CN102354353A - Method for acquiring data and terminal - Google Patents

Method for acquiring data and terminal Download PDF

Info

Publication number
CN102354353A
CN102354353A CN2011102894749A CN201110289474A CN102354353A CN 102354353 A CN102354353 A CN 102354353A CN 2011102894749 A CN2011102894749 A CN 2011102894749A CN 201110289474 A CN201110289474 A CN 201110289474A CN 102354353 A CN102354353 A CN 102354353A
Authority
CN
China
Prior art keywords
subscriber identity
terminal
permission levels
module
identity module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011102894749A
Other languages
Chinese (zh)
Inventor
马怡伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN2011102894749A priority Critical patent/CN102354353A/en
Publication of CN102354353A publication Critical patent/CN102354353A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The invention provides a method for acquiring data, comprising the steps of: step 102: setting privilege levels for data in a terminal and a user identification card inserted into the terminal respectively; and step 104: obtaining data which correspond to the privilege level according to the privilege level of the user identification card. Correspondingly, the invention further provides the terminal. Due to the adoption of the technical scheme provided by the invention, the terminal can be operated under a corresponding data access right according to the different user identification cards used by a user, so that the terminal data can be conveniently protected and managed.

Description

Data capture method and terminal
Technical field
The present invention relates to the data protection technology, in particular to a kind of data capture method and a kind of terminal.
Background technology
The user hopes the data access in terminal such as the mobile phone is carried out control of authority sometimes, and the data that different people can be visited are different, reaches the purpose of privacy and safeguard protection.For above-mentioned purpose; The user normally realizes the control of authority to various data accesses through the way of cryptoguard; For example want the access contacts data need input password 1, carrying out the information data visit needs password 2, carries out picture or the file data visit needs password 3.But utilize password to carry out the control of data access authority, have following some disadvantageous place: 1. many kinds of authorities need a plurality of passwords to manage, and the memory of a plurality of passwords is more loaded down with trivial details; 2. during cipher control, each action need input password, operation inconvenience; 3. cell phone password is simpler usually, and conjecture password if other people guess easily, and then safety does not exist; 4. during with other people sharing information, password is unfavorable for the management of privacy.
Therefore, need a kind of new authority that technology is set, the difference of the Subscriber Identity Module that can use according to the user makes terminal operating under the data access authority of correspondence, is convenient to protection and management to terminal data.
Summary of the invention
The present invention just is being based on the problems referred to above, has proposed a kind of new authority technology is set, and the difference of the Subscriber Identity Module that can use according to the user makes terminal operating under the data access authority of correspondence, is convenient to protection and management to terminal data.
In view of this, the present invention proposes a kind of data capture method, comprising: step 102, the Subscriber Identity Module that is respectively the data in the terminal and inserts said terminal is provided with Permission Levels; Step 104 is obtained in the said terminal data corresponding to said Permission Levels according to the Permission Levels of said Subscriber Identity Module.In this technical scheme; The access rights rank can be set for the data in the terminal; Such as being divided into one-level, secondary and three grades; Like this; For the Subscriber Identity Module that has the one-level authority, the user just can visit whole data, and for the Subscriber Identity Module that has the secondary authority; The user then cannot visit the data of one-level authority, only to visit the data of secondary and three grades of authorities.Be provided with and corresponding to the authority of data through authority, and do not adopt modes such as existing input password, thereby can improve security, and needn't write down password, make the data access process more convenient, more effective Subscriber Identity Module.
In technique scheme, preferably, said step 102 also comprises: the Permission Levels of said Subscriber Identity Module and the sign of said Subscriber Identity Module are carried out association store.In this technical scheme, for the Subscriber Identity Module that is provided with Permission Levels, the Permission Levels that are provided with can be stored, then when the terminal is restarted or inserted Subscriber Identity Module again after, can reset again and directly obtain the Permission Levels of correspondence.
In technique scheme; Preferably; Said step 102 also comprises: said terminal obtains the sign of the Subscriber Identity Module of insertion; Confirm in said terminal, whether to store the Permission Levels that promising said Subscriber Identity Module is provided with according to said sign; If the Permission Levels of said Subscriber Identity Module no, then are set.In this technical scheme; Through the Subscriber Identity Module that is provided with Permission Levels being carried out the storage of Permission Levels; Then after changing Subscriber Identity Module; The terminal can be distinguished in the very first time; And after confirming as new Subscriber Identity Module; Allow the user be provided with, and carry out stored record the result is set.
In technique scheme, preferably, also comprise: condition is set for said terminal is provided with authority; Judge whether to satisfy said authority condition is set,, then allow to be provided with the Permission Levels of said Subscriber Identity Module if satisfy, otherwise the Permission Levels that said Subscriber Identity Module is set to preset.In this technical scheme; If want Subscriber Identity Module is carried out the Permission Levels setting; At first should satisfy authority condition is set; The authority here is provided with password that condition can set up on their own for preset password, password or user in the terminal, password, fingerprint, electronic signature etc.; Thereby guarantee terminal loss or when being used, can't obtain higher Permission Levels by other users.Here Yu She Permission Levels can be the Permission Levels that terminal acquiescence or user set, and can be set to multiple rank; Such as being set at minimum rank; Make other users after inserting other Subscriber Identity Modules, can't obtain data or rank higher data, improve security.
In technique scheme, preferably, when in said terminal, inserting many Subscriber Identity Modules, in said many Subscriber Identity Modules, select one as main card, and with the Permission Levels of said main card as current Permission Levels.In this technical scheme; For the terminal that has many Subscriber Identity Modules; The user can select one as main card in many Subscriber Identity Modules; And main card can be selected between many Subscriber Identity Modules and switch arbitrarily; Then the terminal need be when the user have selected main card or has switched main card; Permission Levels to current main card judge, and as current Permission Levels.
In technique scheme, preferably, said terminal comprises: mobile phone, panel computer; Said Subscriber Identity Module comprises: SIM card, Micro-SIM card; The sign of said Subscriber Identity Module comprises: the ICCID sign indicating number; Said authority is provided with condition and comprises: input password password, electronic signature and/or finger print information.In this technical scheme; In terminals such as mobile phone or panel computer such as IPAD; Can use SIM card or Micro-SIM card as Subscriber Identity Module; And in SIM card or Micro-SIM card; Have with this and block unique corresponding ICCID sign indicating number; Even the SIM card or the Micro-SIM card of corresponding duplicate numbers are then arranged, remain unique as the ICCID sign indicating number of its sign, thereby guarantee its security.
According to another aspect of the invention, also proposed a kind of terminal, having comprised: module has been set, receives the Permission Levels that are respectively the data in the said terminal and insert the Subscriber Identity Module setting at said terminal; Acquisition module obtains the Permission Levels of the Subscriber Identity Module that inserts in the said terminal; Processing module, according to the result that obtains of said acquisition module, with the Permission Levels of said Subscriber Identity Module as the current Permission Levels in said terminal.In this technical scheme; The access rights rank can be set for the data in the terminal; Such as being divided into one-level, secondary and three grades; Like this; For the Subscriber Identity Module that has the one-level authority, the user just can visit whole data, and for the Subscriber Identity Module that has the secondary authority; The user then cannot visit the data of one-level authority, only to visit the data of secondary and three grades of authorities.Be provided with and corresponding to the authority of data through authority, and do not adopt modes such as existing input password, thereby can improve security, and needn't write down password, make the data access process more convenient, more effective Subscriber Identity Module.
In technique scheme, preferably, also comprise: memory module, the Permission Levels of said Subscriber Identity Module and the sign of said Subscriber Identity Module are carried out association store.In this technical scheme, for the Subscriber Identity Module that is provided with Permission Levels, the Permission Levels that are provided with can be stored, then when the terminal is restarted or inserted Subscriber Identity Module again after, can reset again and directly obtain the Permission Levels of correspondence.
In technique scheme, preferably, also comprise: detection module, detect the sign of the Subscriber Identity Module that inserts in the said terminal; And enquiry module, according to the detected said sign of said detection module, confirm in said memory module, whether to store the Permission Levels that promising said Subscriber Identity Module is provided with, if do not have, then be retrieved as the Permission Levels that said Subscriber Identity Module is provided with.In this technical scheme; Through the Subscriber Identity Module that is provided with Permission Levels being carried out the storage of Permission Levels; Then after changing Subscriber Identity Module; The terminal can be distinguished in the very first time; And after confirming as new Subscriber Identity Module; Allow the user be provided with, and carry out stored record the result is set.
In technique scheme, preferably, the said module that is provided with also comprises: authority is provided with submodule, and said authority is provided with submodule and is received as the authority that said terminal is provided with condition is set; And said detection module also comprises: the condition detection sub-module; Said condition detection sub-module detects said terminal and whether satisfies said authority condition is set; If; Then allow to be provided with the Permission Levels of said Subscriber Identity Module, otherwise said the Permission Levels that the said Subscriber Identity Module of module is set to preset are set.In this technical scheme; If want Subscriber Identity Module is carried out the Permission Levels setting; At first should satisfy authority condition is set; The authority here is provided with password that condition can set up on their own for preset password, password or user in the terminal, password, fingerprint, electronic signature etc.; Thereby guarantee terminal loss or when being used, can't obtain higher Permission Levels by other users.Here Yu She Permission Levels can be the Permission Levels that terminal acquiescence or user set, and can be set to multiple rank; Such as being set at minimum rank; Make other users after inserting other Subscriber Identity Modules, can't obtain data or rank higher data, improve security.
In technique scheme, preferably, also comprise: select module, in said terminal, be inserted under the situation of many Subscriber Identity Modules, select in said many Subscriber Identity Modules one as main card; And said processing module also comprises: the authority processing sub, said authority processing sub is with the Permission Levels of the said main card current Permission Levels as said terminal.In this technical scheme; For the terminal that has many Subscriber Identity Modules; The user can select one as main card in many Subscriber Identity Modules; And main card can be selected between many Subscriber Identity Modules and switch arbitrarily; Then the terminal need be when the user have selected main card or has switched main card; Permission Levels to current main card judge, and as current Permission Levels.
In technique scheme, preferably, said terminal comprises: mobile phone, panel computer; Said Subscriber Identity Module comprises: SIM card, Micro-SIM card; The sign of said Subscriber Identity Module comprises: the ICCID sign indicating number; Said authority is provided with condition and comprises: input password password, electronic signature and/or finger print information.In this technical scheme; In terminals such as mobile phone or panel computer such as IPAD; Can use SIM card or Micro-SIM card as Subscriber Identity Module; And in SIM card or Micro-SIM card; Have with this and block unique corresponding ICCID sign indicating number; Even the SIM card or the Micro-SIM card of corresponding duplicate numbers are then arranged, remain unique as the ICCID sign indicating number of its sign, thereby guarantee its security.
Through above technical scheme, the difference of the Subscriber Identity Module that can use according to the user makes terminal operating under the data access authority of correspondence, is convenient to protection and management to terminal data.
Description of drawings
Fig. 1 shows the process flow diagram of data capture method according to an embodiment of the invention;
Fig. 2 shows the block diagram at terminal according to an embodiment of the invention;
Fig. 3 shows the particular flow sheet that obtains data according to an embodiment of the invention.
Embodiment
In order more to be expressly understood above-mentioned purpose of the present invention, feature and advantage, the present invention is further described in detail below in conjunction with accompanying drawing and embodiment.
Set forth a lot of details in the following description so that make much of the present invention, still, the present invention can also adopt other to be different from other modes described here and implement, and therefore, the present invention is not limited to the restriction of following disclosed specific embodiment.
Fig. 1 shows the process flow diagram of data capture method according to an embodiment of the invention.
As shown in Figure 1, data capture method according to an embodiment of the invention comprises: step 102, and the Subscriber Identity Module that is respectively the data in the terminal and inserts the terminal is provided with Permission Levels; Step 104 is obtained in the terminal data corresponding to Permission Levels according to the Permission Levels of Subscriber Identity Module.In this technical scheme; The access rights rank can be set for the data in the terminal; Such as being divided into one-level, secondary and three grades; Like this; For the Subscriber Identity Module that has the one-level authority, the user just can visit whole data, and for the Subscriber Identity Module that has the secondary authority; The user then cannot visit the data of one-level authority, only to visit the data of secondary and three grades of authorities.Be provided with and corresponding to the authority of data through authority, and do not adopt modes such as existing input password, thereby can improve security, and needn't write down password, make the data access process more convenient, more effective Subscriber Identity Module.
In technique scheme, step 102 also comprises: the Permission Levels of Subscriber Identity Module and the sign of Subscriber Identity Module are carried out association store.In this technical scheme, for the Subscriber Identity Module that is provided with Permission Levels, the Permission Levels that are provided with can be stored, then when the terminal is restarted or inserted Subscriber Identity Module again after, can reset again and directly obtain the Permission Levels of correspondence.
In technique scheme, step 102 also comprises: the terminal obtains the sign of the Subscriber Identity Module of insertion, confirms in the terminal, whether to store the Permission Levels that promising Subscriber Identity Module is provided with, if do not have, the Permission Levels of Subscriber Identity Module are set then according to sign.In this technical scheme; Through the Subscriber Identity Module that is provided with Permission Levels being carried out the storage of Permission Levels; Then after changing Subscriber Identity Module; The terminal can be distinguished in the very first time; And after confirming as new Subscriber Identity Module; Allow the user be provided with, and carry out stored record the result is set.
In technique scheme, also comprise: condition is set for the terminal is provided with authority; Judge whether to satisfy authority condition is set,, then allow to be provided with the Permission Levels of Subscriber Identity Module if satisfy, otherwise the Permission Levels that Subscriber Identity Module is set to preset.In this technical scheme; If want Subscriber Identity Module is carried out the Permission Levels setting; At first should satisfy authority condition is set; The authority here is provided with password that condition can set up on their own for preset password, password or user in the terminal, password, fingerprint, electronic signature etc.; Thereby guarantee terminal loss or when being used, can't obtain higher Permission Levels by other users.Here Yu She Permission Levels can be the Permission Levels that terminal acquiescence or user set, and can be set to multiple rank; Such as being set at minimum rank; Make other users after inserting other Subscriber Identity Modules, can't obtain data or rank higher data, improve security.
In technique scheme, when in the terminal, inserting many Subscriber Identity Modules, in many Subscriber Identity Modules, select one as main card, and with the Permission Levels of main card as current Permission Levels.In this technical scheme; For the terminal that has many Subscriber Identity Modules; The user can select one as main card in many Subscriber Identity Modules; And main card can be selected between many Subscriber Identity Modules and switch arbitrarily; Then the terminal need be when the user have selected main card or has switched main card; Permission Levels to current main card judge, and as current Permission Levels.
In technique scheme, the terminal comprises: mobile phone, panel computer; Subscriber Identity Module comprises: SIM card, Micro-SIM card; The sign of Subscriber Identity Module comprises: the ICCID sign indicating number; Authority is provided with condition and comprises: input password password, electronic signature and/or finger print information.In this technical scheme; In terminals such as mobile phone or panel computer such as IPAD; Can use SIM card or Micro-SIM card as Subscriber Identity Module; And in SIM card or Micro-SIM card; Have with this and block unique corresponding ICCID sign indicating number; Even the SIM card or the Micro-SIM card of corresponding duplicate numbers are then arranged, remain unique as the ICCID sign indicating number of its sign, thereby guarantee its security.
Fig. 2 shows the block diagram at terminal according to an embodiment of the invention.
As shown in Figure 2, the terminal 200 according to an embodiment of the invention, comprising: module 202 is set, receives the Permission Levels that data that are respectively in the terminal 200 and the Subscriber Identity Module that inserts terminal 200 are provided with; Acquisition module 204 obtains in the terminal 200 Permission Levels of the Subscriber Identity Module that inserts; Processing module 206, according to the result that obtains of acquisition module 204, with the Permission Levels of Subscriber Identity Module as the current Permission Levels in terminal 200; Memory module 208 is carried out association store with the Permission Levels of Subscriber Identity Module and the sign of Subscriber Identity Module; Detection module 210, the sign of the Subscriber Identity Module that inserts in the sense terminals 200; Enquiry module 212 according to detection module 210 detected signs, confirms in memory module 208, whether to store the Permission Levels that promising Subscriber Identity Module is provided with, if do not have, then is retrieved as the Permission Levels that Subscriber Identity Module is provided with; Select module 214, in terminal 200, be inserted under the situation of many Subscriber Identity Modules, select in many Subscriber Identity Modules one as main card.In this technical scheme; The access rights rank can be set for the data in the terminal 200; Such as being divided into one-level, secondary and three grades; Like this; For the Subscriber Identity Module that has the one-level authority, the user just can visit whole data, and for the Subscriber Identity Module that has the secondary authority; The user then cannot visit the data of one-level authority, only to visit the data of secondary and three grades of authorities.Be provided with and corresponding to the authority of data through authority, and do not adopt modes such as existing input password, thereby can improve security, and needn't write down password, make the data access process more convenient, more effective Subscriber Identity Module.
In technique scheme; For the Subscriber Identity Module that is provided with Permission Levels; The Permission Levels that are provided with can be stored, then when terminal 200 is restarted or inserted Subscriber Identity Module again after, can reset again and directly obtain the Permission Levels of correspondence.
In technique scheme; Through the Subscriber Identity Module that is provided with Permission Levels being carried out the storage of Permission Levels; Then after changing Subscriber Identity Module; Terminal 200 can be distinguished in the very first time; And after confirming as new Subscriber Identity Module; Allow the user be provided with, and carry out stored record the result is set.
In technique scheme, module 202 is set also comprises: authority is provided with submodule, and said authority is provided with submodule and is received as the authority that terminal 200 is provided with condition is set; And detection module 210 also comprises: the condition detection sub-module; Whether said condition detection sub-module satisfies authority through sense terminals 200 is provided with condition; If then allow to be provided with the Permission Levels of Subscriber Identity Module, otherwise the Permission Levels that module 202 Subscriber Identity Modules are set to preset be set.In this technical scheme; If want Subscriber Identity Module is carried out the Permission Levels setting; At first should satisfy authority condition is set; The authority here is provided with password that condition can set up on their own for preset password, password or user in the terminal 200, password, fingerprint, electronic signature etc.; Thereby guarantee that terminal 200 is lost or when being used, can't obtain higher Permission Levels by other users.Here Yu She Permission Levels can be the Permission Levels that terminal 200 acquiescences or user set, and can be set to multiple rank; Such as being set at minimum rank; Make other users after inserting other Subscriber Identity Modules, can't obtain data or rank higher data, improve security.
In technique scheme, processing module 206 also comprises: the authority processing sub, said authority processing sub is with the Permission Levels of the main card current Permission Levels as terminal 200.In this technical scheme; For the terminal 200 that has many Subscriber Identity Modules; The user can select one as main card in many Subscriber Identity Modules; And main card can be selected between many Subscriber Identity Modules and switch arbitrarily; Then terminal 200 need be when the user have selected main card or has switched main card; Permission Levels to current main card judge, and as current Permission Levels.
In technique scheme, terminal 200 comprises: mobile phone, panel computer; Subscriber Identity Module comprises: SIM card, Micro-SIM card; The sign of Subscriber Identity Module comprises: the ICCID sign indicating number; Authority is provided with condition and comprises: input password password, electronic signature and/or finger print information.In this technical scheme; In terminals such as mobile phone or panel computer such as IPAD 200; Can use SIM card or Micro-SIM card as Subscriber Identity Module; And in SIM card or Micro-SIM card; Have with this and block unique corresponding ICCID sign indicating number; Even the SIM card or the Micro-SIM card of corresponding duplicate numbers are then arranged, remain unique as the ICCID sign indicating number of its sign, thereby guarantee its security.
Fig. 3 shows the particular flow sheet that obtains data according to an embodiment of the invention.
As shown in Figure 3, be the embodiment that technique scheme is applied to mobile phone terminal, wherein, Subscriber Identity Module is a SIM card, concrete steps are following:
Step 302 behind mobile phone power-on, judges whether there is new SIM card in the mobile phone; If exist; Then get into step 304, otherwise get into step 312, " newly " here is meant with respect to SIM card before; That is to say; This mobile phone before do not inserting this SIM card, for the judgement that whether is new SIM card, conveniently obtain for the authority that is not new SIM card; Then carry out authority setting or other operations for new SIM card
When judging; In advance if there was other SIM card; Then the authority of these SIM all is stored in the mobile phone; Only need the corresponding authority that whether in mobile phone, stores of this present SIM card be got final product; Wherein, When the storage authority, can set up an authority list in mobile phone inside, as shown in table 1:
The ICCID sign indicating number Permission Levels
89860048010759885412 Forbidding
89860048010759885518 Privacy
89860148010759885518 General
Table 1
Corresponding to the ICCID sign indicating number is 89860048010759885412 SIM card, and its authority is forbidding, at this moment, and the total data of user on can't access terminal; Corresponding to the ICCID sign indicating number is 89860048010759885518 SIM card, and its authority is a privacy, and at this moment, the Permission Levels that the user can visit on the mobile phone are the data of " privacy " and " general "; Corresponding to the ICCID sign indicating number is 89860148010759885518 SIM card, and its authority is general, and at this moment, the Permission Levels that the user is merely able to visit on the mobile phone are the data of " general ", then can't visit for other data.
Step 304; Begin SIM card is carried out the authority setting by the user; Such as can be according to rank forms such as above-mentioned " forbidding ", " privacy ", " general "; Also can adopt rank forms such as " one-level ", " secondary ", " three grades "; And can be set to any multiple rank according to user's needs.
Step 306; The user SIM card is carried out authority when being provided with; Needing at first by mobile phone whether it to be had the authority of carrying out is provided with to authorize and judges; The authority here is provided with authorizes like forms such as password, password, fingerprint, electronic signatures; Purpose is in order to steal or to use at hand-set from stolen etc. when being used by other users; Avoid other users directly oneself to be set to the rank of high authority, security is provided; The authority here is provided with mandate can be preset for mobile phone; Also can for the user to mobile phone preset mandate make amendment or add after obtain; Also can be provided with by the user in start back for the first time for mobile phone, be in order to protect user's data safety and privacy in a word.
Step 308; Under the situation that the user obtains authorizing; Can carry out the authority setting to SIM; After completion is set; Mobile phone carries out record with the sign of this SIM card such as ICCID sign indicating number etc. and the Permission Levels that are provided with, like this, and when next mobile phone detects this SIM card; Directly mobile phone is set to this Permission Levels, and needn't reset.
Step 310; When the user does not obtain authorizing; Mobile phone is provided with this SIM card automatically for forbidding the level authority and recording in the authority list; Here be meant when the user does not obtain authorizing; Data in this mobile phone need be protected; Prevent that data from being stolen or privacy is exposed, then mobile phone is according to preset rules or former user's the rule that is provided with, and the authority of mobile phone is set to minimum or other authorities.Certainly, also can adopt the other forms of Permission Levels of mentioning in the technique scheme here, and the other forms of storage mode beyond the authority list, the foundation of authority list is not necessary.
Step 312, for the mobile phone that has multiple SIM card, the user need be provided with a SIM card after start be main SIM card or main card, then after the access rights that the mobile phones enquiring main card is corresponding, enters under the pattern of this authority.
Step 314, the user may be switched main SIM card, and when switching, mobile phone returns step 312, inquires about the Permission Levels of new main card once more, is exactly in a word to guarantee that the residing pattern of current phone is under the Permission Levels of current main card.
More than be described with reference to the accompanying drawings technical scheme of the present invention, considered that the user hopes the data access in terminal such as the mobile phone is carried out control of authority sometimes, the data that different people can be visited are different, reach the purpose of privacy and safeguard protection.Therefore, the invention provides a kind of data capture method and a kind of terminal, the difference of the Subscriber Identity Module that can use according to the user makes terminal operating under the data access authority of correspondence, is convenient to protection and management to terminal data.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a data capture method is characterized in that, comprising:
Step 102, the Subscriber Identity Module that is respectively the data in the terminal and inserts said terminal is provided with Permission Levels;
Step 104 is obtained in the said terminal data corresponding to said Permission Levels according to the Permission Levels of said Subscriber Identity Module.
2. data capture method according to claim 1 is characterized in that, said step 102 also comprises:
The Permission Levels of said Subscriber Identity Module and the sign of said Subscriber Identity Module are carried out association store.
3. data capture method according to claim 1 and 2 is characterized in that, said step 102 also comprises:
Said terminal obtains the sign of the Subscriber Identity Module of insertion, confirms in said terminal, whether to store the Permission Levels that promising said Subscriber Identity Module is provided with, if do not have, the Permission Levels of said Subscriber Identity Module are set then according to said sign.
4. data capture method according to claim 1 and 2 is characterized in that, also comprises:
For said terminal is provided with authority condition is set;
Judge whether to satisfy said authority condition is set,, then allow to be provided with the Permission Levels of said Subscriber Identity Module if satisfy, otherwise the Permission Levels that said Subscriber Identity Module is set to preset.
5. data capture method according to claim 4 is characterized in that, also comprises:
When in said terminal, inserting many Subscriber Identity Modules, in said many Subscriber Identity Modules, select one as main card, and with the Permission Levels of said main card as current Permission Levels.
6. a terminal is characterized in that, comprising:
Module is set, receives the Permission Levels that are respectively the data in the said terminal and insert the Subscriber Identity Module setting at said terminal;
Acquisition module obtains the Permission Levels of the Subscriber Identity Module that inserts in the said terminal;
Processing module, according to the result that obtains of said acquisition module, with the Permission Levels of said Subscriber Identity Module as the current Permission Levels in said terminal.
7. terminal according to claim 6 is characterized in that, also comprises:
Memory module is carried out association store with the Permission Levels of said Subscriber Identity Module and the sign of said Subscriber Identity Module.
8. terminal according to claim 7 is characterized in that, also comprises:
Detection module detects the sign of the Subscriber Identity Module that inserts in the said terminal; And
Enquiry module according to the detected said sign of said detection module, confirms in said memory module, whether to store the Permission Levels that promising said Subscriber Identity Module is provided with, if do not have, then is retrieved as the Permission Levels that said Subscriber Identity Module is provided with.
9. according to each described terminal in the claim 6 to 8, it is characterized in that the said module that is provided with also comprises: authority is provided with submodule, said authority is provided with submodule and is received as the authority that said terminal is provided with condition is set; And
Said detection module also comprises: the condition detection sub-module; Whether said condition detection sub-module satisfies said authority condition is set through detecting said terminal; If; Then allow to be provided with the Permission Levels of said Subscriber Identity Module, otherwise said the Permission Levels that the said Subscriber Identity Module of module is set to preset are set.
10. terminal according to claim 9 is characterized in that, also comprises:
Select module, in said terminal, be inserted under the situation of many Subscriber Identity Modules, select in said many Subscriber Identity Modules one as main card; And
Said processing module also comprises: the authority processing sub, said authority processing sub is with the Permission Levels of the said main card current Permission Levels as said terminal.
CN2011102894749A 2011-09-27 2011-09-27 Method for acquiring data and terminal Pending CN102354353A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011102894749A CN102354353A (en) 2011-09-27 2011-09-27 Method for acquiring data and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011102894749A CN102354353A (en) 2011-09-27 2011-09-27 Method for acquiring data and terminal

Publications (1)

Publication Number Publication Date
CN102354353A true CN102354353A (en) 2012-02-15

Family

ID=45577915

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011102894749A Pending CN102354353A (en) 2011-09-27 2011-09-27 Method for acquiring data and terminal

Country Status (1)

Country Link
CN (1) CN102354353A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310137A (en) * 2012-03-16 2013-09-18 宇龙计算机通信科技(深圳)有限公司 Method for safely accessing terminal and terminal
CN103428370A (en) * 2013-08-23 2013-12-04 上海华勤通讯技术有限公司 Mobile phone and multi-user control method thereof
CN104363352A (en) * 2014-11-28 2015-02-18 东莞宇龙通信科技有限公司 System determining method, system determining device and terminal
CN105657147A (en) * 2015-05-29 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Mobile terminal anti-theft method and device
CN105873054A (en) * 2016-04-01 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Communication management method and system and multi-card mobile terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1984402A (en) * 2006-04-06 2007-06-20 华为技术有限公司 Method and device for managing multi-users of mobile terminal
CN101227683A (en) * 2008-01-28 2008-07-23 宇龙计算机通信科技(深圳)有限公司 Mobile terminal, system and method for securing data information
CN101287193A (en) * 2007-04-09 2008-10-15 中兴通讯股份有限公司 Method of protecting information stored on mobile phone when using correlated user identification card

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1984402A (en) * 2006-04-06 2007-06-20 华为技术有限公司 Method and device for managing multi-users of mobile terminal
CN101287193A (en) * 2007-04-09 2008-10-15 中兴通讯股份有限公司 Method of protecting information stored on mobile phone when using correlated user identification card
CN101227683A (en) * 2008-01-28 2008-07-23 宇龙计算机通信科技(深圳)有限公司 Mobile terminal, system and method for securing data information

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310137A (en) * 2012-03-16 2013-09-18 宇龙计算机通信科技(深圳)有限公司 Method for safely accessing terminal and terminal
CN103310137B (en) * 2012-03-16 2016-09-21 宇龙计算机通信科技(深圳)有限公司 A kind of method and device having secure access to terminal
CN103428370A (en) * 2013-08-23 2013-12-04 上海华勤通讯技术有限公司 Mobile phone and multi-user control method thereof
CN104363352A (en) * 2014-11-28 2015-02-18 东莞宇龙通信科技有限公司 System determining method, system determining device and terminal
CN105657147A (en) * 2015-05-29 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Mobile terminal anti-theft method and device
CN105657147B (en) * 2015-05-29 2019-10-11 宇龙计算机通信科技(深圳)有限公司 A kind of anti-theft method for mobile terminal and device
CN105873054A (en) * 2016-04-01 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Communication management method and system and multi-card mobile terminal
CN105873054B (en) * 2016-04-01 2019-06-11 宇龙计算机通信科技(深圳)有限公司 A kind of communication management method, system and multi-card mobile terminal

Similar Documents

Publication Publication Date Title
US10467832B2 (en) Configurable digital badge holder
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
EP2905715B1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
CN104717223B (en) Data access method and device
CN105550591A (en) Security protection device and method for user data in mobile terminal
CN102291717B (en) Data protection method and terminal
CN105590201A (en) Mobile payment device and mobile payment system
CN103366107A (en) Method, device and mobile phone for protecting access permission of application program
CN102354353A (en) Method for acquiring data and terminal
CN102867157A (en) Mobile terminal and data protecting method
WO2014180345A1 (en) User identity verification and authorization system
CN102063431B (en) Information database system and method for controlling systematic access of information database
US9542547B2 (en) Identification to access portable computing device
CN110691352B (en) SIM card access control method, device, medium and equipment
CN111159685A (en) User account management method and device, intelligent device and storage medium
CN105516500A (en) Method and system for selecting device mode
CN100569015C (en) A kind of portable terminal using method and mobile terminal system
CN105827653A (en) Application security management method and system
US9473936B2 (en) Method and device for protecting privacy information
CN105590044A (en) Information authentication method and apparatus
CN105007267A (en) Privacy protection method and device
KR101603988B1 (en) System for context-aware service
CN110766840A (en) Access control password setting method and device
CN103052060A (en) Method for improving information security of mobile terminal and mobile terminal
US10289948B2 (en) Maintenance system, and computer readable recording medium storing a maintenance program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120215