WO2012041096A1 - Procédé adapté pour protéger la sécurité des données d'un téléphone mobile - Google Patents
Procédé adapté pour protéger la sécurité des données d'un téléphone mobile Download PDFInfo
- Publication number
- WO2012041096A1 WO2012041096A1 PCT/CN2011/076627 CN2011076627W WO2012041096A1 WO 2012041096 A1 WO2012041096 A1 WO 2012041096A1 CN 2011076627 W CN2011076627 W CN 2011076627W WO 2012041096 A1 WO2012041096 A1 WO 2012041096A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- sim card
- mobile phone
- information
- protecting
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
Definitions
- the present invention relates to the field of mobile communications, and more particularly to a method of securing mobile phone information.
- Mobile phones have become an indispensable tool in people's daily life, and they can store almost all personal and private information of users. If the user loses the mobile phone, the mobile phone falls into the hands of others, and the information stored on the mobile phone is used by others, which may cause unnecessary loss to the user. At the same time, with the popularity of mobile phones, people's speed of replacing mobile phones has also accelerated significantly. It is not new for a person to have multiple mobile phones and multiple SIM cards. The mobile phones that users have eliminated are often used by others, or because of the functions of different mobile phones, the use of exchanged mobile phones also occurs. There are often some mobile phones that are unwilling to be seen by others, but want to save information, or information that is inconvenient to delete. How to deal with this information before giving it to others?
- the technical problem to be solved by the present invention is to provide a method for protecting mobile phone information security against the above-mentioned drawbacks of the prior art.
- the technical solution adopted by the present invention to solve the technical problem thereof is to provide a method for protecting information security of a mobile phone, and the method includes the following steps:
- the mobile phone system identifies the inserted SIM card, and establishes a virtual database to record the identity information of the SIM card;
- the system determines information generated based on the inserted SIM card.
- the system when the SIM card is removed or invalidated, the system will automatically close the database to directly hide the related information generated based on the SIM card;
- the failure of the SIM card means that when the user loses the mobile phone, the application for the SIM card is invalidated by the operator.
- the SIM card in the mobile phone is a failed card. After the system detects it, it will automatically close the database generated based on the SIM card, hide the information in the mobile phone, and prevent personal privacy information from being used by others to cause greater losses;
- the information generated by the SIM card includes an address book, a communication record, a short message record, a multimedia message record, a recording, a video, and a photo.
- the mobile phone system includes a setting item, when the remaining memory of the system is too small, affecting the use, the system will ask the user whether to delete a SIM.
- the information generated by the card is generated by the card.
- the mobile phone system further includes a setting item, when the SIM card is inserted, the mobile phone system prompts whether to work in the private information protection mode; If yes, enter the private information protection mode; if not, run in the normal mode.
- the above-mentioned method for protecting mobile phone information security is applicable to a single card or a multi-card mobile phone.
- the system recognizes different SIM cards in units of card slots and establishes different databases. Even in the same multi-card mobile phone, the inserted SIM card insertion position cannot be seen.
- the invention provides a method for protecting the information security of a mobile phone, which can effectively ensure the security of the user's mobile phone information and relieve the user's worries.
- FIG. 1 is a flow chart 1 of a method for protecting a mobile phone information security according to an embodiment of the present invention
- FIG. 2 is a flow chart 2 of a method for protecting an information security of a mobile phone according to an embodiment of the present invention.
- the method includes the following steps:
- T1 insert an A-SIM card
- the mobile phone system identifies the inserted A-SIM card, and establishes a virtual database to record the identity information of the A-SIM card;
- the system determines information generated based on the inserted A-SIM card; the information generated by the SIM card includes an address book, a communication record, a short message record, a multimedia message record, a recording, a video, and a photo.
- the system will automatically close the database and directly hide the related information generated based on the A-SIM card.
- the failure of the SIM card means that the SIM card is applied to the operator after the user loses the mobile phone. The card is invalid. At this time, the SIM card in the mobile phone is a failed card. After the system detects it, it will automatically hide the information in the mobile phone to prevent personal privacy information from being used by others to cause greater losses.
- the mobile phone system identifies the inserted B-SIM card and establishes a virtual database to record the identity information of the B-SIM card; the system determines the information generated based on the inserted B-SIM card;
- T6 Re-inserting a valid A-SIM card, the system will resume displaying various information in the database generated based on the A-SIM card, and automatically hide the database generated based on the B-SIM card.
- the system Since the mobile phone constantly uses different SIM cards and does not delete the information generated by the previous SIM card every time, the system will continuously create a new virtual database, and the remaining memory capacity will be continuously reduced, so the mobile phone system is still Including a setting item, when the remaining memory of the system is too small, until the memory capacity is lower than a certain threshold, the system will ask the user whether to delete the information generated by a SIM card. The user can choose to delete the database information under the current SIM, or select the database information generated by the SIM card used in the previous time period. When this operation is performed, the system will not display the related information of the deleted SIM card database.
- the mobile phone system further includes a setting item.
- the mobile phone system prompts whether to work in the private information protection mode; if yes, enters the private information protection mode; if not, in the normal mode run. That is, information access is not restricted by the SIM card, and other SIM cards can also be consulted by inserting different SIM cards.
- this setting is only valid for the SIM card corresponding to the setting. If you change a SIM card, the setting will be invalid, and the user can re-set the new settings and select the mode in which the mobile phone works under the new SIM card.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
La présente invention se rapporte à un procédé adapté pour protéger la sécurité des données d'un téléphone mobile. Le procédé selon l'invention comprend les étapes suivantes : une carte SIM (Subscriber Identity Module, module d'authentification d'identité d'abonné) est insérée; le système du téléphone mobile identifie la carte SIM insérée et crée une base de données virtuelle pour enregistrer les données d'identité d'abonné de la carte SIM; le système détermine les données qui sont générées en fonction de la carte SIM qui a été insérée; après que la carte SIM a été retirée ou est devenue invalide, le système ferme automatiquement la base de données et masque directement les données associées qui sont générées sur la base de la carte SIM; quand la carte SIM valide est à nouveau insérée après avoir été retirée, le système récupère l'affichage des données qui sont générées sur la base de la carte SIM. Avec le procédé adapté pour protéger la sécurité des données d'un téléphone mobile selon l'invention, la sécurité des données du téléphone mobile de l'utilisateur peut être garantie d'une manière extrêmement efficace et les inquiétudes de l'utilisateur peuvent être dissipées.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201010299838.7 | 2010-09-30 | ||
| CN2010102998387A CN101951606A (zh) | 2010-09-30 | 2010-09-30 | 一种保护手机信息安全的方法 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2012041096A1 true WO2012041096A1 (fr) | 2012-04-05 |
Family
ID=43454933
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2011/076627 Ceased WO2012041096A1 (fr) | 2010-09-30 | 2011-06-30 | Procédé adapté pour protéger la sécurité des données d'un téléphone mobile |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN101951606A (fr) |
| WO (1) | WO2012041096A1 (fr) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101951606A (zh) * | 2010-09-30 | 2011-01-19 | 深圳桑菲消费通信有限公司 | 一种保护手机信息安全的方法 |
| CN103402002A (zh) * | 2013-07-15 | 2013-11-20 | 宇龙计算机通信科技(深圳)有限公司 | 通讯录管理方法及终端 |
| CN105635465A (zh) * | 2015-12-30 | 2016-06-01 | 中科创达软件股份有限公司 | 数据隔离方法、数据隔离装置及终端 |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1606373A (zh) * | 2003-10-07 | 2005-04-13 | 三星电子株式会社 | 用于保护私人内容的移动通信终端及对其进行控制的方法 |
| CN1703063A (zh) * | 2004-05-25 | 2005-11-30 | 日本电气株式会社 | 移动通信终端 |
| CN1889728A (zh) * | 2005-06-27 | 2007-01-03 | 集嘉通讯股份有限公司 | 具信息隐藏功能的手持式移动通讯装置及其数据隐藏方法 |
| CN101674583A (zh) * | 2009-08-25 | 2010-03-17 | 联信摩贝软件(北京)有限公司 | 更换sim卡隐藏或恢复个人信息的方法和系统 |
| CN101951606A (zh) * | 2010-09-30 | 2011-01-19 | 深圳桑菲消费通信有限公司 | 一种保护手机信息安全的方法 |
-
2010
- 2010-09-30 CN CN2010102998387A patent/CN101951606A/zh active Pending
-
2011
- 2011-06-30 WO PCT/CN2011/076627 patent/WO2012041096A1/fr not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1606373A (zh) * | 2003-10-07 | 2005-04-13 | 三星电子株式会社 | 用于保护私人内容的移动通信终端及对其进行控制的方法 |
| CN1703063A (zh) * | 2004-05-25 | 2005-11-30 | 日本电气株式会社 | 移动通信终端 |
| CN1889728A (zh) * | 2005-06-27 | 2007-01-03 | 集嘉通讯股份有限公司 | 具信息隐藏功能的手持式移动通讯装置及其数据隐藏方法 |
| CN101674583A (zh) * | 2009-08-25 | 2010-03-17 | 联信摩贝软件(北京)有限公司 | 更换sim卡隐藏或恢复个人信息的方法和系统 |
| CN101951606A (zh) * | 2010-09-30 | 2011-01-19 | 深圳桑菲消费通信有限公司 | 一种保护手机信息安全的方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN101951606A (zh) | 2011-01-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1469692B1 (fr) | Terminal mobile, procédé de gestion des données là-dedans, et programme d'ordinateur pour cette gestion de données | |
| CN101287193A (zh) | 保护使用相关联用户识别卡时存储在手机上信息的方法 | |
| WO2012041096A1 (fr) | Procédé adapté pour protéger la sécurité des données d'un téléphone mobile | |
| CN101951568B (zh) | 短信信息拦截处理方法及装置 | |
| WO2018023394A1 (fr) | Procédé d'extraction automatique d'un code de vérification à partir d'un message court, et téléphone mobile | |
| WO2018023638A1 (fr) | Procédé de poussée d'informations pour une gestion centralisée de nouvelles, et système de poussée de nouvelles | |
| WO2017128265A1 (fr) | Procédé de notification d'informations lors du tri d'images, et terminal mobile | |
| WO2017128058A1 (fr) | Procédé d'envoi d'informations destiné à être utilisé durant un envoi de vidéo automatique, et système d'envoi | |
| WO2018023807A1 (fr) | Procédé d'affichage de propriété de technologie pendant le blocage d'informations et système d'autorisation | |
| WO2018027771A1 (fr) | Procédé de diffusion sélective d'informations pendant une mise en correspondance d'un format de texte en fonction d'un geste et système de texte | |
| WO2018027617A1 (fr) | Procédé permettant d'enregistrer automatiquement un appel sur la base d'un mot-clé et système d'enregistrement | |
| WO2017128094A1 (fr) | Procédé de distribution automatique d'informations à utiliser lorsqu'un espace de stationnement libre est affiché, et système d'affichage | |
| WO2017120919A1 (fr) | Procédé de filtrage de message court, et terminal mobile | |
| CN2894167Y (zh) | 一种可自动保护用户识别模块的移动终端 | |
| WO2017128395A1 (fr) | Procédé de transfert d'informations lors de la notification à un client de gérer des actifs, et système de notification d'investissement intelligent | |
| WO2017128266A1 (fr) | Procédé de tri d'images, et terminal mobile | |
| KR20090042617A (ko) | 유심카드의 개인정보의 보관 및 이동을 위한 시스템 및방법 | |
| WO2017128341A1 (fr) | Procédé de partage d'informations de liaison, et terminal mobile | |
| WO2018023560A1 (fr) | Procédé d'affichage d'informations techniques lors de la fermeture d'un logiciel non applicable, et téléphone mobile | |
| WO2017124408A1 (fr) | Procédé de pousser d'informations pendant un remplacement automatique de chanson sur un téléphone mobile, et système de remplacement de chanson | |
| WO2017124247A1 (fr) | Procédé de pousser d'informations lorsqu'une liste de contacts est en correspondance et système intelligent de distinction d'informations | |
| WO2018023396A1 (fr) | Procédé de poussée d'informations destiné à être utilisé avec l'extraction d'un code de vérification, et téléphone mobile | |
| WO2017128076A1 (fr) | Procédé d'affichage d'informations destiné à une technologie de pousser d'actualités, et système de pousser | |
| WO2018027395A1 (fr) | Procédé de pousser d'information utilisé dans un logiciel de configuration, et système de gestion de batteries | |
| WO2017124258A1 (fr) | Procédé et système permettant d'empêcher automatiquement un dysfonctionnement de téléphone mobile |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11827992 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 11827992 Country of ref document: EP Kind code of ref document: A1 |