CN112019684A - Control method and electronic device - Google Patents

Control method and electronic device Download PDF

Info

Publication number
CN112019684A
CN112019684A CN202010795643.5A CN202010795643A CN112019684A CN 112019684 A CN112019684 A CN 112019684A CN 202010795643 A CN202010795643 A CN 202010795643A CN 112019684 A CN112019684 A CN 112019684A
Authority
CN
China
Prior art keywords
identification module
electronic equipment
electronic device
customer identification
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010795643.5A
Other languages
Chinese (zh)
Inventor
张振宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oppo Chongqing Intelligent Technology Co Ltd
Original Assignee
Oppo Chongqing Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo Chongqing Intelligent Technology Co Ltd filed Critical Oppo Chongqing Intelligent Technology Co Ltd
Priority to CN202010795643.5A priority Critical patent/CN112019684A/en
Publication of CN112019684A publication Critical patent/CN112019684A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Abstract

The application discloses a control method and electronic equipment. The control method is used for controlling the electronic equipment, and the electronic equipment is used for setting the customer identification module. The control method comprises the following steps: processing the information protection instruction to determine whether to destroy the client identification module when the information protection instruction is received; when the customer identification module is determined to be destroyed, controlling the electronic equipment to verify the personal identification code of the customer identification module and input an incorrect identification code so as to enable the customer identification module to enter a state to be unlocked; and under the state of waiting to be unlocked, controlling the electronic equipment to input an incorrect unlocking password so as to enable the client identification module to enter a scrapped state. Therefore, the customer identification module enters the scrapped state through the mode of automatically inputting the wrong identification password and unlocking the password, and the scrapped state of the customer identification module is irreversible, so that the information in the customer identification module can be effectively prevented from being cracked, and the safety of the user information is high.

Description

Control method and electronic device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a control method and an electronic device.
Background
When the mobile phone is lost, the leakage of the related information in the mobile phone can be prevented in a specific mode. In the related technology, because the adopted modes are common, the related information can be easily identified after being cracked, and therefore, a large information leakage risk still exists.
Disclosure of Invention
The application provides a control method and electronic equipment.
The control method of the embodiment of the application can be used for electronic equipment, wherein the electronic equipment is used for setting a customer identification module, and the control method comprises the following steps: processing an information protection instruction to determine whether to destroy the customer identification module upon receipt of the information protection instruction; when the customer identification module is determined to be destroyed, controlling the electronic equipment to verify the personal identification code of the customer identification module and input an incorrect identification code so as to enable the customer identification module to enter a state to be unlocked; and under the state to be unlocked, controlling the electronic equipment to input an incorrect unlocking password so as to enable the customer identification module to enter a scrapped state.
The electronic device of the embodiment of the application comprises a client identification module and a processor, wherein the processor is used for: processing an information protection instruction to determine whether to destroy the customer identification module upon receipt of the information protection instruction; when the customer identification module is determined to be destroyed, controlling the electronic equipment to verify the personal identification code of the customer identification module and input an incorrect identification code so as to enable the customer identification module to enter a state to be unlocked; and under the state to be unlocked, controlling the electronic equipment to input an incorrect unlocking password so as to enable the customer identification module to enter a scrapped state.
According to the control method and the electronic equipment, the client identification module enters the scrapped state through the mode of automatically inputting the wrong identification password and the unlocking password, and the scrapped state of the client identification module is irreversible, so that the information in the client identification module can be effectively prevented from being cracked, and the safety of the user information is high.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flow chart of a control method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
FIG. 3 is another schematic flow chart diagram of a control method according to an embodiment of the present application;
FIG. 4 is a schematic flow chart of a control method according to an embodiment of the present application;
FIG. 5 is a further schematic flow chart of a control method according to an embodiment of the present application;
the main characteristic reference numbers:
an electronic device 100;
processor 10, housing 20, display screen 30;
a client identification module 200.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
The following disclosure provides many different embodiments or examples for implementing different features of the application. In order to simplify the disclosure of the present application, specific example components and arrangements are described below. Of course, they are merely examples and are not intended to limit the present application. Moreover, the present application may repeat reference numerals and/or letters in the various examples, such repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed.
In the description herein, reference to the description of the terms "one embodiment," "some embodiments," "an illustrative embodiment," "an example," "a specific example" or "some examples" or the like means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Referring to fig. 1 and fig. 2, a control method according to an embodiment of the present application may be applied to an electronic device 100, where the electronic device 100 is used to set a client identification module 200, and the control method includes:
01, upon receiving the information protection instruction, processing the information protection instruction to determine whether to destroy the client identification module 200;
02, when it is determined to destroy the customer identification module 200, controlling the electronic device 100 to verify a personal identification number (PIN code) of the customer identification module 200 and input an incorrect identification number to cause the customer identification module 200 to enter a to-be-unlocked state;
03, in the to-be-unlocked state, controlling the electronic device 100 to input an incorrect unlocking password (PUK code) so as to enable the sim 200 to enter a disabled state.
The electronic device 100 of the embodiment of the present application includes a processor 10, a housing 20, and a display screen 30. The control method of the embodiment of the present application can be implemented by the electronic device 100 of the embodiment of the present application, wherein step 01, step 02 and step 03 can be implemented by the processor 10. That is, the processor 10 is configured to: upon receiving the information protection instruction, processing the information protection instruction to determine whether to destroy the client identification module 200; when it is determined to destroy the customer identification module 200, controlling the electronic device 100 to verify the personal identification code of the customer identification module 200 and input an incorrect identification code to cause the customer identification module 200 to enter a to-be-unlocked state; in the to-be-unlocked state, the electronic device 100 is controlled to input an incorrect unlocking password so that the sim 200 enters a disabled state.
The subscriber identity module 200 may refer to a SIM card, and the subscriber identity module 200 is disposed in the electronic device 100, as shown in fig. 2. The control method according to the embodiment of the present application is applied to the case where the electronic device 100 of the user and the client identification module 200 in the electronic device 100 are lost. Specifically, if the electronic device 100 of the user is lost and wants to remotely destroy the data in the client identification module 200 or the electronic device 100, an information protection instruction may be sent to the lost electronic device 100.
The information protection instruction may be a short message containing preset instruction content, and the processor 10 confirms the instruction content in the information protection instruction and processes the user data in the electronic device 100 and the client identification module 200 through the instruction content.
For example, after the user finds that the electronic device 100 is lost, in order to avoid the user data leakage therein, the user may use other electronic devices to compile the following short message to the lost electronic device 100 in order to destroy the client identification module 200:
abc_remote*S<0,1>
wherein abc _ remote is the content of the preset short message of the electronic device 100, and S is the command of whether to destroy the SIM. The command is followed by <0, 1> (the command is judged yes if the number in <0, 1> is 1 and the command is judged no if the number in <0, 1> is 0).
When the electronic device 100 receives the short message with the short header abc _ remote, it recognizes that the short message is a remote command short message, and determines that the content of the short message needs to be hidden and is not recognized by the user. Then, entering command identification, identifying the command and the number after the command is 1, the processor 10 determines that the electronic device 100 needs to enable the destruction client identification module 200, and then performs step 02 and step 03.
In step 02, the processor 10 controls the electronic device 100 to verify the personal identification number of the client identification module 200, and then randomly inputs an incorrect personal identification number to enable the client identification module 200 to enter a state to be unlocked. Since the state to be unlocked is a reversible state (which can be exited by inputting a correct unlocking password), step 03 is continued.
In step 03, in the to-be-unlocked state, the processor 10 controls the electronic device 100 to input an incorrect unlocking password to enable the sim 200 to enter a disabled state, which is irreversible (i.e., cannot exit the disabled state).
Therefore, the customer identification module 200 enters the scrapped state by automatically inputting the wrong identification password and the unlocking password, and the scrapped state of the customer identification module 200 is irreversible, so that the information in the customer identification module 200 is effectively prevented from being cracked, and the safety of the user information is improved.
In order to ensure the validity of the short message, the short message may be checked, for example, in the following manner: judging whether the short message contains the check code of the electronic equipment 100, determining that the short message meets the legality requirement when the check code passes, and continuously destroying the client identification module 200; when the check code fails to pass the check, it is determined that the short message does not satisfy the legitimacy requirement and the client identification module 200 cannot be destroyed. Thus, it is able to prevent a malicious person from sending a short message to interfere with the normal use of the electronic device 100.
In certain embodiments, step 02 comprises:
021, when it is determined to destroy the client identification module 200, controlling the electronic device 100 to verify the personal identification password and input a wrong identification password for a first predetermined number of times so as to make the client identification module 200 enter a state to be unlocked;
step 03 comprises:
031, in the to-be-unlocked state, control the electronic device 100 to input a second predetermined number of wrong unlocking passwords to enable the customer identification module 200 to enter the disabled state.
In some embodiments, step 021 and step 031 may both be implemented by the processor 10, that is, the processor 10 may be configured to, when determining to destroy the client identification module 200, control the electronic device 100 to verify the personal identification code and input a wrong identification code for a first predetermined number of times so as to enable the client identification module 200 to enter the state to be unlocked; in the to-be-unlocked state, the electronic device 100 is controlled to input a second predetermined number of wrong unlocking passwords to enable the customer identification module 200 to enter the disabled state.
It should be noted that the preset rules of the client identification module 200 are as follows: when the misrecognition password is input for the first predetermined number of times, the sim 200 enters the unlock state. When the unlocking password is input for the second preset number of times in the state to be unlocked, the client identification module 200 enters the disabled state.
In this way, the processor 10 may implement remote and automatic destruction of the client identification module 200, which improves the security of the electronic device 100.
The first predetermined number of times may be 3 times, and the second predetermined number of times may be 10 times. The first predetermined number and the second predetermined number are set so that there is a sufficient fault tolerance when the user normally uses the customer identification module 200 and triggers the verification of the personal identification code.
Referring to fig. 3, in some embodiments, the control method further includes:
04, processing the information protection instruction to determine whether to shut down the network communication capability of the electronic device 100;
05, upon determining to turn off the network communication capability of the electronic apparatus 100, turning off the communication capability of the electronic apparatus 100 and making the electronic apparatus 100 unable to recognize the client recognition module 200.
In some embodiments, step 04 and step 05 may be implemented by the processor 10, that is, the processor 10 may be configured to process the information protection instruction to determine whether to turn off the network communication capability of the electronic device 100; upon determining to turn off the network communication capability of the electronic apparatus 100, the communication capability of the electronic apparatus 100 is turned off and the electronic apparatus 100 is made unable to recognize the client identification module 200.
It is understood that, in the information protection instruction, preset contents of whether to turn off the network communication capability of the electronic apparatus 100 may be added. The processor 10 may determine whether to turn off the network communication capability of the electronic device 100 by the content of the setting form. For example, abc _ remote _ F <0, 1>, the processor 10 may recognize the command F and the number after the command, and if the number after the command is 1, the processor 10 may determine that the electronic device 100 needs to start to shut down the network communication capability of the electronic device 100.
In this way, the lost electronic device 100 can implement the function of remotely turning off the network communication capability, and prevent other people from continuing to use the electronic device 100.
In certain embodiments, step 05 comprises:
051, when determining to close the network communication capability of the electronic equipment 100, closing all the communication support capability of the electronic equipment 100 and sending the information that the electronic equipment 100 has no communication capability to the client identification module 200;
052, turning off the subscriber identity module 200 and determining that the subscriber identity module 200 is in a non-powered-on state;
053, closing the port of the electronic device 100 for identifying the customer identification module 200, and closing the active power-on function of the port.
In some embodiments, steps 051, 052 and 053 may all be implemented by the processor 10, that is, the processor 10 may be configured to, upon determining to turn off the network communication capability of the electronic device 100, turn off all communication support capability of the electronic device 100 and send information that the electronic device 100 does not have communication capability to the client identification module 200; shutting down the subscriber identity module 200 and determining that the subscriber identity module 200 is in a non-powered-on state; the port of the electronic device 100 for identifying the subscriber identity module 200 is turned off and the active power-on function of the port is turned off.
Specifically, in step 051, after the lost electronic device 100 receives the information protection instruction and judges that the network communication capability of the electronic device 100 needs to be closed, the information that the electronic device 100 has no communication capability is sent to the client identification module 200. This step may be implemented by the internal functions of the electronic device 100: first, all the support capabilities of the electronic device 100 are set to false, and the client identification module 200 is informed through Terminal Profile that the electronic device 100 currently has no communication capability.
Step 052 may be implemented by processor 10 setting client identification module 200 to a Power Down state and setting the Power On function of client identification module 200 to disable. In this way, the electronic device 100 loses the function of identifying the subscriber identity module 200 and the communication function in software design.
Step 053 may be executed by setting the gpio port of the electronic device 100 for identifying the sim 200 to false, and setting the high/low level of the port to false, so that it cannot be powered up actively.
Thus, the electronic device 100 cannot be powered on at the hardware physical drive end.
Referring to fig. 4, in some embodiments, the control method further includes:
06, processing the information protection instruction to determine whether to clear the information of the client identification module 200;
07, upon determining to clear the information of the client identification module 200, deleting the information stored in the client identification module 200.
In some embodiments, both steps 06 and 07 may be implemented by the processor 10, that is, the processor 10 may be configured to process the information protection instruction to determine whether to clear the information of the customer identification module 200; when it is determined to clear the information of the client identification module 200, the information stored in the client identification module 200 is deleted.
It is to be understood that, in the information protection instruction, a preset content of whether to clear the information of the client recognition module 200 may be added. The processor 10 may determine whether to clear the information of the subscriber identity module 200 by setting the form. For example, abc _ remote _ T <0, 1>, the processor 10 may recognize the command T and the number after the command, and if the number after the command is 1, the processor 10 may determine that the electronic device 100 needs to start the purge of the information of the sim 200.
After the processor 10 determines that the instruction for clearing the information of the client identification module 200 is needed, the information of the client identification module 200 of the electronic device 100 is cleared, where the information needed to be cleared may include user data such as a contact, a call record, and a short message.
In this manner, an information protection instruction may be sent to the missing electronic device 100 to clear the information of the client identification module 200.
Referring to fig. 5, in some embodiments, the control method further includes:
08, processing the information protection instruction to determine whether to clear the information of the electronic device 100;
09, upon determining to clear the information of the electronic device 100, deleting the information stored in the electronic device 100.
In some embodiments, both steps 08 and 09 can be implemented by the processor 10, that is, the processor 10 can be configured to process the information protection instruction to determine whether to clear the information of the electronic device 100; when it is determined to clear the information of the electronic apparatus 100, the information stored in the electronic apparatus 100 is deleted.
It is understood that, in the information protection instruction, a preset content of whether to clear the information of the electronic apparatus 100 may be added. The processor 10 may determine whether to clear the information of the electronic device 100 by setting the form of the content. For example, abc _ remote P <0, 1>, the processor 10 may recognize the P command and the number after the command, and if the number after the command is 1, the processor 10 may determine that the electronic device 100 needs to start to clear the information of the electronic device 100.
After the processor 10 determines that the instruction for clearing the information of the electronic device 100 is needed, the information of the electronic device 100 is cleared, and the information needed to be cleared may include user data such as image data, audio data, and communication data.
In this way, an information protection instruction can be sent to the lost electronic device 100 to clear the information of the electronic device 100, and information leakage of the electronic device 100 can be prevented.
In one embodiment, the user may destroy the client identification module 200, disable the network communication capability of the electronic device 100, clear the client identification module 200, and clear the electronic device 100. This may be achieved by sending information protection instructions to the electronic device 100 as follows:
abc_remote*P<1>*T<1>*S<1>*F<1>
wherein abc _ remote is a preset short message content of the electronic device 100, when the electronic device 100 receives a short message with an abc _ remote header, the short message is identified as a remote command short message, the content of the short message needs to be hidden is determined, and instruction identification is performed. Recognizing the P command and the number after the command is 1, the processor 10 will determine that the electronic device 100 needs to be started to clear the information of the electronic device 100; recognizing the command T and the number after the command is 1, the processor 10 determines that the electronic device 100 needs to start the clear client identification module 200; recognizing the command and the number after the command is 1, the processor 10 will determine that the electronic device 100 needs to start the destruction client recognition module 200; recognizing the command F and the number after the command is 1, the processor 10 determines that the electronic device 100 needs to start to shut down the network communication capability of the electronic device 100.
It should be noted that, in this embodiment, the order of instruction execution may be: determining whether to clear the information of the electronic device 100, determining whether to clear the information of the client identification module 200, determining whether to destroy the client identification module 200, and determining whether to turn off the network communication capability of the electronic device 100. Thus, the information of the client identification module 200 can be removed as much as possible before the client identification module 200 is destroyed, and the protection of information security is further improved.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
The logic and/or steps represented in the flowcharts or otherwise described herein, such as an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processing module-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. It should be understood that portions of the embodiments of the present application may be implemented in hardware, software, firmware, or a combination thereof.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in an electronic device readable storage medium, and when executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in an electronic device readable storage medium.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations of the above embodiments may be made by those of ordinary skill in the art within the scope of the present application.

Claims (12)

1. A control method for controlling an electronic device, wherein the electronic device is configured to set a subscriber identity module, the control method comprising:
processing an information protection instruction to determine whether to destroy the customer identification module upon receipt of the information protection instruction;
when the customer identification module is determined to be destroyed, controlling the electronic equipment to verify the personal identification code of the customer identification module and input an incorrect identification code so as to enable the customer identification module to enter a state to be unlocked;
and under the state to be unlocked, controlling the electronic equipment to input an incorrect unlocking password so as to enable the customer identification module to enter a scrapped state.
2. The control method according to claim 1, wherein when it is determined to destroy the customer identification module, controlling the electronic device to verify a personal identification code of the customer identification module and input a wrong identification code to cause the customer identification module to enter a to-be-unlocked state includes:
when the customer identification module is determined to be destroyed, controlling the electronic equipment to verify the personal identification password and input a wrong identification password for a first preset number of times so as to enable the customer identification module to enter the state to be unlocked;
under the state of waiting to unlock, controlling the electronic device to input an incorrect unlocking password so as to enable the customer identification module to enter a scrapped state, including:
and under the state to be unlocked, controlling the electronic equipment to input wrong unlocking passwords for a second preset number of times so as to enable the client identification module to enter a scrapped state.
3. The control method according to claim 1, characterized by further comprising:
processing the information protection instruction to determine whether to turn off a network communication capability of the electronic device;
when the network communication capability of the electronic equipment is determined to be closed, the communication capability of the electronic equipment is closed, and the electronic equipment cannot identify the client identification module.
4. The control method according to claim 3, wherein the turning off the communication capability of the electronic device and making the electronic device unable to recognize the customer identification module when it is determined to turn off the network communication capability of the electronic device comprises:
when determining to close the network communication capability of the electronic equipment, closing all communication support capabilities of the electronic equipment and sending information that the electronic equipment has no communication capability to the client identification module;
closing the customer identification module and determining that the customer identification module is in a non-power-on state;
and closing a port of the electronic equipment for identifying the customer identification module and closing an active power-on function of the port.
5. The control method according to claim 1, characterized by further comprising:
processing the information protection instruction to determine whether to clear the information of the customer identification module;
and deleting the information stored in the client identification module when the information of the client identification module is determined to be cleared.
6. The control method according to claim 1, characterized by further comprising:
processing the information protection instruction to determine whether to clear the information of the electronic device;
and deleting the information stored in the electronic equipment when the information of the electronic equipment is determined to be cleared.
7. An electronic device configured to configure a subscriber identity module, the electronic device comprising a processor configured to:
processing an information protection instruction to determine whether to destroy the customer identification module upon receipt of the information protection instruction;
when the customer identification module is determined to be destroyed, controlling the electronic equipment to verify the personal identification code of the customer identification module and input an incorrect identification code so as to enable the customer identification module to enter a state to be unlocked;
and under the state to be unlocked, controlling the electronic equipment to input an incorrect unlocking password so as to enable the customer identification module to enter a scrapped state.
8. The electronic device of claim 7, wherein the processor is further configured to:
when the customer identification module is determined to be destroyed, controlling the electronic equipment to verify the personal identification password and input a wrong identification password for a first preset number of times so as to enable the customer identification module to enter the state to be unlocked;
and under the state to be unlocked, controlling the electronic equipment to input wrong unlocking passwords for a second preset number of times so as to enable the client identification module to enter a scrapped state.
9. The electronic device of claim 7, wherein the processor is further configured to:
processing the information protection instruction to determine whether to turn off a network communication capability of the electronic device;
when the network communication capability of the electronic equipment is determined to be closed, the communication capability of the electronic equipment is closed, and the electronic equipment cannot identify the client identification module.
10. The electronic device of claim 9, wherein the processor is further configured to:
when determining to close the network communication capability of the electronic equipment, closing all communication support capabilities of the electronic equipment and sending information that the electronic equipment has no communication capability to the client identification module;
closing the customer identification module and determining that the customer identification module is in a non-power-on state;
and closing a port of the electronic equipment for identifying the customer identification module and closing an active power-on function of the port.
11. The electronic device of claim 7, wherein the processor is further configured to:
processing the information protection instruction to determine whether to clear the information of the customer identification module;
and deleting the information stored in the client identification module when the information of the client identification module is determined to be cleared.
12. The electronic device of claim 7, wherein the processor is further configured to:
processing the information protection instruction to determine whether to clear the information of the electronic device;
and deleting the information stored in the electronic equipment when the information of the electronic equipment is determined to be cleared.
CN202010795643.5A 2020-08-10 2020-08-10 Control method and electronic device Pending CN112019684A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010795643.5A CN112019684A (en) 2020-08-10 2020-08-10 Control method and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010795643.5A CN112019684A (en) 2020-08-10 2020-08-10 Control method and electronic device

Publications (1)

Publication Number Publication Date
CN112019684A true CN112019684A (en) 2020-12-01

Family

ID=73500176

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010795643.5A Pending CN112019684A (en) 2020-08-10 2020-08-10 Control method and electronic device

Country Status (1)

Country Link
CN (1) CN112019684A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980459A (en) * 2005-11-30 2007-06-13 中兴通讯股份有限公司 Method for realizing information destroying at network side
CN101083806A (en) * 2006-05-30 2007-12-05 英华达(南京)科技有限公司 Method for dual-mode mobile phone to connect respectively with plurality of telecom network
CN101119565A (en) * 2007-09-03 2008-02-06 华为技术有限公司 Mobile communications terminal data protection method, system and equipment
CN101355740A (en) * 2007-07-27 2009-01-28 佛山市顺德区顺达电脑厂有限公司 Method and system for protecting smart card data
CN104660613A (en) * 2015-03-16 2015-05-27 联想(北京)有限公司 Authentication method of user identification module and electronic equipment
CN105790949A (en) * 2015-11-17 2016-07-20 广东欧珀移动通信有限公司 Subscriber identity module card unlocking method and subscriber identity module card unlocking device
CN108781359A (en) * 2016-03-30 2018-11-09 T移动美国公司 The adaptive equipment locking of safety

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980459A (en) * 2005-11-30 2007-06-13 中兴通讯股份有限公司 Method for realizing information destroying at network side
CN101083806A (en) * 2006-05-30 2007-12-05 英华达(南京)科技有限公司 Method for dual-mode mobile phone to connect respectively with plurality of telecom network
CN101355740A (en) * 2007-07-27 2009-01-28 佛山市顺德区顺达电脑厂有限公司 Method and system for protecting smart card data
CN101119565A (en) * 2007-09-03 2008-02-06 华为技术有限公司 Mobile communications terminal data protection method, system and equipment
CN104660613A (en) * 2015-03-16 2015-05-27 联想(北京)有限公司 Authentication method of user identification module and electronic equipment
CN105790949A (en) * 2015-11-17 2016-07-20 广东欧珀移动通信有限公司 Subscriber identity module card unlocking method and subscriber identity module card unlocking device
CN108781359A (en) * 2016-03-30 2018-11-09 T移动美国公司 The adaptive equipment locking of safety

Similar Documents

Publication Publication Date Title
CN111835689B (en) Identity authentication method of digital key, terminal device and medium
US8463234B2 (en) Method for providing security services by using mobile terminal password and mobile terminal thereof
US7480805B1 (en) Method and system for identifying and processing an unauthorized access request
EP1679925A1 (en) Authentication of a mobile station
CN101577907B (en) Method and device for managing mobile terminal
JP4245151B2 (en) Mobile phone with use restriction function and method of restricting use of the machine
US7702907B2 (en) System and method for safe booting electronic devices
CN101772017A (en) Method for remotely destroying information of communication terminal and communication terminal thereof
EP2437198B1 (en) Secure PIN reset process
CN104573463B (en) system switching method, system switching device and terminal
EP2919499A2 (en) Version protection method and apparatus for mobile terminals
WO2017166689A1 (en) Privacy protection method and device
CN107832616B (en) Computer pre-boot security verification, enforcement and repair
CN104820805A (en) Method and device for burglary prevention of user identity identification card information
US20040268133A1 (en) Secure personal identification entry system
CN112019684A (en) Control method and electronic device
CN105292020B (en) Control method for vehicle, controller of vehicle and terminal
CN108122111B (en) Secure payment method, device, storage medium and computer equipment
CN105635090B (en) System access method, system access mechanism and terminal
KR100982254B1 (en) System and method for processing log-in request
EP3467693B1 (en) Identity verification method and apparatus
JP2003067338A (en) Security protection system, security protection method and security protection program
CN107358092A (en) Reset the method for screen-lock password and the terminal of screen-lock password can be reset
CN112671979A (en) Terminal anti-theft method and device
CN111680270A (en) Anti-theft method and device for camera, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201201

RJ01 Rejection of invention patent application after publication