Unlock instant, AI-driven research and patent intelligence for your innovation.

Data security protection method and device for mobile terminal

A mobile terminal and data security technology, applied in digital data protection, security devices, electrical digital data processing and other directions, can solve the problems of single function, high energy consumption, unreliable security, etc. The effect of prolonging the protection time

Active Publication Date: 2021-10-19
HIERSTAR (SUZHOU) LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the static password is memorized by the user's brain, there is a risk of forgetting, and once the mobile terminal is lost, this static password is very easy to crack through technical means, which shows that its security is not reliable
[0004] Simultaneously, the existing mobile phone safety protectors on the market have a single function and are mainly used to prevent the mobile terminal from being lost or stolen. The method is to alarm when the distance between the mobile terminal and the user exceeds a certain distance, and its It needs to maintain an uninterrupted Bluetooth connection with the mobile phone, which consumes a lot of energy and is not suitable for long-term use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security protection method and device for mobile terminal
  • Data security protection method and device for mobile terminal
  • Data security protection method and device for mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0121] Considering that the user is often outdoors, the protection device should be easy to carry and not easy to lose, and at the same time, taking into account the outdoor communication problem between the two, in this embodiment, the protection device 1 can be a device with Bluetooth function; the mobile terminal 2 and the protection device 1 use Bluetooth 4.0 BAS, IAS Profile protocol for intermittent communication of data information. The reason for adopting intermittent communication is that a large amount of electric energy can be saved, so as to increase the protection time of the protection device for the mobile terminal.

[0122] The mobile terminal 2 first opens the Bluetooth connection to search, and selects the corresponding protection device 2 to establish the Bluetooth connection. The mobile terminal 2 sets a master key of a specified length, and transmits the original output of the master key to the protection device 2 in the form of a data packet, ordering it ...

Embodiment 2

[0136] Considering that when working indoors, the protection device 1 can use a wireless router that supplies power indoors for a long time. The advantage of this protection device is that the wireless network covers a large area and can protect multiple mobile terminals connected to the network at the same time. Since there must be a power supply in the room, the protection device 1 and the mobile terminal 2 can avoid the consideration of power saving, so the mobile terminal can maintain a continuous connection state with the protection device. Of course, an intermittent connection may still be used here, which is not limited in this embodiment.

[0137] The mobile terminal 2 first opens the wifi connection to search, and selects the corresponding protection device 2 to establish the wifi connection. The mobile terminal 2 sets a master key of a specified length, and transmits the original output of the master key to the protection device 2 in the form of a data packet, orderi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security protection method for a mobile terminal. By storing a key on a protection device, the key is read when the mobile terminal and the protection device are within a safe and effective distance, and the read key is used for the internal security of the mobile terminal. The data is encrypted or decrypted, otherwise it cannot be encrypted or decrypted. The present invention also provides a data security protection device for a mobile terminal. According to the above principles, the data security protection device for a mobile terminal includes two parts: a protection device and a mobile terminal. Whether it is within the preset safe and effective range, read the key when the mobile terminal and the protection device are within the safe and effective distance, and encrypt or decrypt the data inside the mobile terminal through the read key, otherwise it cannot be encrypted or decryption processing. The invention can effectively increase the security of data in the mobile terminal.

Description

technical field [0001] The invention relates to the technical field of data security protection, in particular to a data security protection method and equipment suitable for mobile terminals. Background technique [0002] With the rapid popularization and development of smart mobile terminals of various systems, their functions are constantly being developed and improved. For example, a mobile phone is not only an indispensable communication device, but also an indispensable office device in modern life. The mobile phone not only includes personal private data, but also includes very important office data information or confidentiality. In life, people often bring great loss and distress because of the loss of the mobile terminal or forgetting it somewhere. [0003] The current protection method for the internal information of the mobile terminal is usually to set a static password on the mobile terminal, and to view encrypted data by inputting the static password. Howeve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02G06F21/62
CPCG06F21/6236H04W12/02
Inventor 杨贵龙顾兵张平
Owner HIERSTAR (SUZHOU) LTD