CN102867157A - Mobile terminal and data protecting method - Google Patents

Mobile terminal and data protecting method Download PDF

Info

Publication number
CN102867157A
CN102867157A CN2012103350309A CN201210335030A CN102867157A CN 102867157 A CN102867157 A CN 102867157A CN 2012103350309 A CN2012103350309 A CN 2012103350309A CN 201210335030 A CN201210335030 A CN 201210335030A CN 102867157 A CN102867157 A CN 102867157A
Authority
CN
China
Prior art keywords
data
portable terminal
card
user
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012103350309A
Other languages
Chinese (zh)
Other versions
CN102867157B (en
Inventor
燕青洲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd, Dongguan Yulong Telecommunication Technology Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201210335030.9A priority Critical patent/CN102867157B/en
Publication of CN102867157A publication Critical patent/CN102867157A/en
Application granted granted Critical
Publication of CN102867157B publication Critical patent/CN102867157B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a mobile terminal. The mobile terminal comprises an identification information acquiring unit and a data processing unit, wherein the identification information acquiring unit acquires the identification information of the terminal; and the data processing unit encrypts the data required to be stored in a user identifying card (IC) and/or the mobile terminal according to the identification information, and stores the encrypted data into the user identifying card (IC) and/or the mobile terminal. The invention also provides a mobile terminal user data protecting method. By the technical scheme, the data stored in the user identifying card (IC) and/or the mobile terminal can be encrypted through the mobile terminal, and decryption data can be only acquired by the mobile terminal, so that the privacy of a user is effectively protected.

Description

Portable terminal and data guard method
Technical field
The present invention relates to the Technology On Data Encryption field, in particular to a kind of portable terminal and a kind of data guard method.
Background technology
At present the portable terminal such as mobile phone all rests on the application program rank for the protection that the user identifies the data in the IC-card (such as SIM card), such as password is set, must inputs correct password and just can obtain the user and identify data in the IC-card.Be placed in other mobile phones if this user is identified IC-card, data wherein must cover all at one glance.Can certainly protect data by the mode that PIN code is set; but must input PIN code when starting shooting at every turn, so just cumbersome, certain risk is also arranged; if the user is PIN or the PUK code of input error repeatedly, finally may cause the user to identify IC-card can't use.
Therefore, need a kind of user data of mobile terminal guard method, can be encrypted the data that deposit the user in and identify in the IC-card by portable terminal, and only have this portable terminal can normally obtain data decryption, effectively protect privacy of user.
Summary of the invention
For the problems referred to above; the invention provides a kind of user data of mobile terminal guard method; can be encrypted the data that deposit the user in and identify in the IC-card by portable terminal, and only have this portable terminal can normally obtain data decryption, effectively protect privacy of user.
According to an aspect of the present invention, propose a kind of portable terminal, comprising: identification information obtaining unit, obtain the identification information of portable terminal; Data processing unit is stored to the data that the user identifies in IC-card and/or the described portable terminal according to described identification information to needs and is encrypted, and the described data after will encrypting are stored to described user and identify in IC-card and/or the described portable terminal.
Should be appreciated that the portable terminal that stores into of mentioning here, refer to self storer or the mobile memory that stores portable terminal into.For example, mobile memory can be SD card, TF card, Micro SD card, SSD storer or memory stick etc.
In this technical scheme, identification information refers to unique identification information, information that namely can unique difference portable terminal identity, be stored to the user after with data encryption according to this identification information and identify IC-card and/or described portable terminal (namely, self storer and/or mobile memory of portable terminal), the cryptographic operation here can be selected the algorithm that efficient is high, intensity is high.
Identifying the data of storing in the IC-card the user so all is ciphertext, also can only obtain ciphertext even if the mobile memory that this user is identified IC-card and/or described portable terminal is put in other portable terminal, has protected user's privacy.
Preferably, described data processing unit also is used for: read the described data after described user identifies the encryption that IC-card and/or described portable terminal store, and according to described identification information the described data after encrypting are decrypted.
In this technical scheme, can identify data deciphering after the encryption of storing in IC-card and/or the described portable terminal to the user according to identification information, the data after the deciphering are offered other software of user or application layer., a kind of protection mechanism can also be set here, guarantee to only have and just can obtain user after the encryption through the system-level application of subscriber authorisation and identify data in IC-card and/or the described portable terminal, prevent from being obtained by other undelegated application.
Preferably, it is following one or a combination set of that described identification information comprises: IMEI code, ESN code, SN code, described user identifies IC-card and comprises one of following: SIM card (Subscriber Identity Module, client identification module), UIM card (User Identity Module, subscriber identification module), usim card (Universal Subscriber Identity Module, whole world subscriber identification module), described data comprise associated person information and/or short message.
In this technical scheme, IMEI code (International Mobile Equipment Identity, the International Mobile Equipment Identity code), ESN code (Electronic Serial Number, Electronic Serial Number), SN code (Serial Number, sequence number) is unique corresponding with each portable terminal, uses one of them or its combination can effectively distinguish the identity of portable terminal as identification information.
Preferably, the function of described identification information obtaining unit and described data processing unit realizes at the communication interface layer of described portable terminal.
According to technical scheme provided by the invention, not only can carry out data encryption and deciphering in application layer, but also can be at communication interface layer (Radio Interface Layer, RIL layer) to the data encryption and decryption, thereby have higher efficient and the security of Geng Gao.
Preferably, described data processing unit also is used for: after the mandate that obtains the user, read and decipher described user and identify the data of storing in IC-card and/or the described portable terminal, and the described data after will deciphering are stored to described user and identify IC-card and/or described portable terminal; And/or after the mandate that obtains the user, according to described identification information needs are stored into the data that described user identifies in IC-card and/or the described portable terminal and be encrypted, the described data after encrypting are stored to described user identify IC-card and/or described portable terminal.
In this technical scheme, after the mandate that obtains the user, again storage behind the data encryption/decryption of storing in rear permission user to user identification IC-card and/or the described portable terminal, thereby, the mobile memory that makes things convenient for the user to use for the first time not to identify IC-card and/or described portable terminal through the user who encrypts (for example, the user uses new SIM card (user identifies IC-card) or mobile memory), also make things convenient for the user will identify through the user who encrypts IC-card and/or mobile memory and change to other portable terminal use, like this, even again store at above-mentioned needs in two kinds of situations of data, owing to needing to obtain user's mandate, thereby also can guarantee the security of data.The process that obtains user's mandate can be to use existing method, and for example, carry out in the following manner one or a combination set of: the user inputs password, facial characteristics identification, iris recognition, fingerprint recognition, safety certificate checking etc.Thereby more strictly guaranteed data security, effectively protected privacy of user.
According to a further aspect in the invention, also propose a kind of user data of mobile terminal guard method, comprising: the identification information that obtains terminal; According to described identification information needs being stored to the data that the user identifies in IC-card and/or the portable terminal is encrypted; Described data after encrypting are stored to described user to be identified in IC-card and/or the portable terminal.
In this technical scheme, identification information refers to unique identification information, information that namely can unique difference portable terminal identity is stored to the user according to this identification information after with data encryption and identifies IC-card and/or portable terminal, and the cryptographic operation here can be selected the algorithm that efficient is high, intensity is high.Identifying the data of storing in IC-card and/or the portable terminal the user so all is ciphertext, also can only obtain ciphertext even if the mobile memory that this user is identified IC-card and/or portable terminal is put in other portable terminal, has protected user's privacy.
Preferably, described user data of mobile terminal guard method also comprises: read the described data after described user identifies the encryption of storing in IC-card and/or the portable terminal, and according to described identification information the described data after encrypting are decrypted.
In this technical scheme, can identify data deciphering after the encryption of storing in IC-card and/or the portable terminal to the user according to identification information, the data after the deciphering are offered other software of user or application layer., a kind of protection mechanism can also be set here, guarantee to only have and just can obtain user after the encryption through the system-level application of subscriber authorisation and identify data in IC-card and/or the portable terminal, prevent from being obtained by other undelegated application.
Preferably, it is following one or a combination set of that described identification information comprises: IMEI code, ESN code, SN code, described user identifies IC-card and comprises one of following: SIM card, UIM card, usim card, described data comprise associated person information and/or short message.
Mobile memory can be SD card, TF card, Micro SD card, SSD storer or memory stick etc.
In this technical scheme, IMEI code, ESN code, SN code are unique corresponding with each portable terminal, use one of them or its combination can effectively distinguish the identity of portable terminal as identification information.
Preferably, described data guard method is realized at the communication interface layer of described portable terminal.
According to technical scheme provided by the invention, not only can carry out data encryption and deciphering in application layer, but also can be at communication interface layer (Radio Interface Layer, RIL layer) to the data encryption and decryption, thereby have higher efficient and the security of Geng Gao.
Preferably, described user data of mobile terminal guard method also comprises: after the mandate that obtains the user, read and decipher described user and identify the data of storing in IC-card and/or the portable terminal, and the described data after will deciphering are stored to described user and identify IC-card and/or portable terminal; And/or after the mandate that obtains the user, read that described user identifies the data of storing in IC-card and/or the portable terminal and according to described identification information to described data encryption, the described data after encrypting are stored to described user identify IC-card and/or portable terminal.
In this technical scheme, after the mandate that obtains the user, again storage behind the data encryption/decryption of storing in rear permission user to user identification IC-card and/or the described portable terminal, thereby, the mobile memory that makes things convenient for the user to use for the first time not to identify IC-card and/or described portable terminal through the user who encrypts (for example, the user uses new SIM card (user identifies IC-card) or mobile memory), also make things convenient for the user will identify through the user who encrypts IC-card and/or mobile memory and change to other portable terminal use, like this, even again store at above-mentioned needs in two kinds of situations of data, owing to needing to obtain user's mandate, thereby also can guarantee the security of data.The process that obtains user's mandate can be to use existing method, and for example, carry out in the following manner one or a combination set of: the user inputs password, facial characteristics identification, iris recognition, fingerprint recognition, safety certificate checking etc.Thereby more strictly guaranteed data security, effectively protected privacy of user.
Description of drawings
Fig. 1 shows the according to an embodiment of the invention block diagram of portable terminal;
Fig. 2 shows the according to an embodiment of the invention process flow diagram of user data of mobile terminal guard method;
Fig. 3 A and Fig. 3 B show the process flow diagram of user data of mobile terminal guard method according to another embodiment of the present invention.
Embodiment
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments the present invention is further described in detail.
A lot of details have been set forth in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not subjected to the restriction of following public specific embodiment.
The present invention will be further described below in conjunction with drawings and Examples.Need to prove, in the situation that do not conflict, the application's embodiment and the feature among the embodiment can make up mutually.
Fig. 1 shows the according to an embodiment of the invention block diagram of portable terminal.
As shown in Figure 1, portable terminal 100 comprises according to an embodiment of the invention: identification information obtaining unit 102, obtain the identification information of portable terminal; Data processing unit 104, according to identification information needs being stored to the data that the user identifies in IC-card and/or the portable terminal is encrypted, and the data after will encrypting are stored to the user and identify in IC-card and/or the portable terminal (namely, portable terminal self storer and/or mobile memory).For example, mobile memory can be SD card, TF card, Micro SD card, SSD(solid state disk, solid state hard disc) storer or memory stick etc.
In this technical scheme, identification information refers to unique identification information, information that namely can unique difference portable terminal identity is stored to the user according to this identification information after with data encryption and identifies IC-card and/or portable terminal, and the cryptographic operation here can be selected the algorithm that efficient is high, intensity is high.Identifying the data of storing in IC-card and/or the portable terminal the user so all is ciphertext, also can only obtain ciphertext even if the mobile memory that this user is identified IC-card and/or portable terminal is put in other portable terminal, has protected user's privacy.
Preferably, data processing unit 104 also is used for: read the data after the user identifies the encryption that IC-card and/or portable terminal store, and according to identification information the data after encrypting are decrypted.
In this technical scheme, can identify data deciphering after the encryption of storing in IC-card and/or the portable terminal to the user according to identification information, the data after the deciphering are offered other software of user or application layer., a kind of protection mechanism can also be set here, guarantee to only have and just can obtain user after the encryption through the system-level application of subscriber authorisation and identify data in the IC-card, prevent from being obtained by other undelegated application.
Preferably, it is following one or a combination set of that identification information comprises: IMEI code (International Mobile Equipment Identity, the International Mobile Equipment Identity code), ESN code (Electronic Serial Number, Electronic Serial Number), SN code (Serial Number, sequence number), the user identifies IC-card and comprises one of following: SIM card (Subscriber Identity Module, client identification module), UIM card (User Identity Module, subscriber identification module), usim card (Universal Subscriber Identity Module, whole world subscriber identification module), data comprise associated person information and/or short message.
In this technical scheme, IMEI code, ESN code, SN code are unique corresponding with each portable terminal, use one of them or its combination can effectively distinguish the identity of portable terminal as identification information.
Preferably, the function of identification information obtaining unit 102 and data processing unit 104 realizes at the communication interface layer of terminal.
In this technical scheme, realize that at communication interface layer (Radio Interface Layer, RIL layer) encryption and decryption have higher efficient and the security of Geng Gao to data.
Preferably, data processing unit 104 also is used for: after the mandate that obtains the user, read and decrypted user identification IC-card and/or portable terminal in the data of storing, and the data after will deciphering are stored to the user and identify IC-card and/or described portable terminal; And/or after the mandate that obtains the user, according to identification information needs are stored to the user and identify the data encryption of storing in IC-card and/or the portable terminal, the data after encrypting are stored to the user identify IC-card and/or described portable terminal.
Should be appreciated that the portable terminal that stores into of mentioning here, refer to self storer or the mobile memory that stores portable terminal into.For example, mobile memory can be SD card, TF card, Micro SD card, SSD storer or memory stick etc.
In this technical scheme, after the mandate that obtains the user, again storage behind the data encryption/decryption of storing in rear permission user to user identification IC-card and/or the described portable terminal, thereby, the mobile memory that makes things convenient for the user to use for the first time not to identify IC-card and/or described portable terminal through the user who encrypts (for example, the user uses new SIM card (user identifies IC-card) or mobile memory), also make things convenient for the user will identify through the user who encrypts IC-card and/or mobile memory and change to other portable terminal use, like this, even again store at above-mentioned needs in two kinds of situations of data, owing to needing to obtain user's mandate, thereby also can guarantee the security of data.The process that obtains user's mandate can be to use existing method, and for example, carry out in the following manner one or a combination set of: the user inputs password, facial characteristics identification, iris recognition, fingerprint recognition, safety certificate checking etc.Thereby more strictly guaranteed data security, effectively protected privacy of user.
Fig. 2 shows the according to an embodiment of the invention process flow diagram of user data of mobile terminal guard method.
As shown in Figure 2, the user data of mobile terminal guard method comprises according to an embodiment of the invention: step 202, obtain the identification information of portable terminal; Step 204 is stored to the data that the user identifies in IC-card and/or the portable terminal according to identification information to needs and is encrypted; Step 206 is stored to the user with the data after encrypting and identifies in the IC-card and/or portable terminal.
It will be appreciated by those skilled in the art that in the technique scheme, the data in the portable terminal refer to self storer of being stored in portable terminal and/or the data in the mobile memory.
In this technical scheme, identification information refers to unique identification information, information that namely can unique difference portable terminal identity is stored to the user according to this identification information after with data encryption and identifies IC-card, and the cryptographic operation here can be selected the algorithm that efficient is high, intensity is high.Identifying the data of storing in IC-card and/or the portable terminal the user so all is ciphertext, also can only obtain ciphertext even if the mobile memory that this user is identified IC-card and/or portable terminal is put in other portable terminal, has protected user's privacy.
Preferably, the user data of mobile terminal guard method also comprises: read the data after the user identifies the encryption of storing in IC-card and/or the portable terminal, and according to identification information the data after encrypting are decrypted.
In this technical scheme, can identify data deciphering after the encryption of storing in IC-card and/or the portable terminal to the user according to identification information, the data after the deciphering are offered other software of user or application layer.
Preferably, it is following one or a combination set of that identification information comprises: IMEI code, ESN code, SN code, the user identifies IC-card and comprises one of following: SIM card, UIM card, usim card, data comprise associated person information and/or short message.
In this technical scheme, IMEI code, ESN code, SN code are unique corresponding with each portable terminal, use one of them or its combination can effectively distinguish the identity of portable terminal as identification information.
Preferably, the mobile terminal subscriber information guard method realizes at the communication interface layer of terminal.
According to technical scheme provided by the invention, not only can carry out data encryption and deciphering in application layer, but also can be at communication interface layer (Radio Interface Layer, RIL layer) to the data encryption and decryption, thereby have higher efficient and the security of Geng Gao.
Preferably, the user data of mobile terminal guard method also comprises: after the mandate that obtains the user, read and decrypted user identification IC-card and/or described portable terminal in the data of storing, and the data after will deciphering are stored to the user and identify IC-card and/or described portable terminal; And/or after the mandate that obtains the user, according to identification information needs are stored in the data that the user identifies in IC-card and/or the portable terminal and are encrypted, the data after encrypting are stored to the user identify IC-card and/or described portable terminal.
In this technical scheme, after the mandate that obtains the user, again storage behind the data encryption/decryption of storing in rear permission user to user identification IC-card and/or the described portable terminal, thereby, the mobile memory that makes things convenient for the user to use for the first time not to identify IC-card and/or described portable terminal through the user who encrypts (for example, the user uses new SIM card (user identifies IC-card) or mobile memory), also make things convenient for the user will identify through the user who encrypts IC-card and/or mobile memory and change to other portable terminal use, like this, even again store at above-mentioned needs in two kinds of situations of data, owing to needing to obtain user's mandate, thereby also can guarantee the security of data.The process that obtains user's mandate can be to use existing method, and for example, carry out in the following manner one or a combination set of: the user inputs password, facial characteristics identification, iris recognition, fingerprint recognition, safety certificate checking etc.Thereby more strictly guaranteed data security, effectively protected privacy of user.
It will be appreciated by those skilled in the art that in the above-described embodiments, the example of enumerating is that the data after encrypting or deciphering are deposited New Consumers identification IC-card or new mobile memory, still, can store other media or high in the clouds into equally.
Thereby a kind of duplicate protection mechanism is provided, has guaranteed to only have and just can obtain user after the encryption through the system-level application of subscriber authorisation and identify data in the IC-card, prevented from being obtained by other undelegated application.
Below in conjunction with Fig. 3 A and Fig. 3 B according to another embodiment of the present invention user data of mobile terminal guard method is described.
Referring to Fig. 3 A, user data of mobile terminal guard method is according to another embodiment of the present invention drawn together following flow process to the data encrypted packet:
Step 301 need to be write data in access customer identification IC-card and/or the portable terminal;
Step 302 is obtained the identification information of portable terminal;
Step 303 is encrypted data according to identification information;
Step 304 is write the data after encrypting in access customer identification IC-card and/or the portable terminal.
Wherein, step 301 is carried out in the application layer of portable terminal, and step 302 to the communication interface layer (RIL layer) of step 304 at portable terminal carries out.Can guarantee so on the one hand the safety of data, have simultaneously higher efficient.
Referring to Fig. 3 B, user data of mobile terminal guard method is according to another embodiment of the present invention drawn together following flow process to the data decrypted packet:
Step 305, the mobile terminal-opening log-on data reads flow process;
Step 306 is obtained the identification information of portable terminal;
Step 307 reads the user and identifies data in IC-card and/or the portable terminal;
Step 308, the data that deciphering is read according to identification information;
Step 309 offers application in the portable terminal with the data of deciphering;
Step 310 judges whether to have read all data, is then to enter step 311, otherwise gets back to step 307;
Step 311, data read to finish and continue other flow process.
Corresponding with the flow process of encrypting, the flow process of deciphering also is that the communication interface layer (RIL layer) at portable terminal carries out, and provides respectively using to application layer with the data after the deciphering.Can effectively protect user's data security by above flow process.Simultaneously, experience in order to promote the user, some users may not need encryption enabled mechanism, can provide the setting operation interface in application layer, the user arranges and does not use the encryption and decryption strategy, then do not add data are carried out the encryption and decryption processing, read, write the data of access customer identification IC-card and/or portable terminal and will use expressly.Simultaneously, plaintext, the mutual translation interface of ciphertext can also be provided, behind process user's Authorized operation, ciphertext completely can be changed into stored in clear and identify IC-card and/or portable terminal to the user, perhaps plaintext being converted to ciphertext stores the user into and identifies in IC-card and/or the portable terminal, the user who makes things convenient for the user to use for the first time a unencryption to cross identifies the mobile memory in IC-card and/or the portable terminal, and perhaps preparation is changed and snapped into other portable terminal use.
To sum up; according to user data of mobile terminal guard method of the present invention; can be encrypted the data that deposit the user in and identify in IC-card and/or the portable terminal by portable terminal, and only have this portable terminal can normally obtain data decryption, effectively protect privacy of user.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a portable terminal is characterized in that, comprising:
Identification information obtaining unit is obtained the identification information of described portable terminal;
Data processing unit is stored to the data that the user identifies in IC-card and/or the described portable terminal according to described identification information to needs and is encrypted, and the data after will encrypting are stored to described user and identify in IC-card and/or the described portable terminal.
2. portable terminal according to claim 1 is characterized in that, described data processing unit also is used for:
Read the data after described user identifies the encryption of storing in IC-card and/or the described portable terminal, and according to described identification information the data after encrypting are decrypted.
3. portable terminal according to claim 2, it is characterized in that, it is following one or a combination set of that described identification information comprises: IMEI code, ESN code, SN code, described user identifies IC-card and comprises one of following: SIM card, UIM card, usim card, described data comprise associated person information and/or short message.
4. each described portable terminal in 3 according to claim 1 is characterized in that, the function of described identification information obtaining unit and described data processing unit realizes at the communication interface layer of described portable terminal.
5. portable terminal according to claim 4 is characterized in that, described data processing unit also is used for:
After the mandate that obtains the user, read and decipher described user and identify the data of storing in IC-card and/or the described portable terminal, and the described data after will deciphering are stored to described user and identify IC-card and/or described portable terminal; And/or
After the mandate that obtains the user, according to described identification information needs are stored in the data that described user identifies in IC-card and/or the described portable terminal and are encrypted, the described data after encrypting are stored to described user identify IC-card and/or described portable terminal.
6. a data guard method is characterized in that, comprising:
Obtain the identification information of portable terminal;
According to described identification information needs being stored to the data that the user identifies in IC-card and/or the portable terminal is encrypted;
Described data after encrypting are stored to described user to be identified in IC-card and/or the described portable terminal.
7. data guard method according to claim 6 is characterized in that, also comprises:
Read the data after described user identifies the encryption of storing in IC-card and/or the described portable terminal, and according to described identification information the described data after encrypting are decrypted.
8. data guard method according to claim 7; it is characterized in that; it is following one or a combination set of that described identification information comprises: IMEI code, ESN code, SN code; described user identifies IC-card and comprises one of following: SIM card, UIM card, usim card, described data comprise associated person information and/or short message.
9. each described data guard method in 8 according to claim 6 is characterized in that, described data guard method is realized at the communication interface layer of described portable terminal.
10. data guard method according to claim 9 is characterized in that, also comprises:
After the mandate that obtains the user, read and decipher described user and identify the data through encrypting of storing in IC-card and/or the described portable terminal, and the data after will deciphering are stored to described user and identify IC-card and/or described portable terminal; And/or
After the mandate that obtains the user, according to described identification information needs are stored in described user and identify the data of storing in IC-card and/or the described portable terminal and be encrypted, the described data after encrypting are stored to described user identify IC-card and/or described portable terminal.
CN201210335030.9A 2012-09-11 2012-09-11 Mobile terminal and data guard method Active CN102867157B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210335030.9A CN102867157B (en) 2012-09-11 2012-09-11 Mobile terminal and data guard method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210335030.9A CN102867157B (en) 2012-09-11 2012-09-11 Mobile terminal and data guard method

Publications (2)

Publication Number Publication Date
CN102867157A true CN102867157A (en) 2013-01-09
CN102867157B CN102867157B (en) 2016-03-09

Family

ID=47446022

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210335030.9A Active CN102867157B (en) 2012-09-11 2012-09-11 Mobile terminal and data guard method

Country Status (1)

Country Link
CN (1) CN102867157B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103997483A (en) * 2013-02-20 2014-08-20 联想(北京)有限公司 Information safety control method and apparatus, and electronic device
CN105447401A (en) * 2014-08-28 2016-03-30 中国移动通信集团公司 Text encryption method and device
CN106230822A (en) * 2016-08-01 2016-12-14 西宁高通交通科技有限公司 The recognition methods of a kind of smart card and equipment
CN106230821A (en) * 2016-08-01 2016-12-14 西宁高通交通科技有限公司 The recognition methods of a kind of smart card and equipment
CN107566998A (en) * 2017-08-14 2018-01-09 北京小米移动软件有限公司 Processing method, device and the terminal of communications identification
CN107563176A (en) * 2017-08-17 2018-01-09 广州视源电子科技股份有限公司 Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk
CN109714754A (en) * 2018-10-29 2019-05-03 努比亚技术有限公司 A kind of data guard method, terminal and computer readable storage medium
CN109753770A (en) * 2019-01-07 2019-05-14 北京地平线机器人技术研发有限公司 Determine method and device, method for burn-recording and device, the electronic equipment of burning data
CN109784074A (en) * 2018-12-29 2019-05-21 播金信息科技(上海)有限公司 Data storage security guard method, system and computer readable storage medium based on DNA characteristics and/or block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1549631A (en) * 2003-05-15 2004-11-24 ����������ͨѶ�ɷ����޹�˾�Ͼ��ֹ� Encrypting and de-encrypting method for personal hand-held communication system cell phone identification information
CN1553728A (en) * 2003-05-27 2004-12-08 ����������ͨѶ�ɷ����޹�˾�Ͼ��ֹ� Protection of authentication information of PHS mobile telephone
WO2006021624A1 (en) * 2004-07-23 2006-03-02 Waving Technology Portable recyclable telephone

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1549631A (en) * 2003-05-15 2004-11-24 ����������ͨѶ�ɷ����޹�˾�Ͼ��ֹ� Encrypting and de-encrypting method for personal hand-held communication system cell phone identification information
CN1553728A (en) * 2003-05-27 2004-12-08 ����������ͨѶ�ɷ����޹�˾�Ͼ��ֹ� Protection of authentication information of PHS mobile telephone
WO2006021624A1 (en) * 2004-07-23 2006-03-02 Waving Technology Portable recyclable telephone

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103997483A (en) * 2013-02-20 2014-08-20 联想(北京)有限公司 Information safety control method and apparatus, and electronic device
CN103997483B (en) * 2013-02-20 2018-06-01 联想(北京)有限公司 A kind of information security control method, device and electronic equipment
CN105447401A (en) * 2014-08-28 2016-03-30 中国移动通信集团公司 Text encryption method and device
CN106230822A (en) * 2016-08-01 2016-12-14 西宁高通交通科技有限公司 The recognition methods of a kind of smart card and equipment
CN106230821A (en) * 2016-08-01 2016-12-14 西宁高通交通科技有限公司 The recognition methods of a kind of smart card and equipment
CN106230822B (en) * 2016-08-01 2019-07-23 西宁高通交通科技有限公司 A kind of recognition methods and equipment of smart card
CN106230821B (en) * 2016-08-01 2019-07-23 西宁高通交通科技有限公司 A kind of recognition methods and equipment of smart card
CN107566998A (en) * 2017-08-14 2018-01-09 北京小米移动软件有限公司 Processing method, device and the terminal of communications identification
CN107563176A (en) * 2017-08-17 2018-01-09 广州视源电子科技股份有限公司 Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk
CN109714754A (en) * 2018-10-29 2019-05-03 努比亚技术有限公司 A kind of data guard method, terminal and computer readable storage medium
CN109784074A (en) * 2018-12-29 2019-05-21 播金信息科技(上海)有限公司 Data storage security guard method, system and computer readable storage medium based on DNA characteristics and/or block chain
CN109753770A (en) * 2019-01-07 2019-05-14 北京地平线机器人技术研发有限公司 Determine method and device, method for burn-recording and device, the electronic equipment of burning data

Also Published As

Publication number Publication date
CN102867157B (en) 2016-03-09

Similar Documents

Publication Publication Date Title
CN102867157B (en) Mobile terminal and data guard method
CN103747443B (en) One kind is based on cellphone subscriber's identification card Multi-security domain device and its method for authenticating
EP3528160A1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
EP2113856A1 (en) Secure storage of user data in UICC and Smart Card enabled devices
CN105812332A (en) Data protection method
CN102291717B (en) Data protection method and terminal
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
CN105005731A (en) Data encryption and decryption methods and mobile terminal
CN106874743B (en) Method and system for storing and extracting smart card password
CN104573551A (en) File processing method and mobile terminal
CN102866960A (en) Method for realizing encryption in storage card, decrypting method and device
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
US11405782B2 (en) Methods and systems for securing and utilizing a personal data store on a mobile device
US9426647B2 (en) Method and device for protecting privacy data of mobile terminal user
CN101815292A (en) Device and method for protecting data of mobile terminal
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN105989304A (en) File storage method, file reading method, file storage apparatus and file reading apparatus
CN101866411A (en) Security certification and encryption method and system of multi-application noncontact-type CPU card
CN102799540B (en) Utilize method, system and terminal of the user's identification card key to storage card encryption and decryption
CN207251631U (en) A kind of follow-on SIM card and mobile terminal and identification system
JP6349712B2 (en) Mobile device setting method
CN104732166A (en) Data storing and reading method and device and equipment
US20060121882A1 (en) Desktop cellular phone having a SIM card with an encrypted SIM PIN
CN103702449A (en) Communication method of subscriber identity module (SIM) card and device
CN101355740A (en) Method and system for protecting smart card data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant