Supercharge Your Innovation With Domain-Expert AI Agents!

Anti-theft method for terminal data

A terminal and data technology, applied in the field of data security, can solve problems such as illegal theft of important data, economic loss of users, infringement of personal privacy of users, etc., to achieve the effect of ensuring security and preventing illegal theft

Inactive Publication Date: 2015-12-23
SHANGHAI YUDE COMM TECH
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once the mobile phone is in an off-network state, this solution will not be able to function, which may still cause the user's important data to be illegally stolen, thereby causing serious economic losses to the user or infringing on the user's personal privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-theft method for terminal data
  • Anti-theft method for terminal data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the object, technical solution and advantages of the present invention clearer, various embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.

[0019] The first embodiment of the present invention relates to an anti-theft method for terminal data. The terminal in this embodiment can be any device inserted with a subscriber identity module (SubscriberIdentityModule, SIM card for short), such as a smart phone, a tablet computer, etc. This embodiment does not impose an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the technical field of data security, and discloses an anti-theft method for terminal data. In the present invention, the method comprises the following steps: if a user identification card being removed is detected, a terminal entering a timing protection status with preset duration; in the duration of the timing protection status, if a correct unlock password is received by the terminal, the terminal exiting the timing protection status; and when the timing protection status ends, the terminal performing a data protection command. With respect to the prior art, the method disclosed by the present invention can protect the terminal data from being illegally stolen in case of no network, thereby greatly enhancing the security of the terminal data.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to an anti-theft method for terminal data. Background technique [0002] With the rapid popularization of smart phones and the great improvement of smart phone application performance, smart phones are comparable to a small mobile database, storing a large amount of information. This information is likely to be related to the user's business secrets and personal privacy. Therefore, the data security of smart phones is very important and has become the focus of competition among major mobile phone manufacturers. [0003] Password protection is a common data security protection method, but the security of this method alone is low. Once the password is cracked, user data can be illegally stolen. Alternatively, when the mobile phone is unlocked, data protection can be realized by automatically deleting the mobile phone data when the number of wrong password input times exceeds th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/88
CPCG06F21/62G06F21/88G06F2221/2111
Inventor 金成林
Owner SHANGHAI YUDE COMM TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More