CN1568069A - A method for self-destruction of mobile terminal information - Google Patents

A method for self-destruction of mobile terminal information Download PDF

Info

Publication number
CN1568069A
CN1568069A CN03142528.3A CN03142528A CN1568069A CN 1568069 A CN1568069 A CN 1568069A CN 03142528 A CN03142528 A CN 03142528A CN 1568069 A CN1568069 A CN 1568069A
Authority
CN
China
Prior art keywords
self
destroying function
mobile device
destroying
tag card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN03142528.3A
Other languages
Chinese (zh)
Other versions
CN100499889C (en
Inventor
李志明
李晓斌
杨利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB031425283A priority Critical patent/CN100499889C/en
Publication of CN1568069A publication Critical patent/CN1568069A/en
Application granted granted Critical
Publication of CN100499889C publication Critical patent/CN100499889C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

The invention supplies a method to self-destruct the mobile terminal information. The mobile terminal has the function of self-destruction. It includes the following steps: a. the parameter corresponding to self-destruction is set onto the ME and identification card; b. when the mobile device with identification card inserted powering on and starting, ME judges whether the self-destruction is activate according to the parameter state, if yes, the step C would be executed, else the normal operation would be executed directly; c. judging whether the inserted identification card is legal, if yes, the normal operation would be executed, else prompting message would be shown or the self-destruction would be started directly. By using the invention, the private secrets of user information in ME would be ensured through setting the self-destruct parameter to mobile terminal that can automatically execute the self-function checking after the ME of SIM/USIM card powering on. Even if the self-destruction function has not been activate, the legal user can ask the legal authorization institution for the activation of the self-destruction function through the air interface and execute the self-destruction function checking.

Description

A kind of method of self-destruction information of mobile terminal
Technical field
The present invention relates to the processing mobile terminal information technical field, be meant a kind of method of self-destruction information of mobile terminal especially.
Background technology
At present, mobile phone is widely used in the daily life as a kind of portable terminal.The technical term of mobile phone is subscriber equipment (UE, be primarily aimed at 3G mobile) or travelling carriage (MS, be primarily aimed at the 2G mobile phone), UE or MS are by contracted user's tag card (SIM) or general land access of radio network contracted user tag card (USIM) and mobile device (ME) formation.Storage mobile subscriber's information such as international mobile contracted user's sign (IMSI), mobile subscriber ISDN number (MSISDN), CAMEL-Subscription-Information, security information, user profile and configuration parameter in the SIM/USIM card.Store International Mobile Station Equipment Identification (IMEI), application program and the user profile of subscriber equipment among the ME.
Described the personalized mechanism of ME in the existing standard, this mechanism is divided into the personalized mechanism of network, service provider, company and SIM/USIM card, and each personalized mechanism all has its relevant code character.Wherein, the personalized mechanism of SIM/USIM card is mainly used in and prevents that ME is stolen.After ME had been provided with other SIM/USIM card function of forbidding, the personalized designator of SIM/USIM card was " opening " state among the ME, and by the user the personalized control of corresponding SIM/USIM card password was set among the ME.When the ME that contains the SIM/USIM card powers on, if the personalized designator of SIM/USIM card is " opening " state among the ME, then ME relatively in personalization control password and the SIM/USIM card of himself storage SIM/USIM card the personalization control password of storage SIM/USIM card whether identical, to determine whether the user can use this ME.When having only legal SIM/USIM card to be inserted into ME, this ME just can operate as normal, otherwise, use this ME and can only initiate urgent call.
The defective of above-mentioned personalized mechanism is: after ME is stolen, the personalized mechanism of SIM/USIM card is only applicable to the situation that the user has been provided with other SIM/USIM card function of forbidding, and, even this ME has been provided with the function of other SIM/USIM card of forbidding, stealer is initiated the emergency call function except using this ME, still can steal the certain applications program and the user profile of storing among the ME, therefore, the personalized mechanism of SIM/USIM card does not solve the problem that user profile is leaked fully.If the user is not provided with the function of other SIM/USIM card of forbidding, no matter whether stealer changes the SIM/USIM card, and the userspersonal information will be leaked to the third party.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of method of self-destruction information of mobile terminal, avoid user's personal information to leak to the third party.
Technical scheme of the present invention is achieved in that in order to achieve the above object
A kind of method of self-destruction information of mobile terminal, portable terminal has self-destroying function, and this method may further comprise the steps:
A, the parameter relevant with self-destroying function is set respectively on mobile device and tag card;
B, when inserting the mobile device electrifying startup of tag card, mobile device (ME) judges according to set parameter state whether self-destroying function is activated, if, execution in step c then, otherwise directly carry out normal running;
Whether the tag card that c, judgement are inserted is legal, if, then carry out normal running, otherwise, show information or directly start self-destroying function.
Preferably, described parameter is " self-destroying function sign " parameter that is arranged on the mobile device, step b is described to judge that whether self-destroying function has been activated is to judge by mobile device whether the state of " self-destroying function sign " is " opening " state, if, then self-destroying function is activated, if be " closing " state, then self-destroying function is not activated.
Preferably, described parameter is " the self-destroying function control code character " parameter that is arranged on the tag card, step c is described judge tag card whether legal be that mobile device reads " self-destroying function control code character " in the tag card, and judge whether be somebody's turn to do " the self-destroying function control code character " of having preserved in " self-destroying function control code character " and the mobile device mates, if, then this tag card is legal, otherwise this tag card is illegal.
Preferably, the activation of the described self-destroying function of step b further may further comprise the steps:
B1, mobile device read " the self-destroying function control code character " in the tag card, perhaps, " self-destroying function control code character " on the designated identification card are input in the mobile device;
B2, whether judge mobile device by pre-self-destroying function inspection, if, then preserve " the self-destroying function control code character " that read or imported, and execution in step b3, otherwise, stop this activation;
B3, to being arranged in the mobile device in " self-destroying function control key " parameter input " self-destroying function control key " and storing this key, and " the self-destroying function sign " that be provided with in the mobile device is " opening " state.
Preferably, the described pre-self-destroying function inspection of step b2 further may further comprise the steps:
Check whether self-destroying function is activated, if then stop this activation; Otherwise, check that whether " the self-destroying function control code character " be input in the mobile device be the subclass of other customization institute uses code character of mobile device, if, continuation execution subsequent step then, otherwise, this activation stopped.
Preferably, this method further comprises repeated execution of steps b1 and b2, so that mobile device allows to read and store " self-destroying function control code character " in a plurality of different identification cards.
Preferably, this method further comprises the deexcitation of self-destroying function, it may further comprise the steps: the user imports " self-destroying function control key ", mobile device judges whether " the self-destroying function control key " of input and " the self-destroying function control key " self stored mate, if then " self-destroying function sign " in the mobile device is set to " closing " state; Otherwise, the state that mobile device still keeps self-destroying function to activate.
Preferably, this method further comprises: deactivating operation surpasses the maximum reattempt times of user or the setting of mobile device manufacturer in a period of time, and then mobile device starts self-destroying function automatically.
Preferably, during the described self-destroying function un-activation of step b, this method further comprises: utilize air interface to activate the self-destroying function of mobile device by Mobile Terminated point-to-point short message (MT-SMS PP) mode.
Preferably, send SMS message, said method comprising the steps of by the mobile device of air interface in the appointment portable terminal that tag card has been replaced:
A, legal authorization mechanism issue International Mobile Station Equipment Identification (IMEI), " the self-destroying function sign " and " self-destroying function control key " that comprises the user, and " self-destroying function sign " is the short message of " opening " state;
B, according to this Short Message Identifier, after receiving this short message by the mobile device of specifying portable terminal, whether International Mobile Station Equipment Identification and the International Mobile Station Equipment Identification in the short message of judging self are complementary, if, then mobile device is stored in " self-destroying function control key " in the short message in the mobile device, and " self-destroying function sign " be set to " opening " state, otherwise mobile device is not done any processing;
C, portable terminal reply to legal authorization mechanism with the execution result of step b.
Preferably, send SMS message, said method comprising the steps of by the mobile device of air interface in the appointment portable terminal that tag card is not replaced:
A, legal authorization mechanism issue International Mobile Station Equipment Identification (IMEI), " self-destroying function sign ", " the self-destroying function control key " and " self-destroying function control code character " that comprises the user, and " self-destroying function sign " is the short message of " opening " state;
B, according to this Short Message Identifier, after receiving this short message by the mobile device of specifying portable terminal, whether International Mobile Station Equipment Identification and the International Mobile Station Equipment Identification in the short message of judging self are complementary, if, then mobile device is stored in " self-destroying function control key " in the short message in the mobile device, use " the self-destroying function control code character " of tag card and " self-destroying function sign " is set to " opening " state current in " self-destroying function control code character " in short message replacement mobile device " the self-destroying function control code character " tabulation, otherwise mobile device is not done any processing;
C, portable terminal reply to legal authorization mechanism with the execution result of step b.
Preferably, send SMS message, said method comprising the steps of by the tag card of air interface in the appointment portable terminal that tag card has been replaced:
A, legal authorization mechanism issue and comprise " self-destroying function sign ", and " self-destroying function sign " is the short message of " opening " state;
B, according to this Short Message Identifier, specify the tag card of portable terminal to receive this short message after, after portable terminal is set to " opening " state with " self-destroying function sign ", by portable terminal answer acknowledge message;
C, tag card send the order that makes mobile device carry out the initialization operation of self-destroying function inspection at once.
Preferably, send SMS message, said method comprising the steps of by the tag card of air interface in the appointment portable terminal that tag card is not replaced:
A, legal authorization mechanism issue and comprise " self-destroying function sign " and " self-destroying function control code character ", and " self-destroying function sign " is the short message of " opening " state;
B, according to this Short Message Identifier, after the tag card of appointment portable terminal receives this short message, portable terminal is replaced current " the self-destroying function control code character " of using tag card in mobile device " the self-destroying function control code character " tabulation with " self-destroying function control code character " in the short message, and after " self-destroying function sign " be set to " opening " state, reply acknowledge message by portable terminal;
C, tag card send the order that makes mobile device carry out the initialization operation of self-destroying function inspection at once.
Preferably, described self-destroying function is with userspersonal information's deletion or hiding automatically, and/or the part or all of application program of storing in the mobile device was all lost efficacy or deleted, and/or allow or forbid that mobile device initiates urgent call, and/or start self the internal logic bomb that makes mobile device forfeiture repertoire.
Preferably, described information is changed the self-destruction controlled function of tag card or deexcitation mobile device again for the request user.
Preferably, described portable terminal is subscriber equipment (UE), described tag card is contracted user's tag card (SIM) or general land access of radio network contracted user tag card (USIM), or described portable terminal is travelling carriage (MS), and described tag card is contracted user's tag card (SIM) or general land access of radio network contracted user tag card (USIM).
Use the present invention, by the self-destroying function parameter is set for portable terminal, after the ME that inserts the SIM/USIM card is powered on, automatically carry out the self-destroying function inspection, thereby guaranteed the privacy of user profile among the ME, even the self-destroying function among the ME is not activated, validated user also can require legal authorization mechanism to activate the self-destroying function of ME by air interface, and then carries out the self-destroying function inspection.Therefore, use the present invention, no matter whether the user has activated self-destroying function, all can guarantee to be stored in the privacy of the personal information among the ME, also can avoid the disabled user to use application program on the ME simultaneously.
Description of drawings
Fig. 1 is for using the flow chart that realization self-destroying function of the present invention activates;
Fig. 2 is for using the flow chart of realization self-destroying function of the present invention deexcitation;
Fig. 3 carries out the flow chart that self-destroying function is checked for using the ME that possesses self-destroying function of the present invention.
Embodiment
The present invention is further described in more detail below in conjunction with drawings and the specific embodiments.
Thinking of the present invention is: the relevant parameter that self-destroying function is set, after ME is stolen and is replaced new SIM/USIM card, when the ME that contains the SIM/USIM card powers on, ME will carry out the self-destroying function inspection, if ME " self-destroying function sign " is " opening " state, then because uncommitted SIM/USIM card can't be by validity checking, this ME will be to user prompt information or the directly automatic self-destroying function that starts; If ME possesses self-destroying function, but this function is not activated, and promptly " the self-destroying function sign " among the ME is " closing " state, at this moment, after the user authorizes through legal entity, can issue the instruction of ME self-destroying function by air interface, activate the self-destroying function of ME, to start the self-destroying function inspection.As long as ME possesses self-destroying function, in any case its self-destroying function state is set, validated user all can make this self-destroying function start, thereby guarantees that personal information can not leak to the third party.
In ME, set in advance " self-destroying function sign " and " self-destroying function control key " parameter, " self-destroying function control code character " parameter also can be set; In the SIM/USIM card, set in advance " self-destroying function control code character " parameter, should " self-destroying function control code character " can be IMSI, but also User Defined.
Under the normal situation about using of user, when requiring ME that self-destroying function is provided, the self-destroying function of ME can be activated, also can not use this function, be about to the self-destroying function deexcitation.
Figure 1 shows that and use the flow chart that realization self-destroying function of the present invention activates.
Step 101, ME read in the SIM/USIM card " self-destroying function control code character " or, will specify " self-destroying function control code character " on the SIM/USIM card to be input among the ME by manufacturer;
Step 102 is carried out pre-self-destroying function inspection, and judges whether by this pre-self-destroying function inspection, if then execution in step 103, otherwise directly withdraw from;
Pre-self-destroying function inspection comprises following two steps:
A) check whether self-destroying function activates,, then should check failure, stop this activation if activate; If un-activation then should be checked successfully, continue execution in step b;
B) check that whether " the self-destroying function control code character " be input among the ME be the subclass of other customization institute uses code character of ME, if, then check successfully, and continuation execution subsequent step; Otherwise check failure, stop this activation; If by above-mentioned a), b) two steps checked, then ME preserves " the self-destroying function control code character " that read or by " the self-destroying function control code character " of manufacturer's input;
Step 103, allow to preserve " the self-destroying function control code character " of a plurality of SIM/USIM cards among the Me, whether " the self-destroying function control code character " of judging a plurality of SIM/USIM cards reads and finishes, if, then return step 104, otherwise execution in step 101, so that preserve a plurality of " self-destroying function control code characters " among the ME;
Step 104, the user imports " self-destroying function control key " and stores this key in ME;
Step 105, " the self-destroying function sign " that be provided with among the ME is " opening " state.
So far, the self-destroying function among the ME activates.
Figure 2 shows that the flow chart of using realization self-destroying function of the present invention deexcitation.
Step 201, the user is by keyboard input " self-destroying function control key ";
Step 202, ME judges whether " the self-destroying function control key " imported and " the self-destroying function control key " self stored are complementary, if then execution in step 203, otherwise execution in step 204;
Step 203 realizes the self-destroying function deexcitation, and " the self-destroying function sign " that be about among the ME is set to " closing " state;
Step 204 stops deexcitation, and promptly ME still keeps the self-destroying function state of activation.
Perhaps, validated user can as mechanisms such as Virtual network operator, service providers, make the self-destroying function of the releasing ME of manufacturer of ME by legal authorization, realizes the self-destroying function deexcitation of ME.
For preventing that stealer from passing through repeatedly to import the self-destruction controlled function that " self-destroying function control key " attempts closing ME, ME is counted deactivating operation, if promptly deactivation process is above the maximum reattempt times N1 of user or the setting of ME manufacturer in a period of time T1, then ME starts self-destroying function automatically.The value of T1 and N1 is set up on their own by the user or ME manufacturer sets.
When having the SIM/USIM card to insert ME and starting, the ME that possesses self-destroying function will carry out the self-destroying function inspection, Figure 3 shows that using the ME that possesses self-destroying function of the present invention carries out the flow chart that self-destroying function is checked.
Step 301, when inserting the ME startup of SIM/USIM card, ME judges whether the state of " self-destroying function sign " is " opening " state, if then execution in step 302, otherwise, directly withdrawing from the self-destroying function inspection, ME carries out normal running;
Step 302, " self-destroying function control code character " that " the self-destroying function control code character " that ME will read in the SIM/USIM card stored in tabulating with ME compares, if comprise " the self-destroying function control code character " that is read in " the self-destroying function control code character " of storage in the ME tabulation, then execution in step 303, otherwise execution in step 304;
Step 303, ME is by inspection, and the execution normal running;
Step 304, ME gives user prompt information or directly starts the self-destroying function of ME, and this information is changed the self-destruction controlled function of SIM/USIM card or deexcitation ME again for the request user.
If possessing the ME of self-destroying function loses accidentally, and its self-destroying function is set to " opening " state, then when the thief inserts new SIM/USIM card and enables, ME will carry out the self-destroying function inspection automatically, owing to do not comprise " the self-destroying function control code character " of the used SIM/USIM card of current stealer in " the self-destroying function control code character " of storing among ME tabulation certainly, so ME will start self-destroying function or provide information.
Lose accidentally if possess the MS/UE of self-destroying function, but its self-destroying function is set to " closing " state, then validated user can require legal authorization mechanism, as Virtual network operator, issue the self-destroying function enabled instruction by air interface,, start the self-destroying function inspection to activate self-destroying function.Usually, Virtual network operator activates the self-destroying function of ME by Mobile Terminated point-to-point short message (MT-SMS PP) mode, and, the SIM/USIM card no matter whether stealer more renews, user profile among the ME can both be deleted, thereby avoid user profile to leak to the third party.Concrete grammar is as follows:
Method A: the ME in specifying MS/UE sends SMS message by air interface, and has changed the situation of SIM/USIM card at stealer.
IMEI, " self-destroying function sign " and " self-destroying function control key " parameter of comprising the user in the short message that Virtual network operator issued, and " self-destroying function sign " is " opening " state, and " self-destroying function control key " set up on their own by user and Virtual network operator.This Short Message Identifier is the ME that sends among the MS/UE of validated user appointment, after the ME of validated user appointment receives this short message, IMEI of self and the IMEI in the short message are compared, if be complementary, then ME is stored in " self-destroying function control key " in the short message among the ME, and " the self-destroying function sign " among the ME be set to " opening " state, after stealer restarts this ME, this ME carries out initialization operation, and carry out the self-destroying function inspection, owing to do not comprise " the self-destroying function control code character " of the used SIM/USIM card of current stealer in " the self-destroying function control code character " of storing among ME tabulation certainly, so ME will start self-destroying function or provide information; If do not match, then this ME does not do any processing after receiving the short message that Virtual network operator issues, still normal executable operations.No matter whether the self-destroying function of ME is activated, and whether MS/UE will send acknowledge message to Virtual network operator, be activated with the self-destroying function of informing ME.
Method B: the ME in specifying MS/UE sends SMS message by air interface, and does not change the situation of SIM/USIM card at stealer.
IMEI, " self-destroying function sign ", " self-destroying function control key " and " self-destroying function control code character " parameter of comprising the user in the short message that Virtual network operator issued, and " self-destroying function sign " is " opening " state, and " self-destroying function control key " and " self-destroying function control code character " set up on their own by user and Virtual network operator.This Short Message Identifier is the ME that sends among the MS/UE of validated user appointment, after the ME of validated user appointment receives this short message, IMEI of self and the IMEI in the short message are compared, if be complementary, then ME is stored in " self-destroying function control key " in the short message among the ME, and with current " the self-destroying function control code character " of using the SIM/USIM card in the tabulation of " the self-destroying function control code character " replacement " self-destroying function control code character " in the short message, simultaneously " self-destroying function sign " is set to " opening " state, after stealer restarts this ME, this ME carries out initialization operation, and carry out the self-destroying function inspection, even stealer is not changed the SIM/USIM card, because " the self-destroying function control code character " of original SIM/USIM card of storage is replaced in ME " the self-destroying function control code character " tabulation, therefore, " the self-destroying function control code character " of storage is different certainly with " the self-destroying function control code character " of original SIM/USIM card in ME " the self-destroying function control code character " tabulation, so ME will start self-destroying function or provide information; If do not match, then this ME does not do any processing after receiving the short message that Virtual network operator issues, still normal executable operations.No matter whether the self-destroying function of ME is activated, and whether MS/UE will send acknowledge message to Virtual network operator, be activated with the self-destroying function of informing ME.
Method C: send SMS message by the SIM/USIM card of air interface in specifying MS/UE, and changed the situation of SIM/USIM card at stealer.
Only comprise " self-destroying function sign " in the short message that Virtual network operator issued, and should " self-destroying function sign " be " opening " state.This short message sends to the SIM/USIM card among the MS/UE of validated user appointment by the MT-SMS PP data downloading mode in SIM application tool (SAT:SIMAPPLICATION TOOL) or USIM application tool (USAT:USIM APPLICATIONTOOL) mechanism.After this short message was received in the SIM/USIM clamping, MS/UE was set to " opening " state with " self-destroying function sign ", and MS/UE sends acknowledge message to network.Then, the SIM/USIM card sends refresh command to ME, and order ME carries out initialization operation at once.In initialization operation, ME can carry out the self-destroying function inspection.Owing to do not comprise " the self-destroying function control code character " of the used SIM/USIM card of current stealer in " the self-destroying function control code character " of storing among ME tabulation certainly, so ME will start self-destroying function or provide information.
Method D: send SMS message by the SIM/USIM card of air interface in specifying MS/UE, and do not change the situation of SIM/USIM card at stealer.
Only comprise " self-destroying function sign " and " self-destroying function control code character " in the short message that Virtual network operator issued, and should " self-destroying function sign " be " opening " state.This short message sends to the SIM/USIM card among the MS/UE of validated user appointment by the MT-SMS PP data downloading mode in SIM application tool or the USIM application tool mechanism.After this short message is received in the SIM/USIM clamping, MS/UE is set to " opening " state with " self-destroying function sign ", and " self-destroying function control code character " in the short message replaced in ME " the self-destroying function control code character " tabulation after current " the self-destroying function control code character " of using the SIM/USIM card, MS/UE sends acknowledge message to network.Then, the SIM/USIM card sends refresh command to ME, and order ME carries out initialization operation at once.In initialization operation, ME can carry out the self-destroying function inspection.Even stealer is not changed the SIM/USIM card, because " the self-destroying function control code character " of original SIM/USIM card of storage is replaced in ME " the self-destroying function control code character " tabulation, therefore, " the self-destroying function control code character " of storage is different with " the self-destroying function control code character " of original SIM/USIM card in ME " the self-destroying function control code character " tabulation, so ME will start self-destroying function or provide information.
Because the presently used cell-phone number of stealer is unique corresponding with the IMSI of its current use, and the IMSI of the current use of stealer is obtained by the corresponding relation of Virtual network operator by the IMSI of storage in IMEI in the equipment identity register (EIR) and the attaching position register (HLR).For the situation that does not comprise EIR in the subnetwork carrier network, can be achieved by increasing following function in the terminal: the terminal that possesses self-destroying function is after the each SIM/USIM of replacing card, initiatively send SMS message to network, comprise IMEI, IMSI, self-destruction terminal type identification in this short message, Virtual network operator is set up this information of server stores separately, when the self-destroying function of validated user requesting activation ME, Virtual network operator obtains the employed IMSI of stealer by these mapping relations.After obtaining the presently used IMSI of stealer, can obtain the presently used cell-phone number of stealer.
From the above, no matter be the deactivation process failure of ME, or self-destroying function inspection failure, or validated user can require legal authorization mechanism, issues the self-destroying function activation instruction by air interface, can realize that all self-destroying function starts.After self-destroying function was activated, the type of the self-destroying function that ME provided and mode were setting in advance or realize following one or more functions according to the default setting of ME manufacturer according to the user:
(1) userspersonal information deletes automatically or hides;
(2) the part or all of application program of storing among the ME all lost efficacy or is deleted;
(3) allow or ban use of this ME to initiate urgent call;
(4) logic bomb of startup ME self inside makes ME forfeiture repertoire.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (16)

1, a kind of method of self-destruction information of mobile terminal, portable terminal has self-destroying function, it is characterized in that, and this method may further comprise the steps:
A, the parameter relevant with self-destroying function is set respectively on mobile device and tag card;
B, when inserting the mobile device electrifying startup of tag card, mobile device (ME) judges according to set parameter state whether self-destroying function is activated, if, execution in step c then, otherwise directly carry out normal running;
Whether the tag card that c, judgement are inserted is legal, if, then carry out normal running, otherwise, show information or directly start self-destroying function.
2, method according to claim 1, it is characterized in that, described parameter is " self-destroying function sign " parameter that is arranged on the mobile device, step b is described to judge that whether self-destroying function has been activated is to judge by mobile device whether the state of " self-destroying function sign " is " opening " state, if, then self-destroying function is activated, if be " closing " state, then self-destroying function is not activated.
3, method according to claim 1, it is characterized in that, described parameter is " the self-destroying function control code character " parameter that is arranged on the tag card, step c is described judge tag card whether legal be that mobile device reads " self-destroying function control code character " in the tag card, and judge whether be somebody's turn to do " the self-destroying function control code character " of having preserved in " self-destroying function control code character " and the mobile device mates, if then this tag card is legal, otherwise this tag card is illegal.
4, method according to claim 1 is characterized in that, the activation of the described self-destroying function of step b further may further comprise the steps:
B1, mobile device read " the self-destroying function control code character " in the tag card, perhaps, " self-destroying function control code character " on the designated identification card are input in the mobile device;
B2, whether judge mobile device by pre-self-destroying function inspection, if, then preserve " the self-destroying function control code character " that read or imported, and execution in step b3, otherwise, stop this activation;
B3, to being arranged in the mobile device in " self-destroying function control key " parameter input " self-destroying function control key " and storing this key, and " the self-destroying function sign " that be provided with in the mobile device is " opening " state.
5, method according to claim 4 is characterized in that, the described pre-self-destroying function inspection of step b2 further may further comprise the steps:
Check whether self-destroying function is activated, if then stop this activation; Otherwise, check that whether " the self-destroying function control code character " be input in the mobile device be the subclass of other customization institute uses code character of mobile device, if, continuation execution subsequent step then, otherwise, this activation stopped.
6, method according to claim 4 is characterized in that, this method further comprises repeated execution of steps b1 and b2, so that mobile device allows to read and store " self-destroying function control code character " in a plurality of different identification cards.
7, method according to claim 1, it is characterized in that, this method further comprises the deexcitation of self-destroying function, it may further comprise the steps: the user imports " self-destroying function control key ", mobile device judges whether " the self-destroying function control key " of input and " the self-destroying function control key " self stored mate, if then " self-destroying function sign " in the mobile device is set to " closing " state; Otherwise, the state that mobile device still keeps self-destroying function to activate.
8, method according to claim 7 is characterized in that, this method further comprises: deactivating operation surpasses the maximum reattempt times of user or the setting of mobile device manufacturer in a period of time, and then mobile device starts self-destroying function automatically.
9, method according to claim 1, it is characterized in that, during the described self-destroying function un-activation of step b, this method further comprises: utilize air interface to activate the self-destroying function of mobile device by Mobile Terminated point-to-point short message (MT-SMS PP) mode.
10, method according to claim 9 is characterized in that, sends SMS message by the mobile device of air interface in the appointment portable terminal that tag card has been replaced, said method comprising the steps of:
A, legal authorization mechanism issue International Mobile Station Equipment Identification (IMEI), " the self-destroying function sign " and " self-destroying function control key " that comprises the user, and " self-destroying function sign " is the short message of " opening " state;
B, according to this Short Message Identifier, after receiving this short message by the mobile device of specifying portable terminal, whether International Mobile Station Equipment Identification and the International Mobile Station Equipment Identification in the short message of judging self are complementary, if, then mobile device is stored in " self-destroying function control key " in the short message in the mobile device, and " self-destroying function sign " be set to " opening " state, otherwise mobile device is not done any processing;
C, portable terminal reply to legal authorization mechanism with the execution result of step b.
11, method according to claim 9 is characterized in that, sends SMS message by the mobile device of air interface in the appointment portable terminal that tag card is not replaced, and said method comprising the steps of:
A, legal authorization mechanism issue International Mobile Station Equipment Identification (IMEI), " self-destroying function sign ", " the self-destroying function control key " and " self-destroying function control code character " that comprises the user, and " self-destroying function sign " is the short message of " opening " state;
B, according to this Short Message Identifier, after receiving this short message by the mobile device of specifying portable terminal, whether International Mobile Station Equipment Identification and the International Mobile Station Equipment Identification in the short message of judging self are complementary, if, then mobile device is stored in " self-destroying function control key " in the short message in the mobile device, use " the self-destroying function control code character " of tag card and " self-destroying function sign " is set to " opening " state current in " self-destroying function control code character " in short message replacement mobile device " the self-destroying function control code character " tabulation, otherwise mobile device is not done any processing;
C, portable terminal reply to legal authorization mechanism with the execution result of step b.
12, method according to claim 9 is characterized in that, sends SMS message by the tag card of air interface in the appointment portable terminal that tag card has been replaced, said method comprising the steps of:
A, legal authorization mechanism issue and comprise " self-destroying function sign ", and " self-destroying function sign " is the short message of " opening " state;
B, according to this Short Message Identifier, specify the tag card of portable terminal to receive this short message after, after portable terminal is set to " opening " state with " self-destroying function sign ", by portable terminal answer acknowledge message;
C, tag card send the order that makes mobile device carry out the initialization operation of self-destroying function inspection at once.
13, method according to claim 9 is characterized in that, sends SMS message by the tag card of air interface in the appointment portable terminal that tag card is not replaced, and said method comprising the steps of:
A, legal authorization mechanism issue and comprise " self-destroying function sign " and " self-destroying function control code character ", and " self-destroying function sign " is the short message of " opening " state;
B, according to this Short Message Identifier, after the tag card of appointment portable terminal receives this short message, portable terminal is replaced current " the self-destroying function control code character " of using tag card in mobile device " the self-destroying function control code character " tabulation with " self-destroying function control code character " in the short message, and after " self-destroying function sign " be set to " opening " state, reply acknowledge message by portable terminal;
C, tag card send the order that makes mobile device carry out the initialization operation of self-destroying function inspection at once.
14, according to claim 1 or 8 described methods, it is characterized in that, described self-destroying function is with userspersonal information's deletion or hiding automatically, and/or the part or all of application program of storing in the mobile device was all lost efficacy or deleted, and/or allow or forbid that mobile device initiates urgent call, and/or start self the internal logic bomb that makes mobile device forfeiture repertoire.
15, method according to claim 1 is characterized in that, described information is changed the self-destruction controlled function of tag card or deexcitation mobile device again for the request user.
16, method according to claim 1 is characterized in that,
Described portable terminal is subscriber equipment (UE), and described tag card is contracted user's tag card (SIM) or general land access of radio network contracted user tag card (USIM), or
Described portable terminal is travelling carriage (MS), and described tag card is contracted user's tag card (SIM) or general land access of radio network contracted user tag card (USIM).
CNB031425283A 2003-06-17 2003-06-17 A method for self-destruction of mobile terminal information Expired - Lifetime CN100499889C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031425283A CN100499889C (en) 2003-06-17 2003-06-17 A method for self-destruction of mobile terminal information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031425283A CN100499889C (en) 2003-06-17 2003-06-17 A method for self-destruction of mobile terminal information

Publications (2)

Publication Number Publication Date
CN1568069A true CN1568069A (en) 2005-01-19
CN100499889C CN100499889C (en) 2009-06-10

Family

ID=34471124

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031425283A Expired - Lifetime CN100499889C (en) 2003-06-17 2003-06-17 A method for self-destruction of mobile terminal information

Country Status (1)

Country Link
CN (1) CN100499889C (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100464613C (en) * 2005-09-28 2009-02-25 乐金电子(中国)研究开发中心有限公司 Method for automatically destroying cell phone and cell phone thereof
WO2009030081A1 (en) * 2007-09-07 2009-03-12 Zte Corporation System and method of resetting leaving factory state of mobile terminal
WO2011022914A1 (en) * 2009-08-28 2011-03-03 中兴通讯股份有限公司 Method and system for smart card remote control
EP2472923A1 (en) * 2009-08-28 2012-07-04 ZTE Corporation Remote control method and system for smart card
US8718602B2 (en) 2009-08-28 2014-05-06 Zte Corporation Method and system for remote control of smart card
US8744403B2 (en) 2009-08-28 2014-06-03 Zte Corporation Method and system for remote control of a smart card
CN116756785A (en) * 2023-08-16 2023-09-15 中国兵器装备集团兵器装备研究所 Self-destruction method and system of intelligent terminal system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100464613C (en) * 2005-09-28 2009-02-25 乐金电子(中国)研究开发中心有限公司 Method for automatically destroying cell phone and cell phone thereof
WO2009030081A1 (en) * 2007-09-07 2009-03-12 Zte Corporation System and method of resetting leaving factory state of mobile terminal
WO2011022914A1 (en) * 2009-08-28 2011-03-03 中兴通讯股份有限公司 Method and system for smart card remote control
CN102005089A (en) * 2009-08-28 2011-04-06 中兴通讯股份有限公司 Method and system for remotely controlling intelligent card
EP2472923A1 (en) * 2009-08-28 2012-07-04 ZTE Corporation Remote control method and system for smart card
US8718603B2 (en) 2009-08-28 2014-05-06 Zte Corporation Method and system for remote control of a smart card
US8718602B2 (en) 2009-08-28 2014-05-06 Zte Corporation Method and system for remote control of smart card
EP2472923A4 (en) * 2009-08-28 2014-05-07 Zte Corp Remote control method and system for smart card
US8744403B2 (en) 2009-08-28 2014-06-03 Zte Corporation Method and system for remote control of a smart card
CN116756785A (en) * 2023-08-16 2023-09-15 中国兵器装备集团兵器装备研究所 Self-destruction method and system of intelligent terminal system
CN116756785B (en) * 2023-08-16 2023-11-10 中国兵器装备集团兵器装备研究所 Self-destruction method and system of intelligent terminal system

Also Published As

Publication number Publication date
CN100499889C (en) 2009-06-10

Similar Documents

Publication Publication Date Title
US10425818B2 (en) Enforcing service policies in embedded UICCs
US9729696B2 (en) Method and system for tracking mobile communication device using MMS
US8874077B2 (en) Method and apparatus for monitoring and theft prevention
US8909290B2 (en) Methods and apparatus for subscription management in dual SIM single standby devices
US8509844B2 (en) Enabling portability of credentials across dual mode devices
EP2302549A1 (en) Platform security apparatus and method thereof
CN1638345A (en) Configuring network settings of thin client devices using portable storage media
CN1870771A (en) Method for sharing storage space of mobile terminal and its system
CN1933629A (en) Method and device for protecting user storage information in mobile terminal
EP2665300B1 (en) Mobile terminal and network locking method therefor
EP3468260B1 (en) Method and device for reducing power consumption of terminal, and smart card
CN1860818A (en) Method and system for controlling resources via a mobile terminal, related network and its computer program product
CN1889730A (en) Wireless user identification module, communication terminal equipment and communication control method
EP2356836A1 (en) Method and apparatus for associating identity modules and terminal equipment
CN1829365A (en) User recognition module and method capable of realizing mobile terminal area locking
CN101039312A (en) Method and apparatus for preventing service function entity of general authentication framework from attack
CN1568069A (en) A method for self-destruction of mobile terminal information
US6785537B2 (en) Mobile equipment theft deterrent system and method
CN1606284A (en) Mobile communication system
EP2293218B1 (en) A chip card, an electronic system, a method being implemented by a chip card and a computer program product
CN1767680A (en) Mobile communication terminal using intelligent card to implement user certification and certification method thereof
EP4084514A1 (en) Method for identifying embedded subscriber identity module (esim) card and terminal device
KR20040017441A (en) Method for preventing illegal using of user identity module in mobile communication terminal
CN1469264A (en) Equipment control system
EP1720366A2 (en) System of remote access of mobile equipment to mobile telephony services

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20090610