CN109697345A - A kind of data destruction method and mobile terminal - Google Patents
A kind of data destruction method and mobile terminal Download PDFInfo
- Publication number
- CN109697345A CN109697345A CN201811419660.8A CN201811419660A CN109697345A CN 109697345 A CN109697345 A CN 109697345A CN 201811419660 A CN201811419660 A CN 201811419660A CN 109697345 A CN109697345 A CN 109697345A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- data
- object run
- event
- mode
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a kind of data destruction method and mobile terminals, comprising: obtains the object run event for being directed to mobile terminal;Determine whether object run event matches with predetermined registration operation event, if object run event and predetermined registration operation event matches, it is determined that the data destroying mode of mobile terminal;According to data destroying mode, it executes and the data destroying of mobile terminal is operated, the present invention is judged by the object run event received to mobile terminal, under conditions of determining that object run event matches are automatically deleted private data, quickly triggers and carry out data delete operation, it is that mobile terminal is judging automatically simultaneously automatic implementation from the background that the data, which delete means, it does not need user and carries out relevant operation, entire deletion process crypticity and safety are higher, improve the safety guarantee to private data.
Description
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of data destruction method and mobile terminals.
Background technique
Universal and usage scenario with mobile terminal is continuously increased, safety of the people to the private data of mobile terminal
Property requires also higher and higher, and especially for some users with security work property, they need a kind of more hidden than routine
The relatively reliable scheme of private salvo, to protect oneself private data.
In the prior art, the common private data guard means of mobile terminal include: to set from software view to mobile terminal
Different management modes is set, every kind of management mode is correspondingly arranged the operating system with isolated user space, by by privacy number
According in the user's space being stored under privacy mode, and it is different from the password of normal mode to the starting setting of the privacy mode,
User's space after user inputs correct password, under the accessible privacy mode of ability.
But the private data guard means at present in scheme are all controlled by human factor, and are easy to be recognized by the third party
The difference of privacy mode and normal mode out, therefore, it is difficult to pass through what is do not found by the third party under the monitoring of the third party
Means delete private data, and the user for leading to high privacy requirements can not in case of emergency protect the safety of private data.For example,
When mobile terminal user is on the hazard, access privacy mode is forced, leads to the leakage of private data.
Summary of the invention
The embodiment of the present invention provides a kind of data destruction method and mobile terminal, to solve that high privacy exists in the prior art
The user of demand can not in case of emergency protect the problem of the safety of private data.
In a first aspect, being applied to mobile terminal, this method packet the embodiment of the invention provides a kind of data destruction method
It includes:
Obtain the object run event for being directed to the mobile terminal;
Determine whether the object run event matches with the predetermined registration operation event;
If the object run event and predetermined registration operation event matches, it is determined that the data destroying side of the mobile terminal
Formula;
According to the data destroying mode, executes and the data destroying of the mobile terminal is operated.
Second aspect, the embodiment of the invention provides a kind of mobile terminal, which includes:
Module is obtained, for obtaining the object run event for being directed to the mobile terminal;
Matching module, for determining whether the object run event matches with the predetermined registration operation event;
Determining module, if for the object run event and predetermined registration operation event matches, it is determined that the mobile terminal
Data destroying mode;
Execution module, for executing and being operated to the data destroying of the mobile terminal according to the data destroying mode.
The third aspect the embodiment of the invention also provides a kind of mobile terminal, including processor, memory and is stored in institute
The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor
It realizes such as the step of data destruction method provided by the invention.
Fourth aspect, the embodiment of the invention also provides a kind of readable storage medium storing program for executing, the instruction in the storage medium
When being executed by the processor of electronic equipment, so that electronic equipment is able to carry out the step such as data destruction method provided by the invention
Suddenly.
In embodiments of the present invention, the available object run event for mobile terminal of mobile terminal;Determine target
Whether action event matches with predetermined registration operation event, if object run event and predetermined registration operation event matches, it is determined that mobile whole
The data destroying mode at end;According to data destroying mode, executes and the data destroying of mobile terminal is operated, the present invention passes through to shifting
The object run event that dynamic terminal receives judged, is determining that object run event matches are automatically deleted the item of private data
Under part, data delete operation is quickly triggered and carries out, it is that mobile terminal is judging automatically simultaneously automatically from the background which, which deletes means,
Implement, does not need user and carry out relevant operation, entire deletion process crypticity and safety are higher, improve to private data
Safety guarantee.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
Fig. 1 is a kind of step flow chart of data destruction method provided in an embodiment of the present invention;
Fig. 2 is the step flow chart of another data destruction method provided in an embodiment of the present invention;
Fig. 3 is a kind of block diagram of mobile terminal provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of the mobile terminal of another embodiment of the present invention.
