Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal information security method and device

A technology of terminal information and confidentiality method, which is applied in the field of mobile communication and can solve problems such as disadvantageous protection of user's personal privacy.

Active Publication Date: 2011-12-07
ZTE CORP
View PDF9 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention provides a terminal information security method and device to solve the problem in the prior art that using a separate area to store secret information allows others to easily know that the mobile phone has stored secret information, which is not conducive to protecting the user's personal privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal information security method and device
  • Terminal information security method and device
  • Terminal information security method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to solve the problem of using a separate area to store secret information in the prior art so that others can easily know that the mobile phone has stored secret information, which is not conducive to protecting the privacy of the user, the present invention provides a terminal information security method and device. The present invention implements The technical solution of the example proposes the concept of password authority, that is to say, by distinguishing whether the password entered by the user is a super password or a restricted password, different interfaces and information under corresponding authority and corresponding information messages are displayed respectively. The technical solution of the embodiment of the present invention also proposes a method for processing unauthorized information by a restricted login person under restricted password login. The present invention will be described in further detail below in conjunction with the accompan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a method for concealing terminal information, comprising: creating a first password and one or more second passwords for terminal information, and setting authorized information and unauthorized information according to the terminal information; when a login user logs in with the second password, on the foreground of the terminal, according to an operation of the login user, displaying information of normal processing of the authorized information and / or unauthorized information, and on the background of the terminal, executing an operation of the login user on the authorized information, and intercepting an operation of the login user on the unauthorized information; when the login user logs in with the first password, on the foreground and the background of the terminal, according to an operation of the login user, displaying and executing normal processing of the authorized information and unauthorized information. Also disclosed is a device for concealing terminal information. The technical solution of the present invention can completely and unnoticeably protect private information in a user terminal from being stolen by others.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a terminal information security method and device. Background technique [0002] In today's fast-paced work and life, mobile phones have become an indispensable tool. The rapid development of news services has greatly facilitated people's work and life, but the hidden dangers of security have become increasingly prominent. At present, in the existing technology, some mobile phones have the function of protecting and encrypting message services, mainly in the following ways: [0003] Method 1, use a password to encrypt one or more message services, and the user needs to enter the password when viewing the specified message. The above technical solution is easy to implement, but there are also obvious defects: if other people get the mobile phone, they can see some relevant information of the encrypted message during the browsing process, such as: sending time, sender, etc., s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W88/02
CPCH04L9/3226H04W88/02H04W12/02
Inventor 安昌华
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products