Hardware cipher-based mobile phone data protection method and device

A data protection and hardware password technology, applied in security devices, electrical components, telephone communications, etc., can solve problems such as cumbersome operations, password protection cracking, inconvenience, etc., to solve privacy and data leakage, simplify operation steps, and optimize user performance. Effect

Inactive Publication Date: 2016-08-24
LETV INFORMATION TECH BEIJING
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For the first method, password protection can prevent other users from entering the mobile phone system to view information, but this solution has the following defects: First, the traditional password protection method requires frequent input of passwords when users use it themselves, which is cumbersome and inconvenient ; Second, this kind of password protection is very easy to crack through software, so that other users can bypass the password protection to obtain the data in the mobile phone, which cannot achieve absolute security
[0005] For the second method, the method of remotely locking the mobile phone must rely on the smooth flow of the network environment or mobile phone text messages. If the mobile phone is offline by turning off the network or unplugging the SIM card, the user cannot remotely Locked, the data in the mobile phone will be easily stolen, and there is no way to achieve real protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware cipher-based mobile phone data protection method and device
  • Hardware cipher-based mobile phone data protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be described in detail below in conjunction with examples.

[0023] figure 1 It is a preferred embodiment of the mobile phone data protection method based on the hardware password of the present invention. Such as figure 1 As shown, the mobile phone data protection method based on hardware password provided by the present invention can be realized through the following steps.

[0024] Step S100, when the mobile phone is started for the first time, an interface for inputting an initial password is sent to the screen of the mobile phone. Specifically, after the mobile phone leaves the factory, when the user starts the mobile phone for the first time, he can enter the initial password through the relevant interface on the mobile phone screen. , fingerprint password, etc.

[0025] Step S200, receiving the initial password input by the user and storing it in the hardware of the mobile phone. Preferably, the initial password input by the user c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware cipher-based mobile phone data protection method and device. The mobile phone data protection method comprises the following steps: whether a private data-related interface in a mobile phone changes is detected; if the private data-related interface changes, an interface used for inputting ciphers to be verified is sent to a screen of the mobile phone; whether the ciphers to be verified which are input by a user are consistent with an initial cipher stored in mobile phone hardware is determined; if the ciphers to be verified which are input by the user are inconsistent with the initial cipher for a designated number of times, an instruction of starting data protection is sent to the mobile phone. The mobile phone data protection device comprises an interface detection module, a cipher to be verified input interface sending module, a cipher verifying module and an instruction sending module that are respectively used for taking the above steps. Via use of the hardware cipher-based mobile phone data protection method and device provided in the invention, operation steps are simplified, user experience is improved, software decryption can be prevented, and data safety can be ensured.

Description

technical field [0001] The invention relates to the technical field of mobile phone data protection, in particular to a hardware password-based mobile phone data protection method and device. Background technique [0002] Mobile phones have fully entered the era of smart phones from the previous era of feature phones, and now smart phones occupy an absolute position in the mobile phone market. With the development and popularization of smart phones, people store more and more information in their mobile phones, such as: address book, text messages, photos, various social software accounts automatically logged in, etc., many of which are related to personal privacy and property Information is also stored on the phone. While smart phones bring convenience to people, they also bring hidden dangers in terms of privacy and property. If the mobile phone is accidentally lost or stolen, all the information on the mobile phone may be used by criminals, resulting in personal privacy....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04W12/06
CPCH04W12/06H04M1/72454
Inventor 郑雷
Owner LETV INFORMATION TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products