Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protecting method and mobile terminal

A mobile terminal and privacy protection technology, applied in the field of privacy protection, can solve the problems of personal privacy information leakage, user property loss, mobile terminal loss, etc., and achieve the effect of protecting personal privacy information

Active Publication Date: 2014-03-12
HUAWEI TECH CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above-mentioned method may bring such security problems, such as the loss of the user’s mobile terminal, then other people can continue to use these software without authentication, such as sending Weibo, sending WeChat or viewing WeChat historical information, etc., thereby causing personal privacy. Leakage of information that may cause loss of user property, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protecting method and mobile terminal
  • Privacy protecting method and mobile terminal
  • Privacy protecting method and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] With the continuous development of smart mobile terminals, their applications and functions are diversified, and users can install various application software on mobile terminals. During the login process of some application software, it may be necessary to input user identity authentication information for identity authentication before entering.

[0023] In the prior art, one login method is to enter the identity authentication information for authentication every time you enter the application software. This method ensures the security of the user identity information, but compared with the mobile terminal with a smaller screen, the input efficiency is low. Bring great inconvenience to the user's use. Another login method is to remember the identity authentication information of the user after passing the first authentication, and log in to the application software directly without authentication when entering the application again. In this way, there is a certain ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a privacy protecting method and a mobile terminal. The privacy protecting method comprises the steps: receiving an instruction for entering application software by virtue of a designated user name by a mobile terminal; when identity authentication information of the designated user name is stored in the application software, obtaining a characteristic identity of a pre-stored unique identity authenticated intelligent card, wherein the authentication intelligent card is an intelligent card which is used when the identity authentication of the designated user name passes for the first time; obtaining a characteristic identity which uniquely identifies the current intelligent card from the current intelligent card in the mobile terminal; matching the authenticated intelligent card and the characteristic identity of the current intelligent card, wherein if the matching is successful, the identity authentication passes, entering the application software by virtue of the designated user name is permitted. According to the method, under the condition that the usability and experiences of a user are not lowered, the personnel privacy information stored in the mobile terminal can be effectively protected.

Description

technical field [0001] The invention relates to a privacy protection method and a mobile terminal. Background technique [0002] With the development of society, the popularization and intelligentization of mobile terminals such as mobile phones and tablet computers has also become a trend. More and more application software is installed on mobile terminals, such as WeChat, Weibo, QQ, etc. These application software save a large number of users' personal privacy information during operation. [0003] In order to protect privacy, the user is required to enter the identity authentication information for authentication when opening the application software. At the same time, for the convenience of use, these applications usually automatically remember the user's login status after the user passes the first authentication, and the user is not required to open the application software next time. Authenticate again. [0004] The above-mentioned method may bring such security pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04M1/2745H04W12/06H04W12/37H04W12/72
Inventor 郭洪志曾伟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products