Applied protection method and device

A technology of protection device and target application, applied in the field of communication systems, can solve the problems of data information leakage and low security reliability of mobile terminals, and achieve the effect of improving security reliability

Active Publication Date: 2015-08-12
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the encryption password of the application is stolen, it is easy to directly obtain the information in the application, resulting in the leakage of data information, making the security and reliability of the mobile terminal not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Applied protection method and device
  • Applied protection method and device
  • Applied protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] This embodiment provides an application protection method, such as figure 1 As shown, the method includes:

[0023] 101. The mobile terminal acquires a target application selected by a user and corresponding to an application requiring encryption.

[0024] Wherein, the target application may be pictures, files, music and so on.

[0025] 102. The mobile terminal establishes an encryption relationship between the application requiring encryption and the target application.

[0026] Wherein, the target application cannot be edited or deleted before the encryption relationship between the application requiring encryption and the target application is released, so as to ensure the reliability of the application encryption.

[0027] Furthermore, when the user needs to mark the target application that establishes an encryption relationship with the application that needs to be encrypted in order to strengthen the memory, the mobile terminal can mark the target application th...

Embodiment 2

[0040] This embodiment provides an application protection method, such as image 3 As shown, the method includes:

[0041] 301. The mobile terminal acquires a target application selected by a user and corresponding to an application requiring encryption.

[0042] Wherein, the target application may be pictures, files, music and so on.

[0043] 302. The mobile terminal establishes an encryption relationship between the application requiring encryption and the target application.

[0044] Wherein, the target application cannot be edited or deleted before the encryption relationship between the application requiring encryption and the target application is released, so as to ensure the reliability of the application encryption.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a protection method and device for an application. The method comprises the following steps: firstly enabling a mobile terminal to acquire a target application which is selected by a user and corresponds to the application to be encrypted; then enabling the mobile terminal to establish a encryption relation between the application to be encrypted and the target application; and finally, using the mobile terminal to save an encryption password of the application, which is set by the user. Thus, the encryption process of the application is completed. The invention is suitable for the field of communication systems.

Description

technical field [0001] The invention relates to the field of communication systems, in particular to an applied protection method and device. Background technique [0002] With the development of the mobile terminal, the performance of the mobile terminal is continuously improved, and at the same time, there are more and more applications in the mobile terminal, which makes the applications stored in the mobile terminal and the information in the applications need to be effectively protected. At present, when encrypting the applications in the mobile terminal, only the applications that need to be protected can be directly encrypted. However, when the encryption password of the application is stolen, it is easy to directly obtain the information in the application, thereby causing the leakage of data information, making the security reliability of the mobile terminal not high. Contents of the invention [0003] Embodiments of the present invention provide an application p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04M1/725H04M1/72403H04M1/72463
Inventor 付妮宁
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products