CN105451224A - Destroying method - Google Patents

Destroying method Download PDF

Info

Publication number
CN105451224A
CN105451224A CN201410406620.5A CN201410406620A CN105451224A CN 105451224 A CN105451224 A CN 105451224A CN 201410406620 A CN201410406620 A CN 201410406620A CN 105451224 A CN105451224 A CN 105451224A
Authority
CN
China
Prior art keywords
mobile terminal
broadcast
imsi
imei
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410406620.5A
Other languages
Chinese (zh)
Other versions
CN105451224B (en
Inventor
高林花
姬峰
李飞
何代钦
陈正伟
李燕舞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing BNC Technologies Co Ltd
Original Assignee
Beijing BNC Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing BNC Technologies Co Ltd filed Critical Beijing BNC Technologies Co Ltd
Priority to CN201410406620.5A priority Critical patent/CN105451224B/en
Publication of CN105451224A publication Critical patent/CN105451224A/en
Application granted granted Critical
Publication of CN105451224B publication Critical patent/CN105451224B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to a destroying method. The method includes the steps of: after a user successfully logs in for the first time through a mobile terminal, an IMEI and an IMSI are stored locally, and a first broadcast is added to an alarm clock management timer and broadcasted; a successful log-in variable is set to be true; when a broadcast receiver of the mobile terminal receives the first broadcast, a destroying service is started; the broadcast receiver receives a startup self-starting broadcast sent by a system; whether the successful log-in variable is true is judged, and if yes, a second broadcast is sent; when the broadcast receiver receives the second broadcast, an SIM is monitored; and if the SIM cannot be identified, or a second IMEI is inconsistent with a first IMEI, the destroying method provided by the invention can conveniently utilizes local detection to perform self-destruction, or utilizes a server side to start destroying, information stored by the mobile terminal is destroyed, and thus information security of the mobile terminal can be effectively protected.

