Handheld smart device data security protection method

A smart device and data security technology, applied in the field of data security, can solve problems such as failure to achieve the desired effect, and achieve the effect of fewer security holes and simple and reliable processing

Active Publication Date: 2012-10-10
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF7 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These softwares guarantee the safety of mobile phones and the privacy of users to a large extent, but there are still relatively large loopholes. For example, the privacy protection function on these softwares can lock the program. When the user locks the file manager, It is necessary to enter a password before accessing the file system on the mobile phone, which theoretically prevents the user's private files from being leaked and protects the user's privacy, but at this time, you can still browse or copy the files in the mobile phone on the computer through the USB function of the mobile phone , or reinstall a file manager to access the file system in the user's mobile phone normally
Therefore, the previous privacy protection function did not have the desired effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Handheld smart device data security protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] At first, illustrate the privacy protection measure of preferred embodiment of the present invention:

[0027] 1. When changing the state of the mobile phone privacy protection mode, it is necessary to enter a password for verification. If the number of input errors is greater than the previously set value, the current state of the mobile phone privacy protection mode cannot be changed within the set time;

[0028] 2. When the mobile phone is in the privacy protection state, disable the U disk function of the mobile phone, which can prevent the user's private information from being maliciously copied or browsed;

[0029] 3. When the mobile phone is in the privacy protection state, it is forbidden to install and uninstall the mobile phone software, so as to prevent the software on the mobile phone from being arbitrarily uninstalled or installed by others, resulting in the theft of private information or the destruction of the system;

[0030] 4. It is forbidden to instal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a handheld smart device data security protection method, comprising steps that: whether a password input by a user through human-computer interaction is correct is judged and if so, a setting of a privacy protection status is changed, and if not, the setting of the privacy protection status remains unchanged; and according to a true record of the privacy protection status, device file management software and protected software are hidden, and otherwise, the device file management software and the protected software are shown and used normally. The method of the invention further comprises steps that: 1101) connection between the handheld smart device and a computer via a USB port is detected and judged; 1102) whether the device is in the privacy protection status is judged and if so, a user interface entrance which has a U disc using function is hidden and a logic code of opening the U disc is not performed; and otherwise, normal operation is carried out; 1201) installation or unloading of application software is detected and judged; and 1202) whether the device is in the privacy protection status is judged, and if so, a user operation instruction or a logic code for the installation or unloading is not performed; and otherwise, normal installation or unloading is performed.

Description

technical field [0001] The invention relates to data security technology, in particular to a data security protection method of a hand-held smart device, especially applied to a smart phone. Background technique [0002] Smartphones have become an indispensable part of people's life for taking photos, sending microblogs, and checking information anytime and anywhere. However, while smartphones bring infinite convenience, how to prevent leaks and protect users' privacy has become an important part of everyone's life in the smartphone era. Hot spots of concern. As a result, security management software for mobile phones such as 360 Guard, Security Manager, and Mobile Manager emerged as the times require. These softwares guarantee the safety of mobile phones and the privacy of users to a large extent, but there are still relatively large loopholes. For example, the privacy protection function on these softwares can lock the program. When the user locks the file manager, It is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00
Inventor 曾元清
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products