Privacy protection method and protection system used based on mobile terminal networking

A privacy protection system and mobile terminal technology, applied in the field of information security of mobile terminals, can solve problems such as user loss, and achieve the effect of satisfying flexibility and protecting privacy security.

Inactive Publication Date: 2016-01-27
PHICOMM (SHANGHAI) CO LTD
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of sending account information, if the mobile phone is connected to the network through routers, these private information will be sent to the authentication server through routers. If criminals monitor these routers, they will obtain important information received and sent by these routers. , and analyze and crack important private information, causing unnecessary losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method and protection system used based on mobile terminal networking
  • Privacy protection method and protection system used based on mobile terminal networking
  • Privacy protection method and protection system used based on mobile terminal networking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the specific implementation manners of the present invention will be described below with reference to the accompanying drawings. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention, and those skilled in the art can obtain other accompanying drawings based on these drawings and obtain other implementations.

[0051]In order to make the drawing concise, each drawing only schematically shows the parts related to the present invention, and they do not represent the actual structure of the product. In addition, to make the drawings concise and easy to understand, in some drawings, only one of the components having the same structure or function is schematically shown, or only one of them is marked. Herein, "a" not only means "only one", but also means "more than one".

[0052] In the firs...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a privacy protection method used based on mobile terminal networking. The method comprises the following steps of: monitoring whether a program is executing privacy operation; if yes, judging the current networking mode of a mobile terminal is a data connection mode or a WIFI connection mode; when the mobile terminal is in the data connection mode, executing the privacy operation; when the mobile terminal is in the WIFI connection mode, switching the networking mode to the data connection mode and executing the privacy operation; and when the privacy operation is monitored to be finished, switching the networking mode from the data connection mode to the WIFI connection mode. The invention further provides a privacy protection system used based on mobile terminal networking. The privacy protection system comprises modules, which are capable of executing instructions, of a computer so as to perform the method. According to the invention, the safety problem caused by that privacy information is applied to an unknown route before special encryption processing is well solved, and the information safety of consumers is well protected.

Description

technical field [0001] The invention relates to the field of information security of mobile terminals, in particular to a privacy protection method and protection system based on the networking of mobile terminals. Background technique [0002] Existing smartphones can not only be used as traditional communication tools to realize the functions of making calls and sending text messages, but also modern communication tools that are indispensable in daily life, such as being able to install QQ, WeChat, bank clients, etc. is very important Apps to achieve more social functions, or use it as an alternative tool in life. [0003] When using a smartphone as a modern communication tool, the important account information of the application will be sent to the corresponding server through the mobile network for authentication. In the process of sending account information, if the mobile phone is connected to the network through routers, these private information will be sent to the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/12H04W36/00H04L29/06H04W12/03
CPCH04L63/0407H04W12/02H04W12/12H04W36/0005
Inventor 刘结焱
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products