Method for realizing information safety through conversation and mobile terminal thereof

An information security and mobile terminal technology, applied in the field of methods and mobile terminals, can solve the problems of easy uninstallation and complicated operation, and achieve the effect of simplifying operation, avoiding complicated operation and improving user experience.

Inactive Publication Date: 2013-10-02
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method for realizing information security by using a call, so as to protect the information security in the mobile phone by using the call function of the mobile phone when the mobile phone is stolen, and avoid the problem of complicated operation and easy uninstallation when using third-party software. This simplifies operations, maximizes the protection of mobile phone security, and improves user experience.
[0005] Another object of the present invention is to provide a mobile terminal that uses calls to achieve information security, so that when the phone is stolen, the call function of the phone can be used to protect the information security in the phone, and avoid complicated operations and easy uninstallation when using third-party software problems, thereby simplifying operations, maximizing the protection of mobile phone security, and improving user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing information safety through conversation and mobile terminal thereof
  • Method for realizing information safety through conversation and mobile terminal thereof
  • Method for realizing information safety through conversation and mobile terminal thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Embodiments of the present invention will now be described with reference to the drawings, in which like reference numerals represent like elements.

[0037] Please refer to figure 1 , describes the working process of an embodiment of the method for realizing information security by using a call in the present invention. like figure 1 shown, including the following steps:

[0038] Step S101, setting a security number and a security operation; wherein the security number is a mobile number or a fixed-line number, and the security operation is to lock the mobile phone, delete information, automatically alarm or any combination of the three, and the specific implementation process of deleting information is: call the reset of the system Clear the interface to restore the data to factory settings, so that when the mobile phone is lost or stolen, the user's private information in the mobile phone can be deleted to ensure information security. The specific process of automa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing information safety through conversation, which comprises the following steps: judging whether the incoming telephone number is a safe number or not; conducting safety operation according to the judgment result. Compared with the prior art, the method for realizing information safety through conversation provided by the invention judges whether the incoming telephone number is a safe number or not, if yes, conducting the safety operation, so as to realize the function of using mobile phone conversation function to start safety operation to protect the safety of the information in the mobile phone, the inherent nature and the system coupling of the mobile phone conversation function avoids the problem that the using of third-party software is complex in operation and easy to be unloaded, the operation is simplified, the mobile phone safety is maximally protected, and a user's experience is improved. The invention further discloses a mobile terminal realizing information safety through conversation.

Description

technical field [0001] The present invention relates to the technical field of mobile communication, and more particularly relates to a method for realizing information security by calling and a mobile terminal thereof. Background technique [0002] With the development and popularization of mobile phones, more private information of users is involved in mobile phones, so mobile phone security is particularly important. At present, in order to ensure that the user's mobile phone can be retrieved in time or to ensure the information security of the mobile phone when it is stolen or lost, people have developed many third-party software to protect the security of the mobile phone, such as anti-theft software. When the mobile phone is lost or stolen, the anti-theft software will automatically send a reminder text message to the predetermined number when the mobile phone replaces the SIM card. After receiving the text message, the owner only needs to reply to different instructio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M3/42H04M1/725
Inventor 赵兴
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products