CN105978899A - SIM card binding method for preventing malicious mobile phone flash - Google Patents

SIM card binding method for preventing malicious mobile phone flash Download PDF

Info

Publication number
CN105978899A
CN105978899A CN201610490010.7A CN201610490010A CN105978899A CN 105978899 A CN105978899 A CN 105978899A CN 201610490010 A CN201610490010 A CN 201610490010A CN 105978899 A CN105978899 A CN 105978899A
Authority
CN
China
Prior art keywords
information
safety check
check information
level
template
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610490010.7A
Other languages
Chinese (zh)
Inventor
张俤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Light Horse Network Technology Co Ltd
Original Assignee
Chengdu Light Horse Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Light Horse Network Technology Co Ltd filed Critical Chengdu Light Horse Network Technology Co Ltd
Priority to CN201610490010.7A priority Critical patent/CN105978899A/en
Publication of CN105978899A publication Critical patent/CN105978899A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals

Abstract

The invention discloses an SIM card binding method for preventing malicious mobile phone flash. The method comprises the steps of presetting multilevel security verification information based on user identifiers; establishing security templates corresponding to different security levels; establishing SIM card information lists corresponding to different trust levels; detecting the SIM card information of a mobile terminal when it is detected that connection is established between the terminal and a flash tool; and determining a current security template according to the detected SIM card information, and applying the template to the mobile terminal. According to the method, securer and finer mobile phone security management can be realized.

Description

The binding of a kind of SIM prevents the method for mobile phone malice brush machine
Technical field
The present invention relates to intelligent terminal field, the method preventing mobile phone malice brush machine particularly to the binding of a kind of SIM.
Background technology
Along with the arrival in 4G epoch, mobile phone has become as requisite instrument in people's daily life.It meets people Many demands of voice/video phone and multimedia data service etc. whenever and wherever possible.End product function is increasingly Abundant, it is possible to meet the different demands of different geographical different user.
In mobile phone, storage has the guiding journey included for realizing the program of mobile phone bottom control function, loading mobile phone kernel Sequence, kernel, system file etc., kernel is operating system meat and potatoes, is loaded into after internal memory including the most always Depositing middle operation, the loading of related content in system file in interior nuclear control, and system file then stores the various of this mobile phone The configuration data of application program and related application.
Brush machine is exactly a kind of behavior changing mobile phone operating system, is equivalent to load onto the windows of different editions to computer Or computer refitting system, namely brush mobile phone operating system.The brush machine the most often said is exactly with " change substituted for one Software version after a little pictures, the tinkle of bells or menu " process.Along with the appearance of various brush machine softwares, user can be led to Cross kernel and system file that brush machine maintenance changes on mobile phone.But, after this kernel is modified, may cause amended Kernel can not be properly loaded system file;After system file is modified, then corresponding systemic-function also can change therewith Become, the systemic-function of mobile phone thus may be caused normally not use.Particularly, in some brush machine scheme, brush machine After mobile phone may be loaded unofficial software data by malicious user, non-pre-installed software is such as installed to make profit, causes After start, Installed System Memory is not enough, and reaction is slow;Or distort system file, cause partial function to lose efficacy, make system stability Occur abnormal with safety, even make terminal cannot normal boot-strap, safety is relatively low.Further, lose when mobile terminal Or after stolen, pick up taker or stealer can unlock this mobile terminal by mobile terminal carries out the operations such as brush machine, from And cause the private information of the owner of lost property to be revealed.
In the various schemes preventing malice brush machine proposed in prior art, it is the most all that brush secret is set by single The mode of code realizes user's verification, and once password is revealed or is easily cracked, and security performance is poor, security management The most extensive.
Based on this, be badly in need of a kind of can safer and become more meticulous prevent mobile phone malice brush machine method.
Summary of the invention
The technical problem to be solved is: how to realize mobile phone safe that is safer and that become more meticulous management.For This, the present invention proposes the method that the binding of a kind of SIM prevents mobile phone malice brush machine, can solve fully due to existing skill One or more problems that the restriction of art and defect cause.
Additional advantages of the present invention, purpose and characteristic, a part will be elucidated in the following description, and another Partly for those of ordinary skill in the art by the investigation of description below being will be apparent from or from the reality of the present invention Acquire in executing.Can be realized and obtain by the structure particularly pointed out in the specification and claims of word and accompanying drawing Obtain the object of the invention and advantage.
The invention provides the method that the binding of a kind of SIM prevents mobile phone malice brush machine, comprise the steps:
Step S301, pre-sets maltilevel security check information based on ID;Described maltilevel security check information Including the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information With the 5th safety check information.
Step S302, sets up the security template corresponding to different level of securitys;In the first security template, when detecting Terminal is set up with brush machine instrument after being connected, and needs to verify the first safety check information of user, the side of being verified Follow-up brush machine operation can be carried out;In the second security template, after detecting that terminal is connected with the foundation of brush machine instrument, Need the first safety check information to user and the second safety check information to verify, be verified after can carrying out Continuous brush machine operation;In the 3rd security template, after detecting that terminal and brush machine instrument are set up and be connected, needs to The first safety check information at family, the second safety check information and the 3rd safety check information are verified, are verified Follow-up brush machine operation can be carried out;In the 4th security template, after detecting that terminal is connected with the foundation of brush machine instrument, Need the first safety check information to user, the second safety check information, the 3rd safety check information and the 4th safety Check information is verified, is verified and can carry out follow-up brush machine operation;In the 5th security template, work as detection Set up to terminal and brush machine instrument after being connected, need the first safety check information to user, the second safety check information, 3rd safety check information, the 4th safety check information and the 5th safety check information are verified, being verified can Carry out follow-up brush machine operation.
Step S303, sets up the SIM card information list corresponding to different level of trusts, and described level of trust includes first Level of trust, the second level of trust, the 3rd level of trust, the 4th level of trust, the 5th level of trust.
Step S304, when detecting that terminal is connected with the foundation of brush machine instrument, the SIM card information of detection mobile terminal, Determine current safety template according to the SIM card information detected, and this mobile terminal is applied this template.
Preferably, described step S304, specifically include: when SIM card information being detected, or the SIM detected When card information is not in described SIM information list, stop brush machine;When the level of trust that detected SIM information is corresponding When being not the first level of trust, determine that current safety template is the first security template;When detected SIM information pair When the level of trust answered is the second level of trust, determine that current safety template is the second security template;When detected When level of trust corresponding to SIM information is three level of trusts, determine that current safety template is the 3rd security template;When When level of trust corresponding to detected SIM information is four level of trusts, determine that current safety template is the 4th peace Full template;When the level of trust that detected SIM information is corresponding is five level of trust, determine current safety mould Plate is the 5th security template.
Preferably, described first safety check information is key information, and the second safety check information is palmprint information, the Three safety check information are finger print information, and the 4th safety check information is iris information, and the 5th safety check information is sound Message ceases.
Preferably, described first security template, the second security template, the 3rd security template, the 4th security template, Level of security corresponding to five security templates raises successively, described first level of trust, the second level of trust, the 3rd letter The level of trust corresponding to rank, the 4th level of trust, the 5th level of trust is appointed to reduce successively.
Preferably, described SIM card information is the integrated circuit card identification code (ICCID) of SIM or international mobile use Family identification code (IMSI) information.
Accompanying drawing explanation
Fig. 1 is the basic procedure schematic diagram of the method according to third embodiment of the invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe wholely.Should be appreciated that specific embodiment described herein is only the exemplary embodiment of the present invention, in order to Explain the present invention rather than whole embodiment, be not limited to the present invention.Based on the embodiment in the present invention, this The every other embodiment that field those of ordinary skill is obtained on the premise of not making creative work, broadly falls into The scope of protection of the invention.In the case of not conflicting, the feature in the embodiment in the present invention i.e. embodiment can phase Combination in any mutually.
The flow process of method according to a first embodiment of the present invention, specifically may include steps of:
S101: pre-set maltilevel security check information based on ID.
In this step, maltilevel security check information based on ID, described maltilevel security verification letter are pre-set Breath includes the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check letter Breath and the 5th safety check information.Concrete, described first safety check information is key information, the second safety check Information is palmprint information, and the 3rd safety check information is finger print information, and the 4th safety check information is iris information, the Five safety check information are acoustic information.
S102: set up the security template corresponding to different level of securitys.
In this step, the security template corresponding to different level of securitys is set up.Concrete, at described first safe mould In plate, after detecting that terminal is connected with the foundation of brush machine instrument, need the first safety check information of user is tested Card, is verified and can carry out follow-up brush machine operation;In described second security template, when terminal and brush being detected Machine instrument is set up after connecting, and needs the first safety check information to user and the second safety check information to verify, It is verified and can carry out follow-up brush machine operation;In described 3rd security template, when terminal and brush machine work being detected Tool is set up after connecting, and needs the first safety check information to user, the second safety check information and the 3rd safety check Information is verified, is verified and can carry out follow-up brush machine operation;In described 4th security template, work as detection Set up to terminal and brush machine instrument after being connected, need the first safety check information to user, the second safety check information, 3rd safety check information and the 4th safety check information are verified, are verified and can carry out follow-up brush machine operation; In described 5th security template, after detecting that terminal is connected with the foundation of brush machine instrument, to user first is needed to pacify Full check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the 5th safety Check information is verified, is verified and can carry out follow-up brush machine operation.Above-mentioned first security template, the second peace Full level of security corresponding to template, the 3rd security template, the 4th security template, the 5th security template raises successively.
Above step is preset by program, it is also possible to set by User Defined, and this template can according to circumstances be entered by user Row change.
S103: obtain the geographical location information of mobile terminal in real time.
The geographical position of real time tracking mobile terminal, concrete, can be obtained in real time by the GPS module of mobile terminal Take its geographical location information.
S104: according to acquired mobile terminal geographic position information, determines current safety template, and this is moved end End applies this template.
According to acquired mobile terminal geographic position information, determine the security template of mobile terminal, and this is moved end End applies this template.Concrete, when the distance of mobile terminal current location and center set in advance is less than first During threshold value D1, determine that current safety template is the first security template;When mobile terminal current location and set in advance in The distance of heart position more than first threshold D1, less than Second Threshold D2 time, determine that current safety template is the second safety Template;When the distance of mobile terminal current location and center set in advance is more than Second Threshold D2, less than the 3rd During threshold value D3, determine that current safety template is the 3rd security template;When mobile terminal current location and set in advance in The distance of heart position more than the 3rd threshold value D3, less than four threshold values D4 time, determine that current safety template is the 4th safety Template;When the distance of mobile terminal current location and center set in advance is more than four threshold values D4, determines and work as Front security template is the 5th security template.
The flow process of method according to a second embodiment of the present invention, specifically may include steps of:
S201: pre-set maltilevel security check information based on ID.
In this step, maltilevel security check information based on ID, described maltilevel security verification letter are pre-set Breath includes the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check letter Breath and the 5th safety check information.Concrete, described first safety check information is key information, the second safety check Information is palmprint information, and the 3rd safety check information is finger print information, and the 4th safety check information is iris information, the Five safety check information are acoustic information.
S202: set up the security template corresponding to different level of securitys.
In this step, the security template corresponding to different level of securitys is set up.Concrete, at described first safe mould In plate, after detecting that terminal is connected with the foundation of brush machine instrument, need the first safety check information of user is tested Card, is verified and can carry out follow-up brush machine operation;In described second security template, when terminal and brush being detected Machine instrument is set up after connecting, and needs the first safety check information to user and the second safety check information to verify, It is verified and can carry out follow-up brush machine operation;In described 3rd security template, when terminal and brush machine work being detected Tool is set up after connecting, and needs the first safety check information to user, the second safety check information and the 3rd safety check Information is verified, is verified and can carry out follow-up brush machine operation;In described 4th security template, work as detection Set up to terminal and brush machine instrument after being connected, need the first safety check information to user, the second safety check information, 3rd safety check information and the 4th safety check information are verified, are verified and can carry out follow-up brush machine operation; In described 5th security template, after detecting that terminal is connected with the foundation of brush machine instrument, to user first is needed to pacify Full check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the 5th safety Check information is verified, is verified and can carry out follow-up brush machine operation.Above-mentioned first security template, the second peace Full level of security corresponding to template, the 3rd security template, the 4th security template, the 5th security template raises successively.
Above step is preset by program, it is also possible to set by User Defined, and this template can according to circumstances be entered by user Row change.
S203: obtain the associated person information of mobile terminal or default account information, according to associated person information or preset Account information determines secure relationship people.
Obtain the associated person information of mobile terminal or default account information, believe according to associated person information or default account Breath determines secure relationship people, concrete, user preassign secure relationship people's account, when user's not specified safety connection When being people's account, it is also possible to according to mobile phone contact information, each contact person's account stored in statistics mobile phone and this shifting The contact frequency of dynamic terminal, determines secure relationship people according to contact frequency.Wherein, mobile phone contact account can be hands Phone number in machine address list, it is also possible to even if being communication contact people's account, such as micro-signal, No. QQ etc..
S204: when detecting that terminal is connected with the foundation of brush machine instrument, mobile terminal sends safety to this secure relationship people Template solicited message, afterwards, determines current safety template according to feedback information, and this mobile terminal is applied this template.
When detecting that mobile terminal is connected with the foundation of brush machine instrument, mobile terminal sends safe mould to this secure relationship people Plate solicited message, afterwards, determines current safety template according to receiving feedback information at secure relationship people, and to this Mobile terminal applies this template.Concrete, described security template solicited message comprises alternative security template row Table information, secure relationship people sends feedback information according to the security template list carried in security template solicited message, instead Feedforward information comprises the security template information selected by this secure relationship people.Further, when mobile terminal in the given time When not receiving feedback information, stop brush machine;When mobile terminal receives feedback information in the given time, according to feedback Information determines current safety template.
As it is shown in figure 1, be the schematic flow sheet of the method according to third embodiment of the invention, specifically can include as follows Step:
S301: pre-set maltilevel security check information based on ID.
In this step, maltilevel security check information based on ID, described maltilevel security verification letter are pre-set Breath includes the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check letter Breath and the 5th safety check information.Concrete, described first safety check information is key information, the second safety check Information is palmprint information, and the 3rd safety check information is finger print information, and the 4th safety check information is iris information, the Five safety check information are acoustic information.
S302: set up the security template corresponding to different level of securitys.
In this step, the security template corresponding to different level of securitys is set up.Concrete, at described first safe mould In plate, after detecting that terminal is connected with the foundation of brush machine instrument, need the first safety check information of user is tested Card, is verified and can carry out follow-up brush machine operation;In described second security template, when terminal and brush being detected Machine instrument is set up after connecting, and needs the first safety check information to user and the second safety check information to verify, It is verified and can carry out follow-up brush machine operation;In described 3rd security template, when terminal and brush machine work being detected Tool is set up after connecting, and needs the first safety check information to user, the second safety check information and the 3rd safety check Information is verified, is verified and can carry out follow-up brush machine operation;In described 4th security template, work as detection Set up to terminal and brush machine instrument after being connected, need the first safety check information to user, the second safety check information, 3rd safety check information and the 4th safety check information are verified, are verified and can carry out follow-up brush machine operation; In described 5th security template, after detecting that terminal is connected with the foundation of brush machine instrument, to user first is needed to pacify Full check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the 5th safety Check information is verified, is verified and can carry out follow-up brush machine operation.Above-mentioned first security template, the second peace Full level of security corresponding to template, the 3rd security template, the 4th security template, the 5th security template raises successively.
Above step is preset by program, it is also possible to set by User Defined, and this template can according to circumstances be entered by user Row change.
S303: set up the SIM card information list corresponding to different level of trusts.
Setting up the SIM card information list corresponding to different level of trusts, wherein said SIM card information can be SIM Integrated circuit card identification code (ICCID) or international mobile subscriber identity (IMSI) information.Can add in advance The SIM information that can trust, and the just described SIM information MAP that can trust is to different level of trusts, tool Body, described level of trust can include the first level of trust, the second level of trust, the 3rd level of trust, the 4th letter Appointing rank, the 5th level of trust, its corresponding level of trust reduces successively.
S304: when detecting that terminal is connected with the foundation of brush machine instrument, the SIM card information of detection mobile terminal, according to The SIM card information detected determines current safety template, and this mobile terminal is applied this template.
Concrete, when SIM card information being detected, or the SIM card information detected is not in described SIM information Time in list, stop brush machine;When the level of trust that detected SIM information is corresponding is the first level of trust, really Settled front security template is the first security template;When the level of trust that detected SIM information is corresponding is the second trust During rank, determine that current safety template is the second security template;When the level of trust that detected SIM information is corresponding When being three level of trusts, determine that current safety template is the 3rd security template;When detected SIM information is corresponding Level of trust when being four level of trusts, determine that current safety template is the 4th security template;As detected SIM When level of trust corresponding to information is five level of trusts, determine that current safety template is the 5th security template.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is permissible The hardware relevant by programmed instruction realizes, and program can store in a computer-readable storage medium, storage medium Including RAM, ROM, flash memory, disk or CD etc..
Above content is only presently preferred embodiments of the present invention, for those of ordinary skill in the art, according to the present invention's Thought, the most all will change, and this specification content should not be construed as this The restriction of invention.

Claims (5)

1. the method that SIM binding prevents mobile phone malice brush machine, comprises the steps:
Step S301, pre-sets maltilevel security check information based on ID;Described maltilevel security check information Including the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information With the 5th safety check information;
Step S302, sets up the security template corresponding to different level of securitys;In the first security template, when detecting Terminal is set up with brush machine instrument after being connected, and needs to verify the first safety check information of user, the side of being verified Follow-up brush machine operation can be carried out;In the second security template, after detecting that terminal is connected with the foundation of brush machine instrument, Need the first safety check information to user and the second safety check information to verify, be verified after can carrying out Continuous brush machine operation;In the 3rd security template, after detecting that terminal and brush machine instrument are set up and be connected, needs to The first safety check information at family, the second safety check information and the 3rd safety check information are verified, are verified Follow-up brush machine operation can be carried out;In the 4th security template, after detecting that terminal is connected with the foundation of brush machine instrument, Need the first safety check information to user, the second safety check information, the 3rd safety check information and the 4th safety Check information is verified, is verified and can carry out follow-up brush machine operation;In the 5th security template, work as detection Set up to terminal and brush machine instrument after being connected, need the first safety check information to user, the second safety check information, 3rd safety check information, the 4th safety check information and the 5th safety check information are verified, being verified can Carry out follow-up brush machine operation;
Step S303, sets up the SIM card information list corresponding to different level of trusts, and described level of trust includes first Level of trust, the second level of trust, the 3rd level of trust, the 4th level of trust, the 5th level of trust;
Step S304, when detecting that terminal is connected with the foundation of brush machine instrument, the SIM card information of detection mobile terminal, Determine current safety template according to the SIM card information detected, and this mobile terminal is applied this template.
Method the most according to claim 1, it is characterised in that described step S304, specifically includes: work as nothing Method detects SIM card information, or the SIM card information detected not in described SIM information list time, stop brush Machine;When the level of trust that detected SIM information is corresponding is the first level of trust, determine that current safety template is First security template;When the level of trust that detected SIM information is corresponding is the second level of trust, determine current Security template is the second security template;When the level of trust that detected SIM information is corresponding is three level of trust, Determine that current safety template is the 3rd security template;When the level of trust that detected SIM information is corresponding is the 4th letter When appointing rank, determine that current safety template is the 4th security template;When the level of trust that detected SIM information is corresponding When being not five level of trusts, determine that current safety template is the 5th security template.
Method the most according to claim 1, it is characterised in that described first safety check information is key information, Second safety check information is palmprint information, and the 3rd safety check information is finger print information, and the 4th safety check information is Iris information, the 5th safety check information is acoustic information.
Method the most according to claim 1, it is characterised in that described first security template, the second security template, Level of security corresponding to 3rd security template, the 4th security template, the 5th security template raises successively, and described first Letter corresponding to level of trust, the second level of trust, the 3rd level of trust, the 4th level of trust, the 5th level of trust Rank is appointed to reduce successively.
Method the most according to claim 1, it is characterised in that described SIM card information is the integrated electricity of SIM An outpost of the tax office's identification code (ICCID) or international mobile subscriber identity (IMSI) information.
CN201610490010.7A 2016-06-27 2016-06-27 SIM card binding method for preventing malicious mobile phone flash Pending CN105978899A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610490010.7A CN105978899A (en) 2016-06-27 2016-06-27 SIM card binding method for preventing malicious mobile phone flash

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610490010.7A CN105978899A (en) 2016-06-27 2016-06-27 SIM card binding method for preventing malicious mobile phone flash

Publications (1)

Publication Number Publication Date
CN105978899A true CN105978899A (en) 2016-09-28

Family

ID=57020841

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610490010.7A Pending CN105978899A (en) 2016-06-27 2016-06-27 SIM card binding method for preventing malicious mobile phone flash

Country Status (1)

Country Link
CN (1) CN105978899A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778374A (en) * 2016-11-30 2017-05-31 上海与德信息技术有限公司 Terminal and its method for preventing fraudulent-using
WO2017185658A1 (en) * 2016-04-25 2017-11-02 乐视控股(北京)有限公司 Security protection method and apparatus, mobile terminal, and electronic device
CN113434161A (en) * 2020-03-23 2021-09-24 成都鼎桥通信技术有限公司 Software version update control method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101232677A (en) * 2008-01-31 2008-07-30 深圳华为通信技术有限公司 Method and apparatus for start-up logging of mobile terminal
CN103906034A (en) * 2012-12-28 2014-07-02 中国电信股份有限公司 Mobile application providing method and mobile application providing server
CN104199688A (en) * 2014-08-15 2014-12-10 深圳市中兴移动通信有限公司 Mobile terminal and system reinstallation control method and device thereof
CN104811931A (en) * 2014-01-23 2015-07-29 腾讯科技(深圳)有限公司 System and method for distributing unique identifiers of mobile terminals
CN104899481A (en) * 2015-06-17 2015-09-09 上海斐讯数据通信技术有限公司 System and method for preventing decompilation of application programs

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101232677A (en) * 2008-01-31 2008-07-30 深圳华为通信技术有限公司 Method and apparatus for start-up logging of mobile terminal
CN103906034A (en) * 2012-12-28 2014-07-02 中国电信股份有限公司 Mobile application providing method and mobile application providing server
CN104811931A (en) * 2014-01-23 2015-07-29 腾讯科技(深圳)有限公司 System and method for distributing unique identifiers of mobile terminals
CN104199688A (en) * 2014-08-15 2014-12-10 深圳市中兴移动通信有限公司 Mobile terminal and system reinstallation control method and device thereof
CN104899481A (en) * 2015-06-17 2015-09-09 上海斐讯数据通信技术有限公司 System and method for preventing decompilation of application programs

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017185658A1 (en) * 2016-04-25 2017-11-02 乐视控股(北京)有限公司 Security protection method and apparatus, mobile terminal, and electronic device
CN106778374A (en) * 2016-11-30 2017-05-31 上海与德信息技术有限公司 Terminal and its method for preventing fraudulent-using
CN113434161A (en) * 2020-03-23 2021-09-24 成都鼎桥通信技术有限公司 Software version update control method and device

Similar Documents

Publication Publication Date Title
US9131377B2 (en) Method and apparatus for unlocking operating system
US11036840B2 (en) Fingerprint recognition method and apparatus, and touchscreen terminal
CN104205721B (en) The adaptive authentication method of context aware and device
US8718602B2 (en) Method and system for remote control of smart card
CN104767713B (en) Account binding method, server and system
CN104461749A (en) Application program synchronization method and device of multi-system terminal and terminal
CN107864144A (en) Obtain method and device, computer installation and the storage medium of dynamic password
CN102075627A (en) Information prompting method and mobile terminal
CN107533596B (en) Fingerprint identification method and mobile terminal
CN106897629A (en) The control method and terminal of terminal applies
CN105978899A (en) SIM card binding method for preventing malicious mobile phone flash
CN105022939A (en) Information verification method and device
CN110546641A (en) access control method and device, intelligent device and storage medium
CN114861158A (en) Security authentication method, device, system, electronic equipment and storage medium
CN111641718B (en) Mobile phone terminal APP identity authentication method
CN106131819A (en) A kind of multistage authentication prevents the method for mobile phone malice brush machine
CN105516500A (en) Method and system for selecting device mode
CN105141750A (en) Screen locking method and terminal
CN110417979B (en) Unlocking method, device, terminal and storage medium
CN103685259A (en) Method and device for account logging in
CN113596812B (en) APN automatic configuration and switching method based on android platform
CN110636474A (en) Bluetooth pairing method and device
WO2016187966A1 (en) Terminal and method for protecting data security of terminal
CN101770553B (en) Mobile terminal and calling method for root certificate in mobile terminal
CN106210272A (en) A kind of method preventing mobile phone malice brush machine based on ID

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160928