Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile phone information security management method based on multiple authority modes

A technology for security management and mobile phone information, applied in telephone communication, electrical components, branch office equipment, etc., can solve problems such as malicious peeking, leakage, and misoperation of SMS messages, and achieve the effect of improving information security performance and protecting personal privacy

Active Publication Date: 2015-09-09
SHANGHAI GUAN AN INFORMATION TECH
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of using our mobile phones, it is inevitable that we will lend our mobile phones to relatives and friends. In the process of lending, we often worry about the privacy of our mobile phones, such as call records, text messages, etc. being misused by others, leak or sneak peek

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone information security management method based on multiple authority modes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0034] Such as figure 1 As shown, a mobile phone information security management method based on a multi-authority mode, the authority mode includes a first user mode and a second authority mode, and the second authority mode includes a visitor mode, an elderly mode, a child mode and a power saving mode A combination of one or more of them, the method includes the steps of multi-authority mode security management:

[0035] S1: When the mobile phone is in a black screen state, press the power button or the volume button, light up and activate the mobile phone screen, and the mobile phone automatically loads the preset second permission mode. If the user has not set the second screen unlock password, then perform step S4; if the user If the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile phone information security management method based on multiple authority modes. In a blank-screen state of a mobile phone, a power or volume key is pressed to activate a mobile phone screen; if a user does not set a second screen unlocking password, the mobile phone directly enters the second authority mode; and if the user sets the second screen unlocking password, the mobile phone displays a second unlocking interface, the user inputs the second screen unlocking password, and then the mobile phone directly enters the second authority mode. In the blank-screen state of the mobile phone, a Home key is pressed to activate the mobile phone screen; if the user does not set a first screen unlocking password, the mobile phone directly enters a first user mode; and if the user sets the first unlocking password, a corresponding first unlocking interface is displayed, the user executes the preset first unlocking password, and the mobile phone enters the first user mode after the password is successfully matched. After the user locks the screen again, the first user mode or the second authority mode ends, the screen of the mobile phone is blank, and the mobile phone enters a standby state.

Description

technical field [0001] The invention relates to a mobile phone information security management method based on a multi-authority mode. Background technique [0002] With the gradual popularization of smart phones in people's lives, Android phones have gradually become the mainstream of mobile phones used by Chinese people. Now, smartphones are no longer just communication tools that people use to make calls and send text messages. It has an independent operating system, and users can install software, games, and other applications provided by third-party service providers by themselves, and use such programs to continuously monitor It expands its functions. [0003] In the process of using our mobile phones, it is inevitable that we will lend our mobile phones to relatives and friends. In the process of lending, we often worry about the privacy of our mobile phones, such as call records, text messages, etc. being misused by others, Leaks or malicious peeps. And there are ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725
Inventor 董滨
Owner SHANGHAI GUAN AN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products