CN202759505U - Intelligent mobile terminal having encryption and destruct functions - Google Patents
Intelligent mobile terminal having encryption and destruct functions Download PDFInfo
- Publication number
- CN202759505U CN202759505U CN201220354554.8U CN201220354554U CN202759505U CN 202759505 U CN202759505 U CN 202759505U CN 201220354554 U CN201220354554 U CN 201220354554U CN 202759505 U CN202759505 U CN 202759505U
- Authority
- CN
- China
- Prior art keywords
- module
- self
- mobile terminal
- destruction
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The utility model relates to the field of telephone communication utilizing electromagnetic waves and specifically relates to an intelligent mobile terminal having encryption and destruct functions. The intelligent mobile terminal having the encryption and destruct functions includes a central processor (1), an internal storage (21), an external storage (22), an input device (31), an output device (32), a modulation-demodulation module (4), a wireless communication antenna and an RFID antenna (52). The intelligent mobile terminal having the encryption and destruct functions is characterized in that the intelligent mobile terminal having the encryption and destruct functions also includes an encryption module (61) and a destruct module (62). Both of the encryption module (61) and the destruct module (62) are selected to be read-only storages. Encryption algorithm programs are stored in the encryption module (61) while data deletion programs are stored in the destruct module (62). Both of the encryption module (61) and the destruct module (62) are connected to the central processor (1) through signal lines. The intelligent mobile terminal having the encryption and destruct functions provided by the utility model is simple in structure, convenient to use, flexible in adjustment and high in safety performance.
Description
Technical field
The utility model relates to and utilizes electromagnetic field of telephone communication, is specially a kind of with encrypting and the intelligent mobile terminal of self-destruction.
Background technology
Mobile phone is just developed rapidly at present as Wireless Telecom Equipment, and especially the market share of smart mobile phone (Smartphone) constantly enlarges.So-called smart mobile phone, refer to have some characteristic of PC, independently open operating system is installed, can the software that the third party service provider provides be installed voluntarily by the user, come continuous practical function to expand by this type of software, and can realize by mobile communication network the mobile phone of wireless network access.Smart mobile phone has broken through that regular handset only possesses incoming call and the restriction of the simple communication function got, and is regarded as intelligent mobile terminal, and the boundary of computer is also day by day fuzzy.Because the function of smart mobile phone is become stronger day by day, the fail safe of smart mobile phone also draws attention day by day.But, present smart mobile phone, the safety measure during to transfer of data relatively lacks, and easily divulges a secret, and causes damage to the user.
The utility model content
In order to overcome the defective of prior art, a kind of simple in structure, easy to use, flexible, safe mobile communication equipment of debugging is provided, the utility model discloses a kind of with encrypting and the intelligent mobile terminal of self-destruction.
The utility model reaches goal of the invention by following technical solution:
A kind of intelligent mobile terminal with encryption and self-destruction, comprise central processing unit, built-in storage, external memory, input equipment, output equipment, modulation-demodulation module, radio antenna and RFID antenna, built-in storage, external memory, input equipment, output equipment and modulation-demodulation module are connected by holding wire connection central processing unit; Radio antenna is connected with the RFID antenna by holding wire connection modulation-demodulation module; It is characterized in that: also comprise encrypting module and self-destruction module, encrypting module and self-destruction module are all selected read-only memory, store the cryptographic algorithm program in the encrypting module, the self-destruction module memory contains the data delete program, and encrypting module is connected with the self-destruction module by holding wire connection central processing unit.
Described intelligent mobile terminal with encryption and self-destruction, it is characterized in that: encrypting module and self-destruction module are all selected Erarable Programmable Read only Memory or Electrically Erasable Read Only Memory.
Described intelligent mobile terminal with encryption and self-destruction, it is characterized in that: external memory is selected flash card; Input equipment is selected keyboard, and output equipment is selected LCDs; Radio antenna is selected GSM antenna or CDMA antenna.
Described intelligent mobile terminal with encryption and self-destruction, it is characterized in that: external memory is selected flash card; Input equipment and output equipment are all selected touch-screen; Radio antenna is selected GSM antenna or CDMA antenna.
When the utility model uses, when intelligent mobile terminal uses, the user needs by input equipment input password, central processing unit judges whether the password of user's input is correct, input and can allow use in the correct situation, the password of intelligent mobile terminal is kept in the built-in storage after cryptographic algorithm is processed; When intelligent mobile terminal with the external world exchanges data occured, central processing unit calls to be exported or stores after the cryptographic algorithm program logarithm of storing in the encrypting module applies close computing factually; Central processing unit judges that intelligent mobile terminal is maliciously attacked even when illegally using, central processing unit calls the data delete program of self-destruction module memory storage the data of storing in built-in storage and the external memory is implemented deletion action, and anti-important information is revealed and caused damage.By transposing encrypting module and self-destruction module or renewal cryptographic algorithm program and data delete program, can realize that the upgrading of cryptographic operation and self-destruction operation substitutes.
The beneficial effects of the utility model are: simple in structure, easy to use, debugging flexibly, and is safe.
Description of drawings
Fig. 1 is structural representation of the present utility model.
Embodiment
Below further specify the utility model by specific embodiment.
A kind of intelligent mobile terminal with encryption and self-destruction, comprise central processing unit 1, built-in storage 21, external memory 22, input equipment 31, output equipment 32, modulation-demodulation module 4, radio antenna 51, RFID antenna 52, encrypting module 61 and self-destruction module 62, as shown in Figure 1, concrete structure is: built-in storage 21, external memory 22, input equipment 31, output equipment 32, modulation-demodulation module 4, encrypting module 61 and self-destruction module are connected all by holding wire connection central processing unit 1; Radio antenna 51 is connected with the RFID antenna all by holding wire connection modulation-demodulation module 4; Encrypting module 61 and self-destruction module 62 are all selected read-only memory, store the cryptographic algorithm program in the encrypting module 61, store the data delete program in the self-destruction module 62.
Flash card, namely Flash Card is to utilize flash memory (Flash Memory) technology to reach the memory of storage of electronic information.Flash card has Smart Media(to be called for short SM) card, Compact Flash(be called for short CF) card, Multi Media Card(be called for short MMC) card, Secure Digital(be called for short SD) block, Memory Stick(is memory stick), XD-Picture Card(is called for short XD) block and the kind such as micro harddisk (being microdrive), can according to circumstances select flexibly.
When the present embodiment uses, when intelligent mobile terminal uses, the user needs by input equipment input password, central processing unit judges whether the password of user's input is correct, input and can allow use in the correct situation, the password of intelligent mobile terminal is kept at 21 li in built-in storage after cryptographic algorithm is processed; When intelligent mobile terminal and extraneous when exchanges data occurs, the cryptographic algorithm program logarithm that central processing unit 1 calls encrypting module 61 interior storages applies again output or storage after the close computing factually; Central processing unit 1 judges that intelligent mobile terminal is maliciously attacked even when illegally using, central processing unit 1 calls the data delete program of self-destruction module 62 interior storages the data of built-in storage 21 and external memory 22 interior storages is implemented deletion action, and anti-important information is revealed and caused damage.By transposing encrypting module 61 and self-destruction module 62 or renewal cryptographic algorithm program and data delete program, can realize that the upgrading of cryptographic operation and self-destruction operation substitutes.
Embodiment 2
A kind of intelligent mobile terminal with encryption and self-destruction, comprise central processing unit 1, built-in storage 21, external memory 22, input equipment 31, output equipment 32, modulation-demodulation module 4, radio antenna 51, RFID antenna 52, encrypting module 61 and self-destruction module 62
Other structures and using method are all same with embodiment 1.
Claims (4)
1. one kind with encrypting and the intelligent mobile terminal of self-destruction, comprise central processing unit (1), built-in storage (21), external memory (22), input equipment (31), output equipment (32), modulation-demodulation module (4), radio antenna (51) and RFID antenna (52)
Built-in storage (21), external memory (22), input equipment (31), output equipment (32) are connected 4 with the modulation-demodulation module) all connect central processing unit (1) by holding wire;
Radio antenna (51) is connected 52 with the RFID antenna) all connect modulation-demodulation module (4) by holding wire;
It is characterized in that: also comprise encrypting module (61) and self-destruction module (62), encrypting module (61) and self-destruction module (62) are all selected read-only memory, encrypting module stores the cryptographic algorithm program in (61), the self-destruction module stores the data delete program in (62), and encrypting module (61) is connected 62 with the self-destruction module) all connect central processing unit (1) by holding wire.
2. as claimed in claim 1 with encrypting and the intelligent mobile terminal of self-destruction, it is characterized in that: encrypting module (61) and self-destruction module (62) are all selected Erarable Programmable Read only Memory or Electrically Erasable Read Only Memory.
3. as claimed in claim 1 or 2 with encrypting and the intelligent mobile terminal of self-destruction, it is characterized in that: external memory (22) is selected flash card; Input equipment (31) is selected keyboard, and output equipment (32) is selected LCDs; Radio antenna (51) is selected GSM antenna or CDMA antenna.
4. as claimed in claim 1 or 2 with encrypting and the intelligent mobile terminal of self-destruction, it is characterized in that: external memory (22) is selected flash card; Input equipment (31) and output equipment (32) are all selected touch-screen; Radio antenna (51) is selected GSM antenna or CDMA antenna.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201220354554.8U CN202759505U (en) | 2012-07-22 | 2012-07-22 | Intelligent mobile terminal having encryption and destruct functions |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201220354554.8U CN202759505U (en) | 2012-07-22 | 2012-07-22 | Intelligent mobile terminal having encryption and destruct functions |
Publications (1)
Publication Number | Publication Date |
---|---|
CN202759505U true CN202759505U (en) | 2013-02-27 |
Family
ID=47738664
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201220354554.8U Expired - Fee Related CN202759505U (en) | 2012-07-22 | 2012-07-22 | Intelligent mobile terminal having encryption and destruct functions |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN202759505U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105610769A (en) * | 2014-11-25 | 2016-05-25 | 阿里巴巴集团控股有限公司 | Method, device and system for information leakage prevention |
CN106059755A (en) * | 2016-06-28 | 2016-10-26 | 努比亚技术有限公司 | Encryption communication method and device |
-
2012
- 2012-07-22 CN CN201220354554.8U patent/CN202759505U/en not_active Expired - Fee Related
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105610769A (en) * | 2014-11-25 | 2016-05-25 | 阿里巴巴集团控股有限公司 | Method, device and system for information leakage prevention |
CN105610769B (en) * | 2014-11-25 | 2019-07-05 | 阿里巴巴集团控股有限公司 | Method, equipment and the system of anti-information leakage |
CN106059755A (en) * | 2016-06-28 | 2016-10-26 | 努比亚技术有限公司 | Encryption communication method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104967997B (en) | A kind of Wi-Fi cut-in method, Wi-Fi equipment, terminal device and system | |
US9384162B2 (en) | Mobile device, transaction system including the mobile device, and method of signal transmission in a mobile device | |
KR100898055B1 (en) | System for protecting private information of uicc and method thereof | |
CN104935744A (en) | Verification code display method, verification code display device and mobile terminal | |
CN101605325B (en) | Method for identity authentication, mobile terminal, server, and identity authentication system | |
US20170201378A1 (en) | Electronic device and method for authenticating identification information thereof | |
CN101977263B (en) | Method and mobile terminal for encrypting double-card mobile terminal | |
CN101815128A (en) | Method and device for destroying terminal data | |
CN107871015B (en) | Log data processing method and device, terminal and readable storage medium | |
CN104281950A (en) | Method and device for improving electronic payment safety | |
CN104881667A (en) | Characteristic information extraction method and apparatus | |
CN103491086A (en) | Safety payment method and device for mobile terminal | |
CN103546555A (en) | Method and system for data management of mobile terminal | |
CN105678135A (en) | Electric power data collection and transmission terminal | |
CN103686688A (en) | Method and device for protecting user address list of mobile terminal and mobile terminal | |
CN102368798A (en) | Mobile phone setting control system, control method thereof, mobile phone setting method, apparatus thereof and mobile phone | |
CN202759505U (en) | Intelligent mobile terminal having encryption and destruct functions | |
CN102387255B (en) | Method and device for utilizing intelligent card to process third-party expanded service data | |
US20100211716A1 (en) | Communication device and method for securing data | |
CN103002430B (en) | Method, the Apparatus and system of a kind of terminal applies and termination number binding | |
CN103152724A (en) | Method and system for locking SIM (subscriber identity module) card by utilizing hardware | |
CN102122342B (en) | Mobile phone password inputting method and mobile phone using same | |
JP5457743B2 (en) | IC card and portable electronic information device | |
CN101588643B (en) | Card with mobile phone application software development platform | |
CN103152464B (en) | Equipment, method and system of obtaining fixed phone calling information through wireless way |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20130227 Termination date: 20200722 |
|
CF01 | Termination of patent right due to non-payment of annual fee |