | 2013-10-30 | 宇龙计算机通信科技(深圳)有限公司 | Check method and system for information instantly burned after being read |
| CN103379451B (en) * | 2013-06-21 | 2017-09-08 | 宇龙计算机通信科技(深圳)有限公司 | The inspection method and its system of burn-after-reading information |
| CN106231115A (en) * | 2016-08-29 | 2016-12-14 | 深圳市金立通信设备有限公司 | A kind of information protecting method and terminal |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2011088660A1 (en) | 2011-07-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN103647784B (en) | A kind of method and apparatus of public and private isolation | |
| CN101257681B (en) | Private data protecting equipment, mobile terminal, private data memory and read method | |
| US20090044025A1 (en) | Smart card data protection method and system thereof | |
| CN101917513B (en) | Method and device for implementing graded display of privacy information | |
| CN103095890A (en) | Contact person information encryption method and communication terminal | |
| CN101895605A (en) | Method and device for communication using pseudo-contact information | |
| CN101459723A (en) | Secret keeping processing method for mobile phone information | |
| CN100450126C (en) | A method for protecting short message content of mobile phone | |
| CN103686716A (en) | Android Confidentiality Integrity Enhanced Access Control System | |
| CN101754209A (en) | Method for protecting contents of mobile phone | |
| CN102891749A (en) | Data encryption method and its communication terminal | |
| CN102572750A (en) | Method and terminal for protecting short messages | |
| CN102202297A (en) | Method and device for encrypting mobile terminals | |
| CN102271332B (en) | End message time slot scrambling and device | |
| KR20140119765A (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
| CN108390755B (en) | Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip | |
| CN106027530A (en) | Instant message encryption system based on smartphone and implementation method thereof | |
| CN103780756B (en) | The method of client identification card data secrecy and mobile terminal thereof | |
| CN102883039A (en) | Method for encrypting multimedia private diary of mobile phone | |
| CN202014304U (en) | Mobile phone privacy protection system based on code authentication | |
| CN105022963A (en) | Document storage method, system and mobile terminal | |
| CN201623859U (en) | System for encrypting short messages through mobile phone terminal | |
| US20160316330A1 (en) | Method and device for business and private region separation | |
| CN105471711A (en) | Mail encryption system based on intelligent mobile phone and realization method thereof | |
| CN102299800B (en) | Method for realizing switchable multi-cipher local information encryption box |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C12 | Rejection of a patent application after its publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20100623 |