Mobile terminal and privacy disclosure prevention method thereof
A mobile terminal, privacy disclosure technology, applied in the direction of telephone communication, digital data protection, electrical components, etc., can solve problems such as our disadvantages, and achieve the effects of good security, fast format mobile phone storage, and good operation speed.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] see figure 1 , which is a schematic diagram of modules of a mobile terminal provided in Embodiment 1 of the present invention.
[0041] A mobile terminal, which includes: a factory reset module 11 , a random write operation module 12 , a display module 13 , and a receiving module 14 .
[0042] The factory reset module 11 is configured to perform factory reset on the mobile terminal according to the first manipulation instruction. For example, taking the mobile terminal as an example, the factory settings are restored according to the first manipulation instruction. Factory reset can use the method in the existing phone.
[0043] The random write operation module 12 is configured to perform at least one random data write operation on the mobile terminal according to the second manipulation instruction. For example, the random write operation module performs a random data write operation on the user-operable mobile phone storage space, so as to achieve faster formattin...
Embodiment 2
[0055] see image 3 , which is a schematic diagram of modules of a mobile terminal provided in Embodiment 2 of the present invention.
[0056] A mobile terminal, which includes: a judgment module 21 , an instruction generation module 22 , a factory reset module 23 , and a random write operation module 24 .
[0057] The judging module 21 is configured to judge whether the mobile terminal is in a preset state. For example, the preset state includes a preset geographic location, a preset time period, and / or a preset acceleration and so on.
[0058] The command generation module 22 is configured to issue a first manipulation command and a second manipulation command when the mobile terminal is in a preset state. For example, when the mobile terminal is at a preset geographic location and a preset time period, the instruction generation module sends out the first manipulation instruction and the second manipulation instruction. Alternatively, when the mobile terminal is at a pre...
Embodiment 3
[0070] Compared with the second embodiment, the difference lies in that in this embodiment, a judging module of the mobile terminal is used to judge whether the mobile terminal is outside a preset state.
[0071] In this embodiment, an instruction generating module of a mobile terminal is configured to issue a first manipulation instruction and a second manipulation instruction when the mobile terminal is not in a preset state.
[0072] In this embodiment, a method for preventing privacy leakage of a mobile terminal includes the following steps:
[0073] judging whether the mobile terminal is outside a preset state;
[0074] When the mobile terminal is outside the preset state, the first manipulation instruction and the second manipulation instruction are issued.
[0075] According to the first manipulation instruction, the mobile terminal is restored to factory settings; according to the second manipulation instruction, at least one random data writing operation is performed...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 