Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for protecting information, and terminal

A protection device and important information technology, which is applied in the field of communication, can solve the problems of information content leakage, information storage without security protection, etc., and achieve the effect of protecting important information

Inactive Publication Date: 2016-01-27
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the deficiencies in the prior art, the purpose of the present invention is to provide information protection methods, devices and terminals, store important information in a safe area, prevent malicious software or virus Trojans from reading the content of information in the background, and aim to solve the problem of existing information The storage is not protected, which may easily lead to the leakage of information content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting information, and terminal
  • Method and device for protecting information, and terminal
  • Method and device for protecting information, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] Such as figure 1 As shown, the information protection method provided by the embodiment of the present invention includes the following steps:

[0043] Step S101, check whether the received information is important information.

[0044] In this embodiment, the information includes but is not limited to short messages, emails, and QQ.

[0045] In this embodiment, a common area is used to receive information. The common area refers to the storage space without security protection, and the content that is easy to be read by malware or virus Trojans in the background. The security area refers to the storage space for security protection, and the content of the information cannot be read by malware or virus Trojans in the background.

[0046] The security area can be realized through software technology, which isolates the storage space of the terminal into an independent storage space. In this space, some data can be placed to avoid trojans and viruses.

[0047] Of cou...

Embodiment 2

[0066] Such as figure 2 As shown, the information protection method provided by the embodiment of the present invention includes the following steps:

[0067] Step S201. Check whether the information stored in the security area is important information.

[0068] In this embodiment, the information includes but is not limited to short messages, emails, and QQ.

[0069] In this embodiment, a safe area is used to receive information. The security area refers to the storage space for security protection, and the content of the information cannot be read by malware or virus Trojans in the background. The common area refers to the storage space without security protection, and the content that is easy to be read by malware or virus Trojans in the background.

[0070] The security area can be realized through software technology, which isolates the storage space of the terminal into an independent storage space. In this space, some data can be placed to avoid trojans and viruses. ...

Embodiment 3

[0090] In order to realize the information protection method described in Embodiment 1, as image 3 As shown, the information protection device provided by the embodiment of the present invention includes a verification module 11 and a security storage module 12 .

[0091] The verification module 12 is used to detect whether the verification information is important information.

[0092] In this embodiment, the information includes but is not limited to short messages, emails, and QQ.

[0093] In this embodiment, a common area is used to receive information. The common area refers to the storage space without security protection, and the content that is easy to be read by malware or virus Trojans in the background. The security area refers to the storage space for security protection, and the content of the information cannot be read by malware or virus Trojans in the background.

[0094] The security area can be realized through software technology, which isolates the stor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of communication, and especially relates to a method and a device for protecting information, and a terminal. The method for protecting information comprises: detecting whether a received message is an important message, if yes, storing the message in a safe region; and storing messages in a classified manner, to achieve an objective of protecting important messages. After messages are received, whether the messages are important messages is detected, so as to classify the messages, if the messages are detected to be important messages, storing the messages in the safe region, if the messages are detected not to be the important messages, storing the messages in an ordinary region.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an information protection method, device and terminal. Background technique [0002] In the prior art, all short messages are stored in the built-in storage unit or SD memory card of the mobile phone, and there is no security protection for the storage of short messages. It is easy to be read by malicious software or Trojan horses in the background, resulting in short messages Content leaked. [0003] Nowadays, online transactions often need to send verification codes to users in the form of text messages, and users can only pay after verification. If malicious software or virus Trojan horses read the contents of text messages in the background and obtain the verification codes required for transactions, it is easy to cause User property damage. Contents of the invention [0004] In view of the deficiencies in the prior art, the purpose of the present invention is to p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00
Inventor 李涵贵
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD