Supercharge Your Innovation With Domain-Expert AI Agents!

Double T card mobile phone

A mobile phone, the technology of this mobile phone, applied in the direction of telephone structure, etc., can solve security problems and other problems

Inactive Publication Date: 2014-10-15
TECHFAITH WIRELESS TECH BEIJING
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While mobile phones bring us convenience, they also bring security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double T card mobile phone
  • Double T card mobile phone
  • Double T card mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0014] The mobile phone mentioned in the present invention has two independent T-cards, and in the mobile phone system, the two T-cards are mapped as two independent disks, which do not affect each other. However, the reading and writing of the encrypted T card cannot be carried out directly, and an encryption module and a decryption module are required. The keys of the encryption module and the decryption module can be set by the user, and only when the keys match can the data in the encrypted T-card be read correctly.

[0015] image 3 Flowchart for reading data. When reading data, first o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a mobile phone with two T cards, with one being used for storing the general files, and the other one being an encrypted T card. The data in the encrypted T card only can be read correctly in the mobile phone, if the encrypted T card is placed in other devices, the read data are messy codes, so that the privacy data can be protected from being stolen by other people.

Description

[0001] technical field [0002] The present invention relates to a mobile phone terminal device with dual T cards, in particular to a mobile phone terminal device that needs to protect privacy data. Background technique [0003] With the continuous popularization and development of mobile phones, more and more people are using mobile phones, and more and more functions can be realized on mobile phones. While mobile phones bring us convenience, they also bring security issues. We need a measure to protect the private data on our mobile phones, such as contacts, messages, emails, pictures, videos, important files, etc. [0004] The mobile phone of the present invention has two independent T cards, one T card is used to store common files, and the other is an encrypted T card used to store private data to be protected. The data and files saved on the encrypted T card are all encrypted by the encryption module. Even if these data and files are stolen, others cannot open and id...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/02
Inventor 董德福杨义斌
Owner TECHFAITH WIRELESS TECH BEIJING
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More