CN104540123A - Encryption backup and security deletion method and system for important data of mobile terminal - Google Patents

Encryption backup and security deletion method and system for important data of mobile terminal Download PDF

Info

Publication number
CN104540123A
CN104540123A CN201510004737.5A CN201510004737A CN104540123A CN 104540123 A CN104540123 A CN 104540123A CN 201510004737 A CN201510004737 A CN 201510004737A CN 104540123 A CN104540123 A CN 104540123A
Authority
CN
China
Prior art keywords
data
mobile terminal
sim card
user
note
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510004737.5A
Other languages
Chinese (zh)
Other versions
CN104540123B (en
Inventor
陈明志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FUZHOU NORCATECH Co Ltd
Original Assignee
FUZHOU NORCATECH Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUZHOU NORCATECH Co Ltd filed Critical FUZHOU NORCATECH Co Ltd
Priority to CN201510004737.5A priority Critical patent/CN104540123B/en
Publication of CN104540123A publication Critical patent/CN104540123A/en
Application granted granted Critical
Publication of CN104540123B publication Critical patent/CN104540123B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to an encryption backup and security deletion method and system for important data of a mobile terminal. Two protection modes are adopted in the method to protect the security of the data of the mobile terminal and include the short message protection mode and the Sim card protection mode. In the short message protection mode, the mobile terminal is remotely controlled by sending a short message, namely, the software analyzes the content of the short message and then carries out corresponding operations such as destruction of the important data of the mobile terminal, remote positioning on the mobile terminal and encryption backup of the data. The Sim card protection mode refers to a protection measure taken by monitoring the change of Sim card information, namely, when an original Sim card of the mobile terminal is pulled out or changed, a dialog box requiring a user to input a correct password will be popped up; if the input password is wrong, the mobile terminal will carry out encryption backup on the important data automatically and upload the important data to a cloud side, and then the important data are destructed. By means of the two protection modes, the security of the data of the mobile terminal can be effectively protected, and it is avoided that a criminal gets the important data when the mobile terminal is lost.

Description

The method and system of mobile terminal significant data encrypted backup and safety deleting
Technical field
The present invention relates to mobile terminal data secrecy technology field, particularly the method and system of a kind of mobile terminal significant data encrypted backup and safety deleting.
Background technology
Along with extensively popularizing of mobile device, mobile terminal stores a large amount of personal sensitive information of user (as mail, picture and note etc.), if the loss of mobile terminal will cause serious risk of divulging a secret.Therefore, the data security of the mobile terminals such as mobile terminal how is protected to become an important research topic.Present most of Android mobile terminal does not all have the defencive function of private data; if mobile terminal is lost accidentally; important data so inside mobile terminal fall into the hand of lawless person as important information such as note, contact person, Taobao, qq, will cause great potential safety hazard.This not only can affect the privacy of you individual, and the privacy of your household and at one's side good friend also can be subject to great impact.So the protection to mobile terminal significant data, suitable safeguard procedures must must be made.Therefore, for this problem, design the software of a kind of mobile terminal significant data encrypted backup and safety deleting, there is important using value and development prospect.
Summary of the invention
The object of the present invention is to provide a kind of method of mobile terminal significant data encrypted backup and safety deleting, personal sensitive information in customer mobile terminal can be protected safely, efficiently, easily.
The present invention realizes in the following ways: a kind of method of mobile terminal significant data encrypted backup and safety deleting, is characterized in that comprising: note protection mode and Sim card protection mode;
Described note protection mode is that the mode by sending note carrys out remote control mobile terminal, and the content of mobile terminal to short-message instruction is resolved, and then makes corresponding operation;
Described Sim mode card is the change of Sim card information by monitoring described mobile terminal and the safeguard procedures made, namely when the original Sim card of mobile terminal is drawn out of or changes, can eject and require that user inputs correct password, if input error, mobile terminal automatically will be encrypted backup to significant data, and then destroy.
In an embodiment of the present invention, described operation comprises the destruction of data, the positional information returning described mobile terminal or backup significant data and uploads.
In an embodiment of the present invention, the destruction of described data comprises: delete contact person, note, communications records, deletion SD card data, designated software data cached or return to Default Value.
In an embodiment of the present invention, described backup significant data uploading comprises: data enciphering back-up and data convert, its implementation: this mobile terminal can according to the security strategy of short message content or prior equipment, realize automated back-up note and associated person information and be encrypted, and by the deposit data after encryption to this locality or upload high in the clouds; If there is high in the clouds, be then automatically sent on safe mobile phone number by cloud address, user can download the data after encrypting by clickthrough, recovers significant data, to realize the security recovery of data after then applying login password deciphering.
In an embodiment of the present invention, be also included in described mobile terminal and described short-message instruction list is set, to provide " key sends " function, use in order to during emergency.
In an embodiment of the present invention, the process of described destruction should comprise: this mobile terminal shuts down by force or turns off the page and all specific data can be deleted after starting destruction program.
In an embodiment of the present invention, also comprise location, position, number tracking and image post-back, when this mobile terminal monitors the insertion of new Sim card, system Automatically invoked locating module obtains current location information, and is sent on security number by positional information and new digit information; Even if do not insert new Sim card, online can be connected as long as monitor, system call locating module obtains current location information, to mourn in silence startup camera simultaneously, after the some user's head portraits of continuous shooting, then positional information and image are passed to the Cloud Server of specifying by network, then chained address by short message sending to the security number of specifying.User can carry out hanging up or send note operation to this terminal accordingly, realizes that mobile phone is demanded, location tracking or data backup, deletion etc.
In an embodiment of the present invention, also comprise self-protection pattern, namely prevent malice from closing and unloading; As long as user opens anti-uninstall function to corresponding software, just cannot not unload this software by normal method by checking, unless logged in this software and closed anti-uninstall function, realize software self-protection function.
The invention provides a kind of system realizing said method, it is characterized in that:
The realization of described note protection mode comprises:
Data dump module, in order to remove note, removing contact person, to remove the data cached of message registration, the removing all data of SD card and designated software;
Mobile terminal locating module, after receiving user getlocation short-message instruction, getSystemService can be utilized automatically to open function of surfing the Net, and pass through particular location and the longitude and latitude of network location service gain-of-function current mobile terminal, then the sendMultipartTextMessage interface of SmsManager is utilized, this positional information is sent to designated mobile phone by note, short message content comprises the text description of position and the chained address of Google Maps, as long as user's clickthrough can obtain the particular location of this mobile terminal on map;
Data enciphering back-up module, after mobile terminal receives message backup instruction, calling data encrypted backup module is by the data in local data base, carry out compressing and encryption, then certain shelter local is stored in, and automatically by the data upload after process in Cloud Server, and by note, the download address of Cloud Server is sent in safe mobile phone;
Super chase module, after user by selecting activated equipment manager, native system just has super chase function, comprises the machine factory reset and screen locking encryption function;
The realization of described Sim card protection mode comprises:
Data dump module and data enciphering back-up module, utilize Broadcast to monitor the Sim card operating state of mobile terminal, if listen to Sim card when being transferred to or change, according to default deletion strategy, implements the removing to corresponding data;
Number is followed the trail of and image post-back module, and user will pre-set a security number, is transferred to when listening to Sim card, and when inserting neocaine, then utilize SmsManager by the information of terminal positional information and new Sim card to this security number; Even if do not insert new Sim card, online can be connected as long as monitor, system call locating module obtains current location information, utilize intent.setAction to mourn in silence startup camera simultaneously, after the some user's head portraits of continuous shooting, then positional information and image are passed to the Cloud Server of specifying by network, then chained address by short message sending to the security number of specifying.User can carry out hanging up or send note operation to this terminal accordingly, realizes that mobile phone is demanded, location tracking or data backup, deletion etc.
Super functional module: user by opening anti-uninstall function, then activated equipment manager, native system just has super functional mode; This is the control DevicePolicyManager class utilizing Android, activate the ACTION_ADD_DEVICE_ADMIN of ComponentName, thus allow native system obtain super function privilege, such permission user carries out higher level operation by short-message instruction or the Sim card trigger mechanism that presets to mobile terminal, comprises and forbids unloading this program, by the machine factory reset or screen locking encryption function;
Data enciphering back-up and recovery module: after mobile terminal receives message backup instruction, ContentProvider is utilized to obtain the data deposited in the local database, then vCard technology is utilized to back up, generate xml file, then zeroturnaround Efficient Compression technology is used to compress xml file, then RC4 encryption is carried out to the file after compression, encryption and decryption key is the login password of this software, then the file after compress-encrypt is stored in certain shelter local, when monitoring network automatically by this data upload in Cloud Server, and by note, the download address of Cloud Server is sent in safe mobile phone, when user needs to carry out data convert, backup data package is obtained from local or high in the clouds, import data, entry password is utilized to carry out RC4 deciphering, zeroturnaround is used to carry out decompress(ion) again, then use XmlPullaser technology to carry out content extraction, finally call ContentProvider and be put in system database, carry out the coupling of data stored in front meeting, if data exist, skip, otherwise stored in, realize data convert.
In an embodiment of the present invention, for the removing that note, contact person, message registration and designated software are data cached, by utilizing the interface command of the uri of the ContentProvider of system, thus obtain corresponding database information, then call delete command, realize the deletion of corresponding data; Removing SD card data is then the rm order utilizing linux, implements to delete the content of outside storage folder.
Method of the present invention has two kinds of protection modes; namely note protection is protected with Sim card; have several power thus; delete as multi-source data chases after, anti-uninstall, location, position, number followed the trail of, image post-back and significant data encryption is local or the function such as cloud backup and restore, the tracking of the available protecting and terminal that realize user data is demanded.
Accompanying drawing explanation
Fig. 1 is principle of the invention schematic flow sheet.
Fig. 2 is present system schematic block diagram.
Embodiment
For enabling above-mentioned purpose of the present invention, feature and advantage more become apparent, and are described in detail the specific embodiment of the present invention below in conjunction with accompanying drawing.
Set forth detail in the following description so that fully understand the present invention.But the present invention can be different from alternate manner described here to implement with multiple, those skilled in the art can when without prejudice to doing similar popularization when intension of the present invention.Therefore the present invention is not by the restriction of following public embodiment.
As shown in Figure 1, a kind of method of mobile terminal significant data encrypted backup and safety deleting, the method comprises:
(1) two kind of pattern
The first protection is note protection, and when user finds that mobile terminal is lost, user can use the note of arbitrary mobile terminal transmit band command adapted thereto and password to this mobile terminal, realizes the Remote to significant data.When stolen mobile terminal receives (when Sim card is not transferred to or changes) after this note, this software carries out content analysis to receiving this short message, if this short-message instruction is legal and operator password is correct, so the type according to instruction processes by mobile terminal, the destruction of such as data, return current location information of mobile terminal, backup significant data the function such as to upload, user can be operated the data of stolen mobile terminal as required by short message.For preventing user from forgetting operational order, " key sends " function being provided, by command list (CLIST) to the safety mobile terminal of specifying, can using in order to during emergency.
The second protection is the protection of Sim card, after lawless person obtains stolen mobile terminal, usually first can turn off the Sim card that mobile terminal extracts this mobile terminal again; close network to prevent from following the trail of; carry out browsing of mobile terminal privacy again, the disabler of now note protection, and Sim card protection mode starts.Principle: this software is when Sim card data protection function is opened an account in setting; first record can be carried out to current Sim card information; transferred to if mobile terminal loses rear Sim card or changed; message box prompting user Input Software login password can be ejected; if lawless person cannot input correct password; mobile terminal can be encrypted backup important data, is then deleted.Even if shut down by force in this process or turn off the deletion that the page all can cause data, the function of real accomplished data chase.
(2) multi-source data chases after and deletes
Multi-source data chases after deletes the main characteristics that function is this software, the software of the deletion data supported on the market is at present only note and associated person information, and this software not only supports to delete the information such as contact person, note, communications records, also support the data cached of deletion SD card data, designated software (micro-letter, Taobao, QQ, U.S. group and browser etc. are conventional), even directly return to Default Value.
(3) software self-protection
This software has powerful self-protection mechanism, needs to arrange password as used this software, just can be logged in by this password as long as arrange password, if do not have correct password cannot operate this software.In order to prevent turning off or deleting this software of people's malice, this software has self-protection function, prevents malice from closing and unloading.As long as user opens anti-uninstall function; by activated equipment manager; mobile terminal super-ordinate right (as removed all data, change screen lock etc.) can be obtained; so user just cannot unload this software by normal method; unless logged in this software and closed anti-uninstall function, realize software self-protection function.
(4) data enciphering back-up and reduction
This software has the function of data enciphering back-up and reduction, can according to the security strategy of short message content or prior equipment, realizes automated back-up note and associated person information and is encrypted, and by the deposit data after encryption to this locality or upload high in the clouds.If there is high in the clouds, be then automatically sent on safe mobile phone number by cloud address, user can download the data after encrypting by clickthrough, recovers significant data, really can realize the security recovery of data like this after then applying login password deciphering.
(5) number is followed the trail of and image post-back
This software has number and follows the trail of and image post-back function, realizes the tracking after lost terminal and antitheft.After householder's mobile terminal is lost, this function is triggered: 1) when system validation terminal is in lost condition by set model, if someone carries out dial (no matter being with existing or new Sim card) with this mobile terminal, system Automatically invoked locating module obtains current location information, and by positional information, the machine new digit or the number dialled by short message sending to the security number of specifying, note can not be preserved, deletion of directly mourning in silence after sending out; 2) even if do not insert new Sim card, online can be connected as long as monitor, system call locating module obtains current location information, automatically to mourn in silence startup camera simultaneously, after the some user's head portraits of continuous shooting, then positional information and image are passed to the Cloud Server of specifying by network, then chained address by short message sending to the security number of specifying.Therefore, user according to after the number sent, user's photo or positional information, can seek help, to recover mobile terminal to public security department.
In addition, as shown in Figure 2, the invention provides a kind of system realizing said method, this system adopts two kinds of protection modes to protect the safety of mobile terminal data respectively, is note protection mode and Sim card protection mode respectively.In these two patterns, comprise some functional modules, as data dump module, terminal positioning module, software self-protection module, data enciphering back-up and recovery module and number are followed the trail of and image post-back etc.Embodiment is as follows:
(1) note protection mode: when user is after user's note chase function is opened at main interface, user needs setting operation short message password, then mobile terminal just can process, major function according to the note operational order (instruction+short message password) sended over accordingly:
Data dump module, comprises removing note, removing contact person, removes the data cached of message registration, the removing all data of SD card and designated software.Wherein for the removing that note, contact person, message registration and designated software are data cached, by utilizing the interface command of the uri of the ContentProvider of system, thus obtain corresponding database information, then call delete command, realize the deletion of corresponding data.Removing SD card data is then the rm order utilizing linux, implements to delete the content of outside storage folder.
Mobile terminal locating module, after receiving user getlocation short-message instruction, getSystemService can be utilized automatically to open function of surfing the Net, and pass through particular location and the longitude and latitude of network location service gain-of-function current mobile terminal, make use of the api of commercial map in addition, realize locating more accurately.Then the sendMultipartTextMessage interface of SmsManager is utilized, this positional information is sent to designated mobile phone by note, short message content comprises the text description of position and the chained address (longitude and latitude adds network address) of Google Maps, as long as user's clickthrough can obtain the particular location of this mobile terminal on map.
Data enciphering back-up module, after mobile terminal receives message backup instruction, calling data encrypted backup module is by the data in local data base, as contact person, note and other significant datas etc., carry out compressing and encryption, then be stored in certain shelter local, and automatically by this data upload in Cloud Server, and to be sent in safe mobile phone by the download address of note by Cloud Server.
Super chase module, after user by selecting activated equipment manager, this software just has super chase function, as can by functions such as the machine factory reset and screen locking encryptions.
(2) Sim card protection mode, after user opens Sim card chase function, this software can record current Sim card sequence number information, and is in listening state all the time.When the Sim card listening to mobile terminal is transferred to or changes, can require that user inputs correct login password by popup web page, if input is correct, not operate, if input 3 mistakes, then trigger corresponding operation by the security strategy of setting in advance.Its function is as follows:
Data dump module and data enciphering back-up module, Broadcast is utilized to monitor the Sim card operating state of mobile terminal, if listen to Sim card when being transferred to or change, according to the deletion strategy preset, implement the removing to corresponding data, as removed note, remove contact person, remove message registration, to remove the software of specifying data cached with all data of removing SD card, factory reset and data enciphering back-up etc., these operation principles are identical with the corresponding module function in short message mode, and this does not repeat.
Number is followed the trail of and image post-back module: user will pre-set a security number, is transferred to when listening to Sim card, and when inserting neocaine, then utilize SmsManager by the information of terminal positional information and new Sim card to this security number; Even if do not insert new Sim card, online can be connected as long as monitor, system call locating module obtains current location information, utilize intent.setAction to mourn in silence startup camera simultaneously, after the some user's head portraits of continuous shooting, then positional information and image are passed to the Cloud Server of specifying by network, then chained address by short message sending to the security number of specifying.
Super functional module: user by opening anti-uninstall function, then activated equipment manager, this software just has super functional mode.This is the control DevicePolicyManager class utilizing Android; activate the ACTION_ADD_DEVICE_ADMIN of ComponentName; thus allow this software obtain super function privilege; such permission user carries out higher level operation by short-message instruction or the Sim card trigger mechanism that presets to mobile terminal, unloads this program (reaching software self-protection object), by functions such as the machine factory reset and screen locking encryptions as forbidden.
Data enciphering back-up and recovery module: after mobile terminal receives message backup instruction, ContentProvider is utilized to obtain the data deposited in the local database, as contact person, note and other significant datas etc., then vCard technology is utilized to back up, generate xml file, then zeroturnaround Efficient Compression technology is used to compress xml file, then RC4 encryption is carried out to the file after compression, encryption and decryption key is the login password of this software, then the file after compress-encrypt is stored in certain shelter local, in addition, when monitoring network automatically by this data upload in Cloud Server, and be sent in safe mobile phone by the download address of note by Cloud Server.When user needs to carry out data convert, backup data package is obtained from local or high in the clouds, import data, entry password is utilized to carry out RC4 deciphering, zeroturnaround is used to carry out decompress(ion) again, then use XmlPullaser technology to carry out content extraction, finally call ContentProvider and be put in system database.Carry out the coupling of data stored in front meeting, if data exist, skip, otherwise stored in, realize data convert.
Although the present invention with preferred embodiment openly as above; but it is not for limiting the present invention; any those skilled in the art without departing from the spirit and scope of the present invention; the Method and Technology content of above-mentioned announcement can be utilized to make possible variation and amendment to technical solution of the present invention; therefore; every content not departing from technical solution of the present invention; the any simple modification done above embodiment according to technical spirit of the present invention, equivalent variations and modification, all belong to the protection range of technical solution of the present invention.The foregoing is only preferred embodiment of the present invention, all equalizations done according to the present patent application the scope of the claims change and modify, and all should belong to covering scope of the present invention.

Claims (10)

1. a method for mobile terminal significant data encrypted backup and safety deleting, is characterized in that comprising: note protection mode and Sim card protection mode;
Described note protection mode is that the mode by sending note carrys out remote control mobile terminal, and the content of mobile terminal to short-message instruction is resolved, and then makes corresponding operation;
Described Sim mode card is the change of Sim card information by monitoring described mobile terminal and the safeguard procedures made, namely when the original Sim card of mobile terminal is drawn out of or changes, can eject and require that user inputs correct password, if input error, mobile terminal automatically will be encrypted backup to significant data, and then destroy.
2. the method for mobile terminal significant data encrypted backup according to claim 1 and safety deleting, is characterized in that: described operation comprises the destruction of data, the positional information returning described mobile terminal or backup significant data and uploads.
3. the method for mobile terminal significant data encrypted backup according to claim 2 and safety deleting, is characterized in that: the destruction of described data comprises: delete contact person, note, communications records, deletion SD card data, designated software data cached or return to Default Value.
4. the method for mobile terminal significant data encrypted backup according to claim 2 and safety deleting, it is characterized in that: described backup significant data uploading comprises: data enciphering back-up and data convert, its implementation: this mobile terminal can according to the security strategy of short message content or prior equipment, realize automated back-up note and associated person information and be encrypted, then by the deposit data after encryption to this locality or upload high in the clouds; If there is high in the clouds, be then automatically sent on safe mobile phone number by cloud address, user can download the data after encrypting by clickthrough, recovers significant data, to realize the security recovery of data after then applying login password deciphering.
5. the method for mobile terminal significant data encrypted backup according to claim 1 and safety deleting, it is characterized in that: be also included in described mobile terminal and described short-message instruction list is set, to provide " key sends " function, use in order to during emergency.
6. the method for mobile terminal significant data encrypted backup according to claim 1 and safety deleting, it is characterized in that: the process of described destruction should comprise: specific data all can be deleted even if shut down by force or turn off the page after starting destruction program by this mobile terminal.
7. the method for mobile terminal significant data encrypted backup according to claim 1 and safety deleting, it is characterized in that: also comprise location, position, number tracking and image post-back, when this mobile terminal monitors the insertion of new Sim card, system Automatically invoked locating module obtains current location information, and is sent on security number by positional information and new digit information; Even if do not insert new Sim card, online can be connected as long as monitor, system call locating module obtains current location information, to mourn in silence startup camera simultaneously, after the some user's head portraits of continuous shooting, then positional information and image are passed to the Cloud Server of specifying by network, then chained address by short message sending to the security number of specifying;
User can carry out hanging up or send note operation to this terminal accordingly, realize that mobile phone is demanded, location tracking or data backup, deletion.
8. the method for mobile terminal significant data encrypted backup according to claim 1 and safety deleting, is characterized in that: also comprise self-protection pattern, namely prevents malice from closing and unloading; As long as user opens anti-uninstall function to corresponding software, just cannot not unload this software by normal method by checking, unless logged in this software and closed anti-uninstall function, realize software self-protection function.
9. realize a system for method described in claim 1, it is characterized in that:
The realization of described note protection mode comprises:
Data dump module, in order to remove note, removing contact person, to remove the data cached of message registration, the removing all data of SD card and designated software;
Mobile terminal locating module, after receiving user getlocation short-message instruction, getSystemService can be utilized automatically to open function of surfing the Net, and pass through particular location and the longitude and latitude of network location service gain-of-function current mobile terminal, then the sendMultipartTextMessage interface of SmsManager is utilized, this positional information is sent to designated mobile phone by note, short message content comprises the text description of position and the chained address of Google Maps, as long as user's clickthrough can obtain the particular location of this mobile terminal on map;
Data enciphering back-up module, after mobile terminal receives message backup instruction, calling data encrypted backup module is by the data in local data base, carry out compressing and encryption, then certain shelter local is stored in, and automatically by the data upload after process in Cloud Server, and by note, the download address of Cloud Server is sent in safe mobile phone;
Super chase module, after user by selecting activated equipment manager, native system just has super chase function, comprises the machine factory reset and screen locking encryption function;
The realization of described Sim card protection mode comprises:
Data dump module and data enciphering back-up module, utilize Broadcast to monitor the Sim card operating state of mobile terminal, if listen to Sim card when being transferred to or change, according to default deletion strategy, implements the removing to corresponding data;
Number is followed the trail of and image post-back module, and user will pre-set a security number, is transferred to when listening to Sim card, and when inserting neocaine, then utilize SmsManager by the information of terminal positional information and new Sim card to this security number; Even if do not insert new Sim card, online can be connected as long as monitor, system call locating module obtains current location information, utilize intent.setAction to mourn in silence startup camera simultaneously, after the some user's head portraits of continuous shooting, then positional information and image are passed to the Cloud Server of specifying by network, then chained address by short message sending to the security number of specifying;
User can carry out hanging up or send note operation to this terminal accordingly, realize that mobile phone is demanded, location tracking or data backup, deletion;
Super functional module: user by opening anti-uninstall function, then activated equipment manager, native system just has super functional mode; This is the control DevicePolicyManager class utilizing Android, activate the ACTION_ADD_DEVICE_ADMIN of ComponentName, thus allow native system obtain super function privilege, such permission user carries out higher level operation by short-message instruction or the Sim card trigger mechanism that presets to mobile terminal, comprises and forbids unloading this program, by the machine factory reset or screen locking encryption function;
Data enciphering back-up and recovery module: after mobile terminal receives message backup instruction, ContentProvider is utilized to obtain the data deposited in the local database, then vCard technology is utilized to back up, generate xml file, then zeroturnaround Efficient Compression technology is used to compress xml file, then RC4 encryption is carried out to the file after compression, encryption and decryption key is the login password of this software, then the file after compress-encrypt is stored in certain shelter local, when monitoring network automatically by this data upload in Cloud Server, and by note, the download address of Cloud Server is sent in safe mobile phone, when user needs to carry out data convert, backup data package is obtained from local or high in the clouds, import data, entry password is utilized to carry out RC4 deciphering, zeroturnaround is used to carry out decompress(ion) again, then use XmlPullaser technology to carry out content extraction, finally call ContentProvider and be put in system database, carry out the coupling of data stored in front meeting, if data exist, skip, otherwise stored in, realize data convert.
10. system according to claim 9, it is characterized in that: for the removing that note, contact person, message registration and designated software are data cached, by utilizing the interface command of the uri of the ContentProvider of system, thus obtain corresponding database information, then call delete command, realize the deletion of corresponding data; Removing SD card data is then the rm order utilizing linux, implements to delete the content of outside storage folder.
CN201510004737.5A 2015-01-07 2015-01-07 The method and system of mobile terminal significant data encrypted backup and safety deleting Active CN104540123B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510004737.5A CN104540123B (en) 2015-01-07 2015-01-07 The method and system of mobile terminal significant data encrypted backup and safety deleting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510004737.5A CN104540123B (en) 2015-01-07 2015-01-07 The method and system of mobile terminal significant data encrypted backup and safety deleting

Publications (2)

Publication Number Publication Date
CN104540123A true CN104540123A (en) 2015-04-22
CN104540123B CN104540123B (en) 2018-10-16

Family

ID=52855558

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510004737.5A Active CN104540123B (en) 2015-01-07 2015-01-07 The method and system of mobile terminal significant data encrypted backup and safety deleting

Country Status (1)

Country Link
CN (1) CN104540123B (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104834872A (en) * 2015-06-01 2015-08-12 上海斐讯数据通信技术有限公司 Mobile terminal antitheft control system and method
CN105426778A (en) * 2015-11-18 2016-03-23 罗满清 Information processing method and apparatus
CN105554083A (en) * 2015-12-11 2016-05-04 中南大学 Self-destruction method of intelligent terminal
CN105808379A (en) * 2016-02-26 2016-07-27 努比亚技术有限公司 Terminal backup method and terminal
CN106060796A (en) * 2016-06-01 2016-10-26 宇龙计算机通信科技(深圳)有限公司 Method and device for destroying backups of terminal
CN106161476A (en) * 2016-09-13 2016-11-23 成都创慧科达科技有限公司 A kind of security protection method and system of data in mobile phone
CN106294023A (en) * 2016-08-11 2017-01-04 深圳市金立通信设备有限公司 A kind of method of data backup and terminal
CN106529262A (en) * 2016-10-31 2017-03-22 维沃移动通信有限公司 Data protection method for mobile terminal and mobile terminal
CN106650488A (en) * 2016-10-13 2017-05-10 珠海格力电器股份有限公司 Mobile terminal information protection method and device
CN107172602A (en) * 2017-06-27 2017-09-15 上海展扬通信技术有限公司 The data security protection method and device of mobile terminal
CN107248969A (en) * 2016-06-13 2017-10-13 苏州海博智能系统有限公司 Safe encryption device Communication processing system and method
CN107277089A (en) * 2016-04-07 2017-10-20 大唐网络有限公司 The method that original information on smart mobile phone is thoroughly removed
WO2017185461A1 (en) * 2016-04-29 2017-11-02 宇龙计算机通信科技(深圳)有限公司 Method and system for recovering tampered key information of virtual subscriber identity module
CN108200276A (en) * 2017-12-27 2018-06-22 中国地质大学(武汉) A kind of smart mobile phone safety protecting method, equipment and storage device
CN108668260A (en) * 2018-04-17 2018-10-16 北京华大智宝电子系统有限公司 A kind of SIM card data self-destruction method, SIM card, device and server
CN108738012A (en) * 2018-05-08 2018-11-02 深圳市沃特沃德股份有限公司 Alternate device document method and terminal
CN109041059A (en) * 2018-08-23 2018-12-18 中国联合网络通信集团有限公司 A kind of mobile terminal safety authentication method, control platform and mobile terminal
CN109460648A (en) * 2018-11-13 2019-03-12 广东财经大学 A kind of computer data defence method
WO2019061383A1 (en) * 2017-09-30 2019-04-04 陈银芳 Data destruction method for smart phone and related product
CN109949478A (en) * 2019-03-21 2019-06-28 深圳神盾卫民警用设备有限公司 Card card destroying method, card card destroy equipment and readable storage medium storing program for executing
CN110032898A (en) * 2019-04-11 2019-07-19 Oppo广东移动通信有限公司 Data clearing method, device, electronic equipment and storage medium
CN110121172A (en) * 2019-05-15 2019-08-13 上海良相智能化工程有限公司 A kind of remote power feeding system applied to Android phone
CN111225378A (en) * 2018-11-27 2020-06-02 奇酷互联网络科技(深圳)有限公司 Intelligent wifi screening method, mobile terminal and terminal readable storage medium
CN111368282A (en) * 2020-02-28 2020-07-03 维沃移动通信有限公司 Information protection method and electronic equipment
CN116192847A (en) * 2023-02-01 2023-05-30 南京艾若博特信息技术有限公司 Block chain network dividing system adopting GPS positioning
CN116471129A (en) * 2023-06-20 2023-07-21 深圳市美力高集团有限公司 Security monitoring data secure storage system and method based on big data analysis

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2355892A (en) * 1999-07-30 2001-05-02 Sagem Method for putting a mobile telephone into service
CN1395407A (en) * 2001-07-05 2003-02-05 致福股份有限公司 Mobile telephone burglary-resisting design and its operation method
CN1434626A (en) * 2002-01-25 2003-08-06 英业达集团(上海)电子技术有限公司 Theft-proof device and method for mobile telephone
CN1602100A (en) * 2004-10-21 2005-03-30 康健 Method of backup of cell phone note based on STK or UTK tech
CN1694548A (en) * 2004-05-11 2005-11-09 天时达中科电子(深圳)有限公司 Method for preventing burglarious of mobile phone and anti-theft mobile phone
CN1859677A (en) * 2006-03-15 2006-11-08 华为技术有限公司 Method for protecting information safety in mobile terminal
CN101674583A (en) * 2009-08-25 2010-03-17 联信摩贝软件(北京)有限公司 Method for hiding or recovering personal information when changing SIM card and system thereof
CN102546242A (en) * 2011-12-23 2012-07-04 广东步步高电子工业有限公司 Cloud server based data backup and system recovery method and system utilizing same
CN102638565A (en) * 2012-02-27 2012-08-15 无锡华赛信息技术有限公司 Mobile phone cloud encryption backup and recovery method based on cloud architecture
CN103546555A (en) * 2013-10-21 2014-01-29 张力军 Method and system for data management of mobile terminal
CN103577763A (en) * 2012-07-24 2014-02-12 鸿富锦精密工业(深圳)有限公司 Mobile terminal device with data protection function and data protection method

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2355892A (en) * 1999-07-30 2001-05-02 Sagem Method for putting a mobile telephone into service
CN1395407A (en) * 2001-07-05 2003-02-05 致福股份有限公司 Mobile telephone burglary-resisting design and its operation method
CN1434626A (en) * 2002-01-25 2003-08-06 英业达集团(上海)电子技术有限公司 Theft-proof device and method for mobile telephone
CN1694548A (en) * 2004-05-11 2005-11-09 天时达中科电子(深圳)有限公司 Method for preventing burglarious of mobile phone and anti-theft mobile phone
CN1602100A (en) * 2004-10-21 2005-03-30 康健 Method of backup of cell phone note based on STK or UTK tech
CN1859677A (en) * 2006-03-15 2006-11-08 华为技术有限公司 Method for protecting information safety in mobile terminal
CN101674583A (en) * 2009-08-25 2010-03-17 联信摩贝软件(北京)有限公司 Method for hiding or recovering personal information when changing SIM card and system thereof
CN102546242A (en) * 2011-12-23 2012-07-04 广东步步高电子工业有限公司 Cloud server based data backup and system recovery method and system utilizing same
CN102638565A (en) * 2012-02-27 2012-08-15 无锡华赛信息技术有限公司 Mobile phone cloud encryption backup and recovery method based on cloud architecture
CN103577763A (en) * 2012-07-24 2014-02-12 鸿富锦精密工业(深圳)有限公司 Mobile terminal device with data protection function and data protection method
CN103546555A (en) * 2013-10-21 2014-01-29 张力军 Method and system for data management of mobile terminal

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104834872A (en) * 2015-06-01 2015-08-12 上海斐讯数据通信技术有限公司 Mobile terminal antitheft control system and method
CN105426778A (en) * 2015-11-18 2016-03-23 罗满清 Information processing method and apparatus
CN105554083A (en) * 2015-12-11 2016-05-04 中南大学 Self-destruction method of intelligent terminal
CN105808379A (en) * 2016-02-26 2016-07-27 努比亚技术有限公司 Terminal backup method and terminal
CN107277089A (en) * 2016-04-07 2017-10-20 大唐网络有限公司 The method that original information on smart mobile phone is thoroughly removed
WO2017185461A1 (en) * 2016-04-29 2017-11-02 宇龙计算机通信科技(深圳)有限公司 Method and system for recovering tampered key information of virtual subscriber identity module
CN106060796A (en) * 2016-06-01 2016-10-26 宇龙计算机通信科技(深圳)有限公司 Method and device for destroying backups of terminal
CN106060796B (en) * 2016-06-01 2018-12-25 宇龙计算机通信科技(深圳)有限公司 The backup destroying method and device of terminal
WO2017206250A1 (en) * 2016-06-01 2017-12-07 宇龙计算机通信科技(深圳)有限公司 Method and device for destroying backup of terminal
CN107248969A (en) * 2016-06-13 2017-10-13 苏州海博智能系统有限公司 Safe encryption device Communication processing system and method
CN106294023A (en) * 2016-08-11 2017-01-04 深圳市金立通信设备有限公司 A kind of method of data backup and terminal
CN106161476A (en) * 2016-09-13 2016-11-23 成都创慧科达科技有限公司 A kind of security protection method and system of data in mobile phone
CN106650488A (en) * 2016-10-13 2017-05-10 珠海格力电器股份有限公司 Mobile terminal information protection method and device
CN106529262A (en) * 2016-10-31 2017-03-22 维沃移动通信有限公司 Data protection method for mobile terminal and mobile terminal
CN107172602A (en) * 2017-06-27 2017-09-15 上海展扬通信技术有限公司 The data security protection method and device of mobile terminal
CN107172602B (en) * 2017-06-27 2021-08-10 上海展扬通信技术有限公司 Data security protection method and device for mobile terminal
WO2019061383A1 (en) * 2017-09-30 2019-04-04 陈银芳 Data destruction method for smart phone and related product
CN108200276A (en) * 2017-12-27 2018-06-22 中国地质大学(武汉) A kind of smart mobile phone safety protecting method, equipment and storage device
CN108668260A (en) * 2018-04-17 2018-10-16 北京华大智宝电子系统有限公司 A kind of SIM card data self-destruction method, SIM card, device and server
CN108668260B (en) * 2018-04-17 2021-12-24 北京华大智宝电子系统有限公司 SIM card data self-destruction method, SIM card, device and server
CN108738012A (en) * 2018-05-08 2018-11-02 深圳市沃特沃德股份有限公司 Alternate device document method and terminal
CN109041059A (en) * 2018-08-23 2018-12-18 中国联合网络通信集团有限公司 A kind of mobile terminal safety authentication method, control platform and mobile terminal
CN109460648B (en) * 2018-11-13 2021-06-22 广东财经大学 Computer data defense method
CN109460648A (en) * 2018-11-13 2019-03-12 广东财经大学 A kind of computer data defence method
CN111225378A (en) * 2018-11-27 2020-06-02 奇酷互联网络科技(深圳)有限公司 Intelligent wifi screening method, mobile terminal and terminal readable storage medium
CN111225378B (en) * 2018-11-27 2023-07-04 奇酷互联网络科技(深圳)有限公司 Intelligent wifi screening method, mobile terminal and terminal readable storage medium
CN109949478A (en) * 2019-03-21 2019-06-28 深圳神盾卫民警用设备有限公司 Card card destroying method, card card destroy equipment and readable storage medium storing program for executing
CN110032898A (en) * 2019-04-11 2019-07-19 Oppo广东移动通信有限公司 Data clearing method, device, electronic equipment and storage medium
CN110121172A (en) * 2019-05-15 2019-08-13 上海良相智能化工程有限公司 A kind of remote power feeding system applied to Android phone
CN111368282A (en) * 2020-02-28 2020-07-03 维沃移动通信有限公司 Information protection method and electronic equipment
CN116192847A (en) * 2023-02-01 2023-05-30 南京艾若博特信息技术有限公司 Block chain network dividing system adopting GPS positioning
CN116471129A (en) * 2023-06-20 2023-07-21 深圳市美力高集团有限公司 Security monitoring data secure storage system and method based on big data analysis

Also Published As

Publication number Publication date
CN104540123B (en) 2018-10-16

Similar Documents

Publication Publication Date Title
CN104540123A (en) Encryption backup and security deletion method and system for important data of mobile terminal
CN101252703B (en) Terminal data protecting method, system as well as mobile communication terminal
CN103647784B (en) A kind of method and apparatus of public and private isolation
CN101616495A (en) The method and system of individual privacy in the protection mobile phone
CN102497633A (en) Protection method for private information in cellphones
US20170264614A1 (en) Security control method for social network user, social application device and terminal
CN103390026A (en) Mobile intelligent terminal security browser and working method thereof
CN102932540A (en) Mobile terminal and stealing prevention method thereof
EP2835997B1 (en) Cell phone data encryption method and decryption method
CN102132526A (en) Privacy management for tracked devices
CN104035891A (en) Android mobile terminal data security protection system
CN102495983A (en) Method for encrypting and decrypting data of intelligent mobile terminal in real time
CN104346579A (en) Method, device and system for protecting private information of mobile terminal
CN103077357A (en) Method for storing private files
CN106357678A (en) Cloud encryption storage method for intelligent terminal and intelligent terminal
CN106161476A (en) A kind of security protection method and system of data in mobile phone
CN109063494A (en) A kind of information of mobile terminal security protection system and means of defence
CN105187640A (en) Anti-theft method and system of mobile terminal
US11281759B2 (en) Segmented key authentication system
CN108200276A (en) A kind of smart mobile phone safety protecting method, equipment and storage device
CN104537311A (en) Terminal system control method and device, and terminal
US10489251B2 (en) Network backup
CN101651742A (en) Method and system for monitoring mobile phone
WO2010067263A2 (en) A system for protection and backup of information in a mobile cell unit
CN105307135A (en) Mobile terminal and information protection method thereof

Legal Events

Date Code Title Description
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 350108 Room 132, 1st Floor, Innovation Park, Haixi Hi-tech Industrial Park, Fujian Province

Applicant after: North Carolina Technology Co., Ltd.

Address before: 350108 Room 132, 1st Floor, Innovation Park, Haixi Hi-tech Industrial Park, Fujian Province

Applicant before: FUZHOU NORCATECH CO., LTD.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant