CN101753703A - Method and system for destroying information and mobile terminal - Google Patents

Method and system for destroying information and mobile terminal Download PDF

Info

Publication number
CN101753703A
CN101753703A CN200810241240A CN200810241240A CN101753703A CN 101753703 A CN101753703 A CN 101753703A CN 200810241240 A CN200810241240 A CN 200810241240A CN 200810241240 A CN200810241240 A CN 200810241240A CN 101753703 A CN101753703 A CN 101753703A
Authority
CN
China
Prior art keywords
information
described information
reading
retention time
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810241240A
Other languages
Chinese (zh)
Inventor
何斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Konka Group Co Ltd
Original Assignee
Konka Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Konka Group Co Ltd filed Critical Konka Group Co Ltd
Priority to CN200810241240A priority Critical patent/CN101753703A/en
Publication of CN101753703A publication Critical patent/CN101753703A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention is suitable for the field of mobile communication and provides a method and a system for destroying information and a mobile terminal. The method comprises the following steps: popping a setting interface of an information processing strategy after information is read; receiving an information protecting level in the setting interface and the information processing strategy for retaining time; preserving the information protecting level and the information processing strategy for retaining time; processing the information through corresponding protecting levels according to the information protecting level when the information is read again; deleting the information when the retaining time of the information is arrived. After the information is read, the method can automatically destroy the information in schedule time, can better protect important information and can not tattle intimate information.

Description

A kind of method of destroying information, system and portable terminal
Technical field
The invention belongs to field of mobile communication, relate in particular to a kind of method, system and portable terminal of destroying information.
Background technology
Along with mobile phone use more and more universal, mobile phone has become requisite means of communication in people's daily life.SMS is the most used a kind of in the cell-phone function.Along with the extensive use of note, multimedia message, people more and more use their information of carrying out to propagate, and still, owing to do not have instant deletion information after reading note, happen occasionally thereby cause having the thing that the information of privacy divulged a secret.Present mobile phone also can't provide a kind of function that can maintain secrecy to important information well.
Summary of the invention
Embodiment of the invention technical problem to be solved is to provide a kind of information method, system and portable terminal of the destroying information of auto-destruct at the appointed time after being read.
For solving the problems of the technologies described above, the embodiment of the invention provides a kind of method of destroying information, said method comprising the steps of:
After the information of reading, eject the interface that is provided with of information processing strategy;
Be received in the described information protection rank that is provided with in the interface and the information processing strategy of retention time of being provided with;
Preserve the information processing strategy of the information protection rank and the retention time of described setting;
When reading described information once more, described information is carried out the processing of corresponding protection level according to described information protection rank;
When the retention time of described information arrives, then with described information deletion.
The embodiment of the invention also provides a kind of system of destroying information, and described system comprises:
The interface pop-up module is used for after the information of reading, and ejects the interface that is provided with of information processing strategy;
Receiver module is used for being received in the described information protection rank that the interface is provided with and the information processing strategy of retention time of being provided with;
Preserve module, be used to preserve the information processing strategy of the information protection rank and the retention time of described setting;
Processing module is used for when reading described information once more, described information is carried out the processing of corresponding protection level according to described information protection rank;
The information deletion module is used for when the retention time of described information arrives, then with described information deletion.
The embodiment of the invention also provides a kind of portable terminal that comprises the system of destroying information recited above.
In embodiments of the present invention, can be after information be read auto-destruct at the appointed time.Can maintain secrecy to important information well; Information with privacy is not divulged a secret.
Description of drawings
Fig. 1 is the realization flow schematic diagram of the method for the destroying information that provides of the embodiment of the invention.
Fig. 2 is the structural representation of the system of the destroying information that provides of the embodiment of the invention.
Embodiment
In order to make technical problem to be solved by this invention, technical scheme and beneficial effect clearer,, the present invention is further elaborated below in conjunction with drawings and Examples.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
See also Fig. 1, the method for the destroying information that provides for the embodiment of the invention, it may further comprise the steps:
In step S101, after the information of reading, eject the interface that is provided with of information processing strategy;
In embodiments of the present invention, described information can be note, multimedia message or Email.
In step S102, be received in the described information protection rank that is provided with in the interface and the information processing strategy of retention time of being provided with;
In embodiments of the present invention, described information protection rank can be divided into: high, medium and low; Perhaps described information protection rank can be divided into: secret, important, common, inessential, junk information.Protection level and retention time can be provided with voluntarily by the user, also can adopt default value.
In step S103, preserve the information processing strategy of the information protection rank and the retention time of described setting;
In step S104, when reading described information once more, described information is carried out the processing of corresponding protection level according to described information protection rank;
In embodiments of the present invention, can when reading described information once more, need the input reference password or not need input reference password ability reading information according to described other importance of information protection level.
In step S105, when the retention time of described information arrives, then with described information deletion.
The method of the destroying information that the embodiment of the invention provides is described below by giving an example.
For example: secret note (or multimedia message) can be 30 days by the time that is retained after reading on the portable terminal for the first time, and degree of protection is that follow-up reading all needs to input password except being read for the first time.When the retention time of note (or multimedia message) arrives, then note (or multimedia message) is deleted.
For example: important note (or multimedia message) can be 20 days by the time that is retained after reading on the portable terminal for the first time, and degree of protection is that follow-up reading need be inputed password after being read for the first time.When the retention time of note (or multimedia message) arrives, then note (or multimedia message) is deleted.
For example: normal short message (or multimedia message) can be 10 days by the time that is retained after reading on the portable terminal for the first time, and degree of protection is that follow-up reading does not need to input password after being read for the first time.When the retention time of note (or multimedia message) arrives, then note (or multimedia message) is deleted.
For example: inessential note (or multimedia message) can be 7 days by the time that is retained after reading on the portable terminal for the first time, and degree of protection is that follow-up reading does not need to input password after being read for the first time.When the retention time of note (or multimedia message) arrives, then note (or multimedia message) is deleted.
For example: refuse messages (or multimedia message) can be 3 days by the time that is retained after reading on the portable terminal for the first time, and degree of protection is that follow-up reading does not need to input password after being read for the first time.When the retention time of note (or multimedia message) arrives, then note (or multimedia message) is deleted.
Can adopt after portable terminal is started shooting (or before shutdown) at every turn, start the retention time audit program, the time that note (or multimedia message) has been retained in the portable terminal is deleted more than or equal to the note (or multimedia message) of retention time.Also can adopt in set time every day, start the retention time audit program, the time that note (or multimedia message) has been retained in the portable terminal is deleted more than or equal to the note (or multimedia message) of retention time.Can adopt also that (for example morning, alarm clock rang when fixedly incident takes place at certain, or the free space of note/multimedia message is about to use up), start the retention time audit program, the time that note (or multimedia message) has been retained in the portable terminal is deleted more than or equal to the note (or multimedia message) of retention time.Above-mentioned implementation can and be deposited.
See also Fig. 2, the system of the destroying information that provides for the embodiment of the invention, this system comprises: interface pop-up module 10, receiver module 20, preserve module 30, processing module 40 and information deletion module 50.The system of described destroying information can be the unit that is built in software unit, hardware cell or software and hardware combining in the portable terminal.
This interface pop-up module 10 is used for after the information of reading, and ejects the interface that is provided with of information processing strategy; Receiver module 20 is received in the described information protection rank that is provided with in the interface and the information processing strategy of retention time of being provided with; Preserve module 30 and preserve the information protection rank of described setting and the information processing strategy of retention time; Processing module 40 is used for when reading described information once more, described information is carried out the processing of corresponding protection level according to described information protection rank; Information deletion module 50 is used for when the retention time of described information arrives, then with described information deletion.
As one embodiment of the present invention, described system also comprises: the cryptographic acess module.This cryptographic acess module is used for according to described other importance of information protection level, when reading described information once more, needs input reference password ability reading information.
As from the foregoing, the embodiment of the invention can be after information be read auto-destruct at the appointed time.Can maintain secrecy to important information well; Information with privacy is not divulged a secret.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (9)

1. the method for a destroying information is characterized in that, said method comprising the steps of:
After the information of reading, eject the interface that is provided with of information processing strategy;
Be received in the described information protection rank that is provided with in the interface and the information processing strategy of retention time of being provided with;
Preserve the information processing strategy of the information protection rank and the retention time of described setting;
When reading described information once more, described information is carried out the processing of corresponding protection level according to described information protection rank;
When the retention time of described information arrives, then with described information deletion.
2. the method for claim 1 is characterized in that, described information can be note, multimedia message or Email.
3. the method for claim 1 is characterized in that, described information protection rank can be divided into: high, medium and low.
4. the method for claim 1 is characterized in that, described information protection rank can be divided into: secret, important, common, inessential, junk information.
5. the method for claim 1 is characterized in that, described protection level and retention time can be provided with voluntarily by the user, also can adopt default value.
6. the method for claim 1 is characterized in that, described step of described information being carried out the processing of corresponding protection level according to described information protection rank is specially:
According to described other importance of information protection level, when reading described information once more, need the input reference password or do not need input reference password ability reading information.
7. the system of a destroying information is characterized in that, described system comprises:
The interface pop-up module is used for after the information of reading, and ejects the interface that is provided with of information processing strategy;
Receiver module is used for being received in the described information protection rank that the interface is provided with and the information processing strategy of retention time of being provided with;
Preserve module, be used to preserve the information processing strategy of the information protection rank and the retention time of described setting;
Processing module is used for when reading described information once more, described information is carried out the processing of corresponding protection level according to described information protection rank;
The information deletion module is used for when the retention time of described information arrives, then with described information deletion.
8. system as claimed in claim 7 is characterized in that, described system also comprises:
The cryptographic acess module is used for according to described other importance of information protection level, when reading described information once more, needs input reference password ability reading information.
9. portable terminal that comprises the system of claim 7 or 8 described destroying informations.
CN200810241240A 2008-12-15 2008-12-15 Method and system for destroying information and mobile terminal Pending CN101753703A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810241240A CN101753703A (en) 2008-12-15 2008-12-15 Method and system for destroying information and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810241240A CN101753703A (en) 2008-12-15 2008-12-15 Method and system for destroying information and mobile terminal

Publications (1)

Publication Number Publication Date
CN101753703A true CN101753703A (en) 2010-06-23

Family

ID=42480073

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810241240A Pending CN101753703A (en) 2008-12-15 2008-12-15 Method and system for destroying information and mobile terminal

Country Status (1)

Country Link
CN (1) CN101753703A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867891A (en) * 2010-06-23 2010-10-20 中兴通讯股份有限公司 Realizing method, device and system for deleting short messages (SMS) automatically
CN101958977A (en) * 2010-10-13 2011-01-26 金普斯(天津)新技术有限公司 Processing method for receiving and sending private short message
CN102883023A (en) * 2012-10-15 2013-01-16 东莞宇龙通信科技有限公司 Terminal and information protection control method
CN103905796A (en) * 2014-04-16 2014-07-02 浙江宇视科技有限公司 Privacy protection method and device in monitoring system
CN104007898A (en) * 2013-02-27 2014-08-27 联想(北京)有限公司 Information processing method and electronic device
CN106031202A (en) * 2014-03-27 2016-10-12 宇龙计算机通信科技(深圳)有限公司 Information transmitting method and device and information receiving method and device
CN109814964A (en) * 2019-01-04 2019-05-28 平安科技(深圳)有限公司 A kind of method for showing interface, terminal device and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1933629A (en) * 2006-08-25 2007-03-21 华为技术有限公司 Method and device for protecting user storage information in mobile terminal
US20070073823A1 (en) * 2005-09-29 2007-03-29 International Business Machines Corporation Method and apparatus to secure and retrieve instant messages
CN1968467A (en) * 2006-06-21 2007-05-23 华为技术有限公司 Mobile terminal and terminal user information protection method
CN101222706A (en) * 2005-01-05 2008-07-16 华为技术有限公司 Method for guaranteeing data information safety in mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222706A (en) * 2005-01-05 2008-07-16 华为技术有限公司 Method for guaranteeing data information safety in mobile terminal
US20070073823A1 (en) * 2005-09-29 2007-03-29 International Business Machines Corporation Method and apparatus to secure and retrieve instant messages
CN1968467A (en) * 2006-06-21 2007-05-23 华为技术有限公司 Mobile terminal and terminal user information protection method
CN1933629A (en) * 2006-08-25 2007-03-21 华为技术有限公司 Method and device for protecting user storage information in mobile terminal

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867891A (en) * 2010-06-23 2010-10-20 中兴通讯股份有限公司 Realizing method, device and system for deleting short messages (SMS) automatically
CN101867891B (en) * 2010-06-23 2015-05-20 中兴通讯股份有限公司 Realizing method, device and system for deleting short messages (SMS) automatically
CN101958977A (en) * 2010-10-13 2011-01-26 金普斯(天津)新技术有限公司 Processing method for receiving and sending private short message
CN102883023A (en) * 2012-10-15 2013-01-16 东莞宇龙通信科技有限公司 Terminal and information protection control method
CN104007898A (en) * 2013-02-27 2014-08-27 联想(北京)有限公司 Information processing method and electronic device
CN106031202A (en) * 2014-03-27 2016-10-12 宇龙计算机通信科技(深圳)有限公司 Information transmitting method and device and information receiving method and device
CN106031202B (en) * 2014-03-27 2019-08-02 宇龙计算机通信科技(深圳)有限公司 Method for sending information and device and message receiving method and device
CN103905796A (en) * 2014-04-16 2014-07-02 浙江宇视科技有限公司 Privacy protection method and device in monitoring system
CN103905796B (en) * 2014-04-16 2017-06-13 浙江宇视科技有限公司 The method and device of secret protection in a kind of monitoring system
CN109814964A (en) * 2019-01-04 2019-05-28 平安科技(深圳)有限公司 A kind of method for showing interface, terminal device and computer readable storage medium
CN109814964B (en) * 2019-01-04 2024-07-19 平安科技(深圳)有限公司 Interface display method, terminal equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN101753703A (en) Method and system for destroying information and mobile terminal
CN103761306B (en) A kind of intelligent terminal file clean-up method and device
CN105144188B (en) Apparatus and method for notifying security information in electronic device and computer-readable recording medium thereof
US20090318118A1 (en) System and method for managing missed calls and unread messages
CN102065392A (en) Communication terminal and short message secret-keeping method thereof
CN102685312B (en) Mobile phone with short message cancellation function and short message cancellation realization method for mobile phone
WO2008129701A1 (en) File management system and method, and mobile terminal
CN102594979A (en) Information processing method and device
CN101610500A (en) Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system
Farjamfar et al. Research Article A Review on Mobile Device's Digital Forensic Process Models
US20100216427A1 (en) Tracking mobile communication devices
CN108710547A (en) A kind of data back up method, device, terminal and storage medium
CN101951568B (en) Short message information interception processing and device
CN101610314A (en) Communication event processing method and device
CN101330693A (en) Method, system and communication terminal for processing incoming call
EP3125587B1 (en) Information transmitting method and device and information receiving method and device
CN1486063A (en) Method for protecting the content of mobile phone short message
CN101072206A (en) Secondary authenticating method and system for instant messaging system
CN105791552B (en) A kind of SMS processing method, device and mobile terminal
CN101697561A (en) Method and mobile terminal for recycling short messages
CN101945156A (en) Method and device for backuping data information of mobile terminal
US8024803B1 (en) Methods and systems for filtering electronic messages
CN102685326A (en) Message encryption method and device and mobile terminal
CN101394438A (en) Method, system for process stock market information by a mobile terminal, and the mobile terminal thereof
CN202026374U (en) Mobile phone with short massage canceling function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100623