data access method
A data access and data technology, applied in the direction of preventing unauthorized use of memory, etc., can solve problems such as user troubles, address book deletion, and mobile communication device owners' troubles
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0022] figure 1 is a flow chart of the data access method according to the first embodiment of the present invention. In this embodiment, in order to prevent other users from destroying the original settings and data, a protection mode is set in the mobile communication device. For example, when the mobile communication device is intended to be used by other users, the protection mode can be enabled to prevent other users from changing the original data in the mobile communication device. The steps of the data access method of the mobile communication device will be described in detail below.
[0023] Please refer to figure 1 , in step S105, divide a specific block in the storage unit of the mobile communication device to store the operation data executed when the protection mode is enabled. Furthermore, the storage unit includes an original block and a specific block, wherein the original block is used to store operation data executed under a normal state (that is, when th...
no. 2 example
[0029] figure 2 is a flow chart of the data access method according to the second embodiment of the present invention. In this embodiment, the storage unit of the mobile communication device includes an original block and a specific block. Wherein, the original block is used to store the operation data executed in the normal state (that is, the state in which the protection mode is disabled). The specific block is used to store operation data executed when the protection mode is enabled.
[0030] Please refer to figure 2 , in step S205, it is determined whether the protection mode is enabled. For example, a hotkey may be set on the mobile communication device by which the protected mode is enabled. Alternatively, set an option in the menu of the mobile communication device to enable the protected mode. If the protection mode is not enabled, execute step S210 to access the original block. That is, it is processed like general data.
[0031] If the protection mode is en...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 