Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for realizing mobile phone information safety protection mechanism

A technology for security protection and mobile phone information, which is applied in the field of mobile phone communication, can solve the problems that the mobile phone is unwilling to be seen by others, and the function is not expected to be used by others, so as to achieve the effect of protecting information security

Inactive Publication Date: 2012-04-11
SHENZHEN KONKA TELECOMM TECH
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the user loses the mobile phone, the mobile phone falls into the hands of others, and the information stored on the mobile phone is used by others, it may cause many unnecessary losses to the user. At the same time, with the popularization of mobile phones, the speed of people replacing mobile phones is also significantly accelerated. It is not new for a person to have multiple mobile phones and multiple mobile phone cards, and the mobile phones eliminated by users are often used by others, or because of the exchange of mobile phones to experience the functions of different mobile phones, there are often mobile phones. Some information you don’t want to be seen by others or some functions you don’t want others to use, so in this case, the security management of mobile phones is particularly important

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing mobile phone information safety protection mechanism
  • Method and system for realizing mobile phone information safety protection mechanism
  • Method and system for realizing mobile phone information safety protection mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0030] The invention provides a method for realizing a mobile phone information security protection mechanism, such as figure 1 As shown, which mainly includes the following steps:

[0031] Step S100 , divide the functions of the mobile phone into basic functions and authorized functions in advance, and define the basic function mode and the authorized function mode respectively according to the basic functions and authorized functions.

[0032] The authorized function modes include: a first-level authorized function mode, a second-level authorized function mode, a third-level authorize...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for realizing a mobile phone information safety protection mechanism. Through separating all functions of a mobile phone into basic functions and authorization functions in advance, basic function modes and authorization function modes are respectively defined according to the basic functions and the authorization functions, corresponding grade of authorization function mode is opened through a mobile phone authorization module according to a password of a user, so that the user uses a special mobile phone function, realizes intelligent safe management of the mobile phone function, and prevents others from using some specific functions under the condition of no authorization, thus information safety of the mobile phone is better protected.

Description

technical field [0001] The invention relates to the field of mobile phone communication, in particular to a method and system for realizing a mobile phone information security protection mechanism. Background technique [0002] The mobile phone has become an indispensable and important tool in people's daily life, and it can store almost all personal and private information of users. If the user loses the mobile phone, the mobile phone falls into the hands of others, and the information stored on the mobile phone is used by others, it may cause many unnecessary losses to the user. At the same time, with the popularization of mobile phones, the speed of people replacing mobile phones is also significantly accelerated. It is not new for a person to have multiple mobile phones and multiple mobile phone cards, and the mobile phones eliminated by users are often used by others, or because of the exchange of mobile phones to experience the functions of different mobile phones, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M1/725H04M1/72448
Inventor 欧阳立斌
Owner SHENZHEN KONKA TELECOMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products