Supercharge Your Innovation With Domain-Expert AI Agents!

Data protection method for mobile terminal and mobile terminal

A mobile terminal, data protection technology, applied in the direction of digital data protection, digital data authentication, electronic digital data processing, etc., can solve problems such as the inability to guarantee personal data security, and achieve the effect of improving reliability

Inactive Publication Date: 2017-03-22
VIVO MOBILE COMM CO LTD
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention provides a data protection method of a mobile terminal and a mobile terminal, which solves the problem in the prior art that the security of personal data cannot be guaranteed without the Internet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection method for mobile terminal and mobile terminal
  • Data protection method for mobile terminal and mobile terminal
  • Data protection method for mobile terminal and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] This embodiment provides a data protection method for a mobile terminal, such as figure 1 As shown, the method includes: step 100 to step 120.

[0024] Step 100, acquiring the operation of inserting the SIM card by the user.

[0025] After the data protection function is set on the mobile terminal, when the mobile terminal is turned on or powered on, or the screen is unlocked, the operation of inserting the SIM card will be detected in real time. During specific implementation, the user's operation of inserting the SIM card in the mobile terminal can be acquired by calling the interface of the system or registering a system event.

[0026] Step 110, judging whether the inserted SIM card is a pre-bound SIM card for the mobile terminal.

[0027] After acquiring the operation of inserting the SIM card in the mobile terminal, first acquire the card number of the SIM card inserted in the operation of inserting the SIM card. Then, match the obtained card number with the pr...

Embodiment 2

[0035] This embodiment provides a data protection method for a mobile terminal, such as figure 2 As shown, the method includes: Step 200 to Step 270.

[0036] Step 200, setting the data protection function of the mobile terminal.

[0037] During specific implementation, the data protection function of the mobile terminal can be set through the setting interface of the mobile terminal. Setting the data protection function of the mobile terminal includes: setting the SIM card number bound to the mobile terminal, and setting the information of the communication terminal used to send data protection information; storing the binding information generated according to the SIM card number and the communication Terminal information. During specific implementation, firstly, the data protection function for the mobile terminal is enabled. An interactive menu may be provided through a preset human-computer interaction interface for the user to choose to enable or disable the data pro...

Embodiment 3

[0062] refer to image 3 Correspondingly, the embodiment of the present invention also discloses a mobile terminal 30 . The mobile terminal 30 includes:

[0063] The trigger module 310 is used to obtain the operation of inserting the SIM card by the user;

[0064] A SIM card judging module 320, configured to judge whether the inserted SIM card obtained by the triggering module 310 is a pre-bound SIM card of the mobile terminal;

[0065] The data protection module 330 is configured to perform data protection on the mobile terminal when receiving the data protection information sent by the preset communication terminal if the inserted SIM card is the SIM card pre-bound to the mobile terminal, Wherein, the data protection information includes a preset keyword for instructing data protection.

[0066] The mobile terminal disclosed in the embodiment of the present invention judges whether the inserted SIM card is the pre-bound SIM card of the mobile terminal by obtaining the ope...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data protection method for a mobile terminal and belongs to the technical field of mobile communications. The method comprises the steps that an operation made by a user to insert an SIM card is acquired, and whether the inserted SIM card is an SIM card pre-bound by the mobile terminal is judged; and if the inserted SIM card is the pre-bound SIM card of the mobile terminal, the data protection will be conducted to the mobile terminal when data protection information sent by a preset communication terminal is received, wherein the data protection information contains preset keywords used to indicate implementation of the data protection. The invention also discloses the mobile terminal. The data protection method disclosed by the invention solves the problem in the prior art that safety of personal data cannot be guaranteed without Internet. The data protection is conducted to the mobile terminal according to the received data protection information, so that reliability of the data protection in the mobile terminal is enhanced.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a data protection method of a mobile terminal and the mobile terminal. Background technique [0002] With the development of mobile terminal technology, the data storage and computing capabilities of the mobile terminal are continuously improved, and the functions of the mobile terminal are becoming more and more powerful. The mobile terminal has become a computer that people carry at any time. Since the user's address book, photos, online banking information and other personal data are all stored in the mobile terminal, if the mobile terminal is accidentally lost, the user's personal data stored in the mobile terminal will be leaked or stolen. Therefore, the data security of mobile terminals has gradually attracted the attention of users. In the prior art, the method used to prevent personal data leakage after the mobile terminal is lost is to lock the screen of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/34G06F21/31G06F21/45G06F21/60G06F21/62
CPCG06F21/31G06F21/34G06F21/45G06F21/602G06F21/604G06F21/6245G06F2221/2107
Inventor 詹天增
Owner VIVO MOBILE COMM CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More