Unlock instant, AI-driven research and patent intelligence for your innovation.
Safety control method and system of mobile terminal
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A mobile terminal and security control technology, applied in the direction of digital data authentication, etc., can solve the problem of low security performance of mobile terminals, and achieve the effect of improving security and controllability
Active Publication Date: 2013-02-06
CHINA GREATWALL TECH GRP CO LTD
View PDF6 Cites 10 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0004] The purpose of the embodiment of the present invention is to provide a security control method for a mobile terminal, aiming to solve the problem of low security performance of the existing mobile terminal based on the Android operating system
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0023] figure 1 The implementation flow of the mobile terminal security control method provided by Embodiment 1 of the present invention is shown, and the process of the method is described in detail as follows:
[0024] In step S101, after the mobile terminal system is started, the system is locked, and it is detected whether the user identification card accessed is valid, and if it is valid, the system is unlocked.
[0025] In this embodiment, after the mobile terminal (for example: mobile phone, tablet computer, etc.) system is started, in order to prevent the use of illegal users, the system is locked. Only when it is valid or legal can the system be unlocked. Wherein, the effective or legal identification card is an identification card that has been registered, key initialized and other operations in advance.
[0026] In this embodiment, the mobile terminal includes at least one identity card interface for accessing the user identity card.
[0027] In this embodiment, ...
Embodiment 2
[0045] Figure 4 The composition structure of the mobile terminal security control system provided by the second embodiment of the present invention is shown, and for the convenience of description, only the parts related to the embodiment of the present invention are shown.
[0047] The mobile terminal safety control system includes a system starting unit 41 and a system running unit 42 . Among them, the specific functions of each unit are as follows:
[0048] The system starting unit 41 is used to lock the system after the mobile terminal system is started, and detect whether the user identification card accessed is valid, and when valid, unlock the system;
[0049] The system operation unit 42 is used to detect whether there is an encrypted system image file when...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention is applied to the technical field of a mobile terminal, and provides a safety control method and a safety controlsystem of the mobile terminal. The method comprises the following steps of: starting the system, locking the system after a mobile terminal system starts, detecting whether an accessed user identification card is effective or not, and unlocking the system when the accessed user identification card is effective; running the system, detecting whether an encrypted system image file exists or not if system refreshing operation is performed during running of the system, and performing system refreshing operation after unlocking the system image file when the encrypted system image file exists; and displaying a password input interface if system application software installation operation is performed, verifying an input password, and installing application software if the verification is passed. By the safety control method and the safety control system, the safety and the controllability of the mobile terminal system can be effectively improved.
Description
technical field [0001] The invention belongs to the technical field of mobile terminals, and in particular relates to a security control method and system for a mobile terminal. Background technique [0002] With the popularity of mobile terminal devices, there are more and more types of mobile terminal operating systems. Android is an operating system developed by Google. Due to the open source nature of its code, it is being used more and more widely. [0003] However, since the original design idea of the Android operating system is an operating system based on leisure and entertainment, it has inherent defects in the security of terminal equipment. Place the system image file that needs to be refreshed in the ordinary TF. After the end user activates the refresh mode, the terminal system will automatically write the system image file in the TF card to the terminal storage device to complete the refresh of the terminal device system. There are obvious security flaws i...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.