Movatterモバイル変換


[0]ホーム

URL:


CN104902074B - A kind of mobile phone information safety management method based on more permission modes - Google Patents

A kind of mobile phone information safety management method based on more permission modes
Download PDF

Info

Publication number
CN104902074B
CN104902074BCN201510192917.0ACN201510192917ACN104902074BCN 104902074 BCN104902074 BCN 104902074BCN 201510192917 ACN201510192917 ACN 201510192917ACN 104902074 BCN104902074 BCN 104902074B
Authority
CN
China
Prior art keywords
mobile phone
user
mode
permission
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510192917.0A
Other languages
Chinese (zh)
Other versions
CN104902074A (en
Inventor
董滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information and Data Security Solutions Co Ltd
Original Assignee
Sichuan Jinying Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Jinying Technology Co LtdfiledCriticalSichuan Jinying Technology Co Ltd
Priority to CN201510192917.0ApriorityCriticalpatent/CN104902074B/en
Publication of CN104902074ApublicationCriticalpatent/CN104902074A/en
Application grantedgrantedCritical
Publication of CN104902074BpublicationCriticalpatent/CN104902074B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Landscapes

Abstract

The invention discloses a kind of mobile phone information safety management methods based on more permission modes, under mobile phone black state, it presses power key or volume key lights the screen that Activates Phone, if user is not provided with the second unlocking screen password, mobile phone is directly entered the second permission mode;If user setting has the second unlocking screen password, mobile phone shows the second unlock interface, and user inputs the second unlocking screen password, then mobile phone is directly entered the second permission mode;Under mobile phone black state, it presses Home key and lights the screen that Activates Phone, if user is not provided with the first unlocking screen password, then mobile phone is directly entered the first user mode, if user setting has the first unlocking screen password, corresponding first unlock interface is shown, user performs the preset first unlocking screen password, after password match success, mobile phone is directly entered the first user mode;Again after screen locking, the first user mode or the second permission mode terminate user, and mobile phone blank screen simultaneously enters standby mode.

Description

A kind of mobile phone information safety management method based on more permission modes
Technical field
The present invention relates to a kind of mobile phone information safety management methods based on more permission modes.
Background technology
As smart mobile phone is gradually universal in people live, Android mobile phone is increasingly becoming the mobile phone master that compatriots useStream.Now, smart mobile phone is not used for the tool of communications made a phone call and sent short messages in only people, it has independent operation systemSystem, user can voluntarily install the application program of the third party service providers such as software, game offer, and by this class method come constantlyFunction expansion is carried out to it.
And can mobile phone be lent to kith and kin and used using during mobile phone, inevitably encountering at us, and by means of givingCheng Zhong, we often worry the privacy on oneself mobile phone, such as message registration, short message by other people maloperation, leakage or evilsMeaning is stolen a glance at.And had old man and child by means of being no lack of in the person of giving, we can worry again they can or can not click it is other may chargeSoftware or carry out it is certain cause charge operations, such as using mobile data traffic download massive dataflow and cause to pay traffic feeWith reply sends payment verification information, takes the phone for being related to property transaction.
Invention content
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of cellphone information peaces based on more permission modesFull management method so that mobile phone can rapidly enter the second permission mode, protect the individual privacy of user, effectively improve mobile phoneInformation security performance.
The purpose of the present invention is achieved through the following technical solutions:A kind of cellphone information peace based on more permission modesFull management method, the permission mode include the first user mode and the second permission mode, and the method includes more permission modesSafety management step:
S1:Under mobile phone black state, power key or volume key are pressed, lights the screen that Activates Phone, mobile phone loads automaticallyPreset second permission mode if user is not provided with the second unlocking screen password, performs step S4;If user setting hasTwo unlocking screen passwords, then mobile phone show the second unlock interface, jump to step S3;
S2:Under mobile phone black state, Home key is pressed, lights the screen that Activates Phone, mobile phone is not loaded with preset secondPermission mode starts the first user mode, if user is not provided with the first unlocking screen password, mobile phone is directly entered the first useFamily pattern if user setting has the first unlocking screen password, shows corresponding first unlock interface, it is preset that user performs thisFirst unlocking screen password after password match success, performs step S5;
S3:User performs the second unlocking screen password in the second unlock interface, after password match success, then performsStep S4;
S4:Mobile phone is directly entered the second permission mode;
S5:Mobile phone is directly entered the first user mode;
S6:Again after screen locking, the first user mode or the second permission mode terminate user, and mobile phone blank screen simultaneously enters standby shapeState.
The first unlocking screen password and the second unlocking screen password are pattern solution lock password or digital solution lock password.
In the step S3, user performs third unlocking screen password in the second unlock interface, then mobile phone shows firstUnlock interface, user perform the preset first unlocking screen password, and after password match success, mobile phone is directly entered the first useFamily pattern.If user is not provided with the first unlocking screen password, user carries out other any touch operations, can be directly entered againFirst user mode.
Second permission mode includes guest mode, old man's pattern, child mode and one kind or more in battery saving modeThe combination of kind, the second permission mode can directly conversion be cut from the first user mode, the mode type of the second permission modeIt sets and determines in the first user mode.
The method further includes individual privacy security management step:The individual of user is stored using independent file systemStorage is encrypted to the personal data of user in data.Personal data caused by cell phone system, including voice messaging, callThe personal data of information, short message and photograph album and user's typing mobile phone are automatically saved to the independent file systemIn.
When the second permission mode is guest mode, user cannot access the independent file system.
1. under guest mode, mobile phone hides message registration, short message, notification message and photograph album automatically.
2. under guest mode, mobile phone locks the operation desktop of cell phone system automatically, operation desktop cannot be edited or be deleted,Application icon and small tool on desktop cannot be edited, be deleted or shift position on the table.
3. under guest mode, mobile phone hides new message prompting and its content automatically.
4. under guest mode, the operation desktop of mobile phone is as the operation desktop of the first user mode.
When the second permission mode is old man's pattern or child mode, necessary answer only is distributed on mobile phone operation desktopWith icon and small tool, and mobile phone locks the operation desktop of cell phone system automatically, and operation desktop cannot be edited or be deleted, desktopOn application icon and small tool cannot be edited, deleted or shift position on the table.
File system further include for analyze in call voice and short message content whether the bursting tube containing related keywordUnit is managed, after security managing unit, which detects, has the related keyword involved in call voice or short message content, mobile phone is sent outWarning prompt.
The file system further includes the security managing unit for analyzing call voice and short message content, works as bursting tubeWhen reason unit detects the keyword with matching in keyword database, security managing unit sends out alarm and performs correspondingAction.
In the second permission mode, after security managing unit, which is detected involved in call voice, the related keyword,Mobile phone gives a warning prompting, and the call voice is preserved in file system.
After security managing unit, which is detected involved in short message content, the related keyword, mobile phone gives a warning prompting,And the short message content is isolated, and prevent to perform the operation for replying the short message.
When the second permission mode is battery saving mode, necessary application icon and small is only distributed on mobile phone operation desktopTool, and mobile phone operation desktop only has two kinds of colors of black and white.
The beneficial effects of the invention are as follows:
1)The present invention enables to mobile phone that can rapidly enter the second permission mode, protects the individual privacy of user, may be used alsoThe operation for opening the second permission mode is avoided to be noticed by means of the person of giving and generate embarrassment, the present invention also uses independent file systemPersonal data are stored, storage is encrypted to the personal data of user, effectively improves the information security performance of mobile phone.
2)The present invention can it is different light mobile phone screen by way of, into the first user mode and the second permission mouldFormula, and being configured in the first user mode to the second permission mode, and select to confirm the type of the second permission mode forIt is any in guest mode, old man's pattern, child mode and battery saving mode.
3)In the present invention, user also directly can be switched to first by third unlocking screen password from the second unlock interfaceUnlock interface.
4)In the file system of the present invention, it is additionally arranged and whether contains for analyzing in call voice, message content, short message contentThere is the security managing unit of related keyword, when security managing unit detects the keyword with matching in keyword databaseWhen, security managing unit sends out alarm and performs corresponding action.
Description of the drawings
Fig. 1 is the flow diagram of the mobile phone information safety management method the present invention is based on more permission modes.
Specific embodiment
Technical scheme of the present invention is described in further detail below in conjunction with the accompanying drawings, but protection scope of the present invention is not limited toIt is as described below.
As shown in Figure 1, a kind of mobile phone information safety management method based on more permission modes, the permission mode includes theOne user mode and the second permission mode, second permission mode include guest mode, old man's pattern, child mode and power savingOne or more combinations in pattern, the method includes more permission mode safety management steps:
S1:Under mobile phone black state, power key or volume key are pressed, lights the screen that Activates Phone, mobile phone loads automaticallyPreset second permission mode if user is not provided with the second unlocking screen password, performs step S4;If user setting hasTwo unlocking screen passwords, then mobile phone show the second unlock interface, jump to step S3;
S2:Under mobile phone black state, Home key is pressed, lights the screen that Activates Phone, mobile phone is not loaded with preset secondPermission mode starts the first user mode, if user is not provided with the first unlocking screen password, mobile phone is directly entered the first useFamily pattern if user setting has the first unlocking screen password, shows corresponding first unlock interface, it is preset that user performs thisFirst unlocking screen password after password match success, performs step S5;
S3:User performs the second unlocking screen password in the second unlock interface, after password match success, then performsStep S4, the second unlocking screen password can be to slide unlock, and user only need on the screen slide, you can facilitate solutionLock;
S4:Mobile phone is directly entered the second permission mode;
S5:Mobile phone is directly entered the first user mode;
S6:Again after screen locking, the first user mode or the second permission mode terminate user, and mobile phone blank screen simultaneously enters standby shapeState.
The first unlocking screen password and the second unlocking screen password are pattern solution lock password or digital solution lock password,Pattern solution lock password includes sliding unlock and scribing line unlock etc..
In the step S3, user performs third unlocking screen password in the second unlock interface, then mobile phone shows firstUnlock interface, user perform the preset first unlocking screen password, and after password match success, mobile phone is directly entered the first useFamily pattern;If user is not provided with the first unlocking screen password, user carries out other any touch operations, can be directly entered againFirst user mode.
Wherein, when the second unlocking screen password is pattern solution lock password or digital solution lock password, third unlocking screen mouthEnable may be some corresponding pattern solution lock password or digital solution lock password.Third unlocking screen password may be from screenBottom/top/left part/right part slides solution lock password to up/down/right/left.
Second permission mode being capable of the directly conversion incision from the first user mode.
The method further includes individual privacy security management step:The individual of user is stored using independent file systemStorage is encrypted to the personal data of user in data;Personal data caused by cell phone system, including voice messaging, callThe personal data of information, short message and photograph album and user's typing mobile phone are automatically saved to the independent file systemIn.
The file system further includes the security managing unit for analyzing call voice and short message content, works as bursting tubeWhen reason unit detects the keyword with matching in keyword database, security managing unit sends out alarm and performs correspondingAction.The keyword includes word relevant with property transaction or language etc.
Under the guest mode, user cannot access the independent file system.
1. under guest mode, mobile phone hides message registration, short message, notification message and photograph album automatically.
2. under guest mode, mobile phone locks the operation desktop of cell phone system automatically, operation desktop cannot be edited or be deleted,Application icon and small tool on desktop cannot be edited, be deleted or shift position on the table.
3. under guest mode, mobile phone hides new message prompting and its content automatically.
4. under guest mode, the operation desktop of mobile phone is as the operation desktop of the first user mode.
Under old man's pattern, necessary application icon and small tool, and mobile phone are only distributed on mobile phone operation desktopThe operation desktop of automatic locking cell phone system, operation desktop cannot be edited or be deleted, application icon and small tool on desktopIt cannot be edited, deleted or shift position on the table.
File system further include for analyze in call voice and short message content whether the bursting tube containing related keywordUnit is managed, after security managing unit, which detects, has the related keyword involved in call voice or short message content, mobile phone is sent outWarning prompt.
Under the child mode, necessary application icon and small tool, and mobile phone are only distributed on mobile phone operation desktopThe operation desktop of automatic locking cell phone system, operation desktop cannot be edited or be deleted, application icon and small tool on desktopIt cannot be edited, deleted or shift position on the table.
File system further include for analyze in call voice and short message content whether the bursting tube containing related keywordUnit is managed, after security managing unit, which is detected involved in call voice, the related keyword, mobile phone gives a warning prompting, andThe call voice is preserved in file system.
After security managing unit, which is detected involved in short message content, the related keyword, mobile phone gives a warning prompting,And the short message content is isolated, which can not be replied and forwarded.
Under the battery saving mode, necessary application icon and small tool, and mobile phone are only distributed on mobile phone operation desktopOperation desktop only has two kinds of colors of black and white.
In first user mode, the mobile phone of guest mode, old man's pattern, child mode and battery saving mode can be graspedThe distribution for making the application icon and small tool of desktop is configured.

Claims (9)

6. a kind of mobile phone information safety management method based on more permission modes according to claim 1, it is characterised in that:When the second permission mode is old man's pattern or child mode, be only distributed on mobile phone operation desktop necessary application icon andSmall tool, and mobile phone locks the operation desktop of cell phone system automatically, operation desktop cannot be edited or be deleted, the application on desktopIcon and small tool cannot be edited, be deleted or shift position on the table;File system further includes to analyze call voiceWith in short message content whether the security managing unit containing related keyword, when security managing unit detects call voice or shortAfter having the related keyword involved in letter content, mobile phone gives a warning prompting.
CN201510192917.0A2015-04-222015-04-22A kind of mobile phone information safety management method based on more permission modesActiveCN104902074B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201510192917.0ACN104902074B (en)2015-04-222015-04-22A kind of mobile phone information safety management method based on more permission modes

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201510192917.0ACN104902074B (en)2015-04-222015-04-22A kind of mobile phone information safety management method based on more permission modes

Publications (2)

Publication NumberPublication Date
CN104902074A CN104902074A (en)2015-09-09
CN104902074Btrue CN104902074B (en)2018-06-19

Family

ID=54034465

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201510192917.0AActiveCN104902074B (en)2015-04-222015-04-22A kind of mobile phone information safety management method based on more permission modes

Country Status (1)

CountryLink
CN (1)CN104902074B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105677214A (en)*2015-12-302016-06-15小米科技有限责任公司Application management method and apparatus
CN105681564A (en)*2016-01-252016-06-15宇龙计算机通信科技(深圳)有限公司Message reminding method and device
CN105868648B (en)*2016-03-282019-06-04珠海格力电器股份有限公司Mobile terminal and data processing method and device for visitor mode of mobile terminal
CN106055941A (en)*2016-05-242016-10-26珠海市魅族科技有限公司Terminal method and apparatus
CN109460655B (en)*2018-09-202021-08-03中兴通讯股份有限公司Electronic device control method and device, electronic device and storage medium
CN109740000B (en)*2018-12-252023-11-21维沃移动通信有限公司 Multimedia file processing method and mobile terminal
CN110020265A (en)*2019-02-252019-07-16贵州格物数据有限公司A kind of the short message URL analysis system and method for big data based on memory
US11646591B2 (en)*2019-05-092023-05-09Apple Inc.Indication for protective charging mode
CN113378145B (en)*2021-08-112021-12-07深圳市美迪声科技有限公司Unlocking method and system of electronic product

