WO2011140756A1 - Mobile terminal, data protection method of mobile terminal and monitor system of mobile terminal - Google Patents

Mobile terminal, data protection method of mobile terminal and monitor system of mobile terminal Download PDF

Info

Publication number
WO2011140756A1
WO2011140756A1 PCT/CN2010/076031 CN2010076031W WO2011140756A1 WO 2011140756 A1 WO2011140756 A1 WO 2011140756A1 CN 2010076031 W CN2010076031 W CN 2010076031W WO 2011140756 A1 WO2011140756 A1 WO 2011140756A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
data
password
management system
push notification
Prior art date
Application number
PCT/CN2010/076031
Other languages
French (fr)
Chinese (zh)
Inventor
乐慧
许玲
李金敏
石瑀
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2011140756A1 publication Critical patent/WO2011140756A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks

Definitions

  • Mobile terminal mobile terminal data protection method and mobile terminal monitoring system
  • the present invention relates to mobile communication technologies, and in particular, to a mobile terminal, a mobile terminal data protection method, and a mobile terminal monitoring system. Background technique
  • mobile phones or mobile terminals such as personal digital assistants (PDAs) have not only been used as mere communication tools. Since the mobile terminal has the advantages of small size, easy portability, convenient use, etc., it has gradually become a personal information storage carrier of the user. Many mobile terminal users are accustomed to storing important personal information related to personal information, such as contacts, photos, and schedules, in the mobile terminal. Although it can greatly facilitate personal work and life, when the mobile terminal is lost or stolen, if it falls into the hands of the criminals, the stored personal information data of the mobile terminal may be used by the criminals to make the mobile The user of the terminal suffers a mental and material loss. Therefore, it is necessary to provide a mobile terminal with data protection function. Summary of the invention
  • the main object of the present invention is to provide a mobile terminal, a mobile terminal data protection method, and a mobile terminal monitoring system, which can delete data of the monitored mobile terminal, prevent data leakage of the monitored mobile terminal, and ensure the personal information of the lost owner.
  • the invention provides a mobile terminal data protection method, and the mobile terminal is provided with an application management system and a data deletion module.
  • the mobile terminal data protection method includes the following steps: The application management system determines whether a push notification or a platform request is received; when receiving the push notification or the platform request, the application management system starts the data deletion module; and the data deletion module deletes the data.
  • the method further includes: after the mobile terminal is powered on, automatically starting the SIM card verification module; the SIM card verification module verifies the SIM card, and determining whether the SIM card verification is passed .
  • the mobile terminal data protection method further includes: when the SIM card verification passes, the application management system of the mobile terminal monitors the push notification on the listening port; the application management system determines whether the push notification is sent by the monitoring mobile terminal, when the judgment is When the monitoring mobile terminal is issued, the application management system starts the data deletion module to delete the data.
  • the mobile terminal data protection method further includes: prompting the user to input a password when the SIM card verification fails; receiving the password input by the user, and determining whether the password is correct; recording the number of failed password entries, and determining that the password input fails Whether the number is greater than the preset value.
  • the data protection method for the mobile terminal further includes: when the number of times the password input fails is greater than a preset value, the application management system starts the data deletion module to delete the data.
  • the present invention also provides a mobile terminal, including an application management system and a data deletion module, where: an application management system, configured to determine whether a push notification or a platform request is received; and for receiving a push notification or a platform request , start data deletion module; data deletion module, used to delete data.
  • the mobile terminal further includes a SIM card verification module, configured to verify the SIM card, and determine whether the SIM card verification is passed.
  • SIM card verification module configured to verify the SIM card, and determine whether the SIM card verification is passed.
  • the application management system is further configured to: monitor, when the SIM card passes, listen for a push notification on the listening port; and determine whether the push notification is sent by the monitoring mobile terminal, and when the monitoring mobile terminal issues, initiate data deletion.
  • the module deletes the data.
  • the mobile terminal further includes a password module, configured to prompt the user to input a password when the SIM card verification fails, and receive the password input by the user, and determine whether the password is correct.
  • a password module configured to prompt the user to input a password when the SIM card verification fails, and receive the password input by the user, and determine whether the password is correct.
  • the cipher module is further configured to record the number of times the password is failed, and determine whether the number of failed passwords is greater than a preset value.
  • the present invention also provides a mobile terminal monitoring system, including a monitoring mobile terminal and a monitored mobile terminal, wherein: the monitoring mobile terminal is configured to send a push notification to the monitored mobile terminal; the monitored mobile terminal includes an application management system and data deletion. Module.
  • the application management system is configured to determine whether the platform request or the push notification is received, and when the push notification or the platform request is received, start the data deletion module; and the data deletion module is configured to delete the data.
  • the monitored mobile terminal further includes a SIM card verification module, configured to verify the SIM card, and determine whether the SIM card verification is passed.
  • SIM card verification module configured to verify the SIM card, and determine whether the SIM card verification is passed.
  • the application management system is further configured to: when the SIM card verification passes, monitor the push notification on the listening port; and determine whether the push notification is sent by the monitoring mobile terminal, when the monitoring mobile terminal sends out, Start the data deletion module to delete the data.
  • the monitored mobile terminal further includes a password module, configured to prompt the user to input a password when the SIM card verification fails, and receive a password input by the user, and determine whether the input password is correct.
  • a password module configured to prompt the user to input a password when the SIM card verification fails, and receive a password input by the user, and determine whether the input password is correct.
  • the mobile terminal, the mobile terminal data protection method, and the mobile terminal monitoring system provided by the embodiment of the present invention, after the owner discovers that the mobile terminal is lost, uses the monitoring mobile terminal to send a push notification to the monitored mobile terminal, and the monitored mobile terminal is timely The data is deleted to prevent the data of the monitored mobile terminal from leaking out, and the personal information of the owner is secured.
  • FIG. 1 is a schematic flowchart of a mobile terminal data protection method according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of another embodiment of a mobile terminal data protection method according to the present invention
  • the invention relates to a monitoring mobile terminal and a monitored mobile terminal, both of which support Java functions.
  • the monitored mobile terminal is further provided with an application management system (AMS) and a data deletion module (MID let Data Clear).
  • AMS application management system
  • MID let Data Clear data deletion module
  • the monitoring mobile terminal is configured to send a Push Notification to the monitored mobile terminal, so that the application management system of the monitored mobile terminal initiates the data deletion module to delete data by using the push notification.
  • the monitored mobile terminal registers an inbound network connection for the data deletion module, and the application management system is responsible for monitoring whether a push notification sent by the monitoring mobile terminal is received on the registered inbound network connection, when receiving When the notification is pushed, the data deletion module is started to delete the data.
  • the method for registering an inbound network connection for the data deletion module includes a static registration mode and a dynamic registration mode.
  • the present invention will be described by taking static registration as an example. Those skilled in the art can obtain a scheme of dynamic registration mode according to the scheme of the static registration method provided.
  • the overall technical solution of the present invention is that the application management system of the mobile terminal determines whether a push notification or a platform request is received; when receiving the push notification or the platform request, the application management system starts the data deletion module; and the data deletion module deletes the mobile terminal.
  • the data The technical solutions of the present invention will be further described below in conjunction with the drawings and specific embodiments.
  • FIG. 1 is a schematic flow chart of an embodiment of a data protection method for a mobile terminal according to the present invention.
  • Step S101 The application management system of the mobile terminal monitors the push notification on the listening port.
  • a MIDlet-Push- ⁇ 1> attribute is added to the Java Application Description (JAD, Java Application Description) file, and the attribute is set to: MIDlet-Push-l: sms://:5000, MIDletDataClear, 13911111111.
  • the connection protocol used is the Short Message Service (SMS) protocol
  • the registered listening port number is 5000.
  • the MIDlet category name is MIDlet Data Clear
  • the effective source of the push notification is the mobile terminal with the mobile terminal number 13911111111, that is, the monitoring mobile terminal.
  • SMS Short Message Service
  • the present invention may also use a transmission control protocol or a user datagram protocol, which is not limited by the present invention.
  • Step S102 The application management system determines whether the push notification is sent by the monitoring mobile terminal. When the monitoring mobile terminal issues, the process proceeds to step S103; otherwise, the process returns to step S101 to continue monitoring.
  • the application management system monitors whether the push notification is sent to the monitoring mobile terminal of the number 13911111111 at the 5000 port.
  • Step S103 The application management system starts the data deletion module to delete the data.
  • the data deletion module uses Java's JSR75 extended function package to implement data deletion.
  • the specific implementation is as follows: Use javax.microedition.io.file package FileSystemRegistry class static method listRoots () method to get all file system root directory, call Connector. open () in turn open the file connection, and then use FileConnection delete () method to delete All files in this directory.
  • the monitoring mobile terminal sends a push notification to the monitored mobile terminal, and the data of the monitored mobile terminal is deleted in time to prevent data leakage of the monitored mobile terminal.
  • the personal information of the owner is guaranteed to be safe.
  • FIG. 2 is a schematic flow chart of another embodiment of a data protection method for a mobile terminal according to the present invention.
  • Step S201 After the mobile terminal is powered on, the SIM (Subscriber Identity Module) card verification module is automatically started.
  • SIM Subscriber Identity Module
  • the SIM card verification module is automatically activated to verify the SIM card.
  • the implementation of the boot auto start function uses the following methods:
  • Step S202 the SIM card verification module verifies the SIM card, and determines whether the SIM card verification is passed.
  • the SIM card verification it indicates that the mobile terminal does not replace the SIM card, and proceeds to step S203; when the SIM card verification fails, the mobile terminal is illustrated. The SIM card has been replaced, and the process proceeds to step S206.
  • the SIM card verification module verifies whether the mobile terminal replaces the SIM card by comparing the International Mobile Subscriber Identity (IMSI) and the International Mobile Subscriber Identity (IPSI) before the mobile terminal is powered on.
  • IMSI International Mobile Subscriber Identity
  • IPSI International Mobile Subscriber Identity
  • the International Mobile Subscriber ID is globally unique and consists of 20 digits, for example 8986 00 79 09 04 4 9311287.
  • Step S203 The application management system of the mobile terminal monitors the push notification on the listening port.
  • a MIDlet-Push- ⁇ 1> attribute is added to the Java Application Description (JAD) file, and the attribute is set to:
  • MIDlet-Push-l sms://:5000, MIDletDataClear, 13911111111.
  • connection protocol used is SMS protocol
  • the registered listening port number is 5000
  • the MID let category name is MID let Data Clear.
  • the effective source of the push notification is a mobile terminal with a mobile terminal number of 13911111111, that is, a mobile terminal is monitored.
  • Step S204 The application management system determines whether the push notification is sent by the monitoring mobile terminal. When the monitoring mobile terminal issues, the process proceeds to step S208; otherwise, the process returns to step S203 to continue monitoring.
  • the application management system monitors whether the push notification is a number on the 5000 port. 13911111111 is monitored by the mobile terminal.
  • Step S205 prompting the user to input a password.
  • Step S206 receiving the password input by the user, and determining whether the password is correct; when the password is correct, the process ends; when the password is wrong, the process proceeds to step S207.
  • Step S207 Record the number of times the password is failed, and determine whether the number of failed passwords is greater than a preset value. When the number of times the password input fails is greater than the preset value, the process proceeds to step S208, otherwise, the process returns to step S205.
  • the preset value in this embodiment can be set as needed, for example, three times, and of course, other values can be set, which is not limited by the present invention.
  • Step S208 the application management system starts the data deletion module to delete the data, and the process ends.
  • the application management system is triggered to start the data deletion module, which is the push notification in step 205, or is directly sent to the data deletion module by the application management system, and the format of the request is: this. platformRequest ( "MIDletDataClear" ).
  • the data deletion module uses Java's JSR75 extended feature package for data deletion.
  • the specific implementation is as follows: Use j avax. microedition.io. file package FileSystemRegistry class static method listRoots () method to get all file system root directory, call Connector. open () in turn open the file connection, and then use the FileConnection delete () method Delete all files in this directory.
  • FIG. 3 is a schematic structural diagram of an embodiment of a mobile terminal according to the present invention.
  • the mobile terminal 30 includes an application management system 301 and a data deletion module 302.
  • the application management system 301 is configured to monitor the push notification on the listening port, determine whether the push notification is sent by the monitoring mobile terminal, and start the data deletion module 302.
  • the data deletion module 302 is used to delete data.
  • the monitoring mobile terminal sends a push notification to the monitored mobile terminal, and the monitored mobile terminal starts the data deletion module 302 through the application management system 301 to delete the data in time to prevent the data from being deleted.
  • the data of the monitored mobile terminal is leaked, which ensures the security of the lost personal information.
  • FIG. 4 is a schematic structural diagram of another embodiment of a mobile terminal according to the present invention.
  • the mobile terminal 30 includes a SIM card verification module 303 and a cryptographic module 304 in addition to the application management system 301 and the data deletion module 302.
  • the SIM card verification module 303 is configured to verify the SIM card and determine whether the SIM card verification is passed.
  • the cryptographic module 304 is configured to prompt the user to input a password, receive the password input by the user, and determine whether the password is correct; and record the number of failed attempts to enter the password, and determine whether the number of failed password entries is greater than a preset value.
  • the picker or the thief closes the monitored mobile terminal, and then opens the monitored mobile terminal again, first through the SIM card.
  • the verification module 303 verifies whether the monitored mobile terminal has replaced the SIM card.
  • the SIM card receives the push notification sent by the monitoring mobile terminal to the monitored mobile terminal, and the data of the monitored mobile terminal is timely detected by the data deletion module 302.
  • Delete prevent data leakage of the monitored mobile terminal, and ensure the personal information of the lost owner; or the monitored mobile terminal does not replace the card, but does not input the correct password after being verified by the password module 304, and the mobile terminal will also be monitored.
  • Data deletion preventing monitored mobile terminals The leakage of data ensures the security of the personal information of the owner.
  • the monitoring mobile terminal 520 sends a push notification to the monitored mobile terminal 520, and the monitored mobile terminal 520 starts the data deletion module 302 through the application management system 301 to promptly
  • the data deletion prevents the data of the monitored mobile terminal 520 from being leaked, thereby ensuring the security of the lost personal information.
  • the SIM card verification module 303 verifies whether the monitored mobile terminal 520 has replaced the SIM card.
  • the SIM card receives the push notification sent by the monitoring mobile terminal 510 to the monitored mobile terminal 520, and passes the data deletion module 302.
  • the data of the monitored mobile terminal 520 is deleted in time to prevent the data of the monitored mobile terminal 520 from leaking out, and the personal information of the lost owner is secured; or the monitored mobile terminal 520 does not replace the card, but is not verified by the password module 304. Entering the correct password also deletes the data of the monitored mobile terminal 520, preventing the data of the monitored mobile terminal 520 from leaking out, and ensuring the security of the lost personal information.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A mobile terminal, a data protection method of the mobile terminal and a monitor system of the mobile terminal are disclosed, and the mobile terminal is set to contain an application management system and a data clear module, and the data protection method of the mobile terminal comprises the application management system judges whether a push notification or a platform request is received, when the push notification or the platform request is received, the application management system initiates the data clear module, the data clear module deletes data. Through the method, by means of sending the push notification from a monitor mobile terminal to a monitored mobile terminal, the data of the monitored mobile terminal are deleted in time, so that data leakage from the monitored mobile terminal is prevented and the security of the personal information of the loser is ensured.

Description

移动终端、 移动终端数据保护方法以及移动终端监控*** 技术领域  Mobile terminal, mobile terminal data protection method and mobile terminal monitoring system
本发明涉及移动通信技术, 尤其涉及一种移动终端、 移动终端数据保 护方法以及移动终端监控***。 背景技术  The present invention relates to mobile communication technologies, and in particular, to a mobile terminal, a mobile terminal data protection method, and a mobile terminal monitoring system. Background technique
随着移动通信技术的不断发展, 手机或者是个人数码助理 (PDA, Personal Digital Assistant )等移动终端已经不仅仅作为单纯的通讯工具。 由 于上述移动终端具有体积小、 易携带、 使用方便等优点, 使其已经逐渐成 为用户的个人信息存储载体。 许多移动终端用户习惯将联系人、 照片、 日 程等涉及个人信息安全的重要个人信息保存在移动终端里。 虽然可以为个 人工作、 生活提供了极大便利, 但是当移动终端遗失或者是被盗之后, 如 果落入不法分子的手中, 移动终端的所存储的个人信息数据及可能被不法 分子利用, 使移动终端的用户蒙受精神及物质上的损失。 因此, 有必要提 供具有数据保护功能的移动终端。 发明内容  With the continuous development of mobile communication technologies, mobile phones or mobile terminals such as personal digital assistants (PDAs) have not only been used as mere communication tools. Since the mobile terminal has the advantages of small size, easy portability, convenient use, etc., it has gradually become a personal information storage carrier of the user. Many mobile terminal users are accustomed to storing important personal information related to personal information, such as contacts, photos, and schedules, in the mobile terminal. Although it can greatly facilitate personal work and life, when the mobile terminal is lost or stolen, if it falls into the hands of the criminals, the stored personal information data of the mobile terminal may be used by the criminals to make the mobile The user of the terminal suffers a mental and material loss. Therefore, it is necessary to provide a mobile terminal with data protection function. Summary of the invention
本发明的主要目的在于提供一种移动终端、 移动终端数据保护方法以 及移动终端监控***, 将被监控移动终端的数据删除, 防止被监控移动终 端的数据外泄, 保证失主的个人信息安全。  The main object of the present invention is to provide a mobile terminal, a mobile terminal data protection method, and a mobile terminal monitoring system, which can delete data of the monitored mobile terminal, prevent data leakage of the monitored mobile terminal, and ensure the personal information of the lost owner.
本发明提供一种移动终端数据保护方法, 该移动终端设置有应用管理 ***以及数据删除模块。 该移动终端数据保护方法包括以下步骤: 应用管 理***判断是否接收到推入通知或者平台请求; 当接收到推入通知或者平 台请求时, 应用管理***启动数据删除模块; 数据删除模块删除数据。 优选的, 上述应用管理***判断是否接收到推入通知或者平台请求的 步骤之前还包括: 移动终端开机后, 自动启动 SIM卡验证模块; SIM卡验 证模块验证 SIM卡, 并判断 SIM卡验证是否通过。 The invention provides a mobile terminal data protection method, and the mobile terminal is provided with an application management system and a data deletion module. The mobile terminal data protection method includes the following steps: The application management system determines whether a push notification or a platform request is received; when receiving the push notification or the platform request, the application management system starts the data deletion module; and the data deletion module deletes the data. Preferably, before the step of determining, by the application management system, whether the push notification or the platform request is received, the method further includes: after the mobile terminal is powered on, automatically starting the SIM card verification module; the SIM card verification module verifies the SIM card, and determining whether the SIM card verification is passed .
优选的, 上述移动终端数据保护方法还包括: 当 SIM卡验证通过时, 移动终端的应用管理***在监听端口监听推入通知; 应用管理***判断推 入通知是否为监控移动终端发出, 当判断是监控移动终端发出时, 应用管 理***启动数据删除模块删除数据。  Preferably, the mobile terminal data protection method further includes: when the SIM card verification passes, the application management system of the mobile terminal monitors the push notification on the listening port; the application management system determines whether the push notification is sent by the monitoring mobile terminal, when the judgment is When the monitoring mobile terminal is issued, the application management system starts the data deletion module to delete the data.
优选的, 上述移动终端数据保护方法还包括: 当 SIM卡验证未通过时, 提示用户输入密码; 接收用户输入的密码, 并判断密码是否正确; 记录输 入密码失败的次数, 并判断输入密码失败的次数是否大于预设值。  Preferably, the mobile terminal data protection method further includes: prompting the user to input a password when the SIM card verification fails; receiving the password input by the user, and determining whether the password is correct; recording the number of failed password entries, and determining that the password input fails Whether the number is greater than the preset value.
优选的, 上述移动终端数据保护方法还包括: 当密码输入失败的次数 大于预设值时, 应用管理***启动数据删除模块删除数据。  Preferably, the data protection method for the mobile terminal further includes: when the number of times the password input fails is greater than a preset value, the application management system starts the data deletion module to delete the data.
本发明还提供一种移动终端, 包括应用管理***和数据删除模块, 其 中: 应用管理***, 用于判断是否接收到推入通知或者平台请求; 以及用 于在接收到推入通知或者平台请求时, 启动数据删除模块; 数据删除模块, 用于删除数据。  The present invention also provides a mobile terminal, including an application management system and a data deletion module, where: an application management system, configured to determine whether a push notification or a platform request is received; and for receiving a push notification or a platform request , start data deletion module; data deletion module, used to delete data.
优选的, 上述移动终端还包括 SIM卡验证模块, 用于验证 SIM卡, 并 判断 SIM卡验证是否通过。  Preferably, the mobile terminal further includes a SIM card verification module, configured to verify the SIM card, and determine whether the SIM card verification is passed.
优选的, 上述应用管理***还用于: 在当 SIM卡验证通过时, 在监听 端口监听推入通知; 以及判断推入通知是否为监控移动终端发出, 当是监 控移动终端发出时, 启动数据删除模块删除数据。  Preferably, the application management system is further configured to: monitor, when the SIM card passes, listen for a push notification on the listening port; and determine whether the push notification is sent by the monitoring mobile terminal, and when the monitoring mobile terminal issues, initiate data deletion. The module deletes the data.
优选的, 上述移动终端还包括密码模块, 用于在 SIM卡验证未通过时, 提示用户输入密码; 以及接收用户输入的密码, 并判断密码是否正确。  Preferably, the mobile terminal further includes a password module, configured to prompt the user to input a password when the SIM card verification fails, and receive the password input by the user, and determine whether the password is correct.
优选的, 上述密码模块还用于记录输入密码失败的次数, 并判断输入 密码失败的次数是否大于预设值。 本发明还提供一种移动终端监控***, 包括监控移动终端和被监控移 动终端, 其中: 监控移动终端, 用于向被监控移动终端发送推入通知; 被 监控移动终端包括应用管理***和数据删除模块。 应用管理***, 用于判 断是否接收到平台请求或者推入通知, 以及在接收到推入通知或者平台请 求时, 启动数据删除模块; 数据删除模块, 用于删除数据。 Preferably, the cipher module is further configured to record the number of times the password is failed, and determine whether the number of failed passwords is greater than a preset value. The present invention also provides a mobile terminal monitoring system, including a monitoring mobile terminal and a monitored mobile terminal, wherein: the monitoring mobile terminal is configured to send a push notification to the monitored mobile terminal; the monitored mobile terminal includes an application management system and data deletion. Module. The application management system is configured to determine whether the platform request or the push notification is received, and when the push notification or the platform request is received, start the data deletion module; and the data deletion module is configured to delete the data.
优选的, 所述被监控移动终端还包括 SIM卡验证模块, 用于验证 SIM 卡, 并判断 SIM卡验证是否通过。  Preferably, the monitored mobile terminal further includes a SIM card verification module, configured to verify the SIM card, and determine whether the SIM card verification is passed.
优选的, 所述应用管理***还用于, 在当 SIM卡验证通过时, 在监听 端口监听推入通知; 以及用于判断推入通知是否为监控移动终端发出, 当 是监控移动终端发出时, 启动数据删除模块删除数据。  Preferably, the application management system is further configured to: when the SIM card verification passes, monitor the push notification on the listening port; and determine whether the push notification is sent by the monitoring mobile terminal, when the monitoring mobile terminal sends out, Start the data deletion module to delete the data.
优选的, 所述被监控移动终端还包括密码模块, 用于在 SIM卡验证未 通过时, 提示用户输入密码; 以及接收用户输入的密码, 并判断所述输入 密码是否正确。  Preferably, the monitored mobile terminal further includes a password module, configured to prompt the user to input a password when the SIM card verification fails, and receive a password input by the user, and determine whether the input password is correct.
优选的, 密码模块还用于记录输入密码失败的次数, 并判断所述输入 密码失败的次数是否大于预设值。  Preferably, the cryptographic module is further configured to record the number of failed attempts to enter the password, and determine whether the number of times the input password fails is greater than a preset value.
本发明实施例提供的移动终端、 移动终端数据保护方法以及移动终端 监控***, 在失主发现移动终端遗失后, 利用监控移动终端向被监控移动 终端发送了推入通知, 及时将被监控移动终端的数据删除, 防止被监控移 动终端的数据外泄, 保证了失主的个人信息安全。 附图说明  The mobile terminal, the mobile terminal data protection method, and the mobile terminal monitoring system provided by the embodiment of the present invention, after the owner discovers that the mobile terminal is lost, uses the monitoring mobile terminal to send a push notification to the monitored mobile terminal, and the monitored mobile terminal is timely The data is deleted to prevent the data of the monitored mobile terminal from leaking out, and the personal information of the owner is secured. DRAWINGS
图 1是本发明移动终端数据保护方法一实施例的流程示意图; 图 2是本发明移动终端数据保护方法另一实施例的流程示意图; 图 3是本发明移动终端一实施例的结构示意图;  1 is a schematic flowchart of a mobile terminal data protection method according to an embodiment of the present invention; FIG. 2 is a schematic flowchart of another embodiment of a mobile terminal data protection method according to the present invention;
图 4是本发明移动终端另一实施例的结构示意图;  4 is a schematic structural diagram of another embodiment of a mobile terminal according to the present invention;
图 5是本发明移动终端监控***一实施例的结构示意图; 图 6是本发明移动终端监控***另一实施例的结构示意图。 具体实施方式 5 is a schematic structural diagram of an embodiment of a mobile terminal monitoring system according to the present invention; 6 is a schematic structural diagram of another embodiment of a mobile terminal monitoring system of the present invention. detailed description
本发明涉及监控移动终端及被监控移动终端, 二者均支持 Java功能, 其中被监控移动终端还设置有应用管理***( AMS , Application Management System ) 以及数据删除模块( MID let Data Clear )。 监控移动终端用于向被 监控移动终端发送推入通知(Push Notification ), 以通过该推入通知告知被 监控移动终端的应用管理***启动数据删除模块删除数据。 此外, 被监控 移动终端为数据删除模块注册有入站 (Inbound ) 网络连接, 由应用管理系 统负责监听在该已经注册的入站网络连接上是否接收到监控移动终端发送 的推入通知, 当接收到推入通知时, 启动数据删除模块删除数据。 本发明 为数据删除模块注册入站网络连接的方式, 包括静态注册方式和动态注册 方式, 本发明将以静态注册为例进行说明。 本领域技术人员可根据所提供 的静态注册方式的方案得到动态注册方式的方案。  The invention relates to a monitoring mobile terminal and a monitored mobile terminal, both of which support Java functions. The monitored mobile terminal is further provided with an application management system (AMS) and a data deletion module (MID let Data Clear). The monitoring mobile terminal is configured to send a Push Notification to the monitored mobile terminal, so that the application management system of the monitored mobile terminal initiates the data deletion module to delete data by using the push notification. In addition, the monitored mobile terminal registers an inbound network connection for the data deletion module, and the application management system is responsible for monitoring whether a push notification sent by the monitoring mobile terminal is received on the registered inbound network connection, when receiving When the notification is pushed, the data deletion module is started to delete the data. The method for registering an inbound network connection for the data deletion module includes a static registration mode and a dynamic registration mode. The present invention will be described by taking static registration as an example. Those skilled in the art can obtain a scheme of dynamic registration mode according to the scheme of the static registration method provided.
本发明的总体技术方案为, 移动终端的应用管理***判断是否接收到 推入通知或者平台请求; 当接收到推入通知或者平台请求时, 应用管理系 统启动数据删除模块; 数据删除模块删除移动终端的数据。 以下结合说明 书附图及具体实施例进一步说明本发明的技术方案。  The overall technical solution of the present invention is that the application management system of the mobile terminal determines whether a push notification or a platform request is received; when receiving the push notification or the platform request, the application management system starts the data deletion module; and the data deletion module deletes the mobile terminal. The data. The technical solutions of the present invention will be further described below in conjunction with the drawings and specific embodiments.
图 1是本发明移动终端数据保护方法一实施例的流程示意图。  1 is a schematic flow chart of an embodiment of a data protection method for a mobile terminal according to the present invention.
当被监控移动终端遗失后, 拾得者或者是盗窃者未关闭被监控移动终 端时, 失主及时利用监控移动终端向被监控移动终端发送了推入通知, 则 被监控移动终端将依照如下步骤保护数据, 其中本实施例所提到的移动终 端均是指被监控移动终端:  When the monitored mobile terminal is lost, if the picker or the thief does not close the monitored mobile terminal, the lost mobile terminal sends the push notification to the monitored mobile terminal in time, and the monitored mobile terminal will protect the data according to the following steps. The mobile terminal mentioned in this embodiment refers to the monitored mobile terminal:
步骤 S101 , 移动终端的应用管理***在监听端口监听推入通知。  Step S101: The application management system of the mobile terminal monitors the push notification on the listening port.
本实施例中 , 在 Java应用描述 ( JAD , Java Application Description )文 件中增加有 MIDlet-Push-< 1 >属性, 该属性设置为: MIDlet-Push-l :sms://:5000, MIDletDataClear, 13911111111 , 添加该属 性后,则表示釆用的连接协议为短消息服务( SMS, Short Messaging Service ) 协议, 注册的监听端口号为 5000, MIDlet类别名称为 MIDlet Data Clear, 推入通知的有效来源为移动终端号码为 13911111111的移动终端,即监控移 动终端。 当然除了 SMS协议之外, 本发明还可使用传输控制协议或用户数 据报协议, 本发明对此不作限定。 In this embodiment, a MIDlet-Push-<1> attribute is added to the Java Application Description (JAD, Java Application Description) file, and the attribute is set to: MIDlet-Push-l: sms://:5000, MIDletDataClear, 13911111111. After adding this attribute, it means that the connection protocol used is the Short Message Service (SMS) protocol, and the registered listening port number is 5000. The MIDlet category name is MIDlet Data Clear, and the effective source of the push notification is the mobile terminal with the mobile terminal number 13911111111, that is, the monitoring mobile terminal. Of course, in addition to the SMS protocol, the present invention may also use a transmission control protocol or a user datagram protocol, which is not limited by the present invention.
步骤 S102 , 应用管理***判断推入通知是否为监控移动终端发出, 当 是监控移动终端发出时,则进入步骤 S103; 否则返回步骤 S101 ,继续监听。  Step S102: The application management system determines whether the push notification is sent by the monitoring mobile terminal. When the monitoring mobile terminal issues, the process proceeds to step S103; otherwise, the process returns to step S101 to continue monitoring.
在本实施例中,由于推入通知的有效来源是号码为 13911111111的监控 移动终端。 此时, 应用管理***在 5000 端口监听推入通知是否为号码为 13911111111的监控移动终端所发出。  In this embodiment, since the effective source of the push notification is the monitoring mobile terminal number 13911111111. At this time, the application management system monitors whether the push notification is sent to the monitoring mobile terminal of the number 13911111111 at the 5000 port.
步骤 S103 , 应用管理***启动数据删除模块删除数据。  Step S103: The application management system starts the data deletion module to delete the data.
在本实施例中, 数据删除模块使用 Java的 JSR75扩展功能包实现数据 删 除 。 具体 实 现方 式如下 : 使用 javax.microedition.io.file 包 FileSystemRegistry类的静态方法 listRoots()方法获取所有文件***根目录, 调用 Connector. open()依次打开文件连接,然后使用 FileConnection的 delete() 方法删除该目录下所有文件。  In this embodiment, the data deletion module uses Java's JSR75 extended function package to implement data deletion. The specific implementation is as follows: Use javax.microedition.io.file package FileSystemRegistry class static method listRoots () method to get all file system root directory, call Connector. open () in turn open the file connection, and then use FileConnection delete () method to delete All files in this directory.
本实施例中, 当失主发现被监控移动终端遗失后, 利用监控移动终端 向被监控移动终端发送了推入通知, 及时将被监控移动终端的数据删除, 防止被监控移动终端的数据外泄, 保证了失主的个人信息安全。  In this embodiment, after the owner discovers that the monitored mobile terminal is lost, the monitoring mobile terminal sends a push notification to the monitored mobile terminal, and the data of the monitored mobile terminal is deleted in time to prevent data leakage of the monitored mobile terminal. The personal information of the owner is guaranteed to be safe.
图 2是本发明移动终端数据保护方法另一实施例的流程示意图。  2 is a schematic flow chart of another embodiment of a data protection method for a mobile terminal according to the present invention.
当被监控移动终端遗失后, 拾得者或者盗窃者由于电量不足或者是欲 更换 SIM卡而关闭了被监控移动终端, 然后再次打开被监控移动终端时, 则被监控移动终端将依照如下步骤保护数据, 其中本实施例所提到的移动 终端均是指被监控移动终端: 步骤 S201 ,移动终端开机后,自动启动 SIM( Subscriber Identity Module ) 卡验证模块。 After the monitored mobile terminal is lost, if the picker or the thief closes the monitored mobile terminal due to insufficient power or wants to replace the SIM card, and then turns on the monitored mobile terminal again, the monitored mobile terminal will protect the data according to the following steps. The mobile terminal mentioned in this embodiment refers to the monitored mobile terminal: Step S201: After the mobile terminal is powered on, the SIM (Subscriber Identity Module) card verification module is automatically started.
本实施例中,移动终端开机后, 自动启动 SIM卡验证模块验证 SIM卡。 开机自动启动功能的实现釆用以下方法:  In this embodiment, after the mobile terminal is powered on, the SIM card verification module is automatically activated to verify the SIM card. The implementation of the boot auto start function uses the following methods:
在 JAD文件中添加 MID let- 1 -Type: autostart属性, 同时还在 JAD文件 中添力口自动启动 ( Autostart ) 许可, 具体格式为 MID let-Permissions: j avax. microedition. midlet. Auto Start Permission。  Add the MID let- 1 -Type: autostart attribute to the JAD file, and also add the Autostart permission in the JAD file. The format is MID let-Permissions: j avax. microedition. midlet. Auto Start Permission.
步骤 S202, SIM卡验证模块验证 SIM卡,并判断 SIM卡验证是否通过; 当 SIM卡验证通过时, 说明移动终端并未更换 SIM卡, 进入步骤 S203; 当 SIM卡验证未通过时, 说明移动终端已经更换 SIM卡, 进入步骤 S206。  Step S202, the SIM card verification module verifies the SIM card, and determines whether the SIM card verification is passed. When the SIM card verification is passed, it indicates that the mobile terminal does not replace the SIM card, and proceeds to step S203; when the SIM card verification fails, the mobile terminal is illustrated. The SIM card has been replaced, and the process proceeds to step S206.
本实施例中, SIM 卡验证模块通过比较移动终端开机前的国际移动用 户识别码 ( IMSI, International Mobile Subscriber Identity )和国际移动用户 识别码验证移动终端是否更换了 SIM卡。 国际移动用户识别码是全球唯一 的, 由 20位数字组成, 例如 8986 00 79 09 04 4 9311287。  In this embodiment, the SIM card verification module verifies whether the mobile terminal replaces the SIM card by comparing the International Mobile Subscriber Identity (IMSI) and the International Mobile Subscriber Identity (IPSI) before the mobile terminal is powered on. The International Mobile Subscriber ID is globally unique and consists of 20 digits, for example 8986 00 79 09 04 4 9311287.
步骤 S203 , 移动终端的应用管理***在监听端口监听推入通知。  Step S203: The application management system of the mobile terminal monitors the push notification on the listening port.
本实施例中 , 在 Java应用描述 ( Java Application Description, JAD )文 件中增加有 MIDlet-Push-< 1 >属性 , 该属性设置为:  In this embodiment, a MIDlet-Push-<1> attribute is added to the Java Application Description (JAD) file, and the attribute is set to:
MIDlet-Push-l :sms://:5000, MIDletDataClear, 13911111111 , 添加该属 性后, 则表示釆用的连接协议为 SMS协议, 注册的监听端口号为 5000, MID let类别名称为 MID let Data Clear , 推入通知的有效来源为移动终端号 码为 13911111111的移动终端, 即监控移动终端。  MIDlet-Push-l: sms://:5000, MIDletDataClear, 13911111111. After adding this attribute, it means that the connection protocol used is SMS protocol, the registered listening port number is 5000, and the MID let category name is MID let Data Clear. The effective source of the push notification is a mobile terminal with a mobile terminal number of 13911111111, that is, a mobile terminal is monitored.
步骤 S204, 应用管理***判断推入通知是否为监控移动终端发出, 当 是监控移动终端发出时,则进入步骤 S208; 否则返回步骤 S203 ,继续监听。  Step S204: The application management system determines whether the push notification is sent by the monitoring mobile terminal. When the monitoring mobile terminal issues, the process proceeds to step S208; otherwise, the process returns to step S203 to continue monitoring.
在本实施例中,由于推入通知的有效来源是号码为 13911111111的监控 移动终端。 此时, 应用管理***在 5000 端口监听推入通知是否为号码为 13911111111的监控移动终端所发出。 In this embodiment, since the effective source of the push notification is the monitoring mobile terminal number 13911111111. At this point, the application management system monitors whether the push notification is a number on the 5000 port. 13911111111 is monitored by the mobile terminal.
步骤 S205 , 提示用户输入密码。  Step S205, prompting the user to input a password.
步骤 S206, 接收用户输入的密码, 并判断密码是否正确; 当密码正确 时, 本流程结束; 当密码错误时, 进入步骤 S207。  Step S206, receiving the password input by the user, and determining whether the password is correct; when the password is correct, the process ends; when the password is wrong, the process proceeds to step S207.
步骤 S207 , 记录输入密码失败的次数, 并判断输入密码失败的次数是 否大于预设值。 当密码输入失败的次数大于预设值时, 进入步骤 S208 , 否 则返回步骤 S205。  Step S207: Record the number of times the password is failed, and determine whether the number of failed passwords is greater than a preset value. When the number of times the password input fails is greater than the preset value, the process proceeds to step S208, otherwise, the process returns to step S205.
本实施例中的预设值可根据需要进行设定, 例如设定为 3 次, 当然也 可以设定为其它数值, 本发明对此不作限定。  The preset value in this embodiment can be set as needed, for example, three times, and of course, other values can be set, which is not limited by the present invention.
步骤 S208, 应用管理***启动数据删除模块删除数据, 本流程结束。 在本实施例中, 触发应用管理***启动数据删除模块, 为步骤 205 中 的推入通知, 或者是通过应用管理***向数据删除模块发送釆用平台请求 直接启动, 该请求的格式为: this.platformRequest ( "MIDletDataClear" )。  Step S208, the application management system starts the data deletion module to delete the data, and the process ends. In this embodiment, the application management system is triggered to start the data deletion module, which is the push notification in step 205, or is directly sent to the data deletion module by the application management system, and the format of the request is: this. platformRequest ( "MIDletDataClear" ).
数据删除模块使用 Java的 JSR75扩展功能包实现数据删除。 具体实现 方式如下: 使用 j avax. microedition. io . file包 FileSystemRegistry类的静态方 法 listRoots ( )方法获取所有文件***根目录, 调用 Connector. open ( )依 次打开文件连接, 然后使用 FileConnection的 delete ( ) 方法删除该目录下 所有文件。  The data deletion module uses Java's JSR75 extended feature package for data deletion. The specific implementation is as follows: Use j avax. microedition.io. file package FileSystemRegistry class static method listRoots () method to get all file system root directory, call Connector. open () in turn open the file connection, and then use the FileConnection delete () method Delete all files in this directory.
本实施例中, 当失主发现被监控移动终端遗失后, 由于电量不足或者 是欲更换 SIM卡, 拾得者或者盗窃者关闭了被监控移动终端, 然后再次打 开被监控移动终端时, 首先验证被监控移动终端是否更换了 SIM卡, 当未 更换 SIM卡时, 则利用监控移动终端向被监控移动终端发送了推入通知, 及时将被监控移动终端的数据删除, 防止被监控移动终端的数据外泄, 保 证了失主的个人信息安全; 或者是被监控移动终端虽然未更换卡, 但是未 输入正确的密码, 同样将被监控移动终端的数据删除, 防止被监控移动终 端的数据外泄, 保证了失主的个人信息安全。 In this embodiment, after the owner finds that the monitored mobile terminal is lost, because the power is insufficient or the SIM card is to be replaced, the picker or the thief closes the monitored mobile terminal, and then opens the monitored mobile terminal again, the first verification is monitored. Whether the mobile terminal replaces the SIM card, and when the SIM card is not replaced, the monitoring mobile terminal sends a push notification to the monitored mobile terminal, and the data of the monitored mobile terminal is deleted in time to prevent data leakage of the monitored mobile terminal. The personal information of the lost owner is guaranteed to be safe; or the monitored mobile terminal does not input the card, but the correct password is not entered, and the data of the monitored mobile terminal is also deleted to prevent the mobile terminal from being monitored. The leakage of data at the end ensures the security of the personal information of the owner.
图 3是本发明移动终端一实施例的结构示意图。  FIG. 3 is a schematic structural diagram of an embodiment of a mobile terminal according to the present invention.
移动终端 30包括应用管理*** 301和数据删除模块 302。  The mobile terminal 30 includes an application management system 301 and a data deletion module 302.
应用管理*** 301 , 用于在监听端口监听推入通知, 判断推入通知是否 为监控移动终端发出, 以及启动数据删除模块 302。 数据删除模块 302 , 用 于删除数据。  The application management system 301 is configured to monitor the push notification on the listening port, determine whether the push notification is sent by the monitoring mobile terminal, and start the data deletion module 302. The data deletion module 302 is used to delete data.
本实施例中, 当失主发现被监控移动终端遗失后, 利用监控移动终端 向被监控移动终端发送了推入通知,被监控移动终端通过应用管理*** 301 启动数据删除模块 302及时将数据删除, 防止被监控移动终端的数据外泄, 保证了失主的个人信息安全。  In this embodiment, after the owner discovers that the monitored mobile terminal is lost, the monitoring mobile terminal sends a push notification to the monitored mobile terminal, and the monitored mobile terminal starts the data deletion module 302 through the application management system 301 to delete the data in time to prevent the data from being deleted. The data of the monitored mobile terminal is leaked, which ensures the security of the lost personal information.
图 4是本发明移动终端另一实施例的结构示意图。  4 is a schematic structural diagram of another embodiment of a mobile terminal according to the present invention.
移动终端 30除了包括应用管理*** 301和数据删除模块 302之外, 还 包括 SIM卡验证模块 303 , 以及密码模块 304。  The mobile terminal 30 includes a SIM card verification module 303 and a cryptographic module 304 in addition to the application management system 301 and the data deletion module 302.
SIM卡验证模块 303 ,用于验证 SIM卡,并判断 SIM卡验证是否通过。 密码模块 304, 用于提示用户输入密码, 接收用户输入的密码, 并判断 密码是否正确; 以及记录输入密码失败的次数, 并判断输入密码失败的次 数是否大于预设值。  The SIM card verification module 303 is configured to verify the SIM card and determine whether the SIM card verification is passed. The cryptographic module 304 is configured to prompt the user to input a password, receive the password input by the user, and determine whether the password is correct; and record the number of failed attempts to enter the password, and determine whether the number of failed password entries is greater than a preset value.
本实施例中, 当失主发现被监控移动终端遗失后, 由于电量不足或者 是欲更换 SIM卡, 拾得者或者盗窃者关闭了被监控移动终端, 然后再次打 开被监控移动终端时, 首先通过 SIM卡验证模块 303验证被监控移动终端 是否更换了 SIM卡, 当未更换 SIM卡时, 则接收监控移动终端向被监控移 动终端发送的推入通知, 通过数据删除模块 302及时将被监控移动终端的 数据删除, 防止被监控移动终端的数据外泄, 保证了失主的个人信息安全; 或者是被监控移动终端虽然未更换卡, 但是通过密码模块 304验证后未输 入正确的密码, 同样将被监控移动终端的数据删除, 防止被监控移动终端 的数据外泄, 保证了失主的个人信息安全。 In this embodiment, after the owner finds that the monitored mobile terminal is lost, because the power is insufficient or the SIM card is to be replaced, the picker or the thief closes the monitored mobile terminal, and then opens the monitored mobile terminal again, first through the SIM card. The verification module 303 verifies whether the monitored mobile terminal has replaced the SIM card. When the SIM card is not replaced, it receives the push notification sent by the monitoring mobile terminal to the monitored mobile terminal, and the data of the monitored mobile terminal is timely detected by the data deletion module 302. Delete, prevent data leakage of the monitored mobile terminal, and ensure the personal information of the lost owner; or the monitored mobile terminal does not replace the card, but does not input the correct password after being verified by the password module 304, and the mobile terminal will also be monitored. Data deletion, preventing monitored mobile terminals The leakage of data ensures the security of the personal information of the owner.
图 5是本发明移动终端监控***一实施例的结构示意图。  FIG. 5 is a schematic structural diagram of an embodiment of a mobile terminal monitoring system according to the present invention.
本实施例中的移动终端监控***包括监控移动终端 510和被监控移动 终端 520, 被监控移动终端 520。  The mobile terminal monitoring system in this embodiment includes a monitoring mobile terminal 510 and a monitored mobile terminal 520, and the monitored mobile terminal 520.
监控移动终端 510用于向被监控移动终端 520发送推入通知。 被监控 移动终端 520包括应用管理*** 301和数据删除模块 302。  The monitoring mobile terminal 510 is configured to send a push notification to the monitored mobile terminal 520. The monitored mobile terminal 520 includes an application management system 301 and a data deletion module 302.
应用管理*** 301 , 用于在监听端口监听推入通知, 判断推入通知是否 为监控移动终端 510发出,以及启动数据删除模块 302。数据删除模块 302 , 用于删除数据。  The application management system 301 is configured to monitor the push notification on the listening port, determine whether the push notification is sent by the monitoring mobile terminal 510, and start the data deletion module 302. The data deletion module 302 is configured to delete data.
本实施例中, 当失主发现被监控移动终端 520遗失后, 利用监控移动 终端 520向被监控移动终端 520发送了推入通知, 被监控移动终端 520通 过应用管理*** 301启动数据删除模块 302及时将数据删除, 防止被监控 移动终端 520的数据外泄, 保证了失主的个人信息安全。  In this embodiment, after the owner discovers that the monitored mobile terminal 520 is lost, the monitoring mobile terminal 520 sends a push notification to the monitored mobile terminal 520, and the monitored mobile terminal 520 starts the data deletion module 302 through the application management system 301 to promptly The data deletion prevents the data of the monitored mobile terminal 520 from being leaked, thereby ensuring the security of the lost personal information.
图 6是本发明移动终端监控***另一实施例的结构示意图。  6 is a schematic structural diagram of another embodiment of a mobile terminal monitoring system of the present invention.
被监控移动终端 520除了包括应用管理*** 301和数据删除模块 302 之外, 还包括 SIM卡验证模块 303 , 以及密码模块 304。  The monitored mobile terminal 520 includes a SIM card verification module 303 and a cryptographic module 304 in addition to the application management system 301 and the data deletion module 302.
SIM卡验证模块 303 ,用于验证 SIM卡,并判断 SIM卡验证是否通过。 密码模块 304用于提示用户输入密码, 接收用户输入的密码, 并判断 密码是否正确; 以及记录输入密码失败的次数, 并判断输入密码失败的次 数是否大于预设值。  The SIM card verification module 303 is configured to verify the SIM card and determine whether the SIM card verification is passed. The cryptographic module 304 is configured to prompt the user to input a password, receive the password input by the user, and determine whether the password is correct; and record the number of failed attempts to enter the password, and determine whether the number of failed attempts to enter the password is greater than a preset value.
本实施例中, 当失主发现被监控移动终端 520遗失后, 由于电量不足 或者是欲更换 SIM卡, 拾得者或者盗窃者关闭了被监控移动终端 520, 然 后再次打开被监控移动终端 520时, 首先通过 SIM卡验证模块 303验证被 监控移动终端 520是否更换了 SIM卡, 当未更换 SIM卡时, 则接收监控移 动终端 510向被监控移动终端 520发送的推入通知,通过数据删除模块 302 及时将被监控移动终端 520的数据删除, 防止被监控移动终端 520的数据 外泄, 保证了失主的个人信息安全; 或者是被监控移动终端 520 虽然未更 换卡, 但是通过密码模块 304验证后未输入正确的密码, 同样将被监控移 动终端 520的数据删除, 防止被监控移动终端 520的数据外泄, 保证了失 主的个人信息安全。 In this embodiment, after the owner finds that the monitored mobile terminal 520 is lost, because the power is insufficient or the SIM card is to be replaced, the picker or the thief closes the monitored mobile terminal 520, and then turns on the monitored mobile terminal 520 again, first The SIM card verification module 303 verifies whether the monitored mobile terminal 520 has replaced the SIM card. When the SIM card is not replaced, it receives the push notification sent by the monitoring mobile terminal 510 to the monitored mobile terminal 520, and passes the data deletion module 302. The data of the monitored mobile terminal 520 is deleted in time to prevent the data of the monitored mobile terminal 520 from leaking out, and the personal information of the lost owner is secured; or the monitored mobile terminal 520 does not replace the card, but is not verified by the password module 304. Entering the correct password also deletes the data of the monitored mobile terminal 520, preventing the data of the monitored mobile terminal 520 from leaking out, and ensuring the security of the lost personal information.
以上所述仅为本发明的优选实施例, 并非因此限制其专利范围, 凡是 利用本发明说明书及附图内容所作的等效结构或等效流程变换, 直接或间 接运用在其他相关的技术领域, 均同理包括在本发明的专利保护范围内。  The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the patents. The equivalent structure or equivalent process transformations made by the description of the present invention and the drawings are directly or indirectly applied to other related technical fields. The same is included in the scope of patent protection of the present invention.

Claims

权利要求书 Claim
1、 一种移动终端数据保护方法, 其特征在于, 所述移动终端设置有应 用管理***以及数据删除模块, 所述移动终端数据保护方法包括以下步骤: 应用管理***判断是否接收到推入通知或者平台请求;  A mobile terminal data protection method, wherein the mobile terminal is provided with an application management system and a data deletion module, and the mobile terminal data protection method comprises the following steps: the application management system determines whether a push notification is received or Platform request
当接收到推入通知或者平台请求时, 应用管理***启动数据删除模块; 数据删除模块删除数据。  When receiving the push notification or the platform request, the application management system starts the data deletion module; the data deletion module deletes the data.
2、 如权利要求 1所述的移动终端数据保护方法, 其特征在于, 在所述 应用管理***判断是否接收到推入通知或者平台请求的步骤之前, 该方法 还包括:  2. The data protection method for a mobile terminal according to claim 1, wherein before the step of determining, by the application management system, whether a push notification or a platform request is received, the method further includes:
所述移动终端开机后, 自动启动 SIM卡验证, 并判断 SIM卡验证是否 通过。  After the mobile terminal is powered on, the SIM card verification is automatically started, and it is determined whether the SIM card verification is passed.
3、 如权利要求 2所述的移动终端数据保护方法, 其特征在于, 该方法 还包括:  3. The data protection method for a mobile terminal according to claim 2, wherein the method further comprises:
当 SIM卡验证通过时, 所述移动终端的应用管理***在监听端口监听 推入通知;  When the SIM card is verified, the application management system of the mobile terminal monitors the push notification on the listening port;
应用管理***判断所述推入通知是否为监控移动终端发出, 当判断是 监控移动终端发出时, 应用管理***启动数据删除模块删除数据。  The application management system determines whether the push notification is sent by the monitoring mobile terminal. When it is determined that the monitoring mobile terminal issues, the application management system starts the data deletion module to delete the data.
4、 如权利要求 2所述的移动终端数据保护方法, 其特征在于, 该方法 还包括:  4. The data protection method for a mobile terminal according to claim 2, wherein the method further comprises:
当 SIM卡验证未通过时, 提示用户输入密码;  When the SIM card verification fails, the user is prompted to enter a password;
接收用户输入的密码, 并判断所述输入密码是否正确;  Receiving a password input by the user, and determining whether the input password is correct;
记录输入密码失败的次数, 并判断输入密码失败的次数是否大于预设 值。  Record the number of failed password entries and determine if the number of failed password attempts is greater than the preset value.
5、 如权利要求 4所述的移动终端数据保护方法, 其特征在于, 该方法 还包括: 当所述输入密码失败的次数大于预设值时, 应用管理***启动数据删 除模块删除数据。 The method for protecting data of a mobile terminal according to claim 4, wherein the method further comprises: When the number of times the input password fails is greater than a preset value, the application management system starts the data deletion module to delete the data.
6、 一种移动终端, 其特征在于, 包括应用管理***和数据删除模块, 其中:  6. A mobile terminal, comprising: an application management system and a data deletion module, wherein:
所述应用管理***, 用于判断是否接收到推入通知或者平台请求; 以 及用于在接收到推入通知或者平台请求时, 启动数据删除模块;  The application management system is configured to determine whether a push notification or a platform request is received, and to start a data deletion module when receiving the push notification or the platform request;
所述数据删除模块, 用于删除数据。  The data deletion module is configured to delete data.
7、 如权利要求 6所述的移动终端, 其特征在于, 还包括 SIM卡验证模 块, 用于验证 SIM卡, 并判断 SIM卡验证是否通过。  7. The mobile terminal of claim 6, further comprising a SIM card verification module for verifying the SIM card and determining whether the SIM card verification is passed.
8、 如权利要求 7所述的移动终端, 其特征在于, 所述应用管理***还 用于, 在当 SIM卡验证通过时, 在监听端口监听推入通知; 以及用于判断 推入通知是否为监控移动终端发出, 当是监控移动终端发出时, 启动数据 删除模块删除数据。  The mobile terminal according to claim 7, wherein the application management system is further configured to: when the SIM card passes the verification, monitor the push notification on the listening port; and determine whether the push notification is The monitoring mobile terminal sends out, when the monitoring mobile terminal sends out, the data deletion module is started to delete the data.
9、 如权利要求 7所述的移动终端, 其特征在于, 还包括密码模块, 用 于在 SIM卡验证未通过时,提示用户输入密码; 以及接收用户输入的密码, 并判断所述输入密码是否正确。  The mobile terminal according to claim 7, further comprising a password module, configured to prompt the user to input a password when the SIM card verification fails, and receive a password input by the user, and determine whether the input password is correct.
10、 如权利要求 9所述的移动终端, 其特征在于, 所述密码模块还用 于记录输入密码失败的次数, 并判断所述输入密码失败的次数是否大于预 设值。  The mobile terminal according to claim 9, wherein the cryptographic module is further configured to record the number of times the password is failed, and determine whether the number of times the password is failed is greater than a preset value.
11、 一种移动终端监控***, 其特征在于, 包括监控移动终端和被监 控移动终端, 其中:  11. A mobile terminal monitoring system, comprising: monitoring a mobile terminal and a monitored mobile terminal, wherein:
所述监控移动终端, 用于向被监控移动终端发送推入通知;  The monitoring mobile terminal is configured to send a push notification to the monitored mobile terminal;
所述被监控移动终端包括应用管理***和数据删除模块, 所述应用管 理***, 用于判断是否接收到平台请求或者所述推入通知, 以及在接收到 所述推入通知或者所述平台请求时, 启动所述数据删除模块; 所述数据删 除模块, 用于删除数据。 The monitored mobile terminal includes an application management system and a data deletion module, where the application management system is configured to determine whether a platform request or the push notification is received, and the push notification or the platform request is received. When the data deletion module is started; the data deletion In addition to modules, used to delete data.
12、 如权利要求 11所述的移动终端监控***, 其特征在于, 所述被监 控移动终端还包括 SIM卡验证模块,用于验证 SIM卡,并判断 SIM卡验证 是否通过。  The mobile terminal monitoring system according to claim 11, wherein the monitored mobile terminal further comprises a SIM card verification module, configured to verify the SIM card, and determine whether the SIM card verification is passed.
13、 如权利要求 12所述的移动终端监控***, 其特征在于, 所述应用 管理***还用于, 在当 SIM卡验证通过时, 在监听端口监听推入通知; 以 及用于判断推入通知是否为监控移动终端发出, 当是监控移动终端发出时, 启动数据删除模块删除数据。  The mobile terminal monitoring system according to claim 12, wherein the application management system is further configured to: when the SIM card is verified to pass, monitor the push notification on the listening port; and determine the push notification Whether it is sent for monitoring the mobile terminal, when it is sent by the monitoring mobile terminal, the data deletion module is started to delete the data.
14、 如权利要求 12所述的移动终端监控***, 其特征在于, 所述被监 控移动终端还包括密码模块, 用于在 SIM卡验证未通过时, 提示用户输入 密码; 以及接收用户输入的密码, 并判断所述输入密码是否正确。  The mobile terminal monitoring system according to claim 12, wherein the monitored mobile terminal further comprises a password module, configured to prompt the user to input a password when the SIM card verification fails, and receive the password input by the user. And judge whether the input password is correct.
15、 如权利要求 14所述的移动终端监控***, 其特征在于, 密码模块 还用于记录输入密码失败的次数, 并判断所述输入密码失败的次数是否大 于预设值。  The mobile terminal monitoring system according to claim 14, wherein the cryptographic module is further configured to record the number of times the password is failed, and determine whether the number of times the password is failed is greater than a preset value.
PCT/CN2010/076031 2010-05-11 2010-08-16 Mobile terminal, data protection method of mobile terminal and monitor system of mobile terminal WO2011140756A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010174791.1 2010-05-11
CN201010174791.1A CN101877848B (en) 2010-05-11 2010-05-11 Mobile terminal, mobile terminal data protection method and mobile terminal monitoring system

Publications (1)

Publication Number Publication Date
WO2011140756A1 true WO2011140756A1 (en) 2011-11-17

Family

ID=43020291

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/076031 WO2011140756A1 (en) 2010-05-11 2010-08-16 Mobile terminal, data protection method of mobile terminal and monitor system of mobile terminal

Country Status (2)

Country Link
CN (1) CN101877848B (en)
WO (1) WO2011140756A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111343265A (en) * 2020-02-20 2020-06-26 深圳前海微众银行股份有限公司 Information pushing method, device, equipment and readable storage medium

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9462061B2 (en) 2012-09-14 2016-10-04 Tencent Technology (Shenzhen) Company Limited Method, device, server, and system for managing devices
CN102843436B (en) * 2012-09-14 2016-06-01 腾讯科技(深圳)有限公司 A kind of device management method, equipment, server and system
EA201300533A1 (en) * 2013-03-07 2014-09-30 Общество с ограниченной ответственностью "Синезис" METHOD AND SYSTEM OF OPERATIONAL TRANSFER OF MESSAGE WITH VIDEO DATA
CN103338301A (en) * 2013-06-13 2013-10-02 福建伊时代信息科技股份有限公司 Data clearing method, data clearing device and terminal
CN104732150B (en) * 2015-03-05 2018-09-04 广东欧珀移动通信有限公司 A kind of mobile terminal-opening method and device
CN112910868A (en) * 2021-01-21 2021-06-04 平安信托有限责任公司 Enterprise network security management method and device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101600208A (en) * 2008-06-02 2009-12-09 深圳富泰宏精密工业有限公司 Mobile phone storage data auto-destruct system and method
TW200951756A (en) * 2008-06-12 2009-12-16 Unication Co Ltd Security and protection system of a mobile communication device
CN101656966A (en) * 2009-09-01 2010-02-24 成都市华为赛门铁克科技有限公司 Data protection method of mobile terminal, device thereof and mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101600208A (en) * 2008-06-02 2009-12-09 深圳富泰宏精密工业有限公司 Mobile phone storage data auto-destruct system and method
TW200951756A (en) * 2008-06-12 2009-12-16 Unication Co Ltd Security and protection system of a mobile communication device
CN101656966A (en) * 2009-09-01 2010-02-24 成都市华为赛门铁克科技有限公司 Data protection method of mobile terminal, device thereof and mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111343265A (en) * 2020-02-20 2020-06-26 深圳前海微众银行股份有限公司 Information pushing method, device, equipment and readable storage medium
CN111343265B (en) * 2020-02-20 2021-03-19 深圳前海微众银行股份有限公司 Information pushing method, device, equipment and readable storage medium

Also Published As

Publication number Publication date
CN101877848B (en) 2014-12-10
CN101877848A (en) 2010-11-03

Similar Documents

Publication Publication Date Title
EP3691215B1 (en) Access token management method, terminal and server
KR101269955B1 (en) Method and apparatus for creating a remotely activated secure backup service for mobile handsets
US8213971B2 (en) Apparatus and method for activating computer applications with SMS messaging
WO2011140756A1 (en) Mobile terminal, data protection method of mobile terminal and monitor system of mobile terminal
JP5893169B2 (en) Anti-theft protection method and device for mobile phone
EP2448303B1 (en) Method and system for securing data of a mobile communications device
US8732827B1 (en) Smartphone security system
US20090298468A1 (en) System and method for deleting data in a communication device
WO2014032612A1 (en) Method, device, server, system, and apparatus for preventing information leakage
WO2011137605A1 (en) Mobile terminal location system, method and mobile terminal
CN101155212A (en) Method for limiting use of mobile terminal
WO2015024261A1 (en) Internet account number management method, manager, server and system
US20110242967A1 (en) Control of a mobile device
WO2010060242A1 (en) An authentication method for the mobile terminal and a system thereof
US8626121B2 (en) Tracking mobile communication devices
WO2015096501A1 (en) Method and apparatus for managing super user password on smart mobile terminal
WO2011130970A1 (en) Device and method for protecting data of mobile terminal
WO2013185689A1 (en) Authentication method, authentication apparatus and authentication device
CN104969176B (en) Method, device and medium for managing access of application to certificate and secret key
WO2010133108A1 (en) Method, system and mobile terminal for retrieving flash data of a mobile terminal
CN108664805B (en) Application program safety verification method and system
WO2008089638A1 (en) Method and communication terminal of controlling user information on the communication termial
US20120289195A1 (en) Remote mobile device information retrieval
JP2008026929A (en) Security system, information processor, information protection method and program
WO2016015199A1 (en) Locking method, device, terminal and server

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10851261

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10851261

Country of ref document: EP

Kind code of ref document: A1