CN105307135A - Mobile terminal and information protection method thereof - Google Patents

Mobile terminal and information protection method thereof Download PDF

Info

Publication number
CN105307135A
CN105307135A CN201410356626.6A CN201410356626A CN105307135A CN 105307135 A CN105307135 A CN 105307135A CN 201410356626 A CN201410356626 A CN 201410356626A CN 105307135 A CN105307135 A CN 105307135A
Authority
CN
China
Prior art keywords
mobile terminal
module
processing module
sim card
backstage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410356626.6A
Other languages
Chinese (zh)
Inventor
苗运齐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Simcom Wireless Solutions Co Ltd
Original Assignee
Shanghai Simcom Wireless Solutions Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Simcom Wireless Solutions Co Ltd filed Critical Shanghai Simcom Wireless Solutions Co Ltd
Priority to CN201410356626.6A priority Critical patent/CN105307135A/en
Publication of CN105307135A publication Critical patent/CN105307135A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephone Function (AREA)

Abstract

The invention discloses a mobile terminal and an information protection method thereof. The mobile terminal comprises a monitoring module, an instruction receiving module, a memory card processing module and a lock screen module; the instruction receiving module is used for sending a trigger signal to the monitoring module after receiving a request instruction sent by an external interaction object at a background, and the monitoring module is used for scheduling the memory card processing module and the lock screen module after receiving the trigger signal; the memory card processing module is used for automatically downloading and formatting a built-in memory card and an external memory card of the mobile terminal at the background; and the lock screen module is used for judging whether the mobile terminal opens a lock screen function, automatically opening the lock screen function in the case of a negative judgment result and setting a lock screen password. The information protection method disclosed by the invention can be used for eliminating information in the mobile terminal from being lost and stolen after the mobile terminal of a user is lost or stolen, thereby avoiding worries of the user and guaranteeing the benefits of the user.

Description

Mobile terminal and information protecting method thereof
Technical field
The present invention relates to a kind of mobile terminal and information protecting method thereof, particularly relate to a kind of information protecting method can taking the mobile terminal of safe precaution measure and a kind of mobile terminal utilizing described mobile terminal to realize to the data message stored.
Background technology
Along with the develop rapidly of the communications industry, the function of the operating system of the mobile terminals such as mobile phone progressively becomes powerful and perfect, such as Android operation system, because the powerful strength of its development company and each large technical scheme research and development company are as the help of Qualcomm etc., application at present based on the mobile terminal of Android operation system is very extensive, and popularity is commercially described with covering the sky and the earth and is not more.Along with the expansion day by day of operating system and perfect, based on the mobile terminal of operating system, not only price is more and more cheaper, and wherein supported application is also more and more extensive, thus makes the mobile terminals such as mobile phone be subject to the welcome of users and pursue.
Because the popularization degree of the operating systems such as Android is very wide, and there is the corresponding support that should be used in nearly all field, make the application of current mobile terminal can be adapted to various field, almost omnipotent, such as user directly just can realize the functions such as online shopping, on-line payment and transferring account with mobile phone by mobile phone.Also just so, the mobile terminal of user just records or stores a lot of and the closely-related individual privacy information of user self inadvertently, such as bank account information, encrypted message, photographic intelligence, audio and video information and associated person information etc., What is more, some user directly by some related application of oneself enterprise and data information memory in mobile terminal, cause once after mobile terminal is lost or stolen situation occurs, very likely cause above-mentioned user profile reveal or be stolen, this loss caused to user cannot be estimated.
Therefore; for customer mobile terminal lose or stolen after; how to take the corresponding precautionary measures do not revealed to protect the personal data information of the user stored in mobile terminal or steal, and then the loss reducing user to greatest extent become the problem urgently considered.But technology also not relevant in prior art relates to this on the one hand, as research and development and the manufacturer of mobile terminal, how to provide the solution of complete set to solve the problems referred to above to user and is very important.
Summary of the invention
The technical problem to be solved in the present invention be in order to overcome in prior art user mobile terminal lose or stolen after; also there is not corresponding technological means and mobile terminal is operated to the defect protecting the personal data information of the user stored in mobile terminal not revealed or steal, a kind of information protecting method can taking the mobile terminal of safe precaution measure and a kind of mobile terminal utilizing described mobile terminal to realize to the data message stored is provided.
The present invention solves above-mentioned technical problem by following technical proposals:
The invention provides a kind of mobile terminal, its feature is, it comprises a monitoring module, a command reception module, a storage card processing module and a screen lock module;
Described command reception module is used for after backstage receives the request instruction sent by an outside interactive object, send a triggering signal to described monitoring module, described monitoring module is used for after receiving described triggering signal, call described storage card processing module and described screen lock module;
Described storage card processing module is used at backstage Self-tipping and formats the embedded memory card of described mobile terminal and external storage card;
Described screen lock module is for judging whether described mobile terminal opens screen locking function, and the automatically unlocking screen curtain lock function when being judged as NO also arranges screen locking password.
Preferably, described mobile terminal also comprises a configuration information processing module, described monitoring module also obtains the root authority (the super administrator's account authority in operating system is the highest authority in whole operating system) of described mobile terminal and deletes the system startup of described mobile terminal and normally run necessary configuration information for calling described configuration information processing module after receiving described triggering signal.
Preferably, described mobile terminal also comprises a SIM card (subscriber identification card) processing module, for calling described SIM card processing module after receiving described triggering signal, described monitoring module also judges whether the SIM card of described mobile terminal opens PIN lock (for locking SIM card), automatically open PIN lock when being judged as NO and arranging PIN code (the individual recognition code of SIM card), and delete the data message stored in SIM card on backstage.
Preferably, described command reception module is the SMS module of described mobile terminal, whether the SIM card of described monitoring module also for monitoring described mobile terminal is in real time changed, and also calls described SMS module send a SMS Tip on backstage to described outside interactive object and be replaced to point out the SIM card of described mobile terminal when monitoring as being;
Described outside interactive object is used for after receiving SMS Tip, send described request instruction, and described request instruction is a request note.
Preferably, described monitoring module is also for the communication number of outside interactive object described in the pre-stored of backstage, and described SIM card processing module and described screen lock module are set to described PIN code and described screen locking password by latter four of described communication number respectively.
Preferably, described SIM card processing module, described storage card processing module, described screen lock module and described configuration information processing module also confirm instruction for sending one at complete rear of executable operations to described monitoring module, described monitoring module also for performing factory reset to described mobile terminal and the operation of shutdown on backstage after receiving described confirmation instruction, and calls described command reception module on backstage to the feedback information that described outside interactive object transmission one sign all operations successful execution is complete.
The object of the invention is to the information protecting method additionally providing a kind of mobile terminal, its feature is, it utilizes above-mentioned mobile terminal to realize, and comprises the following steps:
S 1, after described command reception module receives the request instruction sent by an outside interactive object on backstage, send a triggering signal to described monitoring module;
S 2, described monitoring module calls described storage card processing module and described screen lock module after receiving described triggering signal;
S 3, described storage card processing module is at backstage Self-tipping and format the embedded memory card of described mobile terminal and external storage card;
Described screen lock module judges whether described mobile terminal opens screen locking function, and the automatically unlocking screen curtain lock function when being judged as NO also arranges screen locking password.
Preferably, described mobile terminal also comprises a configuration information processing module, step S 2described in monitoring module also call described configuration information processing module, step S 3also comprise: described configuration information processing module obtains the root authority of described mobile terminal and deletes the system startup of described mobile terminal and normally run necessary configuration information.
Preferably, described mobile terminal also comprises a SIM card processing module, step S 2described in monitoring module also call described SIM card processing module, step S 3also comprise: described SIM card processing module judges whether the SIM card of described mobile terminal opens PIN lock, automatically opens PIN lock and arrange PIN code when being judged as NO, and deletes the data message stored in SIM card on backstage.
Preferably, described command reception module is the SMS module of described mobile terminal, step S 1also comprise a step S before 01: whether the SIM card that described monitoring module monitors described mobile terminal is in real time changed, and also calls described SMS module send a SMS Tip on backstage to described outside interactive object and be replaced to point out the SIM card of described mobile terminal when monitoring as being;
Step S 1described in outside interactive object after receiving SMS Tip, send described request instruction, described request instruction is a request note.
Preferably, in step S 1also comprise: described monitoring module is the communication number of outside interactive object described in the pre-stored of backstage also before; Step S 3described in SIM card processing module and described screen lock module be set to described PIN code and described screen locking password by latter four of described communication number respectively.
Preferably, step S 3also comprise afterwards:
S 4, described SIM card processing module, described storage card processing module, described screen lock module and described configuration information processing module send one at complete rear of executable operations to described monitoring module and confirm instruction;
S 5, described monitoring module performs factory reset to described mobile terminal and the operation of shutdown on backstage, and call described command reception module and send one on backstage to described outside interactive object and characterize the complete feedback information of all operations successful execution.
Positive progressive effect of the present invention is: the present invention can after the mobile terminal of user be lost or be stolen, each functional module in mobile terminal is utilized the users personal data information wherein stored to be deleted, and the SIM card of mobile terminal and screen are locked, other people are avoided to use this mobile terminal, even can make mobile terminal cannot normal boot-strap by deletion system important information, thus the information leakage fundamentally stopped in mobile terminal, the individual privacy information of protection user can not because of the loss of mobile terminal or stolen and be stolen, ensure that the user of mobile terminal no longer includes trouble and worry, the interests of user are ensured to greatest extent.
Accompanying drawing explanation
Fig. 1 is the module diagram of the mobile terminal of embodiments of the invention 1.
Fig. 2 is the flow chart of the information protecting method of the mobile terminal of embodiments of the invention 2.
Fig. 3 is the flow chart of the information protecting method of the mobile terminal of embodiments of the invention 3.
Embodiment
Mode below by embodiment further illustrates the present invention, but does not therefore limit the present invention among described scope of embodiments.
Embodiment 1
As shown in Figure 1, mobile terminal of the present invention comprises monitoring module 1, SMS module 2, storage card processing module 3, screen lock module 4, configuration information processing module 5 and a SIM card processing module 6.
In mobile terminal of the present invention, each functional module can carry out consistency operation for the mobile terminal loss of user or stolen situation, thus effectively ensures that the users personal data information in mobile terminal can not be revealed or steal.Particularly, user is after discovery mobile terminal has been lost, a request instruction can be sent to oneself mobile terminal by another outside interactive object, and described SMS module 2 can receive described request instruction on backstage, certainly, the meaning that backstage receives carries out internal data process by means of only mobile terminal backstage exactly, and can not do any sound or picture prompting when receiving note, namely other people cannot know that described SMS module 2 receives described request instruction.
Described SMS module 2 is after backstage receives described request instruction, can send a triggering signal to notify that described monitoring module 1 takes corresponding safe precaution measure to described monitoring module 1, described monitoring module 1 will call described storage card processing module 3, described screen lock module 4, described configuration information processing module 5 and described SIM card processing module 6 respectively to perform corresponding safety precaution operation after receiving described triggering signal.
Wherein, described SIM card processing module 6 can judge whether the SIM card of described mobile terminal has opened PIN lock, if do not opened, then automatically open PIN lock function immediately, and PIN code is set, then the total data information stored in SIM card is deleted, specifically comprise the personal information such as All Contacts's information, short message, message registration information, after SIM card processing module 6 executes aforesaid operations, a confirmation instruction can be sent, to inform that described monitoring module 1 successful operation is finished to described monitoring module 1.
Described storage card processing module 3 can judge whether to need to unload storage card according to the state of the storage card of current mobile terminal (comprising embedded memory card and external storage card), particularly, by judging that the state that hangs over of current storage card is confirmed whether to need unloading, if the carry state that is in of i.e. current storage just performs the operation of unloading storage card, otherwise does not perform; Described storage card processing module 3, when being judged as YES, at backstage Self-tipping embedded memory card and external storage card, goes back automatically formatting storage card unloading successfully.Further, described storage card processing module 3 backstage unloading and format whole process in do not have any information, the operation so making described storage card processing module 3 perform can not be discovered.Finally, after storage card processing module 3 executes aforesaid operations, a confirmation instruction can be sent to described monitoring module 1, to inform that described monitoring module 1 successful operation is finished.
Described screen lock module 4 can judge whether mobile terminal has opened screen locking function, if not do not opened, and just automatically unlocking screen curtain lock function screen locking password is set immediately.So other people want to enter mobile terminal executable operations and need input screen locking password in any case, otherwise just cannot unlock, thus avoid in addition to a user other people carry out operating mobile terminal.Finally, after described screen lock module 4 executes aforesaid operations, a confirmation instruction can be sent to described monitoring module 1, to inform that described monitoring module 1 successful operation is finished.
Described configuration information processing module 5 can go with the role of system user's (system user) root authority obtaining mobile terminal system, then some the important configuration informations in deletion system, these important configuration informations above-mentioned are all that the system of mobile terminal starts and the necessary configuration information of normal operation.So system just cannot restart the system of entering again; once above-mentioned important configuration information is deleted; the machine of the brush again operation just must carrying out specialty just can make the normal start-up and operation of mobile terminal; thus mobile terminal again cannot normally be run; fundamentally stop in addition to a user other people use the possibility of described mobile terminal, also fundamentally protect the individual subscriber privacy information stored in mobile terminal.Finally, after described configuration information processing module 5 executes aforesaid operations, a confirmation instruction can be sent to described monitoring module 1, to inform that described monitoring module 1 successful operation is finished.
In concrete practice, this outside interactive object that user sends request instruction has a communication number, and described monitoring module 1 can shift to an earlier date the communication number of outside interactive object described in pre-stored on backstage, and certainly, the communication number of storage can not be seen by anyone.Above-mentioned SIM processing module 6 and screen lock module 4 can be set to described PIN code and described screen locking password by latter four of described communication number respectively.Successfully receive the confirmation instruction of described storage card processing module 3, described screen lock module 4, described configuration information processing module 5 and described SIM card processing module 6 transmission at described monitoring module 1 after, also call described SMS module 2 sends precautionary measures successful execution to described outside interactive object confirmation on backstage, certainly, this confirmation can not be left on the mobile terminal, also can not send prompt tone, also can not be viewed, thus can not be discovered.
Described SMS module 2 can be in the state waiting for that short message sending report arrives always, if there is no the arrival of short message sending report for a long time, then automatically attempt retransmitting confirmation, once described SMS module 2 receives the report that note successfully sends, automatically can notify that described monitoring module 1 performs next step operation immediately.It should be noted that, if the short message sending report function acquiescence of mobile terminal is not opened, the system of described mobile terminal can open short message sending report function automatically temporarily, and the retransmitting function of described SMS module 2 also can not be sustained, what arrange in the present embodiment is retransmit five times at most.
Described monitoring module 1 is after receiving the confirmation instruction, automatically factory reset can be performed to described mobile terminal and the operation of shutdown on backstage, so far all operations are all finished, and described monitoring module 1 can call described SMS module 2 and send the complete feedback information of a sign all operations successful execution on backstage to described outside interactive object.After user receives described feedback information by described outside interactive object, will know that the whole personal information in loss or stolen mobile terminal are all deleted, and mobile terminal also can not be operated by other people, thus ensure the information security of user to greatest extent and reduced the loss of user.
In the present invention, whether the SIM card that described monitoring module 1 first also can monitor described mobile terminal is in real time changed, if SIM card has been changed, that the card that changes normally that user carries out operates, be mobile terminal lose or stolen after other people changed another SIM card, now, in order to confirm whether mobile terminal is lost or stolen, described monitoring module 1 can call described SMS module 2 and send a SMS Tip on backstage to described external object, equally, send such note cannot be known by mobile terminal, namely mobile terminal is not left over the vestige of this SMS Tip, thus ensure that whole operating process is not discovered.Following described SMS module 2 can be in the arrival waiting for short message sending report always, once described SMS module 2 receives the report that note successfully sends, described monitoring module 1 can be notified immediately, if there is no the arrival of short message sending report for a long time, can automatically attempt retransmitting note.It should be noted that, if the short message sending report function acquiescence of mobile terminal is not opened, the system of described mobile terminal can open short message sending report function automatically temporarily, and the retransmitting function of described SMS module 2 also can not be sustained, what arrange in the present embodiment is retransmit five times at most.Do not change if monitored results is SIM card, then continue monitoring and go down.
After user receives described SMS Tip by outside interactive object, if find that described mobile terminal is not at one's side, to lose or stolen, then can send described request instruction to the SMS module 2 of described mobile terminal, a sign mobile terminal can be sent particularly lost or stolen request note, to notify described monitoring module 1.
Like this, in the present invention, mobile terminal described in each functional module that two kinds of modes can be had to notify in described mobile terminal has been lost or stolen, Information Security Prevention measure is performed to trigger each functional module, these two kinds of modes be respectively user oneself find mobile terminal lose or stolen after, outside interactive object is initiatively utilized to send request instruction to the SMS module 2 of described mobile terminal, in this case, each functional module above-mentioned normally performs respective operation, to realize the strick precaution of information security.
Another kind of situation is that the SIM card that described monitoring module 1 monitors described mobile terminal is replaced, and then send SMS Tip with reminding user by described SMS module 2 to the outside interactive object of user, user confirm described mobile terminal lost or stolen after, the SMS module 2 just to described mobile terminal sends request instruction.It should be noted that, in this case, because the SIM card of mobile terminal is replaced, namely the SIM card that mobile terminal is original is replaced, now described SIM card processing module 6 just need also have authority to perform any operation to the SIM card after replacement simultaneously, therefore, described SIM card processing module 6 no longer performs any operation in this case.
Finally it should be noted that, described monitoring module 1 is needed in advance reserved number to be set in described mobile terminal in the present invention, this reserved number is the communication number of described outside interactive object, and preferably multiple reserved number can be set, the smooth execution of whole Information Security Prevention measure can be ensured so better.In addition, very large to the damage of mobile terminal system owing to deleting important configuration information, whether utilize described configuration information processing module 5 perform the operation of deleting configuration information, be user and provide the option selecting voluntarily whether to perform this function if can be set as that user can manually be arranged according to actual needs.
In addition, having and obtaining the right of root authority, needing the corresponding scripts of the operating system revising mobile terminal in advance to allow system user, certainly, this all belongs to, and those skilled in the art can realize and complete according to actual needs, are not just repeating at this.In addition, in the present invention, each functional module is substantially all in backstage executable operations, therefore other people cannot discover by means of only the screen etc. of mobile terminal, in order to reach this purpose, also need in advance to the primary short message service of mobile terminal, Media Survey service and storage card monitoring service etc. carry out customization amendment, their monitor function is filtered, and then all operations of the precautionary measures that ensure information security can be performed when not discovering, certainly, these are also that those skilled in the art can realize according to actual needs, repeat no more equally at this.
Embodiment 2
As shown in Figure 2, the information protecting method of the present invention's mobile terminal of utilizing the mobile terminal of embodiment 1 to realize comprises the following steps:
The communication number of step 201, described monitoring module 1 outside interactive object described in the pre-stored of backstage.
Step 202, user are after discovery mobile terminal is lost or be stolen, initiatively send a request instruction by outside interactive object to described SMS module 2, described SMS module 2, after backstage receives described request instruction, sends a triggering signal to described monitoring module 1.
Step 203, described monitoring module 1, after receiving described triggering signal, call described storage card processing module 3, described screen lock module 4, described configuration information processing module 5 and described SIM card processing module 6.
Step 204, described storage card processing module 3, described screen lock module 4, described configuration information processing module 5 and described SIM card processing module 6 perform Information Security Prevention operation respectively, particularly,
Described storage card processing module 3 is at backstage Self-tipping and format the embedded memory card of described mobile terminal and external storage card;
Described screen lock module 4 judges whether described mobile terminal opens screen locking function, and the automatically unlocking screen curtain lock function when being judged as NO also arranges screen locking password;
Described configuration information processing module 5 obtains the root authority of described mobile terminal and deletes the system startup of described mobile terminal and normally run necessary configuration information;
Described SIM card processing module 6 judges whether the SIM card of described mobile terminal opens PIN lock, automatically opens PIN lock and arrange PIN code when being judged as NO, and deletes the data message stored in SIM card on backstage.
Step 205, described storage card processing module 3, described screen lock module 4, described configuration information processing module 5 and described SIM card processing module 6 send a confirmation instruction respectively to described monitoring module 1 after executable operations.
Step 206, described monitoring module 1 perform factory reset to described mobile terminal and the operation of shutdown on backstage, and call described SMS module 2 on backstage to the feedback information that described outside interactive object transmission one sign all operations successful execution is complete.
Embodiment 3
As shown in Figure 3, the information protecting method of the present invention's mobile terminal of utilizing the mobile terminal of embodiment 1 to realize comprises the following steps:
The communication number of step 301, described monitoring module 1 outside interactive object described in the pre-stored of backstage.
Whether the SIM card that step 302, described monitoring module 1 monitor described mobile terminal is in real time changed, and if so, then performs step 303, if not, then continues monitoring and goes down.
Step 303, described monitoring module 1 call described SMS module 2 and send a SMS Tip to described outside interactive object, are replaced to point out described mobile terminal SIM card.
Step 304, receive described SMS Tip at described outside interactive object, and user confirm described mobile terminal lose or stolen after, a request instruction is sent to described SMS module 2 by outside interactive object, described SMS module 2, after backstage receives described request instruction, sends a triggering signal to described monitoring module 1.
Step 305, described monitoring module 1, after receiving described triggering signal, call described storage card processing module 3, described screen lock module 4 and described configuration information processing module 5.
Step 306, described storage card processing module 3, described screen lock module 4 and described configuration information processing module 5 perform Information Security Prevention operation respectively, particularly,
Described storage card processing module 3 is at backstage Self-tipping and format the embedded memory card of described mobile terminal and external storage card;
Described screen lock module 4 judges whether described mobile terminal opens screen locking function, and the automatically unlocking screen curtain lock function when being judged as NO also arranges screen locking password;
Described configuration information processing module 5 obtains the root authority of described mobile terminal and deletes the system startup of described mobile terminal and normally run necessary configuration information.
Step 307, described storage card processing module 3, described screen lock module 4 and described configuration information processing module 5 send a confirmation instruction respectively to described monitoring module 1 after executable operations.
Step 308, described monitoring module 1 perform factory reset to described mobile terminal and the operation of shutdown on backstage, and call described SMS module 2 on backstage to the feedback information that described outside interactive object transmission one sign all operations successful execution is complete.
Although the foregoing describe the specific embodiment of the present invention, it will be understood by those of skill in the art that these only illustrate, protection scope of the present invention is defined by the appended claims.Those skilled in the art, under the prerequisite not deviating from principle of the present invention and essence, can make various changes or modifications to these execution modes, but these change and amendment all falls into protection scope of the present invention.

Claims (12)

1. a mobile terminal, is characterized in that, it comprises a monitoring module, a command reception module, a storage card processing module and a screen lock module;
Described command reception module is used for after backstage receives the request instruction sent by an outside interactive object, send a triggering signal to described monitoring module, described monitoring module is used for after receiving described triggering signal, call described storage card processing module and described screen lock module;
Described storage card processing module is used at backstage Self-tipping and formats the embedded memory card of described mobile terminal and external storage card;
Described screen lock module is for judging whether described mobile terminal opens screen locking function, and the automatically unlocking screen curtain lock function when being judged as NO also arranges screen locking password.
2. mobile terminal as claimed in claim 1, it is characterized in that, described mobile terminal also comprises a configuration information processing module, and described monitoring module also obtains the root authority of described mobile terminal for calling described configuration information processing module after receiving described triggering signal and deletes the system startup of described mobile terminal and normally run necessary configuration information.
3. mobile terminal as claimed in claim 2, it is characterized in that, described mobile terminal also comprises a SIM card processing module, for calling described SIM card processing module after receiving described triggering signal, described monitoring module also judges whether the SIM card of described mobile terminal opens PIN lock, automatically open PIN lock when being judged as NO and arranging PIN code, and delete the data message stored in SIM card on backstage.
4. mobile terminal as claimed in claim 1 or 2, it is characterized in that, described command reception module is the SMS module of described mobile terminal, whether the SIM card of described monitoring module also for monitoring described mobile terminal is in real time changed, and also calls described SMS module send a SMS Tip on backstage to described outside interactive object and be replaced to point out the SIM card of described mobile terminal when monitoring as being;
Described outside interactive object is used for after receiving SMS Tip, send described request instruction, and described request instruction is a request note.
5. mobile terminal as claimed in claim 3, it is characterized in that, described monitoring module is also for the communication number of outside interactive object described in the pre-stored of backstage, and described SIM card processing module and described screen lock module are set to described PIN code and described screen locking password by latter four of described communication number respectively.
6. mobile terminal as claimed in claim 3, it is characterized in that, described SIM card processing module, described storage card processing module, described screen lock module and described configuration information processing module also confirm instruction for sending one at complete rear of executable operations to described monitoring module, described monitoring module also for performing factory reset to described mobile terminal and the operation of shutdown on backstage after receiving described confirmation instruction, and calls described command reception module on backstage to the feedback information that described outside interactive object transmission one sign all operations successful execution is complete.
7. an information protecting method for mobile terminal, is characterized in that, it utilizes mobile terminal as claimed in claim 1 to realize, and comprises the following steps:
S 1, after described command reception module receives the request instruction sent by an outside interactive object on backstage, send a triggering signal to described monitoring module;
S 2, described monitoring module calls described storage card processing module and described screen lock module after receiving described triggering signal;
S 3, described storage card processing module is at backstage Self-tipping and format the embedded memory card of described mobile terminal and external storage card;
Described screen lock module judges whether described mobile terminal opens screen locking function, and the automatically unlocking screen curtain lock function when being judged as NO also arranges screen locking password.
8. information protecting method as claimed in claim 7, it is characterized in that, described mobile terminal also comprises a configuration information processing module, step S 2described in monitoring module also call described configuration information processing module, step S 3also comprise: described configuration information processing module obtains the root authority of described mobile terminal and deletes the system startup of described mobile terminal and normally run necessary configuration information.
9. mobile terminal as claimed in claim 8, it is characterized in that, described mobile terminal also comprises a SIM card processing module, step S 2described in monitoring module also call described SIM card processing module, step S 3also comprise: described SIM card processing module judges whether the SIM card of described mobile terminal opens PIN lock, automatically opens PIN lock and arrange PIN code when being judged as NO, and deletes the data message stored in SIM card on backstage.
10. information protecting method as claimed in claim 7 or 8, it is characterized in that, described command reception module is the SMS module of described mobile terminal, step S 1also comprise a step S before 01: whether the SIM card that described monitoring module monitors described mobile terminal is in real time changed, and also calls described SMS module send a SMS Tip on backstage to described outside interactive object and be replaced to point out the SIM card of described mobile terminal when monitoring as being;
Step S 1described in outside interactive object after receiving SMS Tip, send described request instruction, described request instruction is a request note.
11. information protecting methods as claimed in claim 9, is characterized in that, in step S 1also comprise: described monitoring module is the communication number of outside interactive object described in the pre-stored of backstage also before; Step S 3described in SIM card processing module and described screen lock module be set to described PIN code and described screen locking password by latter four of described communication number respectively.
12. information protecting methods as claimed in claim 9, is characterized in that, step S 3also comprise afterwards:
S 4, described SIM card processing module, described storage card processing module, described screen lock module and described configuration information processing module send one at complete rear of executable operations to described monitoring module and confirm instruction;
S 5, described monitoring module performs factory reset to described mobile terminal and the operation of shutdown on backstage, and call described command reception module and send one on backstage to described outside interactive object and characterize the complete feedback information of all operations successful execution.
CN201410356626.6A 2014-07-24 2014-07-24 Mobile terminal and information protection method thereof Pending CN105307135A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410356626.6A CN105307135A (en) 2014-07-24 2014-07-24 Mobile terminal and information protection method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410356626.6A CN105307135A (en) 2014-07-24 2014-07-24 Mobile terminal and information protection method thereof

Publications (1)

Publication Number Publication Date
CN105307135A true CN105307135A (en) 2016-02-03

Family

ID=55203783

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410356626.6A Pending CN105307135A (en) 2014-07-24 2014-07-24 Mobile terminal and information protection method thereof

Country Status (1)

Country Link
CN (1) CN105307135A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740677A (en) * 2016-02-29 2016-07-06 宇龙计算机通信科技(深圳)有限公司 Startup and shutdown method, system and intelligent mobile terminal
CN105956427A (en) * 2016-04-28 2016-09-21 珠海市魅族科技有限公司 Control method and device of electronic equipment
CN107231378A (en) * 2017-07-21 2017-10-03 云南电网有限责任公司信息中心 A kind of security control method based on electric power mobile office equipment, apparatus and system
CN108650394A (en) * 2018-04-27 2018-10-12 努比亚技术有限公司 Terminal security control method, mobile terminal and computer readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739868A (en) * 2012-06-18 2012-10-17 奇智软件(北京)有限公司 Mobile terminal loss processing method and system
CN102833712A (en) * 2012-08-31 2012-12-19 北京小米科技有限责任公司 Method, device, server and system for preventing information leakage and equipment
CN103619002A (en) * 2013-12-16 2014-03-05 北京百纳威尔科技有限公司 Remote safety protection method of mobile phone

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739868A (en) * 2012-06-18 2012-10-17 奇智软件(北京)有限公司 Mobile terminal loss processing method and system
CN102833712A (en) * 2012-08-31 2012-12-19 北京小米科技有限责任公司 Method, device, server and system for preventing information leakage and equipment
CN103619002A (en) * 2013-12-16 2014-03-05 北京百纳威尔科技有限公司 Remote safety protection method of mobile phone

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740677A (en) * 2016-02-29 2016-07-06 宇龙计算机通信科技(深圳)有限公司 Startup and shutdown method, system and intelligent mobile terminal
CN105956427A (en) * 2016-04-28 2016-09-21 珠海市魅族科技有限公司 Control method and device of electronic equipment
CN107231378A (en) * 2017-07-21 2017-10-03 云南电网有限责任公司信息中心 A kind of security control method based on electric power mobile office equipment, apparatus and system
CN108650394A (en) * 2018-04-27 2018-10-12 努比亚技术有限公司 Terminal security control method, mobile terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
JP5893169B2 (en) Anti-theft protection method and device for mobile phone
CN100466861C (en) Anti-theft method for cell phone
CN101252703B (en) Terminal data protecting method, system as well as mobile communication terminal
CN102739868B (en) The loss processing method of mobile terminal and system
CN103037310A (en) Mobile terminal intelligent anti-theft method and mobile terminal
CN101616495A (en) The method and system of individual privacy in the protection mobile phone
US8555060B2 (en) Managing method, device and terminal for application program
CN102930188A (en) Screen unlocking method and device as well as terminal
CN101926099A (en) Method for destructive readout of data in case of mobile theft
CN101026834A (en) Locking method and unlocking method
CN102780813A (en) Mobile terminal-based alarm method and system
CN101155212A (en) Method for limiting use of mobile terminal
CN101163290A (en) Method of limiting use of mobile terminal through machine-card mutual authentication
CN110719203A (en) Operation control method, device and equipment of intelligent household equipment and storage medium
CN105307135A (en) Mobile terminal and information protection method thereof
CN109792601B (en) Method and equipment for deleting eUICC configuration file
CN100459816C (en) Encrypted information processing method and terminal
WO2012174898A1 (en) Anti-theft platform and client, terminal and mobile terminal anti-theft processing method
US20130018980A1 (en) Communication System and Communication Device
KR101087698B1 (en) Method for authenticating security of smart-phone
CN101895829A (en) Method and system for retrieving FLASH data from mobile telephone, and mobile telephone
CN106453057B (en) A kind of method and terminal for preventing short message to be stolen
KR20070117767A (en) System and method for remote controlling mobile telecommunication terminal
WO2017148337A1 (en) Methods of providing and acquiring terminal service, device, and terminal
CN111050323B (en) Terminal switching method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160203

WD01 Invention patent application deemed withdrawn after publication