Safety system and safety protection method for mobile terminal

A technology for mobile terminals and security systems, applied in the field of mobile terminal security systems and security protection, can solve the problems of information leakage, lack of management, and misappropriation of users, and achieve the effect of preventing personal information from being disclosed or stolen, and protecting private information.

Inactive Publication Date: 2013-09-18
TIANYI TELECOM TERMINALS
View PDF7 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current popular security settings in the market only try to solve the problem by adding a password or recovering the lost mobile terminal. However, it is obvious that once the pass

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety system and safety protection method for mobile terminal
  • Safety system and safety protection method for mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Such as figure 1 As shown, a mobile terminal security system described in this embodiment includes a user data isolation module;

[0030] The user data isolation module includes a user rights management module and a data protection module for protecting user privacy data;

[0031] The user authority management module is used to enable the user to enter the standby interface of different authority passwords;

[0032] The data protection module is arranged between the application and the database interface, and is used for managing the access authority of the application program to the user data.

[0033] Wherein, the mobile terminal security system further includes a user card identification start-up module, which is used for the mobile terminal to judge whether the identification of the user card is correct.

[0034] The database interface is SQLite interface.

[0035] The standby interface of passwords with different authority includes the standby interface of high ...

Embodiment 2

[0042] Such as figure 2 As shown, a mobile terminal security protection method described in this embodiment includes the following steps:

[0043] S1: Enter the unlock password on the lock screen interface of the mobile terminal, and enter the standby interface of different permission modes according to the password type;

[0044] S2: The data protection module of the mobile terminal receives the access requirement of the application program, and checks whether the access right and access requirement of the application program are consistent with the trusted information in the trusted list of the data protection module.

[0045] Wherein, the following steps can also be taken before the above step S1:

[0046] The mobile terminal reads the user card, and the mobile terminal judges that the user card identification is correct, and if so, starts the mobile terminal; otherwise, closes the mobile terminal.

[0047] After entering the standby interface of different permission mod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety system for a mobile terminal. The safety system comprises a user data isolation module; the user data isolation module comprises a user authority management module and a data protection module and is used for protecting privacy data of a user; the user can enter standby interfaces corresponding to different authority passwords by the aid of the user authority management module; the data protection module is arranged between application and a database interface and is used for managing user data access authority of application programs. The invention further discloses a safety protection method for the mobile terminal. The safety system and the safety protection method have the advantages that the real data can be protected by the system for the mobile terminal, personal information of the mobile terminal is prevented from being revealed or stolen, and the privacy information of the user can be effectively protected.

Description

technical field [0001] The invention relates to the communication field, in particular to a mobile terminal safety system and a safety protection method. Background technique [0002] Smart mobile terminals gradually occupy the mainstream market because of their flexible software installation and network communication, but there is also the problem of leakage of personal information of smart phone users. There is an urgent need for a system that solves security issues in an all-round way so that users can use their smart terminals with confidence. [0003] The current popular security settings in the market only try to solve the problem by adding a password or recovering the lost mobile terminal. However, it is obvious that once the password is stolen, the user information will be leaked; leak out. In addition, some malicious software steals users' personal information at will, and there is also a lack of effective management. Contents of the invention [0004] (1) Tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W88/02
Inventor 赵龙李海强马道杰李霞
Owner TIANYI TELECOM TERMINALS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products