Shielding method of mobile terminal medium data and mobile terminal
A technology for media data and mobile terminals, applied in the protection of internal/peripheral computer components, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] Please refer to figure 1 , is a flowchart of a method for shielding media data of a mobile terminal according to Embodiment 1 of the present invention.
[0031] A method for shielding media data of a mobile terminal provided in an embodiment of the present invention, the mobile terminal may include a second user mode, and the method may specifically include the following steps:
[0032] Step 101, when it is detected that the mobile terminal switches to the second user mode, acquire media data on the mobile terminal;
[0033] In a specific implementation, one or more user modes may be set on the mobile terminal. In the embodiment of the present invention, when it is detected that the mobile terminal switches to the second user mode, the media data on the mobile terminal will be acquired.
[0034] Specifically, media data may include application program data, audio data, video data, text data, and the like. The media data may be the existing data in the machine, or the...
Embodiment 2
[0044] Please refer to figure 2 , is a flowchart of a method for shielding media data of a mobile terminal according to Embodiment 2 of the present invention.
[0045] A method for shielding media data of a mobile terminal provided in an embodiment of the present invention, the mobile terminal may include a first user mode and a second user mode, and the method may specifically include the following steps:
[0046] Step 201, when it is detected that the mobile terminal switches to the second user mode, acquire media data on the mobile terminal.
[0047] In the embodiment of the present invention, the mobile terminal may be configured with one or more user modes. In one example, two user modes can be set, specifically the first user mode and the second user mode, the first user mode is a mode set for regular users, regular users can be adults, and the second user mode is A mode set for a specific user, be it a child, a teenager or an elderly person.
[0048] The two user mo...
Embodiment 3
[0082] Please refer to image 3 , is a structural block diagram of a mobile terminal 300 according to Embodiment 3 of the present invention.
[0083] A mobile terminal provided by an embodiment of the present invention, the mobile terminal is in the second user mode, and the mobile terminal may include a media data acquisition module 301, a feature information extraction module 302, a suspected bad media data screening module 303 and a suspected bad media Data masking module 304 .
[0084] A media data acquisition module 301, configured to acquire media data on the mobile terminal when it is detected that the mobile terminal is switched to the second user mode;
[0085] A feature information extraction module 302, configured to extract feature information of the media data;
[0086] Suspected bad media data screening module 303, used to screen out suspected bad media data;
[0087] The suspected bad media data shielding module 304 is configured to shield the suspected bad m...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


