CN105657169A - Data protection method, device and mobile terminal - Google Patents

Data protection method, device and mobile terminal Download PDF

Info

Publication number
CN105657169A
CN105657169A CN201610010095.4A CN201610010095A CN105657169A CN 105657169 A CN105657169 A CN 105657169A CN 201610010095 A CN201610010095 A CN 201610010095A CN 105657169 A CN105657169 A CN 105657169A
Authority
CN
China
Prior art keywords
power supply
mobile terminal
output voltage
storage unit
adjusting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610010095.4A
Other languages
Chinese (zh)
Other versions
CN105657169B (en
Inventor
郭华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610010095.4A priority Critical patent/CN105657169B/en
Publication of CN105657169A publication Critical patent/CN105657169A/en
Application granted granted Critical
Publication of CN105657169B publication Critical patent/CN105657169B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a data protection method, device and a mobile terminal. The method comprises the following steps: detecting at least one unlocking instruction acted on the mobile terminal through a user in a set time; adjusting a power supply voltage of an output voltage adjustable power source while at least one unlocking instruction meets a setting condition so as to damage a storage unit of the mobile terminal or closing an access function to the storage unit of the mobile terminal, wherein the output voltage adjustable power supply is used for supplying power for the storage unit. Through the adoption of the technical scheme provided by the embodiment of the invention, the power supply voltage of the output voltage adjustable power source is adjusted so as to damage the storage unit of the mobile terminal or close the access function to the storage unit of the mobile terminal while at least one detected unlocking instruction meets the setting condition, the leakage of the data information after the mobile terminal is lost is prevented, and the security of the data information at the mobile terminal is improved.

Description

Data protection method and device and mobile terminal
Technical Field
The present invention relates to the field of mobile terminal technologies, and in particular, to a data protection method and apparatus, and a mobile terminal.
Background
With the rapid development of mobile terminal technology, corresponding functions on a mobile terminal are more and more abundant, and often a mobile terminal integrates multiple functions, for example, a mobile phone can be used for communication and can also be used for realizing convenient and rapid payment by installing payment software or a mobile phone bank, and the like, so that richer and more comfortable user experience is brought to users.
However, with the function on the mobile terminal becoming more powerful, the dependence of the user on the mobile terminal also becomes stronger, and a lot of important data information is stored on the mobile terminal, such as mobile banking, emails, information, address book, microblogs, application software chat records, personal photos, etc., once the mobile terminal is lost and the data information is revealed, immeasurable loss will be brought to individuals.
Disclosure of Invention
The embodiment of the invention provides a data protection method, a data protection device and a mobile terminal, which are used for preventing data information from being leaked after the mobile terminal is lost and improving the security of the data information of the mobile terminal.
In order to achieve the purpose, the invention adopts the following technical scheme:
in a first aspect, an embodiment of the present invention provides a data protection method, including:
detecting at least one unlocking instruction acted on the mobile terminal by a user within a set time;
and when the at least one unlocking instruction meets a set condition, adjusting the power supply voltage of an output voltage adjustable power supply to damage the storage unit of the mobile terminal or close the access function of the storage unit of the mobile terminal, wherein the output voltage adjustable power supply is used for supplying power to the storage unit.
In a second aspect, an embodiment of the present invention provides a data protection apparatus, including:
the unlocking instruction detection module is used for detecting at least one unlocking instruction acted on the mobile terminal by a user within set time;
and the power supply voltage adjusting module is used for adjusting the power supply voltage of the output voltage adjustable power supply when the at least one unlocking instruction meets the set condition so as to damage the storage unit of the mobile terminal or close the access function to the storage unit of the mobile terminal, and the output voltage adjustable power supply is used for supplying power to the storage unit.
In a third aspect, an embodiment of the present invention provides a mobile terminal, where the mobile terminal integrates the data protection apparatus according to the second aspect.
According to the embodiment of the invention, at least one unlocking instruction acted on the mobile terminal by a user within the set time is detected, and when the detected at least one unlocking instruction meets the set condition, the power supply voltage of the power supply can be adjusted by adjusting the output voltage, so that the storage unit of the mobile terminal is damaged or the access function to the storage unit of the mobile terminal is closed.
Drawings
In order to more clearly illustrate the technical solutions of the exemplary embodiments of the present invention, a brief description is given below of the drawings used in describing the embodiments. It should be clear that the described figures are only views of some of the embodiments of the invention to be described, not all, and that for a person skilled in the art, other figures can be derived from these figures without inventive effort.
Fig. 1 is a flowchart of a data protection method according to an embodiment of the present invention;
fig. 2 is a flowchart of a data protection method according to a second embodiment of the present invention;
fig. 3 is a flowchart of a data protection method according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a data protection apparatus according to a fourth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention are described in further detail below with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some but not all of the relevant aspects of the present invention are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The first embodiment is as follows:
fig. 1 is a flowchart of a data protection method provided in this embodiment, which may be executed by a data protection device, where the data protection device may be implemented by software and/or hardware, and may be built in a mobile terminal as a part of the mobile terminal, and is preferably built in an operating system of the mobile terminal in the form of software. As shown in fig. 1, the data protection method provided in this embodiment includes the following steps:
step 101, detecting at least one unlocking instruction acted on the mobile terminal by a user within a set time.
The mobile terminal in this embodiment may be a mobile phone, a notebook, a PAD intelligent terminal, a tablet computer, and other devices.
The set time may be determined according to a requirement of a user, for example, the set time is 5 minutes, and the start time of the set time may be an unlocking instruction detected within five minutes from the detection of the first unlocking instruction when the first unlocking instruction is detected within a preset time period.
The unlocking instruction is generated by unlocking operation acted on the terminal by a user, and the unlocking operation comprises the operation of inputting an unlocking password or an unlocking pattern by the user.
And the number of the at least one unlocking instruction acted on the mobile terminal by the user corresponds to the unlocking times acted on the mobile terminal by the user.
And 102, when the at least one unlocking instruction meets a set condition, adjusting the power supply voltage of an output voltage adjustable power supply to damage the storage unit of the mobile terminal or close the access function of the storage unit of the mobile terminal, wherein the output voltage adjustable power supply is used for supplying power to the storage unit.
The power supply with the adjustable output voltage is a power supply with adjustable output voltage, can be arranged in the mobile terminal and supplies power to the storage unit. When the at least one unlocking instruction is not detected or the detected at least one unlocking instruction does not meet the set condition, the output voltage adjustable power supply provides power supply voltage for normal operation for the storage unit.
The output voltage adjustable power supply comprises: low dropout linear regulator (LDO) power supplies and direct current to direct current (DC-DC) power supplies.
Preferably, the storage unit of the mobile terminal is an embedded multimedia card (EMMC).
The EMMC is an embedded memory standard specification established by the MMC association (MMCA for short), and is mainly for mobile terminals such as mobile phones or tablet computers. The EMMC is an embedded non-volatile memory system, which is composed of a flash memory and a flash memory controller. One significant advantage of EMMC is the integration of a flash memory controller in a package that uses Ball Grid Array (BGA) packaging and that manages flash memory using a unified flash memory interface.
The mobile terminal mostly adopts the EMMC as a storage medium, and achieves the purpose of damaging the storage medium or closing the access function of the storage medium by damaging the EMMC of the mobile terminal or closing the access function of the EMMC.
When the at least one unlocking instruction meets the set condition, adjusting the supply voltage of the output voltage adjustable power supply may include: when the number of the at least one unlocking instruction reaches a first set number and the matching degree of user input information corresponding to each unlocking instruction and set unlocking information is smaller than a set value, adjusting the power supply voltage of the output voltage adjustable power supply; or when the number of the at least one unlocking instruction reaches a second set number, adjusting the power supply voltage of the output voltage adjustable power supply.
The first setting number may be smaller than the second setting number, specific values of the first setting number and the second setting number may be set according to a user's requirement, and the first setting number and the second setting number may be set to be larger numbers in order to prevent an operation of adjusting the supply voltage of the output voltage adjustable power supply from being erroneously triggered due to a plurality of times of erroneous operations by the user to satisfy the setting condition. The set value of the matching degree can also be set according to the requirements of the user, if the input information of the user and the set unlocking information need to be strictly matched, the set value is set to be a larger number, and otherwise, the set value can be set to be a smaller number.
The set unlocking information is information for unlocking that is preset according to information input by a user before the step, and the set unlocking information may include a set unlocking password or a set unlocking pattern, which is not limited in this embodiment.
For example, the unlocking password is set to be 1101 with four digits, if the password input by the user is 1120, the matching degree is 50%, and if the password input by the user is 1220, the matching degree is 25%.
Illustratively, the first set number is 3, the set password is 1101 with four digits, the set value is 50%, and when the number of the at least one unlocking instruction reaches 3, and the matching degree between the information input by the user and the set unlocking information corresponding to each unlocking instruction in the 3 unlocking instructions is less than 50%, the supply voltage of the output voltage adjustable power supply is adjusted.
The method has the advantages that the unlocking information can be correctly input by the owner of the general mobile terminal within the first set number, the unlocking times reach the first set number only when other users unlock the mobile terminal before using the mobile terminal after the mobile terminal is lost, and the matching degree of the unlocking information input each time and the set unlocking information is very low.
For example, the second set number is 5, and when the number of the at least one unlocking command reaches 5, the output voltage is adjusted to adjust the supply voltage of the power supply.
According to the data protection method provided by the embodiment, at least one unlocking instruction acted on the mobile terminal by a user within the set time is detected, and when the detected at least one unlocking instruction meets the set condition, the power supply voltage of the power supply can be adjusted by adjusting the output voltage, so that the storage unit of the mobile terminal is damaged or the access function to the storage unit of the mobile terminal is closed.
Example two:
fig. 2 is a flowchart of a data protection method provided in the second embodiment, where the second embodiment is optimized based on the foregoing embodiments, and in the second embodiment, the adjusting of the output voltage may adjust the power supply voltage of the power supply to damage the memory cell of the mobile terminal is specifically optimized as follows: and adjusting the power supply voltage of the output voltage adjustable power supply to be higher than the set upper limit voltage of a storage unit of the mobile terminal so as to burn out the storage unit.
Correspondingly, as shown in fig. 2, the data protection method provided by this embodiment includes the following steps:
step 201, detecting at least one unlocking instruction acted on the mobile terminal by a user within a set time.
Step 202, when the at least one unlocking instruction meets a set condition, adjusting the power supply voltage of the output voltage adjustable power supply to be higher than a set upper limit voltage of a storage unit of the mobile terminal so as to burn out the storage unit, wherein the output voltage adjustable power supply is used for supplying power to the storage unit.
Wherein the at least one unlocking instruction meeting the set condition comprises: the number of the at least one unlocking instruction reaches a first set number, and the matching degree of user input information corresponding to each unlocking instruction and set unlocking information is smaller than a set value; or the number of the at least one unlocking instruction reaches a second set number.
The upper limit voltage is the highest limit voltage that the memory cell can bear, and when the power supply voltage is greater than the upper limit voltage, the memory cell will be burned out.
According to the data protection method provided by the embodiment of the invention, at least one unlocking instruction acted on the mobile terminal by a user within the set time is detected, and when the detected at least one unlocking instruction meets the set condition, the power supply voltage of the output voltage adjustable power supply is adjusted to be higher than the set upper limit voltage of the storage unit of the mobile terminal, so that the storage unit is burnt out, the leakage of data information after the mobile terminal is lost is prevented, and the safety of the data information of the mobile terminal is improved.
Example three:
fig. 3 is a flowchart of a data protection method provided by a third embodiment, where the third embodiment is optimized based on the foregoing embodiments, and in the present embodiment, the adjusting of the output voltage to adjust the power supply voltage of the power supply to close the access function to the storage unit of the mobile terminal is specifically optimized as follows: and adjusting the power supply voltage of the output voltage adjustable power supply to be below the set lower limit voltage of the storage unit of the mobile terminal, or controlling the output voltage adjustable power supply to stop supplying power so as to close the access function of the storage unit of the mobile terminal.
Correspondingly, as shown in fig. 3, the data protection method provided by this embodiment includes the following steps:
step 301, detecting at least one unlocking instruction acted on the mobile terminal by a user within a set time.
And 302, when the at least one unlocking instruction meets a set condition, adjusting the power supply voltage of the output voltage adjustable power supply to be below a set lower limit voltage of a storage unit of the mobile terminal, or controlling the output voltage adjustable power supply to stop supplying power so as to close an access function to the storage unit of the mobile terminal, wherein the output voltage adjustable power supply is used for supplying power to the storage unit.
Wherein the at least one unlocking instruction meeting the set condition comprises: the number of the at least one unlocking instruction reaches a first set number, and the matching degree of user input information corresponding to each unlocking instruction and set unlocking information is smaller than a set value; or the number of the at least one unlocking instruction reaches a second set number.
The lower limit voltage is the lowest voltage for normally accessing the memory unit, and when the power supply voltage is less than the lower limit voltage, the memory unit cannot be normally accessed.
According to the data protection method provided by the embodiment, at least one unlocking instruction acted on the mobile terminal by a user within the set time is detected, and when the detected at least one unlocking instruction meets the set condition, the power supply voltage of the output voltage adjustable power supply is adjusted to be lower than the set lower limit voltage of the storage unit of the mobile terminal, or the output voltage adjustable power supply is controlled to stop supplying power, so that the access function of the storage unit of the mobile terminal is closed.
Example four:
fig. 4 is a schematic structural diagram of a data protection apparatus according to a fourth embodiment of the present invention. As shown in fig. 4, the data protection apparatus provided in this embodiment includes:
an unlocking instruction detection module 41, configured to detect at least one unlocking instruction that is acted on the mobile terminal by a user within a set time;
and a power supply voltage adjusting module 42, configured to adjust a power supply voltage of an output voltage adjustable power supply when the at least one unlocking instruction meets a set condition, so as to damage a storage unit of the mobile terminal or close an access function to the storage unit of the mobile terminal, where the output voltage adjustable power supply is used to supply power to the storage unit.
On the basis of the above embodiments, the power supply voltage adjusting module adjusts the power supply voltage of the output voltage adjustable power supply so as to damage the storage unit of the mobile terminal, specifically:
and adjusting the power supply voltage of the output voltage adjustable power supply to be higher than the set upper limit voltage of a storage unit of the mobile terminal so as to burn out the storage unit.
On the basis of the foregoing embodiments, the power supply voltage adjusting module adjusts the power supply voltage of the output voltage adjustable power supply so as to close the access function to the storage unit of the mobile terminal specifically includes:
and adjusting the power supply voltage of the output voltage adjustable power supply to be below the set lower limit voltage of the storage unit of the mobile terminal, or controlling the output voltage adjustable power supply to stop supplying power so as to close the access function of the storage unit of the mobile terminal.
On the basis of the above embodiments, the output voltage adjustable power supply includes: low dropout linear regulator and dc/dc conversion power supply.
On the basis of the foregoing embodiments, when the at least one unlocking instruction satisfies the setting condition, the power supply voltage adjustment module adjusts the power supply voltage of the output voltage adjustable power supply specifically as follows:
when the number of the at least one unlocking instruction reaches a first set number and the matching degree of user input information corresponding to each unlocking instruction and set unlocking information is smaller than a set value, adjusting the power supply voltage of the output voltage adjustable power supply; or,
and when the number of the at least one unlocking instruction reaches a second set number, adjusting the power supply voltage of the output voltage adjustable power supply.
On the basis of the above embodiments, the storage unit is an embedded multimedia card.
The data protection device provided by the embodiment of the invention can execute the data protection method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
In addition, the embodiment further provides a mobile terminal, the mobile terminal integrates the data protection device provided by the fourth embodiment, the device can execute the data protection method provided by any embodiment of the present invention, and the device has corresponding functional modules and beneficial effects of the execution method.
The foregoing is considered as illustrative of the preferred embodiments of the invention and technical principles employed. The present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in more detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the claims.

Claims (13)

1. A method for protecting data, comprising:
detecting at least one unlocking instruction acted on the mobile terminal by a user within a set time;
and when the at least one unlocking instruction meets a set condition, adjusting the power supply voltage of an output voltage adjustable power supply to damage the storage unit of the mobile terminal or close the access function of the storage unit of the mobile terminal, wherein the output voltage adjustable power supply is used for supplying power to the storage unit.
2. The method of claim 1, wherein adjusting the output voltage adjusts a supply voltage of the power supply to damage the memory cell of the mobile terminal comprises:
and adjusting the power supply voltage of the output voltage adjustable power supply to be higher than the set upper limit voltage of a storage unit of the mobile terminal so as to burn out the storage unit.
3. The method of claim 1, wherein adjusting the output voltage adjusts a supply voltage of the power supply to turn off access to the memory unit of the mobile terminal comprises:
and adjusting the power supply voltage of the output voltage adjustable power supply to be below the set lower limit voltage of the storage unit of the mobile terminal, or controlling the output voltage adjustable power supply to stop supplying power so as to close the access function of the storage unit of the mobile terminal.
4. The method of claim 1, wherein the output voltage adjustable power supply comprises: low dropout linear regulator and dc/dc conversion power supply.
5. The method of claim 1, wherein adjusting the supply voltage of the output voltage adjustable power supply when the at least one unlock command satisfies a set condition comprises:
when the number of the at least one unlocking instruction reaches a first set number and the matching degree of user input information corresponding to each unlocking instruction and set unlocking information is smaller than a set value, adjusting the power supply voltage of the output voltage adjustable power supply; or,
and when the number of the at least one unlocking instruction reaches a second set number, adjusting the power supply voltage of the output voltage adjustable power supply.
6. The method according to any of claims 1-5, wherein the storage unit is an embedded multimedia card.
7. A data protection device, comprising:
the unlocking instruction detection module is used for detecting at least one unlocking instruction acted on the mobile terminal by a user within set time;
and the power supply voltage adjusting module is used for adjusting the power supply voltage of the output voltage adjustable power supply when the at least one unlocking instruction meets the set condition so as to damage the storage unit of the mobile terminal or close the access function to the storage unit of the mobile terminal, and the output voltage adjustable power supply is used for supplying power to the storage unit.
8. The apparatus according to claim 7, wherein the supply voltage adjusting module adjusts the supply voltage of the output voltage adjustable power supply to damage the memory unit of the mobile terminal by:
and adjusting the power supply voltage of the output voltage adjustable power supply to be higher than the set upper limit voltage of a storage unit of the mobile terminal so as to burn out the storage unit.
9. The apparatus according to claim 7, wherein the supply voltage adjustment module adjusts the supply voltage of the output voltage adjustable power supply to shut down the access function to the memory unit of the mobile terminal specifically comprises:
and adjusting the power supply voltage of the output voltage adjustable power supply to be below the set lower limit voltage of the storage unit of the mobile terminal, or controlling the output voltage adjustable power supply to stop supplying power so as to close the access function of the storage unit of the mobile terminal.
10. The apparatus of claim 7, wherein the output voltage adjustable power supply comprises: low dropout linear regulator and dc/dc conversion power supply.
11. The apparatus according to claim 7, wherein the supply voltage adjusting module adjusts the supply voltage of the output voltage adjustable power supply when the at least one unlocking instruction satisfies the setting condition, specifically:
when the number of the at least one unlocking instruction reaches a first set number and the matching degree of user input information corresponding to each unlocking instruction and set unlocking information is smaller than a set value, adjusting the power supply voltage of the output voltage adjustable power supply; or,
and when the number of the at least one unlocking instruction reaches a second set number, adjusting the power supply voltage of the output voltage adjustable power supply.
12. The apparatus according to any one of claims 7-11, wherein the storage unit is an embedded multimedia card.
13. A mobile terminal characterized in that it integrates a data protection device according to any of claims 7-12.
CN201610010095.4A 2016-01-05 2016-01-05 A kind of data guard method, device and mobile terminal Expired - Fee Related CN105657169B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610010095.4A CN105657169B (en) 2016-01-05 2016-01-05 A kind of data guard method, device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610010095.4A CN105657169B (en) 2016-01-05 2016-01-05 A kind of data guard method, device and mobile terminal

Publications (2)

Publication Number Publication Date
CN105657169A true CN105657169A (en) 2016-06-08
CN105657169B CN105657169B (en) 2019-02-19

Family

ID=56490607

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610010095.4A Expired - Fee Related CN105657169B (en) 2016-01-05 2016-01-05 A kind of data guard method, device and mobile terminal

Country Status (1)

Country Link
CN (1) CN105657169B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100296371B1 (en) * 1998-12-31 2001-08-07 최기주 Computer having security device
CN102880560A (en) * 2011-07-11 2013-01-16 三星电子(中国)研发中心 User privacy data protection method and mobile terminal using user privacy data protection method
CN103839014A (en) * 2014-03-19 2014-06-04 深圳市亿道信息技术有限公司 Self-destruction circuit of tablet personal computer storage device
CN104134024A (en) * 2014-07-24 2014-11-05 广东欧珀移动通信有限公司 Mobile terminal privacy protection method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100296371B1 (en) * 1998-12-31 2001-08-07 최기주 Computer having security device
CN102880560A (en) * 2011-07-11 2013-01-16 三星电子(中国)研发中心 User privacy data protection method and mobile terminal using user privacy data protection method
CN103839014A (en) * 2014-03-19 2014-06-04 深圳市亿道信息技术有限公司 Self-destruction circuit of tablet personal computer storage device
CN104134024A (en) * 2014-07-24 2014-11-05 广东欧珀移动通信有限公司 Mobile terminal privacy protection method and system

Also Published As

Publication number Publication date
CN105657169B (en) 2019-02-19

Similar Documents

Publication Publication Date Title
KR101607042B1 (en) System and method for storing a password recovery secret
CN107636694A (en) Card and application program
CN104899582A (en) Fingerprint identification software and fingerprint identification method therefor
US10880296B2 (en) Smart security storage
CN105243346B (en) A kind of mobile terminal and its theft preventing method with anti-theft feature
CN105205374A (en) Application program encrypting method and user terminal
EP2868158A1 (en) Device, method, and system for securely pairing mobile communication devices using movement
CN105635483B (en) A kind of processing method, device and storage medium operating mobile terminal
TW201340542A (en) System and method for mobile device charging
CN102722663B (en) Handheld smart device data security protection method
CN104954534B (en) Control method, device and the corresponding communication terminal of communication terminal
CN102611774B (en) Based on the mobile phone information safety protection system and method that fingerprint overlaps with navigation key
CN101568106A (en) Mobile phone accessing system and related storage device
CN105788035A (en) With the passive intelligence lock that has NFC function card reader mode mobile communication
CN1980428A (en) Method for mobile terminal to automatically encipher and automatically protect subscriber identifying module
CN101568105B (en) Mobile phone accessing system and related storage device
CN101753301A (en) Fingerprint dynamic password ID authentication device and the implementation method thereof
US20150348011A1 (en) Smart card and method for controlling smart card trade
CN105657169B (en) A kind of data guard method, device and mobile terminal
CN105354461A (en) Authentication method and terminal
CN115904055A (en) Power saving method, device, equipment and storage medium based on baseboard management controller
CN103824029B (en) Intelligent card data treating method and apparatus
CN102750231A (en) Method and apparatus for controlling access of a secure digital memory card
TWI430133B (en) Biosensing boot apparatus, boot management system controlled by biometric sensor and method thereof
CN110750767A (en) Login initialization method of intelligent terminal device and intelligent terminal device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190219

CF01 Termination of patent right due to non-payment of annual fee