CN106535159B - User identity identification card and remote destroying method, system and equipment thereof - Google Patents

User identity identification card and remote destroying method, system and equipment thereof Download PDF

Info

Publication number
CN106535159B
CN106535159B CN201610975478.5A CN201610975478A CN106535159B CN 106535159 B CN106535159 B CN 106535159B CN 201610975478 A CN201610975478 A CN 201610975478A CN 106535159 B CN106535159 B CN 106535159B
Authority
CN
China
Prior art keywords
identification card
user
user identity
identity identification
destruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610975478.5A
Other languages
Chinese (zh)
Other versions
CN106535159A (en
Inventor
张祖辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610975478.5A priority Critical patent/CN106535159B/en
Publication of CN106535159A publication Critical patent/CN106535159A/en
Application granted granted Critical
Publication of CN106535159B publication Critical patent/CN106535159B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2209/00Arrangements in telecontrol or telemetry systems
    • H04Q2209/40Arrangements in telecontrol or telemetry systems using a wireless architecture

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A remote destroying method for a user identification card comprises the following steps: periodically initiating interaction with an operator network corresponding to a user identity identification card, and outputting a prompt that the user identity identification card is possible to be illegally subsidized when the number of times of failure in initiating the network interaction reaches a preset number of times; and when a user identification card destruction command of the user is received, sending a destruction instruction to the terminal provided with the user identification card which is probably illegally repaired so as to destroy the user identification card which is probably illegally repaired. The invention also provides a user identity identification card and a remote destroying system and equipment thereof. The invention can achieve the purpose of destroying the illegally repaired user identification card by sending the remote instruction, and prevent the property from being damaged before the legal user re-repairs the user identification card.

