Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security processing method and device for an intelligent terminal

A smart terminal and security processing technology, applied in computer security devices, electrical digital data processing, data processing input/output process, etc., can solve the problem of reducing the security efficiency of smart terminal privacy data, and achieve the effect of preventing theft

Active Publication Date: 2019-04-09
武汉居易微电子有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method reduces the efficiency of protecting the privacy data security of smart terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security processing method and device for an intelligent terminal
  • A security processing method and device for an intelligent terminal
  • A security processing method and device for an intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0045] The embodiment of the present invention discloses an intelligent terminal security processing method and device, which can mount the intelligent terminal memory card to different file systems according to the result of user authentication. It can prevent the private data in the smart terminal from being viewed by others when the smart terminal is used by others, so as to prevent the private data from being stolen. Each will be described in detail below.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an intelligent terminal security processing method and device. The method comprises the following steps: monitoring an identity authentication event when an intelligent terminal is started, wherein the identity authentication event is a password input event, a fingerprint input event or a voice input event; acquiring relevant data and information of identity authentication based on the identity authentication event, and carrying out identity authentication according to the acquired data and information; mounting a storage card of the intelligent terminal into an encrypted first file system if the identity authentication is successful, and storing user data acquired by the intelligent terminal after the identity authentication is successful in an ordinary folder related to the first file system; mounting the storage card of the intelligent terminal into a second file system if the identity authentication is failed, and processing security of user data already stored in the ordinary folder. Through the adoption of the intelligent terminal security processing method and device, the security of private data of the intelligent terminal can be better protected.

Description

technical field [0001] The present invention relates to the field of computer application technology, in particular to a method and device for secure processing of an intelligent terminal. Background technique [0002] With the rapid development of smart terminals, mobile phones have become the main tool for people to communicate, work, share information and collaborate with each other. Most of the data stored in mobile phones, such as call records, text messages, address books, and photos, involves the user's personal privacy and even property safety. , it can be seen that it is particularly important to protect the security of data in mobile phones. [0003] At present, the method of protecting mobile phone security is mainly to encrypt mobile phone data through antivirus software such as mobile phone security guard software. In this method, users can choose the private data they want to protect, put it in the software, and set a password for protection. However, this met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06F21/60G06F3/06
CPCG06F3/0643G06F3/0644G06F21/32G06F21/604
Inventor 黄伟蹇洁陶林岭张剑庆吴文一李晋尧邢万里
Owner 武汉居易微电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products