CN105451224A - Destroying method - Google Patents
Destroying method Download PDFInfo
- Publication number
- CN105451224A CN105451224A CN201410406620.5A CN201410406620A CN105451224A CN 105451224 A CN105451224 A CN 105451224A CN 201410406620 A CN201410406620 A CN 201410406620A CN 105451224 A CN105451224 A CN 105451224A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- broadcast
- imsi
- imei
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The invention relates to a destroying method. The method includes the steps of: after a user successfully logs in for the first time through a mobile terminal, an IMEI and an IMSI are stored locally, and a first broadcast is added to an alarm clock management timer and broadcasted; a successful log-in variable is set to be true; when a broadcast receiver of the mobile terminal receives the first broadcast, a destroying service is started; the broadcast receiver receives a startup self-starting broadcast sent by a system; whether the successful log-in variable is true is judged, and if yes, a second broadcast is sent; when the broadcast receiver receives the second broadcast, an SIM is monitored; and if the SIM cannot be identified, or a second IMEI is inconsistent with a first IMEI, the destroying method provided by the invention can conveniently utilizes local detection to perform self-destruction, or utilizes a server side to start destroying, information stored by the mobile terminal is destroyed, and thus information security of the mobile terminal can be effectively protected.
Description
Technical field
The present invention relates to information security field, particularly relate to a kind of destroying method.
Background technology
Along with the development in epoch, information technology is maked rapid progress, and people are also increasing to the demand of information.And in informationalized society, importance and the economic worth of information are also more and more higher.
But therefore information security issue also produces, especially for the high industry of some security requirements or field, lose when used mobile terminal and found the problem that just may produce information dropout He divulge a secret by people.
Summary of the invention
The object of the invention is the defect for prior art, provide a kind of destroying method, in order to realize when finding unsafe conditions, startup is destroyed, and effectively can prevent information leakage.
For achieving the above object, the invention provides a kind of destroying method, described method comprises:
User is by after mobile terminal first Successful login, the First International mobile device identification code IMEI of described mobile terminal and First International mobile identification number IMSI is kept at this locality, and the first broadcast is added in alarm clock management AlarmManager timer and to broadcast described first broadcast; Be true by Successful login variable set up when user starts shooting;
The radio receiver of mobile terminal receives described first broadcast, starts the service of destruction;
After start, described radio receiver receives the start self-starting broadcast that system sends;
Judge whether described Successful login variable is true, then send the second broadcast in this way;
When described radio receiver receives described second broadcast, monitor client identification module SIM in described mobile terminal;
If None-identified is to described SIM, or the 2nd IMEI of the described mobile terminal got is inconsistent with the local described IMEI preserved, or the 2nd IMSI got is inconsistent with the local described IMSI preserved, and described mobile terminal is destroyed.
Further, described in this way then send second broadcast specifically comprise: by described second broadcast add to alarm clock management in, with the very first time interval send described second broadcast.
Further, described mobile terminal carries out destroying specifically comprising: the information deletion that this locality is preserved by described mobile terminal.
Further, described method also comprises: destruction traffic sign placement is true by described mobile terminal, and will send to described server the time of destroying.
Present invention also offers a kind of destroying method, described method comprises:
Server receives to destroy and asks and preserve in lists, and described destruction request comprises user ID, and described user ID is bound with user cipher, IMIS and IMEI phase;
It is no that mobile terminal judges that destruction is masked as, and send to described server and destroy query messages, described destruction query messages comprises an IMSI and an IMEI of described mobile terminal;
Described server searches bound user ID according to an a described IMSI and IMEI;
Described server finds described first user ID in described list, by the 2nd corresponding for the described user ID of preserving in described list IMSI, and the 2nd IMSI after encryption is sent to described mobile terminal;
Described mobile terminal judges that the 2nd IMSI after described encryption is consistent with the IMSI after local encryption, then described mobile terminal is destroyed.
Further, described server receives to destroy and asks and preserve also to comprise afterwards in lists, and described user ID is set to destroy state.
Further, the IMSI of described mobile terminal that comprises of a described destruction query messages and IMEI is specially the IMSI after encryption and the IMEI after encryption.
Method according to claim 5, is characterized in that, described server also comprises before searching bound user ID according to an a described IMSI and IMEI, verifies that whether an a described IMSI and IMEI is legal.
Further, described mobile terminal carries out destroying specifically comprising: the information deletion that this locality is preserved by described mobile terminal.
Further, described method also comprises: destruction traffic sign placement is true by described mobile terminal, and will send to described server the time of destroying.
Destroying method of the present invention can utilize local detection to carry out from destroying easily, or utilizes server side startup to destroy, the information destroying preserved by mobile terminal, thus the information security effectively can protecting mobile terminal.
Accompanying drawing explanation
Fig. 1 is the flow chart of destroying method embodiment one of the present invention;
Fig. 2 is the flow chart of destroying method embodiment two of the present invention.
Embodiment
Below by drawings and Examples, technical scheme of the present invention is described in further detail.
Destroying method of the present invention is exactly utilize auto-destruct or remote destroying to ensure the safety of user profile, causes the accidental release of information after preventing mobile terminal from losing.
The present invention has two kinds of tupes, the first pattern is applicable to terminal binding, user is after first time Successful login terminal software, acquisition equipment international mobile subscriber identity (InternationalMobileSubscriberIdentificationNumber, IMSI), international mobile equipment identification number (InternationalMobileEquipmentIdentificationNumber, IMEI) information being kept in SharedPreferences.According to preserving facility information and existing equipment IMEI, IMSI compare when destroying service operation, determine whether to need destruction.
Fig. 1 is the flow chart of destroying method embodiment one of the present invention, and as shown in the figure, the present embodiment specifically comprises the steps:
Step 101, an IMEI of a mobile terminal and IMSI, by after mobile terminal first Successful login, is kept at this locality by user; And the first broadcast to be added in alarm clock management AlarmManager timer and to broadcast;
Successful login variable set up is true by step 102;
Step 103, the radio receiver of mobile terminal receives the first broadcast, starts the service of destruction;
Concrete, during user's first time Successful login, IMSI, IMEI information of equipment is kept in SharedPreferences, will represents that the variable successedLogin of successfully logged software is set to true simultaneously.After the success of user's first time manual entry, first broadcast Constants.ACTION_ACTIVATE_DESTROY is added in alarm clock management AlarmManager, and constantly sending this broadcast with the interval time of 120 seconds, radio receiver starts the service of destruction after receiving this first broadcast immediately.
Step 104, after start, radio receiver receives the start self-starting broadcast that system sends;
Step 105, judges whether Successful login variable is true, then sends the second broadcast in this way;
Concrete, mobile terminal is started shooting again afterwards, radio receiver is then utilized to receive start self-starting broadcast, i.e. android.intent.action.BOOT_COMPLETED broadcast, first whether the value of judgment variable successedLogin is true, if satisfied condition, just the second broadcast and Constants.ACTION_ACTIVATE_DESTROY is added in alarm clock management AlarmManager, such as, and with very first time interval, the time of 120 seconds constantly sends this broadcast.
Step 106, when radio receiver receives the second broadcast, monitors client identification module (SubscriberIdentityModule, SIM) in mobile terminal;
Concrete, after radio receiver receives the second broadcast, start the service of destruction immediately, monitor the state of SIM card.
Step 107, if None-identified is to SIM, or the 2nd IMEI of the mobile terminal got is inconsistent with the local IMEI preserved, or the 2nd IMSI got is inconsistent with the local IMSI preserved, and mobile terminal is destroyed.
Concrete, if None-identified is to SIM card, such as, is without SIM card state, or has SIM card state, but the IMSI that the 2nd IMSI got or the 2nd IMEI information and SharedPreferences preserve or an IMEI information inconsistent, all open from destroying.
Destroying is exactly the information deletion preserved this locality, such as, information in delete database file, empty all variablees (comprising user account, password, IMEI, IMSI, setting option) that SharedPreferences preserves, then destruction mark destroy is set to true, preserves in SharedPreferences.
If network is normal, then the software time of destroying is sent to server.Kill current process, and the view layer run, service layer process.
If wished when again logging in next time, then can point out that " software is self-destruction, reinstalls after please unloading! ", cannot enter this application, software prohibits the use.
The second tupe of the present invention is applicable to server end binding: when server end typing user profile, user ID, password, IMSI, IMEI are bound, when having remote destroying request, can go to search according to IMSI, IMEI the user needing to destroy, then destroy operation accordingly.
Fig. 2 is the flow chart of destroying method embodiment two of the present invention, and as shown in the figure, the present embodiment specifically comprises the steps:
Step 201, server receives to destroy and asks and preserve in lists, and the request of destruction comprises user ID, and user ID is bound with user cipher, IMIS and IMEI phase;
Concrete, if having destruction requirement to the user of certain binding, then choose this user at dispatching desk, send and destroy request CC2SS_KILL_USR_REQ to server, destruction request is carried by destruction user ID.
After server receives the destruction request of dispatching desk, in these three tables, PTT_HEAP.ZXYongHu_Record, PTT_HEAP.YongHu_Record, PTT_DISK.YongHu_Info find this user, and arrange the destroy state of this user.
Step 202, it is no that mobile terminal judges that destruction is masked as, and sends and destroy query messages, destroy an IMSI and an IMEI that query messages comprises mobile terminal to server;
Concrete, after terminal starts the service of destruction, if destroying mark destroy is false, then with very first time interval, within such as 120 seconds, send the inquiry of destruction query messages with or without destruction requirement to server, the destruction query messages of transmission comprises the first IMSI information, and an IMEI information, the first IMSI information preferably after md5 encryption, and an IMEI information.
Step 203, server searches bound user ID according to an an IMSI and IMEI;
Concrete, after server receives and destroys query messages, by first IMSI information of carrying in message, and an IMEI Information Authentication binding relationship, after checking is legal, by the user ID that binding relationship finds terminal corresponding, and search by user ID the destruction request record whether having and destroy this user in PTT_HEAP.YongHu_Record table.
Step 204, server finds first user ID in lists, by the 2nd corresponding for the user ID of preserving in list IMSI, and the 2nd IMSI after encryption is sent to mobile terminal;
Step 205, mobile terminal judges that the 2nd IMSI after encryption is consistent with the IMSI after local encryption, then mobile terminal is destroyed.
Concrete, when mobile terminal obtains the destruction acknowledge message KILL_USR_CNF_MSG that server returns, judge second IMSI information after md5 encryption will destroying mobile phone of carrying in server return messages whether encrypt with existing equipment after an IMSI consistent, if equal and destroy flag bit be 1, then start Shredding Process.
Destroying is exactly the information deletion preserved this locality, such as, information in delete database file, empty all variablees (comprising user account, password, IMEI, IMSI, setting option) that SharedPreferences preserves, then destruction mark destroy is set to true, preserves in SharedPreferences.
If network is normal, then the software time of destroying is sent to server.Kill current process, and the view layer run, service layer process.
If wished when again logging in next time, then can point out that " software is self-destruction, reinstalls after please unloading! ", cannot enter this application, software prohibits the use.
Destroying method of the present invention can utilize local detection to carry out from destroying easily, or utilizes server side startup to destroy, the information destroying preserved by mobile terminal, thus the information security effectively can protecting mobile terminal.
Professional should recognize further, in conjunction with unit and the algorithm steps of each example of embodiment disclosed herein description, can realize with electronic hardware, computer software or the combination of the two, in order to the interchangeability of hardware and software is clearly described, generally describe composition and the step of each example in the above description according to function.These functions perform with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel can use distinct methods to realize described function to each specifically should being used for, but this realization should not thought and exceeds scope of the present invention.
The software module that the method described in conjunction with embodiment disclosed herein or the step of algorithm can use hardware, processor to perform, or the combination of the two is implemented.Software module can be placed in the storage medium of other form any known in random asccess memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field.
Above-described embodiment; object of the present invention, technical scheme and beneficial effect are further described; be understood that; the foregoing is only the specific embodiment of the present invention; the protection range be not intended to limit the present invention; within the spirit and principles in the present invention all, any amendment made, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. a destroying method, is characterized in that, described method comprises:
User is by after mobile terminal first Successful login, the First International mobile device identification code IMEI of described mobile terminal and First International mobile identification number IMSI is kept at this locality, and the first broadcast is added in alarm clock management AlarmManager timer and to broadcast described first broadcast;
Be true by Successful login variable set up when user starts shooting;
The radio receiver of mobile terminal receives described first broadcast, starts the service of destruction;
After start, described radio receiver receives the start self-starting broadcast that system sends;
Judge whether described Successful login variable is true, then send the second broadcast in this way;
When described radio receiver receives described second broadcast, monitor client identification module SIM in described mobile terminal;
If None-identified is to described SIM, or the 2nd IMEI of the described mobile terminal got is inconsistent with the local described IMEI preserved, or the 2nd IMSI got is inconsistent with the local described IMSI preserved, and described mobile terminal is destroyed.
2. method according to claim 1, is characterized in that, described in this way then send second broadcast specifically comprise: by described second broadcast add in alarm clock managing timer, with the very first time interval send described second broadcast.
3. method according to claim 1, is characterized in that, described mobile terminal carries out destroying specifically comprising: the information deletion that this locality is preserved by described mobile terminal.
4. method according to claim 1, is characterized in that, described method also comprises: destruction traffic sign placement is true by described mobile terminal, and will send to described server the time of destroying.
5. a destroying method, is characterized in that, described method comprises:
Server receives to destroy and asks and preserve in lists, and described destruction request comprises user ID, and described user ID is bound with user cipher, IMIS and IMEI phase;
It is no that mobile terminal judges that destruction is masked as, and send to described server and destroy query messages, described destruction query messages comprises an IMSI and an IMEI of described mobile terminal;
Described server searches bound user ID according to an a described IMSI and IMEI;
Described server finds described first user ID in described list, by the 2nd corresponding for the described user ID of preserving in described list IMSI, and the 2nd IMSI after encryption is sent to described mobile terminal;
Described mobile terminal judges that the 2nd IMSI after described encryption is consistent with the IMSI after local encryption, then described mobile terminal is destroyed.
6. method according to claim 5, is characterized in that, described server receives to destroy and asks and preserve also to comprise afterwards in lists, and described user ID is set to destroy state.
7. method according to claim 5, is characterized in that, an IMSI of the described mobile terminal that described destruction query messages comprises an and IMEI is specially the IMEI after the IMSI after encryption and encryption.
8. method according to claim 5, is characterized in that, described server also comprises before searching bound user ID according to an a described IMSI and IMEI, verifies that whether an a described IMSI and IMEI is legal.
9. method according to claim 5, is characterized in that, described mobile terminal carries out destroying specifically comprising: the information deletion that this locality is preserved by described mobile terminal.
10. method according to claim 5, is characterized in that, described method also comprises: destruction traffic sign placement is true by described mobile terminal, and will send to described server the time of destroying.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410406620.5A CN105451224B (en) | 2014-08-18 | 2014-08-18 | Destroying method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410406620.5A CN105451224B (en) | 2014-08-18 | 2014-08-18 | Destroying method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105451224A true CN105451224A (en) | 2016-03-30 |
CN105451224B CN105451224B (en) | 2018-09-28 |
Family
ID=55560918
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410406620.5A Active CN105451224B (en) | 2014-08-18 | 2014-08-18 | Destroying method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105451224B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101674583A (en) * | 2009-08-25 | 2010-03-17 | 联信摩贝软件(北京)有限公司 | Method for hiding or recovering personal information when changing SIM card and system thereof |
EP2357859B1 (en) * | 2008-11-27 | 2013-06-19 | ZTE Corporation | An authentication method for the mobile terminal and a system thereof |
CN103634477A (en) * | 2013-12-11 | 2014-03-12 | 深圳市亚略特生物识别科技有限公司 | Method and system for preventing thievery of mobile phone with fingerprint device |
-
2014
- 2014-08-18 CN CN201410406620.5A patent/CN105451224B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2357859B1 (en) * | 2008-11-27 | 2013-06-19 | ZTE Corporation | An authentication method for the mobile terminal and a system thereof |
CN101674583A (en) * | 2009-08-25 | 2010-03-17 | 联信摩贝软件(北京)有限公司 | Method for hiding or recovering personal information when changing SIM card and system thereof |
CN103634477A (en) * | 2013-12-11 | 2014-03-12 | 深圳市亚略特生物识别科技有限公司 | Method and system for preventing thievery of mobile phone with fingerprint device |
Also Published As
Publication number | Publication date |
---|---|
CN105451224B (en) | 2018-09-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109460660B (en) | Mobile device safety management system | |
US9325704B2 (en) | Data access method and device | |
CN103037312B (en) | Information push method and device | |
CN101400054B (en) | Method, system and device for protecting privacy of customer terminal | |
CN103945385B (en) | The method and its device of guarding against theft for mobile terminal | |
CN103607393A (en) | Data safety protection method based on data partitioning | |
CN104767713A (en) | Account binding method, server and account binding system | |
CN102685730B (en) | Method for transmitting context information of user equipment (UE) and mobility management entity (MME) | |
CN105578451A (en) | Antitheft method and device | |
WO2018141172A1 (en) | Method for controlling web browsing on terminal and for web browsing on terminal, router device, and terminal | |
CN105142136A (en) | Method for preventing counterfeit base attack | |
CN112154684A (en) | Method and device for verifying network validity and computer storage medium | |
CN105224262A (en) | Data processing method | |
CN103714017A (en) | Authentication method, authentication device and authentication equipment | |
EP2863667A1 (en) | Method and system for encrypting terminal using subscriber identity module card | |
KR101670687B1 (en) | System, method and computer program for sending message | |
WO2011011952A1 (en) | Method for protecting storage devices based on mobile communication network | |
CN101953194A (en) | Method for transmitting notification signal and mobile station | |
CN106911653B (en) | Method, device, mobile terminal and system for realizing remote control of mobile terminal | |
CN105516316A (en) | Method for improving information security of smart phone user | |
CN105451224A (en) | Destroying method | |
CN101383702B (en) | Method and system protecting cipher generating parameter in tracing region updating | |
CN102938882A (en) | Method and system changing contact information of mobile phone terminals of others by sending messages | |
WO2016054892A1 (en) | Method and device for user information protection | |
Park et al. | Analyzing RRC Replay Attack and Securing Base Station with Practical Method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |