Method for making security handling for PC broadside-on mobile terminal information

A mobile terminal, PC technology, applied in the direction of electrical digital data processing, telephone communication, instruments, etc., can solve the problem of no security technology and so on

Inactive Publication Date: 2007-06-06
ZTE CORP
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, more and more mobile phone manufacturers are focusing on the security design of mobile phones,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for making security handling for PC broadside-on mobile terminal information
  • Method for making security handling for PC broadside-on mobile terminal information
  • Method for making security handling for PC broadside-on mobile terminal information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] As shown in FIG. 1 , it is a schematic structural diagram of a mobile phone according to an embodiment of the present invention.

[0016] The mobile phone 100 of the present invention includes a password comparison module 10, a first communication interface 30 (such as a USB interface, a bluetooth interface, an infrared interface, a ZigBee interface) and a first communication interface 30 (such as a USB interface, a bluetooth interface, an infrared interface, etc.) interface or Wi-Fi interface), wherein, 10 in the password comparison module includes a comparison data receiving unit 11, a comparison result sending unit 12; the comparison data receiving unit 11 receives the data received from the first communication interface 30, and compares The comparison result sending unit 12 sends the comparison result data received from the comparison data receiving unit 11 and compared by the password comparison module 10 to the first communication interface 30 .

[0017] As shown ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for carrying out secret processing on mobile terminal information at PC side includes inputting mobile terminal cipher to PC computer and sending said cipher to mobile terminal, carrying out calibration on cipher by mobile terminal when cipher is received by mobile terminal and carrying out normal interaction between PC computer and mobile terminal if it is confirmed that cipher is correct.

Description

technical field [0001] The present invention relates to mobile terminal information security processing technology, in particular, relates to a PC side for mobile terminal information security processing method. Background technique [0002] With the increasing popularity of mobile terminals such as mobile phones and the increasingly powerful functions of mobile phones, mobile phones have become our most commonly used communication tools. With the application of media information such as short messages and MMS (Multimedia Messaging Service), mobile phones have also become our personal "information center". A lot of file information, in a sense, the mobile phone is our "secret garden", involving a lot of our privacy. Therefore, the confidentiality of these personal information is very important. [0003] At present, more and more mobile phone manufacturers are focusing on the security design of mobile phones, but when the PC side performs related operations on mobile phones...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/32H04M1/673G06F21/00G06F21/30
Inventor 陈晓岚
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products