WO2016054892A1 - Method and device for user information protection - Google Patents
Method and device for user information protection Download PDFInfo
- Publication number
- WO2016054892A1 WO2016054892A1 PCT/CN2015/074126 CN2015074126W WO2016054892A1 WO 2016054892 A1 WO2016054892 A1 WO 2016054892A1 CN 2015074126 W CN2015074126 W CN 2015074126W WO 2016054892 A1 WO2016054892 A1 WO 2016054892A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- masquerading
- information
- mobile terminal
- real
- mode
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the embodiment of the invention provides a user information protection method and device, which effectively protects the privacy information in the mobile terminal.
- the method further includes:
- the masquerading scheme is configured, the masquerading scheme includes a real information range that needs to be disguised and a manner of generating masquerading information corresponding to the real information.
- the environment detecting module is configured to: when detecting that the mobile terminal satisfies the condition of triggering the masquerading mode, extracting a preset masquerading scheme;
- the embodiment of the invention implements flexible protection of user information, and solves the problem that the existing user information protection mode is less effective.
- triggering conditions listed above are only examples of the triggering condition, and the event that can be detected by the mobile terminal and can be used as a condition for triggering the triggering can be used as a condition for triggering the masquerading mode. This is not limited.
- Step 104 Replace, by using the masquerading information database, a real information database storing the real information;
- the environment detecting module 301 is configured to: when detecting that the mobile terminal satisfies the condition of triggering the masquerading mode, extracting a preset masquerading scheme;
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
A method and device for user information protection, relate to the field of mobile communications, and the method comprises: when a mobile terminal is detected to satisfy a condition to trigger a camouflage mode, extracting a preconfigured camouflage solution; according to the camouflage solution, generating camouflage information corresponding to the real information of the mobile terminal, and storing the camouflage information in a camouflage information database; using the camouflage information database to replace the real information database storing the real information.
Description
本发明涉及移动通信领域,尤其涉及一种用户信息保护方法和装置。The present invention relates to the field of mobile communications, and in particular, to a user information protection method and apparatus.
随着目前的智能终端的发展,用户信息的私密性得到越来越多人的重视。用户信息不断的通过多种渠道被泄露,比如后台上传,暴力查看,三方软件监控等等。使得用户信息大量被曝光,个人隐私被侵犯。With the development of current smart terminals, the privacy of user information has been paid more and more attention. User information is continuously leaked through multiple channels, such as background uploading, violent viewing, and three-party software monitoring. The user information is exposed in large quantities and personal privacy is violated.
纵观近几年的软件技术发展,很多软件公司开发了相应的安全模式。比如黑名单,密码,虹膜,指纹,隐私联系人等等。但是随着人们对信息保护要求的细化,这些功能显得比较简单,粗暴。Throughout the development of software technology in recent years, many software companies have developed corresponding security models. Such as blacklists, passwords, irises, fingerprints, privacy contacts, and more. But with the refinement of people's information protection requirements, these functions are relatively simple and rude.
发明内容Summary of the invention
本发明实施例提供了一种用户信息保护方法和装置,有效保护移动终端中的隐私信息。The embodiment of the invention provides a user information protection method and device, which effectively protects the privacy information in the mobile terminal.
一种用户信息保护方法,包括:A user information protection method includes:
在检测到移动终端满足触发伪装模式的条件时,提取预置的伪装方案;Extracting a preset masquerading scheme when detecting that the mobile terminal satisfies the condition of triggering the masquerading mode;
根据所述伪装方案,生成与所述移动终端的真实信息对应的伪装信息,将所述伪装信息存储于伪装信息数据库;And generating, according to the masquerading scheme, masquerading information corresponding to the real information of the mobile terminal, and storing the masquerading information in the masquerading information database;
使用所述伪装信息数据库替换存储所述真实信息的真实信息数据库。A database of real information storing the real information is replaced with the masquerading information database.
可选地,根据所述伪装方案,生成与所述移动终端的真实信息对应的伪装信息包括:Optionally, generating, according to the masquerading scheme, the masquerading information corresponding to the real information of the mobile terminal includes:
对检测到移动终端满足触发伪装模式的条件前的真实信息,生成对应的伪装信息,将所述伪装信息存储于所述伪装信息数据库;Generating corresponding masquerading information, and storing the masquerading information in the masquerading information database, to detect real information before the condition that the mobile terminal satisfies the triggering masquerading mode;
对检测到移动终端满足触发伪装模式的条件后的所述移动终端待向外部提供的真实信息进行拦截,并生成与该真实信息对应的伪装信息,将该伪装
信息存储于所述伪装信息数据库。Blocking the real information that the mobile terminal is to provide externally after detecting that the mobile terminal satisfies the condition of triggering the masquerading mode, and generating masquerading information corresponding to the real information, and disguising the camouflage information
Information is stored in the masquerading information database.
可选地,根据所述伪装方案,生成与所述移动终端的真实信息对应的伪装信息的步骤之后,还包括:Optionally, after the step of generating the masquerading information corresponding to the real information of the mobile terminal according to the masquerading scheme, the method further includes:
将所述真实信息传输至预配置的远端备份系统或在所述移动终端本地进行备份存储。The real information is transmitted to a pre-configured remote backup system or backed up locally at the mobile terminal.
可选地,该方法还包括:Optionally, the method further includes:
配置触发所述伪装模式的条件,所述条件至少包含以下一项或多项内容:Configuring a condition for triggering the masquerading mode, the condition comprising at least one or more of the following:
单个移动终端绝对地理位置,多个移动终端相对距离,启动特定软件,时间段,使用特定的解锁密码或解锁图案。The absolute geographic location of a single mobile terminal, the relative distance of multiple mobile terminals, the activation of specific software, the time period, the use of a specific unlock password or unlock pattern.
可选地,该方法还包括:Optionally, the method further includes:
配置所述伪装方案,所述伪装方案包含需要伪装的真实信息范围和生成与真实信息对应的伪装信息的方式。The masquerading scheme is configured, the masquerading scheme includes a real information range that needs to be disguised and a manner of generating masquerading information corresponding to the real information.
可选地,所述伪装信息数据库与所述真实信息数据库具有不同的标记和相同的结构。Optionally, the masquerading information database has a different mark and the same structure as the real information database.
可选地,该方法还包括:Optionally, the method further includes:
在检测到所述移动终端不再满足触发伪装模式的条件时,退出伪装模式;Exiting the masquerading mode when detecting that the mobile terminal no longer satisfies the condition for triggering the masquerading mode;
使用所述真实信息数据库向外部提供信息,并备份所述伪装信息数据库。The information is externally provided using the real information database, and the cloaked information database is backed up.
可选地,该方法还包括:Optionally, the method further includes:
在再次检测到所述移动终端满足触发伪装模式的条件时,选择使用已保存的伪装信息数据库中的伪装信息或生成新的伪装信息。When it is detected again that the mobile terminal satisfies the condition of triggering the masquerading mode, the masquerading information in the saved masquerading information database is selected or new masquerading information is generated.
一种用户信息保护装置,包括:A user information protection device comprising:
环境检测模块,设置为:在检测到移动终端满足触发伪装模式的条件时,提取预置的伪装方案;The environment detecting module is configured to: when detecting that the mobile terminal satisfies the condition of triggering the masquerading mode, extracting a preset masquerading scheme;
伪装信息生成模块,设置为:根据所述伪装方案,生成与所述移动终端
的真实信息对应的伪装信息,将所述伪装信息存储于伪装信息数据库;以及a masquerading information generating module, configured to: generate and the mobile terminal according to the masquerading scheme
The masquerading information corresponding to the real information, storing the masquerading information in the masquerading information database;
伪装信息提供模块,设置为:使用所述伪装信息数据库替换存储所述真实信息的真实信息数据库。The masquerading information providing module is configured to replace the real information database storing the real information by using the masquerading information database.
可选地,该装置还包括:Optionally, the device further includes:
远端备份模块,设置为:将所述真实信息传输至预配置的远端备份系统进行备份存储。The remote backup module is configured to: transfer the real information to a pre-configured remote backup system for backup storage.
可选地,Optionally,
所述环境检测模块,还设置为:在检测到所述移动终端不再满足触发伪装模式的条件时,退出伪装模式;The environment detecting module is further configured to: when detecting that the mobile terminal no longer satisfies the condition for triggering the masquerading mode, exiting the masquerading mode;
所述伪装信息提供模块,还设置为:使用所述真实信息数据库向外部提供信息,并备份所述伪装信息数据库。The masquerading information providing module is further configured to: provide information to the outside using the real information database, and back up the spoof information database.
本发明实施例还提供一种计算机可读存储介质,存储有程序指令,当该程序指令被执行时可实现上述方法。The embodiment of the invention further provides a computer readable storage medium storing program instructions, which can be implemented when the program instructions are executed.
本发明实施例实现了对用户信息的灵活保护,解决了现有用户信息保护方式效果较差的问题。The embodiment of the invention implements flexible protection of user information, and solves the problem that the existing user information protection mode is less effective.
附图概述BRIEF abstract
图1为本发明的实施例一提供的一种用户信息保护方法的流程图;1 is a flowchart of a method for protecting user information according to Embodiment 1 of the present invention;
图2为本发明的实施例二提供的一种用户信息保护方法的流程图;2 is a flowchart of a method for protecting user information according to Embodiment 2 of the present invention;
图3为本发明的实施例三提供的一种用户信息保护装置的结构示意图。FIG. 3 is a schematic structural diagram of a user information protection apparatus according to Embodiment 3 of the present invention.
纵观近几年的软件技术发展,很多软件公司开发了相应的安全模式。比如黑名单,密码,虹膜,指纹,隐私联系人等等。但是随着人们对信息保护要求的细化,这些功能显得比较简单,目前存在的技术方案并不能满足用户
的需求。Throughout the development of software technology in recent years, many software companies have developed corresponding security models. Such as blacklists, passwords, irises, fingerprints, privacy contacts, and more. However, with the refinement of information protection requirements, these functions are relatively simple, and the current technical solutions cannot satisfy users.
Demand.
为了解决上述问题,本发明的实施例提供了一种用户信息保护方法和装置。下文中将结合附图对本发明的实施例进行详细说明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。In order to solve the above problems, embodiments of the present invention provide a user information protection method and apparatus. Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted that, in the case of no conflict, the features in the embodiments and the embodiments in the present application may be arbitrarily combined with each other.
首先结合附图,对本发明的实施例一进行说明。First, the first embodiment of the present invention will be described with reference to the accompanying drawings.
本发明实施例提供了一种用户信息保护系统,包括以下几部分:服务器云端部分,手机硬件存储部分,手机软件控制部分。结合上述系统,本发明实施例还提供了一种用户信息保护方法,使用该方法完成对用户信息进行保护的流程如图1所示,包括:The embodiment of the invention provides a user information protection system, which includes the following parts: a server cloud part, a mobile phone hardware storage part, and a mobile phone software control part. In conjunction with the above system, the embodiment of the present invention further provides a user information protection method, and the process for protecting the user information by using the method is as shown in FIG. 1 , and includes:
步骤101、在检测到移动终端满足触发伪装模式的条件时,提取预置的伪装方案;Step 101: Extract a preset masquerading scheme when detecting that the mobile terminal satisfies the condition for triggering the masquerading mode;
本发明实施例中,需要读取移动终端中的个人资料,比如联系人,通话记录,短信信息,地理位置信息,等等,并且持有用户的根权限。In the embodiment of the present invention, it is necessary to read personal data in the mobile terminal, such as a contact, a call record, a short message information, a geographical location information, and the like, and hold the root authority of the user.
对移动终端进行监控,在检测达到触发伪装模式的条件后,即进入伪装模式,并提取预置的伪装方案。After monitoring the mobile terminal, after detecting that the condition of triggering the masquerading mode is reached, the masquerading mode is entered, and the preset masquerading scheme is extracted.
本发明实施例中,需要在移动终端上配置触发所述伪装模式的条件,所述条件至少包含以下一项或多项内容:In the embodiment of the present invention, the condition for triggering the masquerading mode needs to be configured on the mobile terminal, where the condition includes at least one or more of the following contents:
单个移动终端绝对地理位置,多个移动终端相对距离,启动特定软件,时间段,使用特定的解锁密码或解锁图案。The absolute geographic location of a single mobile terminal, the relative distance of multiple mobile terminals, the activation of specific software, the time period, the use of a specific unlock password or unlock pattern.
上述条件可单一作为触发伪装模式的条件;也可以多个条件结合触发,例如在晚7:00至9:00时间段内且移动终端的绝对地理位置在A地区时触发。The above conditions may be used alone as a condition for triggering the masquerading mode; or a combination of multiple conditions may be triggered, for example, when the absolute geographic location of the mobile terminal is in the A region from 7:00 to 9:00 pm.
需要说明的是,以上所列触发条件,只是对触发条件的部分举例,实际上能够被移动终端检测感知且可作为触发所使用条件的事件,均可作为触发该伪装模式的条件,本发明对此不作限定。It should be noted that the triggering conditions listed above are only examples of the triggering condition, and the event that can be detected by the mobile terminal and can be used as a condition for triggering the triggering can be used as a condition for triggering the masquerading mode. This is not limited.
下面对根据条件触发伪装模式进行举例说明:The following is an example of triggering a masquerading mode based on conditions:
1、触发的条件为单个移动终端绝对地理位置:
1. The trigger condition is the absolute geographic location of a single mobile terminal:
当用户达到一个地区(即预置的单个移动终端的绝对地理位置)的时候进行伪装信息数据库与真实信息数据库间的切换,通过基站定位/GPS/A-GPS达到一个预置的区域,根据之前的设定,对真实信息自行修改。可以在离开区域后进行还原,或者用户操作移动终端自行还原。When the user reaches an area (ie, the absolute geographical position of a preset single mobile terminal), the switching between the masquerading information database and the real information database is performed, and a preset area is reached by the base station positioning/GPS/A-GPS, according to the previous The settings are self-modifying. It can be restored after leaving the area, or the user can operate the mobile terminal to restore it by itself.
2、触发的条件为多个移动终端相对距离:2. The trigger condition is the relative distance of multiple mobile terminals:
在移动终端A上配置了伪装方案,当移动终端A与一标志的目标移动终端的地理位置接近到一个门限后,即启动伪装模式,对移动终端A的真实信息进行伪装。需要用户先指定一个或者几个目标移动终端(比如通过手机名称,IMSI号等等标识移动终端P),通过蓝牙/wifi/基站/GPS得到移动终端A和目标移动终端的距离后,进行有目的伪装信息。可以在当用户指定的终端离开一定距离后,进行还原真正信息或用本方案自行还原。A masquerading scheme is configured on the mobile terminal A. When the geographic location of the mobile terminal A and a target mobile terminal of a logo is close to a threshold, the masquerading mode is activated to masquerade the real information of the mobile terminal A. The user is required to first designate one or several target mobile terminals (such as identifying the mobile terminal P by mobile phone name, IMSI number, etc.), and obtain the distance between the mobile terminal A and the target mobile terminal through Bluetooth/wifi/base station/GPS, and then perform the purpose. Disguise information. You can restore the real information or restore it yourself with this solution after the user-specified terminal leaves a certain distance.
3、触发的条件为启动特定软件:3. The trigger condition is to start specific software:
可在特定时段与条件下,监控用户指定的软件进程,对于其防卫用户个人信息的部分,进行引导。如指向用户提前指定的虚假地理位置、通话信息等,使得软件访问到的是用户提前预置好的伪装信息。用户可以对管理类软件进行虚假设置后,调用管理软件权限,比如屏蔽电话、短信等。The user-specified software process can be monitored under certain time periods and conditions, and the part of the user's personal information is defended. For example, pointing to the fake geographical location, call information, etc. specified by the user in advance, the software accesses the masquerading information preset by the user in advance. Users can call the management software permissions after making false settings on the management software, such as blocking calls, text messages, and so on.
以上几种方案可以通过设置相互结合,相互构成制约条件,比如在时间段,以及地理条件以及软件启动同时达成时方能进入,或者,时间段,地理条件或软件启动,只有一个满足则可进入。The above several schemes can be combined with each other to form constraints, such as when the time period, and the geographical conditions and software startup are simultaneously achieved, or the time period, geographic conditions or software startup, only one one can enter .
步骤102、根据所述伪装方案,生成与所述移动终端的真实信息对应的伪装信息,所述伪装信息存储于伪装信息数据库;Step 102: Generate, according to the masquerading scheme, masquerading information corresponding to real information of the mobile terminal, where the masquerading information is stored in a masquerading information database;
本发明实施例中,需要配置伪装方案,所述伪装方案包含需要伪装的真实信息范围和生成与真实信息对应的伪装信息的方法。In the embodiment of the present invention, a masquerading scheme is needed, and the masquerading scheme includes a real information range that needs to be disguised and a method of generating masquerading information corresponding to the real information.
其中,需要伪装的真实信息范围可以包含移动终端中的个人资料,如联系人,通话记录,短信信息,地理位置信息等;也可以包含应用软件生成的信息。The real information range that needs to be disguised may include personal data in the mobile terminal, such as a contact, a call record, a short message information, a geographical location information, and the like, and may also include information generated by the application software.
生成与真实信息对应的伪装信息的方法可以是预置一个与一项或几项真实信息对应的伪装信息,对真实信息进行简单替换;也可以是一个计算方法,
如通话记录的时间前推3小时等。The method for generating the masquerading information corresponding to the real information may be presetting a masquerading information corresponding to one or several pieces of real information, and performing simple replacement on the real information; or may be a calculation method.
If the call record is pushed 3 hours before the time.
本步骤包括:This step includes:
1、对检测到移动终端满足触发伪装模式的条件前的真实信息,生成对应的伪装信息,存储于所述伪装信息数据库;1. Generate real information corresponding to the condition that the mobile terminal satisfies the condition of triggering the masquerading mode, and generate corresponding masquerading information, which is stored in the cloaking information database;
2、对检测到移动终端满足触发伪装模式的条件后的所述移动终端待向外部提供的真实信息进行拦截,并生成与该真实信息对应的伪装信息,将该伪装信息存储于所述伪装信息数据库。2. Intercepting the real information to be provided to the outside by the mobile terminal after detecting that the mobile terminal satisfies the condition of triggering the masquerading mode, and generating masquerading information corresponding to the real information, and storing the masquerading information in the masquerading information database.
所述伪装信息数据库与所述真实信息数据库具有不同的标记和相同的结构。通过不同标记区分伪装信息数据库与真实信息数据库,例如可以是不同的版本标记;而由于具有相同的结构,移动终端可在伪装信息数据库与真实信息数据库间切换,在需要使用真实信息的位置调用相应的伪装信息。The masquerading information database has a different mark and the same structure as the real information database. Differentiating the masquerading information database and the real information database by different markings, for example, may be different version tags; and because of having the same structure, the mobile terminal can switch between the masquerading information database and the real information database, and call the corresponding location where the real information needs to be used. Camouflage information.
步骤103、将所述真实信息传输至预配置的远端备份系统或在所述移动终端本地进行备份存储;Step 103: Transmit the real information to a pre-configured remote backup system or perform backup storage locally on the mobile terminal;
在运行该伪装方案后,即可自动根据预设的伪装方案获取伪装信息来替换修改用户的真实信息,并且将原先的真实信息数据库进行备份。After running the masquerading scheme, the masquerading information is automatically obtained according to the preset masquerading scheme to replace the real information of the modified user, and the original real information database is backed up.
可将该真实信息备份在指定位置(云端/本地存储)并且加密。This real information can be backed up at the specified location (cloud/local storage) and encrypted.
步骤104、使用所述伪装信息数据库替换存储所述真实信息的真实信息数据库;Step 104: Replace, by using the masquerading information database, a real information database storing the real information;
本步骤中,移动终端读取伪装信息数据库,并在调用信息时调用与真实信息对应的伪装信息。In this step, the mobile terminal reads the masquerading information database and invokes the masquerading information corresponding to the real information when the information is invoked.
步骤105、更新用户界面,使伪装信息显现。Step 105: Update the user interface to make the masquerading information appear.
步骤106、在检测到所述移动终端不再满足触发伪装模式的条件时,退出伪装模式。Step 106: When detecting that the mobile terminal no longer satisfies the condition for triggering the masquerading mode, exiting the masquerading mode.
步骤107、使用所述真实信息数据库向外部提供信息,并备份所述伪装信息数据库。Step 107: Provide information to the outside using the real information database, and back up the masquerading information database.
可选地,当在再次检测到所述移动终端满足触发伪装模式的条件时,可以选择使用已保存的伪装信息数据库中的伪装信息或生成新的伪装信息。也
可以重配置伪装方案和触发伪装模式的条件。Alternatively, when it is detected again that the mobile terminal satisfies the condition of triggering the masquerading mode, the masquerading information in the saved masquerading information database may be selected or new masquerading information may be generated. and also
The masquerading scheme and the conditions that trigger the masquerading mode can be reconfigured.
下面结合附图,对本发明的实施例二进行说明。Embodiment 2 of the present invention will be described below with reference to the accompanying drawings.
本发明实施例提供了一种用户信息保护方法,使用该方法完成对用户真实信息进行伪装的流程如图2所示,包括:The embodiment of the invention provides a user information protection method. The process of using the method to complete the disguise of the user's real information is as shown in FIG. 2, and includes:
1、用户打开方案软件,云端提供账户,用户登录后判断是否第一次登录,若第一次则提供给用户各种大量分类的伪装方案,并允许用户编辑。若非第一次登录则读取用户之前使用过的伪装信息。伪装方案是指对信息进行修改,比如联系人名称,短信内容,通话时间,地理位置等等。1. The user opens the solution software, and the cloud provides an account. After the user logs in, it is judged whether to log in for the first time. If the first time, the user is provided with various masquerading schemes of various categories, and the user is allowed to edit. If it is not the first time to log in, read the masquerading information that the user has used before. The masquerading scheme refers to the modification of information, such as the name of the contact, the content of the short message, the time of the call, the geographical location, and the like.
2、对选择一份或多分预置好的伪装信息,会以加密的形式存放在手机的物理存储区域。2. The masquerading information for selecting one or more presets will be stored in the physical storage area of the mobile phone in encrypted form.
3、用户使用本方案进行伪装模式触发,如上述具体实施方案,可用一套方案,也可多套方案复用。对于方案复用可以增加用户对伪装模式的可控性。3. The user uses the scheme to perform the camouflage mode triggering. For the specific implementation scheme described above, one set of schemes may be used, or multiple schemes may be reused. For program multiplexing, the user's controllability to the camouflage mode can be increased.
4、用户触发伪装模式的实现步骤:4. Implementation steps of the user triggering the camouflage mode:
第一步:达到条件后的整体进行设置,在用户规定的地理位置场景达到触发的条件后,伪装模式下的移动终端会直接读取当前联系人数据库、通话记录数据库、短信数据库等各种隐私数据库,根据真实的通话时间、姓名、短信内容、通话录音等真实信息为基础,根据之前预置的伪装方案来统一生成相对应的伪装信息并存储于伪装信息数据库,将伪装信息数据库替换真实信息数据库,将真实信息数据库进行备份。并且重启相应的应用使其界面适配伪装信息。Step 1: After the condition is met, the overall setting is performed. After the user-defined geographical location scenario reaches the trigger condition, the mobile terminal in the camouflage mode directly reads various privacys such as the current contact database, the call record database, and the short message database. The database, based on the real information such as the actual call time, name, short message content, and call recording, uniformly generates corresponding camouflage information according to the pre-prepared camouflage scheme and stores it in the camouflage information database, and replaces the fake information database with the real information. Database, the real information database is backed up. And restart the corresponding application to adapt the interface to the masquerading information.
第二步:当用户在伪装模式下产生新的真实信息(比如通话记录,短息,位置信息等等)时,自动拦截该真实信息,并生成相应的伪装信息,然后进行如下操作:Step 2: When the user generates new real information (such as call history, short message, location information, etc.) in the camouflage mode, the real information is automatically intercepted, and the corresponding camouflage information is generated, and then the following operations are performed:
首先将真实信息存储到备份的真实信息数据库,但是本操作不会显示给用户。然后,将本次的新的真实信息按照之前伪装方案进行伪装得到伪装信息后,将伪装信息插入伪装信息数据库。刷新界面,将伪装信息体现给用户。本质上讲伪装信息数据库和真实信息数据库除了一个标记区分外,其结构都
应是一致的。改变的只是信息,而并非格式。真实信息数据库的内容也可与伪装信息数据库的内容完全一致,这由用户设置的伪装方案所决定。The real information is first stored in the backup real information database, but this operation is not displayed to the user. Then, after the new real information is camouflaged according to the previous camouflage scheme to obtain the masquerading information, the masquerading information is inserted into the masquerading information database. Refresh the interface and present the camouflage information to the user. Essentially, the camouflage information database and the real information database are structured except for one mark.
It should be consistent. What is changed is information, not format. The content of the real information database can also be completely consistent with the content of the masquerading information database, which is determined by the masquerading scheme set by the user.
第三步,当用户退出伪装模式后(主动退出或自动退出,用户主动退出可通过菜单中加密的选项),移动终端即可将真实信息数据库进行还原,并且通知相应的应用进行界面刷新,或者重启应用/手机。将伪装信息数据库进行保存,用于下次的伪装模式。The third step, when the user exits the masquerading mode (actively quits or automatically quits, the user voluntarily quits the option that can be encrypted through the menu), the mobile terminal can restore the real information database, and notify the corresponding application to perform interface refresh, or Restart the app/phone. The masquerading information database is saved for the next masquerading mode.
5、达到条件进入伪装模式后,用户的真实会被加密备份,与伪装方案一起,上传到云端记录说明。5. After the condition is entered into the camouflage mode, the user's real will be encrypted and backed up, together with the camouflage plan, uploaded to the cloud record description.
6、当用户退出伪装模式后,用户本次使用的伪装信息会被主动保存起来,并且上传云备份。当用户下次使用伪装模式后,会主动提示用户上次使用的伪装信息数据库记录,供用户选择使用之前的伪装信息数据库。6. When the user exits the masquerading mode, the spoofing information used by the user will be actively saved and the cloud backup will be uploaded. When the user next uses the masquerading mode, the user will be prompted to use the masquerading information database record used by the user for the user to select the masquerading information database.
下面结合附图,对本发明的实施例三进行说明。Embodiment 3 of the present invention will be described below with reference to the accompanying drawings.
本发明实施例提供了一种用户信息保护装置,该装置的结构如图3所示,包括:The embodiment of the invention provides a user information protection device. The structure of the device is as shown in FIG. 3, and includes:
环境检测模块301,设置为:在检测到移动终端满足触发伪装模式的条件时,提取预置的伪装方案;The environment detecting module 301 is configured to: when detecting that the mobile terminal satisfies the condition of triggering the masquerading mode, extracting a preset masquerading scheme;
伪装信息生成模块302,设置为:根据所述伪装方案,生成与所述移动终端的真实信息对应的伪装信息,所述伪装信息存储于伪装信息数据库;The masquerading information generating module 302 is configured to generate, according to the masquerading scheme, masquerading information corresponding to the real information of the mobile terminal, where the masquerading information is stored in the masquerading information database;
伪装信息提供模块303,设置为:使用所述伪装信息数据库替换存储所述真实信息的真实信息数据库。The masquerading information providing module 303 is configured to replace the real information database storing the real information by using the masquerading information database.
可选地,该装置还包括:Optionally, the device further includes:
远端备份模块304,设置为:将所述真实信息传输至预配置的远端备份系统进行备份存储。The remote backup module 304 is configured to: transfer the real information to a pre-configured remote backup system for backup storage.
可选地,所述环境检测模块301,还设置为:在检测到所述移动终端不再满足触发伪装模式的条件时,退出伪装模式;Optionally, the environment detecting module 301 is further configured to: when detecting that the mobile terminal no longer satisfies the condition for triggering the masquerading mode, exiting the masquerading mode;
可选地,所述伪装信息提供模块303,还设置为:使用所述真实信息数
据库向外部提供信息,并备份所述伪装信息数据库。Optionally, the masquerading information providing module 303 is further configured to: use the real information number
The database provides information to the outside and backs up the cloaked information database.
本发明的实施例提供了一种用户信息保护方法和装置,Embodiments of the present invention provide a user information protection method and apparatus,
在检测到移动终端满足触发伪装模式的条件时,提取预置的伪装方案,根据所述伪装方案,生成与所述移动终端的真实信息对应的伪装信息,所述伪装信息存储于伪装信息数据库,使用所述伪装信息数据库替换存储所述真实信息的真实信息数据库向所述移动终端外部提供信息。实现了对用户信息的灵活保护,解决了现有用户信息保护方式效果较差的问题。When detecting that the mobile terminal satisfies the condition of triggering the masquerading mode, extracting a preset masquerading scheme, and generating masquerading information corresponding to the real information of the mobile terminal according to the masquerading scheme, the masquerading information being stored in the masquerading information database, The virtual information database storing the real information is replaced with the masquerading information database to provide information to the outside of the mobile terminal. The flexible protection of user information is realized, and the problem that the existing user information protection method is poor is solved.
本发明的实施例提供的技术方案可以细化个人隐私方面安全等级,提供的伪装信息可以更加有力的保护个人真实隐私。解决了用户知情不想提供真实信息,或者不知情情况下真实信息泄露的问题。The technical solution provided by the embodiment of the present invention can refine the security level of personal privacy, and the provided camouflage information can more effectively protect the real privacy of the individual. It solves the problem that the user does not want to provide real information, or reveals the true information without knowing it.
用户可以通过自行设置来自由的将伪装信息提供给他人,或者未经本人授权的三方软件,达到个人信息最大化的保护。Users can set their own masquerading information to others, or the three-party software without their authorization to maximize the protection of personal information.
本领域普通技术人员可以理解上述实施例的全部或部分步骤可以使用计算机程序流程来实现,所述计算机程序可以存储于一计算机可读存储介质中,所述计算机程序在相应的硬件平台上(如系统、设备、装置、器件等)执行,在执行时,包括方法实施例的步骤之一或其组合。One of ordinary skill in the art will appreciate that all or a portion of the steps of the above-described embodiments can be implemented using a computer program flow, which can be stored in a computer readable storage medium, such as on a corresponding hardware platform (eg, The system, device, device, device, etc. are executed, and when executed, include one or a combination of the steps of the method embodiments.
可选地,上述实施例的全部或部分步骤也可以使用集成电路来实现,这些步骤可以被分别制作成一个个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。上述实施例中的各装置/功能模块/功能单元可以采用通用的计算装置来实现,它们可以集中在单个的计算装置上,也可以分布在多个计算装置所组成的网络上。Alternatively, all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve. The devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
上述实施例中的各装置/功能模块/功能单元以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。上述提到的计算机可读取存储介质可以是只读存储器,磁盘或光盘等。When each device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium. The above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
本发明实施例实现了对用户信息的灵活保护,解决了现有用户信息保护方式效果较差的问题。
The embodiment of the invention implements flexible protection of user information, and solves the problem that the existing user information protection mode is less effective.
Claims (12)
- 一种用户信息保护方法,包括:A user information protection method includes:在检测到移动终端满足触发伪装模式的条件时,提取预置的伪装方案;Extracting a preset masquerading scheme when detecting that the mobile terminal satisfies the condition of triggering the masquerading mode;根据所述伪装方案,生成与所述移动终端的真实信息对应的伪装信息,将所述伪装信息存储于伪装信息数据库;And generating, according to the masquerading scheme, masquerading information corresponding to the real information of the mobile terminal, and storing the masquerading information in the masquerading information database;使用所述伪装信息数据库替换存储所述真实信息的真实信息数据库。A database of real information storing the real information is replaced with the masquerading information database.
- 根据权利要求1所述的用户信息保护方法,其中,根据所述伪装方案,生成与所述移动终端的真实信息对应的伪装信息包括:The user information protection method according to claim 1, wherein the generating the masquerading information corresponding to the real information of the mobile terminal according to the masquerading scheme comprises:对检测到移动终端满足触发伪装模式的条件前的真实信息,生成对应的伪装信息,将所述伪装信息存储于所述伪装信息数据库;Generating corresponding masquerading information, and storing the masquerading information in the masquerading information database, to detect real information before the condition that the mobile terminal satisfies the triggering masquerading mode;对检测到移动终端满足触发伪装模式的条件后的所述移动终端待向外部提供的真实信息进行拦截,并生成与该真实信息对应的伪装信息,将该伪装信息存储于所述伪装信息数据库。The real information to be externally provided by the mobile terminal after the condition that the mobile terminal satisfies the triggering masquerading mode is detected is intercepted, and masquerading information corresponding to the real information is generated, and the masquerading information is stored in the masquerading information database.
- 根据权利要求1所述的用户信息保护方法,其中,根据所述伪装方案,生成与所述移动终端的真实信息对应的伪装信息的步骤之后,还包括:The user information protection method according to claim 1, wherein after the step of generating the masquerading information corresponding to the real information of the mobile terminal according to the masquerading scheme, the method further includes:将所述真实信息传输至预配置的远端备份系统或在所述移动终端本地进行备份存储。The real information is transmitted to a pre-configured remote backup system or backed up locally at the mobile terminal.
- 根据权利要求1所述的用户信息保护方法,该方法还包括:The user information protection method according to claim 1, further comprising:配置触发所述伪装模式的条件,所述条件至少包含以下一项或多项内容:Configuring a condition for triggering the masquerading mode, the condition comprising at least one or more of the following:单个移动终端绝对地理位置,多个移动终端相对距离,启动特定软件,时间段,使用特定的解锁密码或解锁图案。The absolute geographic location of a single mobile terminal, the relative distance of multiple mobile terminals, the activation of specific software, the time period, the use of a specific unlock password or unlock pattern.
- 根据权利要求1所述的用户信息保护方法,该方法还包括: The user information protection method according to claim 1, further comprising:配置所述伪装方案,所述伪装方案包含需要伪装的真实信息范围和生成与真实信息对应的伪装信息的方式。The masquerading scheme is configured, the masquerading scheme includes a real information range that needs to be disguised and a manner of generating masquerading information corresponding to the real information.
- 根据权利要求1所述的用户信息保护方法,其中,所述伪装信息数据库与所述真实信息数据库具有不同的标记和相同的结构。The user information protection method according to claim 1, wherein said masquerading information database has a different mark and the same structure as said real information database.
- 根据权利要求1所述的用户信息保护方法,该方法还包括:The user information protection method according to claim 1, further comprising:在检测到所述移动终端不再满足触发伪装模式的条件时,退出伪装模式;Exiting the masquerading mode when detecting that the mobile terminal no longer satisfies the condition for triggering the masquerading mode;使用所述真实信息数据库向外部提供信息,并备份所述伪装信息数据库。The information is externally provided using the real information database, and the cloaked information database is backed up.
- 根据权利要求7所述的用户信息保护方法,该方法还包括:The user information protection method according to claim 7, further comprising:在再次检测到所述移动终端满足触发伪装模式的条件时,选择使用已保存的伪装信息数据库中的伪装信息或生成新的伪装信息。When it is detected again that the mobile terminal satisfies the condition of triggering the masquerading mode, the masquerading information in the saved masquerading information database is selected or new masquerading information is generated.
- 一种用户信息保护装置,包括:A user information protection device comprising:环境检测模块,设置为:在检测到移动终端满足触发伪装模式的条件时,提取预置的伪装方案;The environment detecting module is configured to: when detecting that the mobile terminal satisfies the condition of triggering the masquerading mode, extracting a preset masquerading scheme;伪装信息生成模块,设置为:根据所述伪装方案,生成与所述移动终端的真实信息对应的伪装信息,将所述伪装信息存储于伪装信息数据库;以及The masquerading information generating module is configured to: generate masquerading information corresponding to the real information of the mobile terminal according to the masquerading scheme, and store the masquerading information in the masquerading information database;伪装信息提供模块,设置为:使用所述伪装信息数据库替换存储所述真实信息的真实信息数据库。The masquerading information providing module is configured to replace the real information database storing the real information by using the masquerading information database.
- 根据权利要求9所述的用户信息保护装置,该装置还包括:The user information protection device according to claim 9, further comprising:远端备份模块,设置为:将所述真实信息传输至预配置的远端备份系统进行备份存储。The remote backup module is configured to: transfer the real information to a pre-configured remote backup system for backup storage.
- 根据权利要求9所述的用户信息保护装置,其中, The user information protection device according to claim 9, wherein所述环境检测模块,还设置为:在检测到所述移动终端不再满足触发伪装模式的条件时,退出伪装模式;The environment detecting module is further configured to: when detecting that the mobile terminal no longer satisfies the condition for triggering the masquerading mode, exiting the masquerading mode;所述伪装信息提供模块,还设置为:使用所述真实信息数据库向外部提供信息,并备份所述伪装信息数据库。The masquerading information providing module is further configured to: provide information to the outside using the real information database, and back up the spoof information database.
