CN101951606A - Method for protecting security of information of mobile phone - Google Patents

Method for protecting security of information of mobile phone Download PDF

Info

Publication number
CN101951606A
CN101951606A CN2010102998387A CN201010299838A CN101951606A CN 101951606 A CN101951606 A CN 101951606A CN 2010102998387 A CN2010102998387 A CN 2010102998387A CN 201010299838 A CN201010299838 A CN 201010299838A CN 101951606 A CN101951606 A CN 101951606A
Authority
CN
China
Prior art keywords
sim card
information
mobile phone
protecting
cell phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102998387A
Other languages
Chinese (zh)
Inventor
甘江飚
李伟
杨菁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sang Fei Consumer Communications Co Ltd
Original Assignee
Shenzhen Sang Fei Consumer Communications Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sang Fei Consumer Communications Co Ltd filed Critical Shenzhen Sang Fei Consumer Communications Co Ltd
Priority to CN2010102998387A priority Critical patent/CN101951606A/en
Publication of CN101951606A publication Critical patent/CN101951606A/en
Priority to PCT/CN2011/076627 priority patent/WO2012041096A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to a method for protecting the security of the information of a mobile phone, which comprises the following steps: inserting an SIM card; allowing the mobile phone system to identify the inserted SIM card and build a virtual database for recording the identity information of the SIM card; allowing the system to judge information generated on the basis of the inserted SIM card; when the SIM card is removed or become invalid, allowing the system to close the database automatically and directly hide the related information generated on the basis of the SIM card; and when a valid SIM card is removed or inserted again, allowing the system to restore the display of the information generated on the basis of the SIM card. When the method for protecting the security of the information of the mobile phone is implemented, the security of the information of the mobile phone of a user can be ensured effectively, and the misgivings of the user are eliminated.

Description

A kind of method of protecting mobile phone information safety
Technical field
The present invention relates to moving communicating field, more particularly, relate to a kind of method of protecting mobile phone information safety.
Background technology
Mobile phone has become the indispensable in daily life important tool of people, and it almost can store all individual private informations of user.If the user has lost mobile phone, mobile phone falls into other people hand, and the information that stores on the mobile phone is utilized by others, just may cause a lot of unnecessary loss to the user.Simultaneously, along with popularizing of mobile phone, people change the speed of mobile phone and also obviously accelerate, and it is not strange thing already that a people has multi-section mobile phone, multiple SIM card.And the mobile phone that the user eliminates tends to be given to others' use, perhaps because in order to experience the function of different mobile phones, the exchange mobile phone uses and also happens occasionally.But often there are some to be unwilling to see in the mobile phone, but want the information of preserving to others, or the information of being inconvenient to delete, how did this handle these information actually before mobile phone was used to others?
In the prior art, the safety of mobile phone EMS memory storage information does not also have enough guarantees, brings certain potential safety hazard with regard to the life of giving the consumer like this.
Summary of the invention
The technical problem to be solved in the present invention is, at the above-mentioned defective of prior art, provides a kind of method of protecting mobile phone information safety.
The technical solution adopted for the present invention to solve the technical problems is: a kind of method of protecting mobile phone information safety is provided, and described method may further comprise the steps:
S1, insertion SIM card;
S2, cell phone system carry out identification to the SIM card of inserting, and set up the identity information of a virtual data base record SIM card;
The information that produces based on the SIM card of being inserted is judged by S3, system;
S4, after SIM card is removed or lost efficacy, system is automatic closing database, directly hides the relevant information that produces based on this SIM card; The inefficacy of SIM card is meant behind user's lost mobile phone, the application SIM card is cancelled to operator, at this moment the SIM card in the mobile phone is the card that lost efficacy, after system detects, will close the database that produces based on this SIM card automatically, hide the information in the mobile phone, prevent that individual private information from being utilized to cause bigger loss by others;
S5, remove the back when being inserted once more when effective SIM card, demonstration will recover based on various information that this SIM card produced in system.
As further improvement in the technical proposal, above-described a kind of method of protecting mobile phone information safety, the information that described SIM card produces comprises address list, communications records, note record, multimedia message record, recording, video recording and photo etc.
As further improvement in the technical proposal; above-described a kind of method of protecting mobile phone information safety, described cell phone system comprises a setting option, free memory is too little when system; when influence is used, system will inquire whether the user deletes the information that certain SIM card produces.
As further improvement in the technical proposal, above-described a kind of method of protecting mobile phone information safety, described cell phone system also comprises a setting option, when inserting SIM card, whether the cell phone system prompting will work under the private information protected mode; In this way, then enter the private information protected mode; As not, then under general mode, move.
As further improvement in the technical proposal, above-described a kind of method of protecting mobile phone information safety, described method is applicable to single deck tape-recorder or mobile telephone with multiple cards.In mobile telephone with multiple cards, system is identified in units different SIM card with the draw-in groove, and sets up disparate databases, even in same mobile telephone with multiple cards, and the insertion position of exchange SIM card, the information that produces before can not seeing.
Implement a kind of method of protecting mobile phone information safety of the present invention, user's trouble and worry is removed in fail safe that can very effective assurance user mobile phone information.
Description of drawings
The invention will be further described below in conjunction with drawings and Examples, in the accompanying drawing:
Fig. 1 is a kind of program flow diagram one of protecting the method embodiment of mobile phone information safety of the present invention;
Fig. 2 is a kind of program flow diagram two of protecting the method embodiment of mobile phone information safety of the present invention.
Embodiment
As shown in Figure 1, in the embodiment of a kind of method of protecting mobile phone information safety of the present invention, described method may further comprise the steps:
T1, insertion A-SIM card;
T2, cell phone system stick into capable identification to the A-SIM that inserts, and set up the identity information of a virtual data base record A-SIM card;
The information that produces based on the A-SIM card that is inserted is judged by T3, system; The information that SIM card produces comprises address list, communications records, note record, multimedia message record, recording, video recording and photo etc.
T4, after the A-SIM card is removed or lost efficacy, system is automatic closing database, directly hides the relevant information that produces based on this A-SIM card; The inefficacy of SIM card is meant behind user's lost mobile phone, the application SIM card is cancelled to operator, and at this moment the SIM card in the mobile phone is the card that lost efficacy, after system detects, will hide the information in the mobile phone automatically, prevent that individual private information from being utilized to cause bigger loss by others;
T5, insertion B-SIM card, cell phone system sticks into capable identification to the B-SIM that inserts, and sets up the identity information of a virtual data base record B-SIM card; The information that produces based on the B-SIM card that is inserted is judged by system;
T6, turn back to effective A-SIM card again, the various information in database that produced based on this A-SIM card will be recovered to show by system, and hide the database that produces based on the B-SIM card automatically.
Because if mobile phone constantly uses different SIM card, and all do not have and to fall based on the information deletion that SIM card produced before at every turn, system will constantly set up new virtual data base, the free memory capacity can constantly reduce, so cell phone system also comprises a setting option, free memory is too little when system, when memory size is lower than the influence of a certain threshold values and uses, system will inquire whether the user deletes the information of certain SIM card generation.The user can select to delete the database information under the current SIM voluntarily, perhaps selects the deletion database information of the employed SIM card generation of section sometime before, and when carrying out this operation, system all can not demonstrate the relevant information of the SIM card database of being deleted.
As Fig. 2, described cell phone system also comprises a setting option, and when inserting SIM card, whether the cell phone system prompting will work under the private information protected mode; In this way, then enter the private information protected mode; As not, then under general mode, move.Be that information is consulted and not limited by SIM card, insert the information that different SIM card also can be consulted other cards.But this setting only at the SIM card that correspondence when taking place is set just effectively.Change a SIM card, this setting is just invalid, and the user can carry out new setting again, the pattern of selecting mobile phone to work under new SIM card.
In sum, as those of ordinary skill is scrutable in the art, described in this specification is a preferred embodiment of the present invention, and all changes of being made under this invention's idea or modification all should be in claim protection ranges of the present invention.

Claims (5)

1. a method of protecting mobile phone information safety is characterized in that, described method may further comprise the steps:
S1, insertion SIM card;
S2, cell phone system carry out identification to the SIM card of inserting, and set up the identity information of a virtual data base record SIM card;
The information that produces based on the SIM card of being inserted is judged by S3, system;
S4, after SIM card is removed or lost efficacy, system is automatic closing database, directly hides the relevant information that produces based on this SIM card;
S5, remove the back when being inserted once more when effective SIM card, demonstration will recover based on information that this SIM card produced in system.
2. a kind of method of protecting mobile phone information safety according to claim 1 is characterized in that, the information that described SIM card produces comprises address list, communications records, note record, multimedia message record, recording, video recording and photo.
3. a kind of method of protecting mobile phone information safety according to claim 2 is characterized in that described cell phone system comprises a setting option, and free memory is too little when system, and when influence is used, system will inquire whether the user deletes the information that certain SIM card produces.
4. according to claim 2 or 3 described a kind of methods of protecting mobile phone information safety, it is characterized in that described cell phone system also comprises a setting option, when inserting SIM card, whether the cell phone system prompting will work under the private information protected mode; In this way, then enter the private information protected mode; As not, then under general mode, move.
5. a kind of method of protecting mobile phone information safety according to claim 1 is characterized in that described method is applicable to single deck tape-recorder or mobile telephone with multiple cards.
CN2010102998387A 2010-09-30 2010-09-30 Method for protecting security of information of mobile phone Pending CN101951606A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2010102998387A CN101951606A (en) 2010-09-30 2010-09-30 Method for protecting security of information of mobile phone
PCT/CN2011/076627 WO2012041096A1 (en) 2010-09-30 2011-06-30 Method for protecting security of information of mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102998387A CN101951606A (en) 2010-09-30 2010-09-30 Method for protecting security of information of mobile phone

Publications (1)

Publication Number Publication Date
CN101951606A true CN101951606A (en) 2011-01-19

Family

ID=43454933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102998387A Pending CN101951606A (en) 2010-09-30 2010-09-30 Method for protecting security of information of mobile phone

Country Status (2)

Country Link
CN (1) CN101951606A (en)
WO (1) WO2012041096A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012041096A1 (en) * 2010-09-30 2012-04-05 深圳桑菲消费通信有限公司 Method for protecting security of information of mobile phone
CN103402002A (en) * 2013-07-15 2013-11-20 宇龙计算机通信科技(深圳)有限公司 Address book management method and terminal
CN105635465A (en) * 2015-12-30 2016-06-01 中科创达软件股份有限公司 Data isolation method, data isolation device and terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1606373A (en) * 2003-10-07 2005-04-13 三星电子株式会社 Mobile communication terminal for protecting private contents and method for controlling the same
CN1703063A (en) * 2004-05-25 2005-11-30 日本电气株式会社 Mobile communication terminal
CN1889728A (en) * 2005-06-27 2007-01-03 集嘉通讯股份有限公司 Hand-held mobile communicating apparatus with information hidden function and data hidden method thereof
CN101674583A (en) * 2009-08-25 2010-03-17 联信摩贝软件(北京)有限公司 Method for hiding or recovering personal information when changing SIM card and system thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951606A (en) * 2010-09-30 2011-01-19 深圳桑菲消费通信有限公司 Method for protecting security of information of mobile phone

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1606373A (en) * 2003-10-07 2005-04-13 三星电子株式会社 Mobile communication terminal for protecting private contents and method for controlling the same
CN1703063A (en) * 2004-05-25 2005-11-30 日本电气株式会社 Mobile communication terminal
CN1889728A (en) * 2005-06-27 2007-01-03 集嘉通讯股份有限公司 Hand-held mobile communicating apparatus with information hidden function and data hidden method thereof
CN101674583A (en) * 2009-08-25 2010-03-17 联信摩贝软件(北京)有限公司 Method for hiding or recovering personal information when changing SIM card and system thereof

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012041096A1 (en) * 2010-09-30 2012-04-05 深圳桑菲消费通信有限公司 Method for protecting security of information of mobile phone
CN103402002A (en) * 2013-07-15 2013-11-20 宇龙计算机通信科技(深圳)有限公司 Address book management method and terminal
CN105635465A (en) * 2015-12-30 2016-06-01 中科创达软件股份有限公司 Data isolation method, data isolation device and terminal

Also Published As

Publication number Publication date
WO2012041096A1 (en) 2012-04-05

Similar Documents

Publication Publication Date Title
CN103885858B (en) Method and system for mobile phone backup and data recovery
CN104615691B (en) A kind of method of mobile terminal and data storage
CN101426052A (en) Backup and importing method for address book and short message of mobile terminal
CN104935735A (en) Information deletion method and information deletion system
CN101426198A (en) Mobile phone information protecting method
CN103916541A (en) Automatic record eliminating method and mobile terminal
CN103188672A (en) Mobile terminal and data protection method thereof
CN108737786B (en) Intelligent monitoring system
CN103491259A (en) Method and device for storing and controlling communication information of temporary communication numbers
CN103973901A (en) Device and method for automatically executing calendar events
CN101640717A (en) Short message management system and method
CN101951606A (en) Method for protecting security of information of mobile phone
CN102065161A (en) System and method for realizing multi-card multi-standby mobile phone function by virtual method
CN101790161A (en) Mobile terminal, method for acquiring private data of mobile terminal and system therefor
CN104503659B (en) Intelligent terminal screen locking display methods and system
CN101951568B (en) Short message information interception processing and device
CN103561147A (en) Address-book updating method and system of mobile equipment
CN105404551A (en) Processing method and system for switching application between foreground and background of mobile terminal and mobile terminal
CN102098661A (en) Mobile terminal and method for processing information of SIM (subscriber identity module) card
CN103942443B (en) Information processing method and device
CN103067556A (en) Handling method, terminal and system of privacy information
CN102272743A (en) Management method for information of universal integrated circuit card and device thereof
CN102045427A (en) Method and device for managing calling cards with mobile terminal
CN101969496B (en) Data interaction method and mobile terminal
CN107391639A (en) A kind of automatic method, mobile terminal and storage device for recovering recycle bin file

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110119