Mobile phone privacy protection method

A mobile phone and privacy technology, which is applied in computer components, computer security devices, digital data authentication, etc., can solve problems such as threats to private information, and achieve the effect of strong confidentiality

Inactive Publication Date: 2007-09-12
CECT
View PDF1 Cites 101 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In short, the common problem in the above-mentioned methods for protecting the privacy of mobile phones is that these methods protect the private information in the mobile phone through passwords, and if the passwords are leaked, the private information in them will also be threatened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone privacy protection method
  • Mobile phone privacy protection method
  • Mobile phone privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following embodiments provide several specific implementation methods of using fingerprint information to realize information privacy protection in mobile phones.

[0049] It should be noted that in the prior art, there are already several technical solutions for using fingerprint recognition technology for personal computer privacy protection. The combination of fingerprint recognition instrument and mobile phone also has some prior art. For example, application number is 02287719 Chinese patent application, discloses a kind of mobile phone with fingerprint key, has provided the concrete mode of fingerprint sensor and mobile phone connection in this patent application. At present, there are many devices such as fingerprint sensors, which can be conveniently combined with mobile phones, so that mobile phones can receive and store fingerprint information, and even compare fingerprint information. The methods provided in the following embodiments are based on the fac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a method of private and secret information protection on the mobile telephone. It includes: 11) checking consumer's fingerprint information; 12) checking if the information judging the given fingerprint are authorized; If it come into existence, then going to step 13); If it does not , then the telephone comes into private and private protection state; 13) unlock the private and secret protection state. The fingerprint information can be saved as following steps: 21) The telephone turns into fingerprint record state according to consumer operation; 22) Receiving a fingerprint from the fingerprint scanning entrance; 23)The fingerprint information is saved into the fingerprint data base. Compared with present available technology, the invention has provided the physiology characteristics distinguishing the human body. It has realized that private and secret information protecting in the mobile telephone.

Description

technical field [0001] The invention relates to mobile phone technology, in particular to a mobile phone privacy protection method. Background technique [0002] The mobile phone has become a necessary and portable communication tool for everyone. Compared with other communication tools, the most important feature of a mobile phone is its high degree of privacy. Each mobile phone stores a large amount of private information of the owner, and the owner often requires confidentiality of such private information. [0003] In view of the above-mentioned privacy protection requirements, the prior art provides various privacy protection methods. At present, the main private information protection methods are as follows. [0004] 1. Mobile phone password + PIN code protection. This protection method belongs to the most basic and most common mobile phone privacy protection scheme at present. The usual method is: use a special mobile phone password (usually 4-6 digits) to limit al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/32H04L9/00G06K9/00G06K9/20G06F21/00G06F21/32H04M1/72436
Inventor 李向吉
Owner CECT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products