Account number information protection method and mobile terminal

A mobile terminal and account information technology, applied in the field of information security, can solve problems such as oversimplification, hijacking or cracking by attackers, incomplete encryption mechanism, etc., to achieve the effect of avoiding losses and ensuring security

Inactive Publication Date: 2017-05-31
SHANGHAI CHUANGGONG COMM TECH
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, some encryption mechanisms are incomplete or oversimplified and can be easily hijacked or cracked by attackers
In addition, each user will have account passwords for various network applications. The developers of each application are different, and the management methods for user data are also different. As a result, user account information is not well protected.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Account number information protection method and mobile terminal
  • Account number information protection method and mobile terminal
  • Account number information protection method and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Such as figure 1 As shown, the mobile terminal of this embodiment includes an account management module 1, a network monitoring module 2 and a network access module 3;

[0045] Wherein, the network monitoring module 2 is connected in communication with the account management module 1 and the network access module 3 respectively, and the account management module 1 is used to obtain user account information and generate a privacy log for the account information; The network monitoring module 2 is used to monitor the network access operation of the mobile terminal, and detects whether the network access data flow includes the data of the privacy log generated by the account management module 1; when the detection is yes, call the network access module 3. Interrupt the network access operation; the network access module 3 is configured to continue the network access operation after receiving an authorization instruction from the user.

[0046] In this embodiment, the acco...

Embodiment 2

[0053] Such as image 3 As shown, on the basis of Embodiment 1, the mobile terminal of this embodiment also includes an account editing module 4 and a password verification module 5;

[0054]In this embodiment, the password verification module 5 is connected in communication with the account management module 1, the password verification module 5 will verify the management password input by the user, and only call the account management module 1 when the verification is passed. Obtain the account information of the user, that is, in this embodiment, only when the management password input by the user passes through, it indicates that the user has the authority to manage the account information; set management password, you can also set the secret protection question of the management password, etc. Follow-up operations are possible. In this embodiment, the account information obtained by the account management module 1 can have many kinds, such as account information of vari...

Embodiment 3

[0064] Such as Figure 5 As shown, on the basis of Embodiment 1, the mobile terminal of this embodiment also includes an authority setting module 6;

[0065] In this embodiment, specifically, the account management module 1 also uses an encryption algorithm to encrypt the privacy log data, thereby further ensuring the security of the privacy log data;

[0066] The network monitoring module 2 will monitor the network access operation of at least one application program in the mobile terminal, that is, monitor whether the network access operation performed by the application program in the mobile terminal needs to call the user's account information, so as to realize the mobile terminal. The application program monitors to ensure that the application program of the mobile terminal is allowed to call the account information of the corresponding user only when the user issues authorization.

[0067] The authority setting module 6 in this embodiment is connected in communication w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an account number information protection method and a mobile terminal. The account number information protection method is implemented in the mobile terminal and comprises the following steps of obtaining account number information of a user, and generating a privacy log through the account number information; monitoring a network access operation of the mobile terminal, and detecting whether network access dataflow includes data of the privacy log or not; if yes, interrupting the network access operation; after an authorization instruction of the user is received, continuing to perform the network access operation. The privacy log is generated through the account number information, and the network access operation of the mobile terminal is monitored in real time, so that it is ensured that the privacy log data is accessed only under the user authorization condition, the user privacy account number information security is effectively ensured, the phenomenon that information is stolen under the user unknowing condition is avoided, and user losses are avoided.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for protecting account information and a mobile terminal. Background technique [0002] In the era of rapid Internet development, terminal security issues such as mobile phones are becoming more and more prominent. Stealing personal privacy and sensitive data such as application password accounts occurs from time to time, using telecom fraud, mobile banking to steal other people's funds, illegally obtaining other people's phone numbers to push spam advertisements, etc. Illegal and criminal activities are rampant. Although, most of the login mechanisms use encryption mechanisms, which guarantee the security of users to a certain extent. However, some encryption mechanisms are incomplete or oversimplified, and can be easily hijacked or cracked by attackers. In addition, each user will have account passwords for various network applications, and the developer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/31
CPCG06F21/6245G06F21/31G06F2221/2141
Inventor 徐彩凤
Owner SHANGHAI CHUANGGONG COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products