Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Mobile terminal and data encryption method thereof

A mobile terminal, data encryption technology, applied in digital data protection, electrical digital data processing, instruments, etc., can solve problems such as mobile terminal data security, and achieve the effect of protecting integrity and improving security.

Inactive Publication Date: 2015-03-25
PHICOMM (SHANGHAI) CO LTD
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a mobile terminal and its data encryption method to solve the problem of mobile terminal data security in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal and data encryption method thereof
  • Mobile terminal and data encryption method thereof
  • Mobile terminal and data encryption method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0036] Such as figure 1 As shown, the present invention provides a mobile terminal, including: a security core domain 11 built in the system 1 in which the mobile terminal operates, including: a security module 111, which is used to encrypt user sensitive data, and encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mobile terminal and the data encryption method thereof. The method comprises the following steps: setting up a security core domain in the system run by the mobile terminal, and setting up a security module in the security core domain for encrypting user sensitive data and saving the encrypted data in the security core domain, wherein the security module is used for verifying the access behavior to the encrypted data, so that only the decrypted user can access the user sensitive data, and only the application program given the security access right can access the decoded data. The mobile terminal and the data encryption method protect the integrity of the system from software and hardware levels, and improve the security of a mobile terminal system.

Description

technical field [0001] The invention relates to the technical field of electronic mobile terminals, in particular to a mobile terminal and a data encryption method thereof. Background technique [0002] Existing mobile terminal systems, such as Android and Apple systems, are the most widely used systems in the market. With the development of network and hardware, many operations of users have been transferred from traditional computers to mobile terminals, such as: bank remittance, shopping, chatting, etc. In this case, mobile terminals have become various malware and viruses The target of the attack, its security issue has always been the most focused issue, and personal sensitive data is stored in these systems, facing serious security issues. It is often reported on the Internet that mobile phones have been hacked, personal data has been leaked, super viruses and other news have caused users' personal privacy and economic interests to be violated. How to store and access...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6218G06F2221/2107
Inventor 朱为朋
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products