Hand-held equipment data encryption and decryption method and hand-held equipment peripheral equipment thereof

A handheld device and encryption method technology, applied in the fields of digital data protection, electrical digital data processing, instruments, etc., can solve problems such as hidden dangers of handheld devices, and achieve the effect of improved security and strong practicability

Inactive Publication Date: 2012-01-25
NATIONZ TECH INC
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But at the same time, the security of data information stored locally on handheld devices has brought new problems to people, especially address books, text messages, pictures that involve personal privacy, emails that involve commercial secrets, and electronic contracts. Wait, these data are very important. Once stolen, it will bring major security risks to users of handheld devices such as mobile phones and PDAs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hand-held equipment data encryption and decryption method and hand-held equipment peripheral equipment thereof
  • Hand-held equipment data encryption and decryption method and hand-held equipment peripheral equipment thereof
  • Hand-held equipment data encryption and decryption method and hand-held equipment peripheral equipment thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0047] The flow chart of the handheld device data security encryption method of the present invention is as figure 1 As shown, the process is as follows:

[0048] Step 1: Determine whether the handheld device peripherals with hardware encryption and decryption functions are connected to the handheld device, if yes, perform step 3, otherwise perform step 2;

[0049] Step 2: Connect the handheld device to the handheld device peripherals with hardware encryption and decryption functions, and perform step 3;

[0050] Step 3: Determine whether a private data group has been created, if yes, go to step 5, otherwise go to step 4;

[0051] Step 4: Create a private data group and execute Step 5;

[0052] Step 5: Create, ad...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a hand-held equipment data encryption and decryption method and hand-held equipment peripheral equipment with encryption and decryption functions. In the hand-held equipment data encryption and decryption method, the hand-held equipment peripheral equipment with the encryption and decryption functions is used for encrypting and decrypting private data in the hand-held equipment, when the encryption and the decryption are completed, the hand-held equipment peripheral equipment with the encryption and decryption functions can be physically separated from the hand-held equipment, when the hand-held equipment is not connected with the hand-held equipment peripheral equipment with the encryption and decryption functions, the private data in the hand-held equipment can not be encrypted, and the encrypted data can not be decrypted, so the security of the encrypted data is ensured. A key used during the encryption and the decryption is stored in the hand-held equipment peripheral equipment with the encryption and decryption functions and is bound with the hand-held equipment peripheral equipment, and the security and the uniqueness of the encryption key are ensured.

Description

technical field [0001] The present invention relates to the technical field of handheld devices, in particular to a data security encryption and decryption method of the handheld device and peripherals of the handheld device with encryption and decryption functions. Background technique [0002] With the increasing maturity of mobile communication technology and the rapid development of handheld devices such as mobile phones and PDAs, the functions of handheld devices are becoming more and more powerful. In addition, it has the advantage of being more portable, which is deeply loved by the public. But at the same time, the security of data information stored locally on handheld devices has brought new problems to people, especially address books, text messages, pictures that involve personal privacy, emails that involve commercial secrets, and electronic contracts. And so on, these data are very important, once stolen will bring great hidden danger to the user of handheld d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24H04W12/02G06F21/62
Inventor 胡荣英陈官学
Owner NATIONZ TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products