Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for destroying terminal data

A data and terminal technology, applied in the field of electronic communication, can solve the problems of illegal user recovery, incomplete deletion, data leakage, etc., and achieve the effect of preventing illegal recovery, convenient and quick destruction, and avoiding data leakage

Inactive Publication Date: 2010-08-25
ZTE CORP
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, with the development of communication technology, some functions implemented on the computer will be implemented on the mobile phone, for example: the space of the internal or external storage device is getting larger and larger, etc. The development of this technology, on the one hand, facilitates users. Users can store files in the storage device of the mobile phone, which will also bring the risk of data leakage to mobile phone users. Even if the user has deleted the data on the mobile phone, because the deletion is not complete, it may be restored by illegal users. illegal use
[0003] In the patent CN101600208, a system and method for automatically destroying data stored in mobile phones are provided, but this solution only deletes data, and there is a risk of illegal recovery of deleted data
In the patent CN200610060652.X, a kind of use of activation code matching is provided, and then the data in the destruction area in the terminal is destroyed according to the matching situation, and the relevant data is covered, but this patent only considers the destruction of the internal storage data of the mobile terminal, and does not Consider the destruction of data in external storage devices and Subscriber Identity Module (SIM, Subscriber Identity Module) cards. At the same time, the destruction of data in the destruction area takes a certain amount of time. When the data is not completely destroyed, it is forcibly cracked to obtain the data. possible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for destroying terminal data
  • Method and device for destroying terminal data
  • Method and device for destroying terminal data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The basic idea of ​​the present invention is: the remote terminal sends a destruction instruction to the terminal, the data destruction module of the terminal analyzes the destruction instruction and determines the priority of data destruction, and destroys the data according to the priority and the analysis result;

[0024] Wherein, the remote terminal is any terminal that can send a destruction command, and the terminal is a terminal that needs to destroy data and is equipped with a data destruction module.

[0025] The present invention is described in detail below in conjunction with accompanying drawing and specific embodiment, as shown in Figure 1, the specific steps that the present invention realizes destroying terminal data are as follows:

[0026] Step 101, the terminal starts the data destruction module;

[0027] The terminal starts the data destroying module, the starting is automatically running in the background when the terminal is turned on, and the data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for destroying terminal data, which comprises that: a remote terminal sends a destruction command to a terminal; and the data destruction module of the terminal resolves the destruction command and destroys data according to the priority carried by the destruction command and the result of the resolution. The invention also discloses a device for destroying the terminal data. When the method and the device of the invention are adopted, the illegal acquisition of secret data is avoided, and the restoration of deleted data is prevented.

Description

technical field [0001] The invention relates to the field of electronic communication, in particular to a method and device for destroying terminal data. Background technique [0002] With the development of society and the improvement of people's living standards, mobile terminals, such as mobile phones, are becoming more and more popular and become an indispensable communication tool in people's daily life. At the same time, with the development of communication technology, some functions implemented on the computer will be implemented on the mobile phone, for example: the space of the internal or external storage device is getting larger and larger, etc. The development of this technology, on the one hand, facilitates users. Users can store files in the storage device of the mobile phone, which will also bring the risk of data leakage to mobile phone users. Even if the user has deleted the data on the mobile phone, because the deletion is not complete, it may be restored ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04L9/32H04M1/72436H04M1/72463
CPCH04W12/02H04W8/22H04W88/02H04W12/082
Inventor 陈永亮黄翠荣刘莹
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products