CN100563391C - The method of mobile communications terminal data protection, system and equipment - Google Patents

The method of mobile communications terminal data protection, system and equipment Download PDF

Info

Publication number
CN100563391C
CN100563391C CNB2007101456153A CN200710145615A CN100563391C CN 100563391 C CN100563391 C CN 100563391C CN B2007101456153 A CNB2007101456153 A CN B2007101456153A CN 200710145615 A CN200710145615 A CN 200710145615A CN 100563391 C CN100563391 C CN 100563391C
Authority
CN
China
Prior art keywords
mobile communication
terminal device
communication terminal
server
client identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2007101456153A
Other languages
Chinese (zh)
Other versions
CN101119565A (en
Inventor
易永健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2007101456153A priority Critical patent/CN100563391C/en
Publication of CN101119565A publication Critical patent/CN101119565A/en
Application granted granted Critical
Publication of CN100563391C publication Critical patent/CN100563391C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of method of mobile communications terminal data protection, this method comprises: mobile communication terminal device judges whether to connect with server, if connect, and receive second locking request that server issues, the mobile terminal identification and/or the client identification module sign that comprise described mobile communication terminal device in this second locking request are then with the mobile terminal identification in described second locking request and/or client identification module sign corresponding mobile terminal and/or client identification module locking; If do not connect, then portable terminal and the client identification module with described mobile communication terminal device locks.Relatively poor or be in the lower problem of fail safe under the situation of no signal by the invention solves at capacity of mobile terminal.The invention also discloses a kind of system and a kind of mobile communication terminal device of mobile communications terminal data protection.

Description

The method of mobile communications terminal data protection, system and equipment
Technical field
The present invention relates to the data transmission technology of moving communicating field, relate in particular to a kind of method, system and a kind of mobile communication terminal device of mobile communications terminal data protection.
Background technology
Mobile communication terminal device comprises a portable terminal and a client identification module (SIM card or UIM card), this portable terminal and client identification module combine and possess the ability of mobile communication, and have presented the characteristics of " a people Duo Ka, people's multimachine, separation between machine and card, a tractor serves several purposes ".That is to say that a user may have a plurality of mobile phone cards (the corresponding phone number of mobile phone card) and many portable terminals (mobile phone), and the mobile phone card can be used in combination with any portable terminal arbitrarily.Multiple functions such as the function of every portable terminal and every mobile phone card has almost comprised note, multimedia message, address list, schedule, notepad, mail at present, takes pictures, records, records a video, surfs the Net, recreation, TV, newspaper, medical treatment, payment.
Owing to concentrated a large amount of critical asset of people on a portable terminal or a mobile phone card, in case lose or leave behind and to bring great loss.For example, the invalid user stealing mobile phone sticks into row communication or payment and the expense that produces, and reveal the various data (comprising note, multimedia message, address list, message registration, notepad, mail, photo, recording, video recording etc.) of storing on portable terminal and the mobile phone card and the influence that brings, if the further extremely important and not backup of the data of Yi Shiing, the user will bring bigger loss because giving these data for change so.
So the urgent hope of user can provide a kind of mode, when losing or leave behind, portable terminal or mobile phone card can protect the assets of oneself to greatest extent.
In order to address the above problem, a kind of device management protocol (OMA DM) software upgrading mode with the exploitation mobile alliance has been proposed in the prior art, protect the scheme of mobile communication terminal device data, promptly utilize mobile communication network technology, search the information of mobile terminal (as International Mobile Station Equipment Identification sign indicating number (IMEI) information) of current use by the mobile phone card information (as international mobile subscriber identification code (IMSI) information) that the user reports lost property to the authorities, otherwise the information of mobile terminal of perhaps reporting lost property to the authorities by the user (as IMEI information) is searched the mobile phone card information (as IMSI information) of current use; The mobile communication terminal device of being made up of to the current phone card that finds and portable terminal the webserver by OMA DM agreement issues locked software then, automatically operation and locking current mobile terminal of this locked software after download is finished, thus avoid this portable terminal and mobile phone card stolen.
The inventor finds in the process of invention, for above-mentioned OMA DM software upgrading mode, has following shortcoming:
If 1 portable terminal is not supported OMA DM software upgrading mode, such scheme can not be realized so;
If 2 portable terminals were shut down before the locked software download and upgrade is finished and start again in the environment of no signal, still can to download and install operation in locked software stolen before finishing for the data on the portable terminal so.
Therefore, if terminal capability is relatively poor or terminal is under the environment of no signal, portable terminal and mobile phone card still can be stolen, and security performance is still relatively poor.
Summary of the invention
The embodiment of the invention provides a kind of method, system and a kind of mobile communication terminal device of mobile communications terminal data protection, and is relatively poor or be in the lower problem of fail safe under the situation of no signal at capacity of mobile terminal to solve.
A kind of method of mobile communications terminal data protection, this method comprises:
Second mobile communication terminal device sends first locking request to server, and this first locking request comprises the mobile terminal identification and/or the client identification module sign of random cipher, user name and mobile communication terminal device;
After described server passes through described random cipher and described user name authentication, issue second locking request according to mobile terminal identification in described first locking request and/or client identification module sign to mobile communication terminal device, comprise the mobile terminal identification and/or the client identification module sign of described mobile communication terminal device in this second locking request;
Mobile communication terminal device judges whether to connect with server, if connect, and receive second locking request that server issues, then with the mobile terminal identification in described second locking request and/or client identification module sign corresponding mobile terminal and/or client identification module locking;
If do not connect, then portable terminal and the client identification module with described mobile communication terminal device locks.
A kind of system of mobile communications terminal data protection, this system comprises mobile communication terminal device and server, wherein, described mobile communication terminal device comprises:
The protection monitoring module is used to judge whether connect with server;
The protection locking module is used for if described judged result for not connecting, then locks mobile communication terminal device; If described judged result is for connecting, and receive second locking request that server issues, the mobile terminal identification and/or the client identification module sign that comprise described mobile communication terminal device in this second locking request are then with mobile terminal identification and/or client identification module sign corresponding mobile terminal in described second locking request and/or client identification module locking;
Described server comprises:
Sending module is used to send described second locking request;
Backup module is used for backing up the information of described portable terminal and/or client identification module.
A kind of mobile communication terminal device, this mobile communication terminal device comprises:
The protection monitoring module is used to judge whether connect with server;
The protection locking module is used for if described judged result for not connecting, then locks mobile communication terminal device; If described judged result is for connecting, and receive second locking request that server issues, the mobile terminal identification and/or the client identification module sign that comprise described mobile communication terminal device in this second locking request are then with mobile terminal identification and/or client identification module sign corresponding mobile terminal in described second locking request and/or client identification module locking.
In embodiments of the present invention, by judging whether mobile communication terminal device connects with server, if connect, and receive second locking request that server issues, then with mobile terminal identification and/or client identification module sign corresponding mobile terminal in described second locking request and/or client identification module locking; If do not connect, then with the portable terminal of described mobile communication terminal device and the method for client identification module locking, the fail safe that has improved system.
Description of drawings
Fig. 1 is to the system configuration schematic diagram of mobile communications terminal data protection in the embodiment of the invention one;
Fig. 2 is to the method step schematic flow sheet of mobile communications terminal data protection in the embodiment of the invention two;
Fig. 3 realizes the schematic flow sheet that registration is professional in the embodiment of the invention;
Fig. 4 is a schematic flow sheet of revising log-on message in the embodiment of the invention;
Fig. 5 is a schematic flow sheet of creating the protection seed in the embodiment of the invention;
Fig. 6 is the schematic flow sheet of deletion protection seed in the embodiment of the invention;
Fig. 7 is the schematic flow sheet that activates the protection seed in the embodiment of the invention;
Fig. 8 is the schematic flow sheet of Sleep protection seed in the embodiment of the invention;
The schematic flow sheet of Fig. 9 in the embodiment of the invention data in the mobile communication terminal device being backed up and delete;
Figure 10 is the schematic flow sheet that data are recovered in the embodiment of the invention;
The schematic flow sheet whether Figure 11 connects with server for monitoring mobile communication terminal device in the embodiment of the invention;
Figure 12 is a schematic flow sheet of realizing logout service in the embodiment of the invention.
Embodiment
Describe the present invention below in conjunction with Figure of description.
As shown in Figure 1, in the embodiment of the invention one to the system configuration schematic diagram of mobile communications terminal data protection, as can be seen from the figure, this system comprises mobile communication terminal device 11 and server 12.
Mobile communication terminal device 11 comprises protection monitoring module 21 and protection locking module 22, and wherein, protection monitoring module 21 is used to judge whether connect with server 12; Protection locking module 22 is used for if the judged result that protection monitoring module 21 obtains is not for connecting, then with mobile communication terminal device 11 lockings; Or if described judged result is for connecting, and receive second locking request that server 12 issues, the mobile terminal identification and/or the client identification module sign that comprise described mobile communication terminal device in this second locking request are then with described mobile terminal identification and/or client identification module sign corresponding mobile terminal and/or client identification module locking.
Server 12 comprises sending module 31 and backup module 32, and wherein, sending module 31 is used to send described second locking request; Backup module 32 is used for backing up the information of described portable terminal and/or client identification module.
Mobile communication terminal device 11 also comprises data simultaneous module 23; be used for when described protection locking module 22 receives described second locking request, with the information back-up in the mobile terminal identification in described second locking request and/or client identification module sign corresponding mobile terminal and/or the client identification module to server 12.
Described mobile communication terminal device 11 also comprises Registering modules 24, is used for sending register requirement to described server 12, comprises user name in this register requirement; Described server 12 also comprises: distribution module 33 and preservation module 34, and wherein, distribution module 33 is used for and will sends to described mobile communication terminal device 11 for the random cipher that described mobile communication terminal device distributes; Preserve module 34 and be used to preserve the random cipher of described user name and distribution.
Distribution module 33 has also been distributed user ID, and this user ID is to log-on message that should mobile communication terminal device 11.
In the present embodiment, log-on message can comprise: user ID, user name, random cipher and hour of log-on etc.
Described system also comprises second mobile communication terminal device 13, be used for when described mobile communication terminal device 11 needs lock, send first locking request to described server 12, this first locking request comprises the mobile terminal identification and/or the client identification module sign of described random cipher, user name and described mobile communication terminal device; Then sending module 31 comprises: first receiving element 41, first authenticating unit 42 and performance element 43, and wherein, first receiving element 41 is used to receive described first locking request; First authenticating unit 42 is used for described random cipher and described user name are carried out authentication; Performance element 43 is used for after authentication is passed through, and issues described second locking request according to mobile terminal identification in described first locking request and/or client identification module sign to mobile communication terminal device.
Described mobile communication terminal device 11 also comprises removing module 25, be used for if described second locking request also comprises data deletion sign, then delete mobile terminal identification in described second locking request and/or the information in client identification module sign corresponding mobile terminal and/or the client identification module.
Described mobile communication terminal device 11 also comprises the recovery module 26 and second receiver module 27, wherein, recovers module 26 and is used for sending the data recovery request to described server 12, comprises the described random cipher and the user name of distribution in this request; Second receiver module 27 is used to receive the information of described portable terminal and/or client identification module; Described server 12 also comprises second authentication module 35, is used for to after described random cipher and the success of user name authentication the information in described portable terminal and/or the client identification module being sent to described mobile communication terminal device.
The workflow of system mainly comprises in the embodiment of the invention:
Whether protection monitoring module 21 will be monitored in when start with after starting shooting to have set up with server 12 and be connected:
When protection monitoring module 21 is determined the current connections of having set up, and protection locking module 22 shows that current mobile communication terminal device 11 is in normal condition, can normally use when not receiving second locking request that server sends.
When protection monitoring module 21 is determined the current connection of having set up; and when protection locking module 22 receives second locking request of server transmission; show that current mobile communication terminal device 11 is in unsafe condition; then protect locking module 22 with mobile terminal identification and/or client identification module sign corresponding mobile terminal and/or client identification module locking in second locking request, and data simultaneous module 23 will be in described second locking request mobile terminal identification and/or client identification module identify information back-up in corresponding mobile terminal and/or the client identification module in server 12.
When protection monitoring module 21 is determined current not connecting, then with portable terminal in the described mobile communication terminal device 11 and client identification module locking.
Describe the inventive method in detail below in conjunction with specific embodiment.
As shown in Figure 2, be the method step schematic flow sheet of the embodiment of the invention two, as can be seen from the figure this method may further comprise the steps:
Step 201: mobile communication terminal device judges whether to connect with server, if connect, then execution in step 202; Otherwise, execution in step 205.
Whether the portable terminal in the mobile communication terminal device will judge whether and can connect with network promptly can connect with server when start; If can connect when start, then in follow-up lasting start process, portable terminal can periodically judge whether and can connect with server.
In order to ensure the legitimacy of communicating by letter between mobile communication terminal device and the server, the registration that described mobile communication terminal device will be in server, this registration process comprises: send register requirement to described server, comprise user name in this register requirement; If described server determines not preserve described user name, then will send to described mobile communication terminal device, and preserve the random cipher of described user name and distribution for the random cipher that described mobile communication terminal device distributes.Mobile communication terminal device can be initiated register requirement to server any time before step 202.
Step 202: judge whether to receive second locking request that server issues, the mobile terminal identification and/or the client identification module sign that comprise described mobile communication terminal device in this second locking request, if receive described second locking request, then execution in step 203, otherwise, execution in step 204.
When described mobile communication terminal device is lost or under other situations, in the time of need locking described mobile communication terminal device, by other mobile communication terminal device (as second mobile communication terminal device) to as described in server send first locking request, this first locking request comprises the mobile terminal identification of described random cipher, user name and described mobile communication terminal device and/or the client identification module sign of distribution.
Server receives after first locking request of second mobile communication terminal device transmission, described random cipher and described user name authentication are passed through, when authentication is passed through, issue described second locking request according to mobile terminal identification in described first locking request and/or client identification module sign to mobile communication terminal device again.
Step 203: with the described mobile terminal identification in described second locking request and/or client identification module sign corresponding mobile terminal and/or client identification module locking.
The locking of mobile communication terminal device comprises the locking of portable terminal and freezing of client identification module, and the locking of portable terminal comprises: portable terminal shuts down automatically, the locking of operation interface, show the locking comment or play alarm specific the tinkle of bells etc.The freezing of client identification module comprises: finished by communication number of the account management server and freeze operation, make the client identification module after freezing can not realize normal communication function, but communicating by letter between reservation server and the client identification module as required.
During to portable terminal and/or client identification module locking, can also be with the information back-up in described portable terminal and/or the client identification module to server, the sequencing of this locking and backup is unfixing.
If mobile communication terminal device lost, with information back-up after server, in order to ensure safety of data, with the information deletion after the backup in the mobile communication terminal device.When the mobile communication terminal device of losing is given for change, can send the data recovery request to server, the described random cipher and the user ID that comprise distribution in this request, after server is to described random cipher and the success of user ID authentication, the information in described portable terminal and/or the client identification module is sent to described mobile communication terminal device.
Step 204: mobile communication terminal device is carried out normal communication service.
Step 205: with the portable terminal and the client identification module locking of described mobile communication terminal device.
When mobile communication terminal device can't be connected with server, then be defaulted as and be in unsafe condition, directly locking.
Below embodiment two is described in detail.
Mobile communication terminal device can pass through SMS (Short Message Service) (Short Message Service, SMS), WAP (wireless application protocol) (Wireless Application Protocol, WAP), World Wide Web (WWW) (World Wide Web, WWW), (Interactive Voice Response, IVR) etc. multiple mode is registered in interactive voice response.As shown in Figure 3, for realizing the schematic flow sheet that registration is professional in the embodiment of the invention, this registration process mainly may further comprise the steps:
Step 301: mobile communication terminal device sends login request message to server, comprises user name in this login request message.
Described user name can be that the user imports to mobile communication terminal device.
Step 302: server judges whether the information in the login request message that receives passes through format check, if pass through, then execution in step 303, otherwise, execution in step 307.
Information in the login request message is constructed according to the form of arranging between server and the mobile communication terminal device.
Step 303: server is judged the user name that whether comprises in the log-on message of having preserved in the login request message, if do not preserve, then execution in step 304, otherwise, execution in step 307.
Judging whether to preserve described user name and promptly judge whether to have had log-on message, is for fear of repeated registration.
Step 304: server distributes random cipher for this mobile communication terminal device.
The user ID that server also distributes, this user ID is a unique identification, server can identify log-on message according to this user ID in follow-up operation.
Mobile communication terminal device has corresponding relation to the user name of server transmission and the user ID of server-assignment.For mobile communication terminal device, in follow-up operation, can determine log-on message with user name; For server, find out the user ID of the user name correspondence that receives, utilize user ID to determine log-on message.
Step 305: server is preserved the random cipher and the user name of distributing.
A database can be arranged in the server, in order to store the log-on message of each mobile communication terminal device of successfully registering, wherein, random cipher can be preserved with the form after encrypting, and the encryption method described in present embodiment and the subsequent embodiment includes but not limited to: the 3DES cryptographic algorithm.As shown in table 1, be log-on message tabulation in the present embodiment.This database also can be in server, but can with server between realize the storage entity that communicate by letter.
User ID User name Random cipher Mobile phone Landline telephone Fax Mailing address Email MSN QQ Hour of log-on
1 Zhang San *** mmm xxx yyy zzz vvv uuu www 2005-1-1 08:09:10
2 Li Si *** nnn eee rrr ttt qqq hhh fff 2005-6-1 09:22:28
Table 1
Step 306: the response message that succeeds in registration that server will comprise random cipher returns to mobile communication terminal device.
In order to ensure the fail safe in the transmission course, the random cipher in the response message that succeeds in registration to be encrypted, mobile communication terminal device decrypts random cipher, and this random cipher is exported to the user.
Step 307: server returns the registration failure response message to mobile communication terminal device.
By step 301 to step 307, mobile communication terminal device is registered in server, then, mobile communication terminal device can send the registration request to server, comprises the information (as the sequence number or the sign that networks) of user name, the random cipher that receives, portable terminal and the information (as the SIM card card number) of client identification module in this registration request.For example, if mobile communication terminal device is successfully registration in server, the user of registration ABC by name, then can in the log-on message of ABC correspondence, register sequence number and be 123456 and 654321 portable terminal, card number is the client identification module of 138XXXX1234 and 138XXXX4321, in the case, though will register with enrollment process described separately, but still registration can be regarded as the part of registration, think just that after registering successfully registration finishes.In addition, also the information of portable terminal and the information of client identification module be can in step 301, in login request message, comprise simultaneously, the information of the portable terminal in this login request message and the information of client identification module before returning the response message that succeeds in registration, registered in the log-on message.
This process is not only the portable terminal in the mobile communication terminal device is registered, but also the client identification module of current application in this portable terminal registered, when arbitrary the changing in portable terminal in the mobile communication terminal device or the client identification module, need re-register.
In embodiments of the present invention, the user inputs user name to mobile communication terminal device, and issues random cipher by server; Equally also can import username and password to mobile communication terminal device by the user, and described username and password sent to server by login request message, when server determines not preserve this user name, and format check passes through, then preserve described username and password, and distributing user identifies for it, and the log-on message of name in an account book correspondence etc. is used in execution instead.
As shown in Figure 4, be to revise in the embodiment of the invention process of log-on message, in the present embodiment, setting and modifying be random cipher, this process comprises:
Step 401: mobile communication terminal device will be revised the log-on message request message and send to server, comprise user name in this message, random cipher and amended random cipher before revising.
If also need to revise out of Memory, then revise in the log-on message request message and can also comprise other information.
Equally, in order to guarantee fail safe, will send after the information encryption of revising in the log-on message request message.
Step 402: server judges whether comprise the user name of revising in the log-on message request message in the log-on message of having preserved, if preserve, then execution in step 403, otherwise, execution in step 407.
Step 403: whether server judges the information of revising in the log-on message request message by format check, if pass through, then execution in step 404, otherwise, execution in step 407.
Step 404: server carries out authentication to user name and the preceding random cipher of modification, if authentication is passed through, then execution in step 405, otherwise, execution in step 407.
Authentication process is whether the random cipher before random cipher and the modification that receives of the described user name correspondence of judging that server is preserved is identical, and as if identical, then authentication is passed through; Otherwise, for authentication is not passed through.
Step 405: the amended random cipher that server will be revised in the log-on message request message is preserved the registration updating information list.
With preserving again after the amended random cipher encryption, also comprise other amended information if revise in the log-on message request message, then amended information is preserved.
Step 406: server will be revised log-on message success response message and return to mobile communication terminal device.
Step 407: server will be revised log-on message failure response message and return to mobile communication terminal device.
After mobile communication terminal device is successfully registered; if necessary; server can issue second locking request to mobile communication terminal device; or unlocking request; therefore; in server, need to create the management information of mobile communication terminal device, be referred to as to protect seed in embodiments of the present invention, be described in detail creating the protection seed below.
As shown in Figure 5, for creating the process of protection seed in the embodiment of the invention, this process mainly comprises:
Step 501: mobile communication terminal device sends to server and creates protection seed request message, comprises user name, random cipher, protection seed category, protection seed title, mobile terminal identification and client identification module sign in this message.
The protection seed category comprises: create the protection seed and/or create the protection seed at client identification module at portable terminal.
Step 502: server judges whether comprise the user name of creating in the protection seed request message in the log-on message of having preserved, if preserve, then execution in step 503, otherwise, execution in step 507.
Step 503: server carries out authentication to user name and random cipher, if authentication is passed through, then execution in step 504, otherwise, execution in step 507.
Step 504: server judges whether the protection seed of preserving comprises protection seed category, mobile terminal identification and/or client identification module sign, if do not comprise, and execution in step 507, otherwise, execution in step 505.
This process is for fear of repeating to create the protection seed.
Step 505: server distributes protection seed sign for this mobile communication terminal device, will protect preservations such as seed sign, protection seed title, mobile terminal identification and client identification module sign.
As shown in table 2, for protection seed information table in the present embodiment, wherein, set the client and be identified as the mobile phone card.
Protection seed sign User ID Portable terminal unique identification (IMEI) Mobile phone card unique identification (IMSI) Protection seed title Creation-time Current state update time Current shape The Backup Data type The terminal data deleted marker The data backup key
1001 1 1222222 HW1 2005-1-1 09:03:20 2007-6-10 08:30:00 Activate Contact person, note Need deletion Xxx
1002 1 aaaa HW1 2005-1-1 09:03:20 2007-6-10 08:30:00 Activate All types Do not need deletion Xxx
1003 1 1233333 HW2 2006-8-1 16:03:20 2006-8-1 16:03:20 Dormancy
1004 2 dddd M1 2005-6-5 18:03:20 2005-6-5 18:03:20 Dormancy
1005 2 1233444 M1 2005-6-5 18:03:20 2005-6-5 18:03:20 Dormancy
Table 2
Step 506: server returns to mobile communication terminal device and creates the success response of protection seed.
Step 507: server returns to mobile communication terminal device and creates protection seed failure response.
If the protection seed category of creating in the protection seed request message is the protection seed of portable terminal; then receive when also having comprised mobile terminal identification in first locking request that second mobile communication terminal device sends when server; be the protection seed of indication server activation portable terminal, promptly lock described portable terminal.
The protection seed is corresponding with creating, and can also delete the protection seed, as shown in Figure 6, is the process of deletion protection seed in the embodiment of the invention, and this process comprises:
Step 601: mobile communication terminal device sends deletion protection seed request message to server, comprises user name, random cipher and protection seed title in this message.
Information in the deletion protection seed request message sends through encrypting the back.
Step 602: server is judged the user name that whether comprises in the log-on message of having preserved in the deletion protection seed request message, if preserve, then execution in step 603, otherwise, execution in step 609.
Step 603: server carries out authentication to user name and random cipher, if authentication is passed through, then execution in step 604, otherwise, execution in step 609.
Step 604: server is judged the protection seed title that whether comprises in the protection seed of having preserved in the deletion protection seed request message, if preserve, then execution in step 605, otherwise, execution in step 609.
Step 605: server judges whether the protection seed of described protection seed title correspondence is activated, if then execution in step 606, otherwise, execution in step 607.
If the protection seed is in state of activation, represent that then this activation seed corresponding mobile terminal or client identification module are locked, can't delete at this moment.
Step 606: the protection seed dormancy that server will activate.
If the protection seed is in resting state, then can delete execution in step 607.
Step 607: the corresponding protection seed of server deletion protection seed sign.
After protection seed title and protection seed sign exist corresponding relation, server to receive protection seed title in the deletion protection seed request message, according to the protection seed sign deletion of the information in the table 2 with correspondence.As: if protection seed name is called HW1, protection seed corresponding in the table 2 is designated 1001 and 1002, then the protection seed of 1001 and 1002 correspondences is deleted.
Step 608: server will be deleted protection seed success response message and return to mobile communication terminal device.
Step 609: server will be deleted protection seed failure response message and return to mobile communication terminal device.
When emergency case occurring, mobile communication terminal device is lost or is forgotten in unsafe place, portable terminal and/or the client identification module of user in can locking mobile communication terminal equipment, and shift portable terminal in the mobile communication terminal device and/or the information in the client identification module.
As shown in Figure 7, be to activate in the embodiment of the invention process of protection seed, i.e. the process of portable terminal in the locking mobile communication terminal equipment and/or client identification module comprises:
Step 701: second mobile communication terminal device sends to server and activates protection seed request message, and promptly first lock-request message comprises user name, random cipher, protection seed title in this message.
User name, random cipher, protection seed title be not second mobile communication terminal device, but realized registration, create the mobile communication terminal device of protection seed.
Information in this activation protection seed request message is to encrypt the back to send.
If after activating the success of seed and Backup Data, the deletion of the data in the mobile communication terminal device then need be activated protection seed request message and also comprises data deletion sign; If wish to inform the contact person who preserves in this mobile communication terminal device, this mobile communication terminal device is lost, then activates protection seed request message and also comprises loss statement sign, wherein can comprise new contact method.
Step 702: server judges whether comprise the user name that activates in the protection seed request message in the log-on message of having preserved, if preserve, then execution in step 703, otherwise, execution in step 711.
Step 703: server carries out authentication to user name and random cipher, if authentication is passed through, then execution in step 704, otherwise, execution in step 711.
Step 704: server judges whether comprise the protection seed title that activates in the protection seed request message in the protection seed of having preserved, if preserve, then execution in step 705, otherwise, execution in step 711.
Step 705: server judges whether the protection seed of described protection seed title correspondence is activated, if then execution in step 710, otherwise, execution in step 706.
Step 706: server protects the state of seed to be set to activate.
In the present embodiment; comprised the protection seed in first lock-request message; can determine corresponding protection seed sign according to the information in the table 2, and then can determine the protection seed category that will be activated, setting and protecting seed category in the present embodiment is client identification module and portable terminal.
Server generates the data backup key according to current time, user name, random cipher etc., and this key and Backup Data type, data are deleted preservations such as sign, upgrades protection seed information table and backup data store table.
Step 707: server is with client identification module and mobile terminal locking.
Server indication communication number of the account management server freezes client identification module, this process comprises: server sends communication number of the account management server with the client identification module sign, and the number of the account of then communicating by letter management server identifies the corresponding client identification module with client identification module and freezes.
Server sends second locking request to described portable terminal, has comprised user name and random cipher in this second locking request, after portable terminal passes through the information authentication in second locking request, with self locking.
Step 708: also comprise in described second locking request mobile terminal identification and client identification module the sign, then with the information back-up in portable terminal and the client identification module to server.
In order to ensure the safety of data, also need the information in portable terminal and the client identification module at server backup, if also comprise data deletion sign in second locking request, then when data backup after, delete the information in portable terminal and the client identification module.
For guaranteeing safety, can also comprise the data backup key in this second locking request.
Step 707 and step 708 can not have sequencing in the present embodiment, for example:
1, server can lock client identification module and portable terminal earlier, but, can utilize the mode of white list to make the client identification module after locking only open to server, and by the locking of portable terminal keyboard being realized locking to portable terminal, after even portable terminal and client identification module are locked, still can be with the information back-up of portable terminal and client identification module to server, and the information of deleting described portable terminal and client identification module.
2, earlier with the information back-up of portable terminal and client identification module to server, and the information of deleting described portable terminal and client identification module is again with client identification module and mobile terminal locking.
The embodiment of the invention also provides the processing mode under portable terminal and situation that client identification module separates, for example:
If portable terminal A and client identification module A in the mobile communication terminal device are in unsafe condition (as stolen), then portable terminal A being separated with client identification module A at first needs first turning-off mobile terminal A.
When portable terminal A and client identification module B combined, portable terminal A will judge whether and can link to each other with server in the start process, and whether receives second locking request, when receiving, then can delete the information of self with self information back-up to server, and locking.
When portable terminal B and client identification module A combine, portable terminal B also will judge whether and can link to each other with server in the start process, and whether receive second locking request, when receiving, according to the information in second locking request that issues being carried out authentication with the mode of server as offered, when authentication is passed through, then can be with the information back-up of client identification module A to server, the information of deletion client identification module A is freezed client identification module A by communication number of the account management server.
Step 709: server is determined the contact person in the information of receiving, and sends the loss assert message to described contact person.
Content in this loss assert message can comprise: the contact method that mobile communication terminal device is unavailable and new.
Losing assert message includes but not limited to: note, multimedia message, Email and fax.
Step 710: server returns to second mobile communication terminal device and activates protection seed success response message.
Step 711: server returns to second mobile communication terminal device and activates protection seed failure response message.
If mobile communication terminal device is not lost, or gives for change after losing, then need the mobile communication terminal device release, promptly the Sleep protection seed as shown in Figure 8, is the flow chart of Sleep protection seed in the embodiment of the invention, this process comprises:
Step 801: second mobile communication terminal device sends Sleep protection seed request message to server, and promptly the first unlocking request message comprises user name, random cipher, protection seed title in this message.
Step 802: server is judged the user name that whether comprises in the log-on message of having preserved in the Sleep protection seed request message, if preserve, then execution in step 803, otherwise, execution in step 809.
Step 803: server carries out authentication to user name and random cipher, if authentication is passed through, then execution in step 804, otherwise, execution in step 809.
Step 804: server is judged the protection seed title that whether comprises in the protection seed of having preserved in the Sleep protection seed request message, if preserve, then execution in step 805, otherwise, execution in step 809.
Step 805: server judges whether the protection seed of described protection seed title correspondence is activated, if then execution in step 806, otherwise, execution in step 808.
Step 806: server protects the state of seed to be set to dormancy according to protection seed sign.
Set in the present embodiment and need carry out release to portable terminal and client identification module, then server indication communication number of the account management server thaws client identification module, and sends second unlocking request to described portable terminal, the portable terminal release.
Step 807: if Sleep protection seed request message also comprises and gives assert message for change, the contact person in the information that server is determined to preserve, and send to described contact person and to give assert message for change.
Assert message is similar with losing, and this content of giving for change in the assert message can comprise: mobile communication terminal device can be used.
Giving assert message for change includes but not limited to: note, multimedia message, Email and fax.
Step 808: server returns Sleep protection seed success response message to second mobile communication terminal device.
Step 809: server returns Sleep protection seed failure response message to second mobile communication terminal device.
When mobile communication terminal device normally uses,, can at any time data be carried out back up or restore to data in order to ensure the data security in portable terminal and the client identification module.As shown in table 3, be backup data store table in the server.
User ID Data Identification Data content Data type (contact person, note, multimedia message, mail, picture, audio frequency, video, schedule etc.) Data Source (mobile phone card unique identification, portable terminal unique identification) Data protection state (normal, modification is protected, deleted protection, isolates) The Data Update time Data Update state (increase newly, revise, delete)
1 D0001 Xiao Li's data message The contact person 1222222 Normally 2007-6-10 08:30:10 Newly-increased
1 D0002 Xiao Zhang's data message The contact person aaaa Normally 2007-6-10 08:30:10 Newly-increased
2 D0003 The short message that Xiao Wang sends out Note dddd Normally 2007-6-5 18:03:20 Newly-increased
Table 3
Information in the table 3 can be revised as required.
Equally; also will the data in the mobile communication terminal device be backed up at activation protection kind of a period of the day from 11 p.m. to 1 a.m, at both of these case, the embodiment of the invention has been described a kind of mode that data in the mobile communication terminal device are backed up and delete; as shown in Figure 9, this mode comprises:
Step 901: mobile communication terminal device sends to server with data backup requests message, and described request message comprises user name, random cipher, Backup Data type and data backup key.
Above-mentioned steps is at the backup procedure that activates protection kind of the period of the day from 11 p.m. to 1 a.m; activate protection kind of the period of the day from 11 p.m. to 1 a.m at server; can send second locking request to mobile communication terminal device, comprise Backup Data type, data deletion sign and data backup key in this second locking request.
Under normal circumstances, the user can manually back up, the user inputs information such as user name, random cipher, user ID, Backup Data type to mobile communication terminal device, then mobile communication terminal device sends the data backup requests message that comprises above-mentioned information to server.
Step 902: server is judged the user name that whether comprises in the log-on message of having preserved in the data backup requests message, if preserve, then execution in step 903, otherwise, execution in step 908.
Step 903: server carries out authentication to user name and random cipher, if authentication is passed through, then execution in step 904, otherwise, execution in step 908.
Step 904: server is that this data backup process is distributed a simultaneous session sign, and the response message that will comprise this sign returns to mobile communication terminal device.
Step 905: mobile communication terminal device sends to server with self data to be backed up and simultaneous session sign.
Mobile communication terminal device can send to server with information according to OMA DS data sync protocol requirement.
Data to be backed up comprise the data of portable terminal in the mobile communication terminal device and/or the data of client identification module.
Step 906: the data to be backed up that server will receive back up.
Between backup, whether the simultaneous session sign that server will be determined to receive is to distribute in the step 904, if, then according to OMA DS data sync protocol requirement with information back-up.Can be in database with this information back-up.
Step 904 to the purpose of step 906 is fail safes of raising system, avoids communicating by letter between server and the mobile communication terminal device to be stolen.
Step 907: server is to mobile communication terminal device return data backup success response message.
For under normal circumstances, the user can manually back up situation, at this moment, backup procedure finishes.
If activate protection kind of a period of the day from 11 p.m. to 1 a.m at server, send to mobile communication terminal device and to have comprised data deletion sign in second locking request, then mobile communication terminal device is deleted backed up data.
Step 908: server is to mobile communication terminal device return data backup failure response message.
Back up and delete corresponding with data in the mobile communication terminal device and be data recovery procedure, when mobile communication terminal device is lost, carried out activating protection kind of a child-operation, data are backed up and delete; When mobile communication terminal device is given for change, need carry out data and recover.As shown in figure 10, be data recovery procedure schematic diagram in the embodiment of the invention, this process comprises:
Step 1001: mobile communication terminal device sends data recovery request message to server, comprises user name, random cipher in this request message.
User name, random cipher can be that the user imports to mobile communication terminal device.
Step 1002: server is judged the user name that whether comprises in the log-on message of having preserved in the data recovery request message, if preserve, then execution in step 1003, otherwise, execution in step 1008.
Step 1003: server carries out authentication to user name and random cipher, if authentication is passed through, then execution in step 1004, otherwise, execution in step 1008.
Step 1004: server distributes a simultaneous session sign for this data recovery procedure, and inquires this mobile communication terminal device backed up data summary according to user ID.
In backup procedure, search data for convenience, can write outline data for backed up data.
Step 1005: the response message that server will comprise simultaneous session sign and outline data returns to mobile communication terminal device.
Step 1006: mobile communication terminal device need to select the Backup Data of recovery from outline data, will need information such as data recovered type and simultaneous session sign to send to server.
In the present embodiment, step 1004 and step 1006 are not necessary, and server can directly send to mobile communication terminal device with the mobile communication terminal device backed up data, and does not need mobile communication terminal device to select to recover.
Step 1007: server inquires Backup Data according to user ID and needs data recovered type from the Backup Data of preserving, and returns to mobile communication terminal device.
For example, mobile communication terminal device has backed up cellphone information and mobile phone card information in server, if only need this moment to recover cellphone information, then server inquires the mobile communication terminal device backed-up data according to user ID, and the data recovered type determines to return cellphone information as required.Server also can directly return to mobile communication terminal device with cellphone information and mobile phone card information, is selected cellphone information is returned on the mobile phone by mobile communication terminal device, and does not recover the mobile phone card information.
Step 1008: server recovers failure response message to the mobile communication terminal device return data.
In the foregoing description, can connect with server with mobile communication terminal device mostly is the basis, from the angle of safety, need be when mobile communication terminal device be started shooting and the start back monitor whether connecting with server.
As shown in figure 11, the process for whether monitoring mobile communication terminal device in the embodiment of the invention connects with server comprises:
Step 1101: mobile communication terminal device judges whether to connect with server, if connect, then execution in step 1102, otherwise, execution in step 1104.
If in start process, then this step is carried out immediately; If after start, this step can be carried out in the cycle, or carries out at setting-up time.
Step 1102: mobile communication terminal device judges whether the protection seed activates (whether receiving second locking request that server sends), if activate, then execution in step 1105, otherwise, execution in step 1103.
If do not create the protection seed, then execution in step 1103.
Step 1103: mobile communication terminal device normally uses, and circulation execution in step 1101.
Step 1104: the portable terminal of mobile communication terminal device locking self.
At this moment, the portable terminal that locks self can be regarded as and not allow start.
Step 1105: mobile communication terminal device is carried out lock operation, the data that require in second locking request is backuped in the server, and delete backed up data.
The log-on message tabulation deletion of preserving as shown in figure 12, can be the process of logout service in the embodiment of the invention when needed, this process comprises:
Step 1201: mobile communication terminal device sends de-registration request message to server, comprises user name and random cipher in this message.
User name in the de-registration request message and random cipher can show to the user by mobile communication terminal device in registration process, when needs are nullified, this information be sent to server.The mobile communication terminal device of nullifying operation can be different from the mobile communication terminal device of registering operation.
In order to ensure safety, user ID in the de-registration request message and random cipher are encrypted the back transmission.
Step 1202: server judges in the log-on message of having preserved whether comprise user's entitling, if comprise, then execution in step 1203, otherwise, execution in step 1208.
User ID and random cipher that server obtains after with the de-registration request decrypt messages that receives.
Step 1203: server carries out authentication to user name and random cipher, if authentication is passed through, then execution in step 1204, otherwise, execution in step 1208.
Authentication process is whether the random cipher of the described user name correspondence of judging that server is preserved is identical with the random cipher that receives, and as if identical, then authentication is passed through; Otherwise, for authentication is not passed through.
Step 1204: server judges whether the protection seed is activated, if then execution in step 1205, otherwise, execution in step 1206.
Step 1205: the protection seed dormancy that will activate is about to the mobile communication terminal device release of locking.
Step 1206: the server data relevant that deletion is preserved according to user name with this user name.
Related data comprises: log-on message, Backup Data and protection seed etc.
Step 1207: server returns to mobile communication terminal device and nullifies success response message.
Step 1208: server returns to mobile communication terminal device and nullifies failure response message.
Based on the description to said system and method embodiment, the embodiment of the invention three also provides a kind of mobile communication terminal device 11, and its structure is shown in 11 parts of mobile communication terminal device among Fig. 1.
In the embodiment of the invention, server can also be realized billing operation, includes but not limited to:
1, successfully realize a communication process (as successfully registering, successfully activate protection seed etc.) between mobile communication terminal device and server, server will can also send to bill the terminal of appointment according to imposing a condition charging.
2, preserve a zero-time and concluding time in the server, at this moment the section in, it is legal that server is given tacit consent to described mobile communication terminal device, agree to connect with this mobile communication terminal device, and when this mobile communication terminal device after server is successfully registered, it is legal that second mobile communication terminal device also is considered as the operation of this mobile communication terminal device.
By the described method of the embodiment of the invention, system and a kind of mobile communication terminal device, make when mobile communication terminal device is in unsafe state, even under the situation of no signal, the data message in the mobile communication terminal device can be not stolen yet; When mobile communication terminal device reenters safe condition, can restore data, make better user experience.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these changes and modification interior.

Claims (16)

1, a kind of method of mobile communications terminal data protection is characterized in that, this method comprises:
Second mobile communication terminal device sends first locking request to server, and this first locking request comprises the mobile terminal identification and/or the client identification module sign of random cipher, user name and mobile communication terminal device;
After described server passes through described random cipher and described user name authentication, issue second locking request according to mobile terminal identification in described first locking request and/or client identification module sign to mobile communication terminal device, comprise the mobile terminal identification and/or the client identification module sign of described mobile communication terminal device in this second locking request;
Mobile communication terminal device judges whether to connect with server, if connect, and receive second locking request that server issues, then with the mobile terminal identification in described second locking request and/or client identification module sign corresponding mobile terminal and/or client identification module locking;
If do not connect, then portable terminal and the client identification module with described mobile communication terminal device locks.
2, the method for claim 1 is characterized in that, mobile communication terminal device receives before second locking request that server issues, and this method also comprises:
Described mobile communication terminal device sends register requirement to described server, comprises user name in this register requirement;
Described server will send to described mobile communication terminal device for the random cipher that described mobile communication terminal device distributes, and preserve described user name and described random cipher.
3, the method for claim 1 is characterized in that, described mobile communication terminal device receives after described second locking request, also comprises:
Described portable terminal that mobile terminal identification in described second locking request and/or client identification module sign is corresponding and/or the information back-up in the client identification module are to server.
4, method as claimed in claim 3 is characterized in that, if also comprise data deletion sign in described second locking request, then with the information back-up in described portable terminal and/or the client identification module after server, delete described information.
5, method as claimed in claim 2 is characterized in that, described method also comprises:
Described mobile communication terminal device sends the data recovery request to described server, comprises described random cipher and described user name in this request;
Described server to the success of described random cipher and described user name authentication after, the information in described portable terminal and/or the client identification module is sent to described mobile communication terminal device.
6, a kind of system of mobile communications terminal data protection is characterized in that, this system comprises mobile communication terminal device and server, and wherein, described mobile communication terminal device comprises:
The protection monitoring module is used to judge whether connect with server;
The protection locking module is used for if described judged result for not connecting, then locks mobile communication terminal device;
If described judged result is for connecting, and receive second locking request that server issues, the mobile terminal identification and/or the client identification module sign that comprise described mobile communication terminal device in this second locking request are then with mobile terminal identification and/or client identification module sign corresponding mobile terminal in described second locking request and/or client identification module locking;
Described server comprises:
Sending module is used to send described second locking request;
Backup module is used for backing up the information of described portable terminal and/or client identification module.
7, system as claimed in claim 6 is characterized in that, described mobile communication terminal device also comprises:
Registering modules is used for sending register requirement to described server, comprises user name in this register requirement, and receives the random cipher that described server sends;
Described server also comprises:
Distribution module, the described random cipher that is used for distributing for described mobile communication terminal device sends to described mobile communication terminal device;
Preserve module, be used to preserve described user name and described random cipher.
8, system as claimed in claim 7 is characterized in that, described system also comprises:
Second mobile communication terminal device is used for sending first locking request to described server, and this first locking request comprises the mobile terminal identification and/or the client identification module sign of described random cipher, described user name and described mobile communication terminal device;
Described sending module comprises:
First receiving element is used to receive described first locking request;
First authenticating unit is used for described random cipher and described user name are carried out authentication;
Performance element is used for after authentication is passed through, and issues described second locking request according to mobile terminal identification in described first locking request and/or client identification module sign to mobile communication terminal device.
9, system as claimed in claim 6 is characterized in that, described mobile communication terminal device also comprises:
Data simultaneous module; be used for when described protection locking module receives described second locking request, described portable terminal that the mobile terminal identification in described second locking request and/or client identification module sign is corresponding and/or the information back-up in the client identification module are to server.
10, system as claimed in claim 9 is characterized in that, described mobile communication terminal device also comprises:
Removing module is used for if described second locking request also comprises data deletion sign, then deletes mobile terminal identification in described second locking request and/or the information in client identification module sign corresponding mobile terminal and/or the client identification module.
11, system as claimed in claim 7 is characterized in that, described mobile communication terminal device also comprises:
Recover module, be used for sending the data recovery request, comprise described random cipher and described user name in this request to described server;
Second receiver module is used to receive the information of described portable terminal and/or client identification module;
Described server also comprises:
Second authentication module is used for to after described random cipher and the success of described user name authentication the information in described portable terminal and/or the client identification module being sent to described mobile communication terminal device.
12, a kind of mobile communication terminal device is characterized in that, this mobile communication terminal device comprises:
The protection monitoring module is used to judge whether connect with server;
The protection locking module is used for if described judged result for not connecting, then locks mobile communication terminal device; If described judged result is for connecting, and receive second locking request that server issues, the mobile terminal identification and/or the client identification module sign that comprise described mobile communication terminal device in this second locking request are then with mobile terminal identification and/or client identification module sign corresponding mobile terminal in described second locking request and/or client identification module locking.
13, mobile communication terminal device as claimed in claim 12 is characterized in that, described mobile communication terminal device also comprises:
Registering modules is used for sending register requirement to described server, comprises user name in this register requirement, and the random cipher of reception server transmission.
14, mobile communication terminal device as claimed in claim 12 is characterized in that, mobile communication terminal device also comprises:
Data simultaneous module; be used for when described protection locking module receives described second locking request, with the information back-up in the mobile terminal identification in described second locking request and/or client identification module sign corresponding mobile terminal and/or the client identification module to server.
15, mobile communication terminal device as claimed in claim 14 is characterized in that, described mobile communication terminal device also comprises:
Removing module is used for if described second locking request also comprises data deletion sign, then deletes mobile terminal identification in described second locking request and/or the information in client identification module sign corresponding mobile terminal and/or the client identification module.
16, mobile communication terminal device as claimed in claim 13 is characterized in that, described mobile communication terminal device also comprises:
Recover module, be used for sending the data recovery request, comprise described random cipher and user name in this request to described server;
Receiver module is used for receiving the described portable terminal of described server transmission and/or the information of client identification module after server is to described random cipher and the success of user name authentication.
CNB2007101456153A 2007-09-03 2007-09-03 The method of mobile communications terminal data protection, system and equipment Expired - Fee Related CN100563391C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2007101456153A CN100563391C (en) 2007-09-03 2007-09-03 The method of mobile communications terminal data protection, system and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2007101456153A CN100563391C (en) 2007-09-03 2007-09-03 The method of mobile communications terminal data protection, system and equipment

Publications (2)

Publication Number Publication Date
CN101119565A CN101119565A (en) 2008-02-06
CN100563391C true CN100563391C (en) 2009-11-25

Family

ID=39055448

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2007101456153A Expired - Fee Related CN100563391C (en) 2007-09-03 2007-09-03 The method of mobile communications terminal data protection, system and equipment

Country Status (1)

Country Link
CN (1) CN100563391C (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010145071A1 (en) * 2009-06-16 2010-12-23 成都市华为赛门铁克科技有限公司 Method and apparatus for implementing lock mechanism
FR2979783B1 (en) * 2011-09-06 2013-08-23 Alcatel Lucent MOBILE TERMINAL FLIGHT DETECTION SYSTEM
CN102711091B (en) * 2012-06-12 2018-11-23 中兴通讯股份有限公司 Core network system and data processing method
CN103024160A (en) * 2012-11-30 2013-04-03 北京网秦天下科技有限公司 Mobile terminal locking method and mobile terminal
CN103077355B (en) * 2012-12-20 2016-08-10 深圳市高正软件有限公司 The data guard method of mobile device and system
CN104080175B (en) * 2013-03-25 2018-09-04 腾讯科技(深圳)有限公司 A kind of number resource distribution method, terminal, server and system
CN103324878B (en) * 2013-07-16 2016-01-13 李凯 The unlocking authority of remote control handset
CN104753886B (en) * 2013-12-31 2018-10-19 中国科学院信息工程研究所 It is a kind of to the locking method of remote user, unlocking method and device
CN104519127A (en) * 2014-12-11 2015-04-15 天津大学 Method for protecting personal information in mobile phone
CN107305608A (en) * 2016-04-21 2017-10-31 成都鼎桥通信技术有限公司 The management method and device of terminal device
CN106210264A (en) * 2016-06-21 2016-12-07 焦建成 Communicating terminal is lost guard method and has the communicating terminal losing defencive function
CN105897773A (en) * 2016-06-24 2016-08-24 焦建成 Communication terminal loss protection method
CN106355054B (en) * 2016-08-19 2019-06-11 宇龙计算机通信科技(深圳)有限公司 Anti-theft method for mobile terminal and system
CN107172602B (en) * 2017-06-27 2021-08-10 上海展扬通信技术有限公司 Data security protection method and device for mobile terminal
CN107241713A (en) * 2017-06-30 2017-10-10 惠州Tcl移动通信有限公司 Give method, storage device and the mobile terminal of the SIM card data of loss for change
CN108462686B (en) * 2018-01-08 2020-09-04 平安科技(深圳)有限公司 Method and device for acquiring dynamic key, terminal equipment and storage medium
CN108471606A (en) * 2018-05-10 2018-08-31 南京博内特信息科技有限公司 A kind of method of the report control platform of new-energy automobile
CN112019684A (en) * 2020-08-10 2020-12-01 Oppo(重庆)智能科技有限公司 Control method and electronic device
CN113988864B (en) * 2021-12-29 2022-03-04 四川赛尔斯科技有限公司 Medical expense payment method and system based on payment management platform
CN116484431B (en) * 2023-06-21 2024-05-17 荣耀终端有限公司 Data protection method, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN101119565A (en) 2008-02-06

Similar Documents

Publication Publication Date Title
CN100563391C (en) The method of mobile communications terminal data protection, system and equipment
CN105308560B (en) Method and apparatus for profile to be arranged
RU2418387C2 (en) Method to disable mobile device
CN102625297B (en) For identity management method and the device of mobile terminal
EP2521034B1 (en) Managing method, device and terminal for application program
CN101616495A (en) The method and system of individual privacy in the protection mobile phone
CN101252703A (en) Terminal data protecting method, system as well as mobile communication terminal
CN106685645B (en) A kind of cipher key backup for safety chip business cipher key and restoration methods and system
US8571522B2 (en) Authentication method for the mobile terminal and a system thereof
CN101583126B (en) Card locking method, subscriber identity module card and mobile terminal
CN1684411B (en) Method for verifying user's legitimate of mobile terminal
CN110069949A (en) A kind of electronic contract signature method, apparatus, equipment and medium
CN106357678A (en) Cloud encryption storage method for intelligent terminal and intelligent terminal
CN114039726B (en) Key generation method, key acquisition method, related device and medium
KR102095136B1 (en) A method for replacing at least one authentication parameter for authenticating a secure element, and a corresponding secure element
CN101895829A (en) Method and system for retrieving FLASH data from mobile telephone, and mobile telephone
CN1980458B (en) Method for realizing information back-up at network side
CN101917671B (en) Method for managing authentication parameters and terminal
CN101364250A (en) Copyright information processing method and device
CN1980461A (en) Device and method for realizing information recovery at network side
CN102938882A (en) Method and system changing contact information of mobile phone terminals of others by sending messages
CN1863045B (en) Method for receiving and deleting media data key
WO2011029211A1 (en) Method for binding secure device to a wireless phone
CN105426783A (en) Multi-backup data storage method
KR20060112597A (en) Method and system for resetting memory of mobile terminal and mobile terminal having a memory reset function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091125

Termination date: 20130903