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1710974A (en)*2005-05-202005-12-21上海贝豪通讯电子有限公司Mobile communication terminal apparatus capable of protecting customer information and method thereof
CN102375651A (en)*2010-08-132012-03-14Tcl集团股份有限公司Method for unlocking portable electronic equipment
CN102547709A (en)*2010-12-232012-07-04康佳集团股份有限公司Method and mobile phone for identifying fraud short messages
CN103577732A (en)*2012-07-242014-02-12联想(北京)有限公司Information processing method and device and electronic device
CN103793636B (en)*2012-11-012017-12-22华为技术有限公司A kind of method of equipment and protection equipment privacy
US9195388B2 (en)*2013-03-152015-11-24Apple Inc.Specifying applications to share in a shared access mode
CN104184874A (en)*2013-05-202014-12-03边策Method for switching mobile phone modes based on multiple unlocking conditions, and mobile phone thereof
CN104301539A (en)*2014-10-212015-01-21四川盟宝实业有限公司Information protecting method

Also Published As

Publication numberPublication date
CN104902074A (en)2015-09-09

Similar Documents

PublicationPublication DateTitle
CN104902074B (en)A kind of mobile phone information safety management method based on more permission modes
CN104967748B (en)A kind of method of safety operation application service
CN101034988B (en)Network login authentication protection device and its using method
US20130335193A1 (en)Electronic wireless lock
WO2017045386A1 (en)Fingerprint recognition method and device for touch screen, and touch screen
CN104537291A (en)Screen interface unlocking method and screen interface unlocking device
CN107864144A (en)Obtain method and device, computer installation and the storage medium of dynamic password
CN105025165A (en)Interface unlocking method and system corresponding to multiple passwords
CN101247579A (en)Method for locking mobile communication terminal through Bluetooth earphone
CN103500302A (en)System and method of safety lock hidden programs
CN105069333A (en)User domain access method, access system and terminal
CN1997188A (en)A recognition method of the user identity and its handset
CN103324874A (en)Verification method and electronic device
CN105809007A (en)Privacy protection method and device
CN100502599C (en) Mobile phone security management method
CN101198121A (en) An authentication method for a user to restrict others from illegally using a mobile phone
CN114448727A (en)Information processing method and system based on industrial internet identification analysis system
CN106126994A (en)The user management method of a kind of mobile terminal and system
CN104574616A (en)Intelligent electronic door lock control method and control device
CN101895829A (en)Method and system for retrieving FLASH data from mobile telephone, and mobile telephone
CN204375038U (en)A kind of intelligent electronic lock control device
CN106127005A (en)The user management method of a kind of mobile terminal and system
CN106453057B (en)A kind of method and terminal for preventing short message to be stolen
CN105741444B (en)Application authentication method and device based on linux system financial self-service equipment
CN108509783B (en)Intelligent terminal application program management system

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
TA01Transfer of patent application right

Effective date of registration:20180522

Address after:610000 No. 1, 17 floor, 1 1 Tianfu street, Chengdu high tech Zone, Sichuan

Applicant after:Sichuan Jinying Technology Co., Ltd.

Address before:610000 199 Sichuan Qingyang Industrial Development Zone, Chengdu, Qingyang.

Applicant before:Moral Science and Technology Ltd. of Sichuan Holley

TA01Transfer of patent application right
GR01Patent grant
GR01Patent grant
TR01Transfer of patent right

Effective date of registration:20190507

Address after:Room 1, Room 2, Lane 15, 1412, Yunduan Road, Nicheng, Pudong New Area, Shanghai, 20106

Patentee after:Shanghai view security information technology Limited by Share Ltd

Address before:610000 No. 1, 17 floor, 1 1 Tianfu street, Chengdu high tech Zone, Sichuan

Patentee before:Sichuan Jinying Technology Co., Ltd.

TR01Transfer of patent right

[8]ページ先頭

©2009-2025 Movatter.jp