Method and device for protecting information, and terminal
A protection device and important information technology, which is applied in the field of communication, can solve the problems of information content leakage, information storage without security protection, etc., and achieve the effect of protecting important information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] Such as figure 1 As shown, the information protection method provided by the embodiment of the present invention includes the following steps:
[0043] Step S101, check whether the received information is important information.
[0044] In this embodiment, the information includes but is not limited to short messages, emails, and QQ.
[0045] In this embodiment, a common area is used to receive information. The common area refers to the storage space without security protection, and the content that is easy to be read by malware or virus Trojans in the background. The security area refers to the storage space for security protection, and the content of the information cannot be read by malware or virus Trojans in the background.
[0046] The security area can be realized through software technology, which isolates the storage space of the terminal into an independent storage space. In this space, some data can be placed to avoid trojans and viruses.
[0047] Of cou...
Embodiment 2
[0066] Such as figure 2 As shown, the information protection method provided by the embodiment of the present invention includes the following steps:
[0067] Step S201. Check whether the information stored in the security area is important information.
[0068] In this embodiment, the information includes but is not limited to short messages, emails, and QQ.
[0069] In this embodiment, a safe area is used to receive information. The security area refers to the storage space for security protection, and the content of the information cannot be read by malware or virus Trojans in the background. The common area refers to the storage space without security protection, and the content that is easy to be read by malware or virus Trojans in the background.
[0070] The security area can be realized through software technology, which isolates the storage space of the terminal into an independent storage space. In this space, some data can be placed to avoid trojans and viruses. ...
Embodiment 3
[0090] In order to realize the information protection method described in Embodiment 1, as image 3 As shown, the information protection device provided by the embodiment of the present invention includes a verification module 11 and a security storage module 12 .
[0091] The verification module 12 is used to detect whether the verification information is important information.
[0092] In this embodiment, the information includes but is not limited to short messages, emails, and QQ.
[0093] In this embodiment, a common area is used to receive information. The common area refers to the storage space without security protection, and the content that is easy to be read by malware or virus Trojans in the background. The security area refers to the storage space for security protection, and the content of the information cannot be read by malware or virus Trojans in the background.
[0094] The security area can be realized through software technology, which isolates the stor...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 