CN106506786A - The terminal and method of protection user privacy information - Google Patents
The terminal and method of protection user privacy information Download PDFInfo
- Publication number
- CN106506786A CN106506786A CN201611228443.1A CN201611228443A CN106506786A CN 106506786 A CN106506786 A CN 106506786A CN 201611228443 A CN201611228443 A CN 201611228443A CN 106506786 A CN106506786 A CN 106506786A
- Authority
- CN
- China
- Prior art keywords
- owner
- unlocking pin
- pattern
- visitor
- guest mode
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of terminal of protection user privacy information, including:Setup module, for, under same user account state, arranging the unlocking pin of the unlocking pin, at least one guest mode and corresponding guest mode of owner's pattern and owner's pattern;Load-on module, in the unlocking pin that current unlocking pin is owner's pattern, loading the owner's data in owner's memory partitioning, in the unlocking pin that current unlocking pin is guest mode, loads the visitor's data in visitor's memory partitioning;Wherein, owner's memory partitioning is isolated with visitor's memory partitioning;Owner's data include the application installed by owner, the privacy information of owner;Visitor's data include the application installed by visitor, the privacy information of visitor.The present invention also discloses a kind of method of protection user privacy information, can be effectively protected individual subscriber privacy information by the present invention, prevent privacy compromise.
Description
Technical field
A kind of the present invention relates to field of information security technology of mobile terminal, more particularly to end of protection user privacy information
End and method.
Background technology
As the progress of science and technology, the function of mobile phone are stronger and stronger, function is increasingly enriched, and often preserves and use on mobile phone
The personal privacy information in family, it may for example comprise the highstrung privacy letter such as message registration, contact person, note, photo and video
Breath.
The time slot scrambling of the existing privacy information for individual subscriber is often to arrange screen-lock password on mobile phone, arrange ripple
The mode of operation such as close file and recording of encrypted;But, when user forced in the case of unavoidable surrender mobile phone unblock close
During code, the leakage of individual subscriber privacy information can be caused.
Content of the invention
In view of this, the embodiment of the present invention is expected to provide a kind of terminal of protection user privacy information and method, to realize
When user is forced in the case of unavoidable surrenders cell phone password, individual subscriber privacy information can be effectively protected, be prevented
Only privacy compromise.
For reaching above-mentioned purpose, the technical scheme is that and be achieved in that:
The embodiment of the present invention provides a kind of terminal of protection user privacy information, and the terminal includes:
Setup module, under same user account state, arranges the unlocking pin, extremely of owner's pattern and owner's pattern
A few guest mode and the unlocking pin of corresponding guest mode;
Load-on module, in the unlocking pin that current unlocking pin is owner's pattern, loading owner's internal memory
Owner's data in subregion, in the unlocking pin that current unlocking pin is the guest mode, load visitor's internal memory
Visitor's data in subregion;
Wherein, owner's memory partitioning is isolated with visitor's memory partitioning;Owner's data include the owner
The application installed, the privacy information of the owner;Visitor's data include the application installed by the visitor, the visitor
Privacy information.
Alternatively, the terminal also includes:
Preserving module, for being stored in solution by the unlocking pin of the unlocking pin and the guest mode of owner's pattern
In lock cipher memory partitioning.
Alternatively, the terminal also includes:
Whether judge module, for, judging the unlocking pin of current input in the unlocking pin under screen locking pattern
Deposit in subregion and exist, if the unlocking pin of the current input is present in the unlocking pin memory partitioning, judge described
The unlocking pin of current input is the unlocking pin of the unlocking pin or the guest mode of owner's pattern.
Alternatively, the terminal also includes:
Operation module, under owner's pattern, according to the operational order of user to visitor's memory partitioning in
Visitor's data carry out data manipulation.
Alternatively, the judge module, is additionally operable to judge whether active user's account state is same user account state.
The embodiment of the present invention also provides a kind of method of protection user privacy information, and methods described includes:
Unlocking pin, at least one visitor's mould of owner's pattern and owner's pattern, under same user account state, are set
Formula and the unlocking pin of corresponding guest mode;
In the unlocking pin that current unlocking pin is owner's pattern, the owner's number in owner's memory partitioning is loaded
According to the visitor's number in the unlocking pin that current unlocking pin is the guest mode, in loading visitor's memory partitioning
According to;
Wherein, owner's memory partitioning is isolated with visitor's memory partitioning;Owner's data include the owner
The application installed, the privacy information of the owner;Visitor's data include the application installed by the visitor, the visitor
Privacy information.
Alternatively, the unlocking pin, extremely of owner's pattern and owner's pattern, described under same user account state, is set
After the unlocking pin of a few guest mode and corresponding guest mode, methods described also includes:
The unlocking pin of the unlocking pin and the guest mode of owner's pattern is stored in unlocking pin internal memory point
Qu Zhong.
Alternatively, described the unlocking pin of the unlocking pin and the guest mode of owner's pattern is being stored in solution
After in lock cipher memory partitioning, methods described also includes:
Under screen locking pattern, judge whether the unlocking pin of current input is present in the unlocking pin memory partitioning,
If the unlocking pin of the current input is present in the unlocking pin memory partitioning, the unblock of the current input is judged
Password is the unlocking pin of the unlocking pin or the guest mode of owner's pattern.
Alternatively, the unlocking pin, extremely of owner's pattern and owner's pattern, described under same user account state, is set
After the unlocking pin of a few guest mode and corresponding guest mode, methods described also includes:
Under owner's pattern, the operational order according to user is carried out to the visitor's data in visitor's memory partitioning
Data manipulation.
Alternatively, the unlocking pin, extremely of owner's pattern and owner's pattern, described under same user account state, is set
Before the unlocking pin of a few guest mode and corresponding guest mode, methods described also includes:
Judge whether active user's account state is same user account state.
The terminal and method of the protection user privacy information provided by the embodiment of the present invention, by same user account shape
The solution of the unlocking pin, at least one guest mode and corresponding guest mode of owner's pattern and owner's pattern, under state, is set
Lock cipher;In the unlocking pin that current unlocking pin is owner's pattern, the owner's number in owner's memory partitioning is loaded
According to the visitor's number in the unlocking pin that current unlocking pin is the guest mode, in loading visitor's memory partitioning
According to;Wherein, owner's memory partitioning is isolated with visitor's memory partitioning, and owner's data include that the owner is installed
Application, the privacy information of the owner, visitor's data include the application installed by the visitor, the privacy of the visitor
Information;Under same user account state, owner's pattern and guest mode are hidden corresponding mould is activated by unlocking pin
Formula, externally shows only one of which user account, and will be completely isolated for the data message under owner's pattern and under guest mode, when
User is forced when surrendering terminal password in the case of unavoidable, and others does not know that the terminal of user also has various modes, can
To be effectively protected individual subscriber privacy information, privacy compromise is prevented.
Description of the drawings
Fig. 1 is the hardware architecture diagram of an optional mobile terminal for realizing each embodiment of the invention;
Fig. 2 is the communication system architecture schematic diagram that mobile terminal provided in an embodiment of the present invention is operable to;
Fig. 3 is the flow chart of the embodiment of the method one of present invention protection user privacy information;
Fig. 4 is the flow chart of the embodiment of the method two of present invention protection user privacy information;
Fig. 5 is the schematic diagram of activation owner's pattern of the embodiment of the method two of present invention protection user privacy information;
Fig. 6 is the schematic diagram of the activation guest mode of the embodiment of the method two of present invention protection user privacy information;
Fig. 7 is the structural representation of the terminal embodiment of present invention protection user privacy information.
Specific embodiment
Accompanying drawing in below in conjunction with the embodiment of the present invention, to the embodiment of the present invention in technical scheme carry out clear, complete
Site preparation is described.
The mobile terminal for realizing each embodiment of the invention is described referring now to accompanying drawing 1.In follow-up description, make
With for represent element such as " module ", " part " or " unit " suffix only for be conducive to the present invention explanation, its
Body does not have specific meaning.Therefore, " module " mixedly can be used with " part ".
Mobile terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving
Phone, smart phone, notebook computer, digit broadcasting receiver, personal digital assistant (PDA), panel computer (PAD), portable
The fixation of the mobile terminal of formula multimedia player (PMP), guider etc. and such as numeral TV, desk computer etc.
Terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for moving mesh
Element outside, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is that the hardware configuration of the mobile terminal for realizing the present invention each embodiment optional is illustrated.
Mobile terminal 1 00 can include wireless communication unit 110, audio/video (A/V) input block 120, user input
Unit 130, sensing unit 140, output unit 150, memorizer 160, interface unit 170, controller 180 and power subsystem 190
Etc..Fig. 1 shows the mobile terminal with various assemblies, it should be understood that being not required for implementing all groups for illustrating
Part, can alternatively implement more or less of component, will be discussed in more detail below the element of mobile terminal.
Wireless communication unit 110 generally includes one or more assemblies, and which allows mobile terminal 1 00 and wireless communication system
Or the radio communication between network.For example, wireless communication unit can include broadcasting reception module 111, mobile communication module
112nd, at least one of wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast via broadcast channel from external broadcast management server
Relevant information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast management server can be generated and sent
The broadcast singal generated before the server or reception of broadcast singal and/or broadcast related information and/or broadcast related information
And send it to the server of terminal.Broadcast singal can include TV broadcast singals, radio signals, data broadcasting
Signal etc..And, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase
Pass information can also be provided via mobile communications network, and in this case, broadcast related information can be by mobile communication mould
Block 112 is receiving.Broadcast singal can be present in a variety of manners, and for example, which can be with the electronics of DMB (DMB)
The form of program guide (EPG), the electronic service guidebooks (ESG) of digital video broadcast-handheld (DVB-H) etc. and exist.Broadcast
Receiver module 111 can receive signal broadcast by using various types of broadcast systems.Especially, broadcasting reception module 111
Can be wide by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video
Broadcast-hand-held (DVB-H), the Radio Data System of forward link media (MediaFLO@), received terrestrial digital broadcasting integrated service
Etc. (ISDB-T) digit broadcasting system receives digital broadcasting.Broadcasting reception module 111 may be constructed such that and be adapted to provide for extensively
Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via broadcasting reception module 111 receive broadcast singal and/
Or broadcast related information can be stored in memorizer 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal
And at least one of server and/or receive from it radio signal.Such radio signal can be logical including voice
Words signal, video calling signal or the various types of data for sending and/or receiving according to text and/or Multimedia Message.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.The module can be internally or externally
It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by the module can include WLAN (WLAN) (Wi-Fi), Wibro
(WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant
Tooth TM, RF identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), purple honeybee TM etc..
Location information module 115 be for check or obtain mobile terminal positional information module.Location information module
115 typical case is global positioning system (GPS).According to current technology, the location information module 115 of GPS calculate from
The range information of three or more satellites and correct time information and the Information application triangulation for calculating, so as to
Calculate according to longitude, latitude and highly accurately three-dimensional current location information.Currently, for calculating the side of position and temporal information
Position and the error of temporal information that method is calculated using three satellites and by using an other satellite correction.This
Outward, the location information module 115 of GPS can be by Continuous plus current location information in real time come calculating speed information.
A/V input blocks 120 are used for receiving audio or video signal.A/V input blocks 120 can include 121 He of camera
Mike 122,121 pairs of static images obtained by image capture apparatus in Video Capture pattern or image capture mode of camera
Or the view data of video is processed.Picture frame after process is may be displayed on display unit 151.Process through camera 121
Picture frame afterwards can be stored in memorizer 160 (or other storage mediums) or carry out sending out via wireless communication unit 110
Send, two or more cameras 121 can be provided according to the construction of mobile terminal.Mike 122 can be in telephone calling model, note
Sound (voice data) is received via mike 122 in record pattern, speech recognition mode etc. operational mode, and can be by this
The acoustic processing of sample is voice data.Audio frequency (voice) data after process can be converted in the case of telephone calling model
The form output of mobile communication base station can be sent to via mobile communication module 112.Mike 122 can be implemented various types of
Noise eliminate (or suppress) algorithm with eliminate noise that (or suppression) is produced during receiving and sending audio signal or
Interference.
User input unit 130 can generate key input data to control each of mobile terminal according to the order of user input
Plant operation.User input unit 130 allows the various types of information of user input, and can include keyboard, metal dome, touch
Plate (for example, detection is due to the sensitive component of the change of touched and caused resistance, pressure, electric capacity etc.), roller, rocking bar etc.
Deng.Especially, when touch pad is superimposed upon on display unit 151 as a layer, touch screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 1 00, and (for example, mobile terminal 1 00 opens or closes shape
State), the position of mobile terminal 1 00, user is for the presence or absence of contact (that is, touch input), the mobile terminal of mobile terminal 1 00
100 orientation, the acceleration or deceleration movement of mobile terminal 1 00 and direction etc., and generate for controlling mobile terminal 1 00
The order of operation or signal.For example, when mobile terminal 1 00 is embodied as sliding-type mobile phone, sensing unit 140 can be sensed
The sliding-type phone is opened or is cut out.In addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or
Whether person's interface unit 170 is coupled with external device (ED).Sensing unit 140 can will be combined below including proximity transducer 141
Touch screen is being described to this.
Interface unit 170 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 1 00.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for being used for device of the connection with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Identification module can be that storage uses each of mobile terminal 1 00 for verifying user
Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included
Etc..In addition, the device (hereinafter referred to as " identifying device ") with identification module can take the form of smart card, therefore, know
Other device can be connected with mobile terminal 1 00 via port or other attachment means.Interface unit 170 can be used for receive from
The input (for example, data message, electric power etc.) of external device (ED) and the input for receiving is transferred in mobile terminal 1 00
One or more elements can be used for transmission data between mobile terminal and external device (ED).
In addition, when mobile terminal 1 00 is connected with external base, interface unit 170 can serve as allowing to pass through which by electricity
Power provides the path of mobile terminal 1 00 from base or can serve as allowing the various command signals from base input to pass through which
It is transferred to the path of mobile terminal.The various command signals or electric power being input into from base may serve as recognizing that mobile terminal is
The no signal being accurately fitted within base.Output unit 150 is configured to defeated with the offer of vision, audio frequency and/or tactile manner
Go out signal (for example, audio signal, video signal, alarm signal, vibration signal etc.).Output unit 150 can include showing
Unit 151, dio Output Modules 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information processed in mobile terminal 1 00.For example, when mobile terminal 1 00 is in electricity
During words call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia files
Download etc.) related user interface (UI) or graphic user interface (GUI).When mobile terminal 1 00 is in video calling pattern
Or during image capture mode, display unit 151 can show the image of capture and/or the image of reception, illustrate video or figure
UI or GUI of picture and correlation function etc..
Meanwhile, when the display unit 151 and touch pad touch screen with formation superposed on one another as a layer, display unit
151 can serve as input equipment and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT)
In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least
A kind of.Some in these display may be constructed such that transparence to allow user from outside viewing, and this is properly termed as transparent
Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific
The embodiment that wants, mobile terminal 1 00 can include two or more display units (or other display devices), for example, move
Dynamic terminal can include outernal display unit (not shown) and inner display unit (not shown).Touch screen can be used for detection and touch
Input pressure and touch input position and touch input area.
Dio Output Modules 152 can mobile terminal in call signal reception pattern, call mode, logging mode,
When under the isotypes such as speech recognition mode, broadcast reception mode, that wireless communication unit 110 is received or in memorizer 160
The voice data transducing audio signal of middle storage and it is output as sound.And, dio Output Modules 152 can be provided and movement
The audio output (for example, call signal receives sound, message sink sound etc.) of the specific function correlation that terminal 100 is executed.
Dio Output Modules 152 can include speaker, buzzer etc..
Alarm unit 153 can provide output to notify event to mobile terminal 1 00.Typical event can be with
Including calling reception, message sink, key signals input, touch input etc..In addition to audio or video is exported, alarm unit
153 can provide output in a different manner with the generation of notification event.For example, alarm unit 153 can be in the form of vibrating
Output is provided, when calling, message or some other entrance communication (Incoming Communication) are received, alarm list
Unit 153 can provide tactile output (for example, vibrating) to notify to user.Tactile output as by providing, even if
When the mobile phone of user is in the pocket of user, user also can recognize that the generation of various events.Alarm unit 153
The output of the generation of notification event can also be provided via display unit 151 or dio Output Modules 152.
Memorizer 160 can store software program for the process and control operation executed by controller 180 etc., Huo Zheke
Temporarily to store the data for having exported or will having exported (for example, telephone directory, message, still image, video etc.).And
And, memorizer 160 can be storing the vibration of various modes with regard to exporting and audio signal when touching and being applied to touch screen
Data.
Memorizer 160 can include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, many
Media card, card-type memorizer (for example, SD or DX memorizeies etc.), random access storage device (RAM), static random-access storage
Device (SRAM), read only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory
(PROM), magnetic storage, disk, CD etc..And, mobile terminal 1 00 can execute memorizer with by network connection
The network storage device cooperation of 160 store function.
The overall operation of 180 usual control mobile terminal of controller.For example, controller 180 is executed and voice call, data
The related control of communication, video calling etc. and process.In addition, controller 180 can include (or playback) many matchmakers for reproducing
The multi-media module 181 of volume data, multi-media module 181 can be constructed in controller 180, or it is so structured that and control
Device 180 is separated.Controller 180 can be with execution pattern identifying processing, by the handwriting input for executing on the touchscreen or picture
Draw input and be identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit
Appropriate electric power needed for part and component.
Various embodiments described herein can be with use such as computer software, hardware or its any combination of calculating
Machine computer-readable recording medium is implementing.For hardware is implemented, embodiment described herein can be by using application-specific IC
(ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can
Programming gate array (FPGA), processor, controller, microcontroller, microprocessor, it is designed to execute function described herein
At least one in electronic unit implementing, in some cases, can be implemented in controller 180 by such embodiment.
For software is implemented, the embodiment of such as process or function can with allow to execute the single of at least one function or operation
Software module is implementing.Software code can be come by the software application (or program) that is write with any appropriate programming language
Implement, software code can be stored in memorizer 160 and be executed by controller 180.
So far, mobile terminal is described according to its function.Below, for the sake of brevity, will description such as folded form,
Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc. is used as showing
Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
As shown in Figure 1 mobile terminal 1 00 may be constructed such that using via frame or packet transmission data all if any
Line and wireless communication system and satellite-based communication system are operating.
Referring now to the communication system that Fig. 2 descriptions are wherein operable to according to the mobile terminal of the present invention.
Such communication system can use different air interfaces and/or physical layer.For example, used by communication system
Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications system
System (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, under
The description in face is related to cdma communication system, but such teaching is equally applicable to other types of system.
With reference to Fig. 2, cdma wireless communication system can include multiple mobile terminal 1s 00, multiple base stations (BS) 270, base station
Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is configured to and Public Switched Telephony Network (PSTN)
290 form interface.MSC280 is also structured to form interface with the BSC275 that can be couple to base station 270 via back haul link.
Back haul link can be constructed according to any one in some known interfaces, and the interface includes such as E1/T1, ATM, IP,
PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that system can include multiple BSC275 as shown in Figure 2.
Each BS270 can service one or more subregions (or region), by multidirectional antenna or the day of sensing specific direction
Each subregion that line is covered is radially away from BS270.Or, each subregion can by for diversity reception two or more
Antenna is covered.Each BS270 may be constructed such that the multiple frequency distribution of support, and each frequency distribution has specific frequency spectrum
(for example, 1.25MHz, 5MHz etc.).
Intersecting that subregion and frequency are distributed can be referred to as CDMA Channel.BS270 can also be referred to as base station transceiver
System (BTS) or other equivalent terms.In this case, term " base station " can be used for broadly representing single
BSC275 and at least one BS270.Base station can also be referred to as " cellular station ".Or, each subregion of specific BS270 can be claimed
For multiple cellular stations.
As shown in Figure 2, broadcast singal is sent to broadcsting transmitter (BT) 295 mobile terminal operated in system
100.Broadcasting reception module 111 is arranged at mobile terminal 1 00 to receive the broadcast sent by BT295 as shown in Figure 1
Signal.In fig. 2 it is shown that several global positioning system (GPS) satellite 300.Satellite 300 helps position multiple mobile terminals
At least one of 100.
In fig. 2, multiple satellites 300 are depicted, it is understood that be, it is possible to use any number of satellite obtains useful
Location information.The location information module 115 of GPS is generally configured to coordinate with satellite 300 to be thought as shown in Figure 1
The location information that wants.Substitute GPS tracking techniques or outside GPS tracking techniques, it is possible to use mobile terminal can be tracked
Other technology of position.In addition, at least one gps satellite 300 can optionally or additionally process satellite dmb transmission.
Used as a typical operation of wireless communication system, BS270 receives the reverse link from various mobile terminal 1s 00
Signal.00 usual participation call of mobile terminal 1, information receiving and transmitting and other types of communication.Each of the reception of certain base station 270 is anti-
Processed in specific BS270 to link signal.The data of acquisition are forwarded to the BSC275 of correlation.BSC provides call
Resource allocation and the mobile management function of the coordination including the soft switching process between BS270.BSC275 is also by the number for receiving
According to MSC280 is routed to, which is provided for the extra route service with PSTN290 formation interfaces.Similarly, PSTN290 with
MSC280 forms interface, and MSC280 and BSC275 forms interface, and BSC275 correspondingly controls BS270 to believe forward link
Number it is sent to mobile terminal 1 00.
Based on above-mentioned mobile terminal hardware configuration and communication system, the inventive method each embodiment is proposed.
Embodiment one
The method of the protection user privacy information that the present invention is provided can be carried out in the terminal of protection user privacy information
Realize, wherein, the terminal can include such as mobile phone, smart phone, notebook computer, digit broadcasting receiver, individual
The mobile terminal of digital assistants (PDA), panel computer (PAD), portable media player (PMP), guider etc..
If the mobile terminal has operating system, the operating system can be UNIX, Linux, Windows, Mac OS
X, ARIXTRA (Android), Windows Phone etc..
Application software (Application, APP) is the third party application of intelligent terminal, and user can pass through various
The application software of various kinds carries out handling official business, entertains, acquisition information etc., and its form is included such as ipa, pxl, deb, apk etc. lattice
Formula.
Fig. 3 is the flow chart of the embodiment of the method one of present invention protection user privacy information, as shown in figure 3, the present invention is real
Apply the method application of protection user privacy information of example offer on mobile terminals, the method may include steps of:
Step 301, under same user account state, arrange owner's pattern and owner's pattern unlocking pin, at least one
Individual guest mode and the unlocking pin of corresponding guest mode.
Before this step, mobile terminal can first judge that the state of current user account, the state of user account have two
The situation of kind, a kind of situation is same user account state, and one kind is different user account state.
Mobile terminal judges under same user account state, arrange owner's pattern and owner's pattern unlocking pin,
At least one guest mode and the unlocking pin of corresponding guest mode;Wherein, owner's pattern can be one or more,
Can be configured according to practical situation, here is not any limitation as;If provided as multiple owner's patterns, then each owner's pattern
A corresponding respective unlocking pin, specifically, table 1 is the corresponding relation of owner's pattern and unlocking pin, as shown in table 1.
Table 1
Owner's pattern | Unlocking pin |
First owner's pattern | First unlocking pin of first owner's pattern |
Second owner's pattern | Second unlocking pin of second owner's pattern |
…… | …… |
Because being that under same user account state, therefore each owner's pattern on screen of acquiescence is to check
Arrive, each unlocking pin by each owner's pattern is triggering activation, i.e., straight after being input into current unlocking pin under screen locking pattern
Connect under the owner's pattern for jumping to corresponding to current unlocking pin.
