Method for conducting secrete handling for PC broadside-on mobile terminal information

A mobile terminal, PC technology, applied in the direction of electrical digital data processing, telephone communication, computer security devices, etc., can solve the problem of no security technology and so on

Inactive Publication Date: 2009-02-11
中科创新发展(北京)科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, more and more mobile phone manufacturers focus on the security design of mobile phones, but when PCs perform related operations on mobile phones, there is no corresponding security technology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for conducting secrete handling for PC broadside-on mobile terminal information
  • Method for conducting secrete handling for PC broadside-on mobile terminal information
  • Method for conducting secrete handling for PC broadside-on mobile terminal information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Such as figure 1 Shown is a schematic structural diagram of the mobile phone according to the embodiment of the present invention.

[0019] The mobile phone 100 of the present invention includes a password comparison module 10, a first communication interface 30 (such as a USB interface, a bluetooth interface, an infrared interface, a ZigBee interface) and a first communication interface 30 (such as a USB interface, a bluetooth interface, an infrared interface, etc.) interface or Wi-Fi interface), wherein, 10 in the password comparison module includes a comparison data receiving unit 11, a comparison result sending unit 12; the comparison data receiving unit 11 receives the data received from the first communication interface 30, and compares The comparison result sending unit 12 sends the comparison result data received from the comparison data receiving unit 11 and compared by the password comparison module 10 to the first communication interface 30 .

[0020] Such a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for carrying out secret processing on mobile terminal information at PC side includes judging whether connection between PC computer and mobile terminal is successful or not by PC side and judging whether cipher is set on mobile terminal or not by PC side if it is, inputting mobile terminal cipher by PC side and sending said cipher to mobile terminal by PC computer if it is not, calibrating said cipher by mobile terminal and carrying out normal interaction between PC computer and mobile terminal if it is confirmed that cipher is correct.

Description

technical field [0001] The present invention relates to mobile terminal information security processing technology, in particular, relates to a PC side for mobile terminal information security processing method. Background technique [0002] With the increasing popularity of mobile terminals such as mobile phones and the increasingly powerful functions of mobile phones, mobile phones have become our most commonly used communication tools. With the application of media information such as short messages and MMS (Multimedia Messaging Service), mobile phones have also become our personal "information center". In a sense, the mobile phone is our "secret garden", which involves a lot of our privacy. Therefore, the confidentiality of these personal information is very important. [0003] At present, more and more mobile phone manufacturers focus on the security design of the mobile phone, but there is no corresponding security technology for the related operations of the mobile ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/32H04M1/673G06F21/00G06F21/31
Inventor 陈晓岚
Owner 中科创新发展(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products