Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal information security method and device

A technology of terminal information and confidentiality method, which is applied in the field of mobile communication and can solve the problems of unfavorable protection of user's personal privacy

Active Publication Date: 2017-09-12
ZTE CORP
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention provides a terminal information security method and device to solve the problem in the prior art that using a separate area to store secret information allows others to easily know that the mobile phone has stored secret information, which is not conducive to protecting the user's personal privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal information security method and device
  • Terminal information security method and device
  • Terminal information security method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to solve the problem of using a separate area to store secret information in the prior art so that others can easily know that the mobile phone has stored secret information, which is not conducive to protecting the privacy of the user, the present invention provides a terminal information security method and device. The present invention implements The technical solution of the example proposes the concept of password authority, that is to say, by distinguishing whether the password entered by the user is a super password or a restricted password, different interfaces and information under corresponding authority and corresponding information messages are displayed respectively. The technical solution of the embodiment of the present invention also proposes a method for processing unauthorized information by a restricted login person under restricted password login. The present invention will be described in further detail below in conjunction with the accompan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal information security method. The method includes: creating a first password and one or more second passwords for the terminal information, and setting authorization information and unauthorized information according to the terminal information; if the login user logs in with the second password, at the foreground of the terminal, operation, displaying the information of normal processing of authorized information and / or unauthorized information, and executing the operation of the logged-in user on the authorized information in the background of the terminal, and intercepting the operation of the logged-in user on the unauthorized information; if the logged-in user uses the first password After logging in, in the foreground and background of the terminal, according to the operation of the logged-in user, normal processing of authorization information and unauthorized information is displayed and executed. By means of the technical solution of the present invention, the private information in the user terminal can be completely and unobtrusively protected from being stolen by others.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a terminal information security method and device. Background technique [0002] In today's fast-paced work and life, mobile phones have become an indispensable tool. The rapid development of news services has greatly facilitated people's work and life, but the hidden dangers of security have become increasingly prominent. At present, in the existing technology, some mobile phones have the function of protecting and encrypting message services, mainly in the following ways: [0003] Method 1, use a password to encrypt one or more message services, and the user needs to enter the password when viewing the specified message. The above technical solution is easy to implement, but there are also obvious defects: if other people get the mobile phone, they can see some relevant information of the encrypted message during the browsing process, such as: sending time, sender, etc., s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W88/02
CPCH04L9/3226
Inventor 安昌华
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products