Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for carrying out protection on user information in mobile terminal

A mobile terminal, user information technology, applied in wireless communication, security devices, electrical components, etc., can solve problems such as economic loss and user privacy leakage, and achieve the effect of protecting user accounts and privacy

Inactive Publication Date: 2007-10-31
CHINA MOBILE COMM GRP CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, because the client software still retains the login information of the original user ID card, if the user who replaced the user ID card is not the original user of the mobile terminal, the original user name / password will be used by other users, and the mobile terminal The saved original user data is obtained by other users, which will bring economic losses to the original user and leakage of user privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out protection on user information in mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] Referring to Fig. 1, it is a flowchart of a method for protecting user information in a mobile terminal proposed by the present invention. According to obtaining user identification card information and user login information in a mobile terminal, it is judged whether the user has changed, and thus it is determined whether to protect the mobile terminal. The data in the terminal is protected.

[0021] Among them, the user identification card is a card used to identify the user's identity in the user's mobile terminal, and the user ID information is stored in the card, that is, related personal information and mobile network information; the user identification card includes the SIM card in the GSM network, the SIM card in the UMTS network USIM card, UIM card in CDMA network and PIM card in PHS network.

[0022] This process includes the following steps:

[0023] Step 101, start the client software in the mobile terminal;

[0024] Step 102, the client software reads th...

Embodiment 2

[0039] Mr. Wang lent the mobile terminal to Mr. Li for use. Therefore, Mr. Li put his own SIM card into Mr. Wang's mobile terminal. At this time, the data stored in the mobile terminal are Mr. Wang's SIM card information, login information and Wang Mr. Wang's log-in record every time, among which, the saved login information of Mr. Wang is user name Wang and password 12345. At the same time, the mode set by Mr. Wang is automatic login.

[0040] When Mr. Li applies for network services, he first starts the client software in the mobile terminal, and performs the following steps:

[0041] Step 201, the client software reads the SIM card information of Mr. Li and finds that the SIM card has changed;

[0042] Step 202, prompting the current user to input username and password;

[0043] Step 203, Mr. Li enters user name Li and password 54321;

[0044] Step 204, the client software detects and compares the user name, and finds that the user name has changed, thus determining that...

Embodiment 3

[0050] Mr. Wang uses the original mobile terminal, but the SIM card is changed, and the mode set by Mr. Wang is automatic login. When Mr. Wang applies for network services, he first starts the client software in the mobile terminal, and performs the following steps:

[0051] Step 301, the client software reads the SIM card information of Mr. Wang and finds that the SIM card has changed;

[0052] Step 302, prompting the current user to input username and password;

[0053] Step 303, Mr. Wang enters username Wang and password 12345;

[0054] Step 304, the client software detects and compares the user name, and finds that the user name has not changed, thus determining that the current user has not changed;

[0055] Step 305, the client records new SIM card information;

[0056] Step 306, the client sends the stored user login information, namely username Wang and password 12345, to the server on the network side;

[0057] Step 307, the server verifies the user name and passwor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to a method for protecting user's information of original identity card, in the situation of changing the user's identity card in mobile terminal, which comprises the following steps: client terminal software accesses and compares the card information, if the same, logging up server, if not, the compares user's name of logging information, if the same, stores new identity information and logging up server, if not, conveys the stored identity information, logging information, and business data to server, and deletes them from mobile terminal, stores new ones, and logs server. The invention can automatically log on net, reserve original data, the temporary change of mobile terminal identifying part has not lead to loss the original information.

Description

technical field [0001] The invention relates to a method for protecting user information of a mobile terminal, in particular to a method for protecting user information based on the original user identification card in the case of changing the user identification card in the mobile terminal. Background technique [0002] When using a network service that requires input of user login information through a mobile terminal, the mobile terminal user needs to input login information such as user name / password each time, and the user can use the network service only if the login information is correct. [0003] In order to facilitate users to use network services that require input of user login information through mobile terminals, generally the client software of mobile terminals will save user login information, so that users do not need to input again when they log in next time, so as to achieve the purpose of quickly using network services. At the same time, the client softwa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/32H04W12/02H04W88/02
Inventor 刘艺武威许炜于蓉蓉吕志虎刘洪宁郑朝晖唐剑峰
Owner CHINA MOBILE COMM GRP CO LTD