CN205829777U - A kind of cellphone information protection lock - Google Patents

A kind of cellphone information protection lock Download PDF

Info

Publication number
CN205829777U
CN205829777U CN201620807909.2U CN201620807909U CN205829777U CN 205829777 U CN205829777 U CN 205829777U CN 201620807909 U CN201620807909 U CN 201620807909U CN 205829777 U CN205829777 U CN 205829777U
Authority
CN
China
Prior art keywords
mobile phone
protection lock
lock
information
secret key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201620807909.2U
Other languages
Chinese (zh)
Inventor
周封
刘小可
郝婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin University of Science and Technology
Original Assignee
Harbin University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin University of Science and Technology filed Critical Harbin University of Science and Technology
Priority to CN201620807909.2U priority Critical patent/CN205829777U/en
Application granted granted Critical
Publication of CN205829777U publication Critical patent/CN205829777U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The utility model proposes a kind of cellphone information protection lock, belong to digital product technical field of burglary prevention.Including protection lock, plug and mobile phone, protection lock may be designed as one with data wire.The biological characteristic storing user respectively in protection lock and mobile phone and the unique key accordingly generated are as protection checking information, it is ensured that protect the unique corresponding relation of lock and mobile phone.When mobile phone outwards transmits personal information, need to connect unique corresponding protection lock;Thus connect computer at mobile phone, connect network, and lose, stolen or when transferring the possession of, all etc. protected comprehensively and effectively, prevent the leakage of personal information being stored in mobile phone, and other people utilize mobile phone to bring loss to owner.This utility model has that cost is extremely low, safety is high, logic is simple, easy and simple to handle, do not affect the advantages such as normal use, in terms of the protection of mobile phone personal information and data, have good application prospect.

Description

A kind of cellphone information protection lock
Technical field
This utility model relates to a kind of cellphone information protection lock, a kind of mobile phone protection lock utilizing secret key to verify. Belong to digital product technical field of burglary prevention.
Background technology
Along with the development of communication apparatus, mobile phone attainable function diversification day by day, it is possible to achieve pay the bill, transfer accounts, Transmitting various file, picture etc., preserve or be associated with a large amount of personal information, therefore mobile phone information safety problem the most increasingly causes People pay close attention to.When mobile phone is the most stolen, loses or resell, when falling in his staff, other people can by the personal information in mobile phone and File is derived and is used, and the mobile phone owner of lost property can be caused the heavy losses of property.
Current personal information anti-leak means and anti-theft method of mobile phone are the most comparatively laborious, more typical such as screen locking password Unlock with biological characteristic, the inconvenience that cause the user uses;Further, i.e. allow to utilize password or biological characteristic to mobile phone Carry out screen locking, when mobile phone connects computer, can directly pass through computer to access handset content;Individual brand can not directly access, Also can be by the unblock that cracks accordingly.Visible, both protected mode reliabilities are the highest.Especially as user, mobile phone is turned Sell or give when using to other people, even if after manually deleting personal information, the recovery of data also can be realized by some technological means, It cannot be guaranteed that user information safety.And, the memorizer (such as SD card) of mobile phone etc. can also be taken out by other people, reads on computers The individual privacy information of user.
This domain variability of present stage does not has the application technology of the most perfect a kind of protection user information safety, current domestic mobile phone Antitheft and information leakage preventing means mainly have following several: the first is the steel wire connection user's clothes that such as stretched by material object Realizing antitheft with mobile phone, or controlled in mobile phone distance users certain limit by wireless signal, this method must carry it His auxiliary equipment, normally uses mobile phone to user to put to no little inconvenience, and can not protect privacy of user, practicality and reliable Property all has much room for improvement;The second is that the induction apparatus that carries of application mobile phone detects surrounding environment change, is prevented by software control realization Steal and report to the police, need user manually opened and close software, complex operation, in-convenience in use;The third is to control hands by software Machine can only be answered, it is impossible to dialing, this method can not effectively prevent the information leakage of user;Chinese patent is " a kind of based on ear Mobile phone antitheft system that machine unlocks and method " (application number: 201410303821.2) propose one by earphone inserted mode solution The information leakage preventing method of lock mobile phone, although mobile phone screen locking can be kept in certain time, but if mobile phone connects computer, or Can directly access handset content, it is seen that reliability is the highest.
In sum, existing antitheft mobile phone measure and method impact have carries inconvenience, and complex operation affects user Normally use mobile phone, the shortcomings such as safety and reliability is the highest, especially can not improve and effectively ensure user information safety.
Summary of the invention
In order to overcome the deficiencies in the prior art, this utility model provides a kind of cellphone information protection lock.Need not carry and remove Other auxiliary equipment beyond part that mobile phone is indispensable, easy to use, will not cause the user trouble;Protection process is the completeest Become, it is not necessary to user operation, optimize the mobile phone experience of user.User profile is stored in coded lock as secret key, Mating with information in mobile phone, effectively prevent information in mobile phone to be stolen, safety is high, practical.User can basis Changing secret key checking information after the service condition checking identity of oneself, motility is high, easy and simple to handle.And volume is little, cost pole Low, there is good application prospect.
This utility model solves its technical problem and be the technical scheme is that
Described cellphone information protection lock, its structure includes protection lock (1), joint (2), mobile phone (3), protection lock (1) bag Include memorizer (101) and auxiliary circuit (102), be connected with mobile phone (3) through joint (2);
Memorizer (101) is used for preserving secret key, mates with the secret key in mobile phone (3), and auxiliary circuit (102) is to ensure that protection The necessary circuitry that lock (1) works;
Mobile phone (3) is designed as having unblock, locks and locked three kinds of duties;
1) any operation of routine can be carried out during released state;
2) monitor in real time during locking state and relate to bank, network payment, short message verification code class key message, and forbid phase Closing operation, other operations are normal;
3) can only incoming call answering and dial default assigned number during locking state;
When mobile phone (3) is in released state, automatically or during user's manual-lock screen, mobile phone (3) enters locking state; When protection lock (1) is connected with mobile phone (3), mobile phone (3) reads the secret key preserved in memorizer (101) automatically, and checking secret key is No coupling, if it does, then mobile phone (3) enters released state, reads and does not mates less than secret key or secret key, then mobile phone (3) enters Locking state;When mobile phone (3) is in locking state, uses protection lock (1) of coupling to connect mobile phone (3) and get final product automatic unlocking.
When mobile phone (3) normally uses, checking is at running background automatically, thus abnormal to user use causes puzzlement. Being in locking state when the mobile phone overwhelming majority, monitoring i.e. in real time relates to bank, network payment, short message verification code class key letter Breath, and forbid associative operation, then the most of operation of user is impregnable;And once unlock, as long as not closing Screen, will be always maintained at released state, during that is to say user operation Net silver, as long as not closing screen, nor affects on Operation.After mobile phone is lost or be stolen, middle have screen closing process, i.e. mobile phone certainly in his staff, is certainly in locking State, relates to sensitive operation, it is desirable to connect protection lock, and the protection of coupling usually can not be had in his staff to lock, hands Machine will enter locking state.During locking state, it is possible to receive calls, dial preset number, it is to set up owner and taking Mobile phone other people between communication channels, it is simple to getting back mobile phone.
In order to simplify protection lock construction, described protection lock (1) and joint (2) are designed as with the data wire (4) of mobile phone (3) Integrally, and not the normal function of data wire (4) is affected;
When general mobile phone is lost or be stolen, seldom having and occur with data wire (4) together with, therefore, data wire (4) is the most suitable In key, big probability is saved in the hands of original user oneself;The use as long as protection lock (1) and mobile phone (3) are not together, with regard to energy Ensure mobile phone information safety, it is achieved thereby that prevent, when mobile phone (3) connects computer, the function that in mobile phone (3), information is stolen.
When mobile phone (3) utilizes data wire (4) charging or is connected with other electronic equipments (5), mobile phone (3) carries out close automatically Spoon checking, just can be charged or connect other electronic equipments (5) during checking coupling, read and do not mate less than secret key or secret key, Then mobile phone (3) enters locking state.
Owing to the data wire (4) of protection lock (1) and joint (2) and mobile phone (3) is designed as integrally, accessory that need not be extra, Need not be additionally provided power supply to protection lock (2), be user-friendly to;Data wire (4) is that user is charged or connects computer Deng equipment time required, thus automatic proof procedure is fused in routine use, does not cause the extra puzzlement of user.Formed only After one corresponding relation, only this data wire (4) could mate use with this mobile phone, therefore, after mobile phone (3) is stolen, with other Data wire (4) just cannot use this mobile phone (3).
Described when mobile phone (3) uses for the first time, the biological characteristic of initial user need to be enrolled, and accordingly generate the closeest Spoon, is stored into biological characteristic and key information in the memorizer (102) of protection lock (1), completes to add the initialization of confidential information, real Now this protection lock (1) and the unique corresponding relation of this mobile phone (3).
Biological characteristic is utilized to initialize, it is ensured that mobile phone and the unique corresponding relation of user;If needing to revise this mobile phone User, then, after needing the biological characteristic validation of initial user to pass through, just can be carried out.If it is to say, mobile phone is lost or stolen, Initial user biological characteristic cannot be obtained, the most just cannot obtain information in mobile phone, reach to protect the purpose of information.
When protection lock (1) changed by described mobile phone (3), need to verify that the biological characteristic of initial user, checking coupling then generate New secret key, writes the secret key in new protection lock (1), and more new cell-phone (3).
Former protection lock (1) is damaged or user thinks that (1) is locked in the protection more renewed, it is necessary to by the biological characteristic of initial user After being verified, just can carry out.Newly protecting lock (1) can be copy mode, and the most original protection lock (1) also can be used, now Form the relation of the corresponding mobile phone (3) of a plurality of data lines (4);Can also be establishment mode, the most original protection lock (1) be made Useless, the most newly-generated protection lock (1) can be mutually matched, to keep the unique corresponding relation of protection lock (1) and mobile phone (3). General recommendations uses establishment mode, prevents former protection lock (1) to be used by people after losing.
When user changed by described mobile phone (3), need to verify that protection is then locked by the biological characteristic of initial user, checking coupling And mobile phone (3) all returns to factory state (1);Meanwhile, mobile phone (3) is automatically deleted all non-information of dispatching from the factory of crush storage.
This is to ensure that when mobile phone (3) transfers other people, does not reveal individual privacy, can sets itself with stylish user Oneself add confidential information, improving while safety, do not affecting user and normally transfer the possession of dealing, allow user use and have no Trouble and worry, is not concerned about unbinding and rebuild the loaded down with trivial details of user.And, delete and pulverize user profile, be use special as covered The method of rear deletion, compared with manual deletion, speed is exceedingly fast, delete after irrecoverable, thus the effective guarantee information of user Safety.
When SIM changed by described mobile phone (3), need to connect protection lock (1) and verify, checking coupling then updates protection lock (1) the binding SIM card information and stored in mobile phone (3).After mobile phone is lost or be stolen, other people shut down the most at once, even pull out Except SIM.Even if mobile phone replacing SIM also cannot use after departing from protection lock, i.e. mobile phone does not has any use in his staff Place, this also contributes to promote other people that mobile phone is returned owner, also can effectively prevent other people from utilizing this by the way of changing SIM Portion's mobile phone.Further, it is also possible to after mobile phone (3) finds that SIM is changed, be sent to this SIM card information in mobile phone preset finger Fixed phone number or E-mail address, or cloud server, notice initial user has abnormal conditions to occur.
Described mobile phone (3) be spaced a certain setting time do not connect protection lock (1), then automatically into locking state;Institute State the setting time at interval, set by after initialising subscriber checking secret key coupling.
If user does not use this mobile phone (3), after spending certain time, mobile phone (3) will be automatically locked;Even if by this hands Machine (3) is sold as refuse, is also not result in that individual privacy is revealed, thus ensures information security.The battery of mobile phone (3) all has The use time, as long as so being set greater than the max-endurance of battery, during charging the most just by this locked interval time Unlock, without the use of user being made troubles and perplexing.The method can ensure the information security of user to the full extent, Prevent because user neglects the information leakage caused.
After described mobile phone (3) receives the encrypted instruction that initial user is sent by other mobile phones, or mobile phone (3) checking Protection lock (1) is when makeing mistakes, and automatically starts photographic head on backstage and takes pictures, automatically starts GPS location, is certainly dynamically connected network, and by position Confidence breath and photo are sent to preset the phone number specified or E-mail address, or cloud server;Meanwhile, remote manual control Make or automatically carry out the transmission backup of personal information in mobile phone, and delete destruction.
Mobile phone is lost or stolen, after owner finds, is sent the instruction of encryption to the mobile phone of oneself by other mobile phones, permissible The information that active obtaining is emergent, and actively backup, destruction privacy data;The purpose of instruction encryption is to prevent mobile phone from not losing Lose and utilized this function by other people.
Above-mentioned have multiple situation to cause protection lock validation failure, according to design of the present utility model, as long as mobile phone is initially In user's hands, checking coupling can be ensured;It is to say, the validation failure overwhelming majority may lose exactly with stolen, therefore Emergency measure to be started.
Which the transmission backup user of personal information can be preset with, it is contemplated that the situation is critical, and usually capacity is relatively Little, important address list etc..
Compared with prior art, this utility model has the advantage that
1) protection lock construction is simple, and cost is extremely low, easily produces in batches;By being integrated into data wire, it is not necessary to use Other auxiliary equipments are carried at family, are automatically incorporated by proof procedure in the routine operation of cellphone subscriber, will not make when user uses Become inconvenience.
2) mobile phone lose or stolen after, other people make a profit mode be two aspects, one be mobile phone itself can change hands sell or Recycling, two is the information such as the privacy information of initial user, personal information and the bank on acquisition mobile phone;Therefore, this practicality is new Type makes both of which not exist so that theft mobile phone loses meaning, and the mobile phone simultaneously lost does not has any use for other people Place, also improves the probability returning former owner.
3) use biological characteristic as checking information, it is ensured that the uniqueness of key information, can effectively solve mobile phone stolen, The problems such as leakage of personal information.
Accompanying drawing explanation
Fig. 1: protection lock construction figure.
Fig. 2: with the protection lock construction figure of data wire one.
Fig. 3: secret key checking initial work flow chart.
Fig. 4: change secret key workflow diagram.
Fig. 5: change user workflow diagrams.
Fig. 6: time-out, change SIM, based data output workflow diagram.
Fig. 7: mobile phone receives encrypted instruction workflow diagram.
In figure: 1-protects lock, 2-joint, 3-mobile phone, 4-data wire, 101-memorizer, 102-auxiliary circuit.
Detailed description of the invention
Below in conjunction with the accompanying drawings this utility model is described in further detail:
As it is shown in figure 1, mobile phone of the present utility model protection lock construction includes protection lock (1), joint (2), mobile phone (3).Protect Protecting lock (1) and include memorizer (101) and auxiliary circuit (102), be connected with mobile phone (3) through joint (2), auxiliary circuit (102) is Ensureing other necessary circuitry that protection lock (1) works, memorizer (101) is used for preserving secret key.
In order to make this utility model the most succinctly facilitate, as in figure 2 it is shown, (1) and joint (2) and mobile phone (3) are locked in protection Data wire (4) is designed as one, and mobile phone (3) is connected with charger or apparatus such as computer by data wire (4), then at charging or hands When machine connects computer, the most just complete proof procedure.As long as data wire coded lock is correct, feel completely from user perspective Feel less than the existence protecting lock.
In order to further illustrate this utility model work protection situation in all cases, below using fingerprint as biology The example of feature, illustrates the workflow of protection lock.
During as it is shown on figure 3, user uses mobile phone (3) for the first time, need mobile phone (3) and protection lock (1) are initially set Putting, i.e. typing user biological feature, user profile leaves in mobile phone (3) and protection lock (1) bin (101) simultaneously.
As shown in Figure 4, when user needs amendment protection to lock the information in (1), it is necessary first to verify life on mobile phone (3) Thing feature, is proved to be successful the biological information that rear typing is new, generates new checking secret key, is saved in protection lock (1) and mobile phone (3) in.
As it is shown in figure 5, user is when reselling mobile phone (3), to first verify that user identity, checking correctly can remove secret key And biological information, then delete userspersonal information, when other people are continuing with this mobile phone (3), as long as re-typing biology Characteristic information just can use as before.When again starting shooting after mobile phone (3) shutdown every time, biological characteristic will be verified, test Card by being just continuing with, authentication failed, and the function shown in Fig. 4 cooperates and prevent other people from changing battery to keep mobile phone (3) continuation of the journey.
As shown in Figure 6 and Figure 7, do not verify secret key for a long time when mobile phone (3), change SIM individual relevant with outwards transmission During the data of information, information protection management Automatic Program requests verification, now accesses protection lock (1) or checking user biological feature And can normally use mobile phone (3) after correct.
When mobile phone (3) receives the instruction that initial user sends encryption by other mobile phones, locked mobile phone (3), take pictures, determine Position the network that is certainly dynamically connected, be sent to preset the phone number specified or E-mail address, or high in the clouds by positional information and photo Server;Meanwhile, remote manual controls or automatically carries out the transmission backup of personal information in mobile phone, and deletes destruction.Guarantee Other people can not steal the information in mobile phone (3) by data wire by the way of being wirelessly transferred, it is ensured that the information security of user.
The foregoing is only preferable embodiment of the present utility model, not in order to limit this utility model, all in this reality Within novel spirit and principle, any modification, equivalent substitution and improvement etc. made, should be included in of the present utility model Within protection domain.

Claims (8)

1. a cellphone information protection lock, it is characterised in that: include protection lock (1), joint (2), mobile phone (3), protection lock (1) bag Include memorizer (101) and auxiliary circuit (102), be connected with mobile phone (3) through joint (2);
Memorizer (101) is used for preserving secret key, mates with the secret key preserved in mobile phone (3), and auxiliary circuit (102) is to ensure that protection The necessary circuitry that lock (1) works;
Mobile phone (3) has unblock, locks and locked three kinds of duties;
1) any operation of routine can be carried out during released state;
2) monitor in real time during locking state and relate to bank, network payment, short message verification code class key message, and forbid relevant behaviour Making, other operations are normal;
3) can only incoming call answering and dial default assigned number during locking state;
When mobile phone (3) is in released state, automatically or during user's manual-lock screen, mobile phone (3) enters locking state;Work as guarantor Protecting lock (1) when being connected with mobile phone (3), mobile phone (3) reads the secret key preserved in memorizer (101) automatically, and whether checking secret key is Join, if it does, then mobile phone (3) enters released state, read and do not mate less than secret key or secret key, then mobile phone (3) enters locked State;When mobile phone (3) is in locking state, uses protection lock (1) of coupling to connect mobile phone (3) and get final product automatic unlocking.
A kind of cellphone information protection lock the most according to claim 1, it is characterised in that: protection lock (1) and joint (2) and hands The data wire (4) of machine (3) is designed as one, and does not affect the normal function of data wire (4);
When mobile phone (3) utilizes data wire (4) charging or is connected with other electronic equipments (5), mobile phone (3) automatically carries out secret key and tests Card, just can be charged or connect other electronic equipments (5) during checking coupling, read and do not mate less than secret key or secret key, then hands Machine (3) enters locking state.
A kind of cellphone information protection lock the most according to claim 1, it is characterised in that: when mobile phone (3) uses for the first time, need The biological characteristic of admission initial user, and accordingly generate unique secret key, biological characteristic and key information are stored into protection lock (1) in memorizer (102), complete to add the initialization of confidential information, it is achieved this protection lock (1) is unique corresponding with this mobile phone (3) Relation.
A kind of cellphone information protection lock the most according to claim 1, it is characterised in that: protection lock (1) changed by mobile phone (3) Time, need to verify that the biological characteristic of initial user, checking coupling then generate new secret key, write new protection lock (1), and more new hand Secret key in machine (3).
A kind of cellphone information protection lock the most according to claim 1, it is characterised in that: when user changed by mobile phone (3), need to test The biological characteristic of card initial user, protection lock (1) and mobile phone (3) are then all returned to factory state by checking coupling;Meanwhile, mobile phone (3) all non-information of dispatching from the factory of crush storage it is automatically deleted.
A kind of cellphone information protection lock the most according to claim 1, it is characterised in that: when SIM changed by mobile phone (3), need Connecting protection lock (1) to verify, checking coupling then updates the binding SIM card information of storage in protection lock (1) and mobile phone (3).
A kind of cellphone information protection lock the most according to claim 1, it is characterised in that: mobile phone (3) is spaced a certain when setting Between do not connect protection lock (1), then automatically into locking state;The setting time at described interval, initialising subscriber verify close Set after spoon coupling.
A kind of cellphone information protection lock the most according to claim 1, it is characterised in that: initial user is sent out by other mobile phones Send the instruction of encryption, after mobile phone (3) receives, or when mobile phone (3) checking protection lock (1) is made mistakes, automatically start shooting on backstage Head is taken pictures, startup GPS positions automatically, be dynamically connected network certainly, and is sent to positional information and photo preset the cell-phone number specified Code or E-mail address, or cloud server;Meanwhile, remote manual controls or automatically to carry out the transmission of personal information in mobile phone standby Part, and delete destruction.
CN201620807909.2U 2016-07-29 2016-07-29 A kind of cellphone information protection lock Expired - Fee Related CN205829777U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201620807909.2U CN205829777U (en) 2016-07-29 2016-07-29 A kind of cellphone information protection lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201620807909.2U CN205829777U (en) 2016-07-29 2016-07-29 A kind of cellphone information protection lock

Publications (1)

Publication Number Publication Date
CN205829777U true CN205829777U (en) 2016-12-21

Family

ID=57559826

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201620807909.2U Expired - Fee Related CN205829777U (en) 2016-07-29 2016-07-29 A kind of cellphone information protection lock

Country Status (1)

Country Link
CN (1) CN205829777U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109492439A (en) * 2018-09-29 2019-03-19 南昌与德通讯技术有限公司 Information protecting method, terminal device and computer readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109492439A (en) * 2018-09-29 2019-03-19 南昌与德通讯技术有限公司 Information protecting method, terminal device and computer readable storage medium

Similar Documents

Publication Publication Date Title
US7184750B2 (en) Smart terminal remote lock and format
CN101252703B (en) Terminal data protecting method, system as well as mobile communication terminal
CN101026834A (en) Locking method and unlocking method
CN102404328B (en) Electronic identity card verification system
CN102693381B (en) Method, device and system for anti-theft of portable computer equipment
CN102694920B (en) Mobile phone antitheft method
CN106231092A (en) A kind of phone information security protection method
CN106101438A (en) A kind of cellphone information protection lock
JP4695040B2 (en) Remote lock system and communication terminal
CN105530356A (en) Mobile communication terminal and data protection method and apparatus thereof
US20130029640A1 (en) Fingerprint sensor and charging system
CN104574616B (en) Intelligent electronic door lock control method and control device
CN102883026A (en) Method for implementing start-up protection on mobile terminal
CN104700050A (en) Mobile terminal safety positioning method and device
EP2840818B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN108010166A (en) Electronic door lock system
CN106126994A (en) The user management method of a kind of mobile terminal and system
JP2006279321A (en) Security software for mobile terminal and security communication system
CN100413368C (en) A method for verifying user card validity
CN101895829A (en) Method and system for retrieving FLASH data from mobile telephone, and mobile telephone
BRPI1105431A2 (en) Method and system for controlling the execution of a function protected by authentication, memory module, and electronic entity
CN205829777U (en) A kind of cellphone information protection lock
CN104408360A (en) Encryption equipment and method based on mobile terminal
CN106453057B (en) A kind of method and terminal for preventing short message to be stolen
JP4372034B2 (en) Mobile phone terminal system, mobile phone terminal unauthorized use prevention method, and mobile phone terminal unauthorized use prevention program

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20161221

Termination date: 20170729