Personal-information leakage-proof method for mobile terminal and mobile terminal

A mobile terminal, anti-leakage technology, applied in the direction of telephone communication, electrical components, branch equipment, etc., can solve the problem of not being able to guarantee that the terminal personal user information will not be leaked, to prevent personal information from being illegally leaked, ensure power supply, prevent The effect of being illegally leaked

Inactive Publication Date: 2014-02-19
LEADCORE TECH
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For anti-theft software installed by end users themselves, these software do not exist after reburnin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal-information leakage-proof method for mobile terminal and mobile terminal
  • Personal-information leakage-proof method for mobile terminal and mobile terminal
  • Personal-information leakage-proof method for mobile terminal and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0047] In order to make the objectives, technical solutions and advantages of the present invention clearer, the various embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, a person of ordinary skill in the art can understand that, in each embodiment of the present invention, many technical details are proposed for the reader to better understand the present application. However, even without these technical details and various changes and modifications based on the following embodiments, the technical solutions claimed by the claims of this application can be realized.

[0048] The first embodiment of the present invention relates to a method for preventing personal information leakage of a mobile terminal. The specific process is as follows: figure 2 As shown, it includes the following steps:

[0049] In step 201, each time the mobile terminal is turned on, it is detected whether the mobile terminal is ille...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a mobile communication terminal and discloses a personal-information leakage-proof method for a mobile terminal and the mobile terminal. In the invention, every time the mobile terminal is started, whether the mobile terminal is used illegally is detected; when it is detected that the mobile terminal is used illegally, the mobile terminal starts at least one security clock, which exists on starting hardware and the security clock begins to timing when started. When the timing of the security clock is over, the mobile terminal is triggered to respond to a preset time-up event which is used for preventing illegal leakage of personal information of a user. Because the security clock exists on the hardware and is free from effects of operations such as preprogramming of software version, factory-setting restoration of the terminal and clearing of zone bits on a FLASH and the like, the mobile terminal is notified to execute a corresponding event through interrupt when the timing of the security clock is over so that an objective of preventing the illegal leakage of the personal information of the user is achieved.

Description

technical field [0001] The invention relates to a mobile communication terminal, in particular to a method for preventing leakage of personal information after the mobile communication terminal is lost and the mobile terminal. Background technique [0002] With the rapid development of mobile communication technology and multimedia technology, as well as the enhancement of digital processing capabilities on mobile communication terminals, more and more users save and process personal information through mobile communication terminals, including contacts, call records, short messages, etc. information. When the terminal is accidentally lost, users are more worried about the leakage of personal information on the terminal. [0003] In recent years, with the illegal disclosure of user information on smart phones, communication and software manufacturers have begun to study technologies to prevent information leakage on mobile communication terminals, including preventing illeg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/667
Inventor 段昌志
Owner LEADCORE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products