Method for protecting security of mobile communication terminal data and device thereof

A mobile communication terminal and data security technology, which is applied in the field of protecting mobile communication terminal data security, can solve problems such as being too simple, easy to be cracked, and insufficiently comprehensive data protection, so as to achieve the effect of protecting security and ensuring that it will not be leaked

Active Publication Date: 2010-03-17
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Among the existing methods for protecting mobile communication terminal data, some methods are: extract the data that the mobile communication terminal needs to protect and save it to a specific address in the FLASH. Although this specific address is unknown in this method, the illegal After reading the FLASH data, you can use some means to find the storage place of important information data. Since these data are not encrypted, illegals can use them

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting security of mobile communication terminal data and device thereof
  • Method for protecting security of mobile communication terminal data and device thereof
  • Method for protecting security of mobile communication terminal data and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0037] The basic idea of ​​the present invention is to set the administrator password and the restricted user password respectively, and generate the administrator key and the restricted user key respectively according to the set key algorithm; read the data of the data module that needs to be encrypted from FLASH After exiting, encrypt by the generated administrator key, and then rewrite FLASH; unlock by administrator password and decrypt by administrator key can view the data of encrypted data module; unlock by restricted user password can only view non-encrypted The data of the data module.

[0038] Specifically, after successfully unlocking through the administrator password, when viewing the data of the data module that has been encrypted by the administrator key, read the administrator key stored in FLASH for decryption; after successfully unlocking through the restricted user password , When viewing the data of the data module that has been encrypted by the administrator k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for protecting the security of mobile communication terminal data, comprising the steps: generating an administrator key by setting an administrator password; encrypting a data module which needs to be encrypted; and when starting or unlocking a lock screen, inputting a password by a mobile communication terminal, generating a temporary key with the inputted password, and checking user identification; and when viewing the data module which is encrypted by the administrator key and checking user identification as an administrator user, reading the administratorkey or the temporary key, and decrypting the data to be viewed. The invention simultaneously discloses a device for protecting the security of the mobile communication terminal data. The method can protect the security of private information in a user mobile communication terminal; and in addition, a limited user key also can be set, and a limited user only can view a non-encrypted data module, therefore, the private information can also be prevented from being leaked even if the other persons appreciate the mobile communication terminal.

Description

technical field [0001] The invention relates to the field of data security, in particular to a method and device for protecting data security of a mobile communication terminal. Background technique [0002] With the development of society, people's living standards are improving day by day, and mobile communication terminals such as mobile phones are becoming more and more popular. With the popularization of the third generation (3G) mobile communication technology, the functions of the mobile communication terminal are continuously increasing, and the stored information of the mobile communication terminal is also continuously increasing. Some stored information in the mobile communication terminal is very important to the user, and if it is obtained by others or opponents, it will have a great impact on the user. Generally, in an ordinary mobile communication terminal, important information is mainly stored in the flash memory (FLASH) of the mobile communication terminal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W12/03H04W12/041
CPCH04L63/105G06F21/602H04L63/08H04L2209/80G06F21/6218H04L9/3228H04L9/32G06F21/604H04L9/0897G06F2221/2107
Inventor 黄翠荣
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products