CN101753703A - Method and system for destroying information and mobile terminal - Google Patents
Method and system for destroying information and mobile terminal Download PDFInfo
- Publication number
- CN101753703A CN101753703A CN200810241240A CN200810241240A CN101753703A CN 101753703 A CN101753703 A CN 101753703A CN 200810241240 A CN200810241240 A CN 200810241240A CN 200810241240 A CN200810241240 A CN 200810241240A CN 101753703 A CN101753703 A CN 101753703A
- Authority
- CN
- China
- Prior art keywords
- information
- described information
- reading
- retention time
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention is suitable for the field of mobile communication and provides a method and a system for destroying information and a mobile terminal. The method comprises the following steps: popping a setting interface of an information processing strategy after information is read; receiving an information protecting level in the setting interface and the information processing strategy for retaining time; preserving the information protecting level and the information processing strategy for retaining time; processing the information through corresponding protecting levels according to the information protecting level when the information is read again; deleting the information when the retaining time of the information is arrived. After the information is read, the method can automatically destroy the information in schedule time, can better protect important information and can not tattle intimate information.
Description
Technical field
The invention belongs to field of mobile communication, relate in particular to a kind of method, system and portable terminal of destroying information.
Background technology
Along with mobile phone use more and more universal, mobile phone has become requisite means of communication in people's daily life.SMS is the most used a kind of in the cell-phone function.Along with the extensive use of note, multimedia message, people more and more use their information of carrying out to propagate, and still, owing to do not have instant deletion information after reading note, happen occasionally thereby cause having the thing that the information of privacy divulged a secret.Present mobile phone also can't provide a kind of function that can maintain secrecy to important information well.
Summary of the invention
Embodiment of the invention technical problem to be solved is to provide a kind of information method, system and portable terminal of the destroying information of auto-destruct at the appointed time after being read.
For solving the problems of the technologies described above, the embodiment of the invention provides a kind of method of destroying information, said method comprising the steps of:
After the information of reading, eject the interface that is provided with of information processing strategy;
Be received in the described information protection rank that is provided with in the interface and the information processing strategy of retention time of being provided with;
Preserve the information processing strategy of the information protection rank and the retention time of described setting;
When reading described information once more, described information is carried out the processing of corresponding protection level according to described information protection rank;
When the retention time of described information arrives, then with described information deletion.
The embodiment of the invention also provides a kind of system of destroying information, and described system comprises:
The interface pop-up module is used for after the information of reading, and ejects the interface that is provided with of information processing strategy;
Receiver module is used for being received in the described information protection rank that the interface is provided with and the information processing strategy of retention time of being provided with;
Preserve module, be used to preserve the information processing strategy of the information protection rank and the retention time of described setting;
Processing module is used for when reading described information once more, described information is carried out the processing of corresponding protection level according to described information protection rank;
The information deletion module is used for when the retention time of described information arrives, then with described information deletion.
The embodiment of the invention also provides a kind of portable terminal that comprises the system of destroying information recited above.
In embodiments of the present invention, can be after information be read auto-destruct at the appointed time.Can maintain secrecy to important information well; Information with privacy is not divulged a secret.
Description of drawings
Fig. 1 is the realization flow schematic diagram of the method for the destroying information that provides of the embodiment of the invention.
Fig. 2 is the structural representation of the system of the destroying information that provides of the embodiment of the invention.
Embodiment
In order to make technical problem to be solved by this invention, technical scheme and beneficial effect clearer,, the present invention is further elaborated below in conjunction with drawings and Examples.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
See also Fig. 1, the method for the destroying information that provides for the embodiment of the invention, it may further comprise the steps:
In step S101, after the information of reading, eject the interface that is provided with of information processing strategy;
In embodiments of the present invention, described information can be note, multimedia message or Email.
In step S102, be received in the described information protection rank that is provided with in the interface and the information processing strategy of retention time of being provided with;
In embodiments of the present invention, described information protection rank can be divided into: high, medium and low; Perhaps described information protection rank can be divided into: secret, important, common, inessential, junk information.Protection level and retention time can be provided with voluntarily by the user, also can adopt default value.
In step S103, preserve the information processing strategy of the information protection rank and the retention time of described setting;
In step S104, when reading described information once more, described information is carried out the processing of corresponding protection level according to described information protection rank;
In embodiments of the present invention, can when reading described information once more, need the input reference password or not need input reference password ability reading information according to described other importance of information protection level.
In step S105, when the retention time of described information arrives, then with described information deletion.
The method of the destroying information that the embodiment of the invention provides is described below by giving an example.
For example: secret note (or multimedia message) can be 30 days by the time that is retained after reading on the portable terminal for the first time, and degree of protection is that follow-up reading all needs to input password except being read for the first time.When the retention time of note (or multimedia message) arrives, then note (or multimedia message) is deleted.
For example: important note (or multimedia message) can be 20 days by the time that is retained after reading on the portable terminal for the first time, and degree of protection is that follow-up reading need be inputed password after being read for the first time.When the retention time of note (or multimedia message) arrives, then note (or multimedia message) is deleted.
For example: normal short message (or multimedia message) can be 10 days by the time that is retained after reading on the portable terminal for the first time, and degree of protection is that follow-up reading does not need to input password after being read for the first time.When the retention time of note (or multimedia message) arrives, then note (or multimedia message) is deleted.
For example: inessential note (or multimedia message) can be 7 days by the time that is retained after reading on the portable terminal for the first time, and degree of protection is that follow-up reading does not need to input password after being read for the first time.When the retention time of note (or multimedia message) arrives, then note (or multimedia message) is deleted.
For example: refuse messages (or multimedia message) can be 3 days by the time that is retained after reading on the portable terminal for the first time, and degree of protection is that follow-up reading does not need to input password after being read for the first time.When the retention time of note (or multimedia message) arrives, then note (or multimedia message) is deleted.
Can adopt after portable terminal is started shooting (or before shutdown) at every turn, start the retention time audit program, the time that note (or multimedia message) has been retained in the portable terminal is deleted more than or equal to the note (or multimedia message) of retention time.Also can adopt in set time every day, start the retention time audit program, the time that note (or multimedia message) has been retained in the portable terminal is deleted more than or equal to the note (or multimedia message) of retention time.Can adopt also that (for example morning, alarm clock rang when fixedly incident takes place at certain, or the free space of note/multimedia message is about to use up), start the retention time audit program, the time that note (or multimedia message) has been retained in the portable terminal is deleted more than or equal to the note (or multimedia message) of retention time.Above-mentioned implementation can and be deposited.
See also Fig. 2, the system of the destroying information that provides for the embodiment of the invention, this system comprises: interface pop-up module 10, receiver module 20, preserve module 30, processing module 40 and information deletion module 50.The system of described destroying information can be the unit that is built in software unit, hardware cell or software and hardware combining in the portable terminal.
This interface pop-up module 10 is used for after the information of reading, and ejects the interface that is provided with of information processing strategy; Receiver module 20 is received in the described information protection rank that is provided with in the interface and the information processing strategy of retention time of being provided with; Preserve module 30 and preserve the information protection rank of described setting and the information processing strategy of retention time; Processing module 40 is used for when reading described information once more, described information is carried out the processing of corresponding protection level according to described information protection rank; Information deletion module 50 is used for when the retention time of described information arrives, then with described information deletion.
As one embodiment of the present invention, described system also comprises: the cryptographic acess module.This cryptographic acess module is used for according to described other importance of information protection level, when reading described information once more, needs input reference password ability reading information.
As from the foregoing, the embodiment of the invention can be after information be read auto-destruct at the appointed time.Can maintain secrecy to important information well; Information with privacy is not divulged a secret.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.
Claims (9)
1. the method for a destroying information is characterized in that, said method comprising the steps of:
After the information of reading, eject the interface that is provided with of information processing strategy;
Be received in the described information protection rank that is provided with in the interface and the information processing strategy of retention time of being provided with;
Preserve the information processing strategy of the information protection rank and the retention time of described setting;
When reading described information once more, described information is carried out the processing of corresponding protection level according to described information protection rank;
When the retention time of described information arrives, then with described information deletion.
2. the method for claim 1 is characterized in that, described information can be note, multimedia message or Email.
3. the method for claim 1 is characterized in that, described information protection rank can be divided into: high, medium and low.
4. the method for claim 1 is characterized in that, described information protection rank can be divided into: secret, important, common, inessential, junk information.
5. the method for claim 1 is characterized in that, described protection level and retention time can be provided with voluntarily by the user, also can adopt default value.
6. the method for claim 1 is characterized in that, described step of described information being carried out the processing of corresponding protection level according to described information protection rank is specially:
According to described other importance of information protection level, when reading described information once more, need the input reference password or do not need input reference password ability reading information.
7. the system of a destroying information is characterized in that, described system comprises:
The interface pop-up module is used for after the information of reading, and ejects the interface that is provided with of information processing strategy;
Receiver module is used for being received in the described information protection rank that the interface is provided with and the information processing strategy of retention time of being provided with;
Preserve module, be used to preserve the information processing strategy of the information protection rank and the retention time of described setting;
Processing module is used for when reading described information once more, described information is carried out the processing of corresponding protection level according to described information protection rank;
The information deletion module is used for when the retention time of described information arrives, then with described information deletion.
8. system as claimed in claim 7 is characterized in that, described system also comprises:
The cryptographic acess module is used for according to described other importance of information protection level, when reading described information once more, needs input reference password ability reading information.
9. portable terminal that comprises the system of claim 7 or 8 described destroying informations.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810241240A CN101753703A (en) | 2008-12-15 | 2008-12-15 | Method and system for destroying information and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810241240A CN101753703A (en) | 2008-12-15 | 2008-12-15 | Method and system for destroying information and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101753703A true CN101753703A (en) | 2010-06-23 |
Family
ID=42480073
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200810241240A Pending CN101753703A (en) | 2008-12-15 | 2008-12-15 | Method and system for destroying information and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101753703A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101867891A (en) * | 2010-06-23 | 2010-10-20 | 中兴通讯股份有限公司 | Realizing method, device and system for deleting short messages (SMS) automatically |
CN101958977A (en) * | 2010-10-13 | 2011-01-26 | 金普斯(天津)新技术有限公司 | Processing method for receiving and sending private short message |
CN102883023A (en) * | 2012-10-15 | 2013-01-16 | 东莞宇龙通信科技有限公司 | Terminal and information protection control method |
CN103905796A (en) * | 2014-04-16 | 2014-07-02 | 浙江宇视科技有限公司 | Privacy protection method and device in monitoring system |
CN104007898A (en) * | 2013-02-27 | 2014-08-27 | 联想(北京)有限公司 | Information processing method and electronic device |
CN106031202A (en) * | 2014-03-27 | 2016-10-12 | 宇龙计算机通信科技(深圳)有限公司 | Information transmitting method and device and information receiving method and device |
CN109814964A (en) * | 2019-01-04 | 2019-05-28 | 平安科技(深圳)有限公司 | A kind of method for showing interface, terminal device and computer readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1933629A (en) * | 2006-08-25 | 2007-03-21 | 华为技术有限公司 | Method and device for protecting user storage information in mobile terminal |
US20070073823A1 (en) * | 2005-09-29 | 2007-03-29 | International Business Machines Corporation | Method and apparatus to secure and retrieve instant messages |
CN1968467A (en) * | 2006-06-21 | 2007-05-23 | 华为技术有限公司 | Mobile terminal and terminal user information protection method |
CN101222706A (en) * | 2005-01-05 | 2008-07-16 | 华为技术有限公司 | Method for guaranteeing data information safety in mobile terminal |
-
2008
- 2008-12-15 CN CN200810241240A patent/CN101753703A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222706A (en) * | 2005-01-05 | 2008-07-16 | 华为技术有限公司 | Method for guaranteeing data information safety in mobile terminal |
US20070073823A1 (en) * | 2005-09-29 | 2007-03-29 | International Business Machines Corporation | Method and apparatus to secure and retrieve instant messages |
CN1968467A (en) * | 2006-06-21 | 2007-05-23 | 华为技术有限公司 | Mobile terminal and terminal user information protection method |
CN1933629A (en) * | 2006-08-25 | 2007-03-21 | 华为技术有限公司 | Method and device for protecting user storage information in mobile terminal |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101867891A (en) * | 2010-06-23 | 2010-10-20 | 中兴通讯股份有限公司 | Realizing method, device and system for deleting short messages (SMS) automatically |
CN101867891B (en) * | 2010-06-23 | 2015-05-20 | 中兴通讯股份有限公司 | Realizing method, device and system for deleting short messages (SMS) automatically |
CN101958977A (en) * | 2010-10-13 | 2011-01-26 | 金普斯(天津)新技术有限公司 | Processing method for receiving and sending private short message |
CN102883023A (en) * | 2012-10-15 | 2013-01-16 | 东莞宇龙通信科技有限公司 | Terminal and information protection control method |
CN104007898A (en) * | 2013-02-27 | 2014-08-27 | 联想(北京)有限公司 | Information processing method and electronic device |
CN106031202A (en) * | 2014-03-27 | 2016-10-12 | 宇龙计算机通信科技(深圳)有限公司 | Information transmitting method and device and information receiving method and device |
CN106031202B (en) * | 2014-03-27 | 2019-08-02 | 宇龙计算机通信科技(深圳)有限公司 | Method for sending information and device and message receiving method and device |
CN103905796A (en) * | 2014-04-16 | 2014-07-02 | 浙江宇视科技有限公司 | Privacy protection method and device in monitoring system |
CN103905796B (en) * | 2014-04-16 | 2017-06-13 | 浙江宇视科技有限公司 | The method and device of secret protection in a kind of monitoring system |
CN109814964A (en) * | 2019-01-04 | 2019-05-28 | 平安科技(深圳)有限公司 | A kind of method for showing interface, terminal device and computer readable storage medium |
CN109814964B (en) * | 2019-01-04 | 2024-07-19 | 平安科技(深圳)有限公司 | Interface display method, terminal equipment and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101753703A (en) | Method and system for destroying information and mobile terminal | |
CN103761306B (en) | A kind of intelligent terminal file clean-up method and device | |
CN105144188B (en) | Apparatus and method for notifying security information in electronic device and computer-readable recording medium thereof | |
US20090318118A1 (en) | System and method for managing missed calls and unread messages | |
CN102065392A (en) | Communication terminal and short message secret-keeping method thereof | |
CN102685312B (en) | Mobile phone with short message cancellation function and short message cancellation realization method for mobile phone | |
WO2008129701A1 (en) | File management system and method, and mobile terminal | |
CN102594979A (en) | Information processing method and device | |
CN101610500A (en) | Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system | |
Farjamfar et al. | Research Article A Review on Mobile Device's Digital Forensic Process Models | |
US20100216427A1 (en) | Tracking mobile communication devices | |
CN108710547A (en) | A kind of data back up method, device, terminal and storage medium | |
CN101951568B (en) | Short message information interception processing and device | |
CN101610314A (en) | Communication event processing method and device | |
CN101330693A (en) | Method, system and communication terminal for processing incoming call | |
EP3125587B1 (en) | Information transmitting method and device and information receiving method and device | |
CN1486063A (en) | Method for protecting the content of mobile phone short message | |
CN101072206A (en) | Secondary authenticating method and system for instant messaging system | |
CN105791552B (en) | A kind of SMS processing method, device and mobile terminal | |
CN101697561A (en) | Method and mobile terminal for recycling short messages | |
CN101945156A (en) | Method and device for backuping data information of mobile terminal | |
US8024803B1 (en) | Methods and systems for filtering electronic messages | |
CN102685326A (en) | Message encryption method and device and mobile terminal | |
CN101394438A (en) | Method, system for process stock market information by a mobile terminal, and the mobile terminal thereof | |
CN202026374U (en) | Mobile phone with short massage canceling function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20100623 |