CN109697345A - A kind of data destruction method and mobile terminal - Google Patents

A kind of data destruction method and mobile terminal Download PDF

Info

Publication number
CN109697345A
CN109697345A CN201811419660.8A CN201811419660A CN109697345A CN 109697345 A CN109697345 A CN 109697345A CN 201811419660 A CN201811419660 A CN 201811419660A CN 109697345 A CN109697345 A CN 109697345A
Authority
CN
China
Prior art keywords
mobile terminal
data
object run
event
mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811419660.8A
Other languages
Chinese (zh)
Other versions
CN109697345B (en
Inventor
于雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201811419660.8A priority Critical patent/CN109697345B/en
Publication of CN109697345A publication Critical patent/CN109697345A/en
Application granted granted Critical
Publication of CN109697345B publication Critical patent/CN109697345B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a kind of data destruction method and mobile terminals, comprising: obtains the object run event for being directed to mobile terminal;Determine whether object run event matches with predetermined registration operation event, if object run event and predetermined registration operation event matches, it is determined that the data destroying mode of mobile terminal;According to data destroying mode, it executes and the data destroying of mobile terminal is operated, the present invention is judged by the object run event received to mobile terminal, under conditions of determining that object run event matches are automatically deleted private data, quickly triggers and carry out data delete operation, it is that mobile terminal is judging automatically simultaneously automatic implementation from the background that the data, which delete means, it does not need user and carries out relevant operation, entire deletion process crypticity and safety are higher, improve the safety guarantee to private data.

Description

A kind of data destruction method and mobile terminal
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of data destruction method and mobile terminals.
Background technique
Universal and usage scenario with mobile terminal is continuously increased, safety of the people to the private data of mobile terminal Property requires also higher and higher, and especially for some users with security work property, they need a kind of more hidden than routine The relatively reliable scheme of private salvo, to protect oneself private data.
In the prior art, the common private data guard means of mobile terminal include: to set from software view to mobile terminal Different management modes is set, every kind of management mode is correspondingly arranged the operating system with isolated user space, by by privacy number According in the user's space being stored under privacy mode, and it is different from the password of normal mode to the starting setting of the privacy mode, User's space after user inputs correct password, under the accessible privacy mode of ability.
But the private data guard means at present in scheme are all controlled by human factor, and are easy to be recognized by the third party The difference of privacy mode and normal mode out, therefore, it is difficult to pass through what is do not found by the third party under the monitoring of the third party Means delete private data, and the user for leading to high privacy requirements can not in case of emergency protect the safety of private data.For example, When mobile terminal user is on the hazard, access privacy mode is forced, leads to the leakage of private data.
Summary of the invention
The embodiment of the present invention provides a kind of data destruction method and mobile terminal, to solve that high privacy exists in the prior art The user of demand can not in case of emergency protect the problem of the safety of private data.
In a first aspect, being applied to mobile terminal, this method packet the embodiment of the invention provides a kind of data destruction method It includes:
Obtain the object run event for being directed to the mobile terminal;
Determine whether the object run event matches with the predetermined registration operation event;
If the object run event and predetermined registration operation event matches, it is determined that the data destroying side of the mobile terminal Formula;
According to the data destroying mode, executes and the data destroying of the mobile terminal is operated.
Second aspect, the embodiment of the invention provides a kind of mobile terminal, which includes:
Module is obtained, for obtaining the object run event for being directed to the mobile terminal;
Matching module, for determining whether the object run event matches with the predetermined registration operation event;
Determining module, if for the object run event and predetermined registration operation event matches, it is determined that the mobile terminal Data destroying mode;
Execution module, for executing and being operated to the data destroying of the mobile terminal according to the data destroying mode.
The third aspect the embodiment of the invention also provides a kind of mobile terminal, including processor, memory and is stored in institute The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor It realizes such as the step of data destruction method provided by the invention.
Fourth aspect, the embodiment of the invention also provides a kind of readable storage medium storing program for executing, the instruction in the storage medium When being executed by the processor of electronic equipment, so that electronic equipment is able to carry out the step such as data destruction method provided by the invention Suddenly.
In embodiments of the present invention, the available object run event for mobile terminal of mobile terminal;Determine target Whether action event matches with predetermined registration operation event, if object run event and predetermined registration operation event matches, it is determined that mobile whole The data destroying mode at end;According to data destroying mode, executes and the data destroying of mobile terminal is operated, the present invention passes through to shifting The object run event that dynamic terminal receives judged, is determining that object run event matches are automatically deleted the item of private data Under part, data delete operation is quickly triggered and carries out, it is that mobile terminal is judging automatically simultaneously automatically from the background which, which deletes means, Implement, does not need user and carry out relevant operation, entire deletion process crypticity and safety are higher, improve to private data Safety guarantee.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
Fig. 1 is a kind of step flow chart of data destruction method provided in an embodiment of the present invention;
Fig. 2 is the step flow chart of another data destruction method provided in an embodiment of the present invention;
Fig. 3 is a kind of block diagram of mobile terminal provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of the mobile terminal of another embodiment of the present invention.
Specific embodiment
The exemplary embodiment that the present invention will be described in more detail below with reference to accompanying drawings.Although showing the present invention in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the present invention without should be by embodiments set forth here It is limited.It is to be able to thoroughly understand the present invention on the contrary, providing these embodiments, and can be by the scope of the present invention It is fully disclosed to those skilled in the art.
Fig. 1 is a kind of step flow chart of data destruction method provided in an embodiment of the present invention, as shown in Figure 1, this method May include:
Step 101 obtains the object run event for being directed to the mobile terminal.
In embodiments of the present invention, action event may include the hardware operation event made for mobile terminal and software Action event, hardware operation event generally comprises the touch screen of touch-control mobile terminal, the physical button for pressing mobile terminal etc., soft Part action event is generally comprised e.g. to be connect by the microphone of mobile terminal by the event that the software application of mobile terminal is handled It receives voice, function setting, deletion or addition data, operation program etc. is carried out by the setting application of mobile terminal.
Specifically, user can be operated by hardware operation event or software for the different application scene of mobile terminal Event realization can be remotely to wheat if user is under the scene for being inconvenient to contact mobile terminal to the data destroying of mobile terminal Gram wind typing controls voice, and mobile terminal is according to the control voice, the destruction of trigger data.
Step 102 determines whether the object run event matches with the predetermined registration operation event;
In embodiments of the present invention, scene is presently in based on user and mobile terminal, user can do mobile terminal Corresponding operation out, generates corresponding object run event, and mobile terminal can preset action event and data destroying side The corresponding relationship of formula is matched after getting object run event with the corresponding relationship, so that it is determined that corresponding data pin Ruin mode.
If step 103, the object run event and predetermined registration operation event matches, it is determined that the data of the mobile terminal Destruction mode.
Specifically, can realize according to some hardware sensors of mobile terminal and the cooperation of software application and obtain target Action event and the corresponding data destroying mode of matching, sensor may include microphone, camera, physical button, touch-control Screen etc., software application can be memorandum, task manager etc..
In practical application, the destruction of data can carry out active triggering, for example, if the same of power supply physical button is pinned in definition When, quickly by the action event of three lower volume down physical buttons, corresponding data destroys mode 1, then in user to mobile terminal Perform while pin power supply physical button, quickly by the object run event of three lower volume down physical buttons after, then may be used 1 in a manner of according to data destroying, executes and the data destroying of mobile terminal is operated;For another example, if definition passes through microphone typing Voice content be " turn-on data protection " action event, and the vocal print of the voice is verified as the vocal print of owner, this Action event corresponding data destroys mode 2, then passing through the microphone typing of mobile terminal in owner, " turn-on data is protected After the object run event of shield ", then it can execute and the data destroying of mobile terminal is operated according to data destroying mode 2.
In practical application, the destruction of data can also carry out passive triggering, for example, mobile terminal repeatedly inputted it is different Password sounds out unlock, it is assumed that owner's user setting starts after inputing password 10 times by mistake destroys, then when the mesh that mobile terminal receives Mark action event is to execute and operate to the data destroying of mobile terminal when continuously inputing 10 times or more passwords by mistake;For another example, work as movement Terminal provides task manager monitoring the process and is connected to other external equipments to mobile terminal, and is just being attempted by third party software broken Xie Shi is executed and is operated to the data destroying of mobile terminal.
Step 104, it according to the data destroying mode, executes and the data destroying of the mobile terminal is operated.
In embodiments of the present invention, the high-level secret protection demand that user proposes usually requires that and is being not easy to be found In the case of, it is rapid and safe all private datas are destroyed to, therefore, conventional physical destruction mobile terminal hardware or hand Dynamic operation mobile terminal, the means that data are deleted by way of software application, which are not particularly suited for above-mentioned high-level secret protection, to be needed It asks.
Therefore, data destroying mode provided in an embodiment of the present invention may include: the battery output electricity for adjusting mobile terminal It is depressed into the power that can burn mainboard and memory, so that high-voltage electricity of the battery to mainboard and memory release moment, by mainboard and memory It burns, achievees the purpose that thoroughly to destroy data, which can not carry out the deletion of data for software deletes data Restore, security performance is preferable;When the electricity for destroying data is not achieved in battery, silent rapid data coverage mode can be used and destroy Data, technology realization are to repeat to carry out covering to data stored in memory writing with a brush dipped in Chinese ink by unordered coding, make original data time Sequence is destroyed, and achievees the purpose that delete data.
To sum up, a kind of data destruction method provided in an embodiment of the present invention, comprising: the target obtained for mobile terminal is grasped Make event;Determine whether object run event matches with predetermined registration operation event, if object run event and predetermined registration operation event Match, it is determined that the data destroying mode of mobile terminal;According to data destroying mode, executes and the data destroying of mobile terminal is grasped Make, the present invention is judged by the object run event received to mobile terminal, is determining object run event matches certainly Under conditions of dynamic deletion private data, data delete operation is quickly triggered and carries out, it is that mobile terminal exists which, which deletes means, Backstage judges automatically and automatic implementation, does not need user and carries out relevant operation, it is entire delete process crypticity and safety compared with Height improves the safety guarantee to private data.
Fig. 2 is the step flow chart of another data destruction method provided in an embodiment of the present invention, as shown in Fig. 2, the party Method may include:
Step 201 obtains the object run event for being directed to the mobile terminal.
The implementation of this step is similar with the realization process of above-mentioned steps 101, and this will not be detailed here for the embodiment of the present invention.
Step 202 determines whether the object run event matches with the predetermined registration operation event.
The implementation of this step is similar with the realization process of above-mentioned steps 102, and this will not be detailed here for the embodiment of the present invention.
If step 203, the object run event and predetermined registration operation event matches, it is determined that the data of the mobile terminal Destruction mode.
The implementation of this step is similar with the realization process of above-mentioned steps 103, and this will not be detailed here for the embodiment of the present invention.
Optionally, in an implementation of the embodiment of the present invention, if the object run event includes by the shifting The microphone of dynamic terminal receives voice messaging, and step 203 can also include:
Sub-step 2031 determines institute under the semantic content of the voice messaging and the matched situation of default semantic content State the data destroying mode of mobile terminal.
In this step, the available voice messaging of the microphone of mobile terminal realizes man-machine friendship by the voice messaging Mutually, and for the human-computer interaction of data destroying operation, since the consequence that data destroying generates is more important, and process can not It is inverse, it is therefore desirable to the voice messaging really meaning expressed by the owner user is proved by multiple-authentication.
Firstly, mobile terminal can carry out whether verifying voice messaging is by the typing of owner user institute, therefore, in order to keep away Other people the speak interference of generation can also carry out authentication after obtaining voice messaging around exempting from, to verify input Whether voice is the voice for holding user, and specially preset this holds the target voiceprint of user in the terminal, After receiving voice messaging, the target voiceprint in the voice messaging is extracted, and carry out with preset target voiceprint Match, if unanimously, the matched operation of semantic content after can carrying out.
Further, the matching for realizing semantic content, specifically includes and segments voice messaging, and to it is each segment into Semantics recognition obtains segmenting corresponding text information, and the text information of each participle is combined according to corresponding sequence The semantic content of voice messaging is obtained, under the semantic content and the matched situation of default semantic content, can determine that voice is believed Breath is the instruction for the data destroying operation that the user that owner user issues carries out mobile terminal.
For example, if definition is the action event of " turn-on data protection " by the voice content of microphone typing, and the language The vocal print of sound is verified as the vocal print of owner, which destroys mode 2, then passes through shifting in owner After moving the microphone typing of the terminal object run event of " turn-on data protection ", then it can be held according to data destroying mode 2 Row operates the data destroying of mobile terminal.
Optionally, sub-step 2031 can also include:
Sub-step A1, under the semantic content of the voice messaging and the matched situation of default semantic content, described in extraction The target voiceprint of voice messaging.
In embodiments of the present invention, in order to further increase the safety of private data, so that the side for passing through interactive voice The process that formula deletes private data is more rigorous perfect, can also the affective tag of voice messaging be analyzed and be determined, with Just mood of the identification user in typing voice process, by the judgement to the mood, the corresponding deletion behaviour for making data automatically Make.
Specifically, voice letter can be extracted under the semantic content of voice messaging and the matched situation of default semantic content The target voiceprint of breath, so-called vocal print (Voiceprint) information are the carrying verbal informations that electricity consumption acoustic instrument is shown Sound wave spectrum, modern scientific research shows that vocal print not only has specificity, but also has the characteristics of relative stability.Therefore vocal print Information is the important parameter of the various features of determining voice.
The target voiceprint is matched with preset vocal print template, determines the target vocal print by sub-step A2 The corresponding target affective tag of information, the vocal print template include the corresponding relationship of vocal print and affective tag.
In this step, preset vocal print template may include the vocal print feature of the most of moods of the mankind, the vocal print feature It is stored in a manner of sound wave spectrum in the terminal, target voiceprint is matched with preset vocal print template, determined The corresponding target affective tag of the target voiceprint.As included " calmness ", " fear ", " anxiety ", " height in vocal print template It is emerging " etc. moods vocal print, if user's mood when saying the voice of " turn-on data protection " is panic, by with vocal print template Matching, that is, can determine that the user is in " fear " mood.
Sub-step A3 determines the mobile terminal when the target affective tag is in default affective tag classification Data destroying mode.
In this step, being associated with based on user feeling and actual scene can preset affective tag classification, this is preset Affective tag classification includes that some of user represent the urgent affective tag of situation.Such as default affective tag classification can wrap Include: the negative mood of the representatives such as " fear ", " anxiety ", " indignation " can when the voice messaging of the typing of user belongs to the classification It is urgent with the situation that determination is current, need to carry out the data destroying of mobile terminal.
Optionally, in an implementation of the embodiment of the present invention, if the object run event includes by the shifting The screen or physical button of dynamic terminal receive touch control operation, and step 203 can also include:
Sub-step 2032, in the order of operation and position of touch and preset order of operation of the touch control operation and preset In the matched situation of position of touch, the data destroying mode of the mobile terminal is determined.
In this step, the order for the operation that mobile terminal can also be implemented touch screen and physical button and position carry out Monitoring, the case where the order of operation and position of touch of touch control operation are matched with preset order of operation and preset position of touch Under, determine the data destroying mode of mobile terminal.
For example, if quickly pressing the operation thing of three lower volume down physical buttons while power supply physical button is pinned in definition Part, corresponding data destroys mode 1, then while user pins power supply physical button to mobile terminal execution, quickly presses three After the object run event of lower volume down physical button, then the number to mobile terminal can be executed according to data destroying mode 1 It is operated according to destroying
Step 204, when the charge value of the battery of the mobile terminal be greater than or equal to preset threshold when, control the battery It is greater than mainboard from the voltage pulse of preset voltage value to the mobile terminal and memory output voltage values.
In this step, the default of release high voltage can be supported when the charge value of the battery of mobile terminal is greater than or equal to When threshold value, the voltage pulse that battery is greater than mainboard from preset voltage value to mobile terminal and memory output voltage values can control.
Specifically, high voltage burns the mode of mainboard and memory, specifically it is arranged in the inside of mobile terminal master controller Trigger switch applies high voltage pulse signal from battery to mainboard and memory by the unlatching of trigger switch, and then burns mainboard And memory, realize the data destroying that memory in the motherboard is set, optionally, which may include being greater than 220 volts Voltage value.
Step 205, when the charge value of the battery of the mobile terminal is less than the preset threshold, pass through what is generated at random Non-ordered data covers the data in the memory.
When the charge value for destroying data is not achieved in battery, silent rapid data coverage mode can be used and destroy data, skill It is to repeat to carry out covering to data stored in memory by the non-ordered data generated at random to write with a brush dipped in Chinese ink that art, which is realized, makes original data Order destroys, and achievees the purpose that delete data.
In conclusion another kind data destruction method provided in an embodiment of the present invention, comprising: obtain for mobile terminal Object run event;Determine whether object run event matches with predetermined registration operation event, if object run event and predetermined registration operation Event matches, it is determined that the data destroying mode of mobile terminal;According to data destroying mode, the data pin to mobile terminal is executed Operation is ruined, the present invention is judged by the object run event received to mobile terminal, is determining object run event symbol Conjunction is automatically deleted under conditions of private data, quickly triggers and carry out data delete operation, it is mobile whole which, which deletes means, It holds and is judging automatically from the background and automatic implementation, do not need user and carry out relevant operation, it is entire to delete process crypticity and safety Property is higher, improves the safety guarantee to private data.
Fig. 3 is a kind of block diagram of mobile terminal provided in an embodiment of the present invention, as shown in figure 3, the mobile terminal 30 includes:
Module 301 is obtained, for obtaining the object run event for being directed to the mobile terminal;
Matching module 302, for determining whether the object run event matches with the predetermined registration operation event;
Determining module 303, it is described mobile whole for determining in the object run event and predetermined registration operation event matches The data destroying mode at end;
Optionally, if the object run event includes receiving voice messaging, institute by the microphone of the mobile terminal Stating determining module 303 includes:
Voice match submodule, the case where matching for the semantic content in the voice messaging with default semantic content Under, determine the data destroying mode of the mobile terminal.
Optionally, the voice match submodule, comprising:
Extraction unit, for extracting under the semantic content and the matched situation of default semantic content in the voice messaging The target voiceprint of the voice messaging;
Matching unit determines the target for matching the target voiceprint with preset vocal print template The corresponding target affective tag of voiceprint, the vocal print template include the corresponding relationship of vocal print and affective tag;
Determination unit, for determining the movement eventually when the target affective tag is in default affective tag classification The data destroying mode at end.
Optionally, if the object run event includes receiving touch-control behaviour by the screen or physical button of the mobile terminal Make, then the determining module 303 includes:
Touch-control matched sub-block, for the order of operation and position of touch and preset order of operation in the touch control operation In the matched situation of preset position of touch, the data destroying mode of the mobile terminal is determined.
Execution module 304, for executing and being grasped to the data destroying of the mobile terminal according to the data destroying mode Make.
Optionally, the execution module 304, comprising:
First implementation sub-module, for when the charge value of the battery of the mobile terminal be greater than or equal to preset threshold when, Control the voltage pulse that the battery is greater than mainboard from preset voltage value to the mobile terminal and memory output voltage values;
Second implementation sub-module, for leading to when the charge value of the battery of the mobile terminal is less than the preset threshold It crosses the non-ordered data generated at random and covers data in the memory.
In conclusion a kind of mobile terminal provided in an embodiment of the present invention, including, the target obtained for mobile terminal is grasped Make event;Determine whether object run event matches with predetermined registration operation event, if object run event and predetermined registration operation event Match, it is determined that the data destroying mode of mobile terminal;According to data destroying mode, executes and the data destroying of mobile terminal is grasped Make, the present invention is judged by the object run event received to mobile terminal, is determining object run event matches certainly Under conditions of dynamic deletion private data, data delete operation is quickly triggered and carries out, it is that mobile terminal exists which, which deletes means, Backstage judges automatically and automatic implementation, does not need user and carries out relevant operation, it is entire delete process crypticity and safety compared with Height improves the safety guarantee to private data.
The embodiment of the present invention also provides a kind of mobile terminal, including processor, and memory is stored on the memory simultaneously The computer program that can be run on the processor, the computer program realize above-mentioned data when being executed by the processor Each process of destroying method embodiment, and identical technical effect can be reached, to avoid repeating, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each process of above-mentioned data destruction method embodiment when being executed by processor, and Identical technical effect can be reached, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as Read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
Fig. 4 is the structural schematic diagram of the mobile terminal of another embodiment of the present invention.
The mobile terminal includes: processor, memory and is stored on the memory and can be on the processor The computer program of operation, the computer program realize the step of above-mentioned data destruction method when being executed by the processor Suddenly.
The mobile terminal further include: computer program is stored on readable storage medium storing program for executing, the computer program is located The step of reason device realizes above-mentioned data destruction method when executing.
Specifically, the mobile terminal 600 in Fig. 4 can be mobile phone, tablet computer, personal digital assistant (PersonalDigital Assistant, PDA) or vehicle-mounted computer etc..
Mobile terminal 600 in Fig. 4 includes radio frequency (RadioFrequency, RF) circuit 610, memory 620, input list Member 630, display unit 640, processor 660, voicefrequency circuit 670, WLAN (WirelessFidelity) module 680, Power supply 690 and camera 6110.
Wherein, input unit 630 can be used for receiving the number or character information of user's input, and generation and mobile terminal The related signal input of 600 user setting and function control.Specifically, in the embodiment of the present invention, which can To include touch panel 631.Touch panel 631, collect user on it or nearby touch operation (such as user use hand The operation of any suitable object or attachment such as finger, stylus on touch panel 631), and driven according to preset formula Corresponding attachment device.Optionally, touch panel 631 may include both touch detecting apparatus and touch controller.Wherein, Touch detecting apparatus detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch control Device;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives the processor 660, and order that processor 660 is sent can be received and executed.Furthermore, it is possible to use resistance-type, condenser type, infrared ray with And the multiple types such as surface acoustic wave realize touch panel 631.In addition to touch panel 631, input unit 630 can also include other Input equipment 632, other input equipments 632 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, one of operating stick etc. or a variety of.
Wherein, display unit 640 can be used for showing information input by user or be supplied to the information and movement of user The various menu interfaces of terminal 600.Display unit 640 may include display panel 641, optionally, can use LCD or organic hair The forms such as optical diode (OrganicLight-EmittingDiode, OLED) configure display panel 641.
It should be noted that touch panel 631 can cover display panel 641, touch display screen is formed, when the touch display screen is examined After measuring touch operation on it or nearby, processor 660 is sent to determine the type of touch event, is followed by subsequent processing device 660 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example, Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 660 is the control centre of mobile terminal 600, utilizes various interfaces and connection whole mobile phone Various pieces, by running or executing the software program and/or module that are stored in first memory 621, and calling storage Data in second memory 622 execute the various functions and processing data of mobile terminal 600, thus to mobile terminal 600 Carry out integral monitoring.Optionally, processor 660 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 621 in software program and/or module and/ Or the data in the second memory 622, processor 660 are used to obtain the object run event for mobile terminal;Determine mesh Whether mark action event matches with predetermined registration operation event, if object run event and predetermined registration operation event matches, it is determined that mobile The data destroying mode of terminal;According to data destroying mode, executes and the data destroying of mobile terminal is operated.
As it can be seen that mobile terminal may include: to obtain the object run event for being directed to mobile terminal in the embodiment of the present invention; Determine whether object run event matches with predetermined registration operation event, if object run event and predetermined registration operation event matches, really Determine the data destroying mode of mobile terminal;According to data destroying mode, executes and the data destroying of mobile terminal is operated, the present invention Judged by the object run event received to mobile terminal, is determining that object run event matches are automatically deleted privacy Under conditions of data, data delete operation is quickly triggered and carries out, it is that mobile terminal is being sentenced automatically from the background which, which deletes means, It is disconnected and automatic implementation, it does not need user and carries out relevant operation, it is entire to delete process crypticity and safety is higher, it improves pair The safety guarantee of private data.
For above-mentioned apparatus embodiment, since it is basically similar to the method embodiment, so be described relatively simple, The relevent part can refer to the partial explaination of embodiments of method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It would have readily occurred to a person skilled in the art that: any combination application of above-mentioned each embodiment is all feasible, therefore Any combination between above-mentioned each embodiment is all embodiment of the present invention, but this specification exists as space is limited, This is not just detailed one by one.
Provided herein data destruction method not with any certain computer, virtual system or the intrinsic phase of other equipment It closes.Various general-purpose systems can also be used together with teachings based herein.As described above, construction has present invention side Structure required by the system of case is obvious.In addition, the present invention is also not directed to any particular programming language.It should be bright It is white, it can use various programming languages and realize summary of the invention described herein, and retouched above to what language-specific was done State is in order to disclose the best mode of carrying out the invention.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the present invention and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, such as right As claim reflects, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows tool Thus claims of body embodiment are expressly incorporated in the specific embodiment, wherein each claim conduct itself Separate embodiments of the invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in detail in the claims, embodiment claimed it is one of any Can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice Microprocessor or digital signal processor (DSP) realize the identification side of background music in video according to an embodiment of the present invention The some or all functions of some or all components in method.The present invention is also implemented as described here for executing Method some or all device or device programs (for example, computer program and computer program product).This The program that the realization of sample is of the invention can store on a computer-readable medium, or can have one or more signal Form.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other Form provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame Claim.

Claims (11)

1. a kind of data destruction method is applied to mobile terminal, which is characterized in that the described method includes:
Obtain the object run event for being directed to the mobile terminal;
Determine whether the object run event matches with the predetermined registration operation event;
If the object run event and predetermined registration operation event matches, it is determined that the data destroying mode of the mobile terminal;
According to the data destroying mode, executes and the data destroying of the mobile terminal is operated.
2. the method according to claim 1, wherein if the object run event includes by the mobile terminal Microphone receive voice messaging, then it is described in the object run event and predetermined registration operation event matches, determine the shifting The data destroying mode of dynamic terminal, comprising:
Under the semantic content of the voice messaging and the matched situation of default semantic content, the data of the mobile terminal are determined Destruction mode.
3. according to the method described in claim 2, it is characterized in that, the semantic content in the voice messaging and default language In the case where adopted content matching, the data destroying mode of the mobile terminal is determined, comprising:
Under the semantic content of the voice messaging and the matched situation of default semantic content, the target of the voice messaging is extracted Voiceprint;
The target voiceprint is matched with preset vocal print template, determines the corresponding target of the target voiceprint Affective tag, the vocal print template include the corresponding relationship of vocal print and affective tag;
When the target affective tag is in default affective tag classification, the data destroying mode of the mobile terminal is determined.
4. the method according to claim 1, wherein if the object run event includes by the mobile terminal Screen or physical button receive touch control operation, then it is described in the object run event and predetermined registration operation event matches, really The data destroying mode of the fixed mobile terminal, comprising:
It is matched in the order of operation and position of touch and preset order of operation and preset position of touch of the touch control operation In the case of, determine the data destroying mode of the mobile terminal.
5. method according to any one of claims 1 to 4, which is characterized in that it is described according to the data destroying mode, it executes Data destroying operation to the mobile terminal, comprising:
When the charge value of the battery of the mobile terminal is greater than or equal to preset threshold, it is whole to the movement to control the battery The mainboard and memory output voltage values at end are greater than the voltage pulse of preset voltage value;
When the charge value of the battery of the mobile terminal is less than the preset threshold, covered by the non-ordered data generated at random Data in the memory.
6. a kind of mobile terminal, which is characterized in that the mobile terminal includes:
Module is obtained, for obtaining the object run event for being directed to the mobile terminal;
Matching module, for determining whether the object run event matches with the predetermined registration operation event;
Determining module, if for the object run event and predetermined registration operation event matches, it is determined that the number of the mobile terminal According to the mode of destruction;
Execution module, for executing and being operated to the data destroying of the mobile terminal according to the data destroying mode.
7. mobile terminal according to claim 6, which is characterized in that if the object run event includes by the movement The microphone of terminal receives voice messaging, then the determining module includes:
Voice match submodule, in the voice messaging semantic content and the matched situation of default semantic content under, really The data destroying mode of the fixed mobile terminal.
8. mobile terminal according to claim 7, which is characterized in that the voice match submodule, comprising:
Extraction unit, in the voice messaging semantic content and the matched situation of default semantic content under, described in extraction The target voiceprint of voice messaging;
Matching unit determines the target vocal print for matching the target voiceprint with preset vocal print template The corresponding target affective tag of information, the vocal print template include the corresponding relationship of vocal print and affective tag;
Determination unit, for determining the mobile terminal when the target affective tag is in default affective tag classification Data destroying mode.
9. mobile terminal according to claim 6, which is characterized in that if the object run event includes by the movement The screen or physical button of terminal receive touch control operation, then the determining module includes:
Touch-control matched sub-block, for the order of operation and position of touch and preset order of operation in the touch control operation and in advance If the matched situation of position of touch under, determine the data destroying mode of the mobile terminal.
10. according to any mobile terminal of claim 6 to 9, which is characterized in that the execution module, comprising:
First implementation sub-module, for controlling when the charge value of the battery of the mobile terminal is greater than or equal to preset threshold The battery is greater than mainboard from the voltage pulse of preset voltage value to the mobile terminal and memory output voltage values;
Second implementation sub-module, for when the charge value of the battery of the mobile terminal be less than the preset threshold when, by with The non-ordered data that machine generates covers the data in the memory.
11. a kind of mobile terminal, which is characterized in that including processor, memory and be stored on the memory and can be in institute The computer program run on processor is stated, such as claim 1 to 5 is realized when the computer program is executed by the processor Any one of described in data destruction method the step of.
CN201811419660.8A 2018-11-26 2018-11-26 Data destruction method and mobile terminal Active CN109697345B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811419660.8A CN109697345B (en) 2018-11-26 2018-11-26 Data destruction method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811419660.8A CN109697345B (en) 2018-11-26 2018-11-26 Data destruction method and mobile terminal

Publications (2)

Publication Number Publication Date
CN109697345A true CN109697345A (en) 2019-04-30
CN109697345B CN109697345B (en) 2020-06-05

Family

ID=66230186

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811419660.8A Active CN109697345B (en) 2018-11-26 2018-11-26 Data destruction method and mobile terminal

Country Status (1)

Country Link
CN (1) CN109697345B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110210260A (en) * 2019-06-13 2019-09-06 深圳市风云实业有限公司 Data destruct system and method
CN111523096A (en) * 2020-04-08 2020-08-11 深圳市筑泰防务智能科技有限公司 Security management and control method, device, terminal, system and readable storage medium for terminal user

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1802705A (en) * 2003-03-18 2006-07-12 数据隐藏技术公司 Dead on demand disk technology
WO2008004120A2 (en) * 2006-01-24 2008-01-10 Lai, Josephine Suk Ying System and method for data destruction
CN201237788Y (en) * 2008-08-11 2009-05-13 湖南源科创新科技股份有限公司 Solid state hard disk based on data destruction
US7540016B2 (en) * 2004-07-21 2009-05-26 Beachhead Solutions, Inc. System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
CN102324003A (en) * 2011-05-20 2012-01-18 哈尔滨工业大学 Multi-strategy self-destruction method for highly-credible embedded computer
CN204178355U (en) * 2014-10-28 2015-02-25 四川神琥科技有限公司 A kind of multi-functional data destroyer
CN105022702A (en) * 2015-07-02 2015-11-04 山东超越数控电子有限公司 Design method of HDD (Hard Disk Drive) capable of being quickly destroyed
CN108710791A (en) * 2018-05-22 2018-10-26 北京小米移动软件有限公司 The method and device of voice control

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1802705A (en) * 2003-03-18 2006-07-12 数据隐藏技术公司 Dead on demand disk technology
US7540016B2 (en) * 2004-07-21 2009-05-26 Beachhead Solutions, Inc. System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
WO2008004120A2 (en) * 2006-01-24 2008-01-10 Lai, Josephine Suk Ying System and method for data destruction
CN201237788Y (en) * 2008-08-11 2009-05-13 湖南源科创新科技股份有限公司 Solid state hard disk based on data destruction
CN102324003A (en) * 2011-05-20 2012-01-18 哈尔滨工业大学 Multi-strategy self-destruction method for highly-credible embedded computer
CN204178355U (en) * 2014-10-28 2015-02-25 四川神琥科技有限公司 A kind of multi-functional data destroyer
CN105022702A (en) * 2015-07-02 2015-11-04 山东超越数控电子有限公司 Design method of HDD (Hard Disk Drive) capable of being quickly destroyed
CN108710791A (en) * 2018-05-22 2018-10-26 北京小米移动软件有限公司 The method and device of voice control

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110210260A (en) * 2019-06-13 2019-09-06 深圳市风云实业有限公司 Data destruct system and method
CN111523096A (en) * 2020-04-08 2020-08-11 深圳市筑泰防务智能科技有限公司 Security management and control method, device, terminal, system and readable storage medium for terminal user

Also Published As

Publication number Publication date
CN109697345B (en) 2020-06-05

Similar Documents

Publication Publication Date Title
CN103442141B (en) One key enters the method for safe mode
CN106292857B (en) Electronic device
US20110260829A1 (en) Method of providing security on a portable electronic device having a touch-sensitive display
CN105765520A (en) Device and method for providing lock screen
CN103064606A (en) Screen unlocking method for mobile terminal
CN109583356A (en) Fingerprint identification method and Related product
CN109085975A (en) Screenshotss method, apparatus, storage medium and electronic device
CN106484236B (en) A kind of method and device of physical button prompt operation
CN110140342A (en) Locking screen interface processing method and terminal
CN111176543A (en) Method, device, computer equipment and storage medium for realizing electronic signature
CN106203038A (en) A kind of unlocking method and mobile terminal
CN107450839A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN104035698A (en) Terminal equipment and state switchover method for same
CN105094874A (en) Application starting method and system
CN106484301A (en) A kind of method of hiden application and terminal
CN107087075B (en) Prompting method based on screen fingerprint identification and mobile terminal
CN106814909A (en) Use the method for the human-computer interface device for aircraft including voice recognition unit
CN108551521A (en) A kind of log-on message reminding method and mobile terminal
CN107422976A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN108803988A (en) Control method of electronic device, device, storage medium and electronic equipment
EP2731369B1 (en) Mobile terminal and control method thereof
CN109697345A (en) A kind of data destruction method and mobile terminal
CN104182161B (en) A kind of method and apparatus for opening screen function region
CN106570373A (en) Startup and shutdown method of terminal equipment and terminal equipment
CN108683809B (en) Screen locking method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant