CN105141736A - Information security protection method and apparatus - Google Patents

Information security protection method and apparatus Download PDF

Info

Publication number
CN105141736A
CN105141736A CN201510606606.4A CN201510606606A CN105141736A CN 105141736 A CN105141736 A CN 105141736A CN 201510606606 A CN201510606606 A CN 201510606606A CN 105141736 A CN105141736 A CN 105141736A
Authority
CN
China
Prior art keywords
information
terminal
identification card
described terminal
out state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510606606.4A
Other languages
Chinese (zh)
Inventor
何颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510606606.4A priority Critical patent/CN105141736A/en
Publication of CN105141736A publication Critical patent/CN105141736A/en
Pending legal-status Critical Current

Links

Abstract

The invention provides an information security protection method and apparatus. According to the information security protection method, detection on whether an original user identity identification card exists in a terminal. When the original identity identification card does not exist in the terminal, the terminal is made to stay at an information security locking state. Whether to set the terminal at the information security locking state is determined based on the detection result of absence or presence of the original user identity identification card, so that information security is increased.

Description

A kind of information safety protecting method and device
Technical field
The present invention relates to communication technical field, particularly relate to a kind of information safety protecting method and device.
Background technology
Along with the development of mobile Internet and the universal of Mobile solution, the function of intelligent terminal as smart mobile phone is also more and more abundanter, and the ability of beared information also constantly promotes, and therefore requires more and more higher to the Information Security be stored in intelligent terminal.
For smart mobile phone, when smart mobile phone is lent friend by owner, the subscriber identification card of owner can be changed, because this friend knows the unlocking pin of mobile phone, therefore be easy to the privacy information known inside mobile phone, thus invade the privacy of owner.Special when owner's lost mobile phone, original subscriber's identification card can be changed by general thief, and attempts unlocking mobile phone, and because mobile phone EMS memory contains important information, if unlock successfully, then the information stored in mobile phone is easy to be known by stranger.
Due to existing smart mobile phone not configuration information safety protecting mechanism; therefore; be easy to some privacy informations causing owner; for example photo, video, note, the means of payment, mailbox message etc. are known by other people; thus invade the privacy of owner; even, may endanger the property safety of owner, therefore the Information Security of smart mobile phone is poor at present.
Therefore, how the technical problem of protection information safety, needs urgently to be resolved.
Summary of the invention
The object of the present invention is to provide a kind of information safety protecting method and device, with the poor technical problem of the Information Security solving current smart mobile phone.
In order to solve above-mentioned technical problem, the invention provides following technical scheme:
The embodiment provides a kind of information safety protecting method, comprise the steps:
First user identification card whether is there is in sense terminals;
If when there is described first user identification card in described terminal, then maintain the current state of described terminal;
If when there is not described first user identification card in described terminal, then described terminal is made to be in information security lock-out state.
Embodiments of the invention additionally provide a kind of information safety protector, comprising:
Whether detection module, for existing first user identification card in sense terminals;
Status processing module, when there is described first user identification card for detecting in described terminal when described detection module, maintains the current state of described terminal; And when described detection module detect in described terminal there is not described first user identification card time, make described terminal be in information security lock-out state.
Whether embodiments of the invention can by existing the state that first user identification card arranges terminal in sense terminals; such as; when detect in described terminal, to there is not first user identification card time; described terminal is then made to be in information security lock-out state; to protect the information of owner, etc., thus effectively prevent owner from mobile phone is lent other people or stolen time; the information security hidden danger existed, improves the fail safe of end message.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those skilled in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The schematic flow sheet of the first Information Authentication method that Fig. 1 provides for the embodiment of the present invention;
The schematic flow sheet of the second Information Authentication method that Fig. 2 provides for the embodiment of the present invention;
The schematic flow sheet of the third Information Authentication method that Fig. 3 provides for the embodiment of the present invention;
The structural representation of the first Information Authentication device that Fig. 4 provides for the embodiment of the present invention;
The structural representation of the second Information Authentication device that Fig. 5 provides for the embodiment of the present invention;
The structural representation of the third Information Authentication device that Fig. 6 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those skilled in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Embodiments provide a kind of information safety protecting method and device.To be described in detail respectively below.
In order to can the fail safe of protection information, present embodiments provide a kind of information safety protecting method, as shown in Figure 1, comprise the steps:
Whether step 101, exist first user identification card in sense terminals;
Wherein, this terminal is specifically as follows the equipment such as mobile phone or panel computer; This first user identification card refers to the subscriber identification card with this terminal with binding relationship, and this first user identification can be a subscriber identification card, also can comprise multiple subscriber identification cards.This first user identification card can be common client identification module (SIM, SubscriberIdentityModule), compact SIM card (MicroSIM), nanometer SIM card (NanoSIM) or other can be used for representing the identification card of user identity, etc., for convenience, in embodiments of the present invention, will all be described for SIM card.
It should be noted that, terminal here, such as mobile phone or panel computer etc., the terminal can treated for single deck tape-recorder list, also can be the terminal of double-card dual-standby, namely can be the terminal supporting individual SIM card or two SIM cards; Wherein, the terminal of double-card dual-standby, when detecting, needs to detect two SIM cards simultaneously.Next according to its testing result, the state of terminal is processed, as shown in step 102 and 103.
Step 102, if when there is this first user identification card in this terminal, then maintain the current state of this terminal;
Such as, for mobile phone, when mobile phone be single deck tape-recorder list until mobile phone time, when detecting that mobile phone exists former SIM card, then maintain current mobile phone state, it does not dealt with.When mobile phone is double standby mobile phone, when detecting that original two SIM cards of mobile phone all exist, then maintains current mobile phone state, it is not dealt with.
Step 103, if when there is not this first user identification card in this terminal, then makes this terminal be in information security lock-out state.
There is not the situation of this first user identification card in this terminal, can being that friend or the household of owner uses mobile phone, in order to fill the SIM card of oneself, former SIM card being pulled out; Or former SIM card is pulled out by the mobile phone that thief has stolen owner; Or during owner oneself replacing SIM card, former SIM card is pulled out.
When mobile phone be single deck tape-recorder list until mobile phone time, when detecting that mobile phone does not exist former SIM card, then make mobile phone be in information security lock-out state.When mobile phone is double standby mobile phone, detects when having at least one not exist in two SIM cards that mobile phone is original, then make mobile phone be in information security lock-out state.
This information security lock-out state specifically comprises: at least one in this terminal in preset security information, preset security defense function is in the lock state.This preset security information is for example the one wherein such as photograph album, video, information, contact person, the means of payment, mailbox relevant information; This preset security defense function is for example network savvy or factory reset function.
Especially, if thief is by after internet function and factory reset function locking, when just can effectively avoid mobile phone to steal, to the loss that owner causes.
The information safety protecting method that the present embodiment provides, whether can there is according to detection the state that former SIM card arranges terminal, in time there is not former SIM card, mmk terminal is set to information security lock-out state.Thus prevent other people from invading the privacy of owner, improve the fail safe of information.
In order to can the fail safe of protection information, present embodiments provide a kind of information safety protecting method, as shown in Figure 2, comprise the steps:
Whether step 201, exist first user identification card in sense terminals;
It should be noted that, terminal here, such as mobile phone or panel computer etc., the terminal can treated for single deck tape-recorder list, also can be the terminal of double-card dual-standby, namely can be the terminal supporting individual SIM card or two SIM cards; Wherein, the terminal of double-card dual-standby, when detecting, needs to detect two SIM cards simultaneously.Next according to its testing result, the state of terminal is processed, as shown in step 202 and 203.
Step 202, if when there is this first user identification card in this terminal, then maintain the current state of this terminal;
Such as, for mobile phone, when mobile phone be single deck tape-recorder list until mobile phone time, when detecting that mobile phone exists former SIM card, then the state making mobile phone remain current, does not deal with it.When mobile phone is double standby mobile phone, when detecting that original two SIM cards of mobile phone all exist, then the state making mobile phone remain current, does not deal with it.
Step 203, if when there is not this first user identification card in this terminal, then makes this terminal be in information security lock-out state.
Such as, in this terminal, there is not the situation of this first user identification card, can being that friend or the household of owner uses mobile phone, in order to fill the SIM card of oneself, former SIM card being pulled out; Or former SIM card is pulled out by the mobile phone that thief has stolen owner; Or during owner oneself replacing SIM card, former SIM card is pulled out.
When mobile phone be single deck tape-recorder list until mobile phone time, when detecting that mobile phone does not exist former SIM card, then make mobile phone be in information security lock-out state.When mobile phone is double standby mobile phone, detects when having at least one not exist in two SIM cards that mobile phone is original, then make mobile phone be in information security lock-out state.
This information security lock-out state is at least one in preset security information and preset security defense function locked.This preset security information is for example the one in the relevant informations such as photograph album, video, information, contact person, the means of payment, Email Accounts; This preset security defense function is for example network savvy or factory reset function.
Step 204, this preset security information to be backed up.
This information security lock-out state comprises preset security information locking state; Namely preset security information locking state is called to preset security information locking;
Such as, making after this terminal is in the step of information security lock-out state, said method also can comprise:
This preset security information is backed up; Specifically described preset security information can be sent to server to back up, such as, this preset security information back-up extremely be preset server corresponding to communications identification.Back up preset security information, when can prevent mobile phone from losing, preset security information is difficult to give for change.
Such as, before backing up preset security information, owner is previously provided with communications identification, such as when starting shooting first, just reminds owner to arrange a communications identification, as default communications identification.This default communications identification can comprise telephone number, email address or instant messaging account etc., for example owner pre-sets an email address as communications identification, under mobile phone loss situation, when thief changes SIM card, preset security information is carried out back up to server corresponding to this email address; Or by the identity identification information of thief, send to the server that email address is corresponding, to facilitate owner's getting back mobile phone.
For example detect in mobile phone when there is not former SIM card, preset security information is locked, and preset security information is backed up, when avoiding mobile phone to lose, thief is by mobile phone factory reset, cause the relevant preset security information dropout of owner, by preset security information dropout can be avoided after backup, reduce the loss of owner.
Step 205, obtains first information safeguard protection password;
When this terminal is in information security lock-out state, and this preset security information is backed up, obtain the information safety protection password of user's input further; This password is called first information safeguard protection password;
Such as, owner is also previously provided with information safety protection password, such as when starting shooting first, just reminds owner's configuration information safeguard protection password, as presupposed information safeguard protection password.
When this presupposed information safeguard protection password makes terminal be in information security lock-out state for pulling out SIM card as owner oneself, by inputting the locking of this password releasing to preset security information.
Step 206, judges whether this first information safeguard protection password mates with presupposed information safeguard protection password;
Such as, first information safeguard protection password step 205 obtained and presupposed information safeguard protection password compare, to judge whether both are identical.
Step 207, if this first information safeguard protection password does not mate with this presupposed information safeguard protection password, then makes this terminal maintain this information security lock-out state.
Such as, when the information safety protection password of user's input does not mate with this presupposed information safeguard protection password, continue to make this terminal maintain this information security lock-out state; Show that active user is not owner or through user's (such as household or friend) that owner authorizes, therefore continue to lock the preset security information of mobile phone or preset security defense function.
For example the friend of thief or owner is after pulling out SIM, and the information safety protection password of input does not mate with this presupposed information safeguard protection password, then make mobile phone maintain this information security lock-out state, thus protect the information security of owner.
Step 208, if this first information safeguard protection password mates with this presupposed information safeguard protection password, then removes this information security lock-out state of this terminal.
Now show the user that active user is owner or authorizes through owner therefore to remove the locking to preset security information or preset security defense function; Check relevant information to facilitate it and use correlation function.
For example owner oneself changes SIM card or when pulling out SIM card, owing to have input correct information safety protection password, therefore removes the locking to preset security information and preset security defense function, checks relevant information to facilitate owner and uses correlation function.
When the technical scheme of the present embodiment is equally applicable to hand-set from stolen, thief changes the situation of the situation of SIM card or owner more change card.
The information safety protecting method that the present embodiment provides; pre-set a communications identification and information safety protection password; detect and whether there is former SIM card; in time there is not former SIM card; mmk terminal is set to information security lock-out state; and preset security information is backed up, prevent other people from invading the privacy of owner, improve the fail safe of information and prevent information dropout.
In order to can the fail safe of protection information, present embodiments provide a kind of information safety protecting method, as shown in Figure 3, comprise the steps:
Whether step 301, exist first user identification card in sense terminals;
It should be noted that, terminal here, such as mobile phone or panel computer etc., the terminal can treated for single deck tape-recorder list, also can be the terminal of double-card dual-standby, namely can be the terminal supporting individual SIM card or two SIM cards; Wherein, the terminal of double-card dual-standby, when detecting, needs to detect two SIM cards simultaneously.Next according to its testing result, the state of terminal is processed, as shown in step 302 and 303.
Step 302, if when there is this first user identification card in this terminal, then maintain the current state of this terminal;
Such as, when mobile phone be single deck tape-recorder list until mobile phone time, when detecting that mobile phone exists former SIM card, then maintain current mobile phone state, it does not dealt with.When mobile phone is double standby mobile phone, when detecting that original two SIM cards of mobile phone all exist, then maintains current mobile phone state, it is not dealt with.
Step 303, if when there is not this first user identification card in this terminal, then makes this terminal be in information security lock-out state.
Such as, in this terminal, there is not the situation of this first user identification card, can being that friend or the household of owner uses mobile phone, in order to fill the SIM card of oneself, former SIM card being pulled out; Or former SIM card is pulled out by the mobile phone that thief has stolen owner; Or during owner oneself replacing SIM card, former SIM card is pulled out.
Such as, for mobile phone, when mobile phone be single deck tape-recorder list until mobile phone time, when detecting that mobile phone does not exist former SIM card, then make mobile phone be in information security lock-out state.When mobile phone is double standby mobile phone, detects when having at least one not exist in two SIM cards that mobile phone is original, then make mobile phone be in information security lock-out state.
This information security lock-out state specifically comprises: at least one in this terminal in preset security information, preset security defense function is in the lock state.。This preset security information is for example the one in the relevant informations such as photograph album, video, information, contact person, the means of payment, Email Accounts; This preset security defense function is for example network savvy or factory reset function.
Step 304, after this terminal is in information security lock-out state, should detect in this terminal whether there is the second subscriber identification card; Wherein this second subscriber identification card is used for substituting this first user identification card;
Particularly, judge whether active user changes former SIM card, for the mobile phone that single deck tape-recorder list is treated, whether detect in former SIM card draw-in groove has neocaine to exist, detection mode for example obtains the information of new SIM card, the information of new SIM card and former SIM card information are compared, whether both judgements are identical.If not identical, then show that SIM card is changed.For the mobile phone of double-card dual-standby, detect in one of them sim card slot original and whether have neocaine to exist, have new SIM card as long as have in a draw-in groove, then show that SIM card is changed.
Step 305, if when there is not this second subscriber identification card in this terminal, makes this terminal maintain information security lock-out state.
Such as, when hand-set from stolen, now thief does not also change SIM card, in order to ensure the information security of owner, continues to make mobile phone maintain information security lock-out state.
Step 306, if when there is this second subscriber identification card in this terminal, then obtain the identity identification information of active user, and is sent to server corresponding to this default communications identification by this identity identification information.
This identity identification information is for example the photo of current user (such as thief), the information of current SIM card, the current position etc. of terminal.
For example when hand-set from stolen, mobile phone is treated for single deck tape-recorder list, when detecting that the former SIM card of mobile phone is replaced, then the photo that camera takes current user (such as thief) is opened on backstage, or the information of current SIM card is read on backstage, or the current position of the automatic locating cellphone in backstage; Then by server corresponding for the default communications identification being sent to owner after these acquisition of informations.By obtaining the identity identification information of current user, owner can obtain its cell-phone number or identity card account according to SIM card information, and be supplied to the police according to the photo of current user and the position of cell-phone number, identification card number and current phone, machine getting back mobile phone can be facilitated.
For double card double standby mobile phone, detect when having one to be replaced in the former SIM card of mobile phone, then the photo that camera takes current user is opened on backstage, or the information of current SIM card is read on backstage, or the current position of the automatic locating cellphone in backstage; Then by server corresponding for the default communications identification being sent to owner after these acquisition of informations.By obtaining the identity identification information of current user, owner can obtain its cell-phone number or identity card account according to SIM card information, and be supplied to the police according to the photo of current user and the position of cell-phone number, identification card number and current phone, machine getting back mobile phone can be facilitated.
The information safety protecting method of the present embodiment; when there is not former SIM card; detect and whether there is new SIM card; when there is new SIM card; obtain the identity identification information of current user; and by the mailbox that this information sends to communications identification corresponding, according to the identity identification information obtained, thus owner's getting back mobile phone can be facilitated.
Present embodiments provide a kind of information safety protector, as shown in Figure 4, comprise detection module 41 and status processing module 42;
Whether this detection module 41, for existing first user identification card in sense terminals;
This status processing module 42, when there is this first user identification card for detecting in this terminal when detection module 41, maintains the current state of this terminal; And when detection module 41 detect in this terminal there is not this first user identification card time, make this terminal be in information security lock-out state.The information safety protector that the present embodiment provides, whether can there is according to detection the state that former SIM card arranges terminal, in time there is not former SIM card, mmk terminal is set to information security lock-out state.Thus prevent other people from invading the privacy of owner, improve the fail safe of information.
Present embodiments provide a kind of information safety protector, as shown in Figure 5, comprising: detection module 51, status processing module 52, acquisition module 53, judge module 54;
Whether this detection module 51, for existing first user identification card in sense terminals;
This status processing module 52, when there is this first user identification card for detecting in this terminal when detection module 51, maintains the current state of this terminal; And when detection module 51 detect in this terminal there is not this first user identification card time, make this terminal be in information security lock-out state.
Preferably, this status processing module 52, also, backs up this preset security information after described terminal is in information security lock-out state for making at it.Give for change to facilitate owner or search preset security information.Particularly, described status processing module 52, backs up specifically for described preset security information is sent to server.
This acquisition module 53, after described terminal is in information security lock-out state, obtains first information safeguard protection password for making at status processing module 52;
This judge module 54, for judging whether the first information safeguard protection password that acquisition module 53 obtains mates with presupposed information safeguard protection password;
Status processing module 52, time also for judging that first information safeguard protection password does not mate with presupposed information safeguard protection password when judge module 54, continues to make terminal maintain information security lock-out state; And when judge module 54 judges that this first information safeguard protection password mates with this presupposed information safeguard protection password, remove this information security lock-out state of this terminal.
The information safety protector that the present embodiment provides; pre-set a communications identification and information safety protection password; detect and whether there is former SIM card; in time there is not former SIM card; mmk terminal is set to information security lock-out state; and presupposed information is backed up, prevent other people from invading the privacy of owner, improve the fail safe of presupposed information.
Present embodiments provide a kind of information safety protector, as shown in Figure 6, comprising: detection module 61, status processing module 62, sending module 63;
Whether this detection module 61, for existing first user identification card in sense terminals;
This status processing module 62, when there is this first user identification card for detecting in terminal when detection module 61, then maintains the current state of this terminal; And when detection module 61 detect in terminal there is not this first user identification card time, then make this terminal be in information security lock-out state.
This detection module 61 is also for making after this terminal is in information security lock-out state, to detect in this terminal whether there is the second subscriber identification card at this status processing module 62; Wherein this second subscriber identification card is used for substituting this first user identification card;
This sending module 63, when there is this second subscriber identification card for detecting in this terminal when this detection module 61, then obtains the identity identification information of active user, and this identity identification information is sent to server corresponding to this default communications identification.
The information safety protector that the present embodiment provides; when there is not former SIM card; detect and whether there is new SIM card; when there is new SIM card; obtain the identity identification information of current user; and by the mailbox that this information sends to communications identification corresponding, according to the identity identification information obtained, thus owner's getting back mobile phone can be facilitated.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is that the hardware that can carry out instruction relevant by program has come, this program can be stored in a computer-readable recording medium, storage medium can comprise: read-only memory (ROM, ReadOnlyMemory), random access memory (RAM, RandomAccessMemory), disk or CD etc.
A kind of information safety protecting method provided the embodiment of the present invention above and device are described in detail, apply specific case herein to set forth principle of the present invention and execution mode, the explanation of above embodiment just understands method of the present invention and core concept thereof for helping; Meanwhile, for those skilled in the art, according to thought of the present invention, all will change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.

Claims (12)

1. an information safety protecting method, is characterized in that, comprising:
First user identification card whether is there is in sense terminals;
If when there is described first user identification card in described terminal, then maintain the current state of described terminal;
If when there is not described first user identification card in described terminal, then described terminal is made to be in information security lock-out state.
2. the method for information safety protection according to claim 1, is characterized in that, make after described terminal is in the step of information security lock-out state described, described method also comprises:
Obtain first information safeguard protection password;
Judge whether described first information safeguard protection password mates with presupposed information safeguard protection password;
If described first information safeguard protection password does not mate with described presupposed information safeguard protection password, then described terminal is made to maintain described information security lock-out state.
3. the method for information safety protection according to claim 1 and 2, is characterized in that, described information security lock-out state specifically comprises: at least one in described terminal in preset security information, preset security defense function is in the lock state.
4. the method for information safety protection according to claim 1, is characterized in that, described information security lock-out state comprises: the preset security information in described terminal is in the lock state;
Make after described terminal is in the step of information security lock-out state described, described method also comprises:
Described preset security information is backed up.
5. the method for information safety protection according to claim 4, is characterized in that, describedly the step that described preset security information carries out backing up is comprised:
Described preset security information is sent to server back up.
6. the method for mobile phone information safety protection according to claim 1 and 2, is characterized in that,
Make after described terminal is in the step of information security lock-out state described, described method also comprises:
Detect in described terminal and whether there is the second subscriber identification card; Wherein said second subscriber identification card is used for substituting described first user identification card;
If when there is described second subscriber identification card in described terminal, then obtain the identity identification information of active user, and described identity identification information is sent to server corresponding to described default communications identification.
7. an information safety protector, is characterized in that, comprising:
Whether detection module, for existing first user identification card in sense terminals;
Status processing module, when there is described first user identification card for detecting in described terminal when described detection module, maintains the current state of described terminal; And when described detection module detect in described terminal there is not described first user identification card time, make described terminal be in information security lock-out state.
8. information safety protector according to claim 7, is characterized in that, also comprises acquisition module and judge module;
Described acquisition module, for making after described terminal is in information security lock-out state, to obtain first information safeguard protection password;
Described judge module, for judging whether the described first information safeguard protection password that described acquisition module obtains mates with presupposed information safeguard protection password;
Described status processing module, time also for judging that when described judge module described first information safeguard protection password does not mate with described presupposed information safeguard protection password, makes described terminal maintain described information security lock-out state.
9. the information safety protector according to claim 7 or 8, is characterized in that,
Described status processing module, when there is not described first user identification card specifically for detecting in described terminal when described detection module, is in the lock state at least one in preset security information, preset security defense function in described terminal.
10. information safety protector according to claim 7, is characterized in that, described information security lock-out state comprises: the preset security information in described terminal is in the lock state;
Described status processing module, also for making after described terminal is in information security lock-out state, described preset security information to be backed up.
11. information safety protectors according to claim 10, is characterized in that,
Described status processing module, backs up specifically for described preset security information is sent to server.
12. information safety protectors according to claim 7, is characterized in that, also comprise sending module;
Described detection module, also for making after described terminal is in information security lock-out state, to detect in described terminal whether deposit the second subscriber identification card at described status processing module; Wherein said second subscriber identification card is used for substituting described first user identification card;
Described sending module, for detecting in described terminal to there is the second subscriber identification card when described detection module, obtains the identity identification information of active user; And described identity identification information is sent to server corresponding to described default communications identification.
CN201510606606.4A 2015-09-22 2015-09-22 Information security protection method and apparatus Pending CN105141736A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510606606.4A CN105141736A (en) 2015-09-22 2015-09-22 Information security protection method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510606606.4A CN105141736A (en) 2015-09-22 2015-09-22 Information security protection method and apparatus

Publications (1)

Publication Number Publication Date
CN105141736A true CN105141736A (en) 2015-12-09

Family

ID=54726936

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510606606.4A Pending CN105141736A (en) 2015-09-22 2015-09-22 Information security protection method and apparatus

Country Status (1)

Country Link
CN (1) CN105141736A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871886A (en) * 2016-05-11 2016-08-17 深圳市金立通信设备有限公司 Application access permission control method and terminal
CN106231584A (en) * 2016-07-28 2016-12-14 广东欧珀移动通信有限公司 The processing method of a kind of terminal data, device and mobile terminal
CN106507334A (en) * 2016-12-30 2017-03-15 维沃移动通信有限公司 A kind of identity identifying method and mobile terminal
CN108959881A (en) * 2018-06-09 2018-12-07 深圳市宝尔爱迪科技有限公司 A kind of double-encryption system of communicating terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070099610A1 (en) * 2005-10-31 2007-05-03 Daesin Information Technology Co., Ltd. Method of automatically backing up and restoring PIMS data of mobile communication terminal
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN102790819A (en) * 2011-05-17 2012-11-21 芯讯通无线科技(上海)有限公司 Mobile terminal capable of protecting privacy and method
CN102946482A (en) * 2012-11-15 2013-02-27 北京小米科技有限责任公司 Method for detecting user terminal and user terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070099610A1 (en) * 2005-10-31 2007-05-03 Daesin Information Technology Co., Ltd. Method of automatically backing up and restoring PIMS data of mobile communication terminal
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN102790819A (en) * 2011-05-17 2012-11-21 芯讯通无线科技(上海)有限公司 Mobile terminal capable of protecting privacy and method
CN102946482A (en) * 2012-11-15 2013-02-27 北京小米科技有限责任公司 Method for detecting user terminal and user terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871886A (en) * 2016-05-11 2016-08-17 深圳市金立通信设备有限公司 Application access permission control method and terminal
CN106231584A (en) * 2016-07-28 2016-12-14 广东欧珀移动通信有限公司 The processing method of a kind of terminal data, device and mobile terminal
CN106507334A (en) * 2016-12-30 2017-03-15 维沃移动通信有限公司 A kind of identity identifying method and mobile terminal
CN108959881A (en) * 2018-06-09 2018-12-07 深圳市宝尔爱迪科技有限公司 A kind of double-encryption system of communicating terminal

Similar Documents

Publication Publication Date Title
US8718602B2 (en) Method and system for remote control of smart card
JP5893169B2 (en) Anti-theft protection method and device for mobile phone
CN104601324B (en) A kind of verification method, terminal and system for application
EP2613580A1 (en) System, method and communication terminal for tracking stolen communication terminal
CN105141736A (en) Information security protection method and apparatus
CN104468611A (en) Data security processing method and device based on dual-system switching
CN103037310A (en) Mobile terminal intelligent anti-theft method and mobile terminal
CN103347131A (en) Intelligent mobile phone anti-theft method and system
CN101287211A (en) Anti-theft method for mobile terminal
CN101815116A (en) Mobile telephone method and device based on multi-user
CN104700050A (en) Mobile terminal safety positioning method and device
CN105760734A (en) Safety protection method for terminal and terminal equipment
CN1882131A (en) Method for protecting stolen handset telephone directory
CN107026935B (en) Mobile device and permission control method and device of mobile device
CN103699860A (en) Terminal antitheft method and equipment
CN103079203A (en) Terminal authentication method and smart card
CN104243708A (en) Mobile terminal and anti-theft method and device of mobile terminal
CN107786486B (en) Method and device for activating operating system
CN107172602B (en) Data security protection method and device for mobile terminal
CN110691352B (en) SIM card access control method, device, medium and equipment
CN102411692B (en) Method, system and equipment for running terminal
CN101232677A (en) Method and apparatus for start-up logging of mobile terminal
US20150084773A1 (en) Mobile terminal and anti-stolen method thereof
CN107154999B (en) Terminal and unlocking method and storage device based on environmental information
CN105787400A (en) Safety protection method and system based on mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20151209

RJ01 Rejection of invention patent application after publication