Method for protecting mobile phone information security

A mobile phone information and security technology, applied in the direction of telephone communication, branch equipment, electrical components, etc., can solve problems such as user losses, and achieve the effect of preventing losses

Inactive Publication Date: 2011-05-04
SHENZHEN SANG FEI CONSUMER COMM CO LTD
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the user loses the mobile phone, if the information stored on the mobile

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting mobile phone information security
  • Method for protecting mobile phone information security
  • Method for protecting mobile phone information security

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0025] like figure 1 As shown, in an embodiment of a method for protecting mobile phone information security of the present invention, the method includes the following steps:

[0026] S1. Enter the phone menu, select the folder that needs to be protected by information, such as figure 2 ;

[0027] S2. Set the associated operation to hide "video", such as long pressing the "*" key; in order to prevent misoperation, the system performs the following steps:

[0028] S2.1. The system asks the user whether to set the long-press "*" key as the associated operation of this file, such as image 3 ;

[0029] S2.2. If no, return to the folder interface; if yes, go to step S3.

[0030] S3. If the associated operation is not used, the system records the associated operation and hides the folder, as shown in the figure;

[0031] S4, if the associated operation has been used, the system informs the user that the associated operation has a corresponding folder; the user changes the as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for protecting mobile phone information security, which comprises the following steps of: S1, entering a mobile phone menu, and selecting a folder which needs information protection; S2, setting a concealment associated operation; S3, if the associated operation is not used, recording associated operations by a system, and concealing the folder; S4, if the associated operation is used, informing a user that the associated operation has a corresponding folder through the system, changing the associated operation by the user, returning to the step S2, and resetting the associated operation; and S5, if the user expects to query the concealed folder, only executing the set associated operation under a concealed interface, and recovering the display of the corresponding folder by the mobile phone system. The method ensures the security of the personal information stored in a user mobile phone to avoid loss of the user due to information divulgence.

Description

technical field [0001] The invention relates to the field of mobile communication, more specifically, to a method for protecting mobile phone information security. Background technique [0002] At present, mobile phones have become an indispensable tool in people's daily life. With the release of Apple's Iphone, mobile phones with large storage space have been favored by users. A mobile phone can store all personal and private information of users, and has become The mobile hard disk that the user carries with him. [0003] In this information age, mastering a person's mobile phone is basically equivalent to mastering a person's basic information. If the user loses the mobile phone, if the information stored on the mobile phone is used by others, it may cause a lot of unnecessary losses to the user. Therefore, the information security of mobile phones becomes particularly important. [0004] How to ensure the security of the personal information stored in the mobile phone...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/725H04M1/72448
Inventor 李伟王秀志
Owner SHENZHEN SANG FEI CONSUMER COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products