Method for confidentiality of customer identification card data and its mobile terminal

A customer identification card, mobile terminal technology, applied in the protection of internal/peripheral computer components, telephone communication, electrical components, etc., can solve problems such as inconvenience, and achieve the effect of unlocking icon confidentiality and data confidentiality

Active Publication Date: 2016-09-21
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In summary, the existing customer identification card data security technology obviously has inconvenience and defects in actual use, so it is necessary to improve it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for confidentiality of customer identification card data and its mobile terminal
  • Method for confidentiality of customer identification card data and its mobile terminal
  • Method for confidentiality of customer identification card data and its mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0046] see figure 1 , in the first embodiment of the present invention, a mobile terminal 100 is provided, including:

[0047] An encryption module 10, configured to encrypt at least one customer identification card in the mobile terminal 100, and correspondingly generate at least one customer identification card decryption icon;

[0048] The hiding module 20 is used for hiding the decryption icon of the customer identification card.

[0049] In this embodiment, the encryption module 10 encrypts at least one SIM card in the mobile terminal 100 according to the needs of the user, and corresponding...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention is applicable to the technical field of communication, and provides a method for keeping customer identification card information confidential and a mobile terminal thereof. The method includes: an encryption step, encrypting at least one customer identification card, and correspondingly generating at least one customer identification card for decryption Icon; hiding step, hiding the decryption icon of the customer identification card. In this way, the confidentiality of the information on the customer identification card is realized.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method for keeping data of a customer identification card confidential and a mobile terminal thereof. Background technique [0002] The mobile terminal has multiple answering modes, such as outdoor mode, conference mode or silent mode, etc., but no matter which answering mode can hide the call record. To hide some SIM (Subscriber Identity Module, customer identification card) information such as call records, you need to enter the private mode of the mobile terminal to manually set information or contacts and other customer identification card data information to a private state, and batch private setting operations cannot be performed. There is no way to automatically make newly received messages private immediately. At the same time, a mobile terminal set in a private mode is usually easy to be discovered by other non-mobile terminal users to work in the private mode,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/725G06F21/77H04M1/72448H04M1/72463
Inventor 胡健昌
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products