Security information management method and apparatus, and terminal
A technology of security information and management methods, which is applied in the field of electronic communication, can solve problems such as inability to protect security information, and achieve the effect of enhancing confidence and preventing leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] figure 1 A flowchart of a method for managing security information provided in Embodiment 1 of the present invention, by figure 1 As shown, in this embodiment, the management method provided by the present invention includes:
[0036] S101: Detect whether the current terminal satisfies the protection condition of the security information; if yes, go to S102; if not, continue to S101;
[0037] The terminal involved in the present invention includes: a mobile phone, a tablet computer, a computer or a handheld computer, etc.; the security information is the important information stored in the terminal by the user, usually, the user encrypts the security information or protects the security in the terminal The security information is protected in the area; the security information includes: contact information, short messages, files, communication records, and the like. The protection conditions include use state protection conditions; the use state protection conditions ...
Embodiment 2
[0048] For example, the method for managing security information in this application will be further described below with specific embodiments in practical applications. The terminal is a dual-system mobile phone, the security information is information stored in a security system, and the protection security Information is to hide security information; figure 2 The flow chart of the method for managing security information provided by the second embodiment of the present invention is composed of figure 2 As shown, in this embodiment, the management method provided by the present invention includes:
[0049] S201: Receive the information set by the user to automatically hide the information in the security system after the security system is not operated for a long time. The time can be set to 1 minute, 3 minutes, 5 minutes, 10 minutes, 30 minutes or not hidden all the time; if the user chooses that the mobile phone will automatically hide the information in the security sy...
Embodiment 3
[0055] image 3 It is a structural block diagram of the security information management device provided by the third embodiment of the present invention, which is composed of image 3 As shown, in this embodiment, the security information management device 30 provided by the present invention includes: a detection module 301 and a management module 302; the detection module 301 is used to detect whether the current terminal satisfies the protection conditions of the security information; The management module 302 is configured to protect the security information when the detection result of the detection module 301 is yes. The security information is important information stored in the terminal by the user. Usually, the user protects the security information by encrypting the security information or protecting the security information in the security area of the terminal; the security information includes: contact information , SMS, documents, communication records, etc. T...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 