- 一种计算机可读存储介质,存储有程序指令,当该程序指令被执行时可实现权利要求1-8任一项所述的方法。 A computer readable storage medium storing program instructions that, when executed, implement the method of any of claims 1-8.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410535819.8 | 2014-10-11 | ||
CN201410535819.8A CN105574417A (en) | 2014-10-11 | 2014-10-11 | User information protection method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016054892A1 true WO2016054892A1 (en) | 2016-04-14 |
Family
ID=55652532
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/074126 WO2016054892A1 (en) | 2014-10-11 | 2015-03-12 | Method and device for user information protection |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105574417A (en) |
WO (1) | WO2016054892A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115659341A (en) * | 2022-12-23 | 2023-01-31 | 中国计量大学现代科技学院 | Software information safety monitoring system |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107635052A (en) * | 2016-07-18 | 2018-01-26 | 中兴通讯股份有限公司 | Message treatment method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004328552A (en) * | 2003-04-25 | 2004-11-18 | Kyocera Corp | Mobile terminal |
CN101370209A (en) * | 2008-09-22 | 2009-02-18 | 深圳华为通信技术有限公司 | Information disguising method and system |
CN101815119A (en) * | 2009-12-10 | 2010-08-25 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for processing information of private contact person and mobile communication terminal |
CN102223626A (en) * | 2011-06-14 | 2011-10-19 | 李明 | Information steganography and security protection method based on wireless base station information |
CN102394975A (en) * | 2011-10-28 | 2012-03-28 | 宇龙计算机通信科技(深圳)有限公司 | Private contact camouflage method and mobile terminal |
CN102970666A (en) * | 2012-11-09 | 2013-03-13 | 广东欧珀移动通信有限公司 | Method and system for disguised incoming call information for mobile terminal |
CN104010272A (en) * | 2014-05-12 | 2014-08-27 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting privacy |
-
2014
- 2014-10-11 CN CN201410535819.8A patent/CN105574417A/en not_active Withdrawn
-
2015
- 2015-03-12 WO PCT/CN2015/074126 patent/WO2016054892A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004328552A (en) * | 2003-04-25 | 2004-11-18 | Kyocera Corp | Mobile terminal |
CN101370209A (en) * | 2008-09-22 | 2009-02-18 | 深圳华为通信技术有限公司 | Information disguising method and system |
CN101815119A (en) * | 2009-12-10 | 2010-08-25 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for processing information of private contact person and mobile communication terminal |
CN102223626A (en) * | 2011-06-14 | 2011-10-19 | 李明 | Information steganography and security protection method based on wireless base station information |
CN102394975A (en) * | 2011-10-28 | 2012-03-28 | 宇龙计算机通信科技(深圳)有限公司 | Private contact camouflage method and mobile terminal |
CN102970666A (en) * | 2012-11-09 | 2013-03-13 | 广东欧珀移动通信有限公司 | Method and system for disguised incoming call information for mobile terminal |
CN104010272A (en) * | 2014-05-12 | 2014-08-27 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting privacy |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115659341A (en) * | 2022-12-23 | 2023-01-31 | 中国计量大学现代科技学院 | Software information safety monitoring system |
Also Published As
Publication number | Publication date |
---|---|
CN105574417A (en) | 2016-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3675457B1 (en) | Mobile terminal and method of providing security thereto | |
US8750828B2 (en) | Enabling remote and anonymous control of mobile and portable multimedia devices for security, tracking and recovery | |
CN101611599B (en) | Apparatus and methods for locating, tracking and/or recovering a wireless communication device | |
US11864051B2 (en) | Systems and methods for monitoring and managing use of mobile electronic devices | |
US8555077B2 (en) | Determining device identity using a behavioral fingerprint | |
US10515203B2 (en) | Method and system for improving security of a mobile terminal | |
US9560026B1 (en) | Secure computer operations | |
KR102265123B1 (en) | System for context-based data protection | |
CN104035891B (en) | Android mobile terminal data security protection system | |
US20130091564A1 (en) | Systems and methods for mitigating the unauthorized use of a device | |
CN104239805B (en) | A kind of anti-theft method of mobile phone and device | |
CN102685106A (en) | Safety verification method and equipment | |
CN103945385B (en) | The method and its device of guarding against theft for mobile terminal | |
CN106572439B (en) | Terminal tracing method, device and mobile terminal | |
CN103067911A (en) | Method and equipment used for controlling hardware module | |
Kuppusamy et al. | A model for remote access and protection of smartphones using short message service | |
CN107872440B (en) | Identity authentication method, device and system | |
WO2018049564A1 (en) | Anti-theft method and device for mobile terminal | |
Young et al. | BadVoice: Soundless voice-control replay attack on modern smartphones | |
EP2764713A2 (en) | Systems and methods for monitoring and managing use of mobile electronic devices | |
WO2016054892A1 (en) | Method and device for user information protection | |
CN107154977B (en) | Information pushing method and device | |
CN104796531A (en) | Method and system for protecting information privacy | |
CN106911653B (en) | Method, device, mobile terminal and system for realizing remote control of mobile terminal | |
CN104850798A (en) | Strategy-customized android equipment privacy protection system and realizing method therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15848828 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15848828 Country of ref document: EP Kind code of ref document: A1 |