CN104902468B - Unlocking method, tripper and the terminal of communication module - Google Patents
Unlocking method, tripper and the terminal of communication module Download PDFInfo
- Publication number
- CN104902468B CN104902468B CN201510217315.6A CN201510217315A CN104902468B CN 104902468 B CN104902468 B CN 104902468B CN 201510217315 A CN201510217315 A CN 201510217315A CN 104902468 B CN104902468 B CN 104902468B
- Authority
- CN
- China
- Prior art keywords
- communication module
- security level
- terminal
- modules
- destinations traffic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention proposes a kind of unlocking method of communication module, a kind of tripper of communication module and a kind of terminals, wherein, the unlocking method of communication module includes: to judge whether there is other destinations traffic modules when any communication module in multiple communication modules receives target Personal Unlocking Key and be not unlocked;When the judgment result is No, if target Personal Unlocking Key is correct, then unlock any communication module, when the judgment result is yes, forbid unlocking any communication module, wherein, other destinations traffic modules are the communication module in multiple communication modules in addition to any communication module, and the security level of other destinations traffic modules is lower than the security level of any communication module.According to the technical solution of the present invention, secure decryption can be carried out to each communication module in the terminal for being equipped with multiple communication modules (such as SIM card, UIM card), with the safety for the data for ensuring to store in each communication module.
Description
Technical field
The present invention relates to field of terminal technology, unlocking method, a kind of communication mould in particular to a kind of communication module
The tripper of block and a kind of terminal.
Background technique
Currently, on mobile phone there are it is various to SIM (Subscriber Identity Module, subscriber identification card),
The method that UIM (User Identity Module, Subscriber Identity Module) is decrypted, such as: pass through password, fingerprint, head portrait etc.
SIM or UIM card is decrypted, after decryption, can just check the data stored in SIM or UIM card.But currently, not
The scheme that secure decryption is carried out to multiple SIM or UIM card, does not effectively ensure that the data stored in every SIM or UIM card
The scheme of safety.
Therefore, how to each communication mould in the terminal for being equipped with multiple communication modules (such as SIM card, UIM card) into
Row secure decryption becomes urgent problem to be solved with the safety for the data for ensuring to store in each communication module.
Summary of the invention
The present invention is based on the above problems, proposes a kind of new technical solution, can be to being equipped with multiple communication moulds
Each communication module in the terminal of block (such as SIM card, UIM card) carries out secure decryption, to ensure to deposit in each communication module
The safety of the data of storage.
In view of this, an aspect of of the present present invention proposes a kind of unlocking method of communication module, it is multiple logical for being equipped with
Believe the terminal of module, comprising: when any communication module in the multiple communication module receives target Personal Unlocking Key, judgement
It is not unlocked with the presence or absence of other destinations traffic modules;When the judgment result is No, it if the target Personal Unlocking Key is correct, solves
Any communication module is locked, when the judgment result is yes, forbids unlocking any communication module, wherein other described mesh
Communication module is marked as the communication module in the multiple communication module in addition to any communication module, and other described targets
The security level of communication module is lower than the security level of any communication module.
In the technical scheme, when any communication module in multiple communication modules in terminal receive target unlock it is close
When key, if other destinations traffic modules in terminal there is no security level lower than any communication module are not decrypted, permit
Perhaps any communication module is unlocked, and when target Personal Unlocking Key is correct, unlocks any communication module, so that this
Pre-stored information in one communication module may be displayed in terminal, so that user checks and operates;Certainly, if existing in terminal
Security level is not decrypted lower than other destinations traffic modules of any communication module, then forbid to any communication module into
Row unlock, with other destinations traffic modules of security level lower than any communication module according to security level from low to high
After sequence is successively decrypted, just user is allowed to unlock any communication module, may insure that only security level is lower in this way
After communication module is unlocked, the higher communication module of security level can be just solved, and fully ensure that security level is higher
The safety of pre-stored data in communication module prevents the pre-stored data in the higher communication module of security level from being let out
Leakage.
In the above-mentioned technical solutions, it is preferable that further include: if there are other destinations traffic moulds in the multiple communication module
Block is not unlocked, then when the target Personal Unlocking Key is correct, still prompts the target Personal Unlocking Key mistake;And when described
When other destinations traffic modules are multiple, if being sequentially received other multiple described mesh according to the sequence of security level from low to high
The correct Personal Unlocking Key for marking each of communication module other destinations traffic modules, then allow to unlock any communication
Module, to unlock any communication module when the target Personal Unlocking Key is correct.
In the technical scheme, when any communication module in multiple communication modules in terminal is decrypted, if
Other destinations traffic modules in terminal there are security level lower than any communication module are not decrypted, even if then terminal receives
To the correct target Personal Unlocking Key of any communication module, terminal still can prompt user's target Personal Unlocking Key mistake, this
It, also can not be to any communication mould even if allowing for the correct target Personal Unlocking Key that illegal user knows any communication module
Block is unlocked, and also illegally can not check or operate the pre-stored data in any communication module, and only when user according to
The sequence of security level from low to high successively carries out other destinations traffic modules of each of other multiple destinations traffic modules
Unlock (i.e. terminal according to the sequence of security level from low to high be sequentially received each of other multiple destinations traffic modules its
The correct Personal Unlocking Key of his destinations traffic module) after, and after inputting the correct target Personal Unlocking Key of any communication module,
Any communication module could be unlocked, successfully so as to substantially ensure the pre-stored number in the higher communication module of security level
According to safety, prevent the pre-stored data in the higher communication module of security level to be compromised.
In the above-mentioned technical solutions, it is preferable that further include: it is close that the target unlock is received in any communication module
Before key, the display icon of any communication module is hidden.
In the technical scheme, target Personal Unlocking Key is received in any communication module, before being unlocked, by hiding
The display icon of any communication module, illegal user can be made to have no way of finding out about it in terminal several communication modules on earth, in this way
Illegal user would not be made to attempt to crack the decruption key of each communication module, further enhanced in each communication module
The safety of pre-stored data, certainly, before user is not unlocked any communication module, any communication module is aobvious
Show content for sky, any with that cannot check per family, which further enhances the safeties of data.
In the above-mentioned technical solutions, it is preferable that further include: when any communication module is not unlocked, if receiving
The target information of any communication module, then do not show the target information, so that the user of the terminal can not pass through institute
Target information described in the current operation interface processing of terminal is stated, and the target information is stored to any communication module.
In the technical scheme, when any communication module is not unlocked, even if receiving the mesh of any communication module
Mark information such as send a telegram here, short message, QQ message, the current interface of terminal will not show the target information, but the target is believed
Breath is stored automatically in any communication module, can prevent illegal user from checking or illegal operation these target informations in this way,
And it is only just shown, when legitimate user unlocks any communication module so that legitimate user is handled.
In the above-mentioned technical solutions, it is preferable that be the multiple communication mould according to the security level setting command received
Security level, or the master according to each communication module default in the multiple communication module is arranged in each communication module in block
Secondary relationship determines the security level of each communication module.
In the technical scheme, user can be according to the pre-stored data in personal use habit or each communication module
Security level is followed successively by each communication module setting security level, so that the safety of the pre-stored data in each communication module
It is effectively ensured, certainly, the major-minor relationship that terminal can also be defaulted according to each communication module determines each communication module
Security level, for example, the security level of main card be higher than vice card security level.
Another aspect of the present invention proposes a kind of tripper of communication module, for being equipped with multiple communication modules
Terminal, comprising: judging unit is sentenced when any communication module in the multiple communication module receives target Personal Unlocking Key
It is disconnected not to be unlocked with the presence or absence of other destinations traffic modules;Processing unit, when the judgment result is No, and target unlock is close
Key is correct, then unlocks any communication module, when the judgment result is yes, forbids unlocking any communication module, wherein
Other described destinations traffic modules are communication module in addition to any communication module in the multiple communication module, and institute
The security level for stating other destinations traffic modules is lower than the security level of any communication module.
In the technical scheme, when any communication module in multiple communication modules in terminal receive target unlock it is close
When key, if other destinations traffic modules in terminal there is no security level lower than any communication module are not decrypted, permit
Perhaps any communication module is unlocked, and when target Personal Unlocking Key is correct, unlocks any communication module, so that this
Pre-stored information in one communication module may be displayed in terminal, so that user checks and operates;Certainly, if existing in terminal
Security level is not decrypted lower than other destinations traffic modules of any communication module, then forbid to any communication module into
Row unlock, with other destinations traffic modules of security level lower than any communication module according to security level from low to high
After sequence is successively decrypted, just user is allowed to unlock any communication module, may insure that only security level is lower in this way
After communication module is unlocked, the higher communication module of security level can be just solved, and fully ensure that security level is higher
The safety of pre-stored data in communication module prevents the pre-stored data in the higher communication module of security level from being let out
Leakage.
In the above-mentioned technical solutions, it is preferable that further include: prompt unit, if there are other in the multiple communication module
Destinations traffic module is not unlocked, then when the target Personal Unlocking Key is correct, still prompts the target Personal Unlocking Key mistake;
And the processing unit is also used to: when other described destinations traffic modules are multiple, if from low to high according to security level
Sequence be sequentially received the correct of each of other multiple described destinations traffic modules other destinations traffic modules
Personal Unlocking Key then allows to unlock any communication module, described any logical to unlock when the target Personal Unlocking Key is correct
Believe module.
In the technical scheme, when any communication module in multiple communication modules in terminal is decrypted, if
Other destinations traffic modules in terminal there are security level lower than any communication module are not decrypted, even if then terminal receives
To the correct target Personal Unlocking Key of any communication module, terminal still can prompt user's target Personal Unlocking Key mistake, this
It, also can not be to any communication mould even if allowing for the correct target Personal Unlocking Key that illegal user knows any communication module
Block is unlocked, and also illegally can not check or operate the pre-stored data in any communication module, and only when user according to
The sequence of security level from low to high successively carries out other destinations traffic modules of each of other multiple destinations traffic modules
Unlock (i.e. terminal according to the sequence of security level from low to high be sequentially received each of other multiple destinations traffic modules its
The correct Personal Unlocking Key of his destinations traffic module) after, and after inputting the correct target Personal Unlocking Key of any communication module,
Any communication module could be unlocked, successfully so as to substantially ensure the pre-stored number in the higher communication module of security level
According to safety, prevent the pre-stored data in the higher communication module of security level to be compromised.
In the above-mentioned technical solutions, it is preferable that further include: hidden unit receives described in any communication module
Before target Personal Unlocking Key, the display icon of any communication module is hidden.
In the technical scheme, target Personal Unlocking Key is received in any communication module, before being unlocked, by hiding
The display icon of any communication module, illegal user can be made to have no way of finding out about it in terminal several communication modules on earth, in this way
Illegal user would not be made to attempt to crack the decruption key of each communication module, further enhanced in each communication module
The safety of pre-stored data, certainly, before user is not unlocked any communication module, any communication module is aobvious
Show content for sky, even legitimate user can not check.
In the above-mentioned technical solutions, it is preferable that the processing unit is also used to: when any communication module is not unlocked
When, if receiving the target information of any communication module, the target information is not shown, so that the user of the terminal
Can not target information described in the current operation interface processing by the terminal, and the target information is stored to described any
Communication module.
In the technical scheme, target Personal Unlocking Key is received in any communication module, before being unlocked, by hiding
The display icon of any communication module, illegal user can be made to have no way of finding out about it in terminal several communication modules on earth, in this way
Illegal user would not be made to attempt to crack the decruption key of each communication module, further enhanced in each communication module
The safety of pre-stored data, certainly, before user is not unlocked any communication module, any communication module is aobvious
Show content for sky, any with that cannot check per family, which further enhances the safeties of data.
In the above-mentioned technical solutions, it is preferable that the processing unit is also used to: according to the security level setting life received
It enables, is each communication module setting security level in the multiple communication module, or according in the multiple communication module
The major-minor relationship of each communication module default, determines the security level of each communication module.
In the technical scheme, user can be according to the pre-stored data in personal use habit or each communication module
Security level is followed successively by each communication module setting security level, so that the safety of the pre-stored data in each communication module
It is effectively ensured, certainly, the major-minor relationship that terminal can also be defaulted according to each communication module determines each communication module
Security level, for example, the security level of main card be higher than vice card security level.
Another aspect of the present invention proposes a kind of terminal, comprising: the communication as described in any one of above-mentioned technical proposal
The tripper of module.
It in the technical scheme, can be multiple logical to being equipped with by installing the tripper of communication module at the terminal
Believe that each communication module in the terminal of module (such as SIM card, UIM card) carries out secure decryption, to ensure each communication module
The safety of the data of middle storage.
It according to the technical solution of the present invention, can be to the terminal for being equipped with multiple communication modules (such as SIM card, UIM card)
On each communication module carry out secure decryption, with the safety for the data for ensuring to store in each communication module.
Detailed description of the invention
Fig. 1 shows the flow diagram of the unlocking method of communication module according to an embodiment of the invention;
Fig. 2 shows the structural schematic diagrams of the tripper of communication module according to an embodiment of the invention;
Fig. 3 shows the structural schematic diagram of terminal according to an embodiment of the invention;
Fig. 4 shows the flow diagram of the unlocking method of communication module according to another embodiment of the invention.
Specific embodiment
It is with reference to the accompanying drawing and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention
Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application
Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also
To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below
Specific embodiment limitation.
Fig. 1 shows the flow diagram of the unlocking method of communication module according to an embodiment of the invention.
As shown in Figure 1, showing the unlocking method of the communication module of one embodiment of the present of invention, comprising: step 102,
When any communication module in the multiple communication module receives target Personal Unlocking Key, it is logical to judge whether there is other targets
Letter module is not unlocked;Step 104, when the judgment result is No, and the target Personal Unlocking Key is correct, then unlocks described any
Communication module forbids unlocking any communication module when the judgment result is yes, wherein other described destinations traffic modules
For the communication module in the multiple communication module in addition to any communication module, and other destinations traffic modules
Security level is lower than the security level of any communication module.
In the technical scheme, when any communication module in multiple communication modules in terminal receive target unlock it is close
When key, if other destinations traffic modules in terminal there is no security level lower than any communication module are not decrypted, permit
Perhaps any communication module is unlocked, and when target Personal Unlocking Key is correct, unlocks any communication module, so that this
Pre-stored information in one communication module may be displayed in terminal, so that user checks and operates;Certainly, if existing in terminal
Security level is not decrypted lower than other destinations traffic modules of any communication module, then forbid to any communication module into
Row unlock, with other destinations traffic modules of security level lower than any communication module according to security level from low to high
After sequence is successively decrypted, just user is allowed to unlock any communication module, may insure that only security level is lower in this way
After communication module is unlocked, the higher communication module of security level can be just solved, and fully ensure that security level is higher
The safety of pre-stored data in communication module prevents the pre-stored data in the higher communication module of security level from being let out
Leakage.
In the above-mentioned technical solutions, it is preferable that further include: if there are other destinations traffic moulds in the multiple communication module
Block is not unlocked, then when the target Personal Unlocking Key is correct, still prompts the target Personal Unlocking Key mistake;And when described
When other destinations traffic modules are multiple, if being sequentially received other multiple described mesh according to the sequence of security level from low to high
The correct Personal Unlocking Key for marking each of communication module other destinations traffic modules, then allow to unlock any communication
Module, to unlock any communication module when the target Personal Unlocking Key is correct.
In the technical scheme, when any communication module in multiple communication modules in terminal is decrypted, if
Other destinations traffic modules in terminal there are security level lower than any communication module are not decrypted, even if then terminal receives
To the correct target Personal Unlocking Key of any communication module, terminal still can prompt user's target Personal Unlocking Key mistake, this
It, also can not be to any communication mould even if allowing for the correct target Personal Unlocking Key that illegal user knows any communication module
Block is unlocked, and also illegally can not check or operate the pre-stored data in any communication module, and only when user according to
The sequence of security level from low to high successively carries out other destinations traffic modules of each of other multiple destinations traffic modules
Unlock (i.e. terminal according to the sequence of security level from low to high be sequentially received each of other multiple destinations traffic modules its
The correct Personal Unlocking Key of his destinations traffic module) after, and after inputting the correct target Personal Unlocking Key of any communication module,
Any communication module could be unlocked, successfully so as to substantially ensure the pre-stored number in the higher communication module of security level
According to safety, prevent the pre-stored data in the higher communication module of security level to be compromised.
In the above-mentioned technical solutions, it is preferable that further include: it is close that the target unlock is received in any communication module
Before key, the display icon of any communication module is hidden.
In the technical scheme, target Personal Unlocking Key is received in any communication module, before being unlocked, by hiding
The display icon of any communication module, illegal user can be made to have no way of finding out about it in terminal several communication modules on earth, in this way
Illegal user would not be made to attempt to crack the decruption key of each communication module, further enhanced in each communication module
The safety of pre-stored data, certainly, before user is not unlocked any communication module, any communication module is aobvious
Show content for sky, any with that cannot check per family, which further enhances the safeties of data.
In the above-mentioned technical solutions, it is preferable that further include: when any communication module is not unlocked, if receiving
The target information of any communication module, then do not show the target information, so that the user of the terminal can not pass through institute
Target information described in the current operation interface processing of terminal is stated, and the target information is stored to any communication module.
In the technical scheme, when any communication module is not unlocked, even if receiving the mesh of any communication module
Mark information such as send a telegram here, short message, QQ message, the current interface of terminal will not show the target information, but the target is believed
Breath is stored automatically in any communication module, can prevent illegal user from checking or illegal operation these target informations in this way,
And it is only just shown, when legitimate user unlocks any communication module so that legitimate user is handled.
In the above-mentioned technical solutions, it is preferable that be the multiple communication mould according to the security level setting command received
Security level, or the master according to each communication module default in the multiple communication module is arranged in each communication module in block
Secondary relationship determines the security level of each communication module.
In the technical scheme, user can be according to the pre-stored data in personal use habit or each communication module
Security level is followed successively by each communication module setting security level, so that the safety of the pre-stored data in each communication module
It is effectively ensured, certainly, the major-minor relationship that terminal can also be defaulted according to each communication module determines each communication module
Security level, for example, the security level of main card be higher than vice card security level.
Fig. 2 shows the structural schematic diagrams of the tripper of communication module according to an embodiment of the invention.
As shown in Fig. 2, showing the tripper 200 of the communication module of one embodiment of the present of invention, comprising: judgement is single
Member 202, when any communication module in the multiple communication module receives target Personal Unlocking Key, judges whether there is other
Destinations traffic module is not unlocked;Processing unit 204, when the judgment result is No, and the target Personal Unlocking Key is correct, then solves
Any communication module is locked, when the judgment result is yes, forbids unlocking any communication module, wherein other described mesh
Communication module is marked as the communication module in the multiple communication module in addition to any communication module, and other described targets
The security level of communication module is lower than the security level of any communication module.
In the technical scheme, when any communication module in multiple communication modules in terminal receive target unlock it is close
When key, if other destinations traffic modules in terminal there is no security level lower than any communication module are not decrypted, permit
Perhaps any communication module is unlocked, and when target Personal Unlocking Key is correct, unlocks any communication module, so that this
Pre-stored information in one communication module may be displayed in terminal, so that user checks and operates;Certainly, if existing in terminal
Security level is not decrypted lower than other destinations traffic modules of any communication module, then forbid to any communication module into
Row unlock, with other destinations traffic modules of security level lower than any communication module according to security level from low to high
After sequence is successively decrypted, just user is allowed to unlock any communication module, may insure that only security level is lower in this way
After communication module is unlocked, the higher communication module of security level can be just solved, and fully ensure that security level is higher
The safety of pre-stored data in communication module prevents the pre-stored data in the higher communication module of security level from being let out
Leakage.
In the above-mentioned technical solutions, it is preferable that further include: prompt unit 206, if there are it in the multiple communication module
He is not unlocked destinations traffic module, then when the target Personal Unlocking Key is correct, still prompts the target Personal Unlocking Key wrong
Accidentally;And the processing unit 204 is also used to: when other described destinations traffic modules be it is multiple when, if according to security level from
Low to high sequence is sequentially received each of multiple other destinations traffic modules other destinations traffic modules
Correct Personal Unlocking Key then allows to unlock any communication module, with when the target Personal Unlocking Key is correct, described in unlock
Any communication module.
In the technical scheme, when any communication module in multiple communication modules in terminal is decrypted, if
Other destinations traffic modules in terminal there are security level lower than any communication module are not decrypted, even if then terminal receives
To the correct target Personal Unlocking Key of any communication module, terminal still can prompt user's target Personal Unlocking Key mistake, this
It, also can not be to any communication mould even if allowing for the correct target Personal Unlocking Key that illegal user knows any communication module
Block is unlocked, and also illegally can not check or operate the pre-stored data in any communication module, and only when user according to
The sequence of security level from low to high successively carries out other destinations traffic modules of each of other multiple destinations traffic modules
Unlock (i.e. terminal according to the sequence of security level from low to high be sequentially received each of other multiple destinations traffic modules its
The correct Personal Unlocking Key of his destinations traffic module) after, and after inputting the correct target Personal Unlocking Key of any communication module,
Any communication module could be unlocked, successfully so as to substantially ensure the pre-stored number in the higher communication module of security level
According to safety, prevent the pre-stored data in the higher communication module of security level to be compromised.
In the above-mentioned technical solutions, it is preferable that further include: hidden unit 208 receives institute in any communication module
Before stating target Personal Unlocking Key, the display icon of any communication module is hidden.
In the technical scheme, target Personal Unlocking Key is received in any communication module, before being unlocked, by hiding
The display icon of any communication module, illegal user can be made to have no way of finding out about it in terminal several communication modules on earth, in this way
Illegal user would not be made to attempt to crack the decruption key of each communication module, further enhanced in each communication module
The safety of pre-stored data, certainly, before user is not unlocked any communication module, any communication module is aobvious
Show content for sky, even legitimate user can not check.
In the above-mentioned technical solutions, it is preferable that the processing unit 204 is also used to: when any communication module not by
When unlock, if receiving the target information of any communication module, the target information is not shown, so that the terminal
User can not target information described in the current operation interface processing by the terminal, and the target information is stored to described
Any communication module.
In the technical scheme, target Personal Unlocking Key is received in any communication module, before being unlocked, by hiding
The display icon of any communication module, illegal user can be made to have no way of finding out about it in terminal several communication modules on earth, in this way
Illegal user would not be made to attempt to crack the decruption key of each communication module, further enhanced in each communication module
The safety of pre-stored data, certainly, before user is not unlocked any communication module, any communication module is aobvious
Show content for sky, any with that cannot check per family, which further enhances the safeties of data.
In the above-mentioned technical solutions, it is preferable that the processing unit 204 is also used to: being set according to the security level received
Order is set, is each communication module setting security level in the multiple communication module, or according to the multiple communication module
In each communication module default major-minor relationship, determine the security level of each communication module.
In the technical scheme, user can be according to the pre-stored data in personal use habit or each communication module
Security level is followed successively by each communication module setting security level, so that the safety of the pre-stored data in each communication module
It is effectively ensured, certainly, the major-minor relationship that terminal can also be defaulted according to each communication module determines each communication module
Security level, for example, the security level of main card be higher than vice card security level.
Fig. 3 shows the structural schematic diagram of terminal according to an embodiment of the invention.
As shown in figure 3, showing the terminal 300 of one embodiment of the present of invention, comprising: as any in above-mentioned technical proposal
The tripper 200 of communication module described in.
It in the technical scheme, can be to being equipped with by installing the tripper 200 of communication module in terminal 300
Each communication module in the terminal of multiple communication modules (such as SIM card, UIM card) carries out secure decryption, each logical to ensure
The safety of the data stored in letter module.
Fig. 4 shows the flow diagram of the unlocking method of communication module according to another embodiment of the invention.
As shown in figure 4, showing the unlocking method of the communication module of another embodiment of the invention, comprising:
Step 402, the unlock priority i.e. security level of every SIM card, the lower explanation SIM card of unlock priority are configured
Security level it is higher.
Step 404, the unlock code of every SIM card is configured.
Step 406, opening terminal, (all SIM card informations are shown as " class privacy mode ", i.e., terminal does not show that inside has
How many SIM card, and the content of every SIM card is sky, such illegal user would not attempt to crack the Personal Unlocking Key of SIM card
).
Step 408, judge whether user inputs SIM card unlocking pin, i.e., whether terminal receives unlocking pin, if so,
Then follow the steps 410;Otherwise, directly terminate.
Step 410, judge the Personal Unlocking Key received whether be the first SIM card the first SIM card unlock code, if so,
Execute step 412;Otherwise, execute step 422 (in addition, in the present embodiment, the safety of the first SIM card, the second SIM card ...
Grade is successively from low to high).
Step 412, if receiving correct first SIM card unlock code, unlock the first SIM card (in addition to the first SIM card,
Other SIM cards still appear as " class privacy mode ").
Step 414, judge whether user inputs SIM card unlocking pin again, i.e., whether terminal receives unlocking pin, if
It is to then follow the steps 416;Otherwise, directly terminate.
Step 416, judge the Personal Unlocking Key received whether be the second SIM card the second SIM card unlock code, if so,
Execute step 418;Otherwise, step 422 is executed.
Step 418, if receiving correct second SIM card unlock code, the second SIM card (the first, second SIM card is unlocked
Except, other are shown as " class privacy mode ").
Step 420, other SIM cards in terminal are successively unlocked according to above-mentioned steps.
Step 422, no matter unlock code correctness, prompt unlock code mistake.
Technical solution of the present invention is further described below:
Firstly, it is necessary to for every SIM card configuration preference level in multi-card terminal, such as the first SIM card, the second SIM card, third
SIM card (wait its security level successively from low to high), in this way, user must first to the unlock of the first SIM card after, could be to second
SIM card is unlocked, and user could be unlocked third SIM card after must unlocking to the second SIM card.
Secondly, user needs that unlock code is arranged for every SIM card.
Finally, when user opens a terminal (at this point, the information such as short message, multimedia message, wechat, address list in terminal all shown as
Sky, certainly, the address list information for being stored in terminal local in order to facilitate user's a part can show that this is depended entirely on
The setting of user) start unlock when, it is necessary to be unlocked from the first SIM card, after the first SIM card unlocks successfully, the 2nd SIM
Information in card, third SIM card is shown as empty, and the identical effect of privacy mode may be implemented in this way.The rest may be inferred, when second
After SIM card unlock, the information in third SIM card is shown as empty.Certainly, when user is not actively every SIM configuration safety etc.
When grade, terminal acquiescently can configure security level, that is, priority, tool according to the major-minor relationship of main card, vice card for every SIM card
Body process is to control security level of the security level higher than vice card of main card.
The technical scheme of the present invention has been explained in detail above with reference to the attached drawings, can be to being equipped with multiple communication module (such as SIM
Card, UIM card etc.) terminal on each communication module carry out secure decryption, to ensure the data stored in each communication module
Safety.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.
Claims (11)
1. a kind of unlocking method of communication module, for being equipped with the terminal of multiple communication modules characterized by comprising
When any communication module in the multiple communication module receives target Personal Unlocking Key, safety etc. is judged whether there is
Grade is not unlocked lower than other destinations traffic modules of the security level of any communication module;
When the judgment result is No, if the target Personal Unlocking Key is correct, any communication module is unlocked;
When the judgment result is yes, forbid unlocking any communication module, wherein other described destinations traffic modules are described
Communication module in multiple communication modules in addition to any communication module.
2. the unlocking method of communication module according to claim 1, which is characterized in that further include:
If there are other destinations traffic modules not to be unlocked in the multiple communication module, when the target Personal Unlocking Key is correct
When, still prompt the target Personal Unlocking Key mistake;And
When other described destinations traffic modules are multiple, if being sequentially received according to the sequence of security level from low to high multiple
The correct Personal Unlocking Key of other destinations traffic modules described in each of other described destinations traffic modules then allows to unlock institute
Any communication module is stated, to unlock any communication module when the target Personal Unlocking Key is correct.
3. the unlocking method of communication module according to claim 1, which is characterized in that further include:
Before any communication module receives the target Personal Unlocking Key, the display figure of any communication module is hidden
Mark.
4. the unlocking method of communication module according to claim 1, which is characterized in that further include:
When any communication module is not unlocked, if receiving the target information of any communication module, do not show
The target information, so that the user of the terminal can not the letter of target described in the current operation interface processing by the terminal
Breath, and the target information is stored to any communication module.
5. the unlocking method of communication module according to any one of claim 1 to 4, which is characterized in that
It is each communication module setting safety etc. in the multiple communication module according to the security level setting command received
Grade, or according to the major-minor relationship of each communication module default in the multiple communication module, determine each communication module
Security level.
6. a kind of tripper of communication module, for being equipped with the terminal of multiple communication modules characterized by comprising
Judging unit judges whether when any communication module in the multiple communication module receives target Personal Unlocking Key
Other destinations traffic modules there are security level lower than the security level of any communication module are not unlocked;
Processing unit if the target Personal Unlocking Key is correct, unlocks any communication module when the judgment result is No,
When the judgment result is yes, forbid unlocking any communication module, wherein other described destinations traffic modules are the multiple
Communication module in communication module in addition to any communication module.
7. the tripper of communication module according to claim 6, which is characterized in that further include:
Prompt unit, if there are other destinations traffic modules not to be unlocked in the multiple communication module, when the target solution
When lock key is correct, the target Personal Unlocking Key mistake is still prompted;And
The processing unit is also used to:
When other described destinations traffic modules are multiple, if being sequentially received according to the sequence of security level from low to high multiple
The correct Personal Unlocking Key of other destinations traffic modules described in each of other described destinations traffic modules then allows to unlock institute
Any communication module is stated, to unlock any communication module when the target Personal Unlocking Key is correct.
8. the tripper of communication module according to claim 6, which is characterized in that further include:
Hidden unit hides any communication mould before any communication module receives the target Personal Unlocking Key
The display icon of block.
9. the tripper of communication module according to claim 6, which is characterized in that
The processing unit is also used to:
When any communication module is not unlocked, if receiving the target information of any communication module, do not show
The target information, so that the user of the terminal can not the letter of target described in the current operation interface processing by the terminal
Breath, and the target information is stored to any communication module.
10. the tripper of communication module according to any one of claims 6 to 9, which is characterized in that
The processing unit is also used to:
It is each communication module setting safety etc. in the multiple communication module according to the security level setting command received
Grade, or according to the major-minor relationship of each communication module default in the multiple communication module, determine each communication module
Security level.
11. a kind of terminal characterized by comprising the unlock of the communication module as described in any one of claim 6 to 10 fills
It sets.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510217315.6A CN104902468B (en) | 2015-04-30 | 2015-04-30 | Unlocking method, tripper and the terminal of communication module |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510217315.6A CN104902468B (en) | 2015-04-30 | 2015-04-30 | Unlocking method, tripper and the terminal of communication module |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104902468A CN104902468A (en) | 2015-09-09 |
CN104902468B true CN104902468B (en) | 2018-12-25 |
Family
ID=54034808
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510217315.6A Active CN104902468B (en) | 2015-04-30 | 2015-04-30 | Unlocking method, tripper and the terminal of communication module |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104902468B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114859833A (en) * | 2022-04-26 | 2022-08-05 | 广州东焊智能装备有限公司 | Production line robot integrated control system based on PLC |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101754467A (en) * | 2008-12-22 | 2010-06-23 | 康佳集团股份有限公司 | Realizing method of privacy protection for dual-card cell phone |
CN102137389A (en) * | 2011-03-18 | 2011-07-27 | 惠州Tcl移动通信有限公司 | Multi-card mobile terminal and method for transferring data of SIM card |
CN102137388A (en) * | 2011-03-10 | 2011-07-27 | 惠州Tcl移动通信有限公司 | Mobile telephone and data processing method thereof |
CN103583067A (en) * | 2011-05-09 | 2014-02-12 | 诺基亚公司 | SIM lock for multi-SIM environment |
CN103781053A (en) * | 2012-10-26 | 2014-05-07 | 中兴通讯股份有限公司 | Method, device and correlated terminal for locking network and module of multi-module mobile terminal |
-
2015
- 2015-04-30 CN CN201510217315.6A patent/CN104902468B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101754467A (en) * | 2008-12-22 | 2010-06-23 | 康佳集团股份有限公司 | Realizing method of privacy protection for dual-card cell phone |
CN102137388A (en) * | 2011-03-10 | 2011-07-27 | 惠州Tcl移动通信有限公司 | Mobile telephone and data processing method thereof |
CN102137389A (en) * | 2011-03-18 | 2011-07-27 | 惠州Tcl移动通信有限公司 | Multi-card mobile terminal and method for transferring data of SIM card |
CN103583067A (en) * | 2011-05-09 | 2014-02-12 | 诺基亚公司 | SIM lock for multi-SIM environment |
CN103781053A (en) * | 2012-10-26 | 2014-05-07 | 中兴通讯股份有限公司 | Method, device and correlated terminal for locking network and module of multi-module mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN104902468A (en) | 2015-09-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103728894B (en) | The long-range control method of a kind of terminal unit and system | |
CN108093392B (en) | Method for unlocking SIM card, mobile terminal and storage medium | |
CN104156644B (en) | Multisystem entering method and device and terminal | |
US8718602B2 (en) | Method and system for remote control of smart card | |
CN102131182B (en) | Network locking method and device for mobile terminal | |
CN104537291A (en) | Screen interface unlocking method and screen interface unlocking device | |
CN106101451A (en) | SMS processing method, mobile terminal | |
CN103888607B (en) | A kind of mobile terminal secret note inspection method and system | |
CN104660613B (en) | The authentication method and electronic equipment of subscriber identification module | |
CN103404099A (en) | Managing communication channels in a telecommunication device coupled to an NFC circuit | |
CN105809007A (en) | Privacy protection method and device | |
CN104820805A (en) | Method and device for burglary prevention of user identity identification card information | |
CN104902468B (en) | Unlocking method, tripper and the terminal of communication module | |
CN111260831A (en) | Intelligent door lock control device, method and system | |
CN105653918B (en) | Method for safely carrying out, safe operating device and terminal | |
CN105069361A (en) | Safety access method and system for privacy space | |
CN105516500B (en) | Method and system for selecting equipment mode | |
CN101951570A (en) | Short message box encrypting method for mobile phone and mobile phone | |
CN105787341A (en) | Unlocking method and terminal | |
CN106453057B (en) | A kind of method and terminal for preventing short message to be stolen | |
CN105072084B (en) | The method for building up of mobile terminal and external equipment data connection | |
CN105635090B (en) | System access method, system access mechanism and terminal | |
CN105787400A (en) | Safety protection method and system based on mobile terminal | |
CN109859349A (en) | A kind of entrance guard authentication method and system based on data SMS technology | |
US20090235333A1 (en) | Automatic access control for mobile devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |