CN1980419A - Hand-set data secrete-keeping method - Google Patents

Hand-set data secrete-keeping method Download PDF

Info

Publication number
CN1980419A
CN1980419A CNA2005101015999A CN200510101599A CN1980419A CN 1980419 A CN1980419 A CN 1980419A CN A2005101015999 A CNA2005101015999 A CN A2005101015999A CN 200510101599 A CN200510101599 A CN 200510101599A CN 1980419 A CN1980419 A CN 1980419A
Authority
CN
China
Prior art keywords
hand
set data
keeping method
jump
secrete
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2005101015999A
Other languages
Chinese (zh)
Inventor
沈艳波
邹飞
张富斌
王永亮
罗涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CNA2005101015999A priority Critical patent/CN1980419A/en
Publication of CN1980419A publication Critical patent/CN1980419A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The method includes steps: (1) carrying out security setting for data of handset; (2) making pen move from top of touch screen to shortcut at bottom border to carrying out switching between privacy mode and general mode. Beneficial effects are: using shortcut to switch privacy mode and general mode quickly so that security material are all hidden momentarily. Person of borrowing handset will not find private data, and be aware of the security measure.

Description

Hand-set data secrete-keeping method
[technical field]
The present invention relates to a kind of mobile communication terminal, particularly relate to a kind of hand-set data secrete-keeping method.
[background technology]
The prior art smart mobile phone functions such as people, message registration, note, multimedia message, schedule, task, memorandum of generally all being related, but function of keeping secret to given content seldom is provided.When mobile phone being lent other people use, may cause and delete the content that to delete owing to reasons such as misoperations; Or when having deposited in simultaneously on the mobile phone with the relevant information of work with kith and kin during relevant information, wherein work and go up or kith and kin's information is maintained secrecy possibly, but existing part of cell phone can't realize maintaining secrecy, the user can only take the way of deleting in order to avoid divulge a secret, but deletion sometimes can cause key message to lose.
People wish to occur a kind of mobile phone that the data of storing on the mobile phone can realize function of keeping secret again that do not need to delete.At application number is in the Chinese invention patent application of 200310112047.9 " a kind of mobile phones that improve method and this method of realization of mobile phone short message safety " by name, a kind of mobile phone that can maintain secrecy to short message has been proposed, but in a single day this mobile phone enters behind the confidential state all information all can't normal reading, watch common unclassified information also will input password, bring very big inconvenience to the user, can not between secret and unclassified, carry out mode switch fast simultaneously.
Be that short message is maintained secrecy equally; in No. 02137332.9 " a kind of method of protecting the mobile phone short message content " Chinese invention patent application by name; proposition allows the user need select secret short message; the black designation position of this short message is set then; prompting input password; and this short message encrypted, hide this short message at last.But this method is only applicable to short message, and short message is provided with the also hell to pay of maintaining secrecy one by one, can not carry out mode switch fast between secret and unclassified simultaneously.
In No. 200410022022.4 " a kind of mobile phone message security method " Chinese invention patent application by name, a kind of time slot scrambling to cellphone information is proposed.It is by setting the telephone number of need to be keep secret, and when transmitting-receiving note, sending and receiving multimedia message, reading information, the relevant information of number is maintained secrecy therewith, when application program begins, two interfaces is set, and enters general mode and security schema by different interfaces.
But this patented technology scheme is to be privacy conditions with the telephone number, and in data that does not have telephone number such as schedule, memorandum in the task, can not be realized maintaining secrecy to record; And when operation, enter to use and to select security schema or general mode before.Wait application if entered into the contact person, want from general mode to transfer security schema to, will withdraw to use reentering and selecting security schema just can enter into security schema, quite consuming time and loaded down with trivial details; Simultaneously, when borrowing mobile phone to give others, do not wish generally that others sees ownly to maintain secrecy and relend in that mobile phone is set, but this patented technology can't overcome these technical problems to him.
[summary of the invention]
In order to overcome prior art hand-set data secrete-keeping method complexity, unworkable technical problem, the invention provides a kind of can quick and convenient switching security schema and general mode, the more humane hand-set data secrete-keeping method of maintaining secrecy and being provided with.
The present invention solves the problems of the technologies described above the technical scheme that is adopted: a kind of hand-set data secrete-keeping method is provided, comprises step: A, to the hand-set data setting of maintaining secrecy; B, use shortcut are switched secret and general mode.
With respect to prior art, the beneficial effect of hand-set data secrete-keeping method of the present invention is: the present invention adopts shortcut that mobile phone just can be switched in general mode and security schema quickly and easily, make mobile phone become general mode such as moving under the situation that the bottom just can allow the people have no to discover from the top of touch-screen with pen, confidential data whole moments are hidden, thereby allow the cellphone subscriber borrow mobile phone to use relievedly to others, borrow the mobile phone person can not see secret data, can not discover cellphone subscriber's secrecy provision specially yet, avoid the appearance of awkward atmosphere.
[description of drawings]
Fig. 1 is the secrecy processing flow chart of hand-set data secrete-keeping method of the present invention;
Fig. 2 is the secrecy processing flow chart behind the application start in the hand-set data secrete-keeping method of the present invention;
Fig. 3 is the secrecy processing flow chart that has started application in the hand-set data secrete-keeping method of the present invention.
[embodiment]
Basic principle of the present invention is: change conventional mobile phone data secrecy system, the present invention adopts shortcut that mobile phone can be switched in general mode and security schema quickly and easily.The information management module of mobile phone obtains the mode of operation of current system when starting, be security schema or general mode, according to current pattern, does different Business Processing.If be security schema, show all records, and confidential records is done red expression; If be general mode, filter confidential records.After information management module has started, obtain system broadcast message and judge and whether maintain secrecy, do different Business Processing according to current mode of operation.If be security schema, show all records, and confidential records is done red expression; If be common, filter confidential records.
The present invention is further described below in conjunction with drawings and embodiments.
Consult Fig. 1, hand-set data secrete-keeping method of the present invention comprises key step:
A, hand-set data maintained secrecy is provided with 101;
B, use shortcut are switched secret and general mode 102;
Wherein, hand-set data is meant contact person, note, multimedia message, message registration, schedule, memorandum and/or task dispatching in the described steps A.In the present embodiment, the secrecy processing of described contact person, note, multimedia message, message registration, schedule, memorandum and/or task is at the new folder interface or the file interface is set, increases by one the confidential folder option is set.In other embodiments, can in each record, the position of maintaining secrecy be set; Or the information relevant with contact number done secrecy processing.
Need to be provided with earlier secret password before being provided with maintaining secrecy, according to following operation:
1, the information protection password is set earlier.Step: system's setting------maintain secrecy and be provided with---the information protection password is set by control panel;
2, set the information protection password after, given in the mobile phone all relevant thing encrypted codes, such as contact person, short message etc.; But also do not open function of keeping secret this time, and secret password is set below;
3,---at this moment " maintaining secrecy " appears in the lower left corner of screen, and------secret password is set, and------selecting " changing security schema into "---enters security schema prompting frame " security schema selection " to occur in click " maintaining secrecy " secret password to be set: be introduced into the interface that the information protection password is set, locate to input the data password that has set at " Old Password ";
4, the operation under security schema.Follow previous step,---------" being made as secret " appears in the contact person lower left corner under editing mode, and---selecting " being made as secret "---is provided with success to enter " editor " state to select certain to be stored in people on the phone after entering security schema, to enter " contact person ".Do not conform to the mobile phone loam cake this moment, and then this contact person becomes redness, and all short messages relevant with this contact person, message registration, mail or the like all become redness; More than all can only be set under security schema with secret relevant setting.
5, the lid that closes, mobile phone changes into common, under this pattern, renovates again, the contact person who is set to maintain secrecy, and all hide with all relevant information of this contact person.
In the present embodiment, shortcut is to use touch-screen among the described step B, on concrete is to draw to the right or rightabout with drawing from the top of touch-screen to bottom or rightabout or from the left side.In other embodiments, can use predefined function key on the cell phone keyboard, the predefined key grain of phone housing, keyboard combination or renovate/close lid/Rotation screen.After using shortcut, if enter security schema from general mode, system will eject input password prompt frame, behind the input password, system ejects to be selected to enter the security schema choice box, if enter general mode from security schema, screen ejects prompting frame, the prompting security schema is selected and general mode is selected the default general mode that is chosen as.
Under the described security schema, all confidential datas show, and distinguish with font color with common data, and the user is easy to differentiate; Under the described general mode, all confidential datas are hidden, if receive information or the incoming call that is set to maintain secrecy, only point out with special ring, do not do any demonstration on the screen.Send information to the contact person who is set to maintain secrecy, send successfully back transmitted message and hide automatically, if secret contact person is arranged among the addressee in the group information, then this information is handled as security information.In task and schedule, under general mode, if task/schedule of secret contact person expires, then only reminding with pop-up box has task/schedule to expire, and does not show particular content.
Consult Fig. 1 and Fig. 2 together, for the application that will start, continuous steps A, B, continue following flow process:
C, startup use 103;
D, mobile phone obtain system's present mode 104;
E, judge whether system is security schema 105, if, jump to step F, if not, jump to step J;
F, show all the record 106;
G, judge whether system is confidential records 107, if, jump to step H, if not, jump to step I;
H, this record 108 of red sign jump to step L;
I, normally show and jump to step L by this record 109;
J, filtration confidential records 110;
K, show other normal recordings 111;
L, end.
Consult Fig. 1 and Fig. 3 together, for the application that has started, continuous steps A, B, continue following flow process:
M, application have started 112;
N, mobile phone obtain system message and judge and whether maintain secrecy 113;
O, judge whether system changes over security schema 114, if, jump to step P, if not, jump to step U;
P, change over security schema, refresh interface data 115;
Whether Q, judgement record are confidential records 116, if, jump to step R, if not, jump to step S;
R, this record 117 of red sign jump to step W;
S, normally show and jump to step W by this record 118;
U, change into general mode 119;
The record 120 that V, filtration are maintained secrecy shows other normal recordings 121;
W, end.
Wherein, described step D is that application call system share API obtains among Fig. 1 that private data draws confidential state in the system buffer pool, and private data is set or change by above-mentioned shortcut or when secret password is set in the system buffer pool.
What present embodiment adopted is WinCE operating system, certainly, can adopt other operating systems such as Linuos.
To sum up, with respect to the prior art mobile phone two interfaces need be set, need trivial step that the method that data is maintained secrecy is set in cell phone system, the present invention adopts shortcut that mobile phone just can be switched in general mode and security schema quickly and easily, make mobile phone become general mode such as moving under the situation that the bottom just can allow the people have no to discover from the top of touch-screen with pen, confidential data whole moments are hidden, thereby allow the cellphone subscriber borrow mobile phone to use relievedly to others, borrow the mobile phone person can not see secret data, can not discover cellphone subscriber's secrecy provision specially yet, avoid the appearance of awkward atmosphere, very hommization;
In addition, with respect to the prior art mobile phone or can only configuration information maintain secrecy, telephone number related information can only be set maintains secrecy, what the present invention can be provided with the multimedia message, message registration, schedule, memorandum and the whole hand-set datas of task dispatching that comprise telephone number and note maintains secrecy complete function;
In addition; adopt two methods that interface enters security schema or general mode compared to prior art; the present invention is based on the information management module of the personal hand-held portable terminal that comprises mobile phone of various operating systems and the integrated design of operating system framework; and the mutual coordination between each function information administration module and the operating system; sharing and protection of bottom-up information data; the switching of security schema and general mode be can handle expeditiously, system stability and coordination guaranteed.

