User terminal information deleting method and user terminal information deleting device
A user terminal and deletion method technology, applied in the field of information processing, can solve the problems of hard to find, leak, and inability to ensure that the internal information of smart phones is not stolen, etc., and achieve the effect of convenient memory, high security, and not easy to leak
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0031] This embodiment provides a method for deleting user terminal information, such as Figure 1A shown, including the following steps:
[0032] S10: Receive an erasure code sent by another user terminal, where the erasure code is used to request deletion of information.
[0033] For example, when user terminal B is lost, user terminal A may be used to send a deletion code to user terminal B to request deletion of information in user terminal B. The user terminal may be a mobile terminal, such as a smart phone, or a non-mobile terminal that communicates with each other, such as two desktop computers connected to the Internet. For example, user terminal B is a mobile terminal, and user terminal A is a non-mobile terminal.
[0034] S20: Determine whether the deletion code is consistent with the preset information deletion password, if they are consistent, perform step S30, and if they are inconsistent, do not perform any operation.
[0035] The preset information deletion pa...
Embodiment 2
[0048] This embodiment provides a device for deleting user terminal information, such as Figure 2A As shown, it includes a first receiving unit 10 , a first judging unit 20 and a deleting unit 30 .
[0049] The first receiving unit 10 is configured to receive an erasure code sent by another user terminal, where the erasure code is used to request erasure of information.
[0050] The first judging unit 20 is configured to judge whether the deletion code is consistent with the preset information deletion password.
[0051] Preferably, the preset information deletion password includes a combination of one or more of letters, numbers, and underscores, and also includes the number of times the combination is sent.
[0052] The deletion unit 30 is configured to delete the stored information if the deletion code is consistent with the preset information deletion password.
[0053] Preferably, the preset information deletion password includes a first preset information deletion pas...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 