Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security method of memory card

A data security and storage card technology, applied in the direction of internal/peripheral computer component protection, etc., can solve the problems of poor data security and security, and achieve the effect of ensuring security

Inactive Publication Date: 2015-03-25
GUANGZHOU YUXI INFORMATION TECH
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to propose a data security method for a memory card, which can solve the problem of poor data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security method of memory card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In the following, the present invention will be further described in conjunction with the drawings and specific embodiments.

[0026] Such as figure 1 As shown, a data security method of a memory card, when the memory card is inserted into the mobile terminal, the following steps are performed:

[0027] Step S1, the mobile terminal acquires the identity information of the inserted memory card, which may be empty or may be an International Mobile Subscriber Identification Number (IMSI, International Mobile Subscriber Identification Number), to determine whether the memory card is the first If yes, execute step S2, if not, clear all data in the memory card, and stop using the memory card.

[0028] Specifically, the process of judging whether the memory card is used for the first time is: the mobile terminal compares its International Mobile Subscriber Identification Number with the identity information in the memory card, if they do not match, it means that the IMSI numb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data security method of a memory card. The data security method includes that a mobile terminal acquires identity of the inserted memory card so as to judge whether the memory card is used for the first time or not, if yes, the mobile terminal can be bound with the memory card, if not, all data in the memory card can be eliminated; the mobile terminal can cut the data to be secured in the internal storage space into the memory card. When the mobile terminal monitors power failure of the memory card, the data in the memory card can be eliminated. By the data security method, data on the mobile terminal can be effectively isolated, and data security and safety are ensured.

Description

technical field [0001] The invention relates to mobile communication technology, in particular to a data security method of a storage card. Background technique [0002] At present, the use of mobile terminals by governments and enterprises to handle affairs increases, and the issue of data security and confidentiality on mobile terminals has been paid more and more attention. However, both office applications and private applications are running on the same mobile terminal. Once the mobile application reads and modifies government and enterprise data without authorization, it may cause government or enterprise secrets to leak and pose a security threat. There is an urgent need to effectively control the reading and processing of government and enterprise data stored and processed on mobile terminals to ensure its security and confidentiality. [0003] There are currently two confidentiality schemes. [0004] 1. In my country's existing MDM products, mobile terminal data p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78
CPCG06F21/79
Inventor 韩炜
Owner GUANGZHOU YUXI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products