Claims (10)

1. hand-set data secrete-keeping method comprises step: A, to the hand-set data setting of maintaining secrecy; B, use shortcut are switched secret and general mode.
2. hand-set data secrete-keeping method according to claim 1 is characterized in that: shortcut is to use predefined function key on the cell phone keyboard, the predefined key grain of phone housing, uses touch-screen, keyboard combination or renovates/close lid/Rotation screen among the described step B.
3. hand-set data secrete-keeping method according to claim 2 is characterized in that: described use touch-screen is meant to draw from the top of touch-screen to bottom or rightabout or from the left side with pen and draws to the right or rightabout.
4. hand-set data secrete-keeping method according to claim 3, it is characterized in that: after using shortcut, enter security schema from general mode, system will eject input password prompt frame, and behind the input password, system ejects selects to enter the security schema choice box, enter general mode from security schema, screen ejects prompting frame, and the prompting security schema is selected and general mode is selected the default general mode that is chosen as.
5. hand-set data secrete-keeping method according to claim 4, it is characterized in that: under the described security schema, all confidential datas show, and distinguish with font color with common data, under the described general mode, all confidential datas are hidden, if receive the information or the incoming call that are set to maintain secrecy, only point out with special ring, no any demonstration sends information to the contact person who is set to maintain secrecy on the screen, sends successfully back transmitted message and hides automatically, if secret contact person is arranged among the addressee in the group information, then this information is handled as security information.
6. hand-set data secrete-keeping method according to claim 1 is characterized in that: hand-set data is meant contact person, note, multimedia message, message registration, schedule, memorandum and/or task in the described steps A.
7. hand-set data secrete-keeping method according to claim 6 is characterized in that: described contact person's secret setting is meant does secrecy processing with the information relevant with contact number.
8. hand-set data secrete-keeping method according to claim 6, it is characterized in that: the secrecy processing of described contact person, note, multimedia message, message registration, schedule, memorandum and/or task is with the secret position of each recording setting in it, perhaps at the new folder interface or the file interface is set, increase by one the confidential folder option is set.
9. hand-set data secrete-keeping method according to claim 1 is characterized in that: further comprising the steps of:
C, startup are used;
D, mobile phone obtain system's present mode;
E, judge whether system is security schema, not, then jump to step J;
F, show all records;
G, judge whether system is confidential records, not, then jump to step I;
H, red this record of sign jump to step L;
I, normally show and jump to step L by this record;
J, filtration confidential records;
K, show other normal recordings;
L, end.
Perhaps may further comprise the steps:
M, application start;
N, mobile phone obtain system message and judge and whether maintain secrecy;
O, judge whether system changes over security schema, not, then jump to step U;
P, change over security schema, refresh interface data;
Whether Q, judgement record are confidential records, not, then jump to step S;
R, red this record of sign jump to step W;
S, normally show and jump to step W by this record;
U, change into general mode;
The record that V, filtration are maintained secrecy shows other normal recordings;
W, end.
10. hand-set data secrete-keeping method according to claim 9, it is characterized in that: described step D is that application call system share API obtains that private data draws confidential state in the system buffer pool, and private data is set or change by shortcut or menu in the described system buffer pool.
CNA2005101015999A 2005-11-29 2005-11-29 Hand-set data secrete-keeping method Pending CN1980419A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2005101015999A CN1980419A (en) 2005-11-29 2005-11-29 Hand-set data secrete-keeping method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2005101015999A CN1980419A (en) 2005-11-29 2005-11-29 Hand-set data secrete-keeping method

Publications (1)

Publication Number Publication Date
CN1980419A true CN1980419A (en) 2007-06-13

Family

ID=38131381

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2005101015999A Pending CN1980419A (en) 2005-11-29 2005-11-29 Hand-set data secrete-keeping method

Country Status (1)

Country Link
CN (1) CN1980419A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103885858A (en) * 2014-03-11 2014-06-25 惠州Tcl移动通信有限公司 Method and system for mobile phone backup and data recovery
CN105159542A (en) * 2015-09-21 2015-12-16 北京元心科技有限公司 Desktop icon display method and apparatus for intelligent device
CN106453800A (en) * 2010-11-09 2017-02-22 微软技术许可有限责任公司 Privacy in mobile device communications

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453800A (en) * 2010-11-09 2017-02-22 微软技术许可有限责任公司 Privacy in mobile device communications
CN103885858A (en) * 2014-03-11 2014-06-25 惠州Tcl移动通信有限公司 Method and system for mobile phone backup and data recovery
CN103885858B (en) * 2014-03-11 2017-05-10 惠州Tcl移动通信有限公司 Method and system for mobile phone backup and data recovery
CN105159542A (en) * 2015-09-21 2015-12-16 北京元心科技有限公司 Desktop icon display method and apparatus for intelligent device
CN105159542B (en) * 2015-09-21 2018-11-16 北京元心科技有限公司 A kind of the desktop icons display methods and device of smart machine

Similar Documents

Publication Publication Date Title
US10244206B1 (en) Communication device
US8311511B2 (en) Data privacy on wireless communication terminal
US20060234764A1 (en) Electronic device, operational restriction control method thereof and operational restriction control program thereof
US8676273B1 (en) Communication device
CN101026844A (en) Mobile terminal with information secrecy function and secrecy method
CN101741985B (en) Call-based method for processing screen of mobile terminal and mobile terminal
JP5522976B2 (en) How to use image information on mobile devices
CN103885858B (en) Method and system for mobile phone backup and data recovery
CN101287027B (en) Dialing method of mobile terminal
EP2158750A1 (en) Communication terminal
CN103051809A (en) Mobile terminal and file security method and device thereof
CN102083024A (en) Method for controlling portable device and portable device used in communication network
CN102143254A (en) Method for realizing memorandum in mobile terminal and memorandum device
CN101754467A (en) Realizing method of privacy protection for dual-card cell phone
CN103176705A (en) Mobile terminal and preview method thereof
CN106936999A (en) Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently
CN105100358B (en) The method and system of information is recorded in call
CN107147815A (en) Based on the call handling method and device called a taxi
CN106886416A (en) Multi-User Dimension processing method and processing device
CN1980419A (en) Hand-set data secrete-keeping method
JP3690101B2 (en) Multifunction telephone
KR20140012828A (en) The operation method of privacy protection and relief application for smartphone user
CN102413230A (en) Terminal and data display method
CN101227683B (en) Mobile terminal, system and method for securing data information
CN107770355A (en) A kind of data processing method based on message registration

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
DD01 Delivery of document by public notice

Addressee: Li Jiaoling

Document name: Notification that Application Deemed to be Withdrawn

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20070613