Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for protecting information security of smartphone

A smart phone and information security technology, which is applied in the field of cloud computing technology and mobile computing, can solve the problem of low data security and achieve the effect of improving reliability and protecting security

Active Publication Date: 2016-03-23
BEIJING UNION UNIVERSITY
View PDF8 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] 1. Solve the problem of low data security of existing smartphones

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting information security of smartphone
  • Method and system for protecting information security of smartphone
  • Method and system for protecting information security of smartphone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0123] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0124] like Figure 1-3 As shown, the system module diagram is shown in image 3 shown.

[0125] When the application in the mobile phone saves data, it does not directly call the file write operation of the operating system, but calls the program on the mobile phone. After splitting and encrypting, the data distributor calls the write operation to split the encrypted data. , according to the data slice storage settings, save in local and multiple cloud storage spaces.

[0126] When the application program calls the data, it is completed by providing the file name (including the storage path) of the data slice file to the program on the mobile phone.

[0127] A method and system for protecting the security of smartphone data. The core of the technical realization is that the storage of smartphone data is distributed in the mobile phone and multiple c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and system for protecting information security of a smartphone. The system is divided into two parts including a smartphone side sub-system and a cloud side sub-system in the aspect of technical implementation; the application software in the smartphone stores and reads data by invoking the smartphone side sub-system; the smartphone side sub-system splits the data of the application software into a data fragment and encrypts; and the data form a data fragment file in a data fragment form and are stored in the smartphone and a plurality of cloud side storage spaces in a distributed manner. The cloud side sub-system completes locking of cloud side data when the smartphone is lost and unlocking when data of the smartphone are recovered; when the smartphone is lost or single cloud side storage space is attacked, an illegal gainer only can obtain meaningless fragment data in the smartphone or the cloud side storage space; furthermore, due to distributive storage of the data, the data redundancy is ensured; and the data integrity in data recovery can also be ensured after a smartphone user loses the smartphone.

Description

technical field [0001] The invention relates to cloud computing technology and mobile computing technology, is mainly applied in the field of information security of smart phones, and can effectively improve the security and reliability of key information in smart phones. Background technique [0002] Related technologies mainly include: cloud computing technology, mobile computing technology and information security technology. [0003] Mobile computing is a new technology emerging with the development of mobile communication, Internet, database, distributed computing and other technologies. Mobile computing technology will enable computers or other information intelligent terminal devices to realize data transmission and resource sharing in a wireless environment. Its role is to provide useful, accurate and timely information to any customer, anytime, anywhere. [0004] Smartphones are mobile terminal devices in mobile computing. [0005] Cloud computing is a business c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F11/14G06F21/56
CPCG06F21/56G06F21/6218G06F2221/2141
Inventor 张玉祥
Owner BEIJING UNION UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products