Method for realizing classification management of use right of mobile terminal user

A technology of mobile terminal and implementation method, which is applied in the direction of electronic digital data processing, digital data processing parts, instruments, etc., can solve the problem that wireless mobile business functions cannot be effectively protected, and the scope of protection of personal information is narrow, only readable or not. Read and other issues, to achieve the effect of simple software development, easy programming implementation, protection of private information and business secrets

Inactive Publication Date: 2006-10-11
杭州波导软件有限公司
View PDF1 Cites 62 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be widely used in mobile phones, business communication and other handheld mobile communication terminals. It has progressive significance in protecting the phone book, but there are still many shortcomings, such as the protection of personal information is relatively narrow, only the phone book, there are many Personal information such as short messages, e-mails, QQ chats and their back and forth records, and more importantly, a large part of wireless mobile business functions involving commercial secrets cannot be effectively protected. In addition, the patent protection method is too simple and only readable Or unreadable, in fact, many information and functions in the mobile terminal require permission to operate, such as the phone book, some people can browse and use part of the phone book, while the owner can modify, delete, browse and use the entire phone book; such as wireless mobile business For the stock business in the function, only the owner can buy and sell stocks, and some other people can only browse the stock quotes, and cannot buy and sell stocks through the mobile terminal device; such as QQ chat, each can only open its own chat history and the QQ number it is connected with, and others People cannot browse and use other people's chat records and corresponding QQ numbers; such as email, each person can only use their own mailbox, etc., so we need to make further improvements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing classification management of use right of mobile terminal user
  • Method for realizing classification management of use right of mobile terminal user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention will be further described in detail below with reference to the embodiments of the drawings.

[0015] Implementation example 1

[0016] Mobile terminals classify system resources. Taking general mobile phones as an example, for mobile phones, including high-end and low-end mobile phones and PDAs with different functions, the data or functions used by users are generally divided into the following categories:

[0017] 1) Record: A certain short message, or a certain telephone number in the phone book, or a digital resource in the form of records such as a memo.

[0018] 2) File: It can be a certain document, such as word document, music file such as midi, mp3 and other formats of music file, or video file in dat format, rm format, etc., or executable file such as exe file, or other application files

[0019] 3) Folder: similar to the folder in the PC, such as the entire phone book, such as inbox, outbox, draft box, etc., such as photo albums, etc.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for realizing access grade management of movable terminal user. It is characterized in that: the movable terminal grades itself resources as document, function, etc, and grade manage its user; then building access database of access of each resource to be stored in memorizer; when user uses one resource, the system will find the access of user at said resource via said access database, to decide to execute relative document or transfer program module or not, to realize the access grade management on the user. The invention can effectively protect the privacy and commercial secret, without disturbing others.

Description

Technical field [0001] The invention relates to a method for implementing the hierarchical management of the use authority of a mobile terminal user in the mobile communication field. Background technique [0002] With the continuous development of mobile communication technology, personal mobile phones and mobile communication terminals or devices with various functions emerge in an endless stream, so that mobile terminals not only have the call function, but also have other functions such as phone book, short message, email and their dialing. Records, call records, QQ chat records and their wireless mobile business functions such as air ticket booking, transfer payment, purchases and other business information. Most of these information are related to personal privacy and business secrets, and these mobile terminals such as mobile phones and PDAs, etc. Because of its small size and convenient portability, it is especially easy to be forgotten or stolen by bad guys. If certain p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/00H04Q7/32
Inventor 徐立华黄美成孙多平
Owner 杭州波导软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products