CN105898011A - Hardware cipher-based mobile phone data protection method and device - Google Patents

Hardware cipher-based mobile phone data protection method and device Download PDF

Info

Publication number
CN105898011A
CN105898011A CN201510702163.9A CN201510702163A CN105898011A CN 105898011 A CN105898011 A CN 105898011A CN 201510702163 A CN201510702163 A CN 201510702163A CN 105898011 A CN105898011 A CN 105898011A
Authority
CN
China
Prior art keywords
mobile phone
interface
password
data
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510702163.9A
Other languages
Chinese (zh)
Inventor
郑雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Information Technology Beijing Co Ltd
Original Assignee
Leshi Zhixin Electronic Technology Tianjin Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leshi Zhixin Electronic Technology Tianjin Co Ltd filed Critical Leshi Zhixin Electronic Technology Tianjin Co Ltd
Priority to CN201510702163.9A priority Critical patent/CN105898011A/en
Publication of CN105898011A publication Critical patent/CN105898011A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The invention discloses a hardware cipher-based mobile phone data protection method and device. The mobile phone data protection method comprises the following steps: whether a private data-related interface in a mobile phone changes is detected; if the private data-related interface changes, an interface used for inputting ciphers to be verified is sent to a screen of the mobile phone; whether the ciphers to be verified which are input by a user are consistent with an initial cipher stored in mobile phone hardware is determined; if the ciphers to be verified which are input by the user are inconsistent with the initial cipher for a designated number of times, an instruction of starting data protection is sent to the mobile phone. The mobile phone data protection device comprises an interface detection module, a cipher to be verified input interface sending module, a cipher verifying module and an instruction sending module that are respectively used for taking the above steps. Via use of the hardware cipher-based mobile phone data protection method and device provided in the invention, operation steps are simplified, user experience is improved, software decryption can be prevented, and data safety can be ensured.

Description

Mobile phone data protection method and apparatus based on hardware encryption
Technical field
The present invention relates to mobile phone data protection technical field, particularly relate to a kind of based on hardware encryption Mobile phone data protection method and apparatus.
Background technology
Mobile phone enters into intelligent machine epoch, present intelligent machine from the function machine epoch before the most comprehensively Absolute status is occupied at mobile phone market.Along with the development of intelligent machine and universal, people will increasingly Many information is stored in mobile phone, such as: address list, note, photo, various automated log on Social software accounts etc., the information that many of which is relevant to individual privacy and property is also stored in hand On machine.Intelligent machine, bringing convenient while, brings privacy and property aspect the most simultaneously Hidden danger, if mobile phone is accidentally lost or is stolen by people, then all information on mobile phone have May be utilized by lawless person, cause the leakage of individual privacy and the loss of property.
At present, protection individual privacy in mobile phone and the method for property data typically have a following two: one It is to use traditional cryptoguard, only inputs correct password and could enter cell phone system;Two are Data are protected by the way of remote lock mobile phone.
For first method, other user can be stoped to enter cell phone system by cryptoguard and look into See information, but this scheme has following defect: one is that the mode of conventional cipher protection is user oneself It is also required to frequently enter password, complex operation the when of use, brings inconvenience;Two is this password Protection is very easy to be cracked by software, so that other user can walk around cryptoguard and obtain hand Data in machine, it is impossible to accomplish absolute safety.
For second method, the mode of remote lock mobile phone has to rely on and network environment or mobile phone The unimpeded of note could realize, if mobile phone by illegal molecule by close network, pull out SIM Making mobile phone be in off-line state etc. mode, user just cannot realize remote lock, the data in mobile phone Also can be stolen easily, real protection cannot be accomplished at all.
Therefore, it is highly desirable to relate to a kind of new mobile phone data protection method, thus overcomes above-mentioned Defect.
Summary of the invention
In view of this, the invention provides a kind of mobile phone data protection method based on hardware encryption and Device, it is intended to overcome the defect of prior art, thus real in the case of not relying on remote lock Existing data protection, simplifies the operation of user, and is not easy to be cracked.
Mobile phone data protection method based on hardware encryption provided by the present invention comprises the following steps: Step a, in detection mobile phone, the interface relevant to private data the most changes;Step b, When the described interface relevant to private data changes, send to mobile phone screen and treat for input Test the interface of password;Step c, it is judged that stored in the password to be tested of user's input and mobile phone hardware Initial password is the most consistent;Step d, if the password to be tested that user inputs in predetermined number of times is all with just Beginning password is inconsistent, then send the instruction starting data protection to mobile phone.
Mobile phone data protection method based on hardware encryption as above, it is preferable that in step c In, if the password to be tested of user's input is consistent with initial password, then return step a.
Mobile phone data protection method based on hardware encryption as above, it is preferable that in step a , also include: step e before, when mobile phone starts first, send to mobile phone screen at the beginning of being used for inputting The interface of beginning password;Step f, receives the initial password that inputted of user and is stored in mobile phone hardware.
Mobile phone data protection method based on hardware encryption as above, it is preferable that in described step In rapid a, the described interface relevant to private data includes following any one or more: SIM connects Mouthful;USB interface;Blue tooth interface;Network interface.
Mobile phone data protection method based on hardware encryption as above, it is preferable that in described step In rapid d, the instruction of described startup data protection includes following any one or more: start locking The instruction of mobile phone;Start erasing data in mobile phone instruction;Start the instruction of self-destruction cell phone lines;Start The instruction of self-destruction mobile phone memory.
Mobile phone data protection device based on hardware encryption provided by the present invention includes: interface detects Module, the most changes for detecting interface relevant to private data in mobile phone;To be tested Interface for password input sending module, is used for when the described interface relevant to private data changes, The interface for inputting password to be tested is sent to mobile phone screen;Password judge module, it is judged that user is defeated The password to be tested entered is the most consistent with the initial password stored in mobile phone hardware;Instruction sending module, If the password to be tested that user inputs in predetermined number of times is all inconsistent with initial password, then send out to mobile phone Send the instruction starting data protection.
Mobile phone data protection device based on hardware encryption as above, it is preferable that if password is sentenced Disconnected module judges that the password to be tested that user inputs is consistent with initial password, then interface detection module continues In detection mobile phone, the interface relevant to private data the most changes.
Mobile phone data protection device based on hardware encryption as above, it is preferable that described mobile phone Data protecting device also includes: initial password inputting interface sending module, when mobile phone starts first, The interface for inputting initial password is sent to mobile phone screen;Initial password receiver module, receives and uses Initial password that family is inputted also is stored in mobile phone hardware.
Mobile phone data protection device based on hardware encryption as above, it is preferable that described interface Interface relevant to private data in the mobile phone that detection module is detected include following any one or many Kind: SIM interface;USB interface;Blue tooth interface;Network interface.
Mobile phone data protection device based on hardware encryption as above, it is preferable that described instruction The instruction that sending module is sent includes following any one or more: start the instruction of locking mobile phone; Start erasing data in mobile phone instruction;Start the instruction of self-destruction cell phone lines;Start the storage of self-destruction mobile phone The instruction of device.
Use mobile phone data protection method and apparatus based on hardware encryption provided by the present invention, one Aspect, the only just startup authentication when the hardware interface relevant to privacy changes, and not Need user all to input password when using every time, simplify operating procedure, optimize user and embody. On the other hand, by hardware protection system protection data in mobile phone and privacy so that the side that software cracks Formula is at one's wit's end, the problem thoroughly solving privacy and leaking data from source, it is possible to ensure number According to safety.
Accompanying drawing explanation
Preferred embodiment in the present invention will be described in detail below, it will help understand this by accompanying drawing Bright purpose and advantage, wherein:
Fig. 1 is the preferred embodiment of the mobile phone data protection method based on hardware encryption of the present invention.
Fig. 2 is the preferred embodiment of the mobile phone data protection device based on hardware encryption of the present invention.
Detailed description of the invention
Below in conjunction with embodiment, the present invention is described in detail.
Fig. 1 is the preferred embodiment of the mobile phone data protection method based on hardware encryption of the present invention. As it is shown in figure 1, mobile phone data protection method based on hardware encryption provided by the present invention can be led to Cross following steps to realize.
Step S100, when mobile phone starts first, sends to mobile phone screen and is used for inputting initial password Interface.Specifically, after mobile phone dispatches from the factory, when user starts mobile phone for the first time, hand can be passed through Related interfaces input initial password on machine screen, described initial password can pass through following arbitrary shape The password of formula realizes: character string password, graphical passwords, gesture password, finger-print cipher etc..
Step S200, receives the initial password that inputted of user and is stored in mobile phone hardware.Preferably Ground, can be stored in the initial password that user is inputted in the inherent storage of mobile phone or mobile phone core In sheet, it is also possible to special chip is set on mobile phone to realize the storage of initial password.Preferably, Described initial password one is set, and does not the most allow amendment.Such as: can receive user institute defeated After the initial password entered storage, the cell phone password stored is set to " read-only " form, no Allow again to revise.
In actual use, the generation of described initial password not only can pass through above-mentioned steps Realize, it is also possible to be configured by manufacturer when mobile phone dispatches from the factory initialization, it is also possible to stochastic generation After be stored in mobile phone hardware with " read-only " form, and this " read-only " form does not allow hand Machine screen calls, and i.e. cannot show in mobile phone screen, can only be read by password validation system With call.
Step S300, in detection mobile phone, the interface relevant to private data the most changes. Wherein it is preferred to, the described interface relevant to private data includes following any one or more: SIM interface;USB interface;Blue tooth interface;Network interface etc..The most changing permissible It is interpreted as: the interface relevant to private data the most inserts, extracts, accesses, starts, Closedowns etc. change the action of original attribute.Such as: whether pull out the action of SIM, if There is to insert the action of SIM, if the action of blue tooth interface occurs to start or close, if having Other USB device access mobile phone USB interface, the equipment on mobile phone USB interface the most by Extracting, whether network interface is interrupted by force, etc..As long as it is understood that relate to The action that in mobile phone, the hardware interface of private data changes, can serve as detecting object, this The object detected in step S300 of invention is not limited to foregoing.
In actual application, which hardware port user self-defined can also arrange belongs to hidden The port that private data are relevant, or which hardware port is set is not belonging to the end relevant to private data Mouthful.Preferably, as long as there being one of them hardware interface relevant to private data to change, i.e. Trigger following step.
Step S400, when the described interface relevant to private data changes, to mobile phone screen Send the interface for inputting password to be tested.It is relevant to private data when step S300 detects Hardware interface changes, and in order to realize the protection of private data, can carry out suitable safety and test Card.Specifically, can send the interface for inputting password to be tested to mobile phone screen, user is permissible In this interface, input password to be tested to carry out authentication, thus ensure the safety of user data. Preferably, the interface being used for inputting password to be verified can be character string inputting interface, IMAQ Interface, fingerprint acquisition interface, hand gesture recognition interface etc..
Step S500, it is judged that stored in password to be tested and the mobile phone hardware of user's input is the closeest Code is the most consistent.In step S500, when, after the password to be verified receiving user's input, needing From mobile phone hardware, obtain default initial password, and the password to be verified user inputted is with initial Password verifies, and determines whether to start data protection action finally according to check results.
Preferably, the situation causing mobile phone locked because of erroneous input password in order to avoid user occurs, Suitable Password Input number of times can be set, for example, it is possible to Password Input number of times is set to 3 times, If during the password of user's input error, system can eject new interface for password input again, only when When user's continuous input error password is more than 3 times, just can trigger following data protection action.
In a preferred embodiment, if the password to be tested that inputted in the number of times specified of user is with initial Password is consistent, then return step S300, i.e. mobile phone and enter normal operating system, and continue detection Interface relevant to private data in mobile phone the most changes.The hardware relevant to privacy connects There is not one-shot change in mouth, system just starts a password authentification, after password authentification is passed through, then should Change is considered the normal operating of cellphone subscriber, and the change of this hardware interface is left in the basket.
Step S600, if the password to be tested that user inputs in predetermined number of times all differs with initial password Cause, then send the instruction starting data protection to mobile phone.If step S500 determines what user inputted Password to be tested is inconsistent with initial password, and errors number is beyond default predetermined number of times, then The instruction starting data protection is sent to mobile phone, thus to the data in mobile phone, especially privacy number According to protecting.
Preferably, the instruction of described startup data protection includes following any one or more: start The instruction of locking mobile phone;Start erasing data in mobile phone instruction;Start the instruction of self-destruction cell phone lines; Start the instruction of self-destruction mobile phone memory.Mobile phone can be locked by mobile phone according to above-mentioned dependent instruction Fixed, or data are wiped, it might even be possible to thoroughly burn cell phone lines, mobile phone memory, core Sheet, thus ensure in the hand that data will not fall into lawless person, it is ensured that the safety of data.
Such as, when the mobile phone having lawless person to take user, it is intended to extract SIM to interrupt user When remotely operating, mobile phone screen can show input password interface, if repeatedly input is close Code is inconsistent with the initial password preset, and can be protected data in mobile phone by dependent instruction.
In specific implementation process, it is preferable that a hardware cryptographic system can be integrated into mobile phone Chip in, carried out checking and the protection of data of password by hardware micro-system, in password authentification Phone lock in the case of failure, all operations associated with the data all cannot be normally carried out.Additionally, At hardware encryption initial phase, when user uses mobile phone for the first time, hardware encryption initializes system System requires initialized cryptographic, and after user inputs password, this password becomes the protection password of mobile phone (i.e. Initial password), and cannot again change, in order to ensure safety, hardware micro-system can only initialize one Secondary.Hardware cryptographic system interface associated with the data has binding relationship, once with privacy and data phase The hardware interface closed changes, and will trigger hardware encryption verification tip.The following is several frequently seen Occasion: pull out SIM/insertion SIM, the insertion of USB interface connecting line, bluetooth unlatching etc.. After hardware verification system starts, it is impossible to close, it is necessary to correctly enter password and could normally use mobile phone, Otherwise mobile phone is locked, if checking password input error exceedes n times, data in mobile phone will be wiped free of, Can be burnt by cell phone lines, mobile phone thoroughly cannot use simultaneously.
The present invention passes through hardware protection system protection data in mobile phone and privacy so that the side that software cracks Formula is at one's wit's end, the problem thoroughly solving privacy and leaking data from source, it is possible to accomplish Safe and reliable.For the use that data and secret protection demand are strong, it is very effective data Protection scheme.
Correspondingly, present invention also offers a kind of mobile phone data protection device based on hardware encryption, To be correspondingly used for the correlation step realizing in said method.Fig. 2 is the close based on hardware of the present invention The preferred embodiment of the mobile phone data protection device of code.As in figure 2 it is shown, base provided by the present invention Mobile phone data protection device in hardware encryption includes: interface detection module 30, Password Input to be tested Interface sending module 40, password judge module 50 and instruction sending module 60.
Described interface detection module 30 is for the most just detecting interface relevant to private data in mobile phone Changing.Described interface for password input sending module to be tested 40 is for when described and private data When relevant interface changes, send the interface for inputting password to be tested to mobile phone screen.Institute State and password to be tested that password judge module 50 inputs for judging user and mobile phone hardware stored Initial password is the most consistent.If the password to be tested that user inputs in predetermined number of times is equal and initial password Inconsistent, described instruction sending module 60 then sends the instruction starting data protection to mobile phone.
Mobile phone data protection device based on hardware encryption as above, it is preferable that if password is sentenced Disconnected module 50 judges that the password to be tested that user inputs is consistent with initial password, then interface detection module 30 Continue the interface relevant to private data in detection mobile phone the most to change.
Mobile phone data protection device based on hardware encryption as above, it is preferable that described mobile phone Data protecting device also includes: initial password inputting interface sending module 10 and initial password receive mould Block 20.Wherein, described initial password inputting interface sending module 10 is used for when mobile phone starts first, The interface for inputting initial password is sent to mobile phone screen;Described initial password receiver module 20 is used In receiving the initial password that inputted of user and being stored in mobile phone hardware.
Mobile phone data protection device based on hardware encryption as above, it is preferable that described interface Interface relevant to private data in the mobile phone that detection module 30 is detected include following any one or Multiple: SIM interface;USB interface;Blue tooth interface;Network interface.
Mobile phone data protection device based on hardware encryption as above, it is preferable that described instruction The instruction that sending module 60 is sent includes following any one or more: start the finger of locking mobile phone Order;Start erasing data in mobile phone instruction;Start the instruction of self-destruction cell phone lines;Start self-destruction mobile phone The instruction of memory.
Use mobile phone data protection method and apparatus based on hardware encryption provided by the present invention, one Aspect, the only just startup authentication when the hardware interface relevant to privacy changes, and not Need user all to input password when using every time, simplify operating procedure, optimize user and embody. On the other hand, by hardware protection system protection data in mobile phone and privacy so that the side that software cracks Formula is at one's wit's end, the problem thoroughly solving privacy and leaking data from source, it is possible to ensure number According to safety.
Last it is noted that above example is only in order to illustrate technical scheme, rather than It is limited;Although the present invention being described in detail with reference to previous embodiment, this area Those of ordinary skill is it is understood that it still can be to the technical scheme described in foregoing embodiments Modify, or wherein portion of techniques feature is carried out equivalent;And these are revised or replace Change, do not make the essence of appropriate technical solution depart from the scope of various embodiments of the present invention technical scheme.

Claims (10)

1. a mobile phone data protection method based on hardware encryption, it is characterised in that described mobile phone Data guard method comprises the following steps:
Step a, in detection mobile phone, the interface relevant to private data the most changes;
Step b, when the described interface relevant to private data changes, sends to mobile phone screen For inputting the interface of password to be tested;
Step c, it is judged that the initial password stored in password to be tested and the mobile phone hardware of user's input is No unanimously;
Step d, if the password to be tested that user inputs in predetermined number of times is all inconsistent with initial password, The instruction starting data protection is then sent to mobile phone.
Mobile phone data protection method based on hardware encryption the most according to claim 1, it is special Levy and be, in step c, if the password to be tested of user's input is consistent with initial password, then return Step a.
Mobile phone data protection method based on hardware encryption the most according to claim 1, it is special Levy and be, before step a, also include:
Step e, when mobile phone starts first, sends the boundary for inputting initial password to mobile phone screen Face;
Step f, receives the initial password that inputted of user and is stored in mobile phone hardware.
4. protect according to the data in mobile phone based on hardware encryption described in any one in claim 1-3 Maintaining method, it is characterised in that in described step a, the described interface bag relevant to private data Include following any one or more:
SIM interface;
USB interface;
Blue tooth interface;
Network interface.
5. protect according to the data in mobile phone based on hardware encryption described in any one in claim 1-3 Maintaining method, it is characterised in that in described step d, the instruction of described startup data protection includes Following any one or more:
Start the instruction of locking mobile phone;
Start erasing data in mobile phone instruction;
Start the instruction of self-destruction cell phone lines;
Start the instruction of self-destruction mobile phone memory.
6. a mobile phone data protection device based on hardware encryption, it is characterised in that described mobile phone Data protecting device includes:
Interface detection module, the most sends out for detecting interface relevant to private data in mobile phone Changing;
Interface for password input sending module to be tested, for sending out when the described interface relevant to private data During changing, send the interface for inputting password to be tested to mobile phone screen;
Password judge module, it is judged that at the beginning of being stored in the password to be tested of user's input and mobile phone hardware Beginning password is the most consistent;
Instruction sending module, if the password to be tested that inputs in predetermined number of times of user is all and initial password Inconsistent, then the instruction starting data protection is sent to mobile phone.
Mobile phone data protection device based on hardware encryption the most according to claim 6, it is special Levy and be, if password judge module judges that the password to be tested that user inputs is consistent with initial password, then Interface detection module continues the interface relevant to private data in detection mobile phone and the most becomes Change.
Mobile phone data protection device based on hardware encryption the most according to claim 6, it is special Levying and be, described mobile phone data protection device also includes:
Initial password inputting interface sending module, when mobile phone starts first, sends to mobile phone screen For inputting the interface of initial password;
Initial password receiver module, receives the initial password that inputted of user and is stored in mobile phone hardware In.
9. protect according to the data in mobile phone based on hardware encryption described in any one in claim 6-8 Protection unit, it is characterised in that with private data phase in the mobile phone that described interface detection module is detected The interface closed includes following any one or more:
SIM interface;
USB interface;
Blue tooth interface;
Network interface.
10. protect according to the data in mobile phone based on hardware encryption described in any one in claim 6-8 Protection unit, it is characterised in that the instruction that described instruction sending module is sent includes following any one Plant or multiple:
Start the instruction of locking mobile phone;
Start erasing data in mobile phone instruction;
Start the instruction of self-destruction cell phone lines;
Start the instruction of self-destruction mobile phone memory.
CN201510702163.9A 2015-10-26 2015-10-26 Hardware cipher-based mobile phone data protection method and device Pending CN105898011A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510702163.9A CN105898011A (en) 2015-10-26 2015-10-26 Hardware cipher-based mobile phone data protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510702163.9A CN105898011A (en) 2015-10-26 2015-10-26 Hardware cipher-based mobile phone data protection method and device

Publications (1)

Publication Number Publication Date
CN105898011A true CN105898011A (en) 2016-08-24

Family

ID=57001834

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510702163.9A Pending CN105898011A (en) 2015-10-26 2015-10-26 Hardware cipher-based mobile phone data protection method and device

Country Status (1)

Country Link
CN (1) CN105898011A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529232A (en) * 2016-10-19 2017-03-22 广东欧珀移动通信有限公司 Startup method and device
CN107154999A (en) * 2017-03-31 2017-09-12 捷开通讯(深圳)有限公司 Terminal and its unlocking method based on environmental information, storage device
CN108430062A (en) * 2018-02-27 2018-08-21 西安闻泰电子科技有限公司 Mobile phone self-desttruction equipment and system
CN109784093A (en) * 2019-01-28 2019-05-21 上海龙旗科技股份有限公司 A kind of private data guard device, system and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2471040Y (en) * 2000-11-01 2002-01-09 张军 Mobile phone lost alarm device
CN1635807A (en) * 2003-12-27 2005-07-06 海信集团有限公司 A deadlock method for preventing handset from being embezzled
CN1719920A (en) * 2004-07-05 2006-01-11 摩托罗拉公司 Method of permitting to use cipher protection function and wireless phone
CN1921659A (en) * 2006-03-28 2007-02-28 顾中洋 Anti-theft function for mobile phone
CN101026820A (en) * 2006-02-22 2007-08-29 崔乃铮 Mobile phone anti-theft technique
CN203522853U (en) * 2013-09-05 2014-04-02 深圳旗瀚和力科技有限公司 Mobile phone mainboard circuit

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2471040Y (en) * 2000-11-01 2002-01-09 张军 Mobile phone lost alarm device
CN1635807A (en) * 2003-12-27 2005-07-06 海信集团有限公司 A deadlock method for preventing handset from being embezzled
CN1719920A (en) * 2004-07-05 2006-01-11 摩托罗拉公司 Method of permitting to use cipher protection function and wireless phone
CN101026820A (en) * 2006-02-22 2007-08-29 崔乃铮 Mobile phone anti-theft technique
CN1921659A (en) * 2006-03-28 2007-02-28 顾中洋 Anti-theft function for mobile phone
CN203522853U (en) * 2013-09-05 2014-04-02 深圳旗瀚和力科技有限公司 Mobile phone mainboard circuit

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529232A (en) * 2016-10-19 2017-03-22 广东欧珀移动通信有限公司 Startup method and device
CN107154999A (en) * 2017-03-31 2017-09-12 捷开通讯(深圳)有限公司 Terminal and its unlocking method based on environmental information, storage device
CN107154999B (en) * 2017-03-31 2020-06-02 捷开通讯(深圳)有限公司 Terminal and unlocking method and storage device based on environmental information
CN108430062A (en) * 2018-02-27 2018-08-21 西安闻泰电子科技有限公司 Mobile phone self-desttruction equipment and system
CN109784093A (en) * 2019-01-28 2019-05-21 上海龙旗科技股份有限公司 A kind of private data guard device, system and method

Similar Documents

Publication Publication Date Title
CN113902446A (en) Face payment security method based on security unit and trusted execution environment
CN102131182B (en) Network locking method and device for mobile terminal
US10771441B2 (en) Method of securing authentication in electronic communication
CN102542449B (en) A kind of radio communication device and payment authentication method
CN105898011A (en) Hardware cipher-based mobile phone data protection method and device
CN105243314B (en) A kind of security system and its application method based on USB key
CN104820805B (en) A kind of method and device of subscriber identification card information theft-preventing
CN109448190A (en) A kind of off line access control system and off line access control management method
CN104268756B (en) Method of mobile payment and system
US11620650B2 (en) Mobile authentication method and system therefor
WO2014180345A1 (en) User identity verification and authorization system
CN102546169B (en) For controlling by the method and system of the execution of the function of user authentication protection
CN103995572A (en) Computer unlocking method and computer with unlocking module
CN105653918B (en) Method for safely carrying out, safe operating device and terminal
US8151111B2 (en) Processing device constituting an authentication system, authentication system, and the operation method thereof
CN110651448B (en) Chip access method, microchip, smart card and debugging equipment
EP2985712B1 (en) Application encryption processing method, apparatus, and terminal
CN107786566A (en) Method for protecting privacy, system, server and receiving terminal
CN105069361A (en) Safety access method and system for privacy space
KR101495448B1 (en) Integrated circuit chip for user authentication and autentication method
CN105787400A (en) Safety protection method and system based on mobile terminal
CN108322907B (en) Card opening method and terminal
CN105631666A (en) Secure mobile payment method, secure mobile payment system and terminal
CN105007267A (en) Privacy protection method and device
CN105335632B (en) The guard method of payment information and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 301-1, Room 301-3, Area B2, Animation Building, No. 126 Animation Road, Zhongxin Eco-city, Tianjin Binhai New Area, Tianjin

Applicant after: LE SHI ZHI XIN ELECTRONIC TECHNOLOGY (TIANJIN) Ltd.

Address before: 300453 Tianjin Binhai New Area, Tianjin Eco-city, No. 126 Animation and Animation Center Road, Area B1, Second Floor 201-427

Applicant before: Xinle Visual Intelligent Electronic Technology (Tianjin) Co.,Ltd.

Address after: 300453 Tianjin Binhai New Area, Tianjin Eco-city, No. 126 Animation and Animation Center Road, Area B1, Second Floor 201-427

Applicant after: Xinle Visual Intelligent Electronic Technology (Tianjin) Co.,Ltd.

Address before: 300467 Tianjin Binhai New Area, ecological city, animation Middle Road, building, No. two, B1 District, 201-427

Applicant before: LE SHI ZHI XIN ELECTRONIC TECHNOLOGY (TIANJIN) Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210625

Address after: 100025 1503, 12 / F, building 3, 105 yaojiayuan Road, Chaoyang District, Beijing

Applicant after: LE SHI INTERNET INFORMATION & TECHNOLOGY CORP., BEIJING

Address before: Room 301-1, 3rd floor, area B2, animation building, No. 126, animation Middle Road, Zhongxin eco city, Binhai New Area, Tianjin, 300453

Applicant before: LE SHI ZHI XIN ELECTRONIC TECHNOLOGY (TIANJIN) Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160824