Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety control method and system of mobile terminal

A mobile terminal and security control technology, applied in the direction of digital data authentication, etc., can solve the problem of low security performance of mobile terminals, and achieve the effect of improving security and controllability

Active Publication Date: 2013-02-06
CHINA GREATWALL TECH GRP CO LTD
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiment of the present invention is to provide a security control method for a mobile terminal, aiming to solve the problem of low security performance of the existing mobile terminal based on the Android operating system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety control method and system of mobile terminal
  • Safety control method and system of mobile terminal
  • Safety control method and system of mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] figure 1 The implementation flow of the mobile terminal security control method provided by Embodiment 1 of the present invention is shown, and the process of the method is described in detail as follows:

[0024] In step S101, after the mobile terminal system is started, the system is locked, and it is detected whether the user identification card accessed is valid, and if it is valid, the system is unlocked.

[0025] In this embodiment, after the mobile terminal (for example: mobile phone, tablet computer, etc.) system is started, in order to prevent the use of illegal users, the system is locked. Only when it is valid or legal can the system be unlocked. Wherein, the effective or legal identification card is an identification card that has been registered, key initialized and other operations in advance.

[0026] In this embodiment, the mobile terminal includes at least one identity card interface for accessing the user identity card.

[0027] In this embodiment, ...

Embodiment 2

[0045] Figure 4 The composition structure of the mobile terminal security control system provided by the second embodiment of the present invention is shown, and for the convenience of description, only the parts related to the embodiment of the present invention are shown.

[0046] The mobile terminal security control system may be a software unit, a hardware unit or a combination of software and hardware running in a mobile terminal (such as a mobile phone, a tablet computer, etc.).

[0047] The mobile terminal safety control system includes a system starting unit 41 and a system running unit 42 . Among them, the specific functions of each unit are as follows:

[0048] The system starting unit 41 is used to lock the system after the mobile terminal system is started, and detect whether the user identification card accessed is valid, and when valid, unlock the system;

[0049] The system operation unit 42 is used to detect whether there is an encrypted system image file when...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is applied to the technical field of a mobile terminal, and provides a safety control method and a safety control system of the mobile terminal. The method comprises the following steps of: starting the system, locking the system after a mobile terminal system starts, detecting whether an accessed user identification card is effective or not, and unlocking the system when the accessed user identification card is effective; running the system, detecting whether an encrypted system image file exists or not if system refreshing operation is performed during running of the system, and performing system refreshing operation after unlocking the system image file when the encrypted system image file exists; and displaying a password input interface if system application software installation operation is performed, verifying an input password, and installing application software if the verification is passed. By the safety control method and the safety control system, the safety and the controllability of the mobile terminal system can be effectively improved.

Description

technical field [0001] The invention belongs to the technical field of mobile terminals, and in particular relates to a security control method and system for a mobile terminal. Background technique [0002] With the popularity of mobile terminal devices, there are more and more types of mobile terminal operating systems. Android is an operating system developed by Google. Due to the open source nature of its code, it is being used more and more widely. [0003] However, since the original design idea of ​​the Android operating system is an operating system based on leisure and entertainment, it has inherent defects in the security of terminal equipment. Place the system image file that needs to be refreshed in the ordinary TF. After the end user activates the refresh mode, the terminal system will automatically write the system image file in the TF card to the terminal storage device to complete the refresh of the terminal device system. There are obvious security flaws i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/34
Inventor 刘欣房贾兵宋靖林诗达王淼刘金萍
Owner CHINA GREATWALL TECH GRP CO LTD