CN101400055B - Method for setting ciphering information of mobile terminal security card - Google Patents
Method for setting ciphering information of mobile terminal security card Download PDFInfo
- Publication number
- CN101400055B CN101400055B CN2007101642354A CN200710164235A CN101400055B CN 101400055 B CN101400055 B CN 101400055B CN 2007101642354 A CN2007101642354 A CN 2007101642354A CN 200710164235 A CN200710164235 A CN 200710164235A CN 101400055 B CN101400055 B CN 101400055B
- Authority
- CN
- China
- Prior art keywords
- information
- password
- card
- user
- secret
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Storage Device Security (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a method for setting enciphered information for mobile terminal secret card comprising following steps: (1) setting one of the secret cards as secret card mode, setting deciphered password, storing the password and secret card mode in the memory module of the card; (2) migrating the information to be stored in the memory module of secret card which can automatically enciphers the information; (3) when user inquires secret information, if the inputted password is right, then returning to secret information and non-secret information in multiple cards. The inventive method overcomes limit of ordinary password protection by using multi-mode mobile terminal, guarantees information privacy of mobile terminal; when owner of mobile terminal is forced to look up the secret information, password and secret information can be deleted one-time, so information security is guaranteed.
Description
Technical field
The present invention relates to the command, control, communications, and information security fields, concrete relate to a kind of method that ciphering information of mobile terminal security card is set.
Background technology
Illegally being used this problem, common way to the leakage that prevents to store information in the mobile phone or mobile phone is to utilize mechanism such as password password or PIN code protection.The option that the user can provide through MMI (man-machine interface) lining of mobile phone is provided with password, thereby guarantees when each mobile phone is opened, directly to get into lock-out state, automatically prompting user input password.If the password input is correct, the mobile phone release, and allow the user normally to use; If the user cipher input error is then pointed out in input error, and require to re-enter.Can find out that this mechanism can effectively stop the disabled user of mobile phone to steal information or unauthorized use mobile phone in the mobile phone.Equally, present mobile phone on the market is also existing to provide this function, promptly under open state, adjusts to lock-out state to mobile phone at any time.
In addition, also have some other safety measure to be used and prevent usurping or information dropout of mobile phone.But existing method can not be exhaustive, below in several kinds of situation, the disabled user still can not have to use phone under the situation of authorizing.
Consider this situation: under holding state, mobile phone is not activated locking mode, and the disabled user just can usurp phone.Although phone has password locking, the user is not activated this function probably.Perhaps the user is set in when start and requires to carry out the input of password password, but stealing of most ofs stolen and information is to occur under the phone open state, so traditional cipher code protection method can not effectively reach function of keeping secret.
Consider another kind of situation, the disabled user can be through pulling out battery, and the method that restarts then realizes regulation input password.In this case, if the user does not set " input password during startup " this method that perfects just, just the disabled user can do at will.
In case used by illegal, the important information in the phone is if address list, short message, message registration etc. will leak; And mobile phone can be caused user's economy and spiritual loss by free call on sb. else's expense through illegal means.In sum, traditional cryptoguard mechanism haves much room for improvement and is perfect.
Summary of the invention
The technical problem that the present invention will solve provides a kind of method that ciphering information of mobile terminal security card is set, and utilizes the characteristics of multi-module mobile terminal, has overcome the limitation of ordinary password protection, has guaranteed the privacy of information in mobile terminal.
In order to address the above problem, the invention provides a kind of method that ciphering information of mobile terminal security card is set, may further comprise the steps:
(1) one that is provided with in many cards is the sector card pattern, and for it clear crytpographic key is set, and deposits this password and sector card pattern the memory module of this card in;
(2) information that will be to be preserved, the memory module of immigration sector card, sector card is this information encryption automatically;
(3) when user inquires secret information,, then return security information and unclassified information in many cards if the input password is correct;
Further, method of the present invention wherein, in the said step (2), moves into the mode of the memory module of sector card, comprising: accomplish through triggering interface operation, perhaps through the user assigned number is set, the information that this number is sent moves into automatically;
Further, method of the present invention, wherein, said step also comprises in (3): if input password mistake is only returned unclassified information, the prompt cipher mistake, and the interface is provided, treat to re-enter password after the user triggers;
Further, method of the present invention, wherein, said step also comprises in (3): said sector card also is provided with the removing password, after the user inputs the removing password, all security informations of the disposable deletion of portable terminal;
Further, method of the present invention, wherein, said input clear crytpographic key uses same user interface with the removing password;
Further, method of the present invention, wherein, said step also comprises in (3): when the unclassified information of user inquiring, then return unclassified information;
Further, method of the present invention, wherein, said memory module, the memory that does not disappear for stored information outage;
Further, method of the present invention, wherein, said unclassified information is stored in the unclassified card in many cards;
Further, method of the present invention wherein, after the said portable terminal shutdown, keeps said sector card to be in the sector card pattern.
Compared with prior art, the method for the invention has been utilized the characteristics of multi-module mobile terminal; Overcome the limitation of ordinary password protection; Guaranteed the privacy of information in mobile terminal, stolen by other people or coerced when checking that what can see is unclassified information when portable terminal; And coerced when checking secret category information as the machine master, the machine master can select to use and remove password, and disposable deletion security information has guaranteed information security.
Description of drawings
Fig. 1 is for being provided with the method flow diagram of mobile phone sector card enciphered message in the embodiment of the invention;
Fig. 2 be in the embodiment of the invention user inquiring through the operational flowchart of sector card information encrypted.
Embodiment
The present invention is in order to solve the drawback that conventional solution exists; Further set forth a kind of method that ciphering information of mobile terminal security card is set of the present invention through following specific embodiment; Below embodiment is described in detail, but not as to qualification of the present invention.
One of them card that the machine master is provided with in many cards is sector card.The message registration of sector card, short message or other information comprise contact person, schedule etc., and the machine master can be set to encrypting storing.Must import password earlier when reading this type of information.Further, the machine master can be provided with one and remove password, and its effect is all security informations of disposable deletion.The input clear crytpographic key should be consistent with the interface of removing password.
As shown in Figure 1, for the method flow diagram of mobile phone sector card enciphered message is set in the embodiment of the invention, with the dual-mode handset example, present invention is described, and wherein, this mobile phone uses stored information outage read only memory ROM that do not disappear, and may further comprise the steps:
Step 101, one that is provided with in two cards is the sector card pattern, and for it clear crytpographic key is set, and deposits this password and sector card pattern the memory module of this card in;
Step 102 with information to be preserved, moves into the memory module of sector card, and sector card is this information encryption automatically;
Move into the mode of the memory module of sector card, accomplish through triggering interface operation, perhaps through the user assigned number is set, the information that this number is sent moves into automatically.
Step 103, the user imports the clear crytpographic key Query Information, and perhaps password, removing information are removed in input;
This step idiographic flow is as shown in Figure 2, is the operational flowchart of user inquiring in the embodiment of the invention through the sector card information encrypted, and when selecting the inquiry security information, the prompting user inputs password, may further comprise the steps:
Step 103a if the user does not input password, perhaps imports the clear crytpographic key mistake, and perhaps the password mistake is removed in input, then only returns unclassified information, the prompt cipher mistake, and the interface is provided, treat to re-enter password after the user triggers;
Step 103b, correct if the user imports clear crytpographic key, then return all information in two cards, comprising: have security information and the unclassified information on another card on the sector card;
Step 103c, if the user has inputed the removing password, all security informations of the disposable deletion of mobile phone, and return unclassified information;
Step 103d if the user selects to inquire about unclassified information, then directly returns unclassified information.
Should be noted that; Generally coerced when checking secret category information the machine master, the machine master can select to use and remove password, disposable deletion security information; But said input clear crytpographic key should use same user interface with the removing password; Can guarantee that so or else the machine master wakes up with a start under the situation of intimidator, delete security information smoothly, guarantee information security.And behind the mobile phone shutdown, keep the sector card pattern constant.
Certainly; The present invention also can have other various embodiments; Under the situation that does not deviate from spirit of the present invention and essence thereof; Those of ordinary skill in the art can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.
Claims (8)
1. one kind is provided with the method that the portable terminal sector card comes enciphered message, is applied to multi-module mobile terminal, it is characterized in that, may further comprise the steps:
(1) one that is provided with in many cards is the sector card pattern, and for it clear crytpographic key is set, and deposits this password and sector card pattern the memory module of this card in;
(2) information that will be to be preserved, the memory module of immigration sector card, sector card is this information encryption automatically;
(3) when user inquires secret information, if the input password is correct, then return security information and unclassified information in many cards, said sector card also is provided with the removing password, after the user inputs the removing password, all security informations of the disposable deletion of portable terminal.
2. the method for claim 1 is characterized in that, in the said step (2), moves into the mode of the memory module of sector card, comprising:
Accomplish through triggering interface operation, perhaps through the user assigned number is set, the information that this number is sent moves into automatically.
3. the method for claim 1 is characterized in that, said step also comprises in (3): if input password mistake is only returned unclassified information, and the prompt cipher mistake, and the interface is provided, treat to re-enter password after the user triggers.
4. the method for claim 1, said input clear crytpographic key with remove password and use same user interface.
5. the method for claim 1 is characterized in that, said step also comprises in (3): when the unclassified information of user inquiring, then return unclassified information.
6. the method for claim 1 is characterized in that, said memory module, the memory that does not disappear for stored information outage.
7. like claim 1 or 3 or 5 described methods, it is characterized in that said unclassified information is stored in the unclassified card in many cards.
8. the method for claim 1 is characterized in that, after the said portable terminal shutdown, keeps said sector card to be in the sector card pattern.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007101642354A CN101400055B (en) | 2007-09-30 | 2007-09-30 | Method for setting ciphering information of mobile terminal security card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007101642354A CN101400055B (en) | 2007-09-30 | 2007-09-30 | Method for setting ciphering information of mobile terminal security card |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101400055A CN101400055A (en) | 2009-04-01 |
CN101400055B true CN101400055B (en) | 2012-06-13 |
Family
ID=40518247
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2007101642354A Active CN101400055B (en) | 2007-09-30 | 2007-09-30 | Method for setting ciphering information of mobile terminal security card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101400055B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101789988A (en) * | 2009-12-29 | 2010-07-28 | 闻泰集团有限公司 | Method for realizing binding of mobile phone and SIM card |
CN104660613B (en) * | 2015-03-16 | 2019-03-29 | 联想(北京)有限公司 | The authentication method and electronic equipment of subscriber identification module |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2234669Y (en) * | 1995-05-16 | 1996-09-04 | 张宝明 | Telephone controller |
EP1650690A1 (en) * | 2004-10-21 | 2006-04-26 | T-Mobile International AG & CO. KG | Improvements in personal data security of mobile communication device |
CN101026844A (en) * | 2007-03-29 | 2007-08-29 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal with information secrecy function and secrecy method |
-
2007
- 2007-09-30 CN CN2007101642354A patent/CN101400055B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2234669Y (en) * | 1995-05-16 | 1996-09-04 | 张宝明 | Telephone controller |
EP1650690A1 (en) * | 2004-10-21 | 2006-04-26 | T-Mobile International AG & CO. KG | Improvements in personal data security of mobile communication device |
CN101026844A (en) * | 2007-03-29 | 2007-08-29 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal with information secrecy function and secrecy method |
Also Published As
Publication number | Publication date |
---|---|
CN101400055A (en) | 2009-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103377332B (en) | The method of access application and device | |
CN100401822C (en) | Protection method and system for preventing fraudulent use of mobile terminal | |
US20040046638A1 (en) | Terminal lock system comprising key device carried by user and terminal-associated device incorporated in terminal device | |
CN102781001A (en) | Method for encrypting built-in file of mobile terminal and mobile terminal | |
CN103559455A (en) | Android device personal information protection method based on user identification | |
CN103106372A (en) | Lightweight class privacy data encryption method and system for Android system | |
CN102694920A (en) | Mobile phone antitheft method | |
CN103902862A (en) | Mobile device management method and device and mobile device | |
US8706158B2 (en) | Mobile phone for authenticating SIM card and method thereof | |
CN102457606A (en) | Mobile phone and anti-theft method thereof | |
CN103413102A (en) | Secret data management device and secret data management method as well as mobile terminal | |
CN1980428B (en) | Method for mobile terminal to automatically encipher and automatically protect subscriber identifying module | |
CN103379483B (en) | A kind of method of information of mobile terminal safety management, device and mobile terminal | |
CN101478595A (en) | Mobile communication terminal data protection method | |
CN100353787C (en) | Security guarantee for memory data information of mobile terminal | |
CN111901360B (en) | Control system and method suitable for safe access of intranet data | |
CN106650373A (en) | SIM card information protection method and device | |
CN1997188A (en) | A recognition method of the user identity and its handset | |
CN104820805A (en) | Method and device for burglary prevention of user identity identification card information | |
CN102495983A (en) | Method for encrypting and decrypting data of intelligent mobile terminal in real time | |
CN106231092A (en) | A kind of phone information security protection method | |
CN101409944A (en) | Method and apparatus for encrypting keyboard | |
CN101262669B (en) | A secure guarantee method for information stored in a mobile terminal | |
CN101400055B (en) | Method for setting ciphering information of mobile terminal security card | |
CN105636043A (en) | ESIM (Embedded SIM) card authentication method, eSIM card authentication device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |