Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal and method for protecting user information against leakage

A user information and user technology, applied in the electronic field, can solve problems such as inability to assist equipment safety detection, and achieve the effect of not being easily leaked and ensuring safety

Active Publication Date: 2014-07-02
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a terminal and method for preventing leakage of user information, which solves the problem in the prior art that the security detection of the operating environment cannot be performed on auxiliary equipment interacting with terminal information, thereby ensuring that terminal information is not leaked. In order to solve the above Problem, the present invention adopts following technical scheme:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal and method for protecting user information against leakage
  • Terminal and method for protecting user information against leakage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described in detail below through specific embodiments in conjunction with the accompanying drawings.

[0027] Such as figure 1 Shown is a structural diagram of a terminal for preventing user information leakage in this embodiment, please refer to figure 1 , the terminal 100 includes: a communication module 101, a safety detection module 102 and a control module 103, wherein the communication module 101 is used to receive a communication request signal from an auxiliary device; the safety detection module 102 is used to receive the communication request signal according to the received communication request signal and the pre-stored safety feature library to perform safety detection on the operating environment of the auxiliary device; the control module 103 is configured to analyze and process the communication request signal when the detection result of the safety detection module 102 is safe. The communication request signal inc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal and method for protecting user information against leakage. The terminal comprises a communication module, a safety detection module and a control module. The communication module is used for receiving communication request signals of an auxiliary device. The safety detection module is used for carrying out safety detection on the running environment of the auxiliary device according to the received communication request signals and a prestored safety characteristic bank. The control module is used for carrying out analysis processing on the communication request signals when a detection result of the safety detection module is safe. According to the scheme, the problem that in the prior art, running environment safety detection can not be carried out on the auxiliary device in information interaction with the terminal is solved, and therefore it is guaranteed that the terminal information can not be leaked.

Description

technical field [0001] The invention relates to the electronic field, in particular to a terminal and a method for preventing leakage of user information. Background technique [0002] At present, with the development of the terminal, more and more operations involving personal privacy or personal property can be conveniently completed in the terminal, for example, setting various confidential applications or files on the mobile phone, such as the mobile phone QQ, WeChat payment, mobile banking, private photos, customer information, company secrets such as office documents, etc. Therefore, preventing the leakage of terminal information is a problem that users are very concerned about. In the prior art, it is often used to remind the user whether there is a program in the terminal itself or whether the user has a harmful plug-in when browsing the web using the terminal. This program or web page needs to be processed, especially when the terminal has root (super-privileged us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/50G06F21/57
CPCG06F21/6245
Inventor 阳得常
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products