Guest mode can also arrange one or more, can be configured according to practical situation, and here is not limited
System;If provided as multiple guest modes, then the corresponding respective unlocking pin of each guest mode, specifically, table 2 is for visiting
Objective pattern and the corresponding relation of unlocking pin, as shown in table 2.
Table 2
Guest mode | Unlocking pin |
First guest mode | First unlocking pin of the first guest mode |
Second guest mode | Second unlocking pin of the second guest mode |
…… | …… |
Because being that under same user account state, therefore each guest mode on screen of acquiescence is to check
Arrive, each unlocking pin by each guest mode is triggering activation, i.e., straight after being input into current unlocking pin under screen locking pattern
Connect under the guest mode for jumping to corresponding to current unlocking pin.
After owner's pattern and guest mode is set, mobile terminal can be distributed in corresponding owner under owner's pattern
Subregion is deposited, the operating system and owner's data of mobile terminal in owner's memory partitioning, is included;Mobile terminal can distribute to visit
Under objective pattern, corresponding visitor's memory partitioning, includes operating system and visitor's number of mobile terminal in visitor's memory partitioning
According to;All data i.e. under both of which are all self-existent.
Owner's memory partitioning is entirely isolated with visitor's memory partitioning, is read less than machine under guest mode
Any information under holotype;Owner's data include the application installed by the owner, the privacy information of the owner;Institute
State application, the privacy information of the visitor that visitor's data include that the visitor installed;The privacy information can include logical
Words record, address list, message, photo, video etc. in them any at least one.
Explanation is needed exist for, mobile terminal, can be according to the operational order of user to institute under owner's pattern
The visitor's data that states in visitor's memory partitioning carry out data manipulation, and the operation includes installing application, the operation of more new system etc.;Example
Such as, when mobile terminal installs new opplication under owner's pattern, can prompt the user whether also to be installed under guest mode;
When mobile terminal updates operating system under owner's pattern, can prompt the user whether also to be updated under guest mode.
Preferably, if there is multiple owner's patterns, the corresponding respective owner's memory partitioning of each owner's pattern, phase
Mutually independently it is independent of each other, specifically, table 3 is the corresponding relation of owner's pattern and owner's memory partitioning, as shown in table 3.
Table 3
Owner's pattern | Owner's memory partitioning |
First owner's pattern | First owner's memory partitioning |
Second owner's pattern | Second owner's memory partitioning |
…… | …… |
If there is multiple guest modes, the corresponding respective visitor's memory partitioning of each guest mode is separate mutual
Do not affect, specifically, table 4 is the corresponding relation of guest mode and visitor's memory partitioning, as shown in table 4.
Table 4
Guest mode | Visitor's memory partitioning |
First guest mode | First visitor's memory partitioning |
Second guest mode | Second visitor's memory partitioning |
…… | …… |
Step 302, in the unlocking pin that current unlocking pin is owner's pattern, loading owner's memory partitioning in
Owner's data, in the unlocking pin that current unlocking pin is the guest mode, load in visitor's memory partitioning
Visitor's data.
When mobile terminal judges the unlocking pin that the current unlocking pin for getting is owner's pattern, in loading owner
The owner's data in subregion are deposited, mobile terminal judges the unlocking pin that the current unlocking pin for getting is guest mode
When, load the visitor's data in visitor's memory partitioning;Because owner's memory partitioning is entirely isolated with visitor's memory partitioning, visit
It is to can't see any information under owner's pattern under objective pattern, as long as so guaranteeing that others does not know that the unblock under owner's pattern is close
Code, it becomes possible to be effectively protected individual subscriber privacy information, prevent privacy compromise.
The method of protection user privacy information provided in an embodiment of the present invention, mobile terminal pass through in same user account shape
The solution of the unlocking pin, at least one guest mode and corresponding guest mode of owner's pattern and owner's pattern, under state, is set
Lock cipher;In the unlocking pin that current unlocking pin is owner's pattern, the owner's number in owner's memory partitioning is loaded
According to the visitor's number in the unlocking pin that current unlocking pin is the guest mode, in loading visitor's memory partitioning
According to;Wherein, owner's memory partitioning is isolated with visitor's memory partitioning, and owner's data include that the owner is installed
Application, the privacy information of the owner, visitor's data include the application installed by the visitor, the privacy of the visitor
Information;Under same user account state, owner's pattern and guest mode are hidden corresponding mould is activated by unlocking pin
Formula, externally shows only one of which user account, and will be completely isolated for the data message under owner's pattern and under guest mode, when
When user is forced, in the case of unavoidable, the password for surrendering mobile terminal, it is many that others does not know that the mobile terminal of user also has
The pattern of kind, can be effectively protected individual subscriber privacy information, prevent privacy compromise.
Embodiment two
Fig. 4 is the flow chart of the embodiment of the method two of present invention protection user privacy information, as shown in figure 4, the present invention is real
The method for applying the protection user privacy information of example offer is applied on mobile phone, and the method may include steps of:
Step 401, judge whether active user's account state is same user account state.
Mobile phone judges whether active user's account state is same user account state, that is, determine active user's account state
It is same user account state or two or more user account states, if active user's account state is not same user's account
Number state, then execution step 402;If active user's account state is same user account state, execution step 403.
Step 402, end current task, return to step 401.
Mobile phone terminates currently processed flow of task, and return to step 401 restarts mission.
Step 403, unlocking pin, at least one guest mode and corresponding visit that owner's pattern and owner's pattern are set
The unlocking pin of objective pattern.
When first use, the unlocking pin of handss opportunity directed user setup owner pattern and owner's pattern, at least
One guest mode and the unlocking pin of corresponding guest mode;For example, under same user account, user setup owner's mould
The corresponding unlocking pin of formula is 1357, and mobile phone can distribute to the corresponding owner's memory partitioning of owner's pattern;User setup visitor's mould
The corresponding unlocking pin of formula is 2468, and mobile phone can distribute to the corresponding visitor's memory partitioning of guest mode;Mobile phone will not externally show
Show owner's pattern and guest mode, only show user account, different patterns are activated by different unlocking pins.
Wherein, owner's memory partitioning and visitor's memory partitioning are entirely isolated, and read under guest mode
Any information under less than owner's pattern;Owner's data include the application installed by the owner, the privacy of the owner
Information;Visitor's data include the application installed by the visitor, the privacy information of the visitor;The privacy information can be with
Including message registration, address list, message, photo, video etc. in them any at least one.
Explanation is needed exist for, mobile phone, can be to visitor's internal memory point according to the operational order of user under owner's pattern
Visitor's data in area carry out data manipulation;The operation includes installing application, the operation of more new system etc.;For example, when mobile whole
When new opplication is installed under owner's pattern in end, can prompt the user whether also to be installed under guest mode;Work as mobile terminal
When updating operating system under owner's pattern, can prompt the user whether also to be updated under guest mode.
Step 404, by the unlocking pin of the unlocking pin and the guest mode of owner's pattern be stored in unblock close
In code memory partitioning.
Mobile phone is stored in the unlocking pin of the unlocking pin and guest mode of owner's pattern in unlocking pin memory partitioning,
For example, the unlocking pin 2468 of the unlocking pin 1357 and guest mode of owner's pattern is stored in unlocking pin memory partitioning
For follow-up use.
Step 405, under screen locking pattern, judge the unlocking pin of current input whether in the unlocking pin memory partitioning
Middle presence.
Whether mobile phone is deposited in unlocking pin memory partitioning in the unlocking pin under screen locking pattern, judging current input
If judging, the unlocking pin of current input is not present in unlocking pin memory partitioning, execution step 406;If judging
The unlocking pin for going out current input is present in unlocking pin memory partitioning, then execution step 407.
Step 406, end current task, return to step 405.
Mobile phone terminates currently processed task, and return to step 405 re-executes step 405.
Step 407, the unlocking pin for judging the current input are the unlocking pin of owner's pattern or the visit
The unlocking pin of objective pattern.
Mobile phone after the unlocking pin for judging current input is present in unlocking pin memory partitioning continues to judge currently
Unlocking pin unlocking pin still for guest mode of the unlocking pin of input for owner's pattern, if judge current input
When unlocking pin is the unlocking pin of owner's pattern, execution step 408;If judging, the unlocking pin of current input is visitor's mould
During the unlocking pin of formula, execution step 409;
For example, the unlocking pin of user's currently input is 1357, mobile phone judge the unlocking pin 1357 of current input with
The unlocking pin 1357 of owner's pattern is identical, then execution step 408;The unlocking pin of user's currently input is 2468, and mobile phone is sentenced
Break current input unlocking pin 2468 identical with the unlocking pin 2468 of guest mode, then execution step 409.
Step 408, the owner's data loaded in owner's memory partitioning.
Owner's data in mobile phone loading owner's memory partitioning.
Step 409, the visitor's data loaded in visitor's memory partitioning.
Visitor's data in mobile phone loading visitor's memory partitioning;Because the data message under owner's pattern and under guest mode
It is entirely isolated, it is possible to be effectively protected individual subscriber privacy information, prevent privacy compromise.
Fig. 5 is the schematic diagram of activation owner's pattern of the embodiment of the method two of present invention protection user privacy information;Fig. 6 is
The schematic diagram of the activation guest mode of the embodiment of the method two of present invention protection user privacy information;As shown in figure 5, defeated in user
After entering unlocking pin 1357, mobile phone determines the unlocking pin 1357 for owner's pattern, then the owner in loading owner's memory partitioning
Data, and be presented on mobile phone screen, owner's data include phone, message, address list, photo, video, application A, application
B, application C;As shown in fig. 6, after user input unlocking pin is 2468, mobile phone determines that the unlocking pin 2468 is visitor's mould
Formula, then load the visitor's data in visitor's memory partitioning, and be presented on mobile phone screen, and visitor's data include phone, lead to
News record, message, video, photo, application A;Because the data under guest mode are completely isolated with the data under owner's pattern, because
This, after loading guest mode, will not read any owner's data.
The method of protection user privacy information provided in an embodiment of the present invention, mobile phone is by judging active user's account state
Whether it is same user account state, under same user account state, the unlocking pin of setting owner's pattern and owner's pattern,
At least one guest mode and the unlocking pin of corresponding guest mode;By the unlocking pin of owner's pattern and the visit
The unlocking pin of objective pattern is stored in unlocking pin memory partitioning;Under screen locking pattern, the unlocking pin of current input is judged
Whether exist in the unlocking pin memory partitioning;In the unlocking pin being currently input in the unlocking pin memory partitioning
In the presence of, judge that the unlocking pin of the current input is the solution of the unlocking pin or the guest mode of owner's pattern
Lock cipher;If owner's password, then load the owner's data in owner's memory partitioning;If passwords of visitors, then in loading visitor
Deposit the visitor's data in subregion;By this method, under same user account state, owner's pattern and guest mode are hidden logical
Cross unlocking pin to activate corresponding pattern, externally show only one of which user account, and by under owner's pattern and visitor's mould
Data message under formula is completely isolated, and when user is forced, in the case of unavoidable, the password for surrendering mobile phone, others does not know
The mobile phone of road user also has various modes, can be effectively protected individual subscriber privacy information, prevent privacy compromise.
Embodiment three
Fig. 7 is the structural representation of the terminal embodiment of present invention protection user privacy information, as shown in fig. 7, of the invention
The terminal 07 of the protection user privacy information that embodiment is provided includes:Setup module 71, load-on module 72;Wherein,
The setup module 71, for, under same user account state, arranging the unblock of owner's pattern and owner's pattern
The unlocking pin of password, at least one guest mode and corresponding guest mode;
The load-on module 72, in the unlocking pin that current unlocking pin is owner's pattern, loading machine
Owner's data in main memory subregion, in the unlocking pin that current unlocking pin is the guest mode, load the visit
Visitor's data in objective memory partitioning;
Wherein, owner's memory partitioning is isolated with visitor's memory partitioning;Owner's data include the owner
The application installed, the privacy information of the owner;Visitor's data include the application installed by the visitor, the visitor
Privacy information.
