Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for protecting user data of terminal

A technology for user data and terminal protection, applied in transmission systems, electrical components, etc.

Active Publication Date: 2014-12-03
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The present invention provides a method and system for protecting terminal user data to solve the problem of how to provide users with a more convenient terminal user data protection mechanism without changing the hardware of the mobile phone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting user data of terminal
  • Method and system for protecting user data of terminal
  • Method and system for protecting user data of terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0064] When there is a network connection between the server and the client, the figure 1 The shown method protects end-user data by the server, as shown in the diagram:

[0065] S101 The server monitors the online status of the client;

[0066] S102 The server judges whether the online status of the client is abnormal, if yes, execute step S103; if not, execute step S101;

[0067] The online status of the client is abnormal, including: the client is not online within the set time, or the client is deleted;

[0068] Preferably, the server monitors that the client is not on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for protecting user data of a terminal. The method includes the steps that when a server is in network connection with a client side, the server monitors the on-line state of the client side; when the abnormal on-line state of the client side is monitored by the server, a safety alarm is given to the user data of the terminal where the client side is located; the abnormal on-line state of the client side includes the fact that the client side is in an off-line state within set time, or deleting action is executed on the client side. It is unnecessary to add extra hardware for the terminal, and the user data of the terminal are protected automatically and conveniently.

Description

technical field [0001] The invention relates to the security field of terminal user data, and relates to a method and system for protecting terminal user data. Background technique [0002] With the enhancement of mobile phone functions, such as mobile phone cameras, mobile phone taxis, and mobile shopping, users store more and more personal data on mobile phones. Even personal safety hazards. [0003] Based on the increasing willingness of users to protect mobile phone data, mobile phone data security has become a research hotspot. In summary, it generally includes the following mobile phone data security technologies: [0004] 1. Configure an additional hardware device for the mobile phone, and the hardware device will detect the distance between itself and the mobile phone. If the distance exceeds the preset value, an alarm message will be sent to reduce the probability of mobile phone users losing their mobile phones; [0005] 2. The mobile phone is bound to the SIM ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 刘明辉张云勇张尼李正胡坤
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products