Encryption method for address list of mobile terminal, encryption device, and computer readable storage medium

A mobile terminal and encryption method technology, applied in the field of data processing, can solve the problems of economic loss and damage of mobile terminal holders, and achieve the effects of improving user experience, protecting privacy, and preventing leakage

Inactive Publication Date: 2017-11-14
SHENZHEN TINNO WIRELESS TECH +1
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a mobile terminal address book encryption method, device and computer-readable storage medium, aiming to solve the problem of economic loss or other forms of damage to the mobile terminal holder caused by the mobile terminal address book being used by others technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method for address list of mobile terminal, encryption device, and computer readable storage medium
  • Encryption method for address list of mobile terminal, encryption device, and computer readable storage medium
  • Encryption method for address list of mobile terminal, encryption device, and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0091] Based on the first embodiment, the second embodiment of the encryption method of the mobile terminal address book of the present invention is proposed, referring to image 3 , in this embodiment, step S130 includes:

[0092] S131. When the first number of failures is greater than a first preset threshold, determine whether the first number of failures is greater than a second preset threshold, wherein the first preset threshold is smaller than the second preset threshold;

[0093] The second preset threshold refers to a preset failure times set by the user that is greater than the first preset threshold, and is set by the user on the second preset threshold setting interface. Since the second preset threshold determines whether the user of the mobile terminal can see the limit of the number of failures of the contact information, the preset contact is not included, so the size of the second preset threshold can also affect the security of the screen unlock key, The sma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption method for an address list of a mobile terminal. The method comprises the steps of when a screen unlocking key which is triggered based on a screen unlocking interface that is currently displayed on a mobile terminal, verifying the received screen unlocking key based on a preset screen unlocking key; when verification for the received screen unlocking key passes, determining whether a first failure number-of-times for unlocking the screen in a preset time interval before the current time exceeds a first preset threshold; and if yes, performing an encryption operation on the contact person information in the address list of the mobile terminal according to the first failure number-of-times. The invention further discloses an encryption device for the address list of the mobile terminal and a computer readable storage medium. The encryption method, the encryption device and the computer readable storage medium have advantages of effectively realizing flexible address list protection, realizing protection for contact person information in the address list, effectively preventing contact person information leakage, protecting privacy of a mobile terminal owner and improving user experience.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to an encryption method, device and computer-readable storage medium for an address book of a mobile terminal. Background technique [0002] At present, although the address book of the mobile terminal is relatively single, mainly carrying the contact information recorded by the mobile terminal holder, its function is very important because it is unique, and the contact information recorded therein is the one held by the mobile terminal. The most important way for readers to connect with others. The most typical example is the address book in the mobile phone, which records the contact information that the mobile phone holder needs anytime and anywhere in life and work. [0003] Once the mobile terminal is lost or other accidents occur, the address book in it may be used by others, which will cause economic losses or other forms of damage to the mobile terminal holder, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/2745H04M1/725G06F21/60
CPCG06F21/602G06F21/6245H04M1/2745H04M1/72463
Inventor 许高霞
Owner SHENZHEN TINNO WIRELESS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products