Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting mobile phone private data

A data and privacy technology, applied in the fields of digital data protection, computer security devices, telephone communication, etc., can solve the problems of narrow application of encryption mode, inability to enable the functions related to the address book and address book, and affecting the use of mobile phones.

Inactive Publication Date: 2007-08-29
江苏高通科技实业有限公司
View PDF2 Cites 68 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The disadvantages of the above method are: 1. The sub-menu of "encryption mode" needs to be specially designed; 2. The application of encryption mode is narrow and only limited to the address book; 3. When the function of "restricted address book" is enabled, the communication cannot be enabled This will greatly affect the use of mobile phones; 4. The user has an obvious "encryption mode" sub-menu management option, switching from encryption mode to non-encryption mode Complex; 5. Does not involve encrypting files such as stored text messages or groups of files in dedicated memory on the phone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting mobile phone private data
  • Method for protecting mobile phone private data
  • Method for protecting mobile phone private data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] Embodiment 1: a method for protecting mobile phone privacy data.

[0046] The functional modules of the mobile phone that may contain the private information of the organic owner include: address book, call records, SMS, MMS, photo taking, video recording, recording, notepad, schedule, etc. For the data related to the number, the private data can be distinguished from the normal data by setting the hidden number. The normal mode provides any user with standard mobile phone functions, and can view the normal information of all mobile phones; the hidden mode is a special function provided to the owner of the mobile phone, which realizes the storage and reading of the private data of the mobile phone, and is used to monitor the private data of the owner. protection of. The switch between normal and hidden mode can be realized by encrypting the hidden menu or encrypting the interface of entering the hidden mode.

[0047] Applying the above method, the main steps of the me...

Embodiment 2

[0071] Embodiment 2: a method for protecting mobile phone privacy data.

[0072] According to the method of embodiment 1, when using the hidden function of the mobile phone, the owner may need to set the privacy data to different levels to be disclosed to different people, which is impossible for the method of embodiment 1. Multiple hidden modes can be set according to the idea of ​​Embodiment 1, and the passwords of each hidden mode are different, and different hidden passwords are announced to different people, so that the function of classifying private data can be realized.

[0073] Applying the above points of view, the main steps of the method are as follows:

[0074] (1) The mobile phone interface is divided into multiple hidden modes and a normal mode, each hidden mode is used to store different levels of private data, and the normal mode is used to store normal data. Set an integer global variable g_IsHideMode and save it in the EEPROM of the mobile phone. When the ...

Embodiment 3

[0077] Embodiment 3: a method for protecting mobile phone privacy data.

[0078] According to the method of Embodiment 1, the switch between the normal mode and the hidden mode is realized by encrypting the hidden menu, and of course it can also be realized by encrypting the interface of entering the hidden mode.

[0079] Applying the above method, the main steps of the method are as follows:

[0080](1) Divide the mobile phone interface into two modes: hidden and normal, and store all data (hidden data and normal data) and normal data respectively. Set a Boolean global variable g_IsHideMode and save it in the EEPROM of the mobile phone. When the value of g_IsHideMode is true, it means that the current mode is hidden; when the value of g_IsHideMode is false, it means that the current mode is normal; then set a parameter variable HideState of a file, and when the value of HideState is true, it means that the file is marked as a hidden attribute ; When the value of HideState i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Interfaces of handset are divided into two modes: hidden and normal. A global variable parameter is setup. When being as 1, 2, n or true, the value of the parameter denotes that current mode is hidden; when being as 0, or false, the value of the parameter denotes that current mode is normal. Moreover, a parameter variable of file is set up. When being as 1, 2, n or true, the file is marked as hidden attribute; when being as 0, or false, the file is marked as normal attribute in order to save and display private data or normal data. Key in hidden cipher of handset makes switch between hidden mode and normal mode. Thus, owner of handset can look normal data and hidden data, and non-owner can only look normal data so as to protect all private data. Features are: simple operation and smart method for setting up cipher.

Description

【Technical field】 [0001] The invention relates to a method for a mobile phone user to hide private data of a mobile phone, which belongs to the technical fields of mobile communication and computer. 【Background technique】 [0002] The current mobile phone is more and more widely used. According to statistics, there are about 310 million mobile phone users in my country now, and mobile phones have become one of the most important personal belongings in people's daily life. According to industry estimates, the share of high-end smartphones will rise to 15% in 2006, the share of ordinary mobile phones will drop to 40%, and the value of single-product mobile phones will increase by more than 10%. With the improvement of product cost performance, the sales of low-end products with single functions will gradually shrink. Fashion elements will continue to play an important role in the trend of mobile phone products and become an important factor driving the high update rate of mob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04Q7/32G06F1/00G06F21/00G06F21/62H04M1/72403H04M1/72463
Inventor 董浩辛晖
Owner 江苏高通科技实业有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products