Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile phone data security protection method

A data security, mobile phone technology, applied in the field of information security and mobile communication, can solve problems such as inconvenience of use, and achieve the effect of protecting data

Active Publication Date: 2010-08-11
CHINA NAT SOFTWARE & SERVICE
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although there are some file or folder encryption technologies, it is very inconvenient to use. When encrypting, you need to select the encrypted file or folder, and you need to decrypt the file or folder when using it.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone data security protection method
  • Mobile phone data security protection method
  • Mobile phone data security protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Hereinafter, the present invention will be described in detail through specific embodiments in conjunction with the accompanying drawings.

[0018] This embodiment provides a specific system for implementing the method of the present invention, which includes three major modules: a file creation module, a file loading module, and a file operation module, wherein the specific functional units included in each module are as follows:

[0019] The file creation module is used to create a virtual disk file on the mobile phone, and format the created virtual disk file according to a specific format according to the information input and selected by the user. The file creation module includes a file header generating component, a file content generating component and a formatting component. Among them, the file header includes several parts of information such as file identification, storage name, key, and encryption algorithm. The file header generation component generates t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile phone data security protection method, and belongs to the technical fields of information security and mobile communication. The method comprises the following steps: a) creating a virtual disk file on a mobile phone, wherein the virtual disk file comprises a file head part and a file content part, the file head part comprises an encryption algorithm one and a key one, the file content part is used for storing data, the data is encrypted and stored through the encryption algorithm one and the key one, and the file head part is encrypted and stored through an encryption algorithm two and a key two; b) loading the virtual disk file on the mobile phone, and decrypting the file head part through the encryption algorithm two and the key two in the loading process; and c) after the virtual disk file is loaded, when reading the data stored by the file content part, decrypting the read data and outputting the data, and when writing data into the file content part, encrypting the data written in and storing the data in the file content part, wherein the encryption and decryption are performed through the encryption algorithm one and the key one. The method can be used for mobile phone data security protection.

Description

technical field [0001] The invention relates to a mobile phone, in particular to a mobile phone data security protection method, which belongs to the technical fields of information security and mobile communication. Background technique [0002] The security protection of data on mobile phones has attracted more and more attention. In the known prior art, there are many methods for protecting mobile phone information, but generally selected files or folders are encrypted. For example, the patented invention "Secret Processing Method of Mobile Information" (200710172338) is to select files or folder nodes on the file directory tree of the mobile phone to set encryption or de-encryption, so as to achieve the confidential processing of mobile phone information. [0003] With the promotion of 3G technology and the popularity of smart phones, the functions of mobile phones are becoming more and more powerful. Mobile phones are not only used for personal consumption, but also fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M1/725H04L9/06H04M1/72436
Inventor 马剑张志磊
Owner CHINA NAT SOFTWARE & SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products