CN101431818A - Method for implementing mobile phone data protection function - Google Patents

Method for implementing mobile phone data protection function Download PDF

Info

Publication number
CN101431818A
CN101431818A CNA2008102043059A CN200810204305A CN101431818A CN 101431818 A CN101431818 A CN 101431818A CN A2008102043059 A CNA2008102043059 A CN A2008102043059A CN 200810204305 A CN200810204305 A CN 200810204305A CN 101431818 A CN101431818 A CN 101431818A
Authority
CN
China
Prior art keywords
deletion
flash
write
carry out
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008102043059A
Other languages
Chinese (zh)
Inventor
梁建峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wingtech Electronic Technology Co Ltd
Original Assignee
Shanghai Wingtech Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wingtech Electronic Technology Co Ltd filed Critical Shanghai Wingtech Electronic Technology Co Ltd
Priority to CNA2008102043059A priority Critical patent/CN101431818A/en
Publication of CN101431818A publication Critical patent/CN101431818A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a method achieving the protection of cell phone data. The purpose of the method is to solve data protection memorized on the device without influencing the normal function of the cell phone. The method processes the protection from the two aspects of address and the operation order for the memory device of the cell phone, processing the operations of the cell phone memory device one by one, which achieves the protecting function of the memory device for the cell phone. The invention protects the memory device of the cell phone and avoids the mass destructive error operations and enhances the stability of the cell phone without changing the hardware of the cell phone and the influencing the normal function of the cell phone.

Description

A kind of method that realizes mobile phone data protection function
Technical field
The present invention relates to a kind of method that realizes mobile phone data protection function.
Background technology
Nowadays, wireless communication technology is widely applied in the daily life, and mobile telephone terminal is also popularized because of the convenience of its use.Along with the progress of expanding economy and science and technology, people's living standard improves greatly, and is more and more tighter to the requirement of mobile telephone terminal.At present, under the situation of not changing hardware, make more stable our the essential task that become of mobile phone.
In the face of operating handset may cause the mobile phone operation undesired, mobile phone may not be started shooting what is more, and data protection can make mobile phone normally move, thereby improves the quality of products, and is subjected to client's favor.
Summary of the invention
Purpose of the present invention just is to provide a kind of realization mobile phone data protection function method, under the prerequisite that does not change hardware setting, by this data guard method, improves the quality of mobile phone.
The present invention is that a kind of realization mobile phone data protection function method may further comprise the steps:
Step 1: baseband processor judges whether mobile phone operation is write operation or deletion action: as not, carry out corresponding operating, this flow process finishes; In this way, continue next step;
Step 2: whether the object of baseband processor decision operation is in the specific protection zone of FLASH: as not, carry out write operation or deletion action, process ends; In this way, do not carry out this operation;
The specific protection zone of described FLASH is to set according to the concrete store information of address or specific file.
Described specific file comprises: data binary file, resource binary file, file system binary file or NVR (Network Video Recorder, Network Video Surveillance are called for short NVR).
Judge in the step 2 whether the write operation object is in the specific protection zone of FLASH, and carry out corresponding write operation, specifically may further comprise the steps:
2.1 write the word count initialization, be the required number of words length of writing;
2.2 judging earlier, baseband processor whether writes word count greater than 0: if not, process ends;
If, be changed to successfully writing to recover to instruct earlier, be convenient to and can write into;
2.3 baseband processor writes a word to appropriate address;
2.4 check the state that FLASH writes: if failure, this flow process finishes; If success is write word count and subtracted 1, return step 2.2.
Judge in the step 2 whether the deletion action object is in the specific protection zone of FLASH, and carry out corresponding deletion action, specifically may further comprise the steps:
2.1 the zero setting of deletion counting, the initialization of maximum deletion number is required deletion number of words;
2.2 the stored contents of deletion appropriate address section is carried out delete instruction according to the address;
2.3 deletion delays, and carries out deletion and delays instruction, obtains the affirmation of deletion action;
2.4 the deletion counting adds 1;
2.5 check the state that FLASH delays to delete, check whether the deletion counting deletes number less than maximum: the success of FLASH state, process ends; Failure of FLASH state and deletion counting are not less than maximum deletion number, process ends; If the failure of FLASH state, and the deletion counting returns step 2.2 less than maximum deletion number.
The present invention is a kind of realization mobile phone data protection function method; under the situation of not changing hardware setting; by the instruction of FLASH and address are judged the data that need protection are carried out duplicate protection; can guarantee that so the in use concrete data of mobile phone are not changed; the misoperation that minimizing may occur, the stability of raising mobile phone.
Description of drawings
Below in conjunction with the drawings and specific embodiments the present invention is set forth.
Fig. 1 is a FLASH file storage structured flowchart;
Fig. 2 relates to the data manipulation instruction of data protection;
Fig. 3 is the flow chart of write order;
Fig. 4 is the flow chart of delete command;
Embodiment
The present invention is further described below in conjunction with drawings and Examples.
Fig. 1 is a FLASH file storage structured flowchart; wherein the file type of data protection is: the data binary file, support former binary file, file system binary file and NVR (Network Video Recorder; Network Video Surveillance is hereinafter to be referred as NVR).Fig. 2 is when FLASH is operated, and may relate to the order of data protection: write order, delete command, time-delay delete command, time-delay deletion recover order (write recover order with time-delay) and inspection FLASH status command (write with delete identical).Realize the data protection of mobile phone by these two kinds of duplicate protections, improve the mobile phone quality.
Embodiment 1:NVR module is mainly stored some non-volatile parameters, comprises audio frequency parameter, radio frequency parameter, and some start parameters.1 pair of NVR module of embodiment is carried out the radio frequency parameter change, promptly FLASH is carried out write operation, consults Fig. 3, specifically may further comprise the steps::
1: behind the mobile phone power-on, revise radio frequency parameter,, so just guarantee that this module of NVR can be by data protection because the NVR module is the modification that agent-protected file type and write order relate to radio frequency parameter, thereby is restricted by revising the radio frequency parameter instrument.Protection to the NVR module is meant that the NVR content that is kept among the FLASH comprises audio frequency, radio frequency, and some start parameters protect in the NVR interval, and the division of FLASH is divided with the address, and is protected at this module's address of NVR so in other words.
2: when write order is operated FLASH, may further comprise the steps as shown in Figure 3:
1) writes the word count initialization, be the required number of words length of writing.
2) baseband processor is judged the number of words of writing altogether: be not more than 0 if write word count, directly return, process ends; If instead number of words greater than 0, recovers to instruct (recovering instruction with deletion) to be changed to successfully writing earlier, be convenient to and can write into, owing to this order is protected,, can not carry out any operation to FLASH though carry out.
4) write a word.Specifically the content of word is write in the address because this order is protected, after the execution not the content word write in the address.
5) check the state that FLASH writes.Because this order is protected, only carries out a do-nothing function, state is changed to successfully then.
6) will write word count and subtract 1.
7) 2) and 6) between circulation, up to 2) or 5) arbitrarily condition be false.Write operation is finished.
Though carried out write operation as can be seen, do not write into whatever, can not carry out any operation to FLASH, visual data is protected.
Embodiment 2:TTPNV (Teller Transaction Processor Nvidia, teller's transaction processing program is hereinafter to be referred as TTPNV) module is used for being kept at some initialization values of FLASH, provides when being mainly start, as: language, time, date etc.2 couples of TTPNV of embodiment carry out the alarm clock function deletion, promptly FLASH are carried out deletion action, consult Fig. 4, may further comprise the steps:
1: behind the mobile phone power-on, TTPNV is carried out deletion action, can be modified not by data protection through judging this module of TTPNV.
2: the process of deletion alarm clock may further comprise the steps as shown in Figure 4:
1) deletion recovers instruction and is changed to successfully, because not protected at this module's address of TTPNV, therefore correspondingly will carry out this operation to FLASH, and the deletion numeration puts 0 then, and the initialization of maximum deletion number is required deletion number of words.
2) memory contents of deletion appropriate address section is generally carried out delete instruction according to the address, because not protected at this module's address of TTPNV, therefore correspondingly will carry out this operation to FLASH.
3) deletion delays, and carries out deletion and delays instruction, and purpose is in order to allow abundant deletion, and is same because not protected at this module's address of TTPNV, therefore correspondingly will carry out this operation to FLASH.
4) the deletion numeration adds 1.
5) check the state that FLASH delays to delete, whether check the deletion counting, because not protected, therefore correspondingly will carry out this operation FLASH at this module's address of TTPNV less than maximum deletion number.
6) if the state that FLASH delays to delete is successfully, then finish deletion, if instead<1〉deletion counting less than maximum deletion number, repeat 2) to 5), if<that 2〉deletion countings are not less than maximum deletion is several then do not finish deletion.
3: from the above mentioned FLASH has been carried out deletion action, alarm clock is deleted.
In addition, we can carry out data protection to the assigned address section of FLASH, and important information just can not lost like this.Versatility to FLASH also plays certain effect.
Being inventive embodiment only in sum, is not to be used for limiting practical range of the present invention.Be that all equivalences of doing according to the content of the present patent application claim change and modification, all should be technology category of the present invention.

Claims (5)

1. a method that realizes mobile phone data protection function is characterized in that, may further comprise the steps:
Step 1: baseband processor judges whether mobile phone operation is write operation or deletion action: as not, carry out corresponding operating, this flow process finishes; In this way, continue next step;
Step 2: whether the object of baseband processor decision operation is in the specific protection zone of FLASH: as not, carry out write operation or deletion action, process ends; In this way, do not carry out this operation.
2. according to the described method of claim 1, it is characterized in that: the specific protection zone of described FLASH is to set according to the concrete store information of address or specific file.
3. according to the described method of claim 3, it is characterized in that: described specific file comprises: data binary file, resource binary file, file system binary file or NVR (Network VideoRecorder, Network Video Surveillance are called for short NVR).
4. according to the described method of claim 1, it is characterized in that: judge in the step 2 whether the write operation object is in the specific protection zone of FLASH, and carry out corresponding write operation, specifically may further comprise the steps:
2.1 write the word count initialization, be the required number of words length of writing;
2.2 judging earlier, baseband processor whether writes word count greater than 0: if not, process ends;
If, be changed to successfully writing to recover to instruct earlier, be convenient to and can write into;
2.3 baseband processor writes a word to appropriate address;
2.4 check the state that FLASH writes: if failure, this flow process finishes; If success is write word count and subtracted 1, return step 2.2.
5. according to the described method of claim 1, it is characterized in that: judge in the step 2 whether the deletion action object is in the specific protection zone of FLASH, and carry out corresponding deletion action, specifically may further comprise the steps:
2.1 the zero setting of deletion counting, the initialization of maximum deletion number is required deletion number of words;
2.2 the stored contents of deletion appropriate address section is carried out delete instruction according to the address;
2.3 deletion delays, and carries out deletion and delays instruction, obtains the affirmation of deletion action;
2.4 the deletion counting adds 1;
2.5 check the state that FLASH delays to delete, check whether the deletion counting deletes number less than maximum: the success of FLASH state, process ends; Failure of FLASH state and deletion counting are not less than maximum deletion number, process ends; If the failure of FLASH state, and the deletion counting returns step 2.2 less than maximum deletion number.
CNA2008102043059A 2008-12-10 2008-12-10 Method for implementing mobile phone data protection function Pending CN101431818A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008102043059A CN101431818A (en) 2008-12-10 2008-12-10 Method for implementing mobile phone data protection function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008102043059A CN101431818A (en) 2008-12-10 2008-12-10 Method for implementing mobile phone data protection function

Publications (1)

Publication Number Publication Date
CN101431818A true CN101431818A (en) 2009-05-13

Family

ID=40646914

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008102043059A Pending CN101431818A (en) 2008-12-10 2008-12-10 Method for implementing mobile phone data protection function

Country Status (1)

Country Link
CN (1) CN101431818A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105184186A (en) * 2015-09-08 2015-12-23 北京元心科技有限公司 Intelligent terminal file system protection method and intelligent terminal
CN106599267A (en) * 2016-12-22 2017-04-26 北京锐安科技有限公司 Method and device for deleting data

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105184186A (en) * 2015-09-08 2015-12-23 北京元心科技有限公司 Intelligent terminal file system protection method and intelligent terminal
CN106599267A (en) * 2016-12-22 2017-04-26 北京锐安科技有限公司 Method and device for deleting data

Similar Documents

Publication Publication Date Title
CN101719959B (en) Method and device for automatically backing up and recovering key files of mobile terminal
CN105373419A (en) Background application operation method and system
US20060294304A1 (en) System and method for managing memory in a mobile device
CN105844157A (en) Monitoring method for App behaviors in Android system
US9800577B2 (en) Method and apparatus for controlling communications terminal and corresponding communications terminal
CN105843710A (en) Data backup and recovery device and method
CN103246834A (en) Control method and electronic device
US9451423B2 (en) Method and apparatus for recording information during a call
CN102622210A (en) Method for displaying help information and device
CN107563192A (en) A kind of means of defence for extorting software, device, electronic equipment and storage medium
CN108037932B (en) SPI-NAND configuration file acquisition method and device
CN103067597A (en) Mobile terminal startup task execution method
CN107924397B (en) File editing method and file editor
CN111538574B (en) Task stack management method, device, terminal and storage medium
CN106021027A (en) Terminal data processing method and system
CN111832053A (en) Transparent encryption and decryption method and system based on application program
JP5011738B2 (en) IC card, program
CN101431818A (en) Method for implementing mobile phone data protection function
US20120197924A1 (en) Method and Mobile Terminal for Recycling Short Messages
CN107704337B (en) Factory setting restoring method, mobile terminal and device with storage function
CN104915266B (en) A kind of application program guard method and device
CN101382907A (en) Smart card operation method and the smart card
CN104412274B (en) Portable terminal and control method
CN105979058A (en) Method and device for recording voice content
US20170123753A1 (en) Electronic device and method for playing back sound data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20090513