CN103391367A - Data anti-theft method in case of mobile phone loss - Google Patents

Data anti-theft method in case of mobile phone loss Download PDF

Info

Publication number
CN103391367A
CN103391367A CN2013103069269A CN201310306926A CN103391367A CN 103391367 A CN103391367 A CN 103391367A CN 2013103069269 A CN2013103069269 A CN 2013103069269A CN 201310306926 A CN201310306926 A CN 201310306926A CN 103391367 A CN103391367 A CN 103391367A
Authority
CN
China
Prior art keywords
mobile phone
data
shutdown
taker
phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013103069269A
Other languages
Chinese (zh)
Inventor
柯宗贵
柯宗庆
杨育斌
程丽明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bluedon Information Security Technologies Co Ltd
Original Assignee
Bluedon Information Security Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bluedon Information Security Technologies Co Ltd filed Critical Bluedon Information Security Technologies Co Ltd
Priority to CN2013103069269A priority Critical patent/CN103391367A/en
Publication of CN103391367A publication Critical patent/CN103391367A/en
Priority to PCT/CN2014/077633 priority patent/WO2015007116A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a data anti-theft method in case of mobile phone loss. The method comprises the following processes: first, an instruction for deleting the data on appointed equipment is triggered; then, a system enters a process set, wherein the process set comprises three processes of: eliminating messages and contacts on an SIM card from the backstage, safely destroying the data on an external storage card from the backstage, and allowing the system to be recovered to the state as delivered and erasing the internal storage in the phone; finally, when the three processes of the process set are performed, if an instruction showing that a phone picker turns off the phone is received, interrupting and saving the current status are performed, an operation of performing false shutdown is performed, and then the three processes are continuously performed from the interrupting point. Due to the adoption of the method, when the picker turns off the phone, an illusion that the phone is already turned off is created, so as to gain more time to perform the processing processes against loss, and accordingly, the mobile data on the phone can be completely and quickly erased in case the phone is lost.

Description

A kind of method of data anti-theft after mobile phone is lost
Technical field
The present invention relates to the mobile security technical field, relate in particular to a kind of mobile phone and lose the method for rear data anti-theft.
Background technology
Along with the develop rapidly of mobile device, the commercialization of smart mobile phone, panel computer has been trend; The safety problem of the Mobile data that stores on mobile device also enjoys attention.In the process of protection mobile data safety, the anti-responsibility of divulging a secret of the data in the device losses situation is great.The high importance of enterprise's confidential data and private sensitive data, need to guarantee that these data can not fall into unrelated person or malice rival's hand; Can not recover in case mobile phone is lost, must guarantee that the data on equipment are thoroughly destroyed.
application number is that the application for a patent for invention of CN201210062111.6 discloses a kind of inductor that utilizes mobile phone and realizes the method for antitheft mobile phone, after anti-theft program is enabled, automatically detect the variation of mobile phone surrounding enviroment by the inductor of mobile phone, and the data that will change pass to anti-theft program and judge, when anti-theft program thinks that data reach certain scope, lock-screen, require the user to input correct password or by separating the locking key release, if anti-theft program is confiscated password at the appointed time, notify mobile phone speaker or mobile phone vibrations, send mobile phone ringtone or mobile phone shake bell or mobile phone vibrations.The user does not need to install additional more any mobile phone hardware, can realize antitheft mobile phone.The shortcoming of this technology is to need to coordinate special mobile phone inductor, just can work; If damaging, the mobile phone inductor can not bring into play the normal function of this technology.While sending in addition mobile phone ringtone or mobile phone shake bell or mobile phone vibrations, mobile phone picks up taker and can shut down by unloading the means such as battery pressure, takes out subsequently storage card again or will read the data of storage card/mobile phone EMS memory storage after the mobile phone dismounting with special setting.
Also having in addition the partial monopoly application is to trigger the deletion condition by note/modes such as network notice, as on market as the long-range deletion data function of the common products such as 360 mobile phone bodyguards and the safe house keeper of QQ.When mobile phone picks up taker and perceives program and carry out, can stop the operation of data delete program by unloading the means shutdown such as battery pressure, take out again subsequently storage card or with after the mobile phone dismounting with the special data that read storage card/mobile phone EMS memory storage that arrange.
Above-mentioned technology exists at mobile phone loses in rear executing data protectiveness deletion or locking process shortcoming or the deficiency of easily by mobile phone, being picked up the taker discovery and ending; the present invention proposes after a kind of mobile phone is lost for this reason and can hoodwink mobile phone and pick up the false shutdown of taker; the method of data deletion is carried out on backstage immediately, for the more time has been striven in the data deletion.
Summary of the invention
The present invention loses in order to solve mobile phone in prior art shortcoming or the deficiency that rear executing data protectiveness is deleted or locking process is picked up the taker discovery by mobile phone and end; a kind of method of data anti-theft after providing mobile phone to lose; adopted and hoodwinked mobile phone and pick up the false shutdown of taker; the scheme of data on thorough deletion mobile phone and factory reset is carried out on backstage immediately, thus realized definite mobile phone lose after the thorough purpose of the Mobile data on the deletion lost mobile phone fast.
The idiographic flow of the method is: at first, on the deletion designated equipment, the instruction of data is triggered, then system enters the flow process set, the flow process set is comprised of three flow processs: remove note and contact person on SIM card on backstage, in the data of backstage Safety destroy external memory card, system is recovered factory state and is removed the interior of mobile phone storage; In three flow processs carrying out the flow process set,, if receive that mobile phone picks up the instruction of taker shutdown, temporarily interrupt and record current state, carry out immediately the operation of false shutdown, then return to the point of interruption and continue to carry out.
Preferably, false shutdown refers to when system encryption screen locking or user's operating handset, the monitoring system shutdown message, when mobile phone picked up taker execution shutdown command, caller, confirmed self-defining false shutdown interface display on dialog box in the shutdown of system immediately, make shutdown confirm that dialog box is invisible, thereby make the false shutdown interface shutdown picture that disguises oneself as, pick up taker for the mobile phone of attempt shutdown and cause the shutdown illusion, for the device losses handling process is striven for the more time.
Preferably, about the instruction of deleting data on designated equipment, be triggered, its trigger condition has three kinds of situations:
Input continuously password by mistake: the equipment that occurs in is stolen and the owner not yet finds, the number of times that picks up simultaneously the continuous input error password of taker surpasses user specified value, inputs continuously password by mistake and triggers no matter whether mobile phone connects the network of surfing the Internet, whether with SIM cards of mobile phones, can trigger;
The note order: stolen and owner finds the equipment that occurs in, send note order and password to equipment current phone number, the note order need to have SIM cards of mobile phones just can trigger, such as changing the card prompting function, change card and can obtain new digit, whether connect the network of surfing the Internet all without impact;
The server push order: the stolen and owner of the equipment that occurs in finds, by server end, to the mobile phone remote of losing, pushes order, and the server push order needs mobile phone to be in the networking state, whether with SIM cards of mobile phones all without affecting.
Preferably, data at backstage Safety destroy external memory card refer on the mobile phone backstage, the mode that overrides by data is carried out the file data content and is thoroughly destroyed, data are after overriding fully, even, by software rejuvenation, also can only obtain clear data or mess code, and by rewriting the FDT in file system, with file size zero setting, thorough deleted file attribute information.
The beneficial effect that technical solution of the present invention is brought: by the inventive method, work as when picking up taker and carrying out power-off operation, pick up taker to the mobile phone of attempting to shut down and cause the shutdown illusion, strive for the more time for losing handling process, thus the purpose of the Mobile data on quick thoroughly deletion lost mobile phone after mobile phone is lost.
Description of drawings
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, below will the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the method flow diagram of data anti-theft after a kind of mobile phone of the present invention is lost;
Fig. 2 is delete command trigger condition schematic diagram in the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills, not making under the creative work prerequisite the every other embodiment that obtains, belong to the scope of protection of the invention.
The method of data anti-theft after a kind of mobile phone disclosed by the invention is lost, adopted and hoodwinked mobile phone and pick up the false shutdown of taker, the scheme of data on thorough deletion mobile phone and factory reset is carried out on backstage immediately, thus realized definite mobile phone lose after the thorough purpose of the Mobile data on the deletion lost mobile phone fast.As shown in Figure 1, at first, on the deletion designated equipment, the instruction of data is triggered its method flow, and then system enters the flow process set.The flow process set is comprised of three flow processs: remove note and contact person on SIM card on backstage, in the data of backstage Safety destroy external memory card, system is recovered factory state and is removed the interior of mobile phone storage.In three flow processs carrying out the flow process set,, if receive that mobile phone picks up the instruction of taker shutdown, temporarily interrupt and record current state, carry out immediately the operation of false shutdown, then return to the point of interruption and continue to carry out.
Wherein, false shutdown refers to when system encryption screen locking or user's operating handset, the monitoring system shutdown message, when mobile phone picked up taker execution shutdown command, caller, confirmed self-defining false shutdown interface display on dialog box in the shutdown of system immediately, make shutdown confirm that dialog box is invisible, thereby make the false shutdown interface shutdown picture that disguises oneself as, pick up taker for the mobile phone of attempt shutdown and cause the shutdown illusion, for the device losses handling process is striven for the more time.
Wherein, about the instruction of deleting data on designated equipment, be triggered, its trigger condition always has three kinds of situations, as shown in Figure 2:
Input continuously password by mistake: the equipment that occurs in is stolen and the owner not yet finds, the number of times that picks up simultaneously the continuous input error password of taker surpasses user specified value, inputs continuously password by mistake and triggers no matter whether mobile phone connects the network of surfing the Internet, whether with SIM cards of mobile phones, can trigger.
The note order: this may occur in the stolen and owner of equipment and find, to equipment current phone number, sends note order and password.The note order need to have SIM cards of mobile phones just can trigger (as change the card prompting function, change card and can obtain new digit), whether connects the network of surfing the Internet all without impact.
The server push order: this may occur in the stolen and owner of equipment and find, by server end, to the mobile phone remote of losing, pushes order.The server push order needs mobile phone need be in the networking state, whether with SIM cards of mobile phones all without impact.
Wherein, data at backstage Safety destroy external memory card refer on the mobile phone backstage, the mode that overrides by data is carried out the file data content and is thoroughly destroyed, data are after overriding fully, even, by software rejuvenation, also can only obtain clear data or mess code, and by rewriting the FDT in file system, with file size zero setting, thorough deleted file attribute information.
Work as when picking up taker and carrying out power-off operation by the inventive method, pick up taker to the mobile phone of attempt shutdown and cause the shutdown illusion, for losing handling process, strive for the more time, thus the thorough purpose of the Mobile data on the deletion lost mobile phone fast after mobile phone is lost.
Vacation pass machine technology in the inventive method also replaceable one-tenth forbids that mobile phone picks up the taker operation, reactionless during as user's power-off operation, but mobile phone picks up taker and can find immediately different shape at this moment, takes to tear open the forced shutdown behaviors such as battery, thereby destroys the execution of data deletion action.
In addition, the present invention can also be applied in panel computer, triggering mode by the server push order after panel computer is lost triggers delete instruction, related data in backstage deletion panel computer, if receive the instruction of picking up the taker shutdown in the process of deletion, temporarily interrupt and record current state, carrying out immediately the operation of false shutdown, then returning to the point of interruption and continue to carry out.
After above a kind of mobile phone that the embodiment of the present invention is provided is lost, the method for data anti-theft is described in detail, applied specific case herein principle of the present invention and execution mode are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously,, for one of ordinary skill in the art,, according to thought of the present invention, all will change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.

Claims (6)

1. the method for data anti-theft after a mobile phone is lost, it is characterized in that, adopted and hoodwinked mobile phone and pick up the false shutdown of taker, the scheme of data on thorough deletion mobile phone and factory reset is carried out on backstage immediately, thereby realized thoroughly deleting fast the purpose of the Mobile data on lost mobile phone after definite mobile phone is lost, its idiographic flow is: at first, on the deletion designated equipment, the instruction of data is triggered, then system enters the flow process set, the flow process set is comprised of three flow processs: remove note and contact person on SIM card on backstage, data at backstage Safety destroy external memory card, system is recovered factory state and is removed the interior of mobile phone storage, in three flow processs carrying out the flow process set,, if receive that mobile phone picks up the instruction of taker shutdown, temporarily interrupt and record current state, carry out immediately the operation of false shutdown, then return to the point of interruption and continue to carry out.
2. method according to claim 1, it is characterized in that, false shutdown refers to when system encryption screen locking or user's operating handset, the monitoring system shutdown message, when mobile phone picks up taker execution shutdown command, caller immediately, self-defining false shutdown interface display is confirmed on dialog box in the shutdown of system, make shutdown confirm that dialog box is invisible, thereby make the false shutdown interface shutdown picture that disguises oneself as, the mobile phone of shutting down for attempt picks up taker and causes the shutdown illusion, for the device losses handling process is striven for the more time.
3. method according to claim 1, is characterized in that, about the instruction of deleting data on designated equipment, is triggered, and its trigger condition has three kinds of situations:
Input continuously password by mistake: the equipment that occurs in is stolen and the owner not yet finds, the number of times that picks up simultaneously the continuous input error password of taker surpasses user specified value, inputs continuously password by mistake and triggers no matter whether mobile phone connects the network of surfing the Internet, whether with SIM cards of mobile phones, can trigger;
The note order: stolen and owner finds the equipment that occurs in, send note order and password to equipment current phone number, the note order need to have SIM cards of mobile phones just can trigger, such as changing the card prompting function, change card and can obtain new digit, whether connect the network of surfing the Internet all without impact;
The server push order: the stolen and owner of the equipment that occurs in finds, by server end, to the mobile phone remote of losing, pushes order, and the server push order needs mobile phone to be in the networking state, whether with SIM cards of mobile phones all without affecting.
4. method according to claim 1, it is characterized in that, data at backstage Safety destroy external memory card refer on the mobile phone backstage, the mode that overrides by data is carried out the file data content and is thoroughly destroyed, and data are after overriding fully, even pass through software rejuvenation, also can only obtain clear data or mess code, and by rewriting the FDT in file system, with file size zero setting, thorough deleted file attribute information.
5. method according to claim 1, it is characterized in that, vacation pass machine technology in the inventive method also replaceable one-tenth forbids that mobile phone picks up the taker operation, reactionless during such as user's power-off operation, but mobile phone picks up taker and can find immediately different shape at this moment, take to tear open the forced shutdown behaviors such as battery, thereby destroy the execution of data deletion action.
6. method according to claim 1, it is characterized in that, the inventive method can also be applied in panel computer, triggering mode by the server push order after panel computer is lost triggers delete instruction, related data in backstage deletion panel computer,, if receive the instruction of picking up the taker shutdown in the process of deletion, temporarily interrupt and record current state, carry out immediately the operation of false shutdown, then return to the point of interruption and continue to carry out.
CN2013103069269A 2013-07-19 2013-07-19 Data anti-theft method in case of mobile phone loss Pending CN103391367A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2013103069269A CN103391367A (en) 2013-07-19 2013-07-19 Data anti-theft method in case of mobile phone loss
PCT/CN2014/077633 WO2015007116A1 (en) 2013-07-19 2014-05-16 Anti-theft method for data after loss of cell phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013103069269A CN103391367A (en) 2013-07-19 2013-07-19 Data anti-theft method in case of mobile phone loss

Publications (1)

Publication Number Publication Date
CN103391367A true CN103391367A (en) 2013-11-13

Family

ID=49535521

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013103069269A Pending CN103391367A (en) 2013-07-19 2013-07-19 Data anti-theft method in case of mobile phone loss

Country Status (2)

Country Link
CN (1) CN103391367A (en)
WO (1) WO2015007116A1 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015007116A1 (en) * 2013-07-19 2015-01-22 蓝盾信息安全技术股份有限公司 Anti-theft method for data after loss of cell phone
CN104463047A (en) * 2014-12-24 2015-03-25 小米科技有限责任公司 Device and method for control modules to work
CN105142169A (en) * 2015-07-27 2015-12-09 小米科技有限责任公司 Method and device for processing abnormal operation
WO2015196444A1 (en) * 2014-06-27 2015-12-30 Microsoft Technology Licensing, Llc Fast data protection using dual file systems
WO2016192511A1 (en) * 2015-06-05 2016-12-08 腾讯科技(深圳)有限公司 Method and apparatus for remotely deleting information
CN107277089A (en) * 2016-04-07 2017-10-20 大唐网络有限公司 The method that original information on smart mobile phone is thoroughly removed
CN107292187A (en) * 2016-04-07 2017-10-24 大唐网络有限公司 The quick automatic flow control method for realizing that file is crushed and owner's information is cleaned completely in mobile phone removal process
CN107493395A (en) * 2017-09-30 2017-12-19 陈银芳 The data destroying method and Related product of smart mobile phone
CN107659719A (en) * 2017-09-19 2018-02-02 上海爱优威软件开发有限公司 A kind of Scene Simulation method, Scene Simulation system and terminal
CN108197509A (en) * 2017-12-22 2018-06-22 深圳天珑无线科技有限公司 A kind of theft preventing method, electric terminal and storage device
CN109800548A (en) * 2017-11-17 2019-05-24 深圳市鹰硕技术有限公司 A kind of method and apparatus preventing leakage of personal information
US10372937B2 (en) 2014-06-27 2019-08-06 Microsoft Technology Licensing, Llc Data protection based on user input during device boot-up, user login, and device shut-down states
CN110114758A (en) * 2017-01-12 2019-08-09 美光科技公司 The specific aim of memory is removed
US10423766B2 (en) 2014-06-27 2019-09-24 Microsoft Technology Licensing, Llc Data protection system based on user input patterns on device
US10474849B2 (en) 2014-06-27 2019-11-12 Microsoft Technology Licensing, Llc System for data protection in power off mode
CN115052065A (en) * 2022-08-03 2022-09-13 南昌龙旗信息技术有限公司 Watch anti-drop method and device, anti-drop watch and storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105847554B (en) * 2016-03-24 2019-05-17 维沃移动通信有限公司 A kind of data processing method that mobile terminal shuts down extremely and mobile terminal
CN112632647A (en) * 2020-12-17 2021-04-09 深圳酷派技术有限公司 Electronic equipment information anti-theft method, related device and computer storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1977465A (en) * 2004-06-29 2007-06-06 Sk电信有限公司 Disguised power-off method for a mobile communication terminal
CN101389100A (en) * 2008-10-24 2009-03-18 Tcl天一移动通信(深圳)有限公司 Personal information protecting method for mobile communication terminal equipment
CN101409946A (en) * 2008-11-28 2009-04-15 飞图科技(北京)有限公司 Method capable of thoroughly deleting data of mobile phone memory card
CN102387494A (en) * 2011-11-02 2012-03-21 北京邮电大学 Android-mobile-platform-based remote automatic information exchange and control solution
CN102647506A (en) * 2011-02-22 2012-08-22 徐莹 Mobile phone secret divulgence prevention method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1602096A (en) * 2003-09-25 2005-03-30 中兴通讯股份有限公司 Method of backup of personal information lost in mobile terminal
CN1980427A (en) * 2005-11-30 2007-06-13 中兴通讯股份有限公司 Device for mobile terminal to automatically deleting information, and method thereof
CN1933629A (en) * 2006-08-25 2007-03-21 华为技术有限公司 Method and device for protecting user storage information in mobile terminal
CN102196422B (en) * 2010-03-11 2015-07-08 北京明朝万达科技有限公司 Method for preventing leakage of lost file of handheld communication terminal
CN103391367A (en) * 2013-07-19 2013-11-13 蓝盾信息安全技术股份有限公司 Data anti-theft method in case of mobile phone loss

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1977465A (en) * 2004-06-29 2007-06-06 Sk电信有限公司 Disguised power-off method for a mobile communication terminal
CN101389100A (en) * 2008-10-24 2009-03-18 Tcl天一移动通信(深圳)有限公司 Personal information protecting method for mobile communication terminal equipment
CN101409946A (en) * 2008-11-28 2009-04-15 飞图科技(北京)有限公司 Method capable of thoroughly deleting data of mobile phone memory card
CN102647506A (en) * 2011-02-22 2012-08-22 徐莹 Mobile phone secret divulgence prevention method
CN102387494A (en) * 2011-11-02 2012-03-21 北京邮电大学 Android-mobile-platform-based remote automatic information exchange and control solution

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015007116A1 (en) * 2013-07-19 2015-01-22 蓝盾信息安全技术股份有限公司 Anti-theft method for data after loss of cell phone
US10372937B2 (en) 2014-06-27 2019-08-06 Microsoft Technology Licensing, Llc Data protection based on user input during device boot-up, user login, and device shut-down states
US10423766B2 (en) 2014-06-27 2019-09-24 Microsoft Technology Licensing, Llc Data protection system based on user input patterns on device
WO2015196444A1 (en) * 2014-06-27 2015-12-30 Microsoft Technology Licensing, Llc Fast data protection using dual file systems
US10474849B2 (en) 2014-06-27 2019-11-12 Microsoft Technology Licensing, Llc System for data protection in power off mode
US9697375B2 (en) 2014-06-27 2017-07-04 Microsoft Technology Licensing, Llc Fast data protection using dual file systems
CN104463047B (en) * 2014-12-24 2017-07-04 小米科技有限责任公司 The device and method of control module work
CN104463047A (en) * 2014-12-24 2015-03-25 小米科技有限责任公司 Device and method for control modules to work
US10691819B2 (en) 2015-06-05 2020-06-23 Tencent Technology (Shenzhen) Company Limited Method and apparatus for remotely deleting information
WO2016192511A1 (en) * 2015-06-05 2016-12-08 腾讯科技(深圳)有限公司 Method and apparatus for remotely deleting information
CN105142169A (en) * 2015-07-27 2015-12-09 小米科技有限责任公司 Method and device for processing abnormal operation
CN105142169B (en) * 2015-07-27 2018-10-19 小米科技有限责任公司 The processing method and processing device of abnormal operation
CN107277089A (en) * 2016-04-07 2017-10-20 大唐网络有限公司 The method that original information on smart mobile phone is thoroughly removed
CN107292187A (en) * 2016-04-07 2017-10-24 大唐网络有限公司 The quick automatic flow control method for realizing that file is crushed and owner's information is cleaned completely in mobile phone removal process
CN110114758A (en) * 2017-01-12 2019-08-09 美光科技公司 The specific aim of memory is removed
CN110114758B (en) * 2017-01-12 2024-04-12 美光科技公司 Targeted purging of memory
CN107659719A (en) * 2017-09-19 2018-02-02 上海爱优威软件开发有限公司 A kind of Scene Simulation method, Scene Simulation system and terminal
CN107493395A (en) * 2017-09-30 2017-12-19 陈银芳 The data destroying method and Related product of smart mobile phone
CN109800548A (en) * 2017-11-17 2019-05-24 深圳市鹰硕技术有限公司 A kind of method and apparatus preventing leakage of personal information
CN109800548B (en) * 2017-11-17 2021-02-02 深圳市鹰硕技术有限公司 Method and device for preventing personal information from being leaked
CN108197509A (en) * 2017-12-22 2018-06-22 深圳天珑无线科技有限公司 A kind of theft preventing method, electric terminal and storage device
CN115052065A (en) * 2022-08-03 2022-09-13 南昌龙旗信息技术有限公司 Watch anti-drop method and device, anti-drop watch and storage medium
CN115052065B (en) * 2022-08-03 2023-06-13 南昌龙旗信息技术有限公司 Watch anti-drop method and device, anti-drop watch and storage medium

Also Published As

Publication number Publication date
WO2015007116A1 (en) 2015-01-22

Similar Documents

Publication Publication Date Title
CN103391367A (en) Data anti-theft method in case of mobile phone loss
US10360161B2 (en) Cable lock with confidential data protection
TWI525472B (en) Always-available embedded theft reaction subsystem
CN104540123A (en) Encryption backup and security deletion method and system for important data of mobile terminal
TW201342113A (en) Always-available embedded theft reaction subsystem
CN103034813A (en) Method and system for protecting data of mobile terminal
CN104123164A (en) Application program starting method and device
CN105120100A (en) Mobile terminal with theft anti-flashing function, and anti-flashing method of same
CN103440446A (en) Protective unlocking operating method and device of private content of intelligent terminal
CN104902080B (en) A kind of information interacting method and equipment
CN105243346A (en) Mobile terminal with guard against theft function and guard against theft method
CN105262866A (en) Anti-theft method, system and anti-theft handset
CN105187640A (en) Anti-theft method and system of mobile terminal
CN105844181A (en) Key instruction processing method and terminal
CN105827817A (en) Alarm method and mobile terminal
EP2840818A1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN106776908A (en) Data clearing method, device and terminal
CN102811206A (en) Electronic device used for digital information transmission and processing method of electronic device content
CN112987942B (en) Method, device and system for inputting information by keyboard, electronic equipment and storage medium
CN104796532B (en) A kind of method and device for destroying mobile terminal
CN104156653B (en) A kind of application guard method and the device of mobile terminal
US20170337788A1 (en) Electronic device and anti-theft method
CN105307135A (en) Mobile terminal and information protection method thereof
CN106127034B (en) A kind of method, apparatus that anti-locking system is maliciously closed and electronic equipment
CN108307463A (en) mode switching method, system and access control system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20131113