Mobile phone message security method

A security method and mobile phone information technology, applied in the field of mobile communication terminals, can solve problems such as loss of key information, inconvenience for users, and inability of users to handle information confidentially.

Active Publication Date: 2005-01-05
HUIZHOU TCL MOBILE COMM CO LTD
View PDF1 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The current mobile phones already have SMS, MMS and other information functions, but there is no special provision for the processing of information (receiving, storing, reading, deleting, etc.) for specific numbers, and users cannot keep the information of specific numbers confidential.
This will cause great inconvenience to the user
For example: when the user lends the mobile phone to others, the content that should not be deleted may be deleted due to misuse and other reasons; another example: when the mobile phone stores work-related information and information related to relatives and friends at the same time Sometimes, the work information may need to be kept confidential...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone message security method
  • Mobile phone message security method
  • Mobile phone message security method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be described in further detail below through specific embodiments and in conjunction with the accompanying drawings.

[0019] See figure 1 , first open the confidential information function, you can set or modify the password and set the secret number when it is turned on; the secret number can be added or deleted at any time. These secret code(s) form a secret code group.

[0020] Such as figure 2 , 3 As shown, when sending and receiving short messages, compare the number of the sender and receiver, if it is a confidential number, then do special processing for this piece of information (make a confidentiality mark, and store it in a confidential storage area); if it is not a confidential number, then do General processing (no confidentiality flag, stored in the normal storage area). When receiving a text message, it is also necessary to decide whether to perform relevant prompts according to user settings. If so, then perform sound or / a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a method for mobile phone information security which adds process to the security information in the information process of mobile communication terminal. First of all, the user designs a set of number neessary for security, then, all information related to the set numbers is processed in security (including short messages, color messages and readings) and this part is processed secretly, others can only see the unclassified information.

Description

【Technical field】: [0001] The invention relates to a mobile phone information security method, which is suitable for mobile communication terminals such as mobile phones. 【Background technique】: [0002] Current mobile phones already have information functions such as short messages and multimedia messages, but there is no special provision for the processing (receiving, storing, reading, deleting, etc.) of the information of a specific number, and the user cannot keep the information of a specific number confidential. This will cause great inconvenience to the user. For example: when the user lends the mobile phone to others, the content that should not be deleted may be deleted due to misuse and other reasons; another example: when the mobile phone stores work-related information and information related to relatives and friends at the same time Sometimes, the information on the work may need to be kept secret, but the existing mobile phone cannot keep it secret, and the u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02
CPCH04M19/04
Inventor 王钢余碧波
Owner HUIZHOU TCL MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products