CN102158952A - Method and system for protecting personal information - Google Patents

Method and system for protecting personal information Download PDF

Info

Publication number
CN102158952A
CN102158952A CN2011100708651A CN201110070865A CN102158952A CN 102158952 A CN102158952 A CN 102158952A CN 2011100708651 A CN2011100708651 A CN 2011100708651A CN 201110070865 A CN201110070865 A CN 201110070865A CN 102158952 A CN102158952 A CN 102158952A
Authority
CN
China
Prior art keywords
personal information
protection
communication terminal
base station
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100708651A
Other languages
Chinese (zh)
Inventor
张娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2011100708651A priority Critical patent/CN102158952A/en
Publication of CN102158952A publication Critical patent/CN102158952A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for protecting personal information, which comprises the following steps of: sending a register signalling to a base station by a mobile communication terminal, wherein the register signalling contains recognition information of the mobile communication terminal; and carrying out protection processing on stored personal information by the mobile communication terminal according to a preset protection mode after the mobile communication terminal receives a protection signalling sent by the base station. The method can be used for protecting the personal information in the mobile communication terminal.

Description

A kind of method and system of protecting personal information
Technical field
The present invention relates to communication field, particularly a kind of method and system of protecting personal information.
Background technology
In the portable terminal, particularly mobile phone, keeping a lot of personal information of user,, can cause the leakage of personal information, do not having the personal information in the portable terminal simple, that effective method is protected loss in the prior art in case lose.
Registration is exactly that portable terminal is told the base station, the process of the position that portable terminal is positioned, state, sign, slot cycle and some other feature.Purpose is in order to allow the base station know the position of portable terminal, in the time of can making portable terminal as terminal call by base station paging effectively.
In the operation of slotted mode, portable terminal provides SLOT_CYCLE_INDEX (slot cycle index) parameter, the base station can judge according to this which time slot mobile phone is monitoring, portable terminal provides group indication state and protocol version, and the base station is judged the function that portable terminal provides according to this.
Cdma system is supported 10 kinds of different registration forms, specifically comprises:
(1) start-up logging: mobile phone is carried out start-up logging when opening power, frequency range switching, operator scheme are switched.
(2) closedown register: if mobile phone carries out closedown register before the shutdown so once in the system registry at present place.
(3) based on the registration of timer: after specifying timer expiry, the registration that mobile phone carries out.
(4) based on the registration of distance: the longitude and latitude when mobile phone is preserved last registration, if with current system message in the distance calculated of the longitude and latitude that issues surpass thresholding REG_DIST, then initiate registration.
(5) based on regional registration: new register regional the time when mobile phone enters one.
(6) parameter change registration: change has taken place in some special parameters of preserving when mobile phone, or mobile phone is initiated the parameter change registration when it enters a new system.
(7) instruction registration: the order mobile telephone registration can be come by sending a register requirement indication Registration Request Order in the base station.
(8) registration hiding: when mobile phone successfully sent a call message or page-response message, the position of mobile phone can be discerned in the base station, and this is considered to a registration hiding.
(9) Traffic Channel registration: for assignment the mobile phone of Traffic Channel, whenever BS has obtained mobile telephone registration information, BS can notify mobile phone it carried out once registration.
(10) user area registration: when a handset-selected validated user zone (UZID), initiate registration.
Wherein, preceding 5 kinds and the 10th kind are called as autonomous registration, and other several right and wrong are independently registered.Autonomous registration and parameter change registration can be activated or deexcitation.The registration type and the relevant registration parameter thereof that activate are included in the system parameters message (System Parameters Message).The parameter change registration is based on roaming state.The instruction registration starts from the command messages (Order Message) that the base station sends.Registration hiding does not need to send out between base station and the portable terminal any registration message of exchange.The base station can send the status request message (Status Request Message) that comprises log-on message by paging channel and forward traffic channel to portable terminal.The base station also can send the status request message (Status Request Message) that comprises limited log-on message by forward traffic channel to portable terminal.The base station can be informed that portable terminal has been registered by portable terminal registration message (Mobile Station Registered Message) and be finished.
These several logon modes have correlation.For example: based on a major advantage of the logon mode of timer is exactly to avoid the ineffertive pager that causes owing to the mobile phone shutdown registration failure.When any registration (comprising registration hiding) took place, the zone at mobile phone place (REG_ZONE, SID, NID) all was added among the ZONE_LIST.After any registration was by successful execution, the timer of registration also will be resetted again based on the time.When parameter change, mobile phone will be deleted REG_ZONE, SID and the NID among the ZONE_LIST.
When portable terminal is registered, send registration message (Registration Message) to the base station, it thes contents are as follows:
Figure BDA0000051713130000031
From portable terminal to the registration message that the base station sends as can be seen, when registering, portable terminal need be provided for discerning ESN (the Electronic Serial Number of portable terminal to the base station, Electronic Serial Number) and IMSI (InternationalMobileSubscriberIdentificationNumber, international mobile subscriber identity), ESN is the parameter of a 32bits length, being the only sign of portable terminal, is indispensable parameter in system's authentication.IMSI is difference mobile subscriber's a sign, is stored in the SIM card, can be used for distinguishing the effective information of portable terminal.
Summary of the invention
The invention provides a kind of method of protecting personal information, can protect the personal information in the communication terminal.
For solving the problems of the technologies described above, the present invention has adopted following technical scheme:
On the one hand, the invention discloses a kind of method of protecting personal information, comprise following steps:
Communication terminal sends register command to the base station, comprises the identifying information of described communication terminal in the described register command;
After communication terminal is received the protection signaling of base station transmission,, stored personal information is made protection handle according to the protection type that pre-sets.
Among the embodiment of the method for above-mentioned protection personal information, the described protection type that pre-sets comprises the encryption personal information, or removes personal information.
Among the embodiment of the method for above-mentioned protection personal information, if the protection type that pre-sets then pre-sets Crypted password simultaneously for encrypting personal information.
Among the embodiment of the method for above-mentioned protection personal information, further comprising the steps of:
After stored personal information made protection and handle, the communication terminal feedback processing finished information to the base station.
Among the embodiment of the method for above-mentioned protection personal information, also comprise following steps:
After the register command of communication terminal transmission was received in the base station, terminal database was lost in inquiry;
If lose no above-mentioned communication terminal identifying information in the terminal database, then carry out normal network registry flow process, if lose in the terminal database above-mentioned communication terminal identifying information is arranged, then send the protection signaling to described communication terminal.
Among the embodiment of the method for above-mentioned protection personal information, described communication terminal identifying information comprises the Electronic Serial Number ESN and the international mobile subscriber identity IMSI of communication terminal.
On the other hand, the invention also discloses a kind of system that protects personal information, described communication terminal comprises Registering modules and protection module, and described Registering modules is used for sending register command to the base station, comprises the identifying information of described communication terminal in the described register command;
Described protection module is used for after receiving the protection signaling that the base station sends, and according to the protection type that pre-sets, stored personal information is made protection handle.
Among the embodiment of the system of above-mentioned protection personal information, described communication terminal also comprises module is set, and is used to pre-set the protection type, and the protection type of preset value comprises the encryption personal information, or removes personal information.
Among the embodiment of the system of above-mentioned protection personal information, described communication terminal also comprises feedback module, is used for after stored personal information being made the protection processing, and feedback processing finishes information to the base station.
Among the embodiment of the system of above-mentioned protection personal information, described base station comprises enquiry module and processing module, and after described enquiry module was used to receive the register command of communication terminal transmission, terminal database was lost in inquiry;
Described processing module is used for if lose the no above-mentioned communication terminal identifying information of terminal database; then carry out normal network registry flow process; if lose in the terminal database above-mentioned communication terminal identifying information is arranged, then send the protection signaling to described communication terminal.
Compare with prior art, beneficial effect of the present invention is:
A kind of method of protecting personal information disclosed by the invention comprises that communication terminal sends register command to the base station, comprises described communication terminal identifying information in the described register command; After communication terminal is received the protection signaling of base station transmission,, stored personal information is made protection handle according to the protection type that pre-sets.When communication terminal is registered; its stored personal information is carried out corresponding protection to be handled; can protect user's personal information simply, effectively; the unsafe factor of avoiding the leakage of personal information to bring; provide more intimate service to the user; simultaneously also need not to increase extra equipment and hardware, saved cost.
Description of drawings
Fig. 1 has exemplarily described the flow chart of personal information protecting method of the present invention;
Fig. 2 has exemplarily described the structure chart of personal information protection of the present invention system.
Embodiment
A kind of protection of personal information method disclosed by the invention comprises two-part handling process, and the one, the processing of communication terminal is the processing of base station on the other hand.
At communication terminal, communication terminal sends register command to the base station, comprises described communication terminal identifying information in the described register command;
After communication terminal is received the protection signaling of base station transmission,, stored personal information is made protection handle according to the protection type that pre-sets.
Being treated to of base station:
If lose no above-mentioned communication terminal identifying information in the terminal database, then carry out normal network registry flow process, if lose in the terminal database above-mentioned communication terminal identifying information is arranged, then send the protection signaling to described communication terminal.
Contrast accompanying drawing and the present invention is further elaborated below in conjunction with embodiment.
Embodiment one:
Mobile phone is modal communication terminal, in the present embodiment, is that example describes with the mobile phone.
As shown in Figure 1, among the embodiment of a kind of method of protecting personal information disclosed by the invention, comprise following steps:
Step 101, the user is in the default protection of mobile phone type.
The protection type comprises the encryption personal information, or removes personal information.
If the protection type that pre-sets then pre-sets Crypted password simultaneously for encrypting personal information.
Adopt to encrypt personal information, if mobile phone recovers, then the personal information that can encrypt with release made things convenient for the user, but password may be cracked, and has certain potential safety hazard.
Adopt and remove personal information, then do not have the hidden danger of revealing personal information, but the personal information of removing can't be given for change.
The user can be provided with according to the needs of oneself.
The user can also be provided with the scope of personal information except the protection type can be set, personal information can comprise telephone directory, note, video, photo, QQ number, internet records etc.
Step 102, behind the lost mobile phone, the user reports the communication terminal identifying information to operator.
The communication terminal identifying information comprises the Electronic Serial Number ESN and the international mobile subscriber identity IMSI of communication terminal.
Adopt ESN and the IMSI can the effective recognition communication terminal, erroneous judgement can not occur.
The user also can provide the channel that receives feedback simultaneously, and the situation of mobile phone is lost in convenient understanding.
Step 103, base station will receive that the identifying information of the communication terminal of having lost deposits the loss terminal database in.
Step 104, the mobile phone of loss send register command from the trend base station, comprise described communication terminal identifying information in the register command.
Mobile phone power-on or be in open state after, can send register command from the trend base station within a certain period of time.
After step 105, base station were received the register command of mobile phone transmission, terminal database was lost in inquiry.
Step 106 if lose no above-mentioned communication terminal identifying information in the terminal database, is then carried out normal network registry flow process;
Step 107 has above-mentioned communication terminal identifying information if lose in the terminal database, then sends the communication terminal of protection signaling to described loss.
After step 108, mobile phone are received the protection signaling of base station transmission,, stored personal information is made protection handle according to the protection type that pre-sets.
If default protection type is then carried out encryption for encrypting personal information; If default protection type is then removed for knowing personal information.
Step 109, the communication terminal feedback processing finishes information to the base station.
Step 110, after the information of disposing was received in the base station, the feedback conduit that provides by the user was to user feedback.
The base station can also send the locking signaling to the mobile phone of losing to mobile phone, after mobile phone is received the locking signaling, and locking mobile phone and SIM card.
Locking mobile phone and SIM can avoid causing other economic losses to the user.
Step 111, if the mobile phone of losing recovers, and the protected mode that the user is provided with is encipherment protection, then can import the personal information that unlock password is encrypted.
Communication terminal just can use after having only registration; the identifying information that carries when therefore registering according to communication terminal; stored personal information in the mobile phone is made protection handle, simple, convenient, effectively, in time, the unsafe factor of having avoided the leakage of personal information to bring.Simultaneously, the invention provides different protected modes, provide more intimate service to the user.In addition, the signaling when registering by communication terminal carries out personal information is protected, and need not operator and user increases extra equipment and hardware, has saved cost.Protect user's personal information effectively, improved user's Experience Degree, also be convenient to carrying out of Operator Specific Service.
Embodiment two:
As shown in Figure 2, the invention also discloses a kind of embodiment that protects the system of personal information, described communication terminal comprises Registering modules and protection module, and described Registering modules is used for sending register command to the base station, comprises described communication terminal identifying information in the described register command;
Described protection module is used for after receiving the protection signaling that the base station sends, and according to the protection type that pre-sets, stored personal information is made protection handle.
Among the embodiment of the system of above-mentioned protection personal information, described communication terminal also comprises module is set, and is used to pre-set the protection type, and the protection type of preset value comprises the encryption personal information, or removes personal information.
Among the embodiment of the system of above-mentioned protection personal information, described communication terminal also comprises feedback module, is used for after stored personal information being made the protection processing, and feedback processing finishes information to the base station.
Among the embodiment of the system of above-mentioned protection personal information, described base station comprises enquiry module and processing module, and after described enquiry module was used to receive the register command of communication terminal transmission, terminal database was lost in inquiry;
Described processing module is used for if lose the no above-mentioned communication terminal identifying information of terminal database; then carry out normal network registry flow process; if lose in the terminal database above-mentioned communication terminal identifying information is arranged, then send the protection signaling to described communication terminal.
A kind of method of protecting personal information disclosed by the invention comprises that communication terminal sends register command to the base station, comprises described communication terminal identifying information in the described register command; After communication terminal is received the protection signaling of base station transmission,, stored personal information is made protection handle according to the protection type that pre-sets.Communication terminal just can use after having only registration; the identifying information that carries when therefore registering according to communication terminal; stored personal information in the mobile phone is made protection handle, simple, convenient, effectively, in time, the unsafe factor of having avoided the leakage of personal information to bring.Simultaneously, the invention provides different protected modes, provide more intimate service to the user.In addition, the signaling when registering by communication terminal carries out personal information is protected, and need not operator and user increases extra equipment and hardware, has saved cost.Protect user's personal information effectively, improved user's Experience Degree, also be convenient to carrying out of Operator Specific Service.
Above content be in conjunction with concrete execution mode to further describing that the present invention did, can not assert that concrete enforcement of the present invention is confined to these explanations.For the general technical staff of the technical field of the invention, without departing from the inventive concept of the premise, can also make some simple deduction or replace, all should be considered as belonging to protection scope of the present invention.

Claims (10)

1. a method of protecting personal information is characterized in that, comprises following steps:
Communication terminal sends register command to the base station, comprises the identifying information of described communication terminal in the described register command;
After communication terminal is received the protection signaling of base station transmission,, stored personal information is made protection handle according to the protection type that pre-sets.
2. the method for protection personal information as claimed in claim 1 is characterized in that, the described protection type that pre-sets comprises the encryption personal information, or removes personal information.
3. the method for protection personal information as claimed in claim 2 is characterized in that, if the protection type that pre-sets then pre-sets Crypted password simultaneously for encrypting personal information.
4. the method for protection personal information as claimed in claim 3 is characterized in that, and is further comprising the steps of:
After stored personal information made protection and handle, the communication terminal feedback processing finished information to the base station.
5. the method for protection personal information as claimed in claim 4 is characterized in that, also comprises following steps:
After the register command of communication terminal transmission was received in the base station, terminal database was lost in inquiry;
If lose no above-mentioned communication terminal identifying information in the terminal database, then carry out normal network registry flow process, if lose in the terminal database above-mentioned communication terminal identifying information is arranged, then send the protection signaling to described communication terminal.
6. the method for protection personal information as claimed in claim 5 is characterized in that, described communication terminal identifying information comprises the Electronic Serial Number ESN and the international mobile subscriber identity IMSI of communication terminal.
7. a system that protects personal information is characterized in that, described communication terminal comprises Registering modules and protection module, and described Registering modules is used for sending register command to the base station, comprises the identifying information of described communication terminal in the described register command;
Described protection module is used for after receiving the protection signaling that the base station sends, and according to the protection type that pre-sets, stored personal information is made protection handle.
8. the system of protection personal information as claimed in claim 7 is characterized in that, described communication terminal also comprises module is set, and is used to pre-set the protection type, and the protection type of preset value comprises the encryption personal information, or removes personal information.
9. the system of protection personal information as claimed in claim 8 is characterized in that, described communication terminal also comprises feedback module, is used for after stored personal information being made the protection processing, and feedback processing finishes information to the base station.
10. the system of protection personal information as claimed in claim 9 is characterized in that, described base station comprises enquiry module and processing module, and after described enquiry module was used to receive the register command of communication terminal transmission, terminal database was lost in inquiry;
Described processing module is used for if lose the no above-mentioned communication terminal identifying information of terminal database; then carry out normal network registry flow process; if lose in the terminal database above-mentioned communication terminal identifying information is arranged, then send the protection signaling to described communication terminal.
CN2011100708651A 2011-03-23 2011-03-23 Method and system for protecting personal information Pending CN102158952A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100708651A CN102158952A (en) 2011-03-23 2011-03-23 Method and system for protecting personal information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100708651A CN102158952A (en) 2011-03-23 2011-03-23 Method and system for protecting personal information

Publications (1)

Publication Number Publication Date
CN102158952A true CN102158952A (en) 2011-08-17

Family

ID=44440044

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100708651A Pending CN102158952A (en) 2011-03-23 2011-03-23 Method and system for protecting personal information

Country Status (1)

Country Link
CN (1) CN102158952A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104185174A (en) * 2014-07-17 2014-12-03 惠州Tcl移动通信有限公司 Encryption method and terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6741851B1 (en) * 1999-10-30 2004-05-25 Samsung Electronics Co., Ltd. Method for protecting data stored in lost mobile terminal and recording medium therefor
CN1549645A (en) * 2003-05-07 2004-11-24 乐金电子(中国)研究开发中心有限公 Registration for loss mobile communication terminal and user connection method
CN1874596A (en) * 2005-11-11 2006-12-06 华为技术有限公司 Mobile terminal, and method for protecting information in mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6741851B1 (en) * 1999-10-30 2004-05-25 Samsung Electronics Co., Ltd. Method for protecting data stored in lost mobile terminal and recording medium therefor
CN1549645A (en) * 2003-05-07 2004-11-24 乐金电子(中国)研究开发中心有限公 Registration for loss mobile communication terminal and user connection method
CN1874596A (en) * 2005-11-11 2006-12-06 华为技术有限公司 Mobile terminal, and method for protecting information in mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104185174A (en) * 2014-07-17 2014-12-03 惠州Tcl移动通信有限公司 Encryption method and terminal

Similar Documents

Publication Publication Date Title
US8874077B2 (en) Method and apparatus for monitoring and theft prevention
JP3796407B2 (en) Method for performing a safety detach procedure in a wireless telecommunications network
US9015808B1 (en) Restricting mobile device services between an occurrence of an account change and acquisition of a security code
CN103329585A (en) Method for transferring subscription information between terminals
CN109922474B (en) Method for triggering network authentication and related equipment
US20080090548A1 (en) Method for tracking mobile communication terminal
ES2917195T3 (en) Method and apparatus for the protection of privacy in the location of user equipment
US9572023B2 (en) Method and system for providing services to mobile communication subscribers
CN105142136B (en) A kind of method of anti-pseudo-base station attack
CN102833712A (en) Method, device, server and system for preventing information leakage and equipment
CN104254069B (en) Network registry system and method without SIM card mobile phone
CN102740297B (en) Paging method, device and system
CN104394533A (en) WiFi (wireless fidelity) connection method, server and terminal
US20180146421A1 (en) Method for realizing network access, terminal and computer storage medium
CN103139769B (en) A kind of wireless communications method and network subsystem
CN103874041A (en) Multimode dual-standby terminal-based called voice service processing method, device and system
CN103561153A (en) Incoming call processing method, device and system of portable positioning device
CN107046734B (en) Transmission method and device of NAS bearing data
CN101867931B (en) Device and method for realizing non access stratum in wireless communication system
CN101080051B (en) Method for service station indication of terminal
Bitsikas et al. You have been warned: Abusing 5G’s Warning and Emergency Systems
CN101312569B (en) Selection method for mobile phone service network
CN115843030B (en) Signaling protection device and access control method
CN1980457A (en) Network-side alarm-realizing method
CN102158952A (en) Method and system for protecting personal information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110817