PROTECTION METHOD FOR USE IN PORTABLE COMMUNICATION DEVICE
First Claim
Patent Images
1. A protection method used in a portable communication device, comprising the following steps:
- generating a specific command to store into said portable communication device;
waiting for receiving a message;
determining whether said received message comprises said specific command; and
performing a protection mechanism for protecting the information stored in said portable communication device when said message comprises said specific command.
1 Assignment
0 Petitions
Accused Products
Abstract
A protection method is used in a portable communication device. The protection method comprises the steps of generating a specific command, and storing the specific command into the portable communication device; the portable communication device waiting and receiving a message; determining whether the message received by the portable communication device comprises the specific command; and performing a protection mechanism for protecting the important information contained in the portable communication device when the message comprises the specific command.
-
Citations
33 Claims
-
1. A protection method used in a portable communication device, comprising the following steps:
-
generating a specific command to store into said portable communication device; waiting for receiving a message; determining whether said received message comprises said specific command; and performing a protection mechanism for protecting the information stored in said portable communication device when said message comprises said specific command. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A portable communication device with data protection function comprising:
-
a storing device for storing a specific command; a transceiver unit for receiving a message; and a control unit for determining whether said message received by said portable communication device comprises said specific command, and performing a protection mechanism for protecting the information stored in said portable communication device when said message comprises said specific command. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification