Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for conducting secrete handling for PC broadside-on mobile terminal information

A mobile terminal, PC technology, applied in the direction of electrical digital data processing, telephone communication, instruments, etc., can solve the problem of no security technology and so on

Inactive Publication Date: 2007-06-06
北京科岳中科科技服务有限公司
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, more and more mobile phone manufacturers are focusing on the security design of mobile phones, but when the PC side performs related operations on mobile phones, there is no corresponding security technology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for conducting secrete handling for PC broadside-on mobile terminal information
  • Method for conducting secrete handling for PC broadside-on mobile terminal information
  • Method for conducting secrete handling for PC broadside-on mobile terminal information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] As shown in FIG. 1, it is a schematic structural diagram of a mobile phone according to an embodiment of the present invention.

[0019] The mobile phone 100 of the present invention includes a password comparison module 10 that performs a password comparison between the received data and the password already set in the mobile phone, and a first communication interface 30 (eg, USB interface, Bluetooth interface, infrared interface, ZigBee Interface or Wi-Fi interface), wherein the password comparison module 10 includes a comparison data receiving unit 11 and a comparison result sending unit 12; the comparison data receiving unit 11 receives the data received from the first communication interface 30, and compares The comparison result sending unit 12 sends the comparison result data received from the comparison data receiving unit 11 and compared by the password comparison module 10 to the first communication interface 30.

[0020] As shown in FIG. 2, it is a schematic diag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for carrying out secret processing on mobile terminal information at PC side includes judging whether connection between PC computer and mobile terminal is successful or not by PC side and judging whether cipher is set on mobile terminal or not by PC side if it is, inputting mobile terminal cipher by PC side and sending said cipher to mobile terminal by PC computer if it is not, calibrating said cipher by mobile terminal and carrying out normal interaction between PC computer and mobile terminal if it is confirmed that cipher is correct.

Description

Technical field [0001] The present invention relates to mobile terminal information confidential processing technology, in particular to a method for PC side to perform confidential processing on mobile terminal information. Background technique [0002] With the increasing popularity of mobile terminals, such as mobile phones and the increasingly powerful functions of mobile phones, mobile phones have become our most commonly used communication tool. With the use of short messages and MMS (Multimedia Messaging Service) and other media information, mobile phones have also become our personal "information center". This information includes our contact phonebook, short messages, call records and stored in the mobile phone. In a sense, mobile phones are our "secret garden", which involves a lot of our privacy. Therefore, the confidentiality of these personal information is very important. [0003] At present, more and more mobile phone manufacturers are focusing their attention on t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04Q7/32H04M1/673G06F21/00G06F21/31
Inventor 陈晓岚
Owner 北京科岳中科科技服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products