Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting security of mobile communication terminal data and device thereof

A mobile communication terminal and data security technology, which is applied in the field of protecting mobile communication terminal data security, can solve problems such as being too simple, easy to be cracked, and insufficiently comprehensive data protection, so as to achieve the effect of protecting security and ensuring that it will not be leaked

Active Publication Date: 2010-03-17
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Among the existing methods for protecting mobile communication terminal data, some methods are: extract the data that the mobile communication terminal needs to protect and save it to a specific address in the FLASH. Although this specific address is unknown in this method, the illegal After reading the FLASH data, you can use some means to find the storage place of important information data. Since these data are not encrypted, illegals can use them at will. In this way, the information of mobile communication terminals cannot be well protected.
[0007] The method that also has is: adopt to short message setting confidentiality sign position, the short message that wants protection is encrypted and concealed, but this method does not adopt more complex key algorithm, is too simple, is easy to be cracked, and only For the specified protection short message, the protection data is not comprehensive enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting security of mobile communication terminal data and device thereof
  • Method for protecting security of mobile communication terminal data and device thereof
  • Method for protecting security of mobile communication terminal data and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The basic thought of the present invention is: respectively set administrator's password, limited user's password, and generate administrator's key, restricted user's key respectively according to setting key algorithm; After exporting, encrypt according to the generated administrator key, and then re-write the FLASH; unlock the administrator password and decrypt the administrator key to view the data of the encrypted data module; unlock only the unencrypted data module through the restricted user password The data of the data module.

[0038] Specifically, after successfully unlocking through the administrator password, when viewing the data of the data module encrypted by the administrator key, read the administrator key stored in FLASH to decrypt; after successfully unlocking through the restricted user password , when viewing the data of the data module that has been encrypted by the administrator key, read the restricted user key for decryption, because the encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting the security of mobile communication terminal data, comprising the steps: generating an administrator key by setting an administrator password; encrypting a data module which needs to be encrypted; and when starting or unlocking a lock screen, inputting a password by a mobile communication terminal, generating a temporary key with the inputted password, and checking user identification; and when viewing the data module which is encrypted by the administrator key and checking user identification as an administrator user, reading the administratorkey or the temporary key, and decrypting the data to be viewed. The invention simultaneously discloses a device for protecting the security of the mobile communication terminal data. The method can protect the security of private information in a user mobile communication terminal; and in addition, a limited user key also can be set, and a limited user only can view a non-encrypted data module, therefore, the private information can also be prevented from being leaked even if the other persons appreciate the mobile communication terminal.

Description

technical field [0001] The invention relates to the field of data security, in particular to a method and device for protecting data security of a mobile communication terminal. Background technique [0002] With the development of society, people's living standards are improving day by day, and mobile communication terminals such as mobile phones are becoming more and more popular. With the popularization of the third generation (3G) mobile communication technology, the functions of the mobile communication terminal are continuously increasing, and the stored information of the mobile communication terminal is also continuously increasing. Some stored information in the mobile communication terminal is very important to the user, and if it is obtained by others or opponents, it will have a great impact on the user. Generally, in an ordinary mobile communication terminal, important information is mainly stored in the flash memory (FLASH) of the mobile communication terminal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/03H04W12/041
CPCH04L63/105G06F21/602H04L63/08H04L2209/80G06F21/6218H04L9/3228H04L9/32G06F21/604H04L9/0897G06F2221/2107
Inventor 黄翠荣
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products