Unlock instant, AI-driven research and patent intelligence for your innovation.

Information protection method and apparatus, and terminal

An information protection and terminal technology, applied in digital data protection, computer security devices, instruments, etc., can solve problems such as single form, affecting terminal information security, and low information protection intensity, and achieve the effect of improving security

Active Publication Date: 2017-05-31
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these encryption methods have a single form and low information protection strength, which affects the security of terminal information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information protection method and apparatus, and terminal
  • Information protection method and apparatus, and terminal
  • Information protection method and apparatus, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0028] The terms "first", "second", "third" and "fourth" in the present invention are used to distinguish different objects, not to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes unlisted steps or units...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an information protection method and apparatus, and a terminal. The information protection method comprises the following steps: obtaining behavior information of a user and current geographical location information of the terminal; encrypting to-be-encrypted information according to the behavior information and the current geographical location information to obtain encrypted information; determining a first storage location of the encrypted information according to the current geographical location information; and storing the encrypted information in the first storage location. In the scheme, the to-be-encrypted information is encrypted according to the behavior information and the current geographical location information to obtain encrypted information, and the storage location of the encrypted information is set according to the geographical location information, so the information security of the terminal is improved.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to an information protection method, device and terminal. Background technique [0002] With the increasingly powerful functions of smart mobile terminals, smart mobile terminals have become an indispensable part of people's daily life. [0003] In practical applications, since the user may involve privacy operations when using the smart mobile terminal, it is not desirable to see such private information when other people use the terminal. For example, certain photos, certain website access records, friend information or communication records of instant messaging software, etc. In order to protect these private information, fingerprints can be used to encrypt the private information, or a lock screen password can be set for the smart mobile terminal. However, these encryption methods have a single form and low information protection strength, which affects the security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/60G06F21/62
CPCH04L63/0428G06F21/602G06F21/6218G06F21/6245H04L67/52
Inventor 王泽权
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD