Background technology
The part mobile phone has encryption function at present; mainly be divided into two kinds of encrypted forms; a kind of be information encryption mainly be exactly by an information or many setting codes are protected; protected information also remains in the middle of the information list; when anyone will open this enciphered message; just needing the input password, generally all is four numerical ciphers.Though this encipherment protection mode can play a role, but the place that the protection of privacy still is weak, at first encrypted information also remains in the middle of the tabulation, even if can't see content like this, but also know and send the people or whom called person is, basic information such as transmitting time or call time; Even if secondly the password encryption protection is arranged, also there is the risk that is decrypted, the secret grade of 4-digit number is also not enough after all, and the probability that is decrypted is also bigger.Another kind then is to lock to appointed information, prevents the mistake deletion, and everyone can browse this information, just can't delete.And present most of information encryption is merely able to encrypt to note and phone directory, and other information such as message registration, picture, multimedia messages then can't be encrypted.
We can continue deep excavating at the thinking of information encryption, and present encrypted form is to add and not close, can not effectivelyly carry out effectively secret to important and key message.Encryption requirements to the many profound levels of user can't satisfy.Need the demand that more effective cipher mode satisfies the user, in the age of nowadays pursuing privacy, dull encryption function can't satisfy the heart demand that people pursue real protection important information already.
Summary of the invention
The purpose of this invention is to provide a kind of method of protecting contents of mobile phone, farthest protect personal information.
The present invention encrypts by all information that the setting telephone number to the user is associated, and protects contents of mobile phone.
Specifically, the method for protection contents of mobile phone of the present invention may further comprise the steps:
User's handle setting telephone number related with needing information encrypted is input in the encrypted number tabulation;
Scan described encrypted number tabulation;
With all are set and are saved in memory such as the SIM cards of mobile phones after the associated information encryption of telephone numbers or in the mobile phone memory in the encrypted number tabulation.
In addition, the present invention can also be by hiding and setting the effect that telephone number associated information further improves the protection cellphone information.
Wherein, the step that encrypted information is hidden comprises, mobile phone to incoming call, whether be setting telephone number in encrypted number tabulation carry out real-time inspection, in case find it is then not respond if coming telephone number in the note.
Method of the present invention is further comprising the steps of:
The user sets in advance Crypted password;
Check the Crypted password of user's input, when the Crypted password of the Crypted password of finding input and setting mated, user's setting telephone number input was accepted in the encrypted number tabulation, otherwise did not then accept user's setting telephone number input.
Wherein, described information comprises and sets all telephone number associated information, such as note, multimedia message, communications records, cards folder etc.
Wherein, by the input cryptographic checksum enciphered message is decrypted processing, the reduction encrypted information that is to say that the user just can browse information encrypted when the input proper password and after decryption processing.
Effect of the present invention is: when the number incoming call of setting, when coming note, its information is that confidential state is hidden, and mobile phone is not done any response, thereby has improved the secret effect of information.
With reference to the accompanying drawings the present invention is described in further detail below.
Embodiment
All information that the present invention is associated by the number that the user is set are encrypted and are protected contents of mobile phone.
More particularly, realize method of the present invention by following steps:
User's handle is input in the encrypted number tabulation, so that utilize this setting telephone number that relevant information is encrypted with the setting telephone number that needs the enciphering hiding associating information;
Scan whole described encrypted number tabulation, promptly enciphered message module or handset program are shown in the whole encryption of traversal automatically, and all relevant information in the encrypted number tabulation are all traveled through;
Be saved in the memory after the information encryption that all setting telephone numbers in the tabulation are associated, described memory is SIM cards of mobile phones or mobile phone memory.
For reaching more secret effect, any response sent a telegram here, do not done when coming note to this mobile phone can to setting telephone number, thereby by hiding the information of sending a telegram here and coming note, reach the effect that improves confidential state.For the incoming call of hiding with come the information of note, only specificly check that module just can be checked and browse entering.That is to say that the present invention utilizes whether the enciphered message module is to set telephone number to carry out real-time inspection to the telephone number of sending a telegram here, coming in the note, in case find that both are identical, then do not respond, thereby the information of realization is hiding.
On the other hand, the present invention also can be saved in information encrypted in the hidden area of memory, so that hide information encrypted.
Method of the present invention also comprises the step that encrypted information is hidden.
Information of the present invention comprises and sets all telephone number associated information, generally includes note, multimedia message, communications records, cards folder.
Fig. 1 has shown the flow chart of realizing said method of the present invention, as shown in Figure 1, realizes that the flow process of the inventive method comprises: (1) input password; (2) judge whether the input password identical with setting code, if the correct continuation of input next step, if incorrect then finish this process; (3) user enters encrypted number tabulation, can add, deletion, edit numbers; (4) after setting finished, Automatic Program traveled through whole encrypted number tabulation, and all information that will be associated in list of numbers all travel through; (5) information that all are traversed is encrypted, and hides.Information encryption can adopt displacement to encrypt or other simple cryptographic algorithm in addition, and the information that guarantees like this to be stored on the SIM card also can't be seen enciphered message after changing mobile phone.
In addition, abuse encryption and hiding in order to prevent other people, method of the present invention is further comprising the steps of:
The user sets in advance Crypted password;
Check the Crypted password of user's input, when the Crypted password of the Crypted password of finding input and setting mated, user's setting telephone number input was accepted in the encrypted number tabulation, otherwise did not then accept user's setting telephone number input.
In addition, the present invention utilizes enciphered message module reduction encryption and hides Info.
That is to say,, need in particular module, just can check, edit and delete through the information behind the enciphering hiding.Fig. 2 is the flow chart of enciphering hiding information inspection of the present invention, editor, delet method.As shown in Figure 2, the user is as follows to the step of enciphering hiding information inspection, editor and deletion: (1) input password; (2) judge whether the input password identical with setting code, if the correct continuation of input next step, if incorrect then finish this process; (3) user enters and checks the enciphered message module, can view all enciphering hiding information; (4) in checking the enciphered message module, the user can edit and operation such as deletion at enciphered message.
The user uses the mobile phone that this design is arranged, and after carrying out encryption, the information of encipherment protection all will be hidden from information list, has only the user behind specific interface input password, just can view enciphered message.Like this, in addition anyone do not know the existence of enciphered message when seeing user's mobile phone, so farthest protects user's individual enciphered message yet.The present invention changes and the perfect cipher mode of existing communication terminal, can be profound satisfy the demand of user to enciphered message, the user's that adequately protects privacy, secret or other sensitive informations are for the user has brought safe use experience.
The above only is a kind of better embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to and replaces and improvement etc., all should be included in protection scope of the present invention.