CN102354353A - Method for acquiring data and terminal - Google Patents
Method for acquiring data and terminal Download PDFInfo
- Publication number
- CN102354353A CN102354353A CN2011102894749A CN201110289474A CN102354353A CN 102354353 A CN102354353 A CN 102354353A CN 2011102894749 A CN2011102894749 A CN 2011102894749A CN 201110289474 A CN201110289474 A CN 201110289474A CN 102354353 A CN102354353 A CN 102354353A
- Authority
- CN
- China
- Prior art keywords
- subscriber identity
- terminal
- permission levels
- module
- identity module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
Abstract
The invention provides a method for acquiring data, comprising the steps of: step 102: setting privilege levels for data in a terminal and a user identification card inserted into the terminal respectively; and step 104: obtaining data which correspond to the privilege level according to the privilege level of the user identification card. Correspondingly, the invention further provides the terminal. Due to the adoption of the technical scheme provided by the invention, the terminal can be operated under a corresponding data access right according to the different user identification cards used by a user, so that the terminal data can be conveniently protected and managed.
Description
Technical field
The present invention relates to the data protection technology, in particular to a kind of data capture method and a kind of terminal.
Background technology
The user hopes the data access in terminal such as the mobile phone is carried out control of authority sometimes, and the data that different people can be visited are different, reaches the purpose of privacy and safeguard protection.For above-mentioned purpose; The user normally realizes the control of authority to various data accesses through the way of cryptoguard; For example want the access contacts data need input password 1, carrying out the information data visit needs password 2, carries out picture or the file data visit needs password 3.But utilize password to carry out the control of data access authority, have following some disadvantageous place: 1. many kinds of authorities need a plurality of passwords to manage, and the memory of a plurality of passwords is more loaded down with trivial details; 2. during cipher control, each action need input password, operation inconvenience; 3. cell phone password is simpler usually, and conjecture password if other people guess easily, and then safety does not exist; 4. during with other people sharing information, password is unfavorable for the management of privacy.
Therefore, need a kind of new authority that technology is set, the difference of the Subscriber Identity Module that can use according to the user makes terminal operating under the data access authority of correspondence, is convenient to protection and management to terminal data.
Summary of the invention
The present invention just is being based on the problems referred to above, has proposed a kind of new authority technology is set, and the difference of the Subscriber Identity Module that can use according to the user makes terminal operating under the data access authority of correspondence, is convenient to protection and management to terminal data.
In view of this, the present invention proposes a kind of data capture method, comprising: step 102, the Subscriber Identity Module that is respectively the data in the terminal and inserts said terminal is provided with Permission Levels; Step 104 is obtained in the said terminal data corresponding to said Permission Levels according to the Permission Levels of said Subscriber Identity Module.In this technical scheme; The access rights rank can be set for the data in the terminal; Such as being divided into one-level, secondary and three grades; Like this; For the Subscriber Identity Module that has the one-level authority, the user just can visit whole data, and for the Subscriber Identity Module that has the secondary authority; The user then cannot visit the data of one-level authority, only to visit the data of secondary and three grades of authorities.Be provided with and corresponding to the authority of data through authority, and do not adopt modes such as existing input password, thereby can improve security, and needn't write down password, make the data access process more convenient, more effective Subscriber Identity Module.
In technique scheme, preferably, said step 102 also comprises: the Permission Levels of said Subscriber Identity Module and the sign of said Subscriber Identity Module are carried out association store.In this technical scheme, for the Subscriber Identity Module that is provided with Permission Levels, the Permission Levels that are provided with can be stored, then when the terminal is restarted or inserted Subscriber Identity Module again after, can reset again and directly obtain the Permission Levels of correspondence.
In technique scheme; Preferably; Said step 102 also comprises: said terminal obtains the sign of the Subscriber Identity Module of insertion; Confirm in said terminal, whether to store the Permission Levels that promising said Subscriber Identity Module is provided with according to said sign; If the Permission Levels of said Subscriber Identity Module no, then are set.In this technical scheme; Through the Subscriber Identity Module that is provided with Permission Levels being carried out the storage of Permission Levels; Then after changing Subscriber Identity Module; The terminal can be distinguished in the very first time; And after confirming as new Subscriber Identity Module; Allow the user be provided with, and carry out stored record the result is set.
In technique scheme, preferably, also comprise: condition is set for said terminal is provided with authority; Judge whether to satisfy said authority condition is set,, then allow to be provided with the Permission Levels of said Subscriber Identity Module if satisfy, otherwise the Permission Levels that said Subscriber Identity Module is set to preset.In this technical scheme; If want Subscriber Identity Module is carried out the Permission Levels setting; At first should satisfy authority condition is set; The authority here is provided with password that condition can set up on their own for preset password, password or user in the terminal, password, fingerprint, electronic signature etc.; Thereby guarantee terminal loss or when being used, can't obtain higher Permission Levels by other users.Here Yu She Permission Levels can be the Permission Levels that terminal acquiescence or user set, and can be set to multiple rank; Such as being set at minimum rank; Make other users after inserting other Subscriber Identity Modules, can't obtain data or rank higher data, improve security.
In technique scheme, preferably, when in said terminal, inserting many Subscriber Identity Modules, in said many Subscriber Identity Modules, select one as main card, and with the Permission Levels of said main card as current Permission Levels.In this technical scheme; For the terminal that has many Subscriber Identity Modules; The user can select one as main card in many Subscriber Identity Modules; And main card can be selected between many Subscriber Identity Modules and switch arbitrarily; Then the terminal need be when the user have selected main card or has switched main card; Permission Levels to current main card judge, and as current Permission Levels.
In technique scheme, preferably, said terminal comprises: mobile phone, panel computer; Said Subscriber Identity Module comprises: SIM card, Micro-SIM card; The sign of said Subscriber Identity Module comprises: the ICCID sign indicating number; Said authority is provided with condition and comprises: input password password, electronic signature and/or finger print information.In this technical scheme; In terminals such as mobile phone or panel computer such as IPAD; Can use SIM card or Micro-SIM card as Subscriber Identity Module; And in SIM card or Micro-SIM card; Have with this and block unique corresponding ICCID sign indicating number; Even the SIM card or the Micro-SIM card of corresponding duplicate numbers are then arranged, remain unique as the ICCID sign indicating number of its sign, thereby guarantee its security.
According to another aspect of the invention, also proposed a kind of terminal, having comprised: module has been set, receives the Permission Levels that are respectively the data in the said terminal and insert the Subscriber Identity Module setting at said terminal; Acquisition module obtains the Permission Levels of the Subscriber Identity Module that inserts in the said terminal; Processing module, according to the result that obtains of said acquisition module, with the Permission Levels of said Subscriber Identity Module as the current Permission Levels in said terminal.In this technical scheme; The access rights rank can be set for the data in the terminal; Such as being divided into one-level, secondary and three grades; Like this; For the Subscriber Identity Module that has the one-level authority, the user just can visit whole data, and for the Subscriber Identity Module that has the secondary authority; The user then cannot visit the data of one-level authority, only to visit the data of secondary and three grades of authorities.Be provided with and corresponding to the authority of data through authority, and do not adopt modes such as existing input password, thereby can improve security, and needn't write down password, make the data access process more convenient, more effective Subscriber Identity Module.
In technique scheme, preferably, also comprise: memory module, the Permission Levels of said Subscriber Identity Module and the sign of said Subscriber Identity Module are carried out association store.In this technical scheme, for the Subscriber Identity Module that is provided with Permission Levels, the Permission Levels that are provided with can be stored, then when the terminal is restarted or inserted Subscriber Identity Module again after, can reset again and directly obtain the Permission Levels of correspondence.
In technique scheme, preferably, also comprise: detection module, detect the sign of the Subscriber Identity Module that inserts in the said terminal; And enquiry module, according to the detected said sign of said detection module, confirm in said memory module, whether to store the Permission Levels that promising said Subscriber Identity Module is provided with, if do not have, then be retrieved as the Permission Levels that said Subscriber Identity Module is provided with.In this technical scheme; Through the Subscriber Identity Module that is provided with Permission Levels being carried out the storage of Permission Levels; Then after changing Subscriber Identity Module; The terminal can be distinguished in the very first time; And after confirming as new Subscriber Identity Module; Allow the user be provided with, and carry out stored record the result is set.
In technique scheme, preferably, the said module that is provided with also comprises: authority is provided with submodule, and said authority is provided with submodule and is received as the authority that said terminal is provided with condition is set; And said detection module also comprises: the condition detection sub-module; Said condition detection sub-module detects said terminal and whether satisfies said authority condition is set; If; Then allow to be provided with the Permission Levels of said Subscriber Identity Module, otherwise said the Permission Levels that the said Subscriber Identity Module of module is set to preset are set.In this technical scheme; If want Subscriber Identity Module is carried out the Permission Levels setting; At first should satisfy authority condition is set; The authority here is provided with password that condition can set up on their own for preset password, password or user in the terminal, password, fingerprint, electronic signature etc.; Thereby guarantee terminal loss or when being used, can't obtain higher Permission Levels by other users.Here Yu She Permission Levels can be the Permission Levels that terminal acquiescence or user set, and can be set to multiple rank; Such as being set at minimum rank; Make other users after inserting other Subscriber Identity Modules, can't obtain data or rank higher data, improve security.
In technique scheme, preferably, also comprise: select module, in said terminal, be inserted under the situation of many Subscriber Identity Modules, select in said many Subscriber Identity Modules one as main card; And said processing module also comprises: the authority processing sub, said authority processing sub is with the Permission Levels of the said main card current Permission Levels as said terminal.In this technical scheme; For the terminal that has many Subscriber Identity Modules; The user can select one as main card in many Subscriber Identity Modules; And main card can be selected between many Subscriber Identity Modules and switch arbitrarily; Then the terminal need be when the user have selected main card or has switched main card; Permission Levels to current main card judge, and as current Permission Levels.
In technique scheme, preferably, said terminal comprises: mobile phone, panel computer; Said Subscriber Identity Module comprises: SIM card, Micro-SIM card; The sign of said Subscriber Identity Module comprises: the ICCID sign indicating number; Said authority is provided with condition and comprises: input password password, electronic signature and/or finger print information.In this technical scheme; In terminals such as mobile phone or panel computer such as IPAD; Can use SIM card or Micro-SIM card as Subscriber Identity Module; And in SIM card or Micro-SIM card; Have with this and block unique corresponding ICCID sign indicating number; Even the SIM card or the Micro-SIM card of corresponding duplicate numbers are then arranged, remain unique as the ICCID sign indicating number of its sign, thereby guarantee its security.
Through above technical scheme, the difference of the Subscriber Identity Module that can use according to the user makes terminal operating under the data access authority of correspondence, is convenient to protection and management to terminal data.
Description of drawings
Fig. 1 shows the process flow diagram of data capture method according to an embodiment of the invention;
Fig. 2 shows the block diagram at terminal according to an embodiment of the invention;
Fig. 3 shows the particular flow sheet that obtains data according to an embodiment of the invention.
Embodiment
In order more to be expressly understood above-mentioned purpose of the present invention, feature and advantage, the present invention is further described in detail below in conjunction with accompanying drawing and embodiment.
Set forth a lot of details in the following description so that make much of the present invention, still, the present invention can also adopt other to be different from other modes described here and implement, and therefore, the present invention is not limited to the restriction of following disclosed specific embodiment.
Fig. 1 shows the process flow diagram of data capture method according to an embodiment of the invention.
As shown in Figure 1, data capture method according to an embodiment of the invention comprises: step 102, and the Subscriber Identity Module that is respectively the data in the terminal and inserts the terminal is provided with Permission Levels; Step 104 is obtained in the terminal data corresponding to Permission Levels according to the Permission Levels of Subscriber Identity Module.In this technical scheme; The access rights rank can be set for the data in the terminal; Such as being divided into one-level, secondary and three grades; Like this; For the Subscriber Identity Module that has the one-level authority, the user just can visit whole data, and for the Subscriber Identity Module that has the secondary authority; The user then cannot visit the data of one-level authority, only to visit the data of secondary and three grades of authorities.Be provided with and corresponding to the authority of data through authority, and do not adopt modes such as existing input password, thereby can improve security, and needn't write down password, make the data access process more convenient, more effective Subscriber Identity Module.
In technique scheme, step 102 also comprises: the Permission Levels of Subscriber Identity Module and the sign of Subscriber Identity Module are carried out association store.In this technical scheme, for the Subscriber Identity Module that is provided with Permission Levels, the Permission Levels that are provided with can be stored, then when the terminal is restarted or inserted Subscriber Identity Module again after, can reset again and directly obtain the Permission Levels of correspondence.
In technique scheme, step 102 also comprises: the terminal obtains the sign of the Subscriber Identity Module of insertion, confirms in the terminal, whether to store the Permission Levels that promising Subscriber Identity Module is provided with, if do not have, the Permission Levels of Subscriber Identity Module are set then according to sign.In this technical scheme; Through the Subscriber Identity Module that is provided with Permission Levels being carried out the storage of Permission Levels; Then after changing Subscriber Identity Module; The terminal can be distinguished in the very first time; And after confirming as new Subscriber Identity Module; Allow the user be provided with, and carry out stored record the result is set.
In technique scheme, also comprise: condition is set for the terminal is provided with authority; Judge whether to satisfy authority condition is set,, then allow to be provided with the Permission Levels of Subscriber Identity Module if satisfy, otherwise the Permission Levels that Subscriber Identity Module is set to preset.In this technical scheme; If want Subscriber Identity Module is carried out the Permission Levels setting; At first should satisfy authority condition is set; The authority here is provided with password that condition can set up on their own for preset password, password or user in the terminal, password, fingerprint, electronic signature etc.; Thereby guarantee terminal loss or when being used, can't obtain higher Permission Levels by other users.Here Yu She Permission Levels can be the Permission Levels that terminal acquiescence or user set, and can be set to multiple rank; Such as being set at minimum rank; Make other users after inserting other Subscriber Identity Modules, can't obtain data or rank higher data, improve security.
In technique scheme, when in the terminal, inserting many Subscriber Identity Modules, in many Subscriber Identity Modules, select one as main card, and with the Permission Levels of main card as current Permission Levels.In this technical scheme; For the terminal that has many Subscriber Identity Modules; The user can select one as main card in many Subscriber Identity Modules; And main card can be selected between many Subscriber Identity Modules and switch arbitrarily; Then the terminal need be when the user have selected main card or has switched main card; Permission Levels to current main card judge, and as current Permission Levels.
In technique scheme, the terminal comprises: mobile phone, panel computer; Subscriber Identity Module comprises: SIM card, Micro-SIM card; The sign of Subscriber Identity Module comprises: the ICCID sign indicating number; Authority is provided with condition and comprises: input password password, electronic signature and/or finger print information.In this technical scheme; In terminals such as mobile phone or panel computer such as IPAD; Can use SIM card or Micro-SIM card as Subscriber Identity Module; And in SIM card or Micro-SIM card; Have with this and block unique corresponding ICCID sign indicating number; Even the SIM card or the Micro-SIM card of corresponding duplicate numbers are then arranged, remain unique as the ICCID sign indicating number of its sign, thereby guarantee its security.
Fig. 2 shows the block diagram at terminal according to an embodiment of the invention.
As shown in Figure 2, the terminal 200 according to an embodiment of the invention, comprising: module 202 is set, receives the Permission Levels that data that are respectively in the terminal 200 and the Subscriber Identity Module that inserts terminal 200 are provided with; Acquisition module 204 obtains in the terminal 200 Permission Levels of the Subscriber Identity Module that inserts; Processing module 206, according to the result that obtains of acquisition module 204, with the Permission Levels of Subscriber Identity Module as the current Permission Levels in terminal 200; Memory module 208 is carried out association store with the Permission Levels of Subscriber Identity Module and the sign of Subscriber Identity Module; Detection module 210, the sign of the Subscriber Identity Module that inserts in the sense terminals 200; Enquiry module 212 according to detection module 210 detected signs, confirms in memory module 208, whether to store the Permission Levels that promising Subscriber Identity Module is provided with, if do not have, then is retrieved as the Permission Levels that Subscriber Identity Module is provided with; Select module 214, in terminal 200, be inserted under the situation of many Subscriber Identity Modules, select in many Subscriber Identity Modules one as main card.In this technical scheme; The access rights rank can be set for the data in the terminal 200; Such as being divided into one-level, secondary and three grades; Like this; For the Subscriber Identity Module that has the one-level authority, the user just can visit whole data, and for the Subscriber Identity Module that has the secondary authority; The user then cannot visit the data of one-level authority, only to visit the data of secondary and three grades of authorities.Be provided with and corresponding to the authority of data through authority, and do not adopt modes such as existing input password, thereby can improve security, and needn't write down password, make the data access process more convenient, more effective Subscriber Identity Module.
In technique scheme; For the Subscriber Identity Module that is provided with Permission Levels; The Permission Levels that are provided with can be stored, then when terminal 200 is restarted or inserted Subscriber Identity Module again after, can reset again and directly obtain the Permission Levels of correspondence.
In technique scheme; Through the Subscriber Identity Module that is provided with Permission Levels being carried out the storage of Permission Levels; Then after changing Subscriber Identity Module; Terminal 200 can be distinguished in the very first time; And after confirming as new Subscriber Identity Module; Allow the user be provided with, and carry out stored record the result is set.
In technique scheme, module 202 is set also comprises: authority is provided with submodule, and said authority is provided with submodule and is received as the authority that terminal 200 is provided with condition is set; And detection module 210 also comprises: the condition detection sub-module; Whether said condition detection sub-module satisfies authority through sense terminals 200 is provided with condition; If then allow to be provided with the Permission Levels of Subscriber Identity Module, otherwise the Permission Levels that module 202 Subscriber Identity Modules are set to preset be set.In this technical scheme; If want Subscriber Identity Module is carried out the Permission Levels setting; At first should satisfy authority condition is set; The authority here is provided with password that condition can set up on their own for preset password, password or user in the terminal 200, password, fingerprint, electronic signature etc.; Thereby guarantee that terminal 200 is lost or when being used, can't obtain higher Permission Levels by other users.Here Yu She Permission Levels can be the Permission Levels that terminal 200 acquiescences or user set, and can be set to multiple rank; Such as being set at minimum rank; Make other users after inserting other Subscriber Identity Modules, can't obtain data or rank higher data, improve security.
In technique scheme, processing module 206 also comprises: the authority processing sub, said authority processing sub is with the Permission Levels of the main card current Permission Levels as terminal 200.In this technical scheme; For the terminal 200 that has many Subscriber Identity Modules; The user can select one as main card in many Subscriber Identity Modules; And main card can be selected between many Subscriber Identity Modules and switch arbitrarily; Then terminal 200 need be when the user have selected main card or has switched main card; Permission Levels to current main card judge, and as current Permission Levels.
In technique scheme, terminal 200 comprises: mobile phone, panel computer; Subscriber Identity Module comprises: SIM card, Micro-SIM card; The sign of Subscriber Identity Module comprises: the ICCID sign indicating number; Authority is provided with condition and comprises: input password password, electronic signature and/or finger print information.In this technical scheme; In terminals such as mobile phone or panel computer such as IPAD 200; Can use SIM card or Micro-SIM card as Subscriber Identity Module; And in SIM card or Micro-SIM card; Have with this and block unique corresponding ICCID sign indicating number; Even the SIM card or the Micro-SIM card of corresponding duplicate numbers are then arranged, remain unique as the ICCID sign indicating number of its sign, thereby guarantee its security.
Fig. 3 shows the particular flow sheet that obtains data according to an embodiment of the invention.
As shown in Figure 3, be the embodiment that technique scheme is applied to mobile phone terminal, wherein, Subscriber Identity Module is a SIM card, concrete steps are following:
When judging; In advance if there was other SIM card; Then the authority of these SIM all is stored in the mobile phone; Only need the corresponding authority that whether in mobile phone, stores of this present SIM card be got final product; Wherein, When the storage authority, can set up an authority list in mobile phone inside, as shown in table 1:
The ICCID sign indicating number | Permission Levels |
89860048010759885412 | Forbidding |
89860048010759885518 | Privacy |
89860148010759885518 | General |
Table 1
Corresponding to the ICCID sign indicating number is 89860048010759885412 SIM card, and its authority is forbidding, at this moment, and the total data of user on can't access terminal; Corresponding to the ICCID sign indicating number is 89860048010759885518 SIM card, and its authority is a privacy, and at this moment, the Permission Levels that the user can visit on the mobile phone are the data of " privacy " and " general "; Corresponding to the ICCID sign indicating number is 89860148010759885518 SIM card, and its authority is general, and at this moment, the Permission Levels that the user is merely able to visit on the mobile phone are the data of " general ", then can't visit for other data.
More than be described with reference to the accompanying drawings technical scheme of the present invention, considered that the user hopes the data access in terminal such as the mobile phone is carried out control of authority sometimes, the data that different people can be visited are different, reach the purpose of privacy and safeguard protection.Therefore, the invention provides a kind of data capture method and a kind of terminal, the difference of the Subscriber Identity Module that can use according to the user makes terminal operating under the data access authority of correspondence, is convenient to protection and management to terminal data.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. a data capture method is characterized in that, comprising:
Step 102, the Subscriber Identity Module that is respectively the data in the terminal and inserts said terminal is provided with Permission Levels;
Step 104 is obtained in the said terminal data corresponding to said Permission Levels according to the Permission Levels of said Subscriber Identity Module.
2. data capture method according to claim 1 is characterized in that, said step 102 also comprises:
The Permission Levels of said Subscriber Identity Module and the sign of said Subscriber Identity Module are carried out association store.
3. data capture method according to claim 1 and 2 is characterized in that, said step 102 also comprises:
Said terminal obtains the sign of the Subscriber Identity Module of insertion, confirms in said terminal, whether to store the Permission Levels that promising said Subscriber Identity Module is provided with, if do not have, the Permission Levels of said Subscriber Identity Module are set then according to said sign.
4. data capture method according to claim 1 and 2 is characterized in that, also comprises:
For said terminal is provided with authority condition is set;
Judge whether to satisfy said authority condition is set,, then allow to be provided with the Permission Levels of said Subscriber Identity Module if satisfy, otherwise the Permission Levels that said Subscriber Identity Module is set to preset.
5. data capture method according to claim 4 is characterized in that, also comprises:
When in said terminal, inserting many Subscriber Identity Modules, in said many Subscriber Identity Modules, select one as main card, and with the Permission Levels of said main card as current Permission Levels.
6. a terminal is characterized in that, comprising:
Module is set, receives the Permission Levels that are respectively the data in the said terminal and insert the Subscriber Identity Module setting at said terminal;
Acquisition module obtains the Permission Levels of the Subscriber Identity Module that inserts in the said terminal;
Processing module, according to the result that obtains of said acquisition module, with the Permission Levels of said Subscriber Identity Module as the current Permission Levels in said terminal.
7. terminal according to claim 6 is characterized in that, also comprises:
Memory module is carried out association store with the Permission Levels of said Subscriber Identity Module and the sign of said Subscriber Identity Module.
8. terminal according to claim 7 is characterized in that, also comprises:
Detection module detects the sign of the Subscriber Identity Module that inserts in the said terminal; And
Enquiry module according to the detected said sign of said detection module, confirms in said memory module, whether to store the Permission Levels that promising said Subscriber Identity Module is provided with, if do not have, then is retrieved as the Permission Levels that said Subscriber Identity Module is provided with.
9. according to each described terminal in the claim 6 to 8, it is characterized in that the said module that is provided with also comprises: authority is provided with submodule, said authority is provided with submodule and is received as the authority that said terminal is provided with condition is set; And
Said detection module also comprises: the condition detection sub-module; Whether said condition detection sub-module satisfies said authority condition is set through detecting said terminal; If; Then allow to be provided with the Permission Levels of said Subscriber Identity Module, otherwise said the Permission Levels that the said Subscriber Identity Module of module is set to preset are set.
10. terminal according to claim 9 is characterized in that, also comprises:
Select module, in said terminal, be inserted under the situation of many Subscriber Identity Modules, select in said many Subscriber Identity Modules one as main card; And
Said processing module also comprises: the authority processing sub, said authority processing sub is with the Permission Levels of the said main card current Permission Levels as said terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011102894749A CN102354353A (en) | 2011-09-27 | 2011-09-27 | Method for acquiring data and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011102894749A CN102354353A (en) | 2011-09-27 | 2011-09-27 | Method for acquiring data and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102354353A true CN102354353A (en) | 2012-02-15 |
Family
ID=45577915
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011102894749A Pending CN102354353A (en) | 2011-09-27 | 2011-09-27 | Method for acquiring data and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102354353A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103310137A (en) * | 2012-03-16 | 2013-09-18 | 宇龙计算机通信科技(深圳)有限公司 | Method for safely accessing terminal and terminal |
CN103428370A (en) * | 2013-08-23 | 2013-12-04 | 上海华勤通讯技术有限公司 | Mobile phone and multi-user control method thereof |
CN104363352A (en) * | 2014-11-28 | 2015-02-18 | 东莞宇龙通信科技有限公司 | System determining method, system determining device and terminal |
CN105657147A (en) * | 2015-05-29 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal anti-theft method and device |
CN105873054A (en) * | 2016-04-01 | 2016-08-17 | 宇龙计算机通信科技(深圳)有限公司 | Communication management method and system and multi-card mobile terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1984402A (en) * | 2006-04-06 | 2007-06-20 | 华为技术有限公司 | Method and device for managing multi-users of mobile terminal |
CN101227683A (en) * | 2008-01-28 | 2008-07-23 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal, system and method for securing data information |
CN101287193A (en) * | 2007-04-09 | 2008-10-15 | 中兴通讯股份有限公司 | Method of protecting information stored on mobile phone when using correlated user identification card |
-
2011
- 2011-09-27 CN CN2011102894749A patent/CN102354353A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1984402A (en) * | 2006-04-06 | 2007-06-20 | 华为技术有限公司 | Method and device for managing multi-users of mobile terminal |
CN101287193A (en) * | 2007-04-09 | 2008-10-15 | 中兴通讯股份有限公司 | Method of protecting information stored on mobile phone when using correlated user identification card |
CN101227683A (en) * | 2008-01-28 | 2008-07-23 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal, system and method for securing data information |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103310137A (en) * | 2012-03-16 | 2013-09-18 | 宇龙计算机通信科技(深圳)有限公司 | Method for safely accessing terminal and terminal |
CN103310137B (en) * | 2012-03-16 | 2016-09-21 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method and device having secure access to terminal |
CN103428370A (en) * | 2013-08-23 | 2013-12-04 | 上海华勤通讯技术有限公司 | Mobile phone and multi-user control method thereof |
CN104363352A (en) * | 2014-11-28 | 2015-02-18 | 东莞宇龙通信科技有限公司 | System determining method, system determining device and terminal |
CN105657147A (en) * | 2015-05-29 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal anti-theft method and device |
CN105657147B (en) * | 2015-05-29 | 2019-10-11 | 宇龙计算机通信科技(深圳)有限公司 | A kind of anti-theft method for mobile terminal and device |
CN105873054A (en) * | 2016-04-01 | 2016-08-17 | 宇龙计算机通信科技(深圳)有限公司 | Communication management method and system and multi-card mobile terminal |
CN105873054B (en) * | 2016-04-01 | 2019-06-11 | 宇龙计算机通信科技(深圳)有限公司 | A kind of communication management method, system and multi-card mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10467832B2 (en) | Configurable digital badge holder | |
US11394555B2 (en) | Mobile terminal privacy protection method and protection apparatus, and mobile terminal | |
EP2905715B1 (en) | Method, system and terminal for encrypting/decrypting application program on communication terminal | |
CN104717223B (en) | Data access method and device | |
CN105550591A (en) | Security protection device and method for user data in mobile terminal | |
CN102291717B (en) | Data protection method and terminal | |
CN105590201A (en) | Mobile payment device and mobile payment system | |
CN103366107A (en) | Method, device and mobile phone for protecting access permission of application program | |
CN102354353A (en) | Method for acquiring data and terminal | |
CN102867157A (en) | Mobile terminal and data protecting method | |
WO2014180345A1 (en) | User identity verification and authorization system | |
CN102063431B (en) | Information database system and method for controlling systematic access of information database | |
US9542547B2 (en) | Identification to access portable computing device | |
CN110691352B (en) | SIM card access control method, device, medium and equipment | |
CN111159685A (en) | User account management method and device, intelligent device and storage medium | |
CN105516500A (en) | Method and system for selecting device mode | |
CN100569015C (en) | A kind of portable terminal using method and mobile terminal system | |
CN105827653A (en) | Application security management method and system | |
US9473936B2 (en) | Method and device for protecting privacy information | |
CN105590044A (en) | Information authentication method and apparatus | |
CN105007267A (en) | Privacy protection method and device | |
KR101603988B1 (en) | System for context-aware service | |
CN110766840A (en) | Access control password setting method and device | |
CN103052060A (en) | Method for improving information security of mobile terminal and mobile terminal | |
US10289948B2 (en) | Maintenance system, and computer readable recording medium storing a maintenance program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20120215 |