Method and system for implementing mobile phone information security protection mechanism

A technology for security protection and mobile phone information, applied in the field of mobile communication, it can solve the problems that the mobile phone is unwilling to be seen by others, and the functions are not expected to be used by others, so as to achieve the effect of protecting information security.

Inactive Publication Date: 2016-06-29
SHENZHEN KONKA TELECOMM TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the user loses the mobile phone, the mobile phone falls into the hands of others, and the information stored on the mobile phone is used by others, it may cause many unnecessary losses to the user. At the same time, with the popularization of mobile phones, the speed of people replacing mobile phones is also significantly accelerated. It is not new for a person to have multiple mobile phones and multiple mobile phone cards, and the mobile phones eliminated by users are often used by others, or because of the exchange of mobile phones to experience the functions of different mobile phones, there are often mobile phones. Some information you don’t want to be seen by others or some functions you don’t want others to use, so in this case, the security management of mobile phones is particularly important

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing mobile phone information security protection mechanism
  • Method and system for implementing mobile phone information security protection mechanism
  • Method and system for implementing mobile phone information security protection mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the objectives, technical solutions and advantages of the present invention clearer and clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0030] The present invention provides a method for implementing a mobile phone information security protection mechanism, such as figure 1 As shown, which mainly includes the following steps:

[0031] In step S100, each function of the mobile phone is divided into basic functions and authorized functions in advance, and the basic function mode and authorized function mode are respectively defined according to the basic functions and authorized functions.

[0032] The authorization function mode includes: a first-level authorization function mode, a second-level authorization function ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for realizing a mobile phone information security protection mechanism. By pre-dividing the functions of the mobile phone into basic functions and authorized functions, and according to the basic functions and authorized functions, the basic function mode and the authorized function mode are respectively defined. The mobile phone authorization module enables the corresponding level of authorization function mode according to the user's password instruction, for the user to use specific mobile phone functions, realizes the intelligent security management of mobile phone functions, and prevents others from using some specific mobile phone functions without authorization. Function. It protects the information security of the mobile phone very well.

Description

Technical field [0001] The invention relates to the field of mobile phone communication, and in particular to a method and system for implementing a mobile phone information security protection mechanism. Background technique [0002] The mobile phone has become an indispensable tool in people's daily life. It can store almost all the private information of the user. If the user loses the mobile phone, the mobile phone falls into the hands of others, and the information stored on the mobile phone is used by others, it may cause a lot of unnecessary losses to the user. At the same time, with the popularity of mobile phones, the speed at which people replace mobile phones has also increased significantly. It is not new for a person to own multiple mobile phones and multiple mobile phone cards, and the mobile phones eliminated by users are often used by others, or to experience the functions of different mobile phones, exchanges of mobile phones also occur from time to time, but the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30H04M1/72448
Inventor 欧阳立斌
Owner SHENZHEN KONKA TELECOMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products