Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information protection method, information protection device and mobile terminal

A mobile terminal and information protection technology, applied in secure communication devices, internal/peripheral computer component protection, telephone communication, etc., can solve problems such as personal information leakage, property loss, etc., to ensure security, achieve protection, and prevent arbitrary modification The effect of anti-theft data

Active Publication Date: 2019-12-20
OPPO CHONGQING INTELLIGENT TECH CO LTD
View PDF20 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the mobile terminal is lost or stolen, it will cause security issues such as leakage of personal information and property loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information protection method, information protection device and mobile terminal
  • Information protection method, information protection device and mobile terminal
  • Information protection method, information protection device and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.

[0026] It should be understood that when used in this specification and the appended claims, the term "comprising" indicates the presence of described features, integers, steps, operations, elements and / or components, but does not exclude one or more other features. , whole, step, operation, element, component and / or the presence or addition of a collection thereof.

[0027] It shou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is suitable for the technical field of mobile communication, and provides an information protection method, an information protection device and a mobile terminal, and the method comprises the steps: detecting whether there is antitheft data in a replay protected memory block RPMB partition or not in a start-up guide process of the mobile terminal; if the RPMB partition has the antitheft data, prompting a user to input a password corresponding to the antitheft data; obtaining the password input by the user, and sending the anti-theft data and the password to a server; and if theverification passing information is received, continuing to execute the startup guidance of the mobile terminal. According to the invention, the information in the mobile terminal can be protected under the condition that the mobile terminal is lost or stolen.

Description

technical field [0001] The present application belongs to the technical field of mobile communication, and in particular relates to an information protection method, an information protection device and a mobile terminal. Background technique [0002] With the development of mobile communication technology, mobile terminals (such as mobile phones) have more and more functions, and more and more personal information is stored in the mobile terminals. Once the mobile terminal is lost or stolen, it will cause security issues such as leakage of personal information and property loss. Therefore, how to protect personal information is an urgent problem to be solved when the mobile terminal is lost or stolen. Contents of the invention [0003] The present application provides an information protection method, an information protection device and a mobile terminal, so as to protect the information in the mobile terminal when the mobile terminal is lost or stolen. [0004] The fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/78H04L9/32H04M1/725H04M1/72454
CPCG06F21/31G06F21/78H04L9/3226H04M1/72463H04M1/72454
Inventor 林进全
Owner OPPO CHONGQING INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products