Mobile phone information protection lock

A mobile phone information and protection lock technology, which is applied in telephone communication, secure communication devices, and key distribution, can solve problems such as not being able to fully and effectively ensure user information security, not being able to effectively prevent user information from leaking, and affecting users' normal use of mobile phones. Achieve good application prospects, optimize mobile phone experience, and simple structure

Inactive Publication Date: 2016-11-09
HARBIN UNIV OF SCI & TECH +1
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At this stage, there is no perfect application technology for protecting user information security in this field. At present, there are mainly the following methods for domestic mobile phone anti-theft and information leakage prevention: the first is to connect user clothes and mobile phones through physical objects such as telescopic steel wires. Anti-theft, or control the mobile phone within a certain range from the user through wireless signals, this method must carry other auxiliary equipment, which causes great inconvenience to the user's normal use of the mobile phone, and cannot protect the user's privacy, so the practicability and reliability need to be improved; The second is to use the built-in sensor of the mobile phone to detect changes in the surrounding environment, and realize the anti-theft alarm through software control, which requires the user to manually open and close the software, which is cumbersome and inconvenient to use; the third is to control the mobile phone to only answer through the software. Can not dial, this method can not effectively prevent user information leakage; Chinese patent "A mobile phone anti-theft system and method based on earphone unlocking" (application number: 201410303821.2) proposes an information leakage prevention method for unlocking mobile phones by inserting earphones , although the mobile phone can be locked for a certain period of time, but if the mobile phone is connected to the computer, you can still directly access the content of the mobile phone, which shows that the reliability is not high
[0005] To sum up, the existing mobile phone anti-theft measures and methods have disadvantages such as inconvenient to carry, cumbersome operation, affecting the normal use of mobile phones by users, low security and reliability, especially incapable of perfecting and effectively ensuring user information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone information protection lock
  • Mobile phone information protection lock
  • Mobile phone information protection lock

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Below in conjunction with accompanying drawing, the present invention is described in further detail:

[0046] Such as figure 1 As shown, the mobile phone protection lock structure of the present invention includes a protection lock (1), a joint (2), and a mobile phone (3). The protection lock (1) includes a memory (101) and an auxiliary circuit (102), connected to the mobile phone (3) through the joint (2), the auxiliary circuit (102) is other necessary circuits to ensure the work of the protection lock (1), and the memory (101 ) is used to save the key.

[0047] In order to make the present invention more concise and convenient, as figure 2 As shown, the protection lock (1) and connector (2) are integrated with the data cable (4) of the mobile phone (3), and the mobile phone (3) is connected to a charger or a computer and other equipment through the data cable (4). Or when the mobile phone is connected to the computer, the verification process is automatically com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile phone information protection lock, belonging to the technical field of digital product theft protection. The mobile phone information protection lock comprises a protection lock, a plug and a mobile phone; and the protection lock and a data cable can be designed into a whole. The protection lock and the mobile phone respectively store biological characteristics of a user and accordingly generate a sole key to take as protection verification information, thereby ensuring a sole corresponding relation between the protection lock and the mobile phone. When the mobile phone transmits personal information outward, the sole corresponding protection lock needs to be connected; and thus, when the mobile phone is connected to a computer and a network, and is lost, stolen or transferred, comprehensive effective protection also can be obtained, thereby preventing the personal information stored in the mobile phone from disclosing and others from utilizing the mobile phone to bring a loss to an owner. The mobile phone information protection lock disclosed by the invention has the advantages of extremely low cost, high security, simple logic, convenience in operation, no influence on normal use and the like, and has a very good application prospect in aspect of mobile phone personal information and data protection.

Description

technical field [0001] The invention relates to a mobile phone information protection lock, in particular to a mobile phone protection lock verified by a key. The utility model belongs to the field of anti-theft technology of digital products. Background technique [0002] With the continuous development of communication equipment, the functions that can be realized by mobile phones are becoming more and more diversified, such as payment, transfer, transmission of various files, pictures, etc., and saving or linking a large amount of personal information. Therefore, mobile phone information security issues are increasingly causing people focus on. When a mobile phone is accidentally stolen, lost or resold and falls into the hands of others, others can export and use the personal information and files in the mobile phone, which will cause heavy property losses to the owner of the mobile phone. [0003] The current personal information leakage prevention methods and mobile p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04M1/667H04L9/08G06F21/32
CPCG06F21/32H04L9/0866H04M1/667H04M2250/10H04M1/72463
Inventor 周封刘小可郝婷
Owner HARBIN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products