Method for improving security of mobile terminal and mobile terminal

A mobile terminal and security technology, applied in the field of information security, can solve problems such as hidden dangers of application programs or files, and achieve the effect of improving security and being easy to use

Active Publication Date: 2013-01-16
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 57 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, under the above two encryption methods, the application program or file will have an entry through which illegal users can try various methods to obtain the password. Once the password is obtained, it will bring great security risks to the application program or file

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for improving security of mobile terminal and mobile terminal
  • Method for improving security of mobile terminal and mobile terminal
  • Method for improving security of mobile terminal and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0069] see Figure 4 , in one embodiment, the setting module 301 includes:

[0070] The providing unit 301a is configured to provide the user with an application list in advance, the application list including applications installed in the mobile terminal; and / or provide the user with a file list in advance, the file list including files saved in the mobile terminal.

[0071] In another implementation manner, the control module 302 also includes:

[0072] The exit unit 302a is configured to exit the protection space and reset the object restored to the display state to the hidden state if it is detected that the preset condition is met after the object previously set to the hidden state returns to the display state.

[0073] In yet another implementation manner, the exit unit 302a is used to:

[0074] After the object preset to the hidden state returns to the displayed state, if the screen of the mobile terminal is locked, or the time of no operation in the protected space r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for improving the security of a mobile terminal and the mobile terminal, and belongs to the field of information security. The method comprises the following steps of: providing an object list for a user in advance by using the mobile terminal, setting an object selected from the object list by the user in a hidden state, and storing a protective space password set by the user; and monitoring specified application for the user to input the protective space password, entering a protective space when the user is monitored to input the protective space password from the specified application, and recovering the object preset into the hidden state into a display state, wherein the object is application and/or a file in the mobile terminal. The mobile terminal comprises a setting module and a control module. The security of the application and the file in the mobile terminal is greatly improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for improving the security of a mobile terminal and the mobile terminal. Background technique [0002] Generally, various application programs are installed in the mobile terminal, and various files are also stored. In order to improve the security of application programs and files in the mobile terminal, encryption may be used for protection. There are currently two main encryption methods: password encryption and algorithm encryption. Password encryption refers to setting a password for an application program or file in a mobile terminal. When using the application program or file, it can only be used after entering the preset password correctly. Algorithm encryption refers to the use of a specified algorithm to encrypt a file to generate a new file, such as using MD5 (Message-Digest Algorithm 5, information digest algorithm 5) to generate a unique MD5 message dig...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/31
Inventor 袁灿材徐森圣林如蓝龙磊
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products