Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety protection method for mobile terminal, mobile terminal, safety system and application method

A mobile terminal and security protection technology, applied in the field of security zone systems, can solve the problems of low correlation of personal attributes, easy to be bypassed, easy to steal information, etc.

Inactive Publication Date: 2015-12-30
北京恒信安科技有限公司
View PDF3 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] To sum up, the existing mobile security solutions have the following problems: the non-safe area solution is post-detection type, which is easy to be bypassed, and the protected application is mixed with other third-party application software in the same operating environment, and the information is easily stolen. steal
At present, the general security zone scheme basically adopts the method of setting password, setting handwritten graphics, etc. to realize the login authentication function, and the personal attribute is not highly correlated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method for mobile terminal, mobile terminal, safety system and application method
  • Safety protection method for mobile terminal, mobile terminal, safety system and application method
  • Safety protection method for mobile terminal, mobile terminal, safety system and application method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0107] The present invention will be further described in detail below in conjunction with specific embodiments. However, it should not be understood that the scope of the above subject matter of the present invention is limited to the following embodiments, and all technologies realized based on the content of the present invention belong to the scope of the present invention.

[0108] The present invention provides a mobile terminal security protection method based on an isolated area, which mainly isolates a separate area on the mobile terminal as a safe area, and then puts the application / data to be protected in the safe area, and the user Access to applications and / or data in this security zone is required after security verification. In this way, one machine can be used for two purposes, which not only ensures the normal use of applications in the common area, but also provides higher security protection for applications in the safe area, and solves the problem of trustw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a safety protection method for a mobile terminal, a mobile terminal, a safety system and an application method. The safety protection method is used for increasing the safety of the mobile terminal and is easy in operation. According to the safety protection method for the mobile terminal, a separate area is isolated on the mobile terminal and taken as a safety area, a third party application outside the safety area cannot access the application and data in the safety area, and a user is required to pass the safety verification in order to enter into the safety area. The safety system is characterized in that a cloud safety management platform is mainly used for performing mutual collaborative interlocking between the safety area of the mobile terminal, the system kernel of the mobile terminal and the cloud safety management platform, so that the running of the safety area under a safe and reliable environment is ensured, and the safety area is safe. A trust chain is built in the safety area, an application method for realizing the running access management for the application and data on the basis of the trust chain is adopted, and the biometric features recognition is taken as the verification for entering into the safety area, so that the safety is further promoted.

Description

technical field [0001] The present invention relates to the field of mobile security and data services, and in particular to a security protection method for a mobile terminal based on an isolation zone, a mobile terminal with a security zone and an application method for the mobile terminal, a security zone system and the application of the system method. Background technique [0002] With the development of science and technology, mobile phones have become an indispensable part of people's lives, and now mobile phones are not limited to making calls, they can also perform many other functions, such as shopping, payment, playing games, etc., but also give users Many problems have been brought about, such as stolen passwords and viruses implanted in mobile phones. For this reason, mobile phone security has become a major problem today. [0003] At present, there are three main mobile security protection solutions to solve the above problems: [0004] The first is security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/74
CPCG06F21/32G06F21/74G06F2221/2149
Inventor 杨永利
Owner 北京恒信安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products