Method for carrying out protection on user information in mobile terminal
A mobile terminal, user information technology, applied in wireless communication, security devices, electrical components, etc., can solve problems such as economic loss and user privacy leakage, and achieve the effect of protecting user accounts and privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0020] Referring to Fig. 1, it is a flowchart of a method for protecting user information in a mobile terminal proposed by the present invention. According to obtaining user identification card information and user login information in a mobile terminal, it is judged whether the user has changed, and thus it is determined whether to protect the mobile terminal. The data in the terminal is protected.
[0021] Among them, the user identification card is a card used to identify the user's identity in the user's mobile terminal, and the user ID information is stored in the card, that is, related personal information and mobile network information; the user identification card includes the SIM card in the GSM network, the SIM card in the UMTS network USIM card, UIM card in CDMA network and PIM card in PHS network.
[0022] This process includes the following steps:
[0023] Step 101, start the client software in the mobile terminal;
[0024] Step 102, the client software reads th...
Embodiment 2
[0039] Mr. Wang lent the mobile terminal to Mr. Li for use. Therefore, Mr. Li put his own SIM card into Mr. Wang's mobile terminal. At this time, the data stored in the mobile terminal are Mr. Wang's SIM card information, login information and Wang Mr. Wang's log-in record every time, among which, the saved login information of Mr. Wang is user name Wang and password 12345. At the same time, the mode set by Mr. Wang is automatic login.
[0040] When Mr. Li applies for network services, he first starts the client software in the mobile terminal, and performs the following steps:
[0041] Step 201, the client software reads the SIM card information of Mr. Li and finds that the SIM card has changed;
[0042] Step 202, prompting the current user to input username and password;
[0043] Step 203, Mr. Li enters user name Li and password 54321;
[0044] Step 204, the client software detects and compares the user name, and finds that the user name has changed, thus determining that...
Embodiment 3
[0050] Mr. Wang uses the original mobile terminal, but the SIM card is changed, and the mode set by Mr. Wang is automatic login. When Mr. Wang applies for network services, he first starts the client software in the mobile terminal, and performs the following steps:
[0051] Step 301, the client software reads the SIM card information of Mr. Wang and finds that the SIM card has changed;
[0052] Step 302, prompting the current user to input username and password;
[0053] Step 303, Mr. Wang enters username Wang and password 12345;
[0054] Step 304, the client software detects and compares the user name, and finds that the user name has not changed, thus determining that the current user has not changed;
[0055] Step 305, the client records new SIM card information;
[0056] Step 306, the client sends the stored user login information, namely username Wang and password 12345, to the server on the network side;
[0057] Step 307, the server verifies the user name and passwor...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 