Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information security management method and mobile terminal

A management method and information security technology, applied in the field of information security management methods and mobile terminals, can solve problems such as memory errors, user inconvenience, loss, etc., and achieve effective and safe information protection

Inactive Publication Date: 2013-06-19
KONKA GROUP
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This type of method requires the user to remember the corresponding password information. When the user makes a memory error or unintentionally leaks the secret or is subjected to violent cracking, it will bring great inconvenience and loss to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security management method and mobile terminal
  • Information security management method and mobile terminal
  • Information security management method and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] Please refer to figure 1 , is a schematic flowchart of the first embodiment of the information security management method of the present invention, the method includes:

[0030] S11. Collect face data. The face data includes: at least one feature point information.

[0031] Among them, the feature point information includes: eye size information, eye shape information, lip size information, lip shape information, eyebrow size information, eyebrow shape info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security management method. The information security management method comprises the following steps: human face data are collected; feature point information in the human face data is extracted, the feature point information is matched with feature point information in human face data in a password bank, and matching degree of the collected human face data and the human face data in the password bank is determined; and if the matching degree is larger than a first matching value, encrypted information is allowed to be visited. The invention further discloses a mobile terminal. By adopting the information security management method and the mobile terminal, information security on the mobile terminal can be protected effectively and safely.

Description

technical field [0001] The present invention relates to the field of information security, in particular to an information security management method and a mobile terminal. Background technique [0002] With the development and popularization of mobile terminals, mobile terminals such as mobile phones and handheld computers have brought great convenience to people's daily life and work, but it is accompanied by frequent occurrence of user information leakage incidents, which often bring users A series of serious consequences will make the security and confidentiality of mobile terminal information urgently need to be strengthened. Existing mobile terminals will provide relatively simple encryption and decryption mechanisms, such as a set of special buttons, a set of passwords, or a set of special touch-screen sliding sequences. For example, users can set passwords for the information they want to protect, and when they need to access Enter the preset password to decrypt the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06K9/00
Inventor 李琴
Owner KONKA GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products