Unlock instant, AI-driven research and patent intelligence for your innovation.

Mobile terminal and privacy disclosure prevention method thereof

A mobile terminal, privacy disclosure technology, applied in the direction of telephone communication, digital data protection, electrical components, etc., can solve problems such as our disadvantages, and achieve the effects of good security, fast format mobile phone storage, and good operation speed.

Inactive Publication Date: 2014-09-10
NUBIA TECHNOLOGY CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

that's not good for us

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal and privacy disclosure prevention method thereof
  • Mobile terminal and privacy disclosure prevention method thereof
  • Mobile terminal and privacy disclosure prevention method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] see figure 1 , which is a schematic diagram of modules of a mobile terminal provided in Embodiment 1 of the present invention.

[0041] A mobile terminal, which includes: a factory reset module 11 , a random write operation module 12 , a display module 13 , and a receiving module 14 .

[0042] The factory reset module 11 is configured to perform factory reset on the mobile terminal according to the first manipulation instruction. For example, taking the mobile terminal as an example, the factory settings are restored according to the first manipulation instruction. Factory reset can use the method in the existing phone.

[0043] The random write operation module 12 is configured to perform at least one random data write operation on the mobile terminal according to the second manipulation instruction. For example, the random write operation module performs a random data write operation on the user-operable mobile phone storage space, so as to achieve faster formattin...

Embodiment 2

[0055] see image 3 , which is a schematic diagram of modules of a mobile terminal provided in Embodiment 2 of the present invention.

[0056] A mobile terminal, which includes: a judgment module 21 , an instruction generation module 22 , a factory reset module 23 , and a random write operation module 24 .

[0057] The judging module 21 is configured to judge whether the mobile terminal is in a preset state. For example, the preset state includes a preset geographic location, a preset time period, and / or a preset acceleration and so on.

[0058] The command generation module 22 is configured to issue a first manipulation command and a second manipulation command when the mobile terminal is in a preset state. For example, when the mobile terminal is at a preset geographic location and a preset time period, the instruction generation module sends out the first manipulation instruction and the second manipulation instruction. Alternatively, when the mobile terminal is at a pre...

Embodiment 3

[0070] Compared with the second embodiment, the difference lies in that in this embodiment, a judging module of the mobile terminal is used to judge whether the mobile terminal is outside a preset state.

[0071] In this embodiment, an instruction generating module of a mobile terminal is configured to issue a first manipulation instruction and a second manipulation instruction when the mobile terminal is not in a preset state.

[0072] In this embodiment, a method for preventing privacy leakage of a mobile terminal includes the following steps:

[0073] judging whether the mobile terminal is outside a preset state;

[0074] When the mobile terminal is outside the preset state, the first manipulation instruction and the second manipulation instruction are issued.

[0075] According to the first manipulation instruction, the mobile terminal is restored to factory settings; according to the second manipulation instruction, at least one random data writing operation is performed...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mobile terminal. The mobile terminal comprises a factory setting restoring module used to restore factory settings for the mobile terminal and a random write operation module used to perform random data writing operation on the mobile terminal at least once. The invention further provides a privacy disclosure prevention method of the mobile terminal. By adopting the mobile terminal and the privacy disclosure prevention method thereof, data can be thoroughly deleted, and high safety is achieved.

Description

technical field [0001] The invention relates to the technical field of mobile terminals, in particular to a mobile terminal and a method for preventing privacy leakage. Background technique [0002] With the development of the times and mobile terminals, smart phones have become a part of people's work and life. In addition, smart phones are constantly being introduced, and many users are changing their phones faster and faster. How to deal with unused mobile phones? Many users give away or sell their old smartphones that they don't use. In order not to leak privacy, most people will delete photos, text messages, address books and other private data in the smartphone when dealing with old smartphones, or restore the factory settings, but is this really a security code? None of this can completely delete the information on the phone. [0003] At present, the storage devices of smart phones are generally flash chips, which have a short service life. Therefore, wear leveling...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M1/725G06F21/60
Inventor 廖宏俭
Owner NUBIA TECHNOLOGY CO LTD