Method for protecting security of mobile communication terminal data and device thereof
A mobile communication terminal and data security technology, which is applied in the field of protecting mobile communication terminal data security, can solve problems such as being too simple, easy to be cracked, and insufficiently comprehensive data protection, so as to achieve the effect of protecting security and ensuring that it will not be leaked
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0037] The basic idea of the present invention is to set the administrator password and the restricted user password respectively, and generate the administrator key and the restricted user key respectively according to the set key algorithm; read the data of the data module that needs to be encrypted from FLASH After exiting, encrypt by the generated administrator key, and then rewrite FLASH; unlock by administrator password and decrypt by administrator key can view the data of encrypted data module; unlock by restricted user password can only view non-encrypted The data of the data module.
[0038] Specifically, after successfully unlocking through the administrator password, when viewing the data of the data module that has been encrypted by the administrator key, read the administrator key stored in FLASH for decryption; after successfully unlocking through the restricted user password , When viewing the data of the data module that has been encrypted by the administrator k...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap