Mobile terminal information confidential method and mobile terminal

A mobile terminal and information security technology, applied in the electronic field, can solve the problem of easy leakage of user information, and achieve the effect of avoiding difficult recovery and improving reliability.

Inactive Publication Date: 2016-01-20
QINGDAO HISENSE MOBILE COMM TECH CO LTD
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the embodiment of the present invention is to provide a mobile terminal information security method and the mobile terminal, which are used to solve the problem that the user information of the mobile terminal is easily leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal information confidential method and mobile terminal
  • Mobile terminal information confidential method and mobile terminal
  • Mobile terminal information confidential method and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following provides a more detailed description of an information security method for a mobile terminal and a mobile terminal provided by the present invention with reference to the accompanying drawings and embodiments.

[0018] In order to keep the user information of the mobile terminal confidential, the mobile terminal adopting the technical solution provided by the embodiment of the present invention has an encryption function. Specifically, after determining that the trigger condition for switching to the new user mode is satisfied, the mobile terminal will be switched to the new user mode . Among them, in the new user mode, the user information of the mobile terminal cannot be called, thereby achieving the purpose of keeping the user information confidential. During the use process of the owner user, once the triggering condition for switching to the new user mode is met, it will also switch to the new user mode, and the owner user does not need to keep user info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention disclose a mobile terminal information confidential method and a mobile terminal. The method comprises: in an encryption function opening state, determining a triggering condition of switching to a new user mode is satisfied; and after the triggering condition of switching to the new user mode is satisfied, switching to the new user mode, wherein user information of the mobile terminal cannot be called in the new user mode. Since the user information in the mobile terminal cannot be called in the new user mode, the user information cannot be leaked under the conditions of the loss of the mobile terminal (such as a mobile phone) and the like, thereby enabling the user information of the mobile terminal to be confidential, and improving reliability of the mobile terminal. Moreover, the confidential mode for the user information of the mobile terminal just enables the user information not to be called instead of being deleted so as to avoid the problem that the information is difficult to recover after being deleted by mistake.

Description

Technical field [0001] The present invention relates to the field of electronic technology, and in particular to a method for protecting information of a mobile terminal and a mobile terminal. Background technique [0002] A large amount of user information is stored in mobile terminals such as mobile phones, such as address books, short messages, photos, software account information, and so on. Once the mobile terminal is lost, the user information will be leaked. Summary of the invention [0003] The purpose of the embodiments of the present invention is to provide an information security method for a mobile terminal and a mobile terminal, which are used to solve the problem of easy leakage of user information of the mobile terminal. [0004] The purpose of the embodiments of the present invention is achieved through the following technical solutions: [0005] A method for confidential information of a mobile terminal includes: [0006] When the encryption function is turned on, co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/53
CPCG06F21/604G06F21/53G06F2221/2149
Inventor 王守亭
Owner QINGDAO HISENSE MOBILE COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products