Method for mobile phone information safety protection

A technology for security protection and mobile phone information, which is applied in security devices, telephone communications, wireless communications, etc., and can solve problems such as setting passwords and not trusting them

Inactive Publication Date: 2009-07-15
BEIJING YIQI TELECOMM TECH
View PDF1 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, there are also ways to set screen protection to achieve the security of mobile phone information, or to encrypt individual files, such as: phone book, instant messages, etc., but for example: spouse, and setting a password also creates distrust

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for mobile phone information safety protection
  • Method for mobile phone information safety protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The function realized by the invention: the user sets the hiding function for the contacts in the phone book, finds all the information related to the contact, and then hides all the information, so that other people cannot find all the information of the contact even if they open the mobile phone.

[0025] Will describe in detail below in conjunction with accompanying drawing,

[0026] Such as figure 1 As shown, the steps for the user to set the contact hiding function:

[0027] 101. User installs mobile phone hidden software:

[0028] This software adds a layer of shell before the program launcher of the mobile phone operating system, that is to say, the mobile phone operating system needs to run the software before starting the mobile phone function program.

[0029] 102. The user chooses to enable the hidden function of the mobile phone:

[0030] 103. The user sets the password, which is the password to enter the program. The default password is 1234. If it is no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety protection method for mobile phone information, which comprises the following steps: the user installs mobile phone hiding software; the user opens the function of mobile phone hiding; the user sets a password for entering the program; the user marks the contacts need to be hidden through a telephone directory; the marked contacts and all the information comprising the contacts which can be found in the function table are hidden by the operating system of the mobile phone. After the user sets to hide a certain contact in the telephone directory according to the information needs to be hidden, all the information of the contact is hidden. Therefore, even if the mobile phone is lost or other people are available to the mobile phone under conscious or unconscious conditions or even open the mobile phone and the files inside such as the telephone directory, the information of the set contact cannot be found.

Description

Technical field: [0001] The invention relates to the fields of computer software and mobile phone communication, in particular to the application of computer software to mobile phone communication, and in particular to a method for protecting mobile phone information security. Background technique: [0002] With the rapid development of information, mobile phones have become one of the instant messaging tools that are more and more commonly used in people's lives and work. They often communicate between mobile phones and the Internet or mobile phones, more specifically, between instant messaging clients and mobile phones. Send information between people, or send information between mobile phones, so that the contact or information exchange between people is convenient and fast. However, while wireless communication brings convenience to people, it also inevitably brings about information security issues. [0003] At present, most mobile phones only encrypt the calls of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04M1/673H04M1/725
Inventor 霍文旌
Owner BEIJING YIQI TELECOMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products