Unlock instant, AI-driven research and patent intelligence for your innovation.

Shielding method of mobile terminal medium data and mobile terminal

A technology for media data and mobile terminals, applied in the protection of internal/peripheral computer components, etc.

Inactive Publication Date: 2017-03-15
VIVO MOBILE COMM CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method for shielding media data of a mobile terminal and a mobile terminal, so as to solve the problem of media data-related processing when the mobile terminal is used by some specific users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shielding method of mobile terminal medium data and mobile terminal
  • Shielding method of mobile terminal medium data and mobile terminal
  • Shielding method of mobile terminal medium data and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Please refer to figure 1 , is a flowchart of a method for shielding media data of a mobile terminal according to Embodiment 1 of the present invention.

[0031] A method for shielding media data of a mobile terminal provided in an embodiment of the present invention, the mobile terminal may include a second user mode, and the method may specifically include the following steps:

[0032] Step 101, when it is detected that the mobile terminal switches to the second user mode, acquire media data on the mobile terminal;

[0033] In a specific implementation, one or more user modes may be set on the mobile terminal. In the embodiment of the present invention, when it is detected that the mobile terminal switches to the second user mode, the media data on the mobile terminal will be acquired.

[0034] Specifically, media data may include application program data, audio data, video data, text data, and the like. The media data may be the existing data in the machine, or the...

Embodiment 2

[0044] Please refer to figure 2 , is a flowchart of a method for shielding media data of a mobile terminal according to Embodiment 2 of the present invention.

[0045] A method for shielding media data of a mobile terminal provided in an embodiment of the present invention, the mobile terminal may include a first user mode and a second user mode, and the method may specifically include the following steps:

[0046] Step 201, when it is detected that the mobile terminal switches to the second user mode, acquire media data on the mobile terminal.

[0047] In the embodiment of the present invention, the mobile terminal may be configured with one or more user modes. In one example, two user modes can be set, specifically the first user mode and the second user mode, the first user mode is a mode set for regular users, regular users can be adults, and the second user mode is A mode set for a specific user, be it a child, a teenager or an elderly person.

[0048] The two user mo...

Embodiment 3

[0082] Please refer to image 3 , is a structural block diagram of a mobile terminal 300 according to Embodiment 3 of the present invention.

[0083] A mobile terminal provided by an embodiment of the present invention, the mobile terminal is in the second user mode, and the mobile terminal may include a media data acquisition module 301, a feature information extraction module 302, a suspected bad media data screening module 303 and a suspected bad media Data masking module 304 .

[0084] A media data acquisition module 301, configured to acquire media data on the mobile terminal when it is detected that the mobile terminal is switched to the second user mode;

[0085] A feature information extraction module 302, configured to extract feature information of the media data;

[0086] Suspected bad media data screening module 303, used to screen out suspected bad media data;

[0087] The suspected bad media data shielding module 304 is configured to shield the suspected bad m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a shielding method of mobile terminal medium data and a mobile terminal. The mobile terminal is in a second user mode. The method comprises the following steps of obtaining medium data on the mobile terminal when it is detected that the mobile terminal is switched into the second user mode, extracting feature information of the medium data, screening out suspected poor medium data, and shielding the suspected poor medium data. The problem of related processing of medium data when the mobile terminal is used by a certain specific user can be solved. According to the shielding method of the mobile terminal medium data, the problem of related processing of medium data when the mobile terminal is used by the certain specific user is solved.

Description

technical field [0001] The invention relates to the technical field of mobile terminals, in particular to a method for shielding media data of a mobile terminal and a mobile terminal. Background technique [0002] With the development of science and technology, the penetration rate of mobile terminals (such as mobile phones, tablets, smart wearable devices, etc.) is getting higher and higher, and the role played by mobile terminals in people's life or work is also becoming more and more important. [0003] In order to meet the various needs of users, such as reading, chatting, watching videos, etc., manufacturers often recommend many application programs in the application store of mobile terminals, such as e-book readers, instant messaging tools, application assistants, games and so on. These rich entertainment functions, coupled with the convenience of operating smart mobile terminals, have led to an increasing usage rate of mobile terminals by children. [0004] Therefor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/74
CPCG06F21/74
Inventor 唐文丽
Owner VIVO MOBILE COMM CO LTD