CN105978899A - SIM card binding method for preventing malicious mobile phone flash - Google Patents
SIM card binding method for preventing malicious mobile phone flash Download PDFInfo
- Publication number
- CN105978899A CN105978899A CN201610490010.7A CN201610490010A CN105978899A CN 105978899 A CN105978899 A CN 105978899A CN 201610490010 A CN201610490010 A CN 201610490010A CN 105978899 A CN105978899 A CN 105978899A
- Authority
- CN
- China
- Prior art keywords
- information
- safety check
- check information
- level
- template
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
Abstract
The invention discloses an SIM card binding method for preventing malicious mobile phone flash. The method comprises the steps of presetting multilevel security verification information based on user identifiers; establishing security templates corresponding to different security levels; establishing SIM card information lists corresponding to different trust levels; detecting the SIM card information of a mobile terminal when it is detected that connection is established between the terminal and a flash tool; and determining a current security template according to the detected SIM card information, and applying the template to the mobile terminal. According to the method, securer and finer mobile phone security management can be realized.
Description
Technical field
The present invention relates to intelligent terminal field, the method preventing mobile phone malice brush machine particularly to the binding of a kind of SIM.
Background technology
Along with the arrival in 4G epoch, mobile phone has become as requisite instrument in people's daily life.It meets people
Many demands of voice/video phone and multimedia data service etc. whenever and wherever possible.End product function is increasingly
Abundant, it is possible to meet the different demands of different geographical different user.
In mobile phone, storage has the guiding journey included for realizing the program of mobile phone bottom control function, loading mobile phone kernel
Sequence, kernel, system file etc., kernel is operating system meat and potatoes, is loaded into after internal memory including the most always
Depositing middle operation, the loading of related content in system file in interior nuclear control, and system file then stores the various of this mobile phone
The configuration data of application program and related application.
Brush machine is exactly a kind of behavior changing mobile phone operating system, is equivalent to load onto the windows of different editions to computer
Or computer refitting system, namely brush mobile phone operating system.The brush machine the most often said is exactly with " change substituted for one
Software version after a little pictures, the tinkle of bells or menu " process.Along with the appearance of various brush machine softwares, user can be led to
Cross kernel and system file that brush machine maintenance changes on mobile phone.But, after this kernel is modified, may cause amended
Kernel can not be properly loaded system file;After system file is modified, then corresponding systemic-function also can change therewith
Become, the systemic-function of mobile phone thus may be caused normally not use.Particularly, in some brush machine scheme, brush machine
After mobile phone may be loaded unofficial software data by malicious user, non-pre-installed software is such as installed to make profit, causes
After start, Installed System Memory is not enough, and reaction is slow;Or distort system file, cause partial function to lose efficacy, make system stability
Occur abnormal with safety, even make terminal cannot normal boot-strap, safety is relatively low.Further, lose when mobile terminal
Or after stolen, pick up taker or stealer can unlock this mobile terminal by mobile terminal carries out the operations such as brush machine, from
And cause the private information of the owner of lost property to be revealed.
In the various schemes preventing malice brush machine proposed in prior art, it is the most all that brush secret is set by single
The mode of code realizes user's verification, and once password is revealed or is easily cracked, and security performance is poor, security management
The most extensive.
Based on this, be badly in need of a kind of can safer and become more meticulous prevent mobile phone malice brush machine method.
Summary of the invention
The technical problem to be solved is: how to realize mobile phone safe that is safer and that become more meticulous management.For
This, the present invention proposes the method that the binding of a kind of SIM prevents mobile phone malice brush machine, can solve fully due to existing skill
One or more problems that the restriction of art and defect cause.
Additional advantages of the present invention, purpose and characteristic, a part will be elucidated in the following description, and another
Partly for those of ordinary skill in the art by the investigation of description below being will be apparent from or from the reality of the present invention
Acquire in executing.Can be realized and obtain by the structure particularly pointed out in the specification and claims of word and accompanying drawing
Obtain the object of the invention and advantage.
The invention provides the method that the binding of a kind of SIM prevents mobile phone malice brush machine, comprise the steps:
Step S301, pre-sets maltilevel security check information based on ID;Described maltilevel security check information
Including the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information
With the 5th safety check information.
Step S302, sets up the security template corresponding to different level of securitys;In the first security template, when detecting
Terminal is set up with brush machine instrument after being connected, and needs to verify the first safety check information of user, the side of being verified
Follow-up brush machine operation can be carried out;In the second security template, after detecting that terminal is connected with the foundation of brush machine instrument,
Need the first safety check information to user and the second safety check information to verify, be verified after can carrying out
Continuous brush machine operation;In the 3rd security template, after detecting that terminal and brush machine instrument are set up and be connected, needs to
The first safety check information at family, the second safety check information and the 3rd safety check information are verified, are verified
Follow-up brush machine operation can be carried out;In the 4th security template, after detecting that terminal is connected with the foundation of brush machine instrument,
Need the first safety check information to user, the second safety check information, the 3rd safety check information and the 4th safety
Check information is verified, is verified and can carry out follow-up brush machine operation;In the 5th security template, work as detection
Set up to terminal and brush machine instrument after being connected, need the first safety check information to user, the second safety check information,
3rd safety check information, the 4th safety check information and the 5th safety check information are verified, being verified can
Carry out follow-up brush machine operation.
Step S303, sets up the SIM card information list corresponding to different level of trusts, and described level of trust includes first
Level of trust, the second level of trust, the 3rd level of trust, the 4th level of trust, the 5th level of trust.
Step S304, when detecting that terminal is connected with the foundation of brush machine instrument, the SIM card information of detection mobile terminal,
Determine current safety template according to the SIM card information detected, and this mobile terminal is applied this template.
Preferably, described step S304, specifically include: when SIM card information being detected, or the SIM detected
When card information is not in described SIM information list, stop brush machine;When the level of trust that detected SIM information is corresponding
When being not the first level of trust, determine that current safety template is the first security template;When detected SIM information pair
When the level of trust answered is the second level of trust, determine that current safety template is the second security template;When detected
When level of trust corresponding to SIM information is three level of trusts, determine that current safety template is the 3rd security template;When
When level of trust corresponding to detected SIM information is four level of trusts, determine that current safety template is the 4th peace
Full template;When the level of trust that detected SIM information is corresponding is five level of trust, determine current safety mould
Plate is the 5th security template.
Preferably, described first safety check information is key information, and the second safety check information is palmprint information, the
Three safety check information are finger print information, and the 4th safety check information is iris information, and the 5th safety check information is sound
Message ceases.
Preferably, described first security template, the second security template, the 3rd security template, the 4th security template,
Level of security corresponding to five security templates raises successively, described first level of trust, the second level of trust, the 3rd letter
The level of trust corresponding to rank, the 4th level of trust, the 5th level of trust is appointed to reduce successively.
Preferably, described SIM card information is the integrated circuit card identification code (ICCID) of SIM or international mobile use
Family identification code (IMSI) information.
Accompanying drawing explanation
Fig. 1 is the basic procedure schematic diagram of the method according to third embodiment of the invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe wholely.Should be appreciated that specific embodiment described herein is only the exemplary embodiment of the present invention, in order to
Explain the present invention rather than whole embodiment, be not limited to the present invention.Based on the embodiment in the present invention, this
The every other embodiment that field those of ordinary skill is obtained on the premise of not making creative work, broadly falls into
The scope of protection of the invention.In the case of not conflicting, the feature in the embodiment in the present invention i.e. embodiment can phase
Combination in any mutually.
The flow process of method according to a first embodiment of the present invention, specifically may include steps of:
S101: pre-set maltilevel security check information based on ID.
In this step, maltilevel security check information based on ID, described maltilevel security verification letter are pre-set
Breath includes the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check letter
Breath and the 5th safety check information.Concrete, described first safety check information is key information, the second safety check
Information is palmprint information, and the 3rd safety check information is finger print information, and the 4th safety check information is iris information, the
Five safety check information are acoustic information.
S102: set up the security template corresponding to different level of securitys.
In this step, the security template corresponding to different level of securitys is set up.Concrete, at described first safe mould
In plate, after detecting that terminal is connected with the foundation of brush machine instrument, need the first safety check information of user is tested
Card, is verified and can carry out follow-up brush machine operation;In described second security template, when terminal and brush being detected
Machine instrument is set up after connecting, and needs the first safety check information to user and the second safety check information to verify,
It is verified and can carry out follow-up brush machine operation;In described 3rd security template, when terminal and brush machine work being detected
Tool is set up after connecting, and needs the first safety check information to user, the second safety check information and the 3rd safety check
Information is verified, is verified and can carry out follow-up brush machine operation;In described 4th security template, work as detection
Set up to terminal and brush machine instrument after being connected, need the first safety check information to user, the second safety check information,
3rd safety check information and the 4th safety check information are verified, are verified and can carry out follow-up brush machine operation;
In described 5th security template, after detecting that terminal is connected with the foundation of brush machine instrument, to user first is needed to pacify
Full check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the 5th safety
Check information is verified, is verified and can carry out follow-up brush machine operation.Above-mentioned first security template, the second peace
Full level of security corresponding to template, the 3rd security template, the 4th security template, the 5th security template raises successively.
Above step is preset by program, it is also possible to set by User Defined, and this template can according to circumstances be entered by user
Row change.
S103: obtain the geographical location information of mobile terminal in real time.
The geographical position of real time tracking mobile terminal, concrete, can be obtained in real time by the GPS module of mobile terminal
Take its geographical location information.
S104: according to acquired mobile terminal geographic position information, determines current safety template, and this is moved end
End applies this template.
According to acquired mobile terminal geographic position information, determine the security template of mobile terminal, and this is moved end
End applies this template.Concrete, when the distance of mobile terminal current location and center set in advance is less than first
During threshold value D1, determine that current safety template is the first security template;When mobile terminal current location and set in advance in
The distance of heart position more than first threshold D1, less than Second Threshold D2 time, determine that current safety template is the second safety
Template;When the distance of mobile terminal current location and center set in advance is more than Second Threshold D2, less than the 3rd
During threshold value D3, determine that current safety template is the 3rd security template;When mobile terminal current location and set in advance in
The distance of heart position more than the 3rd threshold value D3, less than four threshold values D4 time, determine that current safety template is the 4th safety
Template;When the distance of mobile terminal current location and center set in advance is more than four threshold values D4, determines and work as
Front security template is the 5th security template.
The flow process of method according to a second embodiment of the present invention, specifically may include steps of:
S201: pre-set maltilevel security check information based on ID.
In this step, maltilevel security check information based on ID, described maltilevel security verification letter are pre-set
Breath includes the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check letter
Breath and the 5th safety check information.Concrete, described first safety check information is key information, the second safety check
Information is palmprint information, and the 3rd safety check information is finger print information, and the 4th safety check information is iris information, the
Five safety check information are acoustic information.
S202: set up the security template corresponding to different level of securitys.
In this step, the security template corresponding to different level of securitys is set up.Concrete, at described first safe mould
In plate, after detecting that terminal is connected with the foundation of brush machine instrument, need the first safety check information of user is tested
Card, is verified and can carry out follow-up brush machine operation;In described second security template, when terminal and brush being detected
Machine instrument is set up after connecting, and needs the first safety check information to user and the second safety check information to verify,
It is verified and can carry out follow-up brush machine operation;In described 3rd security template, when terminal and brush machine work being detected
Tool is set up after connecting, and needs the first safety check information to user, the second safety check information and the 3rd safety check
Information is verified, is verified and can carry out follow-up brush machine operation;In described 4th security template, work as detection
Set up to terminal and brush machine instrument after being connected, need the first safety check information to user, the second safety check information,
3rd safety check information and the 4th safety check information are verified, are verified and can carry out follow-up brush machine operation;
In described 5th security template, after detecting that terminal is connected with the foundation of brush machine instrument, to user first is needed to pacify
Full check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the 5th safety
Check information is verified, is verified and can carry out follow-up brush machine operation.Above-mentioned first security template, the second peace
Full level of security corresponding to template, the 3rd security template, the 4th security template, the 5th security template raises successively.
Above step is preset by program, it is also possible to set by User Defined, and this template can according to circumstances be entered by user
Row change.
S203: obtain the associated person information of mobile terminal or default account information, according to associated person information or preset
Account information determines secure relationship people.
Obtain the associated person information of mobile terminal or default account information, believe according to associated person information or default account
Breath determines secure relationship people, concrete, user preassign secure relationship people's account, when user's not specified safety connection
When being people's account, it is also possible to according to mobile phone contact information, each contact person's account stored in statistics mobile phone and this shifting
The contact frequency of dynamic terminal, determines secure relationship people according to contact frequency.Wherein, mobile phone contact account can be hands
Phone number in machine address list, it is also possible to even if being communication contact people's account, such as micro-signal, No. QQ etc..
S204: when detecting that terminal is connected with the foundation of brush machine instrument, mobile terminal sends safety to this secure relationship people
Template solicited message, afterwards, determines current safety template according to feedback information, and this mobile terminal is applied this template.
When detecting that mobile terminal is connected with the foundation of brush machine instrument, mobile terminal sends safe mould to this secure relationship people
Plate solicited message, afterwards, determines current safety template according to receiving feedback information at secure relationship people, and to this
Mobile terminal applies this template.Concrete, described security template solicited message comprises alternative security template row
Table information, secure relationship people sends feedback information according to the security template list carried in security template solicited message, instead
Feedforward information comprises the security template information selected by this secure relationship people.Further, when mobile terminal in the given time
When not receiving feedback information, stop brush machine;When mobile terminal receives feedback information in the given time, according to feedback
Information determines current safety template.
As it is shown in figure 1, be the schematic flow sheet of the method according to third embodiment of the invention, specifically can include as follows
Step:
S301: pre-set maltilevel security check information based on ID.
In this step, maltilevel security check information based on ID, described maltilevel security verification letter are pre-set
Breath includes the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check letter
Breath and the 5th safety check information.Concrete, described first safety check information is key information, the second safety check
Information is palmprint information, and the 3rd safety check information is finger print information, and the 4th safety check information is iris information, the
Five safety check information are acoustic information.
S302: set up the security template corresponding to different level of securitys.
In this step, the security template corresponding to different level of securitys is set up.Concrete, at described first safe mould
In plate, after detecting that terminal is connected with the foundation of brush machine instrument, need the first safety check information of user is tested
Card, is verified and can carry out follow-up brush machine operation;In described second security template, when terminal and brush being detected
Machine instrument is set up after connecting, and needs the first safety check information to user and the second safety check information to verify,
It is verified and can carry out follow-up brush machine operation;In described 3rd security template, when terminal and brush machine work being detected
Tool is set up after connecting, and needs the first safety check information to user, the second safety check information and the 3rd safety check
Information is verified, is verified and can carry out follow-up brush machine operation;In described 4th security template, work as detection
Set up to terminal and brush machine instrument after being connected, need the first safety check information to user, the second safety check information,
3rd safety check information and the 4th safety check information are verified, are verified and can carry out follow-up brush machine operation;
In described 5th security template, after detecting that terminal is connected with the foundation of brush machine instrument, to user first is needed to pacify
Full check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the 5th safety
Check information is verified, is verified and can carry out follow-up brush machine operation.Above-mentioned first security template, the second peace
Full level of security corresponding to template, the 3rd security template, the 4th security template, the 5th security template raises successively.
Above step is preset by program, it is also possible to set by User Defined, and this template can according to circumstances be entered by user
Row change.
S303: set up the SIM card information list corresponding to different level of trusts.
Setting up the SIM card information list corresponding to different level of trusts, wherein said SIM card information can be SIM
Integrated circuit card identification code (ICCID) or international mobile subscriber identity (IMSI) information.Can add in advance
The SIM information that can trust, and the just described SIM information MAP that can trust is to different level of trusts, tool
Body, described level of trust can include the first level of trust, the second level of trust, the 3rd level of trust, the 4th letter
Appointing rank, the 5th level of trust, its corresponding level of trust reduces successively.
S304: when detecting that terminal is connected with the foundation of brush machine instrument, the SIM card information of detection mobile terminal, according to
The SIM card information detected determines current safety template, and this mobile terminal is applied this template.
Concrete, when SIM card information being detected, or the SIM card information detected is not in described SIM information
Time in list, stop brush machine;When the level of trust that detected SIM information is corresponding is the first level of trust, really
Settled front security template is the first security template;When the level of trust that detected SIM information is corresponding is the second trust
During rank, determine that current safety template is the second security template;When the level of trust that detected SIM information is corresponding
When being three level of trusts, determine that current safety template is the 3rd security template;When detected SIM information is corresponding
Level of trust when being four level of trusts, determine that current safety template is the 4th security template;As detected SIM
When level of trust corresponding to information is five level of trusts, determine that current safety template is the 5th security template.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is permissible
The hardware relevant by programmed instruction realizes, and program can store in a computer-readable storage medium, storage medium
Including RAM, ROM, flash memory, disk or CD etc..
Above content is only presently preferred embodiments of the present invention, for those of ordinary skill in the art, according to the present invention's
Thought, the most all will change, and this specification content should not be construed as this
The restriction of invention.
Claims (5)
1. the method that SIM binding prevents mobile phone malice brush machine, comprises the steps:
Step S301, pre-sets maltilevel security check information based on ID;Described maltilevel security check information
Including the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information
With the 5th safety check information;
Step S302, sets up the security template corresponding to different level of securitys;In the first security template, when detecting
Terminal is set up with brush machine instrument after being connected, and needs to verify the first safety check information of user, the side of being verified
Follow-up brush machine operation can be carried out;In the second security template, after detecting that terminal is connected with the foundation of brush machine instrument,
Need the first safety check information to user and the second safety check information to verify, be verified after can carrying out
Continuous brush machine operation;In the 3rd security template, after detecting that terminal and brush machine instrument are set up and be connected, needs to
The first safety check information at family, the second safety check information and the 3rd safety check information are verified, are verified
Follow-up brush machine operation can be carried out;In the 4th security template, after detecting that terminal is connected with the foundation of brush machine instrument,
Need the first safety check information to user, the second safety check information, the 3rd safety check information and the 4th safety
Check information is verified, is verified and can carry out follow-up brush machine operation;In the 5th security template, work as detection
Set up to terminal and brush machine instrument after being connected, need the first safety check information to user, the second safety check information,
3rd safety check information, the 4th safety check information and the 5th safety check information are verified, being verified can
Carry out follow-up brush machine operation;
Step S303, sets up the SIM card information list corresponding to different level of trusts, and described level of trust includes first
Level of trust, the second level of trust, the 3rd level of trust, the 4th level of trust, the 5th level of trust;
Step S304, when detecting that terminal is connected with the foundation of brush machine instrument, the SIM card information of detection mobile terminal,
Determine current safety template according to the SIM card information detected, and this mobile terminal is applied this template.
Method the most according to claim 1, it is characterised in that described step S304, specifically includes: work as nothing
Method detects SIM card information, or the SIM card information detected not in described SIM information list time, stop brush
Machine;When the level of trust that detected SIM information is corresponding is the first level of trust, determine that current safety template is
First security template;When the level of trust that detected SIM information is corresponding is the second level of trust, determine current
Security template is the second security template;When the level of trust that detected SIM information is corresponding is three level of trust,
Determine that current safety template is the 3rd security template;When the level of trust that detected SIM information is corresponding is the 4th letter
When appointing rank, determine that current safety template is the 4th security template;When the level of trust that detected SIM information is corresponding
When being not five level of trusts, determine that current safety template is the 5th security template.
Method the most according to claim 1, it is characterised in that described first safety check information is key information,
Second safety check information is palmprint information, and the 3rd safety check information is finger print information, and the 4th safety check information is
Iris information, the 5th safety check information is acoustic information.
Method the most according to claim 1, it is characterised in that described first security template, the second security template,
Level of security corresponding to 3rd security template, the 4th security template, the 5th security template raises successively, and described first
Letter corresponding to level of trust, the second level of trust, the 3rd level of trust, the 4th level of trust, the 5th level of trust
Rank is appointed to reduce successively.
Method the most according to claim 1, it is characterised in that described SIM card information is the integrated electricity of SIM
An outpost of the tax office's identification code (ICCID) or international mobile subscriber identity (IMSI) information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610490010.7A CN105978899A (en) | 2016-06-27 | 2016-06-27 | SIM card binding method for preventing malicious mobile phone flash |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610490010.7A CN105978899A (en) | 2016-06-27 | 2016-06-27 | SIM card binding method for preventing malicious mobile phone flash |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105978899A true CN105978899A (en) | 2016-09-28 |
Family
ID=57020841
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610490010.7A Pending CN105978899A (en) | 2016-06-27 | 2016-06-27 | SIM card binding method for preventing malicious mobile phone flash |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105978899A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106778374A (en) * | 2016-11-30 | 2017-05-31 | 上海与德信息技术有限公司 | Terminal and its method for preventing fraudulent-using |
WO2017185658A1 (en) * | 2016-04-25 | 2017-11-02 | 乐视控股(北京)有限公司 | Security protection method and apparatus, mobile terminal, and electronic device |
CN113434161A (en) * | 2020-03-23 | 2021-09-24 | 成都鼎桥通信技术有限公司 | Software version update control method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101232677A (en) * | 2008-01-31 | 2008-07-30 | 深圳华为通信技术有限公司 | Method and apparatus for start-up logging of mobile terminal |
CN103906034A (en) * | 2012-12-28 | 2014-07-02 | 中国电信股份有限公司 | Mobile application providing method and mobile application providing server |
CN104199688A (en) * | 2014-08-15 | 2014-12-10 | 深圳市中兴移动通信有限公司 | Mobile terminal and system reinstallation control method and device thereof |
CN104811931A (en) * | 2014-01-23 | 2015-07-29 | 腾讯科技(深圳)有限公司 | System and method for distributing unique identifiers of mobile terminals |
CN104899481A (en) * | 2015-06-17 | 2015-09-09 | 上海斐讯数据通信技术有限公司 | System and method for preventing decompilation of application programs |
-
2016
- 2016-06-27 CN CN201610490010.7A patent/CN105978899A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101232677A (en) * | 2008-01-31 | 2008-07-30 | 深圳华为通信技术有限公司 | Method and apparatus for start-up logging of mobile terminal |
CN103906034A (en) * | 2012-12-28 | 2014-07-02 | 中国电信股份有限公司 | Mobile application providing method and mobile application providing server |
CN104811931A (en) * | 2014-01-23 | 2015-07-29 | 腾讯科技(深圳)有限公司 | System and method for distributing unique identifiers of mobile terminals |
CN104199688A (en) * | 2014-08-15 | 2014-12-10 | 深圳市中兴移动通信有限公司 | Mobile terminal and system reinstallation control method and device thereof |
CN104899481A (en) * | 2015-06-17 | 2015-09-09 | 上海斐讯数据通信技术有限公司 | System and method for preventing decompilation of application programs |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017185658A1 (en) * | 2016-04-25 | 2017-11-02 | 乐视控股(北京)有限公司 | Security protection method and apparatus, mobile terminal, and electronic device |
CN106778374A (en) * | 2016-11-30 | 2017-05-31 | 上海与德信息技术有限公司 | Terminal and its method for preventing fraudulent-using |
CN113434161A (en) * | 2020-03-23 | 2021-09-24 | 成都鼎桥通信技术有限公司 | Software version update control method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9131377B2 (en) | Method and apparatus for unlocking operating system | |
US11036840B2 (en) | Fingerprint recognition method and apparatus, and touchscreen terminal | |
CN104205721B (en) | The adaptive authentication method of context aware and device | |
US8718602B2 (en) | Method and system for remote control of smart card | |
CN104767713B (en) | Account binding method, server and system | |
CN104461749A (en) | Application program synchronization method and device of multi-system terminal and terminal | |
CN107864144A (en) | Obtain method and device, computer installation and the storage medium of dynamic password | |
CN102075627A (en) | Information prompting method and mobile terminal | |
CN107533596B (en) | Fingerprint identification method and mobile terminal | |
CN106897629A (en) | The control method and terminal of terminal applies | |
CN105978899A (en) | SIM card binding method for preventing malicious mobile phone flash | |
CN105022939A (en) | Information verification method and device | |
CN110546641A (en) | access control method and device, intelligent device and storage medium | |
CN114861158A (en) | Security authentication method, device, system, electronic equipment and storage medium | |
CN111641718B (en) | Mobile phone terminal APP identity authentication method | |
CN106131819A (en) | A kind of multistage authentication prevents the method for mobile phone malice brush machine | |
CN105516500A (en) | Method and system for selecting device mode | |
CN105141750A (en) | Screen locking method and terminal | |
CN110417979B (en) | Unlocking method, device, terminal and storage medium | |
CN103685259A (en) | Method and device for account logging in | |
CN113596812B (en) | APN automatic configuration and switching method based on android platform | |
CN110636474A (en) | Bluetooth pairing method and device | |
WO2016187966A1 (en) | Terminal and method for protecting data security of terminal | |
CN101770553B (en) | Mobile terminal and calling method for root certificate in mobile terminal | |
CN106210272A (en) | A kind of method preventing mobile phone malice brush machine based on ID |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160928 |