CN102480726A - Password protection method, password protection system and mobile terminal with same - Google Patents

Password protection method, password protection system and mobile terminal with same Download PDF

Info

Publication number
CN102480726A
CN102480726A CN2010105762287A CN201010576228A CN102480726A CN 102480726 A CN102480726 A CN 102480726A CN 2010105762287 A CN2010105762287 A CN 2010105762287A CN 201010576228 A CN201010576228 A CN 201010576228A CN 102480726 A CN102480726 A CN 102480726A
Authority
CN
China
Prior art keywords
identification card
temporary key
module
portable terminal
cryptogam
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010105762287A
Other languages
Chinese (zh)
Inventor
魏培刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BYD Co Ltd
Original Assignee
BYD Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BYD Co Ltd filed Critical BYD Co Ltd
Priority to CN2010105762287A priority Critical patent/CN102480726A/en
Publication of CN102480726A publication Critical patent/CN102480726A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a password protection method which comprises the following steps of: a configuration file is written into a first identification card; a first mobile terminal confirms the identity of a user; if the first mobile terminal confirms that the user identity is correct, the first mobile terminal reads the number of a second identification card in the configuration file, and randomly generates a temporary key; the first mobile terminal sends the temporary key to the second identification card according to the number of the second identification card; the first mobile terminal judges whether the temporary key is correct; if the temporary key is correct, the first mobile terminal allows the user to view the password file; and if the temporary key is wrong, the first mobile terminal forbids the user to view the password file. According to the password protection method disclosed by the embodiment of the invention, the password file is viewed by use of the temporary key stored in the identification card, thus the security is high, and the cost is low. The invention also discloses a password protection system and a mobile terminal with the same.

Description

Cipher code protection method, cipher protection system and have its portable terminal
Technical field
The present invention relates to communication technical field, particularly a kind of cipher code protection method, cipher protection system and have its portable terminal.
Background technology
In the middle of family life now, there is the multiple application scenarios that needs cryptoguard, such as the password of household theftproof system, a plurality of bank credit clip pins etc.When having a plurality of password simultaneously, user easier can forget Password, and brings trouble unnecessary when needs input password.
Can provide cipher protection system that a plurality of passwords are protected based on the problems referred to above.But existing cipher protection system all is based on special-purpose password basically and preserves chip, preserves being provided with of chip through password and realizes the password hold function.
Adopt password preservation chip to do to carry out cryptoguard and have following problem:
1) because cryptoguard needs extra chip support, increased the cost of hardware;
2) do not have time-sharing system, in a single day password is cracked just effectively permanent.After the user used password, password can not be by automatic preservation.
Summary of the invention
The object of the invention is intended to solve at least one of above-mentioned technological deficiency.Particularly having solved does not need extra chip to carry out cryptoguard, uses automatic preservation password at password.
For this reason, first purpose of the present invention is to provide a kind of cipher code protection method.This method can provide can provide safe cryptoguard to the user, and the realization cost of this method is low.
Second purpose of the present invention is a kind of cipher protection system.
The 3rd purpose of the present invention is to provide a kind of portable terminal with above-mentioned cipher protection system.
For realizing above-mentioned purpose, the embodiment of first aspect present invention has proposed a kind of cipher code protection method, comprises the steps:
S1: in first identification card, write configuration file, said first identification card is inserted into first portable terminal that storage inside has cryptogam, wherein, said configuration file comprises the second identification card numbers;
S2: said first portable terminal carries out identity validation to the user;
S3: after said first portable terminal confirms that user identity is correct, read the second identification card numbers in the said configuration file, and produce temporary key at random;
S4: said first portable terminal sends to second identification card according to the said second identification card numbers with said temporary key;
S5: the user will be input to said first portable terminal from the said temporary key that said second identification card obtains, and said first portable terminal judges whether said temporary key is correct; With
S6: if said temporary key is correct, then allow to check said cryptogam, if said temporary key mistake then forbids checking said cryptogam.
Cipher code protection method according to the embodiment of the invention; With the unified preservation of a large amount of cryptogams; Temporary key through storing in the identification card is checked cryptogam; Safe, and the cipher code protection method of the embodiment of the invention preserves password and do not need extra chip, thus provide cost savings.
The embodiment of second aspect present invention provides a kind of cipher protection system, comprising: writing module, be used for writing configuration file to first identification card, and wherein, said configuration file comprises the second identification card numbers;
Authentication module is used for the user is carried out identity validation;
First read module, said first read module links to each other with said authentication module, is used for after said authentication module confirms that user identity is correct, reading the second identification card numbers in the said configuration file, and producing temporary key at random;
Sending module, said sending module links to each other with said first read module, is used for said temporary key is sent to second identification card;
Judge module, said judge module links to each other with said sending module, is used to receive the said temporary key of user's input, and judges whether said temporary key is correct;
Second read module links to each other with said judge module, is used to read said cryptogam,
When if said temporary key is correct, then said second read module reads said cryptogam; If said temporary key mistake forbids that then said second read module reads said cryptogam.
According to the cipher protection system of the embodiment of the invention, through the temporary key of storing in the identification card cryptogam is checked, safe, and the cipher protection system of the embodiment of the invention do not need extra chip, thus provide cost savings.
The embodiment of third aspect present invention provides a kind of portable terminal, comprises the cryptogam memory module, is used to store cryptogam; Display module is used for said cryptogam is shown to the user; And like the described cipher protection system of second aspect present invention embodiment, said cipher protection system links to each other with display module with said cryptogam memory module respectively.
According to the portable terminal of the embodiment of the invention, through the temporary key of storing in the identification card cryptogam is checked, safe, and the cipher protection system of the embodiment of the invention do not need extra chip, thus provide cost savings.
Aspect that the present invention adds and advantage part in the following description provide, and part will become obviously from the following description, or recognize through practice of the present invention.
Description of drawings
Above-mentioned and/or additional aspect of the present invention and advantage are from obviously with easily understanding becoming the description of embodiment below in conjunction with accompanying drawing, wherein:
Fig. 1 is the FB(flow block) according to the cipher code protection method of the embodiment of the invention;
Fig. 2 is the implementing procedure figure of the cipher code protection method shown in Fig. 1;
Fig. 3 is the structural representation according to the cipher protection system of the embodiment of the invention; With
Fig. 4 is the structural representation according to the portable terminal of the embodiment of the invention.
Embodiment
Describe embodiments of the invention below in detail, the example of said embodiment is shown in the drawings, and wherein identical from start to finish or similar label is represented identical or similar elements or the element with identical or similar functions.Be exemplary through the embodiment that is described with reference to the drawings below, only be used to explain the present invention, and can not be interpreted as limitation of the present invention.
With reference to figure 1 and Fig. 2 the cipher code protection method that the embodiment of the invention provides is described below.
As shown in Figure 1, the cipher code protection method according to the embodiment of the invention comprises the steps:
S101: in first identification card, write configuration file, first identification card is inserted into first portable terminal that storage inside has cryptogam;
In first identification card, write configuration file, wherein comprise the second identification card numbers in the configuration file.Wherein, the second identification card numbers is for receiving effective card number of information.
In one embodiment of the invention, configuration file can be the expansion EF file in first identification card.The content of expansion EF file can be revised through short message or other modes.
To be inserted in first portable terminal with first identification card of above-mentioned expansion EF file.The cryptogam that has the user to protect in the memory device stored of first portable terminal; Like the password of credit card 1, the password of credit card 2, the password of debit card 1; The password of debit card 2; The password of computer, the family security door password, the password that users such as safety cabinet password use can exist in this application.First portable terminal can be edited or delete above-mentioned cryptogam.The memory device of first portable terminal can be safe digital SD card.
In one embodiment of the invention; First identification card and second identification card can be RUIM (Removable User Identity Module; Removable User Recognition) card, USIM (Universal SubscriberIdentity Module; Whole world user identity identification) card or SIM (Subscriber Identity Module, user identity identification) card.
S102: first portable terminal carries out identity validation to the user;
The user opens first portable terminal after first identification card is inserted into first portable terminal.First portable terminal carries out identity validation to the user.Particularly, the user imports the PIN1 sign indicating number under the prompting of the system interface of first portable terminal.First portable terminal need be verified the PIN1 sign indicating number that the user imports, if the PIN1 sign indicating number of user's input is correct, then allows to read the second identification card numbers in the expansion EF file; If the PIN1 sign indicating number mistake of user's input then forbids reading the second identification card numbers in the expansion EF file.
S103: read the second identification card numbers in the configuration file, and produce temporary key at random;
After the PIN1 sign indicating number of first portable terminal checking user input is correct, reads configuration file and promptly expand the second identification card numbers in the EF file.Simultaneously, first portable terminal generates temporary key at random, and wherein temporary key can be made up of 6 figure places.
S104: first portable terminal sends to second identification card according to the second identification card numbers with temporary key;
First portable terminal sends temporary key according to the second identification card numbers in the configuration file that has read to this second identification card numbers.In one embodiment of the invention, first portable terminal can send to the second identification card numbers with temporary key through short message way.
S105: first portable terminal judges whether temporary key is correct;
Execution in step S1051, user read the short message that carries temporary key that the second identification card numbers receives obtaining temporary key, and the prompting input temporary key of using according to cryptoguard on first portable terminal.Execution in step S1052, first portable terminal is opened cryptoguard.Execution in step S1053, first portable terminal judge whether this temporary key is correct.
S106:, then allow the user to check cryptogam if first portable terminal judges that this temporary key is correct
S107:, forbid that then the user checks cryptogam if first portable terminal is judged this temporary key mistake.At this moment, if the user hopes to continue to check cryptogam, need restart first portable terminal, repeating step S102 to S105 obtains new temporary key.
In one embodiment of the invention, configuration file may further include effective opening time.Wherein, effectively the opening time can be 1 minute to 10 minutes.First portable terminal the second identification card numbers in reading configuration file, further reads effective opening time when the user is carried out identity validation.Preferably, effectively the opening time can 2 minutes.Wherein, effectively the opening time receives temporary key from first portable terminal and picks up counting.
If it is correct that first portable terminal judge this temporary key, then allow the user effectively checking cryptogam in the opening time, and effectively the opening time (as 2 minutes) close cryptoguard when expiring and use, forbid that promptly the user checks cryptogam.At this moment, if the user hopes to continue to check cryptogam, need restart first portable terminal, repeating step S102 to S105 obtains new temporary key.
Through the crack time of effective opening time with the limit for cryptographic file is set, make cryptogam be cracked use after at the fixed time the back recover protected state automatically, and then the fail safe that improves cryptogam.
In one embodiment of the invention, first identification card and second identification card can be positioned at same portable terminal, and promptly first identification card and second identification card all are positioned at first terminal.At this moment, first portable terminal is double card double standby mobile phone or dual-network and dual-standby mobile phone.At this moment, in first portable terminal, first identification card and second identification card all are in holding state.Wherein, when first portable terminal was double card double standby mobile phone, first identification card and second identification card can be SIM, also can be the RUIM card.When first portable terminal was dual-network and dual-standby mobile phone, first identification card can be SIM, and second identification card can be the RUIM card, and perhaps first identification card can be the RUIM card, and second identification card can be SIM.
In one embodiment of the invention; First identification card and second identification card can be positioned at two different mobile terminals; I.e. first identification is positioned in first portable terminal; Second identification is positioned in second portable terminal, and first portable terminal is different with second portable terminal.
Cipher code protection method according to the embodiment of the invention; With the unified preservation of a large amount of cryptogams; Temporary key through storing in the identification card is checked cryptogam; Safe, and the cipher code protection method of the embodiment of the invention preserves password and do not need extra chip, thus provide cost savings.
The cipher protection system of describing according to the embodiment of the invention with reference to figure 3 below 100.This cipher protection system can be used for portable terminal inside.
As shown in Figure 3, comprise writing module 110, authentication module 120, first read module 130, sending module 140, judge module 150 and second read module 160 according to the cipher protection system 100 of the embodiment of the invention.
In first identification card, write configuration file by writing module 110, wherein comprise the second identification card numbers in the configuration file.Wherein, the second identification card numbers is for receiving effective card number of information.
In one embodiment of the invention, configuration file can be the expansion EF file in first identification card.The content of expansion EF file can be revised through short message or other modes.
To be inserted in first portable terminal with first identification card of above-mentioned expansion EF file.The cryptogam that has the user to protect in the memory device stored of first portable terminal.In one embodiment of the invention; First identification card and second identification card can be RUIM (Removable User Identity Module; Removable User Recognition) card, USIM (Universal Subscriber Identity Module; Whole world user identity identification) card or SIM (Subscriber Identity Module, user identity identification) card.
The user opens first portable terminal after first identification card is inserted into first portable terminal.120 couples of users of authentication module carry out identity validation.Wherein, authentication module 120 links to each other with writing module.Particularly, the user imports the PIN1 sign indicating number under the prompting of system interface.Authentication module 120 needs the PIN1 sign indicating number of checking user input, if the PIN1 sign indicating number of user's input is correct, then allows to read the second identification card numbers in the expansion EF file; If the PIN1 sign indicating number mistake of user's input then forbids reading the second identification card numbers in the expansion EF file.
After the PIN1 sign indicating number of subscriber authentication module 120 checking user inputs is correct, reads configuration file by first read module 130 and promptly expand the second identification card numbers in the EF file.First read module 130 links to each other with subscriber authentication module 120.Simultaneously, first read module 130 generates temporary key at random, and wherein temporary key can be made up of 6 figure places.
Sending module 140 links to each other with first read module 130, and the second identification card numbers in the configuration file that can read according to first read module 130 is sent temporary key to this second identification card numbers.In one embodiment of the invention, sending module 140 can send to the second identification card numbers with temporary key through short message way.
The user reads the short message that carries temporary key that the second identification card numbers receives obtaining temporary key, and imports temporary key down in judge module 150 promptings.Judge module 150 links to each other with sending module 140, and whether the temporary key of judges input is correct.
If judge module 150 judges that this temporary key is correct, then check cryptogam by second read module 160.
If judge module 150 is judged these temporary key mistakes, forbid that then second read module 160 checks cryptogam.At this moment; If the user hopes to continue to check cryptogam; Need authentication module 120 again the user to be carried out identity validation; Whether produce new temporary key at random by first read module 130, and new temporary key is sent to second identification card through sending module 140, it is correct to rejudge temporary key by judge module 150.
In one embodiment of the invention, configuration file may further include effective opening time.Wherein, effectively the opening time can be 1 minute to 10 minutes.Authentication module 120 the second identification card numbers of first read module 130 in reading configuration file, further reads effective opening time when the user is carried out identity validation.Preferably, effectively the opening time can 2 minutes.Wherein, effectively the opening time receives temporary key from judge module 150 and picks up counting.
If judge module 150 judges that this temporary key is correct; Then allow second read module 160 effectively checking cryptogam in the opening time; And effectively the opening time (as 2 minutes) closes cryptoguard and uses when expiring, and forbids that promptly second read module 160 checks cryptogam.At this moment, if the user hope to continue to check cryptogam, need authentication module 120 again the user to be carried out identity validation.Whether produce new temporary key at random by first read module 130, and new temporary key is sent to second identification card through sending module 140, it is correct to rejudge temporary key by judge module 150.
Through the crack time of effective opening time with the limit for cryptographic file is set, make cryptogam be cracked use after at the fixed time the back recover protected state automatically, and then the fail safe that improves cryptogam.
According to the cipher protection system of the embodiment of the invention, through the temporary key of storing in the identification card cryptogam is checked, safe, and the cipher protection system of the embodiment of the invention do not need extra chip, thus provide cost savings.
The portable terminal of describing according to the embodiment of the invention with reference to figure 4 below 1000.
As shown in Figure 4, comprise cipher protection system 100, cryptogam memory module 200 and display module 300 in the above embodiment of the present invention according to the portable terminal 1000 of the embodiment of the invention.Wherein, cipher protection system links to each other with display module 300 with face cryptogam memory module 200 respectively.
Cryptogam memory module 200 can be stored cryptogam, like the password of credit card 1, and the password of credit card 2; The password of debit card 1, the password of debit card 2, the password of computer; The family security door password, the password that users such as safety cabinet password use can exist in this application.Portable terminal 1000 can be edited or delete above-mentioned cryptogam.In one embodiment of the invention, cryptogam memory module 200 can be safe digital SD card.
Display module 300 links to each other with cryptogam memory module 200, and the cryptogam in the cryptogam memory module 200 is shown.
In one embodiment of the invention, first identification card and second identification card in the cipher protection system 100 can be positioned at same portable terminal, and promptly first identification card and second identification card all are positioned at portable terminal 1000.At this moment, portable terminal 1000 is double card double standby mobile phone or dual-network and dual-standby mobile phone.At this moment, in portable terminal 1000, first identification card and second identification card all are in holding state.Wherein, when portable terminal 1000 was double card double standby mobile phone, first identification card and second identification card can be SIM, also can be the RUIM card.When portable terminal 1000 was dual-network and dual-standby mobile phone, first identification card can be SIM, and second identification card can be the RUIM card, and perhaps first identification card can be the RUIM card, and second identification card can be SIM.
In one embodiment of the invention, first identification card and second identification card can be positioned at two different mobile terminals, i.e. first identification is positioned in the portable terminal 1000, and second identification is positioned in other portable terminals.
According to the portable terminal of the embodiment of the invention, through the temporary key of storing in the identification card cryptogam is checked, safe, and the cipher protection system of the embodiment of the invention do not need extra chip, thus provide cost savings.
In the description of this specification, the description of reference term " embodiment ", " some embodiment ", " example ", " concrete example " or " some examples " etc. means the concrete characteristic, structure, material or the characteristics that combine this embodiment or example to describe and is contained at least one embodiment of the present invention or the example.In this manual, the schematic statement to above-mentioned term not necessarily refers to identical embodiment or example.And concrete characteristic, structure, material or the characteristics of description can combine with suitable manner in any one or more embodiment or example.
Although illustrated and described embodiments of the invention; For those of ordinary skill in the art; Be appreciated that under the situation that does not break away from principle of the present invention and spirit and can carry out multiple variation, modification, replacement and modification that scope of the present invention is accompanying claims and be equal to and limit to these embodiment.

Claims (17)

1. a cipher code protection method is characterized in that, comprises the steps:
S1: in first identification card, write configuration file, said first identification card is inserted into first portable terminal that storage inside has cryptogam, wherein, said configuration file comprises the second identification card numbers;
S2: said first portable terminal carries out identity validation to the user;
S3: after said first portable terminal confirms that user identity is correct, read the second identification card numbers in the said configuration file, and produce temporary key at random;
S4: said first portable terminal sends to second identification card according to the said second identification card numbers with said temporary key;
S5: the user will be input to said first portable terminal from the said temporary key that said second identification card obtains, and said first portable terminal judges whether said temporary key is correct; With
S6: if said temporary key is correct, then allow to check said cryptogam, if said temporary key mistake then forbids checking said cryptogam.
2. cipher code protection method as claimed in claim 1 is characterized in that, said first identification card and second identification card all are positioned at said first portable terminal.
3. cipher code protection method as claimed in claim 1 is characterized in that, said second identification is positioned in second portable terminal, and said first portable terminal is different with said second portable terminal.
4. like claim 2 or 3 described cipher code protection methods, it is characterized in that said first identification card and second identification card are removable User Recognition RUIM card, global user identity identification usim card or user identity identification SIM.
5. cipher code protection method as claimed in claim 4 is characterized in that, said configuration file is the expansion EF file in said first identification card.
6. cipher code protection method as claimed in claim 1; It is characterized in that; Said configuration file also comprises effective opening time, and said step S6 also comprises: if said temporary key is correct, then allow effectively check said cryptogam in the opening time; If surpass said effective opening time, then forbid checking said cryptogam.
7. cipher code protection method as claimed in claim 1 is characterized in that said cryptogam is stored in the internal storage device of said first portable terminal.
8. cipher code protection method as claimed in claim 1 is characterized in that, said first portable terminal carries out identity validation to the user and further comprises:
Said first portable terminal is verified the PIN1 sign indicating number of said user's input;
If said PIN1 sign indicating number is correct, then allow to read the second identification card numbers in the said configuration file; With
If said PIN1 sign indicating number mistake then forbids reading the second identification card numbers in the said configuration file.
9. cipher code protection method as claimed in claim 6 is characterized in that, said effective opening time receives said temporary key from said first portable terminal and picks up counting.
10. cipher code protection method as claimed in claim 6 is characterized in that, if said temporary key mistake or surpass said effective opening time, execution in step S2 to S5 checks said cryptogam to obtain new temporary key.
11. a cipher protection system is characterized in that, comprising:
Writing module is used for writing configuration file to first identification card, and wherein, said configuration file comprises the second identification card numbers;
Authentication module, said authentication module links to each other with the said write module, is used for the user is carried out identity validation;
First read module, said first read module links to each other with said authentication module, is used for after said authentication module confirms that user identity is correct, reading the second identification card numbers in the said configuration file, and producing temporary key at random;
Sending module, said sending module links to each other with said first read module, is used for said temporary key is sent to second identification card;
Judge module, said judge module links to each other with said sending module, is used to receive the said temporary key of user's input, and judges whether said temporary key is correct; With
Second read module links to each other with said judge module, is used to read said cryptogam,
When if said temporary key is correct, then said second read module reads said cryptogam; If said temporary key mistake forbids that then said second read module reads said cryptogam.
12. cipher protection system as claimed in claim 11 is characterized in that, the type of said first identification card and second identification card is removable User Recognition RUIM card, global user identity identification usim card or user identity identification SIM.
13. cipher protection system as claimed in claim 11 is characterized in that, said configuration file is the expansion EF file in said first identification card.
14. cipher protection system as claimed in claim 11 is characterized in that, said configuration file also comprises effective opening time; If said temporary key is correct, then said second read module reads said cryptogam in said effective opening time, if surpass said effective opening time, forbids that then said second read module reads said cryptogam.
15. cipher protection system as claimed in claim 11 is characterized in that, said authentication module checking PIN1 sign indicating number if said PIN1 sign indicating number is correct, then reads the second identification card numbers in the said configuration file by said first read module; If said PIN1 sign indicating number mistake, then said first read module will not be operated.
16. cipher protection system as claimed in claim 14; It is characterized in that; When said judge module was judged said temporary key mistake or surpassed said effective opening time, said authentication module was carried out identity validation to the user again, and said first read module produces new temporary key at random; And said new temporary key sent to said second identification card through said sending module, whether rejudge said temporary key by said judge module correct.
17. a portable terminal is characterized in that, comprising:
The cryptogam memory module is used to store cryptogam;
Display module is used for said cryptogam is shown to the user; With
Like each described cipher protection system in the claim 11 to 16, said cipher protection system links to each other with display module with said cryptogam memory module respectively.
CN2010105762287A 2010-11-24 2010-11-24 Password protection method, password protection system and mobile terminal with same Pending CN102480726A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105762287A CN102480726A (en) 2010-11-24 2010-11-24 Password protection method, password protection system and mobile terminal with same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105762287A CN102480726A (en) 2010-11-24 2010-11-24 Password protection method, password protection system and mobile terminal with same

Publications (1)

Publication Number Publication Date
CN102480726A true CN102480726A (en) 2012-05-30

Family

ID=46093173

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105762287A Pending CN102480726A (en) 2010-11-24 2010-11-24 Password protection method, password protection system and mobile terminal with same

Country Status (1)

Country Link
CN (1) CN102480726A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103218568A (en) * 2013-03-18 2013-07-24 东莞宇龙通信科技有限公司 Privacy protection method during text display and communication terminal
CN105303120A (en) * 2015-09-18 2016-02-03 小米科技有限责任公司 Short message reading method and apparatus
CN106850612A (en) * 2017-01-23 2017-06-13 北京思特奇信息技术股份有限公司 The cipher management method and system of a kind of facing cloud system
US9998887B2 (en) 2015-09-18 2018-06-12 Xiaomi Inc. Short message service reading method and device
US10021543B2 (en) 2015-09-18 2018-07-10 Xiaomi Inc. Short message service reading method and device
CN109360307A (en) * 2018-09-25 2019-02-19 佘丽娟 A kind of multi-enciphering storage system
CN112512034A (en) * 2020-12-09 2021-03-16 深圳市广和通无线股份有限公司 Method and device for quickly loading user identification card file by terminal and computer equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150792A (en) * 2006-09-20 2008-03-26 深圳富泰宏精密工业有限公司 Method for recovering operation function temporary disabled user recognition card and mobile communication device
WO2009083016A1 (en) * 2007-12-27 2009-07-09 Telecom Italia S.P.A. Method for enjoying a service through a mobile telephone terminal and subscriber identification card for implementing it
CN101815292A (en) * 2010-04-22 2010-08-25 中兴通讯股份有限公司 Device and method for protecting data of mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150792A (en) * 2006-09-20 2008-03-26 深圳富泰宏精密工业有限公司 Method for recovering operation function temporary disabled user recognition card and mobile communication device
WO2009083016A1 (en) * 2007-12-27 2009-07-09 Telecom Italia S.P.A. Method for enjoying a service through a mobile telephone terminal and subscriber identification card for implementing it
CN101815292A (en) * 2010-04-22 2010-08-25 中兴通讯股份有限公司 Device and method for protecting data of mobile terminal

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103218568A (en) * 2013-03-18 2013-07-24 东莞宇龙通信科技有限公司 Privacy protection method during text display and communication terminal
CN105303120A (en) * 2015-09-18 2016-02-03 小米科技有限责任公司 Short message reading method and apparatus
US9998887B2 (en) 2015-09-18 2018-06-12 Xiaomi Inc. Short message service reading method and device
US10021543B2 (en) 2015-09-18 2018-07-10 Xiaomi Inc. Short message service reading method and device
US10027629B2 (en) 2015-09-18 2018-07-17 Xiaomi Inc. Short message service reading method and device
CN106850612A (en) * 2017-01-23 2017-06-13 北京思特奇信息技术股份有限公司 The cipher management method and system of a kind of facing cloud system
CN109360307A (en) * 2018-09-25 2019-02-19 佘丽娟 A kind of multi-enciphering storage system
CN109360307B (en) * 2018-09-25 2020-11-03 佘丽娟 Multi-encryption storage system
CN112512034A (en) * 2020-12-09 2021-03-16 深圳市广和通无线股份有限公司 Method and device for quickly loading user identification card file by terminal and computer equipment

Similar Documents

Publication Publication Date Title
CN102480726A (en) Password protection method, password protection system and mobile terminal with same
US9516019B2 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
CN102790819A (en) Mobile terminal capable of protecting privacy and method
CN101026834A (en) Locking method and unlocking method
CN102883047A (en) Method and system for realizing data security of intelligent mobile terminals
CN101772017A (en) Method for remotely destroying information of communication terminal and communication terminal thereof
CN102867157B (en) Mobile terminal and data guard method
CN205594622U (en) Computer storage system
CN102792724A (en) Protection of a communication channel between a security module and an nfc circuit
CN102792723A (en) Protection of a security module in a telecommunication device coupled to an NFC circuit
CN102752754B (en) Subscriber Identity Module lock data are carried out method and the mobile terminal of safety certification
CN101483871A (en) Touch screen terminal, authentication method and system thereof
CN101711023A (en) Method and system for realizing interlocking of phone and card
US20150281951A1 (en) Method and device for protecting privacy data of mobile terminal user
CN102521169B (en) Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk
CN103400184A (en) SIM (subscriber identity module) card, mobile terminal, system and identifying method thereof
CN102340750A (en) Method for retrieving password of mobile phone private space
CN105516500A (en) Method and system for selecting device mode
CN105636043A (en) ESIM (Embedded SIM) card authentication method, eSIM card authentication device and terminal
CN102104864A (en) Method for realizing network and card locking function of terminal and terminal
CN111786995A (en) Account password management method, management middleware, system, equipment and storage medium
CN106412217B (en) A kind of connecting information management method, device and terminal
CN104573765B (en) Smart card information processing method and processing device
CN103685676A (en) Bluetooth secondary phone, split type mobile terminal and information processing method for Bluetooth secondary phone
CN101127995A (en) An information processing method for phone-card separated mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120530