Security protection method, mobile terminal and device having storage function

A mobile terminal and security protection technology, applied in security devices, electrical components, wireless communications, etc., can solve problems such as difficult to distinguish, low bid winning rate, and inability to publicize, and achieve the effect of improving protection effect and protecting property safety.

Inactive Publication Date: 2018-01-23
BEIJING ZHUMU LANGMA MOBILE COMM CO LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The inventors of the present invention have found in the long-term research process that the above-mentioned anti-fraud technology has the following disadvantages: first, social publicity inevitably has places that cannot be publicized, and at the same time relies on subjective judgments, and it is not easy for groups such as the elderly to distinguish; Fraudulent phone numbers are marked and analyzed purely from the numbers. The bid winning rate is low, and the protection effect cannot meet the requirements; all in all, the above-mentioned anti-fraud technologies have poor protection effects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method, mobile terminal and device having storage function
  • Security protection method, mobile terminal and device having storage function
  • Security protection method, mobile terminal and device having storage function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, not all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0019] See figure 1 , figure 1 It is a schematic flowchart of an embodiment of the security protection method of the present invention, and the method includes:

[0020] S101: Obtain dangerous communication information and operation information performed on the dangerous communication information in the mobile terminal;

[0021] Specifically, in one embodiment, the above-mentioned dangerous communication information includes at least one of fraudulent short...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security protection method, a mobile terminal and a device having the storage function. The method comprises the steps that hazard communication information in the mobile terminal and operation information performed on the hazard communication information are acquired; and the current security index of the mobile terminal is evaluated according to the hazard communicationinformation and the operation information performed on the hazard communication information. With application of the mode, the protection effect of the fraud prevention technology can be enhanced bythe method.

Description

Technical field [0001] The present invention relates to the field of mobile communication technology, in particular to a security protection method, a mobile terminal and a device with storage function. Background technique [0002] With the continuous development of mobile communication technology, mobile terminals such as mobile phones and iPads have become more and more popular. However, while mobile communication technology brings convenience to people's lives, it also brings convenience to criminal activities. In particular, criminal activities such as telecommunication fraud (such as phone / text message fraud) are becoming increasingly rampant. [0003] The current mainstream telecommunications fraud methods include counterfeiting public security law, counterfeiting e-commerce customer service, counterfeiting banks, counterfeiting operators, counterfeiting social security departments, counterfeiting banks, counterfeiting airlines, counterfeiting leaders and acquaintances. For...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W4/12H04W12/128
Inventor 江前赵琴丽周佳
Owner BEIJING ZHUMU LANGMA MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products