CN101437066A - Automatic defensive communication equipment and running method thereof - Google Patents

Automatic defensive communication equipment and running method thereof Download PDF

Info

Publication number
CN101437066A
CN101437066A CNA2008100722587A CN200810072258A CN101437066A CN 101437066 A CN101437066 A CN 101437066A CN A2008100722587 A CNA2008100722587 A CN A2008100722587A CN 200810072258 A CN200810072258 A CN 200810072258A CN 101437066 A CN101437066 A CN 101437066A
Authority
CN
China
Prior art keywords
mobile communication
communication equipment
defence
data
communication apparatus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008100722587A
Other languages
Chinese (zh)
Inventor
林威硕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA2008100722587A priority Critical patent/CN101437066A/en
Publication of CN101437066A publication Critical patent/CN101437066A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to an automatic defense communication device and a running method thereof. When a mobile communication device is lost or stolen, the invention can remotely clear all data (such as personal data, commercial secrets and technical secrets) stored in the mobile communication device through a sending unit, the mobile communication device, an automatic defense module and a GPS system according to corresponding steps, and uses the GPS positioning system to integrate voice for reporting the police, thereby effectively preventing confidential date in the mobile communication device from being leaked for illegal use, so as not to cause serious loss or harm to data owners.

Description

A kind of communication apparatus of automatic defence and operation method thereof
Technical field
The present invention relates to the mobile communication technology field, relate in particular to a kind of mobile communication equipment and operation method thereof of automatic defence.
Background technology
Trend, the especially mobile phone that generalizes along with various mobile communication equipments become in the modern life indispensable communication equipment, even with existing science and technology, mobile phone can be used as the aid of being engaged in commercial activity.Under this science and technology epoch trend, often store personal information, know-how or the business secret of tool importance, confidentiality in the mobile communication equipment.Therefore, how to protect confidential data in the mobile communication equipment to become important topic under this trend.
With the mobile communication equipment-mobile phone of at present universalness, take a broad view of antitheft mobile phone technology now, following several antitheft type is arranged approximately, be respectively described below substantially:
The first kind: mobile phone must wait malice to steal taker input error password just can activate anti-theft device, with the number of applying for a patent: 200510103574.2 is example, yet the antitheft type of this kind has a shortcoming, if malice is stolen taker and is directly logined mobile phone in the terminating machine mode, and decryption, can obtain confidential data, again or directly SIM card is removed, make mobile phone can't send the GPS position, also can't report to the police.And mobile phone uses (be commonly called as the cuckold card, i.e. malicious person's free call on sb. else's expense through illegal means mobile phone is paid cell-phone fee by this stolen real machine master who phones with mobile telephone and used) as the SIM card that can't duplicate of packing into, and then the police can't find this malice to steal taker in the SIM card mode.
Second type: Microsoft once released at antitheft mobile phone part technology, and this technology has long-range removing mobile phone confidential data function, still, this technology also can't reach complete anti-theft feature, even behind the hand-set from stolen, battery, SIM card are removed, and then can't Telnet remove confidential data; Moreover; the Telnet device; except that the cell phone password protection; there is no any safety device protection, in case the unlatching of Telnet apparatus function, when it loses mobile phone with the machine master of being intended to; can remove confidential data in Telnet; but can't limit malice the 3rd people person and constantly crack cell phone password in remote testing, intention is carried out Telnet, comes the destroyer master to be stored in the interior confidential data of mobile phone.When the machine master in losing or being stolen mobile phone instantly, when immediately this mobile phone being carried out long-range removing mobile phone confidential data, this loss or the mobile phone picture that is stolen will show to carry out synchronously removes the confidential data picture, malice robber taker will be discovered the hand-set data of being stolen immediately and remove, at this moment, malice is stolen taker need only remove battery, then the action of Telnet removing data will be forced to stop, can't reach and prevent that confidential data from leaking and remove the function of confidential data, as long as malice was stolen taker and took off battery of mobile phone in one minute, take out memory card, can obtain the mobile phone confidential data easily, and implement malfeasance.
The 3rd type: a kind of mobile phone is declared long-rangely will to lose or stolen mobile phone pins, and send a large amount of alarm jingle bells, this mobile phone is characterised in that, as long as steal taker when malice the mobile phone of being stolen is loaded onto battery, and the alarm jingle bell in the mobile phone just can constantly activate.But, this kind mobile phone burglary-resisting function, as long as malice is stolen taker battery is removed, memory card is taken away, or after battery removes, disassemble mobile phone the loudspeaker in the mobile phone are done the short circuit processing, then the alarm jingle bell in the mobile phone lapses, still can be obtained the confidential data in the mobile phone easily, to be used as illegal purposes.
The 4th type: mobile phone burglary-resisting function is can the long-range distant mobile phone of getting killed, to reach function of keeping secret, even so, but this cell-phone function is only effective to specific SIM card number sign indicating number, malice is stolen taker as long as change SIM card, in case the SIM card number is not the number of former setting, the anti-theft feature of the long-range distant mobile phone of getting killed just can't carry out, malice is stolen taker still can obtain the interior confidential data of mobile phone easily, to be used as illegal purposes.
The 5th type: belong to active antitheft mobile phone type, this antitheft mobile phone mode is with remote mode, after confidential data packing in the mobile phone, with the E-mail mode send it to specify mailbox after, remove confidential data in the mobile phone.Yet, this antitheft mode with above-mentioned four types identical, and can't reach real anti-theft feature.Because malice is stolen taker can find that the machine master is using remote mode to come the packing data from mobile phone picture, and sends data with Outlook, at this moment, as long as pull out battery immediately, the blocking-up inside processing, then still can obtain the confidential data in the mobile phone easily, to be used as illegal purposes.
The 6th type: a e-commerce F88 mobile phone, this mobile phone is declared and can long-rangely be assigned instruction mode with news in brief, remove the data in the mobile phone, but only limit to news in brief and telephone directory data, other is stored in the data of photograph, file, recording or video recording in the mobile phone and can't removes, and malice is stolen taker still can obtain the interior confidential data of mobile phone easily.Get off to see with the situation of present hand-set from stolen, after in a single day malice robber taker obtains mobile phone, be about to mobile phone mostly earlier and close or remove battery, under no complete burglary-resisting system planning, mobile phone electric power and switching system can't be by the machine master controls, mobile phone burglary-resisting function such as existing fingerprint, iris identification or antitheft buzzer can't be brought into play fully, and more leisure opinion makes the highly difficult remote mode of apparatus remove the technology of carrying secretly of the data and the data of packing.
Summary of the invention
The communication apparatus and the operation method thereof that the purpose of this invention is to provide a kind of automatic defence, when mobile communication equipment is lost or is stolen, the present invention can long-rangely back up to the 3rd ground or directly full scale clearance with all data (as: personal information, business secret, know-how) that store in this action communication apparatus, locate with GPS simultaneously, send the GPS position, the integrating speech sound circular police, preventing effectively that confidential data from leaking is used as illegal purposes, and the data owner's heavy losses and the harm that cause.
Communication apparatus of the present invention is achieved in that a kind of communication apparatus of automatic defence, comprises sending unit, mobile communication equipment, defending module, gps system automatically; It is characterized in that: described transmission unit is used to send execution and defends the encrypted instruction of module automatically to mobile communication equipment; Described mobile communication equipment is that the in-building type lithium battery is one-body molded or use to burn the sign indicating number design or have special data storage framework or only have a battery charge interface not have other output/input interface; Described special data storage framework is used for all data in the mobile communication equipment are concentrated on the data storage framework in data storage district; Described automatic defence module comprises automatic defence system, takes advantage of the enemy system, and described automatic defence system is used for all data backups in the mobile communication equipment behind data backup place, the 3rd ground, IDC network data center, removes all data in the mobile communication equipment; The described enemy of taking advantage of system is used for beginning to activate when carrying out when defence module automatically, and the screen that the control action communication apparatus externally shows constantly shows the illusion picture repeatedly; Described gps system is realized the GPS location, and sends GPS position and the GPS integrating speech sound circular police or related personnel.
For whole system can well be used, the present invention also provides a kind of operation method of communication apparatus of automatic defence, it is characterized in that: the each several part that above-mentioned communication apparatus comprises is realized according to the following steps:
(1), the machine master that receives mobile communication equipment of client service center reports lost property to the authorities behind the phone, confirms whether the machine owner identification of mobile communication equipment is the owner of this mobile communication equipment of reporting lost property to the authorities;
(2) if then client service center assigns the instruction of carrying out defence automatically and gives encryption device, i.e. terminating machine; If not the client service center task termination does not carry out operation;
(3), if mobile communication equipment can't receive above-mentioned instruction, terminating machine will feed back to client service center, and inform the machine master by client service center, simultaneity factor sends above-mentioned instruction automatically repeatedly to encryption device;
(4), if mobile communication equipment receive above-mentioned instruction, carry out automatic decryption instructions and confirm single Mac position;
(5), if above-mentioned affirmation is passed through, activate the automatic defence system in the defence module automatically and take advantage of the enemy system;
(6), automatically after defence system backups to data backup place, above-mentioned the 3rd ground with all data in the mobile communication equipment,
And with all data removings in the mobile communication equipment; Taking advantage of the enemy system simultaneously will make mobile communication equipment show the illusion picture;
(7), start gps system, by the GPS location, and send GPS position and the GPS integrating speech sound circular police or related personnel.
The present invention is that the in-building type lithium battery is one-body molded or use to burn the sign indicating number design or have special data storage framework or only have a battery charge interface not have the feature of other output/input interface or combinations thereof because of mobile communication equipment, be difficult for demolition, when carrying out operation, can be as existing mobile communication equipment (as: mobile phone) on the market, because of malice is stolen battery and the SIM card that taker is pulled up this action communication apparatus, after making it interrupt inner antitheft operation, obtain interior all data of this action communication apparatus and carry out malfeasance, and the machine master of this action communication apparatus can set IDC (Internet Date Center in advance, the network data center) data backup place, the 3rd ground, thus, careless loss or the interior data of mobile communication equipment that stolen by malice not only can not leaked is malfeasance, also can keep data to the three ground in this action communication apparatus, and can see through the GPS position and contact the police simultaneously and find mobile phone, guarantee the fail safe of confidential data in the mobile communication equipment, avoided personal information, the danger that know-how or business secret leak.
Description of drawings
Fig. 1 is a preferred embodiment configuration diagram of the present invention.
Fig. 2 is the preferable implementation method flow chart of the present invention.
Fig. 3 is an automatic defence module flow chart of the present invention.
Embodiment
Below in conjunction with drawings and Examples the present invention is described further.
As shown in Figure 1, the present invention is a kind of communication apparatus of automatic defence, comprises sending unit, mobile communication equipment, defending module, gps system automatically; It is characterized in that: described transmission unit is used for sending out execution and defends the encrypted instruction of module automatically to mobile communication equipment; Wherein, the send mode of instruction system can be the mobile communication equipment that directly preestablishes with the machine master and carries out order and assign or utilize modes such as telephone, wired or wireless telecommunications transmitting apparatus, computer equipment are dialed and connected, world-wide web to assign instruction with direct or relay terminal machine equipment mode or utilize single Mac position and have to encrypt and check that the terminating machine of function assigns instruction.
Described mobile communication equipment is that the in-building type lithium battery is one-body molded or use to burn the sign indicating number design or have special data storage framework or only have a battery charge interface not have other output/input interface; Described different data storage framework is used for all data in the mobile communication equipment are concentrated on the data storage framework in data storage district;
Wherein, above-mentioned mobile communication equipment comprises that also its built-in system program setting shutdown password is to adopt cipher code set, but also can adopt identification of fingerprint, iris identification mode, and three input errors of password, the keyboard that this action communication apparatus activates promptly is blocked, if the urgent operation that the machine master of the loss or the mobile communication equipment that is stolen in time reports lost property to the authorities, then mobile communication equipment will activate automatic defence module automatically, and described automatic defence module comprises automatic defence system and takes advantage of the enemy system; It can utilize at various communication apparatus, realizes defence automatically; If taking charge, the machine of mobile communication equipment set IDC network data center earlier, described automatic defence system can be with the confidential data high compression, backup to IDC (InternetDate Center with SSL and 128bit encrypted backup, the network data center) data backup place, the 3rd ground and remove all data, if the machine master does not set, then described automatic defence system will directly be removed all data in the mobile communication equipment.The described enemy of taking advantage of system is used for beginning to activate when carrying out when defence module automatically, the screen that the control action communication apparatus externally shows constantly shows the illusion picture repeatedly, described illusion picture is that mobile communication equipment is closed screen, shown fault, in the display operation mistake, password input error, cryptographic core centering, power shortage, shutdown or the LED of screen power supplies, keyboard led light source system, jingle bell loudspeaker, receiver loudspeaker, state demonstration is closed the picture etc. of picture or combinations thereof; Activate gps system (Global Positioning System, GPS, global positioning system) simultaneously, carry out the GPS location, send the GPS position and the GPS integrating speech sound circular police.Described, the GPS integrating speech sound circular police utilize the GPS location and send the GPS position, warp, the Position Latitude at the mobile communication equipment place of losing or being stolen are circulated a notice of the police with voice mode, till the police receive that the warning data is investigated and seized the GPS position.
Therefore, if malice is stolen taker when stealing other people mobile communication equipment, the password of input shutdown earlier could be with the shutdown of this action communication apparatus, when the machine master who prevents mobile communication equipment delays reporting lost property to the authorities, causes heavy losses.
Communication apparatus of the present invention in addition also further comprises client service center, and described client service center is used to confirm the machine owner identification of mobile communication equipment or for any machine master provides service, comprises customer service on true man's line, voice customer service etc.
Below in conjunction with Fig. 2 operation method of the present invention is described in detail.
At first, step S10, the machine master of mobile communication equipment carry out phone to mobile phone client service center immediately and report lost property to the authorities and carry out urgent operation when losing or being stolen.
Step S11, client service center are after the machine master who receives mobile communication equipment reports lost property to the authorities phone, and whether the machine owner identification of confirming mobile communication equipment really is the owner of this mobile communication equipment of reporting lost property to the authorities.If confirm that machine master's the identity of this action communication apparatus is incorrect, step S12 then, the client service center task termination does not carry out operation.
If confirm that the machine owner identification of mobile communication equipment is correct, step S13 then, client service center will assign and carry out automatically the defence module instruction and give encryption device.Described encryption device is the terminating machine of a single Mac position.
Step S14, the terminating machine of this single Mac position have encryption and check function, see through the single Mac position of terminating machine, send to carry out to defend module instruction automatically to mobile communication equipment.If mobile communication equipment can't receive instruction, then step S15 can't receive command message and repay to client service center through terminating machine, inform the machine master of mobile communication equipment by client service center, and simultaneity factor sends above-mentioned instruction automatically repeatedly to encryption device.
After if mobile communication equipment receives instruction, step S16 then, mobile communication equipment is further checked the correctness of instruction, comprise that mobile communication equipment receives the encrypted instruction that terminating machine sends after, carry out automatic decryption instructions and confirm single Mac position.As mentioned above, when mobile communication equipment carries out step S16 when checking the correctness of instruction, be an inside processing, the screen-picture that mobile communication equipment externally shows can't present jingle bell, vibrations or light or arbitrary signal, and the person can not find the inside processing situation to make malice steal the mobile communication equipment.When mobile communication equipment is further checked the correctness of instruction, its result is for checking when incorrect, and step S17 then, mobile communication equipment be after the fill order, step S12 task termination.
If the checking when the result is correct of mobile communication equipment, step S18 then, mobile communication equipment begins to carry out automatic defence module.Described automatic defence module sees also figure three to further specify automatic defence module flow chart.
Step S19, after all data removings of the automatic defence of mobile communication equipment execution module mobile communication equipment finish, promptly activate gps system (Global Positioning System, GPS, global positioning system), carry out GPS location, transmission GPS position and system of the GPS integrating speech sound circular police immediately.Described, system of the GPS integrating speech sound circular police, system utilizes GPS location and sends the GPS position, warp, the Position Latitude at the mobile communication equipment place of losing or being stolen is circulated a notice of the police with voice mode, till the police receive that the warning data is investigated and seized the GPS position.
As the explanation of above-mentioned figure two, when mobile communication equipment carries out the correctness that step S16 checks instruction, and the checking when the result is correct of mobile communication equipment, step S18 then, mobile communication equipment begins to carry out automatic defence module.
At first,, defend the activation of module automatically, can make mobile communication equipment close any input functions such as touch controllable function and keyboard, voice earlier with reference to the step S181 of figure three.In step S181, when mobile communication equipment begins to carry out automatic defence module, will make the automatic defence system in the automatic defence module and take advantage of enemy's system synchronization and activate operation.
In step S182, step S184, step S182, carry out automatic defence system, all data in the mobile communication equipment are backuped to IDC (Internet Date Center, the network data center) behind the data backup place, the 3rd ground, when all data of mobile communication equipment are removed with 0/1 coverage mode.As above-mentioned, when the automatic defence system of execution in step S182, execution in step S184 activates the enemy system that takes advantage of synchronously.
Step S185, activate when taking advantage of the enemy system synchronously, the mobile communication equipment picture is with the picture of continuous display password input error, cryptographic core centering, and the automatic defence system of the communication apparatus inside of in fact taking action with the mobile communication equipment data backup in IDC (Internet Da te Center, the network data center) behind the data backup place, the 3rd ground, carries out all data in the mobile communication equipment of removing.
At step S183, step S186, among the step S19, as step S183, automatically defence system is with after all data removings finish in the mobile communication equipment, the enemy system that takes advantage of of step S186 can Synchronization Control makes on the screen of mobile communication equipment and shows illusion picture (as: power shortage, picture in the shutdown, and with screen power supplies, keyboard, the led light source system, the jingle bell loudspeaker, the LED that receiver loudspeaker and state show closes etc.), create the illusion that mobile communication equipment is closed because of power shortage, in fact just carry out step S19 and activating gps system (Global Positioning System, GPS, global positioning system).As above-mentioned, gps system (Global Positioning System, GPS, global positioning system) carries out the GPS location immediately, sends till GPS position and the system of the GPS integrating speech sound circular police.
Automatically the communication apparatus of defence can also break away from client service center or gps system operation defence automatically in addition.
The above only is a better embodiment of the present invention, and it is not in order to limit the present invention.Not any disengaging in the spirit and scope of the present invention, and to its equivalent modifications of carrying out or change, all should be contained in the appended claim in back.

Claims (10)

1, a kind of communication apparatus of automatic defence comprises sending unit, mobile communication equipment, defending module, gps system automatically; It is characterized in that: described transmission unit is used to send execution and defends the encrypted instruction of module automatically to mobile communication equipment; Described mobile communication equipment is that the in-building type lithium battery is one-body molded or use to burn the sign indicating number design or have special data storage framework or only have a battery charge interface not have other output/input interface; Described special data storage framework is used for all data in the mobile communication equipment are concentrated on the data storage framework in data storage district; Described automatic defence module comprises automatic defence system, takes advantage of the enemy system, and described automatic defence system is used for all data backups in the mobile communication equipment behind data backup place, the 3rd ground, IDC network data center, removes all data in the mobile communication equipment; The described enemy of taking advantage of system is used for beginning to activate when carrying out when defence module automatically, and the screen that the control action communication apparatus externally shows constantly shows the illusion picture repeatedly; Described gps system is realized the GPS location, and sends GPS position and GPS integrating speech sound or send the news in brief circular police or related personnel.
2, the communication apparatus of automatic defence according to claim 1 is characterized in that: described automatic defence module can be utilized at various communication apparatus, realizes defence automatically.
3, the communication apparatus of automatic defence according to claim 1, it is characterized in that: the machine master of mobile communication equipment can set IDC network data center in advance, if the machine master does not set, then described automatic defence system will directly be removed all data in the mobile communication equipment, and described removing data can be that 0/1 coverage mode is removed.
4, the communication apparatus of automatic defence according to claim 1 is characterized in that: all data of mobile communication equipment comprise image file, text file, voice document, audio effect file, program file, movie file, web page files, database file and encrypt file etc.; Described illusion picture is that mobile communication equipment is closed screen, shown fault, in the display operation mistake, password input error, cryptographic core centering, power shortage, shutdown or the LED of screen power supplies, keyboard led light source system, jingle bell loudspeaker, receiver loudspeaker, state demonstration is closed the picture etc. of picture or combinations thereof.
5, the communication apparatus of automatic defence according to claim 1 is characterized in that: the mode that described transmission unit sends instruction can be directly to carry out order with the predefined mobile communication equipment of machine master to assign or utilize modes such as telephone, wired or wireless telecommunications transmitting apparatus, computer equipment are dialed and connected, world-wide web to assign instruction in mode direct or the relay terminal machine equipment or utilize single Mac position and have to encrypt and check that the terminating machine of function assigns instruction.
6, the communication apparatus of automatic defence according to claim 1, it is characterized in that: described mobile communication equipment comprises that also its built-in system program setting shutdown password is to adopt cipher code set, also can adopt identification of fingerprint, iris identification mode, and three input errors of password, the keyboard that this action communication apparatus activates promptly is blocked, if the urgent operation that the machine master of the loss or the mobile communication equipment that is stolen in time reports lost property to the authorities, then mobile communication equipment will activate automatic defence module automatically.
7, according to the communication apparatus of each the described automatic defence in the claim 1 to 6, it is characterized in that: described communication apparatus further comprises client service center, described client service center is used to confirm the machine owner identification of mobile communication equipment or for any machine master provides service, comprises customer service on true man's line, voice customer service etc.
8, the communication apparatus of automatic defence according to claim 7 is characterized in that: described data backup is to be that Secure Socket Layer and 128bit encrypt and high compression transfers back to data backup place, the 3rd ground, IDC network data center with SSL.
9, a kind of operation method of communication apparatus of automatic defence as claimed in claim 1 is characterized in that: this communication apparatus moves according to the following steps:
(1), client service center receives communication apparatus machine master and reports lost property to the authorities behind the phone, confirms whether the machine owner identification of mobile communication equipment is the owner of this mobile communication equipment of reporting lost property to the authorities;
(2) if then client service center assigns the instruction of carrying out defence automatically and gives encryption device, i.e. terminating machine; If not the client service center task termination does not carry out operation;
(3), if mobile communication equipment can't receive above-mentioned instruction, terminating machine will feed back to client service center, and inform the machine master by client service center, simultaneity factor sends above-mentioned instruction automatically repeatedly to encryption device;
(4), if mobile communication equipment receive above-mentioned instruction, carry out automatic decryption instructions and confirm single Mac position;
(5), if above-mentioned affirmation is passed through, activate the automatic defence system in the defence module automatically and take advantage of the enemy system;
(6), automatically after defence system backups to data backup place, above-mentioned the 3rd ground with all data in the mobile communication equipment, and with all data removings in the mobile communication equipment; Taking advantage of the enemy system simultaneously will make mobile communication equipment show the illusion picture;
(7), start gps system, by the GPS location, and send GPS position and the GPS integrating speech sound circular police or related personnel.
10, the operation method of the communication apparatus of automatic defence according to claim 9 is characterized in that: the communication apparatus of described automatic defence can break away from client service center or gps system operation defence automatically.
CNA2008100722587A 2008-11-27 2008-11-27 Automatic defensive communication equipment and running method thereof Pending CN101437066A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008100722587A CN101437066A (en) 2008-11-27 2008-11-27 Automatic defensive communication equipment and running method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008100722587A CN101437066A (en) 2008-11-27 2008-11-27 Automatic defensive communication equipment and running method thereof

Publications (1)

Publication Number Publication Date
CN101437066A true CN101437066A (en) 2009-05-20

Family

ID=40711281

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008100722587A Pending CN101437066A (en) 2008-11-27 2008-11-27 Automatic defensive communication equipment and running method thereof

Country Status (1)

Country Link
CN (1) CN101437066A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102118748A (en) * 2010-12-30 2011-07-06 胡利锋 Mobile phone integrated with security module
WO2013044436A1 (en) * 2011-09-26 2013-04-04 宇龙计算机通信科技(深圳)有限公司 Information protection method, serving device and mobile terminal
CN104700050A (en) * 2015-03-17 2015-06-10 上海天奕达电子科技有限公司 Mobile terminal safety positioning method and device
CN107211245A (en) * 2014-07-30 2017-09-26 总锁有限责任公司 Position tracking for locking device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102118748A (en) * 2010-12-30 2011-07-06 胡利锋 Mobile phone integrated with security module
WO2013044436A1 (en) * 2011-09-26 2013-04-04 宇龙计算机通信科技(深圳)有限公司 Information protection method, serving device and mobile terminal
CN103222284A (en) * 2011-09-26 2013-07-24 宇龙计算机通信科技(深圳)有限公司 Information protection method, serving device and mobile terminal
CN107211245A (en) * 2014-07-30 2017-09-26 总锁有限责任公司 Position tracking for locking device
CN107211245B (en) * 2014-07-30 2020-09-04 总锁有限责任公司 Method and system for position tracking of a locking device
CN104700050A (en) * 2015-03-17 2015-06-10 上海天奕达电子科技有限公司 Mobile terminal safety positioning method and device

Similar Documents

Publication Publication Date Title
CN101960738B (en) Method and system of providing personal information control service for mobile communication terminal
CN102739868B (en) The loss processing method of mobile terminal and system
CN103391374B (en) Dual system terminal supporting seamless switching
EP3675457B1 (en) Mobile terminal and method of providing security thereto
CN101803415B (en) Method and apparatus for creating the carrying out safety backup service of long-range activation for mobile handset
CN110321696B (en) Account security protection method and system based on small program
EP2613580B1 (en) System, method and communication terminal for tracking stolen communication terminal
CN104540123A (en) Encryption backup and security deletion method and system for important data of mobile terminal
CN101616495A (en) The method and system of individual privacy in the protection mobile phone
CN101252703A (en) Terminal data protecting method, system as well as mobile communication terminal
CN104364793A (en) Security mode for mobile communications devices
CN102955904A (en) Method and system for preventing secret divulgation of mobile communication equipment
CN202617350U (en) Mobile phone safety management and control system
CN104158657A (en) Information processing method and device, as well as encryption equipment
CN104580151A (en) Method for preventing confidential conference information from leakage and terminal
CN104427089A (en) Mobile terminal and mobile terminal authority management method
US20090016496A1 (en) Communication system
CN101437066A (en) Automatic defensive communication equipment and running method thereof
CN102306255A (en) Document protection method and system
CN104025633A (en) Method and system for providing information using a consent procedure executed by means of near-field communication
CN104955029A (en) Address book protection method, address book protection device and communication system
CN101415186A (en) Method for security protection of mobile phone information
CN102244860A (en) Method, system and server for preventing communication information of mobile terminal from being monitored
WO2010067263A2 (en) A system for protection and backup of information in a mobile cell unit
CN106650466A (en) User data protection method and apparatus, and intelligent wearable device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20090520