CN101426198A - Mobile phone information protecting method - Google Patents
Mobile phone information protecting method Download PDFInfo
- Publication number
- CN101426198A CN101426198A CNA2008102165785A CN200810216578A CN101426198A CN 101426198 A CN101426198 A CN 101426198A CN A2008102165785 A CNA2008102165785 A CN A2008102165785A CN 200810216578 A CN200810216578 A CN 200810216578A CN 101426198 A CN101426198 A CN 101426198A
- Authority
- CN
- China
- Prior art keywords
- information
- guard method
- mobile phone
- protection function
- cellphone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a method for protecting information of mobile phone, which comprises the following procedures: procedure a, determining whether an information protecting function is opened; and procedure b, deleting the information in the mobile phone if the information protecting function is opened. The method for protecting information of mobile phone according to the invention can delete the information in the mobile phone through an information protecting function by the user when the mobile phone is lost. The leakage of personal information is prevented and the lost information can be obtained again simultaneously. The larger lost of user is prevented.
Description
Technical field
The invention belongs to field of mobile terminals, relate in particular to the protection of personal information method after a kind of mobile phone is lost.
Background technology
At present, it is commonplace that mobile phone is lost phenomenon, a lot of users have not only lost very important information (comprising personal information such as address list, short message, memorandum, video, photo) thereupon behind lost mobile phone, the work of giving and life bring inconvenience, but also worry that these information might be obtained and improper utilization by other people, result in greater loss and bother.Prior art can't effectively be protected the information in the mobile phone after mobile phone be lost, and to avoid bringing bigger loss to the user, therefore provides real necessity that belongs to of guard method of a kind of cellphone information.
Summary of the invention
The object of the present invention is to provide a kind of guard method of cellphone information, be intended to solve the problem that can't effectively protect the information in the lost handset that exists in the prior art.
The present invention is achieved in that a kind of guard method of cellphone information, and it may further comprise the steps:
Step a judges whether to open the information protection function;
Step b is if open the information protection function then delete information in the mobile phone.
The situation of change that detects SIM card by when start among the described step a judges whether to open the information protection function.
Judge whether to open the information protection function by resolving the control short message among the described step a.
Change if detect SIM card among the step a, then point out current user to remove the information protection function, if password input error number of times surpasses pre-determined number then enters the information protection function by the predefined proper password of input.
Need the control of log-on message defencive function short message if be resolved among the step a, do any prompting then for current user and just directly enter the information protection function.
In described step b, earlier the information in the mobile phone is sent to the e-mail address that sets in advance, and then delete these information.
In described step b, earlier the information in the mobile phone is sent to the phone number that sets in advance, and then delete these information.
Described information comprises address list, short message, memorandum, video, photo.
Deletion action among the described step b does not need current user's permission.
Described SIM card changes and comprises the situation of not inserting SIM card.
The guard method of cellphone information provided by the invention can make the user delete information by the information protection function after lost mobile phone, prevents leakage of personal information, also the information of losing can be given for change again simultaneously, avoids bringing bigger loss to the user.
Description of drawings
Fig. 1 is the guard method flow chart of cellphone information provided by the invention.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with embodiment.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
Shown in Fig. 1; the guard method of cellphone information of the present invention comprises a step 10 of judging whether the information protection function opens; described information protection function is meant the information in the deletion mobile phone; these information include but not limited to personal information such as address list, short message, memorandum, video, photo; certainly, information protection function can also send to predetermined e-mail address or phone number with information before these information of deletion.
What need Special attention will be given to is; step 10 can be to carry out when mobile phone power-on; promptly when mobile phone power-on, detect the SIM card situation of change and judge whether to open the information protection function; for example after the user loses mobile phone; if other unauthorized users obtain this mobile phone and have changed SIM card (obviously; also can be the mobile phone card of other types); system can detect SIM and change and setting up procedure 10; certainly; in step 10; a password can be set; make and to come temporary transient mask information defencive function (certainly, after mobile phone was changed SIM card, the user can reset the information protection function at new SIM card once more) by importing this proper password when user oneself changes SIM card; if the user inputs the password mistake and surpasses predetermined times (for example five times), then enter the information protection function.
On the other hand; after if the user loses mobile phone; other unauthorized users obtain this mobile phone and use original SIM card; then step 10 can be started by former machine master; be that former machine master sends a short message (as " xxbh+ password ") that has control command; mobile phone parses control command in the short message by short message command analysis device; carry out the information protection function then; in such cases; the information protection function can be carried out on the backstage fully; neither need the user to permit, also do not point out to the user.
After so no matter mobile phone was lost, whether SIM card originally was used, and can start the cellphone information defencive function.
If the judged result in the step 10 is the log-on message defencive function; then execution in step 11; read broadcast message; and send to contact person in all phone directories; this measure is that other people swindle or harass the contact person in the mobile phone in order to prevent mobile phone to lose the back; broadcast message can be " I am Zhang San, and my mobile phone is lost, please not credulous all information that send with my name ".
Execution in step 12 then, judge whether original user has filled in e-mail address (being the Email address), if filled in, then execution in step 13, collect the information in the mobile phone, and judge in step 14 whether mobile phone supports the Email client, if support, then start the Email client all information that can give for change are sent to corresponding e-mail address, judge in step 16 whether Email sends success, if send successfully then delete information, the information that prevents is utilized by other people, last termination routine.If step 12,14,16 judged result be not for, promptly can't send information by Email, then judge by step 17 whether the user has filled in the backup cell-phone number in advance, if do not fill in, then by the direct deletion information of step 19, though fail the information of fetching this moment, but also prevented the leakage of information, if the judged result of step 17 is for being then information to be sent to backup phone number and then deletion information.Same, in the process of deletion information and transmission information (comprise and send to e-mail address and backup cell-phone number), neither need the user to permit, do not point out to the user yet.
The above only is preferred embodiment of the present invention, and in order to restriction the present invention, for example, SIM card does not change and comprises the situation of not inserting SIM card yet, the use because some mobile phone also can be started shooting under the situation of not inserting SIM.All any modifications of being done within the spirit and principles in the present invention, be equal to and replace and improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1, a kind of guard method of cellphone information is characterized in that may further comprise the steps:
Step a judges whether to open the information protection function;
Step b is if open the information protection function then delete information in the mobile phone.
2, the guard method of cellphone information according to claim 1 is characterized in that: the situation of change that detects SIM card by when start among the described step a judges whether to open the information protection function.
3, the guard method of the cellphone information of stating according to claim 2 is characterized in that: judge whether to open the information protection function by resolving the control short message among the described step a.
4, the guard method of cellphone information according to claim 2; it is characterized in that: change if detect SIM card among the step a; then point out current user to remove the information protection function, if password input error number of times surpasses pre-determined number then enters the information protection function by the predefined proper password of input.
5, the guard method of cellphone information according to claim 2 is characterized in that: need the control of log-on message defencive function short message if be resolved among the step a, do any prompting then for current user and just directly enter the information protection function.
6, the guard method of cellphone information according to claim 1 and 2 is characterized in that: earlier the information in the mobile phone is sent to the e-mail address that sets in advance in described step b, and then delete these information.
7, the guard method of cellphone information according to claim 1 and 2 is characterized in that: earlier the information in the mobile phone is sent to the phone number that sets in advance in described step b, and then delete these information.
8, the guard method of cellphone information according to claim 1 is characterized in that: described information comprises address list, short message, memorandum, video, photo.
9, the guard method of cellphone information according to claim 1 is characterized in that: the deletion action among the described step b does not need current user's permission.
10, the guard method of cellphone information according to claim 4 is characterized in that: described SIM card changes and comprises the situation of not inserting SIM card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008102165785A CN101426198A (en) | 2008-09-27 | 2008-09-27 | Mobile phone information protecting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008102165785A CN101426198A (en) | 2008-09-27 | 2008-09-27 | Mobile phone information protecting method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101426198A true CN101426198A (en) | 2009-05-06 |
Family
ID=40616485
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2008102165785A Pending CN101426198A (en) | 2008-09-27 | 2008-09-27 | Mobile phone information protecting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101426198A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
CN102547674A (en) * | 2012-03-09 | 2012-07-04 | 浙江大学城市学院 | Data anti-theft method and device for mobile station |
CN102638779A (en) * | 2012-03-20 | 2012-08-15 | 深圳市金立通信设备有限公司 | Mobile phone anti-theft system and mobile phone anti-theft method |
CN102929807A (en) * | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
CN104270715A (en) * | 2014-10-08 | 2015-01-07 | 宁夏天纵泓光余热发电技术有限公司 | Security and protection method for achieving security and protection function of mobile phone |
CN104284026A (en) * | 2014-10-08 | 2015-01-14 | 宁夏天纵泓光余热发电技术有限公司 | Mobile phone with security and protection function |
CN104301493A (en) * | 2014-10-27 | 2015-01-21 | 宁夏天纵泓光余热发电技术有限公司 | Method for actively returning address book based on biological characteristics |
CN104853030A (en) * | 2015-03-17 | 2015-08-19 | 广东欧珀移动通信有限公司 | Information processing method and mobile terminal |
CN105050042A (en) * | 2015-06-25 | 2015-11-11 | 邱兰 | Intelligent mobile phone management method |
CN106332028A (en) * | 2016-09-29 | 2017-01-11 | 努比亚技术有限公司 | Method and device for identifying fraudulent text message |
CN106576124A (en) * | 2014-09-23 | 2017-04-19 | 迈克菲股份有限公司 | Device lock while in motion |
CN108769981A (en) * | 2018-06-09 | 2018-11-06 | 深圳市宝尔爱迪科技有限公司 | A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption |
CN112969182A (en) * | 2021-02-26 | 2021-06-15 | 北京小米移动软件有限公司 | PIN code setting method and device and terminal equipment |
CN116757900A (en) * | 2023-08-23 | 2023-09-15 | 四川国消云科技有限公司 | Smart city information security guarantee system and implementation method |
-
2008
- 2008-09-27 CN CNA2008102165785A patent/CN101426198A/en active Pending
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
CN102547674A (en) * | 2012-03-09 | 2012-07-04 | 浙江大学城市学院 | Data anti-theft method and device for mobile station |
CN102638779A (en) * | 2012-03-20 | 2012-08-15 | 深圳市金立通信设备有限公司 | Mobile phone anti-theft system and mobile phone anti-theft method |
CN102929807A (en) * | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
CN106576124A (en) * | 2014-09-23 | 2017-04-19 | 迈克菲股份有限公司 | Device lock while in motion |
CN104270715A (en) * | 2014-10-08 | 2015-01-07 | 宁夏天纵泓光余热发电技术有限公司 | Security and protection method for achieving security and protection function of mobile phone |
CN104284026A (en) * | 2014-10-08 | 2015-01-14 | 宁夏天纵泓光余热发电技术有限公司 | Mobile phone with security and protection function |
CN104301493A (en) * | 2014-10-27 | 2015-01-21 | 宁夏天纵泓光余热发电技术有限公司 | Method for actively returning address book based on biological characteristics |
CN104853030A (en) * | 2015-03-17 | 2015-08-19 | 广东欧珀移动通信有限公司 | Information processing method and mobile terminal |
CN104853030B (en) * | 2015-03-17 | 2017-06-30 | 广东欧珀移动通信有限公司 | The method and mobile terminal of a kind of information processing |
CN105050042A (en) * | 2015-06-25 | 2015-11-11 | 邱兰 | Intelligent mobile phone management method |
CN106332028A (en) * | 2016-09-29 | 2017-01-11 | 努比亚技术有限公司 | Method and device for identifying fraudulent text message |
CN108769981A (en) * | 2018-06-09 | 2018-11-06 | 深圳市宝尔爱迪科技有限公司 | A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption |
CN112969182A (en) * | 2021-02-26 | 2021-06-15 | 北京小米移动软件有限公司 | PIN code setting method and device and terminal equipment |
CN112969182B (en) * | 2021-02-26 | 2023-09-26 | 北京小米移动软件有限公司 | PIN code setting method, PIN code setting device and terminal equipment |
CN116757900A (en) * | 2023-08-23 | 2023-09-15 | 四川国消云科技有限公司 | Smart city information security guarantee system and implementation method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101426198A (en) | Mobile phone information protecting method | |
WO2016101384A1 (en) | Dual-system switch based data security processing method and apparatus | |
CN100473194C (en) | Handset anti-theft method | |
WO2016045191A1 (en) | Information processing method and information processing device | |
CN102413221B (en) | Method for protecting privacy information and mobile terminal | |
EP2693782B1 (en) | Method for backuping and recovering data of mobile terminal and mobile terminal thereof | |
US20070021103A1 (en) | Method of protecting information in a mobile communication device | |
CN103559455A (en) | Android device personal information protection method based on user identification | |
CN103647784A (en) | Public and private isolation method and device | |
CN102955904A (en) | Method and system for preventing secret divulgation of mobile communication equipment | |
CN105472093B (en) | Mobile terminal call answers method for authenticating and mobile terminal | |
CN101815116A (en) | Mobile telephone method and device based on multi-user | |
CN101626571A (en) | Card information backup method and system of user identification card | |
CN101877848B (en) | Mobile terminal, mobile terminal data protection method and mobile terminal monitoring system | |
CN101483861A (en) | Method for mobile phone information safety protection | |
US8626121B2 (en) | Tracking mobile communication devices | |
CN101330692A (en) | Mobile phone with lose-proof function and method for preventing mobile phone from losing | |
CN107872446B (en) | Communication account management method and device and server | |
CN107172602B (en) | Data security protection method and device for mobile terminal | |
CN107704337B (en) | Factory setting restoring method, mobile terminal and device with storage function | |
KR100737803B1 (en) | Method for protecting user information in mobile communication terminal and device?using the same and computer-readable medium having thereon a program performing function embodying the same | |
WO2010133108A1 (en) | Method, system and mobile terminal for retrieving flash data of a mobile terminal | |
WO2011088660A1 (en) | Method and apparatus for protecting cell-phone information content | |
CN103685676B (en) | The information processing method of blue tooth submachine, separated mobile terminal and blue tooth submachine | |
CN106714147A (en) | Privacy short message protection method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20090506 |