File security method, system and mobile terminal

A technology of a security method and a security system, which is applied in the field of systems and mobile terminals and file security methods, can solve problems such as practical inconvenience, achieve the effect of preventing illegal access and operation, and protecting storage security

Inactive Publication Date: 2011-01-19
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF9 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In summary, the existing file security technology of mobile terminals ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File security method, system and mobile terminal
  • File security method, system and mobile terminal
  • File security method, system and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0039] figure 1 Shows the structure of the file security system provided by the present invention, the system 10 is preferably applied to a mobile terminal 100, the mobile terminal 100 can be a mobile phone or a PDA, etc., and the mobile terminal 100 includes a plurality of functional modules for realizing different application functions 20, such as camera module, camera module, recording module, office software module, download module, etc. The file protection system 10 mainly includes:

[0040] The private file setting module 11 is used to set the confidentiality type of the file and notify all...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applied in the technical field of communication, and provides a file security method, a file security system and a mobile terminal. The file security system comprises a private file setting module, a private file judgment module and a private file hiding module, wherein the private file setting module is used for setting the security types of files; the private file judgment module is used for judging the types of newly-generated files and storing the newly-generated files as private files if the newly-generated files belong to the security types; and the private file hiding module hides the private files in real time. Therefore, the method and the system can hide in real time the private files, such as photos, videos, diaries and the like, newly generated by the mobile terminal to prevent the private files from being illegally accessed and operated by other users and effectively protect the storage security of the private files of a user.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a file security method, system and mobile terminal. Background technique [0002] The development of modern communication technology has brought convenient and fast communication services to people, especially the emergence of mobile terminals enables people to communicate anytime and anywhere, so mobile terminals have gradually become an essential tool in people's lives. When the user uses the function modules of application functions such as photographing, video recording, recording, office software, and downloading in the mobile terminal, the files generated by the function modules will be directly stored in the memory of the mobile terminal. These files can be viewed, edited, and deleted through functional modules such as file browser, photo taking, recording, and office software, and can also be transferred through functional modules such as Bluetooth, MMS, and email....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/725H04M1/667H04M1/72403
Inventor 石爱民
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products