Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for protecting data

A technology for protecting data and user data, applied in electrical components, transmission systems, etc., to solve problems such as user inconvenience and the inability of the owner to unlock it.

Active Publication Date: 2015-11-25
XIAOMI INC
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Obviously, after the mobile device is locked, the owner himself cannot unlock it, which brings inconvenience to the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for protecting data
  • A method and device for protecting data
  • A method and device for protecting data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not used to limit the present invention.

[0028] In this embodiment, the user data is locked when the identification card bound to the device is not detected, thereby ensuring the safety and non-disclosure of the user data. And through the authentication method to provide users with an unlocking way, so that users can continue to use the data.

[0029] See figure 1 The main method flow of data protection in this embodiment is as follows:

[0030] Step 101: After the operating system is running, check whether there is an identification card bound to the device.

[0031] Step 102: If the identification card bound to the device is not checked, the operating system locks the user data. If the identification card bound to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for protecting data, which are used for improving the security of the data. The method comprises the following steps: an operating system examines whether an identification card bound with equipment exists or not after operation; if not, the operating system locks user data; the operating system outputs an authentication prompt to a user; and the operating system authenticates authentication information input by the user and processes the locked user data according to the authentication result. The invention also discloses a device for implementing the above method.

Description

Technical field [0001] The present invention relates to the technical field of computer and information security, in particular to a method and device for protecting data. Background technique [0002] With the rapid development of electronic technology, various electronic products have flooded people's lives. Among them, mobile terminals provide people with various convenient services through their intelligent advantages. However, subsequently, information security has become the focus of attention, and more and more attention is paid to privacy protection. [0003] At present, when a mobile terminal is lost, the content of the lost mobile terminal is extremely easy to leak to others, which will adversely affect the owner. An effective method is to bind the SIM (SubscriberIdentity Module) card to the mobile device, and lock the screen of the mobile device when it is found that the inserted SIM card is not a bound SIM card, so that others cannot use the mobile terminal. [0004] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 万钰臻孙鹏金凡
Owner XIAOMI INC