Specific embodiment
The exemplary embodiment that the present invention will be described in more detail below with reference to accompanying drawings.Although showing the present invention in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the present invention without should be by embodiments set forth here
It is limited.It is to be able to thoroughly understand the present invention on the contrary, providing these embodiments, and can be by the scope of the present invention
It is fully disclosed to those skilled in the art.
Fig. 1 is a kind of step flow chart of data destruction method provided in an embodiment of the present invention, as shown in Figure 1, this method
May include:
Step 101 obtains the object run event for being directed to the mobile terminal.
In embodiments of the present invention, action event may include the hardware operation event made for mobile terminal and software
Action event, hardware operation event generally comprises the touch screen of touch-control mobile terminal, the physical button for pressing mobile terminal etc., soft
Part action event is generally comprised e.g. to be connect by the microphone of mobile terminal by the event that the software application of mobile terminal is handled
It receives voice, function setting, deletion or addition data, operation program etc. is carried out by the setting application of mobile terminal.
Specifically, user can be operated by hardware operation event or software for the different application scene of mobile terminal
Event realization can be remotely to wheat if user is under the scene for being inconvenient to contact mobile terminal to the data destroying of mobile terminal
Gram wind typing controls voice, and mobile terminal is according to the control voice, the destruction of trigger data.
Step 102 determines whether the object run event matches with the predetermined registration operation event;
In embodiments of the present invention, scene is presently in based on user and mobile terminal, user can do mobile terminal
Corresponding operation out, generates corresponding object run event, and mobile terminal can preset action event and data destroying side
The corresponding relationship of formula is matched after getting object run event with the corresponding relationship, so that it is determined that corresponding data pin
Ruin mode.
If step 103, the object run event and predetermined registration operation event matches, it is determined that the data of the mobile terminal
Destruction mode.
Specifically, can realize according to some hardware sensors of mobile terminal and the cooperation of software application and obtain target
Action event and the corresponding data destroying mode of matching, sensor may include microphone, camera, physical button, touch-control
Screen etc., software application can be memorandum, task manager etc..
In practical application, the destruction of data can carry out active triggering, for example, if the same of power supply physical button is pinned in definition
When, quickly by the action event of three lower volume down physical buttons, corresponding data destroys mode 1, then in user to mobile terminal
Perform while pin power supply physical button, quickly by the object run event of three lower volume down physical buttons after, then may be used
1 in a manner of according to data destroying, executes and the data destroying of mobile terminal is operated;For another example, if definition passes through microphone typing
Voice content be " turn-on data protection " action event, and the vocal print of the voice is verified as the vocal print of owner, this
Action event corresponding data destroys mode 2, then passing through the microphone typing of mobile terminal in owner, " turn-on data is protected
After the object run event of shield ", then it can execute and the data destroying of mobile terminal is operated according to data destroying mode 2.
In practical application, the destruction of data can also carry out passive triggering, for example, mobile terminal repeatedly inputted it is different
Password sounds out unlock, it is assumed that owner's user setting starts after inputing password 10 times by mistake destroys, then when the mesh that mobile terminal receives
Mark action event is to execute and operate to the data destroying of mobile terminal when continuously inputing 10 times or more passwords by mistake;For another example, work as movement
Terminal provides task manager monitoring the process and is connected to other external equipments to mobile terminal, and is just being attempted by third party software broken
Xie Shi is executed and is operated to the data destroying of mobile terminal.
Step 104, it according to the data destroying mode, executes and the data destroying of the mobile terminal is operated.
In embodiments of the present invention, the high-level secret protection demand that user proposes usually requires that and is being not easy to be found
In the case of, it is rapid and safe all private datas are destroyed to, therefore, conventional physical destruction mobile terminal hardware or hand
Dynamic operation mobile terminal, the means that data are deleted by way of software application, which are not particularly suited for above-mentioned high-level secret protection, to be needed
It asks.
Therefore, data destroying mode provided in an embodiment of the present invention may include: the battery output electricity for adjusting mobile terminal
It is depressed into the power that can burn mainboard and memory, so that high-voltage electricity of the battery to mainboard and memory release moment, by mainboard and memory
It burns, achievees the purpose that thoroughly to destroy data, which can not carry out the deletion of data for software deletes data
Restore, security performance is preferable;When the electricity for destroying data is not achieved in battery, silent rapid data coverage mode can be used and destroy
Data, technology realization are to repeat to carry out covering to data stored in memory writing with a brush dipped in Chinese ink by unordered coding, make original data time
Sequence is destroyed, and achievees the purpose that delete data.
To sum up, a kind of data destruction method provided in an embodiment of the present invention, comprising: the target obtained for mobile terminal is grasped
Make event;Determine whether object run event matches with predetermined registration operation event, if object run event and predetermined registration operation event
Match, it is determined that the data destroying mode of mobile terminal;According to data destroying mode, executes and the data destroying of mobile terminal is grasped
Make, the present invention is judged by the object run event received to mobile terminal, is determining object run event matches certainly
Under conditions of dynamic deletion private data, data delete operation is quickly triggered and carries out, it is that mobile terminal exists which, which deletes means,
Backstage judges automatically and automatic implementation, does not need user and carries out relevant operation, it is entire delete process crypticity and safety compared with
Height improves the safety guarantee to private data.
Fig. 2 is the step flow chart of another data destruction method provided in an embodiment of the present invention, as shown in Fig. 2, the party
Method may include:
Step 201 obtains the object run event for being directed to the mobile terminal.
The implementation of this step is similar with the realization process of above-mentioned steps 101, and this will not be detailed here for the embodiment of the present invention.
Step 202 determines whether the object run event matches with the predetermined registration operation event.
The implementation of this step is similar with the realization process of above-mentioned steps 102, and this will not be detailed here for the embodiment of the present invention.
If step 203, the object run event and predetermined registration operation event matches, it is determined that the data of the mobile terminal
Destruction mode.
The implementation of this step is similar with the realization process of above-mentioned steps 103, and this will not be detailed here for the embodiment of the present invention.
Optionally, in an implementation of the embodiment of the present invention, if the object run event includes by the shifting
The microphone of dynamic terminal receives voice messaging, and step 203 can also include:
Sub-step 2031 determines institute under the semantic content of the voice messaging and the matched situation of default semantic content
State the data destroying mode of mobile terminal.
In this step, the available voice messaging of the microphone of mobile terminal realizes man-machine friendship by the voice messaging
Mutually, and for the human-computer interaction of data destroying operation, since the consequence that data destroying generates is more important, and process can not
It is inverse, it is therefore desirable to the voice messaging really meaning expressed by the owner user is proved by multiple-authentication.
Firstly, mobile terminal can carry out whether verifying voice messaging is by the typing of owner user institute, therefore, in order to keep away
Other people the speak interference of generation can also carry out authentication after obtaining voice messaging around exempting from, to verify input
Whether voice is the voice for holding user, and specially preset this holds the target voiceprint of user in the terminal,
After receiving voice messaging, the target voiceprint in the voice messaging is extracted, and carry out with preset target voiceprint
Match, if unanimously, the matched operation of semantic content after can carrying out.
Further, the matching for realizing semantic content, specifically includes and segments voice messaging, and to it is each segment into
Semantics recognition obtains segmenting corresponding text information, and the text information of each participle is combined according to corresponding sequence
The semantic content of voice messaging is obtained, under the semantic content and the matched situation of default semantic content, can determine that voice is believed
Breath is the instruction for the data destroying operation that the user that owner user issues carries out mobile terminal.
For example, if definition is the action event of " turn-on data protection " by the voice content of microphone typing, and the language
The vocal print of sound is verified as the vocal print of owner, which destroys mode 2, then passes through shifting in owner
After moving the microphone typing of the terminal object run event of " turn-on data protection ", then it can be held according to data destroying mode 2
Row operates the data destroying of mobile terminal.
Optionally, sub-step 2031 can also include:
Sub-step A1, under the semantic content of the voice messaging and the matched situation of default semantic content, described in extraction
The target voiceprint of voice messaging.
In embodiments of the present invention, in order to further increase the safety of private data, so that the side for passing through interactive voice
The process that formula deletes private data is more rigorous perfect, can also the affective tag of voice messaging be analyzed and be determined, with
Just mood of the identification user in typing voice process, by the judgement to the mood, the corresponding deletion behaviour for making data automatically
Make.
Specifically, voice letter can be extracted under the semantic content of voice messaging and the matched situation of default semantic content
The target voiceprint of breath, so-called vocal print (Voiceprint) information are the carrying verbal informations that electricity consumption acoustic instrument is shown
Sound wave spectrum, modern scientific research shows that vocal print not only has specificity, but also has the characteristics of relative stability.Therefore vocal print
Information is the important parameter of the various features of determining voice.
The target voiceprint is matched with preset vocal print template, determines the target vocal print by sub-step A2
The corresponding target affective tag of information, the vocal print template include the corresponding relationship of vocal print and affective tag.
In this step, preset vocal print template may include the vocal print feature of the most of moods of the mankind, the vocal print feature
It is stored in a manner of sound wave spectrum in the terminal, target voiceprint is matched with preset vocal print template, determined
The corresponding target affective tag of the target voiceprint.As included " calmness ", " fear ", " anxiety ", " height in vocal print template
It is emerging " etc. moods vocal print, if user's mood when saying the voice of " turn-on data protection " is panic, by with vocal print template
Matching, that is, can determine that the user is in " fear " mood.
Sub-step A3 determines the mobile terminal when the target affective tag is in default affective tag classification
Data destroying mode.
In this step, being associated with based on user feeling and actual scene can preset affective tag classification, this is preset
Affective tag classification includes that some of user represent the urgent affective tag of situation.Such as default affective tag classification can wrap
Include: the negative mood of the representatives such as " fear ", " anxiety ", " indignation " can when the voice messaging of the typing of user belongs to the classification
It is urgent with the situation that determination is current, need to carry out the data destroying of mobile terminal.
Optionally, in an implementation of the embodiment of the present invention, if the object run event includes by the shifting
The screen or physical button of dynamic terminal receive touch control operation, and step 203 can also include:
Sub-step 2032, in the order of operation and position of touch and preset order of operation of the touch control operation and preset
In the matched situation of position of touch, the data destroying mode of the mobile terminal is determined.
In this step, the order for the operation that mobile terminal can also be implemented touch screen and physical button and position carry out
Monitoring, the case where the order of operation and position of touch of touch control operation are matched with preset order of operation and preset position of touch
Under, determine the data destroying mode of mobile terminal.
For example, if quickly pressing the operation thing of three lower volume down physical buttons while power supply physical button is pinned in definition
Part, corresponding data destroys mode 1, then while user pins power supply physical button to mobile terminal execution, quickly presses three
After the object run event of lower volume down physical button, then the number to mobile terminal can be executed according to data destroying mode 1
It is operated according to destroying
Step 204, when the charge value of the battery of the mobile terminal be greater than or equal to preset threshold when, control the battery
It is greater than mainboard from the voltage pulse of preset voltage value to the mobile terminal and memory output voltage values.
In this step, the default of release high voltage can be supported when the charge value of the battery of mobile terminal is greater than or equal to
When threshold value, the voltage pulse that battery is greater than mainboard from preset voltage value to mobile terminal and memory output voltage values can control.
Specifically, high voltage burns the mode of mainboard and memory, specifically it is arranged in the inside of mobile terminal master controller
Trigger switch applies high voltage pulse signal from battery to mainboard and memory by the unlatching of trigger switch, and then burns mainboard
And memory, realize the data destroying that memory in the motherboard is set, optionally, which may include being greater than 220 volts
Voltage value.
Step 205, when the charge value of the battery of the mobile terminal is less than the preset threshold, pass through what is generated at random
Non-ordered data covers the data in the memory.
When the charge value for destroying data is not achieved in battery, silent rapid data coverage mode can be used and destroy data, skill
It is to repeat to carry out covering to data stored in memory by the non-ordered data generated at random to write with a brush dipped in Chinese ink that art, which is realized, makes original data
Order destroys, and achievees the purpose that delete data.
In conclusion another kind data destruction method provided in an embodiment of the present invention, comprising: obtain for mobile terminal
Object run event;Determine whether object run event matches with predetermined registration operation event, if object run event and predetermined registration operation
Event matches, it is determined that the data destroying mode of mobile terminal;According to data destroying mode, the data pin to mobile terminal is executed
Operation is ruined, the present invention is judged by the object run event received to mobile terminal, is determining object run event symbol
Conjunction is automatically deleted under conditions of private data, quickly triggers and carry out data delete operation, it is mobile whole which, which deletes means,
It holds and is judging automatically from the background and automatic implementation, do not need user and carry out relevant operation, it is entire to delete process crypticity and safety
Property is higher, improves the safety guarantee to private data.
Fig. 3 is a kind of block diagram of mobile terminal provided in an embodiment of the present invention, as shown in figure 3, the mobile terminal 30 includes:
Module 301 is obtained, for obtaining the object run event for being directed to the mobile terminal;
Matching module 302, for determining whether the object run event matches with the predetermined registration operation event;
Determining module 303, it is described mobile whole for determining in the object run event and predetermined registration operation event matches
The data destroying mode at end;
Optionally, if the object run event includes receiving voice messaging, institute by the microphone of the mobile terminal
Stating determining module 303 includes:
Voice match submodule, the case where matching for the semantic content in the voice messaging with default semantic content
Under, determine the data destroying mode of the mobile terminal.
Optionally, the voice match submodule, comprising:
Extraction unit, for extracting under the semantic content and the matched situation of default semantic content in the voice messaging
The target voiceprint of the voice messaging;
Matching unit determines the target for matching the target voiceprint with preset vocal print template
The corresponding target affective tag of voiceprint, the vocal print template include the corresponding relationship of vocal print and affective tag;
Determination unit, for determining the movement eventually when the target affective tag is in default affective tag classification
The data destroying mode at end.
Optionally, if the object run event includes receiving touch-control behaviour by the screen or physical button of the mobile terminal
Make, then the determining module 303 includes:
Touch-control matched sub-block, for the order of operation and position of touch and preset order of operation in the touch control operation
In the matched situation of preset position of touch, the data destroying mode of the mobile terminal is determined.
Execution module 304, for executing and being grasped to the data destroying of the mobile terminal according to the data destroying mode
Make.
Optionally, the execution module 304, comprising:
First implementation sub-module, for when the charge value of the battery of the mobile terminal be greater than or equal to preset threshold when,
Control the voltage pulse that the battery is greater than mainboard from preset voltage value to the mobile terminal and memory output voltage values;
Second implementation sub-module, for leading to when the charge value of the battery of the mobile terminal is less than the preset threshold
It crosses the non-ordered data generated at random and covers data in the memory.
In conclusion a kind of mobile terminal provided in an embodiment of the present invention, including, the target obtained for mobile terminal is grasped
Make event;Determine whether object run event matches with predetermined registration operation event, if object run event and predetermined registration operation event
Match, it is determined that the data destroying mode of mobile terminal;According to data destroying mode, executes and the data destroying of mobile terminal is grasped
Make, the present invention is judged by the object run event received to mobile terminal, is determining object run event matches certainly
Under conditions of dynamic deletion private data, data delete operation is quickly triggered and carries out, it is that mobile terminal exists which, which deletes means,
Backstage judges automatically and automatic implementation, does not need user and carries out relevant operation, it is entire delete process crypticity and safety compared with
Height improves the safety guarantee to private data.
The embodiment of the present invention also provides a kind of mobile terminal, including processor, and memory is stored on the memory simultaneously
The computer program that can be run on the processor, the computer program realize above-mentioned data when being executed by the processor
Each process of destroying method embodiment, and identical technical effect can be reached, to avoid repeating, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program, the computer program realize each process of above-mentioned data destruction method embodiment when being executed by processor, and
Identical technical effect can be reached, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as
Read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation
RAM), magnetic or disk etc..
Fig. 4 is the structural schematic diagram of the mobile terminal of another embodiment of the present invention.
The mobile terminal includes: processor, memory and is stored on the memory and can be on the processor
The computer program of operation, the computer program realize the step of above-mentioned data destruction method when being executed by the processor
Suddenly.
The mobile terminal further include: computer program is stored on readable storage medium storing program for executing, the computer program is located
The step of reason device realizes above-mentioned data destruction method when executing.
Specifically, the mobile terminal 600 in Fig. 4 can be mobile phone, tablet computer, personal digital assistant
(PersonalDigital Assistant, PDA) or vehicle-mounted computer etc..
Mobile terminal 600 in Fig. 4 includes radio frequency (RadioFrequency, RF) circuit 610, memory 620, input list
Member 630, display unit 640, processor 660, voicefrequency circuit 670, WLAN (WirelessFidelity) module 680,
Power supply 690 and camera 6110.
Wherein, input unit 630 can be used for receiving the number or character information of user's input, and generation and mobile terminal
The related signal input of 600 user setting and function control.Specifically, in the embodiment of the present invention, which can
To include touch panel 631.Touch panel 631, collect user on it or nearby touch operation (such as user use hand
The operation of any suitable object or attachment such as finger, stylus on touch panel 631), and driven according to preset formula
Corresponding attachment device.Optionally, touch panel 631 may include both touch detecting apparatus and touch controller.Wherein,
Touch detecting apparatus detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch control
Device;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives the processor
660, and order that processor 660 is sent can be received and executed.Furthermore, it is possible to use resistance-type, condenser type, infrared ray with
And the multiple types such as surface acoustic wave realize touch panel 631.In addition to touch panel 631, input unit 630 can also include other
Input equipment 632, other input equipments 632 can include but is not limited to physical keyboard, function key (such as volume control button,
Switch key etc.), trace ball, mouse, one of operating stick etc. or a variety of.
Wherein, display unit 640 can be used for showing information input by user or be supplied to the information and movement of user
The various menu interfaces of terminal 600.Display unit 640 may include display panel 641, optionally, can use LCD or organic hair
The forms such as optical diode (OrganicLight-EmittingDiode, OLED) configure display panel 641.
It should be noted that touch panel 631 can cover display panel 641, touch display screen is formed, when the touch display screen is examined
After measuring touch operation on it or nearby, processor 660 is sent to determine the type of touch event, is followed by subsequent processing device
660 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area
And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious
Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with
The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area
Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example,
Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 660 is the control centre of mobile terminal 600, utilizes various interfaces and connection whole mobile phone
Various pieces, by running or executing the software program and/or module that are stored in first memory 621, and calling storage
Data in second memory 622 execute the various functions and processing data of mobile terminal 600, thus to mobile terminal 600
Carry out integral monitoring.Optionally, processor 660 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 621 in software program and/or module and/
Or the data in the second memory 622, processor 660 are used to obtain the object run event for mobile terminal;Determine mesh
Whether mark action event matches with predetermined registration operation event, if object run event and predetermined registration operation event matches, it is determined that mobile
The data destroying mode of terminal;According to data destroying mode, executes and the data destroying of mobile terminal is operated.
As it can be seen that mobile terminal may include: to obtain the object run event for being directed to mobile terminal in the embodiment of the present invention;
Determine whether object run event matches with predetermined registration operation event, if object run event and predetermined registration operation event matches, really
Determine the data destroying mode of mobile terminal;According to data destroying mode, executes and the data destroying of mobile terminal is operated, the present invention
Judged by the object run event received to mobile terminal, is determining that object run event matches are automatically deleted privacy
Under conditions of data, data delete operation is quickly triggered and carries out, it is that mobile terminal is being sentenced automatically from the background which, which deletes means,
It is disconnected and automatic implementation, it does not need user and carries out relevant operation, it is entire to delete process crypticity and safety is higher, it improves pair
The safety guarantee of private data.
For above-mentioned apparatus embodiment, since it is basically similar to the method embodiment, so be described relatively simple,
The relevent part can refer to the partial explaination of embodiments of method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It would have readily occurred to a person skilled in the art that: any combination application of above-mentioned each embodiment is all feasible, therefore
Any combination between above-mentioned each embodiment is all embodiment of the present invention, but this specification exists as space is limited,
This is not just detailed one by one.
Provided herein data destruction method not with any certain computer, virtual system or the intrinsic phase of other equipment
It closes.Various general-purpose systems can also be used together with teachings based herein.As described above, construction has present invention side
Structure required by the system of case is obvious.In addition, the present invention is also not directed to any particular programming language.It should be bright
It is white, it can use various programming languages and realize summary of the invention described herein, and retouched above to what language-specific was done
State is in order to disclose the best mode of carrying out the invention.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the present invention and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, such as right
As claim reflects, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows tool
Thus claims of body embodiment are expressly incorporated in the specific embodiment, wherein each claim conduct itself
Separate embodiments of the invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in detail in the claims, embodiment claimed it is one of any
Can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors
Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice
Microprocessor or digital signal processor (DSP) realize the identification side of background music in video according to an embodiment of the present invention
The some or all functions of some or all components in method.The present invention is also implemented as described here for executing
Method some or all device or device programs (for example, computer program and computer program product).This
The program that the realization of sample is of the invention can store on a computer-readable medium, or can have one or more signal
Form.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other
Form provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.
Claims (11)
1. a kind of data destruction method is applied to mobile terminal, which is characterized in that the described method includes:
Obtain the object run event for being directed to the mobile terminal;
Determine whether the object run event matches with the predetermined registration operation event;
If the object run event and predetermined registration operation event matches, it is determined that the data destroying mode of the mobile terminal;
According to the data destroying mode, executes and the data destroying of the mobile terminal is operated.
2. the method according to claim 1, wherein if the object run event includes by the mobile terminal
Microphone receive voice messaging, then it is described in the object run event and predetermined registration operation event matches, determine the shifting
The data destroying mode of dynamic terminal, comprising:
Under the semantic content of the voice messaging and the matched situation of default semantic content, the data of the mobile terminal are determined
Destruction mode.
3. according to the method described in claim 2, it is characterized in that, the semantic content in the voice messaging and default language
In the case where adopted content matching, the data destroying mode of the mobile terminal is determined, comprising:
Under the semantic content of the voice messaging and the matched situation of default semantic content, the target of the voice messaging is extracted
Voiceprint;
The target voiceprint is matched with preset vocal print template, determines the corresponding target of the target voiceprint
Affective tag, the vocal print template include the corresponding relationship of vocal print and affective tag;
When the target affective tag is in default affective tag classification, the data destroying mode of the mobile terminal is determined.
4. the method according to claim 1, wherein if the object run event includes by the mobile terminal
Screen or physical button receive touch control operation, then it is described in the object run event and predetermined registration operation event matches, really
The data destroying mode of the fixed mobile terminal, comprising:
It is matched in the order of operation and position of touch and preset order of operation and preset position of touch of the touch control operation
In the case of, determine the data destroying mode of the mobile terminal.
5. method according to any one of claims 1 to 4, which is characterized in that it is described according to the data destroying mode, it executes
Data destroying operation to the mobile terminal, comprising:
When the charge value of the battery of the mobile terminal is greater than or equal to preset threshold, it is whole to the movement to control the battery
The mainboard and memory output voltage values at end are greater than the voltage pulse of preset voltage value;
When the charge value of the battery of the mobile terminal is less than the preset threshold, covered by the non-ordered data generated at random
Data in the memory.
6. a kind of mobile terminal, which is characterized in that the mobile terminal includes:
Module is obtained, for obtaining the object run event for being directed to the mobile terminal;
Matching module, for determining whether the object run event matches with the predetermined registration operation event;
Determining module, if for the object run event and predetermined registration operation event matches, it is determined that the number of the mobile terminal
According to the mode of destruction;
Execution module, for executing and being operated to the data destroying of the mobile terminal according to the data destroying mode.
7. mobile terminal according to claim 6, which is characterized in that if the object run event includes by the movement
The microphone of terminal receives voice messaging, then the determining module includes:
Voice match submodule, in the voice messaging semantic content and the matched situation of default semantic content under, really
The data destroying mode of the fixed mobile terminal.
8. mobile terminal according to claim 7, which is characterized in that the voice match submodule, comprising:
Extraction unit, in the voice messaging semantic content and the matched situation of default semantic content under, described in extraction
The target voiceprint of voice messaging;
Matching unit determines the target vocal print for matching the target voiceprint with preset vocal print template
The corresponding target affective tag of information, the vocal print template include the corresponding relationship of vocal print and affective tag;
Determination unit, for determining the mobile terminal when the target affective tag is in default affective tag classification
Data destroying mode.
9. mobile terminal according to claim 6, which is characterized in that if the object run event includes by the movement
The screen or physical button of terminal receive touch control operation, then the determining module includes:
Touch-control matched sub-block, for the order of operation and position of touch and preset order of operation in the touch control operation and in advance
If the matched situation of position of touch under, determine the data destroying mode of the mobile terminal.
10. according to any mobile terminal of claim 6 to 9, which is characterized in that the execution module, comprising:
First implementation sub-module, for controlling when the charge value of the battery of the mobile terminal is greater than or equal to preset threshold
The battery is greater than mainboard from the voltage pulse of preset voltage value to the mobile terminal and memory output voltage values;
Second implementation sub-module, for when the charge value of the battery of the mobile terminal be less than the preset threshold when, by with
The non-ordered data that machine generates covers the data in the memory.
11. a kind of mobile terminal, which is characterized in that including processor, memory and be stored on the memory and can be in institute
The computer program run on processor is stated, such as claim 1 to 5 is realized when the computer program is executed by the processor
Any one of described in data destruction method the step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811419660.8A CN109697345B (en) | 2018-11-26 | 2018-11-26 | Data destruction method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811419660.8A CN109697345B (en) | 2018-11-26 | 2018-11-26 | Data destruction method and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109697345A true CN109697345A (en) | 2019-04-30 |
CN109697345B CN109697345B (en) | 2020-06-05 |
Family
ID=66230186
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811419660.8A Active CN109697345B (en) | 2018-11-26 | 2018-11-26 | Data destruction method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109697345B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110210260A (en) * | 2019-06-13 | 2019-09-06 | 深圳市风云实业有限公司 | Data destruct system and method |
CN111523096A (en) * | 2020-04-08 | 2020-08-11 | 深圳市筑泰防务智能科技有限公司 | Security management and control method, device, terminal, system and readable storage medium for terminal user |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1802705A (en) * | 2003-03-18 | 2006-07-12 | 数据隐藏技术公司 | Dead on demand disk technology |
WO2008004120A2 (en) * | 2006-01-24 | 2008-01-10 | Lai, Josephine Suk Ying | System and method for data destruction |
CN201237788Y (en) * | 2008-08-11 | 2009-05-13 | 湖南源科创新科技股份有限公司 | Solid state hard disk based on data destruction |
US7540016B2 (en) * | 2004-07-21 | 2009-05-26 | Beachhead Solutions, Inc. | System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall |
CN102324003A (en) * | 2011-05-20 | 2012-01-18 | 哈尔滨工业大学 | Multi-strategy self-destruction method for highly-credible embedded computer |
CN204178355U (en) * | 2014-10-28 | 2015-02-25 | 四川神琥科技有限公司 | A kind of multi-functional data destroyer |
CN105022702A (en) * | 2015-07-02 | 2015-11-04 | 山东超越数控电子有限公司 | Design method of HDD (Hard Disk Drive) capable of being quickly destroyed |
CN108710791A (en) * | 2018-05-22 | 2018-10-26 | 北京小米移动软件有限公司 | The method and device of voice control |
-
2018
- 2018-11-26 CN CN201811419660.8A patent/CN109697345B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1802705A (en) * | 2003-03-18 | 2006-07-12 | 数据隐藏技术公司 | Dead on demand disk technology |
US7540016B2 (en) * | 2004-07-21 | 2009-05-26 | Beachhead Solutions, Inc. | System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall |
WO2008004120A2 (en) * | 2006-01-24 | 2008-01-10 | Lai, Josephine Suk Ying | System and method for data destruction |
CN201237788Y (en) * | 2008-08-11 | 2009-05-13 | 湖南源科创新科技股份有限公司 | Solid state hard disk based on data destruction |
CN102324003A (en) * | 2011-05-20 | 2012-01-18 | 哈尔滨工业大学 | Multi-strategy self-destruction method for highly-credible embedded computer |
CN204178355U (en) * | 2014-10-28 | 2015-02-25 | 四川神琥科技有限公司 | A kind of multi-functional data destroyer |
CN105022702A (en) * | 2015-07-02 | 2015-11-04 | 山东超越数控电子有限公司 | Design method of HDD (Hard Disk Drive) capable of being quickly destroyed |
CN108710791A (en) * | 2018-05-22 | 2018-10-26 | 北京小米移动软件有限公司 | The method and device of voice control |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110210260A (en) * | 2019-06-13 | 2019-09-06 | 深圳市风云实业有限公司 | Data destruct system and method |
CN111523096A (en) * | 2020-04-08 | 2020-08-11 | 深圳市筑泰防务智能科技有限公司 | Security management and control method, device, terminal, system and readable storage medium for terminal user |
Also Published As
Publication number | Publication date |
---|---|
CN109697345B (en) | 2020-06-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103442141B (en) | One key enters the method for safe mode | |
CN106292857B (en) | Electronic device | |
US20110260829A1 (en) | Method of providing security on a portable electronic device having a touch-sensitive display | |
CN105765520A (en) | Device and method for providing lock screen | |
CN103064606A (en) | Screen unlocking method for mobile terminal | |
CN109583356A (en) | Fingerprint identification method and Related product | |
CN109085975A (en) | Screenshotss method, apparatus, storage medium and electronic device | |
CN106484236B (en) | A kind of method and device of physical button prompt operation | |
CN110140342A (en) | Locking screen interface processing method and terminal | |
CN111176543A (en) | Method, device, computer equipment and storage medium for realizing electronic signature | |
CN106203038A (en) | A kind of unlocking method and mobile terminal | |
CN107450839A (en) | Control method, device, storage medium and mobile terminal based on blank screen gesture | |
CN104035698A (en) | Terminal equipment and state switchover method for same | |
CN105094874A (en) | Application starting method and system | |
CN106484301A (en) | A kind of method of hiden application and terminal | |
CN107087075B (en) | Prompting method based on screen fingerprint identification and mobile terminal | |
CN106814909A (en) | Use the method for the human-computer interface device for aircraft including voice recognition unit | |
CN108551521A (en) | A kind of log-on message reminding method and mobile terminal | |
CN107422976A (en) | Control method, device, storage medium and mobile terminal based on blank screen gesture | |
CN108803988A (en) | Control method of electronic device, device, storage medium and electronic equipment | |
EP2731369B1 (en) | Mobile terminal and control method thereof | |
CN109697345A (en) | A kind of data destruction method and mobile terminal | |
CN104182161B (en) | A kind of method and apparatus for opening screen function region | |
CN106570373A (en) | Startup and shutdown method of terminal equipment and terminal equipment | |
CN108683809B (en) | Screen locking method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |