[go: up one dir, main page]

WO2012041096A1 - Procédé adapté pour protéger la sécurité des données d'un téléphone mobile - Google Patents

Procédé adapté pour protéger la sécurité des données d'un téléphone mobile Download PDF

Info

Publication number
WO2012041096A1
WO2012041096A1 PCT/CN2011/076627 CN2011076627W WO2012041096A1 WO 2012041096 A1 WO2012041096 A1 WO 2012041096A1 CN 2011076627 W CN2011076627 W CN 2011076627W WO 2012041096 A1 WO2012041096 A1 WO 2012041096A1
Authority
WO
WIPO (PCT)
Prior art keywords
sim card
mobile phone
information
protecting
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2011/076627
Other languages
English (en)
Chinese (zh)
Inventor
甘江飚
李伟
杨菁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sang Fei Consumer Communications Co Ltd
Original Assignee
Shenzhen Sang Fei Consumer Communications Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sang Fei Consumer Communications Co Ltd filed Critical Shenzhen Sang Fei Consumer Communications Co Ltd
Publication of WO2012041096A1 publication Critical patent/WO2012041096A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning

Definitions

  • the present invention relates to the field of mobile communications, and more particularly to a method of securing mobile phone information.
  • Mobile phones have become an indispensable tool in people's daily life, and they can store almost all personal and private information of users. If the user loses the mobile phone, the mobile phone falls into the hands of others, and the information stored on the mobile phone is used by others, which may cause unnecessary loss to the user. At the same time, with the popularity of mobile phones, people's speed of replacing mobile phones has also accelerated significantly. It is not new for a person to have multiple mobile phones and multiple SIM cards. The mobile phones that users have eliminated are often used by others, or because of the functions of different mobile phones, the use of exchanged mobile phones also occurs. There are often some mobile phones that are unwilling to be seen by others, but want to save information, or information that is inconvenient to delete. How to deal with this information before giving it to others?
  • the technical problem to be solved by the present invention is to provide a method for protecting mobile phone information security against the above-mentioned drawbacks of the prior art.
  • the technical solution adopted by the present invention to solve the technical problem thereof is to provide a method for protecting information security of a mobile phone, and the method includes the following steps:
  • the mobile phone system identifies the inserted SIM card, and establishes a virtual database to record the identity information of the SIM card;
  • the system determines information generated based on the inserted SIM card.
  • the system when the SIM card is removed or invalidated, the system will automatically close the database to directly hide the related information generated based on the SIM card;
  • the failure of the SIM card means that when the user loses the mobile phone, the application for the SIM card is invalidated by the operator.
  • the SIM card in the mobile phone is a failed card. After the system detects it, it will automatically close the database generated based on the SIM card, hide the information in the mobile phone, and prevent personal privacy information from being used by others to cause greater losses;
  • the information generated by the SIM card includes an address book, a communication record, a short message record, a multimedia message record, a recording, a video, and a photo.
  • the mobile phone system includes a setting item, when the remaining memory of the system is too small, affecting the use, the system will ask the user whether to delete a SIM.
  • the information generated by the card is generated by the card.
  • the mobile phone system further includes a setting item, when the SIM card is inserted, the mobile phone system prompts whether to work in the private information protection mode; If yes, enter the private information protection mode; if not, run in the normal mode.
  • the above-mentioned method for protecting mobile phone information security is applicable to a single card or a multi-card mobile phone.
  • the system recognizes different SIM cards in units of card slots and establishes different databases. Even in the same multi-card mobile phone, the inserted SIM card insertion position cannot be seen.
  • the invention provides a method for protecting the information security of a mobile phone, which can effectively ensure the security of the user's mobile phone information and relieve the user's worries.
  • FIG. 1 is a flow chart 1 of a method for protecting a mobile phone information security according to an embodiment of the present invention
  • FIG. 2 is a flow chart 2 of a method for protecting an information security of a mobile phone according to an embodiment of the present invention.
  • the method includes the following steps:
  • T1 insert an A-SIM card
  • the mobile phone system identifies the inserted A-SIM card, and establishes a virtual database to record the identity information of the A-SIM card;
  • the system determines information generated based on the inserted A-SIM card; the information generated by the SIM card includes an address book, a communication record, a short message record, a multimedia message record, a recording, a video, and a photo.
  • the system will automatically close the database and directly hide the related information generated based on the A-SIM card.
  • the failure of the SIM card means that the SIM card is applied to the operator after the user loses the mobile phone. The card is invalid. At this time, the SIM card in the mobile phone is a failed card. After the system detects it, it will automatically hide the information in the mobile phone to prevent personal privacy information from being used by others to cause greater losses.
  • the mobile phone system identifies the inserted B-SIM card and establishes a virtual database to record the identity information of the B-SIM card; the system determines the information generated based on the inserted B-SIM card;
  • T6 Re-inserting a valid A-SIM card, the system will resume displaying various information in the database generated based on the A-SIM card, and automatically hide the database generated based on the B-SIM card.
  • the system Since the mobile phone constantly uses different SIM cards and does not delete the information generated by the previous SIM card every time, the system will continuously create a new virtual database, and the remaining memory capacity will be continuously reduced, so the mobile phone system is still Including a setting item, when the remaining memory of the system is too small, until the memory capacity is lower than a certain threshold, the system will ask the user whether to delete the information generated by a SIM card. The user can choose to delete the database information under the current SIM, or select the database information generated by the SIM card used in the previous time period. When this operation is performed, the system will not display the related information of the deleted SIM card database.
  • the mobile phone system further includes a setting item.
  • the mobile phone system prompts whether to work in the private information protection mode; if yes, enters the private information protection mode; if not, in the normal mode run. That is, information access is not restricted by the SIM card, and other SIM cards can also be consulted by inserting different SIM cards.
  • this setting is only valid for the SIM card corresponding to the setting. If you change a SIM card, the setting will be invalid, and the user can re-set the new settings and select the mode in which the mobile phone works under the new SIM card.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

La présente invention se rapporte à un procédé adapté pour protéger la sécurité des données d'un téléphone mobile. Le procédé selon l'invention comprend les étapes suivantes : une carte SIM (Subscriber Identity Module, module d'authentification d'identité d'abonné) est insérée; le système du téléphone mobile identifie la carte SIM insérée et crée une base de données virtuelle pour enregistrer les données d'identité d'abonné de la carte SIM; le système détermine les données qui sont générées en fonction de la carte SIM qui a été insérée; après que la carte SIM a été retirée ou est devenue invalide, le système ferme automatiquement la base de données et masque directement les données associées qui sont générées sur la base de la carte SIM; quand la carte SIM valide est à nouveau insérée après avoir été retirée, le système récupère l'affichage des données qui sont générées sur la base de la carte SIM. Avec le procédé adapté pour protéger la sécurité des données d'un téléphone mobile selon l'invention, la sécurité des données du téléphone mobile de l'utilisateur peut être garantie d'une manière extrêmement efficace et les inquiétudes de l'utilisateur peuvent être dissipées.
PCT/CN2011/076627 2010-09-30 2011-06-30 Procédé adapté pour protéger la sécurité des données d'un téléphone mobile Ceased WO2012041096A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010299838.7 2010-09-30
CN2010102998387A CN101951606A (zh) 2010-09-30 2010-09-30 一种保护手机信息安全的方法

Publications (1)

Publication Number Publication Date
WO2012041096A1 true WO2012041096A1 (fr) 2012-04-05

Family

ID=43454933

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/076627 Ceased WO2012041096A1 (fr) 2010-09-30 2011-06-30 Procédé adapté pour protéger la sécurité des données d'un téléphone mobile

Country Status (2)

Country Link
CN (1) CN101951606A (fr)
WO (1) WO2012041096A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951606A (zh) * 2010-09-30 2011-01-19 深圳桑菲消费通信有限公司 一种保护手机信息安全的方法
CN103402002A (zh) * 2013-07-15 2013-11-20 宇龙计算机通信科技(深圳)有限公司 通讯录管理方法及终端
CN105635465A (zh) * 2015-12-30 2016-06-01 中科创达软件股份有限公司 数据隔离方法、数据隔离装置及终端

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1606373A (zh) * 2003-10-07 2005-04-13 三星电子株式会社 用于保护私人内容的移动通信终端及对其进行控制的方法
CN1703063A (zh) * 2004-05-25 2005-11-30 日本电气株式会社 移动通信终端
CN1889728A (zh) * 2005-06-27 2007-01-03 集嘉通讯股份有限公司 具信息隐藏功能的手持式移动通讯装置及其数据隐藏方法
CN101674583A (zh) * 2009-08-25 2010-03-17 联信摩贝软件(北京)有限公司 更换sim卡隐藏或恢复个人信息的方法和系统
CN101951606A (zh) * 2010-09-30 2011-01-19 深圳桑菲消费通信有限公司 一种保护手机信息安全的方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1606373A (zh) * 2003-10-07 2005-04-13 三星电子株式会社 用于保护私人内容的移动通信终端及对其进行控制的方法
CN1703063A (zh) * 2004-05-25 2005-11-30 日本电气株式会社 移动通信终端
CN1889728A (zh) * 2005-06-27 2007-01-03 集嘉通讯股份有限公司 具信息隐藏功能的手持式移动通讯装置及其数据隐藏方法
CN101674583A (zh) * 2009-08-25 2010-03-17 联信摩贝软件(北京)有限公司 更换sim卡隐藏或恢复个人信息的方法和系统
CN101951606A (zh) * 2010-09-30 2011-01-19 深圳桑菲消费通信有限公司 一种保护手机信息安全的方法

Also Published As

Publication number Publication date
CN101951606A (zh) 2011-01-19

Similar Documents

Publication Publication Date Title
EP1469692B1 (fr) Terminal mobile, procédé de gestion des données là-dedans, et programme d'ordinateur pour cette gestion de données
CN101287193A (zh) 保护使用相关联用户识别卡时存储在手机上信息的方法
WO2012041096A1 (fr) Procédé adapté pour protéger la sécurité des données d'un téléphone mobile
CN101951568B (zh) 短信信息拦截处理方法及装置
WO2018023394A1 (fr) Procédé d'extraction automatique d'un code de vérification à partir d'un message court, et téléphone mobile
WO2018023638A1 (fr) Procédé de poussée d'informations pour une gestion centralisée de nouvelles, et système de poussée de nouvelles
WO2017128265A1 (fr) Procédé de notification d'informations lors du tri d'images, et terminal mobile
WO2017128058A1 (fr) Procédé d'envoi d'informations destiné à être utilisé durant un envoi de vidéo automatique, et système d'envoi
WO2018023807A1 (fr) Procédé d'affichage de propriété de technologie pendant le blocage d'informations et système d'autorisation
WO2018027771A1 (fr) Procédé de diffusion sélective d'informations pendant une mise en correspondance d'un format de texte en fonction d'un geste et système de texte
WO2018027617A1 (fr) Procédé permettant d'enregistrer automatiquement un appel sur la base d'un mot-clé et système d'enregistrement
WO2017128094A1 (fr) Procédé de distribution automatique d'informations à utiliser lorsqu'un espace de stationnement libre est affiché, et système d'affichage
WO2017120919A1 (fr) Procédé de filtrage de message court, et terminal mobile
CN2894167Y (zh) 一种可自动保护用户识别模块的移动终端
WO2017128395A1 (fr) Procédé de transfert d'informations lors de la notification à un client de gérer des actifs, et système de notification d'investissement intelligent
WO2017128266A1 (fr) Procédé de tri d'images, et terminal mobile
KR20090042617A (ko) 유심카드의 개인정보의 보관 및 이동을 위한 시스템 및방법
WO2017128341A1 (fr) Procédé de partage d'informations de liaison, et terminal mobile
WO2018023560A1 (fr) Procédé d'affichage d'informations techniques lors de la fermeture d'un logiciel non applicable, et téléphone mobile
WO2017124408A1 (fr) Procédé de pousser d'informations pendant un remplacement automatique de chanson sur un téléphone mobile, et système de remplacement de chanson
WO2017124247A1 (fr) Procédé de pousser d'informations lorsqu'une liste de contacts est en correspondance et système intelligent de distinction d'informations
WO2018023396A1 (fr) Procédé de poussée d'informations destiné à être utilisé avec l'extraction d'un code de vérification, et téléphone mobile
WO2017128076A1 (fr) Procédé d'affichage d'informations destiné à une technologie de pousser d'actualités, et système de pousser
WO2018027395A1 (fr) Procédé de pousser d'information utilisé dans un logiciel de configuration, et système de gestion de batteries
WO2017124258A1 (fr) Procédé et système permettant d'empêcher automatiquement un dysfonctionnement de téléphone mobile

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11827992

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11827992

Country of ref document: EP

Kind code of ref document: A1