TWI416931B - System and method for deleting data stored in the mobile phone automatically - Google Patents
System and method for deleting data stored in the mobile phone automatically Download PDFInfo
- Publication number
- TWI416931B TWI416931B TW97123100A TW97123100A TWI416931B TW I416931 B TWI416931 B TW I416931B TW 97123100 A TW97123100 A TW 97123100A TW 97123100 A TW97123100 A TW 97123100A TW I416931 B TWI416931 B TW I416931B
- Authority
- TW
- Taiwan
- Prior art keywords
- mobile phone
- password
- data
- short message
- security command
- Prior art date
Links
Landscapes
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
本發明涉及一種對手機內存儲的資料進行管理的系統及方法,尤其涉及一種自動銷毀手機內存儲資料的系統及方法。 The present invention relates to a system and method for managing data stored in a mobile phone, and more particularly to a system and method for automatically destroying stored data in a mobile phone.
隨著通訊技術的發展,各類用於通訊的電子產品成本越來越低,市場價格也隨之下降,從而得以更普遍地應用,例如,手機的普及率越來越高,成為廣大用戶日常生活中不可缺少的通訊工具。 此外,隨著手機的軟硬體配置的不斷提升,手機內存儲的資料量也越來越多。例如,手機攝像頭已具備一定的解析度,很多用戶喜歡用手機拍攝照片、視頻等,並將拍攝的照片與視頻存儲於手機記憶體中。 With the development of communication technology, the cost of various electronic products for communication is getting lower and lower, and the market price is also falling, so that it can be more widely used. For example, the popularity of mobile phones is getting higher and higher, and it becomes a daily life of users. An indispensable communication tool in life. In addition, as the software and hardware configuration of mobile phones continues to increase, the amount of data stored in mobile phones is also increasing. For example, mobile phone cameras have a certain degree of resolution, many users like to use mobile phones to take photos, videos, etc., and store the photos and videos in the phone memory.
由於手機記憶體資料量的增加,雖給用戶帶來了很大的便利,卻也不可避免的產生相應的風險。例如,當手機遺失或者被盜時,手機內的資料就有被外泄的風險,尤其當手機內存儲了涉及個人隱私方面的資料或者需要被保密的資料,例如銀行卡帳號、密碼等,手機的遺失將給用戶造成很大的損失。 Due to the increase in the amount of data in the mobile phone memory, although it brings great convenience to the user, it also inevitably generates corresponding risks. For example, when a mobile phone is lost or stolen, the data in the mobile phone is exposed to risk, especially when the mobile phone stores information related to personal privacy or information that needs to be kept confidential, such as a bank card account number, password, etc. The loss will cause great losses to the user.
鑒於以上內容,有必要提供一種手機存儲資料自動銷毀系統及方 法,可在手機發生異常時及時刪除手機內資料。 In view of the above, it is necessary to provide a mobile phone storage data automatic destruction system and party The law can delete the data in the mobile phone in time when the mobile phone is abnormal.
一種手機存儲資料自動銷毀系統,該系統安裝於手機中,該手機包括SIM卡,該系統包括:設置模組,用於設置用戶名、密碼以及系統識別碼,以及設置安全指令以銷毀所述手機內的所有資料;比對模組,用於將所述手機接收之短信的內容與所設置之安全指令進行比對,判斷兩者是否一致,並在短信內容與所設置之安全指令一致時確認該短信為安全指令;及執行模組,用於執行該安全指令,銷毀所述手機內的所有資料。 A mobile phone storage data automatic destruction system, the system is installed in a mobile phone, the mobile phone comprises a SIM card, the system comprises: a setting module, configured to set a user name, a password and a system identification code, and set a security instruction to destroy the mobile phone All the data; the comparison module is configured to compare the content of the short message received by the mobile phone with the set security command, determine whether the two are consistent, and confirm when the content of the short message is consistent with the set security command The short message is a security instruction; and an execution module is configured to execute the security instruction to destroy all data in the mobile phone.
一種手機存儲資料自動銷毀方法,該方法運用於手機中,該手機包括SIM卡,該方法包括如下步驟:設置用戶名、密碼以及系統識別碼;設置安全指令以銷毀所述手機內的所有資料;所述手機開機後,判斷該手機內的SIM卡是否被更換;若所述手機內的SIM卡沒有被更換,進入作業系統;所述手機接收短信,將該手機接收之短信的內容與所設置之安全指令進行比對,判斷兩者是否一致;若短信內容與所設置之安全指令一致,確認該短信為安全指令;及執行該安全指令,銷毀所述手機內的所有資料。 A mobile phone storage data automatic destruction method, the method is applied to a mobile phone, the mobile phone comprises a SIM card, and the method comprises the steps of: setting a user name, a password and a system identification code; and setting a security instruction to destroy all the data in the mobile phone; After the mobile phone is turned on, it is determined whether the SIM card in the mobile phone is replaced; if the SIM card in the mobile phone is not replaced, the operating system is entered; the mobile phone receives the short message, and the content of the short message received by the mobile phone is set The security instructions are compared to determine whether the two are consistent; if the content of the short message is consistent with the set security command, the short message is confirmed as a security command; and the security command is executed to destroy all the data in the mobile phone.
相較於習知技術,所述之手機存儲資料自動銷毀系統及方法,其可在手機發生異常時及時刪除手機內資料,從而避免手機內存儲的涉及個人隱私的資料外泄。 Compared with the prior art, the mobile phone storage data automatic destruction system and method can delete the data in the mobile phone in time when the mobile phone is abnormal, thereby avoiding leakage of data related to personal privacy stored in the mobile phone.
1‧‧‧手機 1‧‧‧Mobile phone
2‧‧‧資料銷毀系統 2‧‧‧Data destruction system
20‧‧‧設置模組 20‧‧‧Setup module
22‧‧‧比對模組 22‧‧‧ Alignment module
24‧‧‧執行模組 24‧‧‧Execution module
26‧‧‧驗證模組 26‧‧‧ verification module
3‧‧‧接收裝置 3‧‧‧ Receiving device
4‧‧‧發送裝置 4‧‧‧Send device
5‧‧‧記憶體 5‧‧‧ memory
圖1係本發明手機存儲資料自動銷毀系統之較佳實施例之功能模組圖。 1 is a functional block diagram of a preferred embodiment of the mobile phone storage data automatic destruction system of the present invention.
圖2係本發明手機存儲資料自動銷毀方法之較佳實施例之資料設置流程圖。 2 is a flow chart showing the setting of a preferred embodiment of the method for automatically destroying stored data of the mobile phone of the present invention.
圖3係本發明手機存儲資料自動銷毀方法之較佳實施例之流程圖。 3 is a flow chart of a preferred embodiment of the method for automatically destroying stored data of the mobile phone of the present invention.
如圖1所示,係本發明手機存儲資料自動銷毀系統之較佳實施例之功能模組圖。本發明手機存儲資料自動銷毀系統2(下文稱“資料銷毀系統2”)安裝在手機1中,用於在手機1發生異常時自動銷毀手機1內存儲的所有資料,例如:通訊錄、短信記錄、照片、影像檔(例如:視頻檔)等資料。手機1的異常情況可包括:手機1遺失、被盜、SIM(Subscriber Identity Model,客戶識別模組)卡被更換等。所述之資料銷毀系統2提供一個互動式人機操作介面用以執行相關操作,例如,在該手機1中啟動資料銷毀系統2、設置相關內容等。 FIG. 1 is a functional block diagram of a preferred embodiment of the mobile phone storage data automatic destruction system of the present invention. The mobile phone storage data automatic destruction system 2 (hereinafter referred to as "data destruction system 2") is installed in the mobile phone 1 for automatically destroying all data stored in the mobile phone 1 when an abnormality occurs in the mobile phone 1, for example, an address book and a short message record. , photos, image files (for example: video files) and other information. The abnormal situation of the mobile phone 1 may include: the mobile phone 1 is lost, stolen, and the SIM (Subscriber Identity Model) card is replaced. The data destruction system 2 provides an interactive human-machine interface for performing related operations, for example, starting the data destruction system 2, setting related content, and the like in the mobile phone 1.
所述之手機1包括接收裝置3以及發送裝置4用於藉由各種通訊網路或者連接傳送相關資料,例如:通電話、接發短信等。所述連接可以是藍牙連接,或者藉由USB(Universal Serial Bus,通用串列匯流排)介面與其他電子裝置之間的連接。 The mobile phone 1 includes a receiving device 3 and a transmitting device 4 for transmitting related materials by using various communication networks or connections, for example, calling, sending and receiving short messages, and the like. The connection may be a Bluetooth connection or a connection between the USB (Universal Serial Bus) interface and other electronic devices.
所述之手機1還包括記憶體5,用於存儲各類資料,包括通訊錄、短信記錄、照片、在所述資料銷毀系統2中所作的設置等資料。所述之記憶體5可以是該手機1本身的記憶體,還可以是外部存儲卡,如SM卡(Smart Media Card,智慧媒體卡)、SD卡(Secure Digital Card,安全數位卡)、CF卡(Compact Flash Card,標 準快閃記憶體卡)、MMC卡(Multi Media Card,多媒體卡)、MS卡(Memory Stick,記憶棒)、XD卡(Extreme Digital Card,極限數字卡)、TF卡(Trans Flash Card)等。 The mobile phone 1 further includes a memory 5 for storing various types of materials, including an address book, a short message record, a photo, and settings made in the data destruction system 2. The memory 5 may be the memory of the mobile phone 1 itself, or may be an external memory card, such as a SIM card (Smart Media Card), an SD card (Secure Digital Card), a CF card. (Compact Flash Card, standard Quasi-flash memory card), MMC card (Multi Media Card), MS card (Memory Stick), XD card (Extreme Digital Card), TF card (Trans Flash Card).
所述之資料銷毀系統2主要包括三個功能模組,分別是:設置模組20、比對模組22以及執行模組24。所述資料銷毀系統2在完成安裝後即行啟動並提示用戶設置相關內容,在其他實施例中,所述資料銷毀系統2也可嵌入至手機1的作業系統中。 The data destruction system 2 mainly includes three functional modules, namely: a setting module 20, a comparison module 22, and an execution module 24. The data destruction system 2 is activated upon completion of the installation and prompts the user to set related content. In other embodiments, the data destruction system 2 can also be embedded in the operating system of the mobile phone 1.
所述之設置模組20用於設置用戶名、密碼以及系統識別碼以便於所述資料銷毀系統2識別用戶身份,還用於設置啟動所述資料銷毀系統2的快捷鍵。在本較佳實施例中,所述資料銷毀系統2具有自動隱藏的功能,在完成安裝後並不顯示於手機1的各功能功能表中,藉由設置快捷鍵,可供手機1的用戶在需要時調用該資料銷毀系統2。例如,設置快捷鍵為“*@56@*”,當用戶需要更改用戶名、密碼或者系統識別碼等設置內容時,即可利用所設置之快捷鍵進入該資料銷毀系統2。 The setting module 20 is configured to set a user name, a password, and a system identification code to facilitate the data destruction system 2 to identify the user identity, and is also used to set a shortcut key for starting the data destruction system 2. In the preferred embodiment, the data destruction system 2 has an automatic hiding function, and is not displayed in each function menu of the mobile phone 1 after the installation is completed. By setting a shortcut key, the user of the mobile phone 1 can be used by This data destruction system 2 is called when needed. For example, if the shortcut key is set to "*@56@*", when the user needs to change the setting contents such as the user name, password or system identification code, the data shortcut system can be accessed by using the shortcut key set.
所述之設置模組20進一步用於設置安全指令,該安全指令用於銷毀手機1內的所有資料,對SIM卡以及記憶體5中的資料進行永久性刪除。在本較佳實施例中,該安全指令為用戶名、密碼以及系統識別碼的組合,例如,用戶名為xzp,密碼為10@#,系統識別碼為123*,則該安全指令可以是“xzp/10@#/123*”。所述安全指令可藉由短信的形式進行發送。 The setting module 20 is further configured to set a security command for destroying all the data in the mobile phone 1 and permanently deleting the data in the SIM card and the memory 5. In the preferred embodiment, the security command is a combination of a username, a password, and a system identifier. For example, if the username is xzp, the password is 10@#, and the system identifier is 123*, the security command may be “ Xzp/10@#/123*”. The security command can be sent by means of a short message.
完成上述設置後,所述資料銷毀系統2詢問是否啟動系統,若手 機1的用戶確認啟動所述資料銷毀系統2,則當手機1開機後該資料銷毀系統2即自行啟動。 After completing the above settings, the data destruction system 2 asks whether to start the system, if the hand The user of the machine 1 confirms that the data destruction system 2 is activated, and the data destruction system 2 starts up automatically when the mobile phone 1 is turned on.
所述之比對模組22用於當手機1的接收裝置3接收到短信後,將所接收之短信內容與所設置之安全指令進行比對,判斷兩者是否一致,若一致,則確認該短信為安全指令。 The comparison module 22 is configured to compare the received short message content with the set security command after receiving the short message of the mobile phone 1, and determine whether the two are consistent. If they are consistent, confirm the The text message is a security command.
所述之執行模組24用於執行所接收之安全指令,銷毀手機1內的所有資料。若所述之比對模組22判斷短信內容與所設置之安全指令不一致,則執行模組24提示用戶接收到一條新的短信。 The execution module 24 is configured to execute the received security command and destroy all data in the mobile phone 1. If the comparison module 22 determines that the short message content is inconsistent with the set security command, the execution module 24 prompts the user to receive a new short message.
當手機1發生異常時,例如遺失或被盜,用戶可發送內容為安全指令的短信至手機1,則手機1接收到該安全指令後,可將手機1內存儲的所有資料進行銷毀以防止手機1內存儲的私人資料外泄。 When the mobile phone 1 is abnormal, such as lost or stolen, the user can send a text message with the security command to the mobile phone 1. After receiving the security command, the mobile phone 1 can destroy all the data stored in the mobile phone 1 to prevent the mobile phone. The private data stored in 1 is leaked.
當手機1在發生異常後且手機1內的SIM卡被更換時,則手機1無法藉由接收安全指令對資料進行銷毀,因此,所述資料銷毀系統2進一步包括驗證模組26,用於在手機1開機時判斷手機1內的SIM卡是否被更換。每一個SIM卡都具備一個唯一的IMSI(International Mobile Subscriber Identify)代碼,手機1在開機過程中會讀取SIM卡中的IMSI代碼。所述之驗證模組26記錄手機1每次開機時所讀取的IMSI代碼,並藉由比對開機後讀取的IMSI代碼與前一次開機所記錄的IMSI代碼是否一致從而判斷手機1內的SIM卡是否被更換。 When the mobile phone 1 is abnormal and the SIM card in the mobile phone 1 is replaced, the mobile phone 1 cannot destroy the data by receiving the security command. Therefore, the data destruction system 2 further includes a verification module 26 for When the mobile phone 1 is turned on, it is determined whether the SIM card in the mobile phone 1 has been replaced. Each SIM card has a unique IMSI (International Mobile Subscriber Identify) code, and the mobile phone 1 reads the IMSI code in the SIM card during the boot process. The verification module 26 records the IMSI code read by the mobile phone 1 each time it is turned on, and determines the SIM in the mobile phone 1 by comparing whether the IMSI code read after the power-on is the same as the IMSI code recorded in the previous power-on. Whether the card has been replaced.
所述驗證模組26還用於確認手機1內的SIM卡被更換後,提示用戶 輸入用戶名以及密碼,並根據預先設置之用戶名與密碼判斷所輸入的用戶名與密碼是否正確。 The verification module 26 is further configured to: after confirming that the SIM card in the mobile phone 1 is replaced, prompting the user Enter the user name and password, and judge whether the entered user name and password are correct according to the preset user name and password.
所述設置模組20可預設次數供用戶多次輸入,當用戶輸入用戶名與密碼的次數達到該預設次數,且仍然輸入錯誤時,則執行模組24自動生成所述安全指令,並執行該安全指令對手機1內存儲的資料進行銷毀。 The setting module 20 can be preset for the user to input multiple times. When the number of times the user inputs the user name and the password reaches the preset number of times, and the input error is still entered, the execution module 24 automatically generates the safety instruction, and The security command is executed to destroy the data stored in the mobile phone 1.
若驗證模組26判斷用戶輸入正確的用戶名以及密碼,則正常進入手機1的作業系統。 If the verification module 26 determines that the user inputs the correct username and password, the authentication system 26 normally enters the operating system of the mobile phone 1.
在其他實施例中,所述之驗證模組26還可用於在手機1與其他電子裝置連接時提示輸入用戶名與密碼(例如,手機1藉由其USB介面與電腦相連接),並在驗證用戶名或密碼輸入錯誤時,藉由執行模組24生成並執行安全指令對手機1內的資料進行銷毀,從而防止手機1內的資料被竊取。 In other embodiments, the verification module 26 can also be used to prompt for a username and password when the mobile phone 1 is connected to other electronic devices (for example, the mobile phone 1 is connected to the computer through its USB interface) and is verified. When the user name or password is input incorrectly, the execution module 24 generates and executes a security command to destroy the data in the mobile phone 1, thereby preventing the data in the mobile phone 1 from being stolen.
如圖2所示,係本發明手機存儲資料自動銷毀方法之較佳實施例之資料設置流程圖。首先,步驟S2,將所述資料銷毀系統2安裝於手機1後,所述之設置模組20設置用戶名、密碼以及系統識別碼以便於所述資料銷毀系統2識別用戶身份。 As shown in FIG. 2, it is a data setting flowchart of a preferred embodiment of the method for automatically destroying stored data of the mobile phone of the present invention. First, in step S2, after the data destruction system 2 is installed in the mobile phone 1, the setting module 20 sets a user name, a password, and a system identification code to facilitate the data destruction system 2 to identify the user identity.
步驟S4,所述之設置模組20設置可供用戶多次輸入用戶名及密碼以進行驗證的次數(下文簡稱“預設次數”)。 In step S4, the setting module 20 sets a number of times (hereinafter referred to as "preset number of times") that the user can input the user name and password multiple times for verification.
步驟S6,所述之設置模組20設置啟動所述資料銷毀系統2的快捷鍵。藉由設置快捷鍵,可直接調用隱藏的資料銷毀系統2。 In step S6, the setting module 20 sets a shortcut key for starting the data destruction system 2. The hidden data destruction system 2 can be directly invoked by setting a shortcut key.
步驟S8,所述之設置模組20設置安全指令,該安全指令用於銷毀手機1內的所有資料,即對SIM卡以及記憶體5中的資料進行永久性刪除。在本較佳實施例中,該安全指令為用戶名、密碼以及系統識別碼的組合。所述安全指令可藉由短信的形式進行發送。 In step S8, the setting module 20 sets a security command for destroying all the data in the mobile phone 1, that is, permanently deleting the data in the SIM card and the memory 5. In the preferred embodiment, the security command is a combination of a username, a password, and a system identification code. The security command can be sent by means of a short message.
步驟S10,完成上述設置後,啟動所述資料銷毀系統2從而開始監控所述手機1是否接收到安全指令。 Step S10, after the above setting is completed, the data destruction system 2 is started to start monitoring whether the mobile phone 1 receives a security instruction.
如圖3所示,係本發明手機存儲資料自動銷毀方法之較佳實施例之流程圖。步驟S20,手機1開機,且所述資料銷毀系統2啟動。 As shown in FIG. 3, it is a flowchart of a preferred embodiment of the method for automatically destroying stored data of the mobile phone of the present invention. In step S20, the mobile phone 1 is powered on, and the data destruction system 2 is started.
步驟S22,所述之驗證模組26判斷手機1內的SIM卡是否被更換。每一個SIM卡都具備一個唯一的IMSI(International Mobile Subscriber Identify)代碼,手機1在開機過程中會讀取SIM卡中的IMSI代碼。所述之驗證模組26記錄手機1每次開機時所讀取的IMSI代碼,並藉由比對開機後讀取的IMSI代碼與前一次開機所記錄的IMSI代碼是否一致從而判斷手機1內的SIM卡是否被更換。 In step S22, the verification module 26 determines whether the SIM card in the mobile phone 1 is replaced. Each SIM card has a unique IMSI (International Mobile Subscriber Identify) code, and the mobile phone 1 reads the IMSI code in the SIM card during the boot process. The verification module 26 records the IMSI code read by the mobile phone 1 each time it is turned on, and determines the SIM in the mobile phone 1 by comparing whether the IMSI code read after the power-on is the same as the IMSI code recorded in the previous power-on. Whether the card has been replaced.
若手機1內的SIM卡沒有被更換,於步驟S24,手機1進入作業系統,所述接收裝置3接收一條短信。 If the SIM card in the mobile phone 1 has not been replaced, the mobile phone 1 enters the operating system in step S24, and the receiving device 3 receives a short message.
步驟S26,所述之比對模組22將所接收之短信內容與所設置之安全指令進行比對,判斷兩者是否一致。若所接收之短信內容與所設置之安全指令一致,於步驟S28,所述比對模組22確認該短信為安全指令。 In step S26, the comparison module 22 compares the received short message content with the set security command to determine whether the two are consistent. If the received short message content is consistent with the set security command, the comparison module 22 confirms that the short message is a security command in step S28.
步驟S30,所述之執行模組24執行該安全指令,銷毀手機1內的所有資料,並結束本流程。 In step S30, the execution module 24 executes the security instruction, destroys all the data in the mobile phone 1, and ends the process.
若在步驟S26中,所述之比對模組22判斷短信內容與所設置之安全指令不一致,於步驟S32,所述之執行模組24提示用戶接收到一條新的短信,並結束本流程。 If the comparison module 22 determines that the short message content is inconsistent with the set security command in step S26, the execution module 24 prompts the user to receive a new short message in step S32, and ends the process.
若在步驟S22中,所述之驗證模組26確認手機1內的SIM卡被更換,於步驟S34,提示用戶輸入用戶名以及密碼。 If the verification module 26 confirms that the SIM card in the mobile phone 1 is replaced in step S22, the user is prompted to input the user name and password in step S34.
步驟S36,所述之驗證模組26根據預先設置之用戶名與密碼判斷所輸入的用戶名與密碼是否正確。 In step S36, the verification module 26 determines whether the input user name and password are correct according to the preset user name and password.
若所輸入的用戶名或密碼不正確,於步驟S38,所述之驗證模組26記錄輸入次數。步驟S40,所述之驗證模組26判斷輸入次數是否等於預設次數。若輸入次數不等於預設次數,則返回步驟S34重新輸入用戶名與密碼。若輸入次數等於預設次數,則直接執行步驟S30以銷毀手機1內的所有資料。 If the entered username or password is incorrect, the verification module 26 records the number of inputs in step S38. In step S40, the verification module 26 determines whether the input number is equal to the preset number of times. If the number of inputs is not equal to the preset number of times, return to step S34 to re-enter the username and password. If the number of inputs is equal to the preset number of times, step S30 is directly executed to destroy all the data in the mobile phone 1.
若在步驟S36中,驗證模組26判斷用戶輸入正確的用戶名以及密碼,於步驟S42,進入手機1的作業系統,並結束本流程。 If the verification module 26 determines in step S36 that the user has entered the correct user name and password, the operation system of the mobile phone 1 is entered in step S42, and the flow is terminated.
綜上所述,本發明符合發明專利要件,爰依法提出專利申請。惟,以上所述者僅為本發明之較佳實施例,本發明之範圍並不以上述實施例為限,舉凡熟悉本案技藝之人士爰依本發明之精神所作之等效修飾或變化,皆應涵蓋於以下申請專利範圍內。 In summary, the present invention complies with the requirements of the invention patent and submits a patent application according to law. However, the above description is only the preferred embodiment of the present invention, and the scope of the present invention is not limited to the above embodiments, and equivalent modifications or variations made by those skilled in the art in accordance with the spirit of the present invention are It should be covered by the following patent application.
1‧‧‧手機 1‧‧‧Mobile phone
2‧‧‧資料銷毀系統 2‧‧‧Data destruction system
20‧‧‧設置模組 20‧‧‧Setup module
22‧‧‧比對模組 22‧‧‧ Alignment module
24‧‧‧執行模組 24‧‧‧Execution module
26‧‧‧驗證模組 26‧‧‧ verification module
3‧‧‧接收裝置 3‧‧‧ Receiving device
4‧‧‧發送裝置 4‧‧‧Send device
5‧‧‧記憶體 5‧‧‧ memory
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW97123100A TWI416931B (en) | 2008-06-20 | 2008-06-20 | System and method for deleting data stored in the mobile phone automatically |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW97123100A TWI416931B (en) | 2008-06-20 | 2008-06-20 | System and method for deleting data stored in the mobile phone automatically |
Publications (2)
Publication Number | Publication Date |
---|---|
TW201002037A TW201002037A (en) | 2010-01-01 |
TWI416931B true TWI416931B (en) | 2013-11-21 |
Family
ID=44825053
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW97123100A TWI416931B (en) | 2008-06-20 | 2008-06-20 | System and method for deleting data stored in the mobile phone automatically |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI416931B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI602058B (en) * | 2016-09-08 | 2017-10-11 | 宜鼎國際股份有限公司 | Flash memory device having physical destroy means |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005003932A1 (en) * | 2003-07-08 | 2005-01-13 | Guido Costa Souza De Araujo | External cipher and authentication device for use with keyboard units |
TW200522696A (en) * | 2003-12-30 | 2005-07-01 | Inventec Appliances Corp | Method of using short message service to transmit command to the mobile phone |
TW200640215A (en) * | 2005-05-12 | 2006-11-16 | Benq Corp | Method of assuring data security for data stored in mobile electronic device |
TW200705944A (en) * | 2005-07-20 | 2007-02-01 | Inventec Appliances Corp | Protect method thereof |
TW200823712A (en) * | 2006-11-30 | 2008-06-01 | Inventec Corp | Method of data protecting |
-
2008
- 2008-06-20 TW TW97123100A patent/TWI416931B/en not_active IP Right Cessation
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005003932A1 (en) * | 2003-07-08 | 2005-01-13 | Guido Costa Souza De Araujo | External cipher and authentication device for use with keyboard units |
TW200522696A (en) * | 2003-12-30 | 2005-07-01 | Inventec Appliances Corp | Method of using short message service to transmit command to the mobile phone |
TW200640215A (en) * | 2005-05-12 | 2006-11-16 | Benq Corp | Method of assuring data security for data stored in mobile electronic device |
TW200705944A (en) * | 2005-07-20 | 2007-02-01 | Inventec Appliances Corp | Protect method thereof |
TW200823712A (en) * | 2006-11-30 | 2008-06-01 | Inventec Corp | Method of data protecting |
Also Published As
Publication number | Publication date |
---|---|
TW201002037A (en) | 2010-01-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101435295B1 (en) | Method and system for performing multi-stage virtual sim provisioning and setup on mobile devices | |
US9292680B2 (en) | Mobile terminal detection method and mobile terminal | |
CN101600208A (en) | Mobile phone storage data auto-destruct system and method | |
WO2017032029A1 (en) | Method for encrypting application and user terminal | |
CN101106455A (en) | Identity authentication method and intelligent secret key device | |
EP2437198B1 (en) | Secure PIN reset process | |
CN104902028A (en) | Onekey registration authentication method, device and system | |
CN110598384B (en) | Information protection method, information protection device and mobile terminal | |
CN105072080A (en) | Information verification method, device and system | |
CN107273150B (en) | Preloading firmware downloading and writing method and device | |
CN111786995B (en) | Account password management method, management middleware, system, equipment and storage medium | |
TWI416931B (en) | System and method for deleting data stored in the mobile phone automatically | |
CN104796532A (en) | Method and device for destroying mobile terminal | |
CN112231649A (en) | Firmware encryption processing method, device, equipment and medium | |
EP3805969B1 (en) | Safe operation method and system for storage data | |
WO2016187966A1 (en) | Terminal and method for protecting data security of terminal | |
CN105488436A (en) | Mobile storage equipment access method and device | |
CN112367339B (en) | System security login management method and device | |
WO2017197689A1 (en) | Sim card processing method and apparatus, terminal, and esam chip | |
JP2008003962A (en) | Terminal device authentication system and authentication method and its program using portable telephone | |
CN110781527B (en) | Control register protection method and device | |
CN110366161B (en) | Card opening method and device, related equipment and storage medium | |
CN103020509A (en) | Terminal equipment encryption and decryption method, device and terminal equipment | |
KR20220093316A (en) | Systems and methods for cross-linking risk analysis and one-time encryption | |
TWI709044B (en) | Storage apparatus managing method and storage apparatus managing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |