CN104902468B - Unlocking method, tripper and the terminal of communication module - Google Patents

Unlocking method, tripper and the terminal of communication module Download PDF

Info

Publication number
CN104902468B
CN104902468B CN201510217315.6A CN201510217315A CN104902468B CN 104902468 B CN104902468 B CN 104902468B CN 201510217315 A CN201510217315 A CN 201510217315A CN 104902468 B CN104902468 B CN 104902468B
Authority
CN
China
Prior art keywords
communication module
security level
terminal
modules
destinations traffic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510217315.6A
Other languages
Chinese (zh)
Other versions
CN104902468A (en
Inventor
王健
叶志远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510217315.6A priority Critical patent/CN104902468B/en
Publication of CN104902468A publication Critical patent/CN104902468A/en
Application granted granted Critical
Publication of CN104902468B publication Critical patent/CN104902468B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention proposes a kind of unlocking method of communication module, a kind of tripper of communication module and a kind of terminals, wherein, the unlocking method of communication module includes: to judge whether there is other destinations traffic modules when any communication module in multiple communication modules receives target Personal Unlocking Key and be not unlocked;When the judgment result is No, if target Personal Unlocking Key is correct, then unlock any communication module, when the judgment result is yes, forbid unlocking any communication module, wherein, other destinations traffic modules are the communication module in multiple communication modules in addition to any communication module, and the security level of other destinations traffic modules is lower than the security level of any communication module.According to the technical solution of the present invention, secure decryption can be carried out to each communication module in the terminal for being equipped with multiple communication modules (such as SIM card, UIM card), with the safety for the data for ensuring to store in each communication module.

Description

Unlocking method, tripper and the terminal of communication module
Technical field
The present invention relates to field of terminal technology, unlocking method, a kind of communication mould in particular to a kind of communication module The tripper of block and a kind of terminal.
Background technique
Currently, on mobile phone there are it is various to SIM (Subscriber Identity Module, subscriber identification card), The method that UIM (User Identity Module, Subscriber Identity Module) is decrypted, such as: pass through password, fingerprint, head portrait etc. SIM or UIM card is decrypted, after decryption, can just check the data stored in SIM or UIM card.But currently, not The scheme that secure decryption is carried out to multiple SIM or UIM card, does not effectively ensure that the data stored in every SIM or UIM card The scheme of safety.
Therefore, how to each communication mould in the terminal for being equipped with multiple communication modules (such as SIM card, UIM card) into Row secure decryption becomes urgent problem to be solved with the safety for the data for ensuring to store in each communication module.
Summary of the invention
The present invention is based on the above problems, proposes a kind of new technical solution, can be to being equipped with multiple communication moulds Each communication module in the terminal of block (such as SIM card, UIM card) carries out secure decryption, to ensure to deposit in each communication module The safety of the data of storage.
In view of this, an aspect of of the present present invention proposes a kind of unlocking method of communication module, it is multiple logical for being equipped with Believe the terminal of module, comprising: when any communication module in the multiple communication module receives target Personal Unlocking Key, judgement It is not unlocked with the presence or absence of other destinations traffic modules;When the judgment result is No, it if the target Personal Unlocking Key is correct, solves Any communication module is locked, when the judgment result is yes, forbids unlocking any communication module, wherein other described mesh Communication module is marked as the communication module in the multiple communication module in addition to any communication module, and other described targets The security level of communication module is lower than the security level of any communication module.
In the technical scheme, when any communication module in multiple communication modules in terminal receive target unlock it is close When key, if other destinations traffic modules in terminal there is no security level lower than any communication module are not decrypted, permit Perhaps any communication module is unlocked, and when target Personal Unlocking Key is correct, unlocks any communication module, so that this Pre-stored information in one communication module may be displayed in terminal, so that user checks and operates;Certainly, if existing in terminal Security level is not decrypted lower than other destinations traffic modules of any communication module, then forbid to any communication module into Row unlock, with other destinations traffic modules of security level lower than any communication module according to security level from low to high After sequence is successively decrypted, just user is allowed to unlock any communication module, may insure that only security level is lower in this way After communication module is unlocked, the higher communication module of security level can be just solved, and fully ensure that security level is higher The safety of pre-stored data in communication module prevents the pre-stored data in the higher communication module of security level from being let out Leakage.
In the above-mentioned technical solutions, it is preferable that further include: if there are other destinations traffic moulds in the multiple communication module Block is not unlocked, then when the target Personal Unlocking Key is correct, still prompts the target Personal Unlocking Key mistake;And when described When other destinations traffic modules are multiple, if being sequentially received other multiple described mesh according to the sequence of security level from low to high The correct Personal Unlocking Key for marking each of communication module other destinations traffic modules, then allow to unlock any communication Module, to unlock any communication module when the target Personal Unlocking Key is correct.
In the technical scheme, when any communication module in multiple communication modules in terminal is decrypted, if Other destinations traffic modules in terminal there are security level lower than any communication module are not decrypted, even if then terminal receives To the correct target Personal Unlocking Key of any communication module, terminal still can prompt user's target Personal Unlocking Key mistake, this It, also can not be to any communication mould even if allowing for the correct target Personal Unlocking Key that illegal user knows any communication module Block is unlocked, and also illegally can not check or operate the pre-stored data in any communication module, and only when user according to The sequence of security level from low to high successively carries out other destinations traffic modules of each of other multiple destinations traffic modules Unlock (i.e. terminal according to the sequence of security level from low to high be sequentially received each of other multiple destinations traffic modules its The correct Personal Unlocking Key of his destinations traffic module) after, and after inputting the correct target Personal Unlocking Key of any communication module, Any communication module could be unlocked, successfully so as to substantially ensure the pre-stored number in the higher communication module of security level According to safety, prevent the pre-stored data in the higher communication module of security level to be compromised.
In the above-mentioned technical solutions, it is preferable that further include: it is close that the target unlock is received in any communication module Before key, the display icon of any communication module is hidden.
In the technical scheme, target Personal Unlocking Key is received in any communication module, before being unlocked, by hiding The display icon of any communication module, illegal user can be made to have no way of finding out about it in terminal several communication modules on earth, in this way Illegal user would not be made to attempt to crack the decruption key of each communication module, further enhanced in each communication module The safety of pre-stored data, certainly, before user is not unlocked any communication module, any communication module is aobvious Show content for sky, any with that cannot check per family, which further enhances the safeties of data.
In the above-mentioned technical solutions, it is preferable that further include: when any communication module is not unlocked, if receiving The target information of any communication module, then do not show the target information, so that the user of the terminal can not pass through institute Target information described in the current operation interface processing of terminal is stated, and the target information is stored to any communication module.
In the technical scheme, when any communication module is not unlocked, even if receiving the mesh of any communication module Mark information such as send a telegram here, short message, QQ message, the current interface of terminal will not show the target information, but the target is believed Breath is stored automatically in any communication module, can prevent illegal user from checking or illegal operation these target informations in this way, And it is only just shown, when legitimate user unlocks any communication module so that legitimate user is handled.
In the above-mentioned technical solutions, it is preferable that be the multiple communication mould according to the security level setting command received Security level, or the master according to each communication module default in the multiple communication module is arranged in each communication module in block Secondary relationship determines the security level of each communication module.
In the technical scheme, user can be according to the pre-stored data in personal use habit or each communication module Security level is followed successively by each communication module setting security level, so that the safety of the pre-stored data in each communication module It is effectively ensured, certainly, the major-minor relationship that terminal can also be defaulted according to each communication module determines each communication module Security level, for example, the security level of main card be higher than vice card security level.
Another aspect of the present invention proposes a kind of tripper of communication module, for being equipped with multiple communication modules Terminal, comprising: judging unit is sentenced when any communication module in the multiple communication module receives target Personal Unlocking Key It is disconnected not to be unlocked with the presence or absence of other destinations traffic modules;Processing unit, when the judgment result is No, and target unlock is close Key is correct, then unlocks any communication module, when the judgment result is yes, forbids unlocking any communication module, wherein Other described destinations traffic modules are communication module in addition to any communication module in the multiple communication module, and institute The security level for stating other destinations traffic modules is lower than the security level of any communication module.
In the technical scheme, when any communication module in multiple communication modules in terminal receive target unlock it is close When key, if other destinations traffic modules in terminal there is no security level lower than any communication module are not decrypted, permit Perhaps any communication module is unlocked, and when target Personal Unlocking Key is correct, unlocks any communication module, so that this Pre-stored information in one communication module may be displayed in terminal, so that user checks and operates;Certainly, if existing in terminal Security level is not decrypted lower than other destinations traffic modules of any communication module, then forbid to any communication module into Row unlock, with other destinations traffic modules of security level lower than any communication module according to security level from low to high After sequence is successively decrypted, just user is allowed to unlock any communication module, may insure that only security level is lower in this way After communication module is unlocked, the higher communication module of security level can be just solved, and fully ensure that security level is higher The safety of pre-stored data in communication module prevents the pre-stored data in the higher communication module of security level from being let out Leakage.
In the above-mentioned technical solutions, it is preferable that further include: prompt unit, if there are other in the multiple communication module Destinations traffic module is not unlocked, then when the target Personal Unlocking Key is correct, still prompts the target Personal Unlocking Key mistake; And the processing unit is also used to: when other described destinations traffic modules are multiple, if from low to high according to security level Sequence be sequentially received the correct of each of other multiple described destinations traffic modules other destinations traffic modules Personal Unlocking Key then allows to unlock any communication module, described any logical to unlock when the target Personal Unlocking Key is correct Believe module.
In the technical scheme, when any communication module in multiple communication modules in terminal is decrypted, if Other destinations traffic modules in terminal there are security level lower than any communication module are not decrypted, even if then terminal receives To the correct target Personal Unlocking Key of any communication module, terminal still can prompt user's target Personal Unlocking Key mistake, this It, also can not be to any communication mould even if allowing for the correct target Personal Unlocking Key that illegal user knows any communication module Block is unlocked, and also illegally can not check or operate the pre-stored data in any communication module, and only when user according to The sequence of security level from low to high successively carries out other destinations traffic modules of each of other multiple destinations traffic modules Unlock (i.e. terminal according to the sequence of security level from low to high be sequentially received each of other multiple destinations traffic modules its The correct Personal Unlocking Key of his destinations traffic module) after, and after inputting the correct target Personal Unlocking Key of any communication module, Any communication module could be unlocked, successfully so as to substantially ensure the pre-stored number in the higher communication module of security level According to safety, prevent the pre-stored data in the higher communication module of security level to be compromised.
In the above-mentioned technical solutions, it is preferable that further include: hidden unit receives described in any communication module Before target Personal Unlocking Key, the display icon of any communication module is hidden.
In the technical scheme, target Personal Unlocking Key is received in any communication module, before being unlocked, by hiding The display icon of any communication module, illegal user can be made to have no way of finding out about it in terminal several communication modules on earth, in this way Illegal user would not be made to attempt to crack the decruption key of each communication module, further enhanced in each communication module The safety of pre-stored data, certainly, before user is not unlocked any communication module, any communication module is aobvious Show content for sky, even legitimate user can not check.
In the above-mentioned technical solutions, it is preferable that the processing unit is also used to: when any communication module is not unlocked When, if receiving the target information of any communication module, the target information is not shown, so that the user of the terminal Can not target information described in the current operation interface processing by the terminal, and the target information is stored to described any Communication module.
In the technical scheme, target Personal Unlocking Key is received in any communication module, before being unlocked, by hiding The display icon of any communication module, illegal user can be made to have no way of finding out about it in terminal several communication modules on earth, in this way Illegal user would not be made to attempt to crack the decruption key of each communication module, further enhanced in each communication module The safety of pre-stored data, certainly, before user is not unlocked any communication module, any communication module is aobvious Show content for sky, any with that cannot check per family, which further enhances the safeties of data.
In the above-mentioned technical solutions, it is preferable that the processing unit is also used to: according to the security level setting life received It enables, is each communication module setting security level in the multiple communication module, or according in the multiple communication module The major-minor relationship of each communication module default, determines the security level of each communication module.
In the technical scheme, user can be according to the pre-stored data in personal use habit or each communication module Security level is followed successively by each communication module setting security level, so that the safety of the pre-stored data in each communication module It is effectively ensured, certainly, the major-minor relationship that terminal can also be defaulted according to each communication module determines each communication module Security level, for example, the security level of main card be higher than vice card security level.
Another aspect of the present invention proposes a kind of terminal, comprising: the communication as described in any one of above-mentioned technical proposal The tripper of module.
It in the technical scheme, can be multiple logical to being equipped with by installing the tripper of communication module at the terminal Believe that each communication module in the terminal of module (such as SIM card, UIM card) carries out secure decryption, to ensure each communication module The safety of the data of middle storage.
It according to the technical solution of the present invention, can be to the terminal for being equipped with multiple communication modules (such as SIM card, UIM card) On each communication module carry out secure decryption, with the safety for the data for ensuring to store in each communication module.
Detailed description of the invention
Fig. 1 shows the flow diagram of the unlocking method of communication module according to an embodiment of the invention;
Fig. 2 shows the structural schematic diagrams of the tripper of communication module according to an embodiment of the invention;
Fig. 3 shows the structural schematic diagram of terminal according to an embodiment of the invention;
Fig. 4 shows the flow diagram of the unlocking method of communication module according to another embodiment of the invention.
Specific embodiment
It is with reference to the accompanying drawing and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
Fig. 1 shows the flow diagram of the unlocking method of communication module according to an embodiment of the invention.
As shown in Figure 1, showing the unlocking method of the communication module of one embodiment of the present of invention, comprising: step 102, When any communication module in the multiple communication module receives target Personal Unlocking Key, it is logical to judge whether there is other targets Letter module is not unlocked;Step 104, when the judgment result is No, and the target Personal Unlocking Key is correct, then unlocks described any Communication module forbids unlocking any communication module when the judgment result is yes, wherein other described destinations traffic modules For the communication module in the multiple communication module in addition to any communication module, and other destinations traffic modules Security level is lower than the security level of any communication module.
In the technical scheme, when any communication module in multiple communication modules in terminal receive target unlock it is close When key, if other destinations traffic modules in terminal there is no security level lower than any communication module are not decrypted, permit Perhaps any communication module is unlocked, and when target Personal Unlocking Key is correct, unlocks any communication module, so that this Pre-stored information in one communication module may be displayed in terminal, so that user checks and operates;Certainly, if existing in terminal Security level is not decrypted lower than other destinations traffic modules of any communication module, then forbid to any communication module into Row unlock, with other destinations traffic modules of security level lower than any communication module according to security level from low to high After sequence is successively decrypted, just user is allowed to unlock any communication module, may insure that only security level is lower in this way After communication module is unlocked, the higher communication module of security level can be just solved, and fully ensure that security level is higher The safety of pre-stored data in communication module prevents the pre-stored data in the higher communication module of security level from being let out Leakage.
In the above-mentioned technical solutions, it is preferable that further include: if there are other destinations traffic moulds in the multiple communication module Block is not unlocked, then when the target Personal Unlocking Key is correct, still prompts the target Personal Unlocking Key mistake;And when described When other destinations traffic modules are multiple, if being sequentially received other multiple described mesh according to the sequence of security level from low to high The correct Personal Unlocking Key for marking each of communication module other destinations traffic modules, then allow to unlock any communication Module, to unlock any communication module when the target Personal Unlocking Key is correct.
In the technical scheme, when any communication module in multiple communication modules in terminal is decrypted, if Other destinations traffic modules in terminal there are security level lower than any communication module are not decrypted, even if then terminal receives To the correct target Personal Unlocking Key of any communication module, terminal still can prompt user's target Personal Unlocking Key mistake, this It, also can not be to any communication mould even if allowing for the correct target Personal Unlocking Key that illegal user knows any communication module Block is unlocked, and also illegally can not check or operate the pre-stored data in any communication module, and only when user according to The sequence of security level from low to high successively carries out other destinations traffic modules of each of other multiple destinations traffic modules Unlock (i.e. terminal according to the sequence of security level from low to high be sequentially received each of other multiple destinations traffic modules its The correct Personal Unlocking Key of his destinations traffic module) after, and after inputting the correct target Personal Unlocking Key of any communication module, Any communication module could be unlocked, successfully so as to substantially ensure the pre-stored number in the higher communication module of security level According to safety, prevent the pre-stored data in the higher communication module of security level to be compromised.
In the above-mentioned technical solutions, it is preferable that further include: it is close that the target unlock is received in any communication module Before key, the display icon of any communication module is hidden.
In the technical scheme, target Personal Unlocking Key is received in any communication module, before being unlocked, by hiding The display icon of any communication module, illegal user can be made to have no way of finding out about it in terminal several communication modules on earth, in this way Illegal user would not be made to attempt to crack the decruption key of each communication module, further enhanced in each communication module The safety of pre-stored data, certainly, before user is not unlocked any communication module, any communication module is aobvious Show content for sky, any with that cannot check per family, which further enhances the safeties of data.
In the above-mentioned technical solutions, it is preferable that further include: when any communication module is not unlocked, if receiving The target information of any communication module, then do not show the target information, so that the user of the terminal can not pass through institute Target information described in the current operation interface processing of terminal is stated, and the target information is stored to any communication module.
In the technical scheme, when any communication module is not unlocked, even if receiving the mesh of any communication module Mark information such as send a telegram here, short message, QQ message, the current interface of terminal will not show the target information, but the target is believed Breath is stored automatically in any communication module, can prevent illegal user from checking or illegal operation these target informations in this way, And it is only just shown, when legitimate user unlocks any communication module so that legitimate user is handled.
In the above-mentioned technical solutions, it is preferable that be the multiple communication mould according to the security level setting command received Security level, or the master according to each communication module default in the multiple communication module is arranged in each communication module in block Secondary relationship determines the security level of each communication module.
In the technical scheme, user can be according to the pre-stored data in personal use habit or each communication module Security level is followed successively by each communication module setting security level, so that the safety of the pre-stored data in each communication module It is effectively ensured, certainly, the major-minor relationship that terminal can also be defaulted according to each communication module determines each communication module Security level, for example, the security level of main card be higher than vice card security level.
Fig. 2 shows the structural schematic diagrams of the tripper of communication module according to an embodiment of the invention.
As shown in Fig. 2, showing the tripper 200 of the communication module of one embodiment of the present of invention, comprising: judgement is single Member 202, when any communication module in the multiple communication module receives target Personal Unlocking Key, judges whether there is other Destinations traffic module is not unlocked;Processing unit 204, when the judgment result is No, and the target Personal Unlocking Key is correct, then solves Any communication module is locked, when the judgment result is yes, forbids unlocking any communication module, wherein other described mesh Communication module is marked as the communication module in the multiple communication module in addition to any communication module, and other described targets The security level of communication module is lower than the security level of any communication module.
In the technical scheme, when any communication module in multiple communication modules in terminal receive target unlock it is close When key, if other destinations traffic modules in terminal there is no security level lower than any communication module are not decrypted, permit Perhaps any communication module is unlocked, and when target Personal Unlocking Key is correct, unlocks any communication module, so that this Pre-stored information in one communication module may be displayed in terminal, so that user checks and operates;Certainly, if existing in terminal Security level is not decrypted lower than other destinations traffic modules of any communication module, then forbid to any communication module into Row unlock, with other destinations traffic modules of security level lower than any communication module according to security level from low to high After sequence is successively decrypted, just user is allowed to unlock any communication module, may insure that only security level is lower in this way After communication module is unlocked, the higher communication module of security level can be just solved, and fully ensure that security level is higher The safety of pre-stored data in communication module prevents the pre-stored data in the higher communication module of security level from being let out Leakage.
In the above-mentioned technical solutions, it is preferable that further include: prompt unit 206, if there are it in the multiple communication module He is not unlocked destinations traffic module, then when the target Personal Unlocking Key is correct, still prompts the target Personal Unlocking Key wrong Accidentally;And the processing unit 204 is also used to: when other described destinations traffic modules be it is multiple when, if according to security level from Low to high sequence is sequentially received each of multiple other destinations traffic modules other destinations traffic modules Correct Personal Unlocking Key then allows to unlock any communication module, with when the target Personal Unlocking Key is correct, described in unlock Any communication module.
In the technical scheme, when any communication module in multiple communication modules in terminal is decrypted, if Other destinations traffic modules in terminal there are security level lower than any communication module are not decrypted, even if then terminal receives To the correct target Personal Unlocking Key of any communication module, terminal still can prompt user's target Personal Unlocking Key mistake, this It, also can not be to any communication mould even if allowing for the correct target Personal Unlocking Key that illegal user knows any communication module Block is unlocked, and also illegally can not check or operate the pre-stored data in any communication module, and only when user according to The sequence of security level from low to high successively carries out other destinations traffic modules of each of other multiple destinations traffic modules Unlock (i.e. terminal according to the sequence of security level from low to high be sequentially received each of other multiple destinations traffic modules its The correct Personal Unlocking Key of his destinations traffic module) after, and after inputting the correct target Personal Unlocking Key of any communication module, Any communication module could be unlocked, successfully so as to substantially ensure the pre-stored number in the higher communication module of security level According to safety, prevent the pre-stored data in the higher communication module of security level to be compromised.
In the above-mentioned technical solutions, it is preferable that further include: hidden unit 208 receives institute in any communication module Before stating target Personal Unlocking Key, the display icon of any communication module is hidden.
In the technical scheme, target Personal Unlocking Key is received in any communication module, before being unlocked, by hiding The display icon of any communication module, illegal user can be made to have no way of finding out about it in terminal several communication modules on earth, in this way Illegal user would not be made to attempt to crack the decruption key of each communication module, further enhanced in each communication module The safety of pre-stored data, certainly, before user is not unlocked any communication module, any communication module is aobvious Show content for sky, even legitimate user can not check.
In the above-mentioned technical solutions, it is preferable that the processing unit 204 is also used to: when any communication module not by When unlock, if receiving the target information of any communication module, the target information is not shown, so that the terminal User can not target information described in the current operation interface processing by the terminal, and the target information is stored to described Any communication module.
In the technical scheme, target Personal Unlocking Key is received in any communication module, before being unlocked, by hiding The display icon of any communication module, illegal user can be made to have no way of finding out about it in terminal several communication modules on earth, in this way Illegal user would not be made to attempt to crack the decruption key of each communication module, further enhanced in each communication module The safety of pre-stored data, certainly, before user is not unlocked any communication module, any communication module is aobvious Show content for sky, any with that cannot check per family, which further enhances the safeties of data.
In the above-mentioned technical solutions, it is preferable that the processing unit 204 is also used to: being set according to the security level received Order is set, is each communication module setting security level in the multiple communication module, or according to the multiple communication module In each communication module default major-minor relationship, determine the security level of each communication module.
In the technical scheme, user can be according to the pre-stored data in personal use habit or each communication module Security level is followed successively by each communication module setting security level, so that the safety of the pre-stored data in each communication module It is effectively ensured, certainly, the major-minor relationship that terminal can also be defaulted according to each communication module determines each communication module Security level, for example, the security level of main card be higher than vice card security level.
Fig. 3 shows the structural schematic diagram of terminal according to an embodiment of the invention.
As shown in figure 3, showing the terminal 300 of one embodiment of the present of invention, comprising: as any in above-mentioned technical proposal The tripper 200 of communication module described in.
It in the technical scheme, can be to being equipped with by installing the tripper 200 of communication module in terminal 300 Each communication module in the terminal of multiple communication modules (such as SIM card, UIM card) carries out secure decryption, each logical to ensure The safety of the data stored in letter module.
Fig. 4 shows the flow diagram of the unlocking method of communication module according to another embodiment of the invention.
As shown in figure 4, showing the unlocking method of the communication module of another embodiment of the invention, comprising:
Step 402, the unlock priority i.e. security level of every SIM card, the lower explanation SIM card of unlock priority are configured Security level it is higher.
Step 404, the unlock code of every SIM card is configured.
Step 406, opening terminal, (all SIM card informations are shown as " class privacy mode ", i.e., terminal does not show that inside has How many SIM card, and the content of every SIM card is sky, such illegal user would not attempt to crack the Personal Unlocking Key of SIM card ).
Step 408, judge whether user inputs SIM card unlocking pin, i.e., whether terminal receives unlocking pin, if so, Then follow the steps 410;Otherwise, directly terminate.
Step 410, judge the Personal Unlocking Key received whether be the first SIM card the first SIM card unlock code, if so, Execute step 412;Otherwise, execute step 422 (in addition, in the present embodiment, the safety of the first SIM card, the second SIM card ... Grade is successively from low to high).
Step 412, if receiving correct first SIM card unlock code, unlock the first SIM card (in addition to the first SIM card, Other SIM cards still appear as " class privacy mode ").
Step 414, judge whether user inputs SIM card unlocking pin again, i.e., whether terminal receives unlocking pin, if It is to then follow the steps 416;Otherwise, directly terminate.
Step 416, judge the Personal Unlocking Key received whether be the second SIM card the second SIM card unlock code, if so, Execute step 418;Otherwise, step 422 is executed.
Step 418, if receiving correct second SIM card unlock code, the second SIM card (the first, second SIM card is unlocked Except, other are shown as " class privacy mode ").
Step 420, other SIM cards in terminal are successively unlocked according to above-mentioned steps.
Step 422, no matter unlock code correctness, prompt unlock code mistake.
Technical solution of the present invention is further described below:
Firstly, it is necessary to for every SIM card configuration preference level in multi-card terminal, such as the first SIM card, the second SIM card, third SIM card (wait its security level successively from low to high), in this way, user must first to the unlock of the first SIM card after, could be to second SIM card is unlocked, and user could be unlocked third SIM card after must unlocking to the second SIM card.
Secondly, user needs that unlock code is arranged for every SIM card.
Finally, when user opens a terminal (at this point, the information such as short message, multimedia message, wechat, address list in terminal all shown as Sky, certainly, the address list information for being stored in terminal local in order to facilitate user's a part can show that this is depended entirely on The setting of user) start unlock when, it is necessary to be unlocked from the first SIM card, after the first SIM card unlocks successfully, the 2nd SIM Information in card, third SIM card is shown as empty, and the identical effect of privacy mode may be implemented in this way.The rest may be inferred, when second After SIM card unlock, the information in third SIM card is shown as empty.Certainly, when user is not actively every SIM configuration safety etc. When grade, terminal acquiescently can configure security level, that is, priority, tool according to the major-minor relationship of main card, vice card for every SIM card Body process is to control security level of the security level higher than vice card of main card.
The technical scheme of the present invention has been explained in detail above with reference to the attached drawings, can be to being equipped with multiple communication module (such as SIM Card, UIM card etc.) terminal on each communication module carry out secure decryption, to ensure the data stored in each communication module Safety.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (11)

1. a kind of unlocking method of communication module, for being equipped with the terminal of multiple communication modules characterized by comprising
When any communication module in the multiple communication module receives target Personal Unlocking Key, safety etc. is judged whether there is Grade is not unlocked lower than other destinations traffic modules of the security level of any communication module;
When the judgment result is No, if the target Personal Unlocking Key is correct, any communication module is unlocked;
When the judgment result is yes, forbid unlocking any communication module, wherein other described destinations traffic modules are described Communication module in multiple communication modules in addition to any communication module.
2. the unlocking method of communication module according to claim 1, which is characterized in that further include:
If there are other destinations traffic modules not to be unlocked in the multiple communication module, when the target Personal Unlocking Key is correct When, still prompt the target Personal Unlocking Key mistake;And
When other described destinations traffic modules are multiple, if being sequentially received according to the sequence of security level from low to high multiple The correct Personal Unlocking Key of other destinations traffic modules described in each of other described destinations traffic modules then allows to unlock institute Any communication module is stated, to unlock any communication module when the target Personal Unlocking Key is correct.
3. the unlocking method of communication module according to claim 1, which is characterized in that further include:
Before any communication module receives the target Personal Unlocking Key, the display figure of any communication module is hidden Mark.
4. the unlocking method of communication module according to claim 1, which is characterized in that further include:
When any communication module is not unlocked, if receiving the target information of any communication module, do not show The target information, so that the user of the terminal can not the letter of target described in the current operation interface processing by the terminal Breath, and the target information is stored to any communication module.
5. the unlocking method of communication module according to any one of claim 1 to 4, which is characterized in that
It is each communication module setting safety etc. in the multiple communication module according to the security level setting command received Grade, or according to the major-minor relationship of each communication module default in the multiple communication module, determine each communication module Security level.
6. a kind of tripper of communication module, for being equipped with the terminal of multiple communication modules characterized by comprising
Judging unit judges whether when any communication module in the multiple communication module receives target Personal Unlocking Key Other destinations traffic modules there are security level lower than the security level of any communication module are not unlocked;
Processing unit if the target Personal Unlocking Key is correct, unlocks any communication module when the judgment result is No, When the judgment result is yes, forbid unlocking any communication module, wherein other described destinations traffic modules are the multiple Communication module in communication module in addition to any communication module.
7. the tripper of communication module according to claim 6, which is characterized in that further include:
Prompt unit, if there are other destinations traffic modules not to be unlocked in the multiple communication module, when the target solution When lock key is correct, the target Personal Unlocking Key mistake is still prompted;And
The processing unit is also used to:
When other described destinations traffic modules are multiple, if being sequentially received according to the sequence of security level from low to high multiple The correct Personal Unlocking Key of other destinations traffic modules described in each of other described destinations traffic modules then allows to unlock institute Any communication module is stated, to unlock any communication module when the target Personal Unlocking Key is correct.
8. the tripper of communication module according to claim 6, which is characterized in that further include:
Hidden unit hides any communication mould before any communication module receives the target Personal Unlocking Key The display icon of block.
9. the tripper of communication module according to claim 6, which is characterized in that
The processing unit is also used to:
When any communication module is not unlocked, if receiving the target information of any communication module, do not show The target information, so that the user of the terminal can not the letter of target described in the current operation interface processing by the terminal Breath, and the target information is stored to any communication module.
10. the tripper of communication module according to any one of claims 6 to 9, which is characterized in that
The processing unit is also used to:
It is each communication module setting safety etc. in the multiple communication module according to the security level setting command received Grade, or according to the major-minor relationship of each communication module default in the multiple communication module, determine each communication module Security level.
11. a kind of terminal characterized by comprising the unlock of the communication module as described in any one of claim 6 to 10 fills It sets.
CN201510217315.6A 2015-04-30 2015-04-30 Unlocking method, tripper and the terminal of communication module Active CN104902468B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510217315.6A CN104902468B (en) 2015-04-30 2015-04-30 Unlocking method, tripper and the terminal of communication module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510217315.6A CN104902468B (en) 2015-04-30 2015-04-30 Unlocking method, tripper and the terminal of communication module

Publications (2)

Publication Number Publication Date
CN104902468A CN104902468A (en) 2015-09-09
CN104902468B true CN104902468B (en) 2018-12-25

Family

ID=54034808

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510217315.6A Active CN104902468B (en) 2015-04-30 2015-04-30 Unlocking method, tripper and the terminal of communication module

Country Status (1)

Country Link
CN (1) CN104902468B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114859833A (en) * 2022-04-26 2022-08-05 广州东焊智能装备有限公司 Production line robot integrated control system based on PLC

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101754467A (en) * 2008-12-22 2010-06-23 康佳集团股份有限公司 Realizing method of privacy protection for dual-card cell phone
CN102137389A (en) * 2011-03-18 2011-07-27 惠州Tcl移动通信有限公司 Multi-card mobile terminal and method for transferring data of SIM card
CN102137388A (en) * 2011-03-10 2011-07-27 惠州Tcl移动通信有限公司 Mobile telephone and data processing method thereof
CN103583067A (en) * 2011-05-09 2014-02-12 诺基亚公司 SIM lock for multi-SIM environment
CN103781053A (en) * 2012-10-26 2014-05-07 中兴通讯股份有限公司 Method, device and correlated terminal for locking network and module of multi-module mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101754467A (en) * 2008-12-22 2010-06-23 康佳集团股份有限公司 Realizing method of privacy protection for dual-card cell phone
CN102137388A (en) * 2011-03-10 2011-07-27 惠州Tcl移动通信有限公司 Mobile telephone and data processing method thereof
CN102137389A (en) * 2011-03-18 2011-07-27 惠州Tcl移动通信有限公司 Multi-card mobile terminal and method for transferring data of SIM card
CN103583067A (en) * 2011-05-09 2014-02-12 诺基亚公司 SIM lock for multi-SIM environment
CN103781053A (en) * 2012-10-26 2014-05-07 中兴通讯股份有限公司 Method, device and correlated terminal for locking network and module of multi-module mobile terminal

Also Published As

Publication number Publication date
CN104902468A (en) 2015-09-09

Similar Documents

Publication Publication Date Title
CN103728894B (en) The long-range control method of a kind of terminal unit and system
CN108093392B (en) Method for unlocking SIM card, mobile terminal and storage medium
CN104156644B (en) Multisystem entering method and device and terminal
US8718602B2 (en) Method and system for remote control of smart card
CN102131182B (en) Network locking method and device for mobile terminal
CN104537291A (en) Screen interface unlocking method and screen interface unlocking device
CN106101451A (en) SMS processing method, mobile terminal
CN103888607B (en) A kind of mobile terminal secret note inspection method and system
CN104660613B (en) The authentication method and electronic equipment of subscriber identification module
CN103404099A (en) Managing communication channels in a telecommunication device coupled to an NFC circuit
CN105809007A (en) Privacy protection method and device
CN104820805A (en) Method and device for burglary prevention of user identity identification card information
CN104902468B (en) Unlocking method, tripper and the terminal of communication module
CN111260831A (en) Intelligent door lock control device, method and system
CN105653918B (en) Method for safely carrying out, safe operating device and terminal
CN105069361A (en) Safety access method and system for privacy space
CN105516500B (en) Method and system for selecting equipment mode
CN101951570A (en) Short message box encrypting method for mobile phone and mobile phone
CN105787341A (en) Unlocking method and terminal
CN106453057B (en) A kind of method and terminal for preventing short message to be stolen
CN105072084B (en) The method for building up of mobile terminal and external equipment data connection
CN105635090B (en) System access method, system access mechanism and terminal
CN105787400A (en) Safety protection method and system based on mobile terminal
CN109859349A (en) A kind of entrance guard authentication method and system based on data SMS technology
US20090235333A1 (en) Automatic access control for mobile devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant