Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile terminal information resource safety security control and realizing method

A mobile terminal and security technology, applied in the field of communication, can solve the problem of no consideration, reduce the loss of information loss and leakage, and achieve the effect of destruction

Inactive Publication Date: 2007-06-13
ZTE CORP
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A common feature of these methods that have been adopted is that they do not consider effective solutions from the perspective of information resource protection after the mobile phone is stolen.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal information resource safety security control and realizing method
  • Mobile terminal information resource safety security control and realizing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further introduced below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.

[0032] A mobile terminal information resource security assurance system, comprising a mobile terminal 1, a security assurance control server 2 (Information Assurance Control Server: IACS) and a network side database 3, wherein the security assurance control server 2 is directly connected to the network side database 3, and the mobile terminal 1 is connected to the security control server 2 through a wireless access network. The security assurance control server 2 can also be connected to an external network to realize mutual transmission of data.

[0033] Referring to Figure 2, the security control server 2 is the key to the entire system, and it includes: a user identity authentication unit, which provides confirmation of user ownership of information resources; a registration center unit, whi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This system consists of mobile terminals (MT), the safeguard control server (SCS) and the net-side database (ND). SCS controls the MT info operation. SCS connects directly to ND. MTs connect with SCS via wireless accessing net. This invention also discloses a MT info resource safeguarding method to spare the MT info. After MT is lost, MT info can be restored or the info in MT can be auto destroyed. These reduce effectively the loss of info losing or info leakage due to losing the handset.

Description

technical field [0001] The invention relates to a mobile terminal information resource security guarantee system and an implementation method thereof, belonging to the technical field of communication. Background technique [0002] With the continuous development of electronic technology and computer technology, the hardware performance and software functions of mobile terminals such as mobile phones have been greatly improved, and they have become effective assistants in people's lives. A large amount of private information, contact numbers, communication records, memos, and text messages are conveniently stored on the mobile phone, or are bound with account numbers and passwords of game providers and value-added service providers, or customized calls that do not limit time and region and access services, or have the "access control" opening function for community entrances, building doors, home doors, office doors, safes, cars, computers, and mobile hard disks. Once the mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04W8/24H04W12/06
Inventor 张峰
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products