Description

Destroying method
Technical field
The present invention relates to information security field, particularly relate to a kind of destroying method.
Background technology
Along with the development in epoch, information technology is maked rapid progress, and people are also increasing to the demand of information.And in informationalized society, importance and the economic worth of information are also more and more higher.
But therefore information security issue also produces, especially for the high industry of some security requirements or field, lose when used mobile terminal and found the problem that just may produce information dropout He divulge a secret by people.
Summary of the invention
The object of the invention is the defect for prior art, provide a kind of destroying method, in order to realize when finding unsafe conditions, startup is destroyed, and effectively can prevent information leakage.
For achieving the above object, the invention provides a kind of destroying method, described method comprises:
User is by after mobile terminal first Successful login, the First International mobile device identification code IMEI of described mobile terminal and First International mobile identification number IMSI is kept at this locality, and the first broadcast is added in alarm clock management AlarmManager timer and to broadcast described first broadcast; Be true by Successful login variable set up when user starts shooting;
The radio receiver of mobile terminal receives described first broadcast, starts the service of destruction;
After start, described radio receiver receives the start self-starting broadcast that system sends;
Judge whether described Successful login variable is true, then send the second broadcast in this way;
When described radio receiver receives described second broadcast, monitor client identification module SIM in described mobile terminal;
If None-identified is to described SIM, or the 2nd IMEI of the described mobile terminal got is inconsistent with the local described IMEI preserved, or the 2nd IMSI got is inconsistent with the local described IMSI preserved, and described mobile terminal is destroyed.
Further, described in this way then send second broadcast specifically comprise: by described second broadcast add to alarm clock management in, with the very first time interval send described second broadcast.
Further, described mobile terminal carries out destroying specifically comprising: the information deletion that this locality is preserved by described mobile terminal.
Further, described method also comprises: destruction traffic sign placement is true by described mobile terminal, and will send to described server the time of destroying.
Present invention also offers a kind of destroying method, described method comprises:
Server receives to destroy and asks and preserve in lists, and described destruction request comprises user ID, and described user ID is bound with user cipher, IMIS and IMEI phase;
It is no that mobile terminal judges that destruction is masked as, and send to described server and destroy query messages, described destruction query messages comprises an IMSI and an IMEI of described mobile terminal;
Described server searches bound user ID according to an a described IMSI and IMEI;
Described server finds described first user ID in described list, by the 2nd corresponding for the described user ID of preserving in described list IMSI, and the 2nd IMSI after encryption is sent to described mobile terminal;
Described mobile terminal judges that the 2nd IMSI after described encryption is consistent with the IMSI after local encryption, then described mobile terminal is destroyed.
Further, described server receives to destroy and asks and preserve also to comprise afterwards in lists, and described user ID is set to destroy state.
Further, the IMSI of described mobile terminal that comprises of a described destruction query messages and IMEI is specially the IMSI after encryption and the IMEI after encryption.
Method according to claim 5, is characterized in that, described server also comprises before searching bound user ID according to an a described IMSI and IMEI, verifies that whether an a described IMSI and IMEI is legal.
Further, described mobile terminal carries out destroying specifically comprising: the information deletion that this locality is preserved by described mobile terminal.
Further, described method also comprises: destruction traffic sign placement is true by described mobile terminal, and will send to described server the time of destroying.
Destroying method of the present invention can utilize local detection to carry out from destroying easily, or utilizes server side startup to destroy, the information destroying preserved by mobile terminal, thus the information security effectively can protecting mobile terminal.
Accompanying drawing explanation
Fig. 1 is the flow chart of destroying method embodiment one of the present invention;
Fig. 2 is the flow chart of destroying method embodiment two of the present invention.
Embodiment
Below by drawings and Examples, technical scheme of the present invention is described in further detail.
Destroying method of the present invention is exactly utilize auto-destruct or remote destroying to ensure the safety of user profile, causes the accidental release of information after preventing mobile terminal from losing.
The present invention has two kinds of tupes, the first pattern is applicable to terminal binding, user is after first time Successful login terminal software, acquisition equipment international mobile subscriber identity (InternationalMobileSubscriberIdentificationNumber, IMSI), international mobile equipment identification number (InternationalMobileEquipmentIdentificationNumber, IMEI) information being kept in SharedPreferences.According to preserving facility information and existing equipment IMEI, IMSI compare when destroying service operation, determine whether to need destruction.
Fig. 1 is the flow chart of destroying method embodiment one of the present invention, and as shown in the figure, the present embodiment specifically comprises the steps:
Step 101, an IMEI of a mobile terminal and IMSI, by after mobile terminal first Successful login, is kept at this locality by user; And the first broadcast to be added in alarm clock management AlarmManager timer and to broadcast;
Successful login variable set up is true by step 102;
Step 103, the radio receiver of mobile terminal receives the first broadcast, starts the service of destruction;
Concrete, during user's first time Successful login, IMSI, IMEI information of equipment is kept in SharedPreferences, will represents that the variable successedLogin of successfully logged software is set to true simultaneously.After the success of user's first time manual entry, first broadcast Constants.ACTION_ACTIVATE_DESTROY is added in alarm clock management AlarmManager, and constantly sending this broadcast with the interval time of 120 seconds, radio receiver starts the service of destruction after receiving this first broadcast immediately.
Step 104, after start, radio receiver receives the start self-starting broadcast that system sends;
Step 105, judges whether Successful login variable is true, then sends the second broadcast in this way;
Concrete, mobile terminal is started shooting again afterwards, radio receiver is then utilized to receive start self-starting broadcast, i.e. android.intent.action.BOOT_COMPLETED broadcast, first whether the value of judgment variable successedLogin is true, if satisfied condition, just the second broadcast and Constants.ACTION_ACTIVATE_DESTROY is added in alarm clock management AlarmManager, such as, and with very first time interval, the time of 120 seconds constantly sends this broadcast.
Step 106, when radio receiver receives the second broadcast, monitors client identification module (SubscriberIdentityModule, SIM) in mobile terminal;
Concrete, after radio receiver receives the second broadcast, start the service of destruction immediately, monitor the state of SIM card.
Step 107, if None-identified is to SIM, or the 2nd IMEI of the mobile terminal got is inconsistent with the local IMEI preserved, or the 2nd IMSI got is inconsistent with the local IMSI preserved, and mobile terminal is destroyed.
Concrete, if None-identified is to SIM card, such as, is without SIM card state, or has SIM card state, but the IMSI that the 2nd IMSI got or the 2nd IMEI information and SharedPreferences preserve or an IMEI information inconsistent, all open from destroying.
Destroying is exactly the information deletion preserved this locality, such as, information in delete database file, empty all variablees (comprising user account, password, IMEI, IMSI, setting option) that SharedPreferences preserves, then destruction mark destroy is set to true, preserves in SharedPreferences.
If network is normal, then the software time of destroying is sent to server.Kill current process, and the view layer run, service layer process.
If wished when again logging in next time, then can point out that " software is self-destruction, reinstalls after please unloading! ", cannot enter this application, software prohibits the use.
The second tupe of the present invention is applicable to server end binding: when server end typing user profile, user ID, password, IMSI, IMEI are bound, when having remote destroying request, can go to search according to IMSI, IMEI the user needing to destroy, then destroy operation accordingly.
Fig. 2 is the flow chart of destroying method embodiment two of the present invention, and as shown in the figure, the present embodiment specifically comprises the steps:
Step 201, server receives to destroy and asks and preserve in lists, and the request of destruction comprises user ID, and user ID is bound with user cipher, IMIS and IMEI phase;
Concrete, if having destruction requirement to the user of certain binding, then choose this user at dispatching desk, send and destroy request CC2SS_KILL_USR_REQ to server, destruction request is carried by destruction user ID.
After server receives the destruction request of dispatching desk, in these three tables, PTT_HEAP.ZXYongHu_Record, PTT_HEAP.YongHu_Record, PTT_DISK.YongHu_Info find this user, and arrange the destroy state of this user.
Step 202, it is no that mobile terminal judges that destruction is masked as, and sends and destroy query messages, destroy an IMSI and an IMEI that query messages comprises mobile terminal to server;
Concrete, after terminal starts the service of destruction, if destroying mark destroy is false, then with very first time interval, within such as 120 seconds, send the inquiry of destruction query messages with or without destruction requirement to server, the destruction query messages of transmission comprises the first IMSI information, and an IMEI information, the first IMSI information preferably after md5 encryption, and an IMEI information.
Step 203, server searches bound user ID according to an an IMSI and IMEI;
Concrete, after server receives and destroys query messages, by first IMSI information of carrying in message, and an IMEI Information Authentication binding relationship, after checking is legal, by the user ID that binding relationship finds terminal corresponding, and search by user ID the destruction request record whether having and destroy this user in PTT_HEAP.YongHu_Record table.
Step 204, server finds first user ID in lists, by the 2nd corresponding for the user ID of preserving in list IMSI, and the 2nd IMSI after encryption is sent to mobile terminal;
Step 205, mobile terminal judges that the 2nd IMSI after encryption is consistent with the IMSI after local encryption, then mobile terminal is destroyed.
Concrete, when mobile terminal obtains the destruction acknowledge message KILL_USR_CNF_MSG that server returns, judge second IMSI information after md5 encryption will destroying mobile phone of carrying in server return messages whether encrypt with existing equipment after an IMSI consistent, if equal and destroy flag bit be 1, then start Shredding Process.
Destroying is exactly the information deletion preserved this locality, such as, information in delete database file, empty all variablees (comprising user account, password, IMEI, IMSI, setting option) that SharedPreferences preserves, then destruction mark destroy is set to true, preserves in SharedPreferences.
If network is normal, then the software time of destroying is sent to server.Kill current process, and the view layer run, service layer process.
If wished when again logging in next time, then can point out that " software is self-destruction, reinstalls after please unloading! ", cannot enter this application, software prohibits the use.
Destroying method of the present invention can utilize local detection to carry out from destroying easily, or utilizes server side startup to destroy, the information destroying preserved by mobile terminal, thus the information security effectively can protecting mobile terminal.
Professional should recognize further, in conjunction with unit and the algorithm steps of each example of embodiment disclosed herein description, can realize with electronic hardware, computer software or the combination of the two, in order to the interchangeability of hardware and software is clearly described, generally describe composition and the step of each example in the above description according to function.These functions perform with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel can use distinct methods to realize described function to each specifically should being used for, but this realization should not thought and exceeds scope of the present invention.
The software module that the method described in conjunction with embodiment disclosed herein or the step of algorithm can use hardware, processor to perform, or the combination of the two is implemented.Software module can be placed in the storage medium of other form any known in random asccess memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field.
Above-described embodiment; object of the present invention, technical scheme and beneficial effect are further described; be understood that; the foregoing is only the specific embodiment of the present invention; the protection range be not intended to limit the present invention; within the spirit and principles in the present invention all, any amendment made, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a destroying method, is characterized in that, described method comprises:
User is by after mobile terminal first Successful login, the First International mobile device identification code IMEI of described mobile terminal and First International mobile identification number IMSI is kept at this locality, and the first broadcast is added in alarm clock management AlarmManager timer and to broadcast described first broadcast;
Be true by Successful login variable set up when user starts shooting;
The radio receiver of mobile terminal receives described first broadcast, starts the service of destruction;
After start, described radio receiver receives the start self-starting broadcast that system sends;
Judge whether described Successful login variable is true, then send the second broadcast in this way;
When described radio receiver receives described second broadcast, monitor client identification module SIM in described mobile terminal;
If None-identified is to described SIM, or the 2nd IMEI of the described mobile terminal got is inconsistent with the local described IMEI preserved, or the 2nd IMSI got is inconsistent with the local described IMSI preserved, and described mobile terminal is destroyed.
2. method according to claim 1, is characterized in that, described in this way then send second broadcast specifically comprise: by described second broadcast add in alarm clock managing timer, with the very first time interval send described second broadcast.
3. method according to claim 1, is characterized in that, described mobile terminal carries out destroying specifically comprising: the information deletion that this locality is preserved by described mobile terminal.
4. method according to claim 1, is characterized in that, described method also comprises: destruction traffic sign placement is true by described mobile terminal, and will send to described server the time of destroying.
5. a destroying method, is characterized in that, described method comprises:
Server receives to destroy and asks and preserve in lists, and described destruction request comprises user ID, and described user ID is bound with user cipher, IMIS and IMEI phase;
It is no that mobile terminal judges that destruction is masked as, and send to described server and destroy query messages, described destruction query messages comprises an IMSI and an IMEI of described mobile terminal;
Described server searches bound user ID according to an a described IMSI and IMEI;
Described server finds described first user ID in described list, by the 2nd corresponding for the described user ID of preserving in described list IMSI, and the 2nd IMSI after encryption is sent to described mobile terminal;
Described mobile terminal judges that the 2nd IMSI after described encryption is consistent with the IMSI after local encryption, then described mobile terminal is destroyed.
6. method according to claim 5, is characterized in that, described server receives to destroy and asks and preserve also to comprise afterwards in lists, and described user ID is set to destroy state.
7. method according to claim 5, is characterized in that, an IMSI of the described mobile terminal that described destruction query messages comprises an and IMEI is specially the IMEI after the IMSI after encryption and encryption.
8. method according to claim 5, is characterized in that, described server also comprises before searching bound user ID according to an a described IMSI and IMEI, verifies that whether an a described IMSI and IMEI is legal.
9. method according to claim 5, is characterized in that, described mobile terminal carries out destroying specifically comprising: the information deletion that this locality is preserved by described mobile terminal.
10. method according to claim 5, is characterized in that, described method also comprises: destruction traffic sign placement is true by described mobile terminal, and will send to described server the time of destroying.
CN201410406620.5A 2014-08-18 2014-08-18 Destroying method Active CN105451224B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410406620.5A CN105451224B (en) 2014-08-18 2014-08-18 Destroying method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410406620.5A CN105451224B (en) 2014-08-18 2014-08-18 Destroying method

Publications (2)

Publication Number Publication Date
CN105451224A true CN105451224A (en) 2016-03-30
CN105451224B CN105451224B (en) 2018-09-28

Family

ID=55560918

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410406620.5A Active CN105451224B (en) 2014-08-18 2014-08-18 Destroying method

Country Status (1)

Country Link
CN (1) CN105451224B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674583A (en) * 2009-08-25 2010-03-17 联信摩贝软件(北京)有限公司 Method for hiding or recovering personal information when changing SIM card and system thereof
EP2357859B1 (en) * 2008-11-27 2013-06-19 ZTE Corporation An authentication method for the mobile terminal and a system thereof
CN103634477A (en) * 2013-12-11 2014-03-12 深圳市亚略特生物识别科技有限公司 Method and system for preventing thievery of mobile phone with fingerprint device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2357859B1 (en) * 2008-11-27 2013-06-19 ZTE Corporation An authentication method for the mobile terminal and a system thereof
CN101674583A (en) * 2009-08-25 2010-03-17 联信摩贝软件(北京)有限公司 Method for hiding or recovering personal information when changing SIM card and system thereof
CN103634477A (en) * 2013-12-11 2014-03-12 深圳市亚略特生物识别科技有限公司 Method and system for preventing thievery of mobile phone with fingerprint device

Also Published As

Publication number Publication date
CN105451224B (en) 2018-09-28

Similar Documents

Publication Publication Date Title
CN109460660B (en) Mobile device safety management system
US9325704B2 (en) Data access method and device
CN103037312B (en) Information push method and device
CN101400054B (en) Method, system and device for protecting privacy of customer terminal
CN103945385B (en) The method and its device of guarding against theft for mobile terminal
CN103607393A (en) Data safety protection method based on data partitioning
CN104767713A (en) Account binding method, server and account binding system
CN102685730B (en) Method for transmitting context information of user equipment (UE) and mobility management entity (MME)
CN105578451A (en) Antitheft method and device
WO2018141172A1 (en) Method for controlling web browsing on terminal and for web browsing on terminal, router device, and terminal
CN105142136A (en) Method for preventing counterfeit base attack
CN112154684A (en) Method and device for verifying network validity and computer storage medium
CN105224262A (en) Data processing method
CN103714017A (en) Authentication method, authentication device and authentication equipment
EP2863667A1 (en) Method and system for encrypting terminal using subscriber identity module card
KR101670687B1 (en) System, method and computer program for sending message
WO2011011952A1 (en) Method for protecting storage devices based on mobile communication network
CN101953194A (en) Method for transmitting notification signal and mobile station
CN106911653B (en) Method, device, mobile terminal and system for realizing remote control of mobile terminal
CN105516316A (en) Method for improving information security of smart phone user
CN105451224A (en) Destroying method
CN101383702B (en) Method and system protecting cipher generating parameter in tracing region updating
CN102938882A (en) Method and system changing contact information of mobile phone terminals of others by sending messages
WO2016054892A1 (en) Method and device for user information protection
Park et al. Analyzing RRC Replay Attack and Securing Base Station with Practical Method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant