Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-mobile terminal-based data security protection method and device

A mobile terminal and data security technology, applied in the field of data security, can solve problems such as inconvenient operation, and achieve the effect of good convenience and data protection

Active Publication Date: 2015-01-28
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] If an encryption software is used to uniformly encrypt these data, the user needs to enter the password every time when using these functions on the mobile phone, which will bring some inconvenience to the operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-mobile terminal-based data security protection method and device
  • Multi-mobile terminal-based data security protection method and device
  • Multi-mobile terminal-based data security protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the technical problems solved by the present invention, the technical solutions adopted and the technical effects achieved clearer, the technical solutions of the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only the technical solutions of the present invention. Some, but not all, embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0037] refer to figure 1 , figure 1 It is a method for protecting data security based on multiple mobile terminals in the first embodiment of the present invention, wherein the mobile terminal refers to computer equipment that can be used on the move, broadly speaking, it includes mobile phones, notebooks, tablet computers, POS machines, and even vehi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-mobile terminal-based data security protection method and a multi-mobile terminal-based data security protection device. The multi-mobile terminal-based data security protection method comprises the following steps of receiving a request of accessing information in a pre-established data security list; determining distances with other mobile terminals; determining access right over the information in the data security list according to the distances with the other mobile terminals. According to the technical scheme, private data and applications in the mobile terminals can be better protected, and particularly under the condition that one mobile terminal is lost, the data of a user can be better protected; meanwhile, more convenience is provided for the access of the user to the private data and applications.

Description

technical field [0001] The invention relates to the field of data security, in particular to a method and device for protecting data security based on multiple mobile terminals. Background technique [0002] The rapid development of the mobile Internet brings convenience to people, but also poses severe challenges to personal information security. Mobile phone users' call records, address books, account numbers, and personal private files are all at risk of being peeped and stolen. [0003] Personal information on mobile phones includes four categories: location information, communication information, account password information, and stored file information. Among them, the communication information includes address book, call records, short messages, etc., and the file information stored in the mobile phone includes photos, recordings, videos and other files of the owner. In addition, some hardware information of mobile phones, such as IMEI number (mobile phone serial nu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/62
Inventor 俞义
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products