Mobile terminal safety protection method, mobile terminal and storage medium

A mobile terminal and security protection technology, applied in the field of mobile terminal and storage medium, mobile terminal security protection, can solve the problem of bank card third-party funds being stolen, and achieve the effect of reducing the probability of theft and payment security.

Pending Publication Date: 2019-06-14
NUBIA TECHNOLOGY CO LTD
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, most users are easily hacked by packet capture technology to swipe the balance of the third-party software and the bound bank card during the payment interval,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal safety protection method, mobile terminal and storage medium
  • Mobile terminal safety protection method, mobile terminal and storage medium
  • Mobile terminal safety protection method, mobile terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.

[0034] Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus repeated descriptions thereof will be omitted. Some of the block diagrams shown in the drawings are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a mobile terminal safety protection method, a mobile terminal and a storage medium. The method comprises the steps that when the mobile terminal carries out payment operation,carrying out asymmetric encryption on related information of the payment operation according to a public key to form ciphertext information; and sending the ciphertext information to a correspondingpayment platform, so that the payment platform decrypts the ciphertext information according to a private key, and completes payment according to the decrypted related information. According to the invention, the payment of the mobile terminal becomes safer, and the probability that a bank card, a third party fund and the like are stolen is reduced.

Description

technical field [0001] The present disclosure relates to the technical field of mobile devices, and in particular to a mobile terminal security protection method, a mobile terminal and a storage medium. Background technique [0002] In recent years, mobile phones have become the main items for people to travel and pay for office work, and the information security and property security of users have also become issues of concern to everyone. On the mobile phone interface, the third-party payment software is encrypted by means of SMS verification codes, and the amount bound to the bank card is stolen. In addition, most users are easily hacked by packet capture technology to swipe the balance of the third-party software and the bound bank card during the payment interval, and the bank card and third-party funds are stolen because of clicking illegal links on the mobile phone , so the security of the mobile phone needs to be further improved. Therefore, it is necessary to prov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/38G06Q20/32
Inventor 王建伟
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products