Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for destroying terminal information

A terminal information and terminal technology, applied in the field of communication, can solve problems such as the inability to guarantee that data information will be stolen, the owner's information will be used by others, and the information will not be used by others, so as to achieve the effects of flexible time, reducing losses and ensuring security

Inactive Publication Date: 2007-06-20
HUAWEI TECH CO LTD
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is owing to make the mobile phone after losing always be in safe mode, if can't contact mobile phone user, so the private information in the mobile phone is invisible, controls the mobile phone not to be used by others to a certain extent, and the information stored in the mobile phone cannot be used. being used by others
[0005] Although the solutions in the prior art can meet the requirements to a certain extent, there are still the following disadvantages: after adopting the security mode, locking the mobile phone will display the owner's contact information on the screen, which also causes the owner's information to be used by others possibility, and the use of security mode can only prevent the owner of the mobile phone from being unable to obtain the owner's private data stored on the mobile phone in a short period of time, but since the data always exists in the mobile phone memory, there is no guarantee that the security mode will not be cracked The data information stored in the mobile phone is stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for destroying terminal information
  • Method for destroying terminal information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention provides a method for destroying terminal information. By sending the information matching the activation code information to the first terminal to delete the information stored in the terminal, the purpose of protecting terminal user information from being used by others is achieved.

[0036] A method for destroying terminal information, as shown in Figure 1, the method includes the following steps:

[0037] the second terminal sends information to the first terminal;

[0038] comparing said information with activation code information;

[0039] When the matching is successful, the first terminal deletes the information stored therein.

[0040] The specific implementation of a method for destroying terminal information of the present invention will be described in detail below in conjunction with the accompanying drawings, as shown in FIG. 2 .

[0041] Step 1: the first terminal starts the terminal information destruction service;

[0042] The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method comprises: the second terminal sends information to first terminal; after comparing said information with the information of active code, if they are matched, the first terminal deletes its saved information. By invention, the deleted information saved in the terminal will not be easy to be restored.

Description

technical field [0001] The invention relates to an information security technology in the communication field, in particular to a method for destroying terminal information. Background technique [0002] With the development of communication technology, mobile phones, as one of the important tools for people's daily communication, have become more and more powerful. Mobile phones are small, portable and multi-purpose, making them popular among consumers. In daily life, due to the lightness and high price of mobile phones, mobile phones are lost and stolen from time to time. Once this happens, it is generally difficult for mobile phone users to find lost or stolen mobile phones. Users suffer significant losses. [0003] In addition to direct economic losses, the private information of mobile phone users stored in the mobile phone is also likely to be used by pickers or thieves, causing irreparable material and spiritual losses to the owner. Moreover, as the price of mobile...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/32H04M1/2745G06F12/14G06F12/16G11B5/024G06F17/24H04M1/72463
Inventor 丁送星
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products