Unlock instant, AI-driven research and patent intelligence for your innovation.

data access method

A data access and data technology, applied in the direction of preventing unauthorized use of memory, etc., can solve problems such as user troubles, address book deletion, and mobile communication device owners' troubles

Active Publication Date: 2016-04-27
ACER INC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, if other users change the settings by mistake or delete the original data by mistake when using the mobile communication device, it will cause troubles for the owner of the mobile communication device in use.
For example, there are other members in the user's family, such as younger children playing with their father's mobile phone, accidentally changing the settings in the mobile phone, or accidentally deleting the address book, etc. trouble

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • data access method
  • data access method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0022] figure 1 is a flow chart of the data access method according to the first embodiment of the present invention. In this embodiment, in order to prevent other users from destroying the original settings and data, a protection mode is set in the mobile communication device. For example, when the mobile communication device is intended to be used by other users, the protection mode can be enabled to prevent other users from changing the original data in the mobile communication device. The steps of the data access method of the mobile communication device will be described in detail below.

[0023] Please refer to figure 1 , in step S105, divide a specific block in the storage unit of the mobile communication device to store the operation data executed when the protection mode is enabled. Furthermore, the storage unit includes an original block and a specific block, wherein the original block is used to store operation data executed under a normal state (that is, when th...

no. 2 example

[0029] figure 2 is a flow chart of the data access method according to the second embodiment of the present invention. In this embodiment, the storage unit of the mobile communication device includes an original block and a specific block. Wherein, the original block is used to store the operation data executed in the normal state (that is, the state in which the protection mode is disabled). The specific block is used to store operation data executed when the protection mode is enabled.

[0030] Please refer to figure 2 , in step S205, it is determined whether the protection mode is enabled. For example, a hotkey may be set on the mobile communication device by which the protected mode is enabled. Alternatively, set an option in the menu of the mobile communication device to enable the protected mode. If the protection mode is not enabled, execute step S210 to access the original block. That is, it is processed like general data.

[0031] If the protection mode is en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A data access method is suitable for a mobile communication device. A storage unit of the mobile communication device comprises a specific area block and an original area block. In the data access method, the specific area block is accessed according to a mapping mode when the mapping mode is used by the executed operation data under a protection model. On the other hand, the operation data are recorded in the original area block when the mapping mode is not used by the executed operation data.

Description

technical field [0001] The invention relates to a data protection mechanism, in particular to a data access method of a mobile communication device with a protection mode. Background technique [0002] With the development of technology, consumer electronic products such as personal digital assistants (Personal Digital Assistant, PDA), portable computers and smart mobile phones (SmartPhone) are becoming more and more popular. Diversification. For example, many users can not only answer and make phone calls through the mobile communication device, but also record daily life items or work items through the mobile communication device. Consumer electronics products have become an indispensable tool in life or work. [0003] However, if other users mistakenly change the settings or delete the original data by mistake when using the mobile communication device, it will cause confusion to the owner of the mobile communication device in use. For example, there are other members ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14
Inventor 张开涛
Owner ACER INC