Unlock instant, AI-driven research and patent intelligence for your innovation.

Security information management method and apparatus, and terminal

A technology of security information and management methods, which is applied in the field of electronic communication, can solve problems such as inability to protect security information, and achieve the effect of enhancing confidence and preventing leakage

Active Publication Date: 2016-08-10
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention provides a management method, device and terminal for security information, which solves the problem in the prior art that the security information cannot be actively protected when the user forgets to activate the protection mechanism for the security information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security information management method and apparatus, and terminal
  • Security information management method and apparatus, and terminal
  • Security information management method and apparatus, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] figure 1 A flowchart of a method for managing security information provided in Embodiment 1 of the present invention, by figure 1 As shown, in this embodiment, the management method provided by the present invention includes:

[0036] S101: Detect whether the current terminal satisfies the protection condition of the security information; if yes, go to S102; if not, continue to S101;

[0037] The terminal involved in the present invention includes: a mobile phone, a tablet computer, a computer or a handheld computer, etc.; the security information is the important information stored in the terminal by the user, usually, the user encrypts the security information or protects the security in the terminal The security information is protected in the area; the security information includes: contact information, short messages, files, communication records, and the like. The protection conditions include use state protection conditions; the use state protection conditions ...

Embodiment 2

[0048] For example, the method for managing security information in this application will be further described below with specific embodiments in practical applications. The terminal is a dual-system mobile phone, the security information is information stored in a security system, and the protection security Information is to hide security information; figure 2 The flow chart of the method for managing security information provided by the second embodiment of the present invention is composed of figure 2 As shown, in this embodiment, the management method provided by the present invention includes:

[0049] S201: Receive the information set by the user to automatically hide the information in the security system after the security system is not operated for a long time. The time can be set to 1 minute, 3 minutes, 5 minutes, 10 minutes, 30 minutes or not hidden all the time; if the user chooses that the mobile phone will automatically hide the information in the security sy...

Embodiment 3

[0055] image 3 It is a structural block diagram of the security information management device provided by the third embodiment of the present invention, which is composed of image 3 As shown, in this embodiment, the security information management device 30 provided by the present invention includes: a detection module 301 and a management module 302; the detection module 301 is used to detect whether the current terminal satisfies the protection conditions of the security information; The management module 302 is configured to protect the security information when the detection result of the detection module 301 is yes. The security information is important information stored in the terminal by the user. Usually, the user protects the security information by encrypting the security information or protecting the security information in the security area of ​​the terminal; the security information includes: contact information , SMS, documents, communication records, etc. T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a security information management method and apparatus, and a terminal. The security information management method includes the steps of detecting whether a current terminal meets a protection condition of security information; and if the current terminal meets the protection condition of the security information, protecting the security information. According to the method, a problem in the prior art that a user cannot protect the security information proactively when forgetting starting a protection mechanism of the security information is solved, when the terminal is in a state in which the terminal can check the security information smoothly, the terminal protects the security information proactively when meeting the protection condition of the security information, therefore, the security information in the terminal is further protected.

Description

technical field [0001] The present invention relates to the technical field of electronic communication, and in particular, to a method, device and terminal for managing security information. Background technique [0002] With the development of terminal technology, users prefer to store important information in the terminal more and more. In order to protect privacy, it is necessary to secure the important information stored in the terminal. In the prior art, the user actively encrypts important information or saves important information in an encrypted storage module or saves important information in a security system. Important information is called security information. When the user needs to use the security information, it can be used by decrypting or opening the corresponding storage area. But there is still a security risk: after the user uses the terminal to process his work, the terminal is currently in a state where the security information can be used. When the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCG06F21/62G06F21/88H04L63/0428H04L63/108G06F2221/032G06F2221/2137G06F2221/2139G06F21/54G06F21/577G06F21/602G06F21/64
Inventor 冯东杰
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD