Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile terminal data safety protection method and device

A mobile terminal and data security technology, applied in digital data protection, security devices, electrical digital data processing, etc., can solve the problems of high energy consumption, unreliable security, and single function, so as to save electric energy, prolong protection time, The effect of increasing safety

Active Publication Date: 2015-06-10
HIERSTAR SUZHOU
View PDF11 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the static password is memorized by the user's brain, there is a risk of forgetting, and once the mobile terminal is lost, this static password is very easy to crack through technical means, which shows that its security is not reliable
[0005] Simultaneously, the existing mobile phone safety protectors on the market have a single function and are mainly used to prevent the mobile terminal from being lost or stolen. The method is to alarm when the distance between the mobile terminal and the user exceeds a certain distance, and its It needs to maintain an uninterrupted Bluetooth connection with the mobile phone, which consumes a lot of energy and is not suitable for long-term use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal data safety protection method and device
  • Mobile terminal data safety protection method and device
  • Mobile terminal data safety protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0126] Considering that the user is often outdoors, the protection device should be easy to carry and not easy to lose, and at the same time, taking into account the outdoor communication problem between the two, in this embodiment, the protection device 1 can be a device with Bluetooth function; the mobile terminal 2 and the protection device 1 use Bluetooth 4.0 BAS, IAS Profile protocol for intermittent communication of data information. The reason for adopting intermittent communication is that a large amount of electric energy can be saved, so as to increase the protection time of the protection device for the mobile terminal.

[0127] The mobile terminal 2 first opens the Bluetooth connection to search, and selects the corresponding protection device 2 to establish the Bluetooth connection. The mobile terminal 2 sets a master key of a specified length, and transmits the original output of the master key to the protection device 2 in the form of a data packet, ordering it ...

Embodiment 2

[0142] Considering that when working indoors, the protection device 1 can use a wireless router that supplies power indoors for a long time. The advantage of this protection device is that the wireless network covers a large area and can protect multiple mobile terminals connected to the network at the same time. Since there must be a power supply in the room, the protection device 1 and the mobile terminal 2 can avoid the consideration of power saving, so the mobile terminal can maintain a continuous connection state with the protection device. Of course, an intermittent connection may still be used here, which is not limited in this embodiment.

[0143] The mobile terminal 2 first opens the wifi connection to search, and selects the corresponding protection device 2 to establish the wifi connection. The mobile terminal 2 sets a master key of a specified length, and transmits the original output of the master key to the protection device 2 in the form of a data packet, orderi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile terminal data safety protection method. A key is stored in a protection device, the key is read when the mobile terminal and the protection device are within a safety effective distance, encryption or decryption processing is carried out on data inside the mobile terminal via the read key, or otherwise, encryption or decryption processing cannot be carried out. The invention also provides a mobile terminal data safety protection device. According to the above principle, the mobile terminal data safety protection device comprises the protection device and the mobile terminal, wherein the two are in wireless connection. Through judging whether the physical distance between the two is in a preset safety effective range, the key is read when the mobile terminal and the protection device are within a safety effective distance, encryption or decryption processing is carried out on data inside the mobile terminal via the read key, or otherwise, encryption or decryption processing cannot be carried out. Due to the method and the device of the invention, safety of data in the mobile terminal can be effectively enhanced.

Description

technical field [0001] The invention relates to the technical field of data security protection, in particular to a data security protection method and equipment suitable for mobile terminals. [0002] Background technique [0003] With the rapid popularization and development of smart mobile terminals of various systems, their functions are constantly being developed and improved. For example, a mobile phone is not only an indispensable communication device, but also an indispensable office device in modern life. The mobile phone not only includes personal private data, but also includes very important office data information or confidentiality. In life, people often bring great loss and distress because of the loss of the mobile terminal or forgetting it somewhere. [0004] The current protection method for the internal information of the mobile terminal is usually to set a static password on the mobile terminal, and to view encrypted data by inputting the static passwor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02G06F21/62
CPCG06F21/6236H04W12/02
Inventor 杨贵龙顾兵张平
Owner HIERSTAR SUZHOU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products