Method and device for encrypting mobile terminals

A mobile terminal and password technology, applied in security devices, electrical components, wireless communications, etc., can solve the problem that user information cannot be protected in more detail, and achieve the effect of improving user experience, protecting information security, and meeting humanized needs.

Inactive Publication Date: 2011-09-28
SHENZHEN WUJU SCI TECH
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a mobile terminal encryption method and device, aiming to solve the problem in the prior art that user information cannot be more carefully protected because the functional modules in the mobile terminal do not have the function of setting passwords

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for encrypting mobile terminals
  • Method and device for encrypting mobile terminals
  • Method and device for encrypting mobile terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0024] see figure 1 , is a flow chart of the mobile terminal encryption method according to the first embodiment of the present invention. The mobile terminal encryption method of the first embodiment of the present invention comprises the following steps:

[0025] Step 100: Set encryption attribute values ​​for user numbers that need to be encrypted in the mobile terminal address book;

[0026] In step 100, an attribute is extended in the address book of the mobile terminal, that is, the attribute encrypted by the function module. By default, the attribute value is empty, indicating that the rel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of mobile terminals, and particularly relates to a method and device for encrypting the mobile terminals. The method comprises the following steps: step a. setting an encryption attribute value to a user number needs to be encrypted in a mobile terminal address list; step b. judging whether the encryption attribute value is set on a short message sending number or a calling number after the short message is received or the call is finished, if the encryption attribute value is not set on the short message sending number or the calling number, saving the short message content or the calling content in a short message list or calling record, and reminding users that a new short message reaches or a call is performed, and if the encryption attribute value is set on the short message sending number or the calling number, executing the step c; and step c; increasing an encryption bit zone in the short message or the calling attribution, and carrying out encryption processing on the content of the short messages or the calling record, a sender, a sending number or a calling person and the calling number. By utilizing the method and device, the condition that the private information of a user is checked or leaked by others at will is avoided, the information safety of the user is further protected, the humanized requirements of the user is satisfied, and the use experience of the user is improved.

Description

technical field [0001] The invention belongs to the technical field of mobile terminals, and in particular relates to a mobile terminal encryption method and device. Background technique [0002] With the development of mobile terminal technology, most of the current mobile terminals can set a power-on password to protect the user's information security, but after entering the mobile terminal, other functional modules do not have the function of setting a password, resulting in the user's personal Information cannot be protected at a more granular level. For example: some information with a certain degree of privacy, such as salary reminder text messages, private information of friends, user call records and other information that is inconvenient to be known to others, once the mobile phone is used by others, it is easy to leak out. In order not to disclose this information, the existing operation is to manually delete these private information before the mobile terminal is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W88/02
Inventor 鲁林
Owner SHENZHEN WUJU SCI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products