Further, the terminal also includes:Preserving module 73;Wherein,
The preserving module 73, for depositing the unlocking pin of the unlocking pin and the guest mode of owner's pattern
Storage is in unlocking pin memory partitioning.
Further, the terminal also includes:Judge module 74;Wherein,
Whether the judge module, the unlocking pin under screen locking pattern, judging current input are close in the unblock
Exist in code memory partitioning, if the unlocking pin of the current input is present in the unlocking pin memory partitioning, judge
The unlocking pin of the current input is the unlocking pin of the unlocking pin or the guest mode of owner's pattern.
Further, the terminal also includes:Operation module 75;Wherein,
The operation module 75, under owner's pattern, according to the operational order of user to visitor's internal memory
Visitor's data in subregion carry out data manipulation.
Further, the judge module 74, is additionally operable to judge whether active user's account state is same user account
State.
The terminal of the present embodiment, can be used for the technical scheme for executing above-mentioned shown embodiment of the method, its realize principle and
Technique effect is similar to, and here is omitted.
In actual applications, the setup module 71, load-on module 72, preserving module 73, judge module 74, operation module
75 can by be located at protection user privacy information terminal 07 in central processing unit (Central Processing Unit,
CPU), microprocessor (Micro Processor Unit, MPU), digital signal processor (Digital Signal
Processor, DSP) or field programmable gate array (Field Programmable Gate Array, FPGA) etc. realize.
It should be noted that herein, term " including ", "comprising" or its any other variant are intended to non-row
His property includes, so that a series of process, method, article or device including key elements not only includes those key elements, and
And also include other key elements being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element for being limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
Also there is other identical element in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform by software to realize, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Such understanding is based on, technical scheme is substantially done to prior art in other words
The part for going out contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), use so that a station terminal equipment including some instructions (can be mobile phone, computer, clothes
Business device, air-conditioner, or network equipment etc.) execute method described by each embodiment of the invention.
The present invention is the flow process with reference to method according to embodiments of the present invention, equipment (system) and computer program
Figure and/or block diagram are describing.It should be understood that can be by computer program instructions flowchart and/or each stream in block diagram
Journey and/or the combination of square frame and flow chart and/or the flow process in block diagram and/or square frame.These computer programs can be provided
Instruct the processor of general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine so that produced for reality by the instruction of computer or the computing device of other programmable data processing devices
The device of the function of specifying in present one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in and can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory is produced to be included referring to
Make the manufacture of device, the command device realize in one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or
The function of specifying in multiple square frames.
These computer program instructions can be also loaded in computer or other programmable data processing devices so that in meter
Series of operation steps is executed on calculation machine or other programmable devices to produce computer implemented process, so as in computer or
The instruction executed on other programmable devices is provided for realization in one flow process of flow chart or multiple flow processs and/or block diagram one
The step of function of specifying in individual square frame or multiple square frames.
The preferred embodiments of the present invention are these are only, the scope of the claims of the present invention is not thereby limited, every using this
Equivalent structure or equivalent flow conversion that bright description and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of protection user privacy information terminal, it is characterised in that the terminal includes:
Setup module, under same user account state, arrange owner's pattern and owner's pattern unlocking pin, at least one
Individual guest mode and the unlocking pin of corresponding guest mode;
Load-on module, in the unlocking pin that current unlocking pin is owner's pattern, loading owner's memory partitioning
In owner's data, in the unlocking pin that current unlocking pin is the guest mode, load visitor's memory partitioning
In visitor's data;
Wherein, owner's memory partitioning is isolated with visitor's memory partitioning;Owner's data include that the owner is pacified
The application of dress, the privacy information of the owner;Visitor's data include the application installed by the visitor, the visitor hidden
Personal letter ceases.
2. terminal according to claim 1, it is characterised in that the terminal also includes:
Preserving module, close for the unlocking pin of the unlocking pin and the guest mode of owner's pattern is stored in unblock
In code memory partitioning.
3. terminal according to claim 2, it is characterised in that the terminal also includes:
Whether judge module, for, judging the unlocking pin of current input in the unlocking pin internal memory point under screen locking pattern
Exist in area, if the unlocking pin of the current input is present in the unlocking pin memory partitioning, judge described current
The unlocking pin of input is the unlocking pin of the unlocking pin or the guest mode of owner's pattern.
4. terminal according to claim 1, it is characterised in that the terminal also includes:
Operation module, under owner's pattern, according to the operational order of user to the visit in visitor's memory partitioning
Objective data carry out data manipulation.
5. terminal according to claim 1, it is characterised in that the judge module, is additionally operable to judge active user's account
Whether state is same user account state.
6. a kind of protection user privacy information method, it is characterised in that methods described includes:
Under same user account state, arrange the unlocking pin of owner's pattern and owner's pattern, at least one guest mode and
The unlocking pin of corresponding guest mode;
In the unlocking pin that current unlocking pin is owner's pattern, the owner's data in owner's memory partitioning are loaded,
In the unlocking pin that current unlocking pin is the guest mode, the visitor's data in visitor's memory partitioning are loaded;
Wherein, owner's memory partitioning is isolated with visitor's memory partitioning;Owner's data include that the owner is pacified
The application of dress, the privacy information of the owner;Visitor's data include the application installed by the visitor, the visitor hidden
Personal letter ceases.
7. method according to claim 6, it is characterised in that described under same user account state, arranges owner
After the unlocking pin of the unlocking pin of pattern and owner's pattern, at least one guest mode and corresponding guest mode, institute
Stating method also includes:
The unlocking pin of the unlocking pin and the guest mode of owner's pattern is stored in unlocking pin memory partitioning.
8. method according to claim 7, it is characterised in that described by the unlocking pin of owner's pattern and described
After the unlocking pin of guest mode is stored in unlocking pin memory partitioning, methods described also includes:
Under screen locking pattern, judge whether the unlocking pin of current input is present in the unlocking pin memory partitioning, if institute
The unlocking pin for stating current input is present in the unlocking pin memory partitioning, then judge the unlocking pin of the current input
Unlocking pin for the unlocking pin or the guest mode of owner's pattern.
9. method according to claim 6, it is characterised in that described under same user account state, arranges owner
After the unlocking pin of the unlocking pin of pattern and owner's pattern, at least one guest mode and corresponding guest mode, institute
Stating method also includes:
Under owner's pattern, the operational order according to user carries out data to the visitor's data in visitor's memory partitioning
Operation.
10. method according to claim 6, it is characterised in that described under same user account state, arranges owner
Before the unlocking pin of the unlocking pin of pattern and owner's pattern, at least one guest mode and corresponding guest mode, institute
Stating method also includes:
Judge whether active user's account state is same user account state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611228443.1A CN106506786A (en) | 2016-12-27 | 2016-12-27 | The terminal and method of protection user privacy information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611228443.1A CN106506786A (en) | 2016-12-27 | 2016-12-27 | The terminal and method of protection user privacy information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106506786A true CN106506786A (en) | 2017-03-15 |
Family
ID=58334059
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611228443.1A Pending CN106506786A (en) | 2016-12-27 | 2016-12-27 | The terminal and method of protection user privacy information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106506786A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107355140A (en) * | 2017-08-31 | 2017-11-17 | 浙江蚂蚁精密科技有限公司 | A kind of Inner door lock for caring about privacy of user |
CN108268763A (en) * | 2018-02-13 | 2018-07-10 | 广东欧珀移动通信有限公司 | terminal control method, device, storage medium and terminal |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102457619A (en) * | 2011-12-30 | 2012-05-16 | 广东欧珀移动通信有限公司 | Method for setting permission password for mobile phone |
US8265596B2 (en) * | 2008-06-16 | 2012-09-11 | Samsung Electronics Co., Ltd. | Mobile terminal and method for protecting personal information thereof |
CN104301539A (en) * | 2014-10-21 | 2015-01-21 | 四川盟宝实业有限公司 | Information protecting method |
CN105897430A (en) * | 2016-06-22 | 2016-08-24 | 浙江德景电子科技有限公司 | User management method and system for intelligent terminal |
CN106127077A (en) * | 2016-06-30 | 2016-11-16 | 成都中科创达软件有限公司 | A kind of method protecting user privacy information and terminal |
CN106156585A (en) * | 2016-06-26 | 2016-11-23 | 深圳市智汇十方科技有限公司 | The user management method of a kind of mobile terminal and system |
-
2016
- 2016-12-27 CN CN201611228443.1A patent/CN106506786A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8265596B2 (en) * | 2008-06-16 | 2012-09-11 | Samsung Electronics Co., Ltd. | Mobile terminal and method for protecting personal information thereof |
CN102457619A (en) * | 2011-12-30 | 2012-05-16 | 广东欧珀移动通信有限公司 | Method for setting permission password for mobile phone |
CN104301539A (en) * | 2014-10-21 | 2015-01-21 | 四川盟宝实业有限公司 | Information protecting method |
CN105897430A (en) * | 2016-06-22 | 2016-08-24 | 浙江德景电子科技有限公司 | User management method and system for intelligent terminal |
CN106156585A (en) * | 2016-06-26 | 2016-11-23 | 深圳市智汇十方科技有限公司 | The user management method of a kind of mobile terminal and system |
CN106127077A (en) * | 2016-06-30 | 2016-11-16 | 成都中科创达软件有限公司 | A kind of method protecting user privacy information and terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107355140A (en) * | 2017-08-31 | 2017-11-17 | 浙江蚂蚁精密科技有限公司 | A kind of Inner door lock for caring about privacy of user |
CN108268763A (en) * | 2018-02-13 | 2018-07-10 | 广东欧珀移动通信有限公司 | terminal control method, device, storage medium and terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105100476B (en) | A kind of mobile terminal unlocking device and method | |
CN104915582B (en) | unlocking method and device | |
CN106027804A (en) | Unlocking method and unlocking apparatus of mobile terminal | |
CN106155694A (en) | A kind of application and the display packing and device applied of attending to anything else | |
CN105099701B (en) | A kind of method of terminal and terminal authentication | |
CN104966013A (en) | Unlocking method and apparatus | |
CN104836884A (en) | Standby unlocking method of mobile terminal, and mobile terminal | |
CN104618382B (en) | A kind of method and device realizing the seamless access of information | |
CN104820797B (en) | Using the management method and device of account | |
CN106502526A (en) | A kind of back-stage management method and terminal | |
CN106250017A (en) | A kind of mobile terminal and multitask management process | |
CN106778212B (en) | A kind of mobile terminal and control method | |
CN107105088A (en) | One kind operation response method and terminal | |
CN106791016A (en) | A kind of photographic method and terminal | |
CN106021530A (en) | Method and device for hiding applications | |
CN105120091A (en) | Mobile terminal and maloperation prompting apparatus and method thereof | |
CN106506786A (en) | The terminal and method of protection user privacy information | |
CN106131318A (en) | A kind of incoming information hidden method and device | |
CN105100217B (en) | Multisystem shared data method and apparatus | |
CN106897010A (en) | Touch screen terminal and control method | |
CN106790126A (en) | A kind of method of the account mandate of application program, device and terminal | |
CN106792644A (en) | Mobile terminal, server and information processing method | |
CN106303080B (en) | A kind of method and apparatus prompting new information on a display screen | |
CN105843534A (en) | Control device and method of mobile terminal | |
CN106713645B (en) | A kind of method and mobile terminal of the broadcasting of control loudspeaker |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170315 |