Mobile terminal and method and system for protecting individual information of mobile terminal
An information protection and mobile terminal technology, applied in the field of mobile communications, can solve the problem of low security of personal information, achieve the effect of improving security and preventing malicious software from obtaining personal information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] Such as figure 1 As shown, a personal information protection method provided by an embodiment of the present invention is applied to a mobile terminal including a secure element, and the method includes:
[0038] S101. Acquire a password input by a user when a protected object of the mobile terminal is accessed.
[0039] Specifically, the protected object is an encrypted file stored in the storage space of the mobile terminal in the form of ciphertext. When the user accesses the protected object, the mobile terminal prompts the user to enter a password as the decryption password for accessing the protected object through the man-machine interface. The password entered by the user includes but is not limited to any of the following: first, the user enters the corresponding symbol on the interface as the password; second, the user's biometric information is collected through the sensor of the mobile terminal, and the key feature information of the biometric information is...
Embodiment 2
[0048] Such as figure 2 As shown, a personal information protection method provided by a preferred embodiment of the present invention includes:
[0049] S201. The mobile terminal receives a protection object and a password preset by a user.
[0050]Specifically, when the personal information protection function is enabled on the mobile terminal, the user can perform a preset password in a preset operation directory. The protection object may be preset when the mobile terminal leaves the factory, or may be an object to be protected that is freely identified and selected by the user after leaving the factory. The way to preset the password can be any of the following: first, the user enters the corresponding symbol on the interface as the encrypted password; second, collects the user's biometric information through the sensor of the mobile terminal, and extracts the key feature information of the biometric information as the encrypted password The third is that the sensor of...
Embodiment 3
[0064] Such as image 3 As shown, a personal information protection system provided by a preferred embodiment of the present invention includes an access control device 10 and a security device 20, wherein:
[0065] The access control device 10 is used for obtaining the password input by the user when the protected object of the mobile terminal is accessed; and controlling whether to allow access to the protected object according to whether the security device decrypts successfully;
[0066] The security device 20 is arranged on the security element, and includes an object decryption module 203 for decrypting the protected object according to the password input by the user.
[0067] As a preferred solution, the security device 20 also includes a reference signature information establishment module 201 and an object encryption module 202, wherein:
[0068] The reference signature information establishment module 201 is used to receive the user's preset protection object and pa...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 