Description

User identity identification card and remote destroying method, system and equipment thereof
Technical Field
The invention relates to the technical field of communication, in particular to a user identity identification card and a remote destroying method, system and device thereof.
Background
Mobile payment, also known as cell phone payment, is a service that allows users to use their mobile communication devices (typically cell phones) for financial payments for goods or services consumed. The unit or the individual directly or indirectly sends a payment instruction to the bank financial institution through the mobile equipment, the Internet or the close-range sensor to generate money payment and fund transfer behaviors, so that the mobile payment function is realized. Mobile payment usually needs to be bound with a user identification card (mobile phone card), and therefore, the user identification card plays a crucial role in the security of mobile payment.
Mobile phones, bank cards and identity cards are nearby, but the phenomenon that deposits in the bank cards fly all the time now happens, and most of the reasons are that user identity identification cards of users are illegally subsidized by others. Criminals firstly use the forged ID cards to complement user ID cards bound with bank cards at communication operator network points, the mobile phones of the owners are 'wasted', then the internet bank transaction passwords are reset, and then the funds in the user bank cards are transferred away by using the intercepted dynamic verification code information such as short messages and the like, so that the property of legal users is seriously lost.
Disclosure of Invention
In view of the above, there is a need for a method for remotely destroying a subscriber identity card, which can destroy an illegally repaired subscriber identity card by sending a remote command, so as to prevent property damage of a legitimate subscriber before the user identity card is repaired again.
A remote destroying method for a user identification card is applied to communication equipment and comprises the following steps:
periodically initiating interaction with an operator network corresponding to a user identity identification card, and outputting a prompt that the user identity identification card is possible to be illegally subsidized when the number of times of failure in initiating the network interaction reaches a preset number of times; and
and when a user identification card destruction command of the user is received, sending a destruction instruction to the terminal provided with the user identification card which is possibly illegally repaired so as to destroy the user identification card which is possibly illegally repaired.
In a preferred embodiment of the present invention, the method for remotely destroying the user identification card further includes:
and under the condition that the communication equipment is connected with a network, sending the destruction instruction to a cloud server through the network, and forwarding the destruction instruction to the terminal provided with the user identity identification card which is possibly illegally made.
In a preferred embodiment of the present invention, the method for remotely destroying the user identification card further includes:
and under the condition that the communication equipment cannot be connected to the network, sending the destruction instruction to the terminal provided with the illegal subsidy user identity identification card by using other user identity identification cards in the communication equipment in a short message mode.
In a preferred embodiment of the present invention, the method for remotely destroying the user identification card further includes:
and when the communication equipment cannot be connected to the network and does not have other user identification cards, outputting a network link for sending the destruction instruction or prompting of instruction content.
In a preferred embodiment of the present invention, the network link includes: the network address, the user name and the password, and the method for remotely destroying the user identification card further comprises the following steps:
and outputting a prompt for sending the destruction instruction of the user identification card to the terminal provided with the illegal subsidized user identification card by using other equipment capable of connecting with the network.
In a preferred embodiment of the present invention, the instruction content includes a short message including the destruction instruction, and the method for remotely destroying the user identification card further includes:
and outputting a prompt of sending the short message to the terminal provided with the illegal subsidized user identity identification card by using other communication equipment.
A remote destroying method of a user identification card is applied to the user identification card and comprises the following steps:
when a destroying instruction of the user identity identification card is received, a control instruction is sent to a driving module of the user identity identification card, the driving module is enabled to use a preset voltage value provided by a power management integrated circuit to continuously power on the user identity identification card until the situation that a reset response of the user identity identification card cannot be received or the user identity identification card is pulled out is detected; or
When a destroying instruction of the user identity identification card is received, calling an interface provided by a driving module of the user identity identification card, starting a locking function of the user identity identification card, randomly generating and inputting a first PIN code, refreshing the user identity identification card, automatically and randomly generating and inputting a second PIN code after triggering an operation that the user identity identification card requires to input the PIN code, reaching a first preset number of times, and then automatically inputting a randomly generated PUK code, reaching a second preset number of times, until the user identity identification card is completely locked.
In a preferred embodiment of the present invention, the preset voltage value includes a voltage value exceeding 3V or a maximum voltage value that can be provided by the power management integrated circuit.
In view of the above, there is also a need for a remote destruction system for a user id card, which can destroy an illegally repaired user id card by sending a remote command, so as to prevent property damage of a legitimate user before the user id card is repaired again.
A user identification card remote destroying system is applied to communication equipment and comprises:
the system comprises a detection module, a processing module and a processing module, wherein the detection module is used for periodically initiating the interaction of an operator network corresponding to a user identity identification card and outputting a prompt that the user identity identification card is possible to be illegally subsidized when the number of times of failure of initiating the network interaction reaches a preset number of times; and
and the control module is used for sending a destroying instruction to the terminal provided with the user identity identification card which is possibly illegally repaired when the user identity identification card destroying command of the user is received.
In a preferred embodiment of the present invention, the control module is further configured to:
and under the condition that the communication equipment is connected with a network, sending the destruction instruction to a cloud server through the network, and forwarding the destruction instruction to the terminal provided with the user identity identification card which is possibly illegally made.
In a preferred embodiment of the present invention, the control module is further configured to:
and under the condition that the communication equipment cannot be connected to the network, sending the destruction instruction to the terminal provided with the illegal subsidy user identity identification card by using other user identity identification cards in the communication equipment in a short message mode.
In a preferred embodiment of the present invention, the control module is further configured to:
and when the communication equipment cannot be connected to the network and does not have other user identification cards, outputting a network link for sending the destruction instruction or prompting of instruction content.
In a preferred embodiment of the present invention, the network link includes: a network address, a username, and a password, and the control module is further to:
and outputting a prompt for sending the user identification card destruction command to the terminal provided with the illegal subsidized user identification card by using other equipment capable of being connected with the network.
In a preferred embodiment of the present invention, the instruction content includes a short message including the destruction instruction, and the control module is further configured to:
and outputting a prompt of sending the short message to the terminal provided with the illegal subsidized user identity identification card by using other communication equipment.
A remote destroying system of a user identification card is applied to the user identification card and comprises:
a destruction module to:
when a destroying instruction of the user identity identification card is received, a control instruction is sent to a driving module of the user identity identification card, the driving module is enabled to use a preset voltage value provided by a power management integrated circuit to power on the user identity identification card all the time until the situation that a reset response of the user identity identification card cannot be received or the user identity identification card is pulled out is detected; or
When a destroying instruction of the user identity identification card is received, calling an interface provided by a driving module of the user identity identification card, starting a locking function of the user identity identification card, randomly generating and inputting a first PIN code, refreshing the user identity identification card, automatically and randomly generating and inputting a second PIN code after triggering an operation that the user identity identification card requires to input the PIN code, reaching a first preset number of times, and then automatically inputting a randomly generated PUK code, reaching a second preset number of times, until the user identity identification card is completely locked.
In a preferred embodiment of the present invention, the preset voltage value includes a voltage value exceeding 3V or a maximum voltage value that can be provided by the power management integrated circuit.
In view of the above, there is a need for a communication device that can destroy illegally repaired user id cards by sending remote commands, so as to prevent property damage of legitimate users before re-repairing the user id cards.
A communication device comprising a memory and a processor, wherein:
the memory stores a program;
the processor is configured to execute the program in the memory to:
periodically initiating interaction with an operator network corresponding to a user identity identification card, and outputting a prompt that the user identity identification card is possible to be illegally subsidized when the number of times of failure in initiating the network interaction reaches a preset number of times; and
and when a user identification card destruction command of the user is received, sending a destruction instruction to the terminal provided with the user identification card which is possibly illegally repaired so as to destroy the user identification card which is possibly illegally repaired.
In the preferred embodiment of the invention:
under the condition that the communication equipment is connected with a network, the destruction instruction is sent to a cloud server through the network, and the cloud server forwards the destruction instruction to the terminal provided with the user identity identification card which is possibly illegally made;
under the condition that the communication equipment cannot be connected to the network, the destruction instruction is sent to the terminal provided with the illegal subsidy user identity identification card by using other user identity identification cards in the communication equipment in a short message mode; or
When the communication equipment can not be connected to the network and does not have other user identification cards, the network link for sending the destruction instruction or the prompt of the instruction content is output
In view of the above, there is a need for a user id card that can destroy illegally repaired user id cards by sending a remote command, so as to prevent property damage of legitimate users before re-repairing the user id cards.
A subscriber identity module card comprising a program memory and a microprocessor, wherein:
the program memory stores a program;
the microprocessor is configured to execute the program in the memory to:
when a destroying instruction of the user identity identification card is received, a control instruction is sent to a driving module of the user identity identification card, the driving module is enabled to use a preset voltage value provided by a power management integrated circuit to continuously power on the user identity identification card until the situation that a reset response of the user identity identification card cannot be received or the user identity identification card is pulled out is detected; or
When a destroying instruction of the user identity identification card is received, calling an interface provided by a driving module of the user identity identification card, starting a locking function of the user identity identification card, randomly generating and inputting a first PIN code, refreshing the user identity identification card, automatically and randomly generating and inputting a second PIN code after triggering an operation that the user identity identification card requires to input the PIN code, reaching a first preset number of times, and then automatically inputting a randomly generated PUK code, reaching a second preset number of times, until the user identity identification card is completely locked.
In a preferred embodiment of the present invention, the preset voltage value includes a voltage value exceeding 3V or a maximum voltage value that can be provided by the power management integrated circuit.
Compared with the prior art, by using the user identity identification card and the remote destroying method, system and equipment thereof, when the user identity identification card of the legal user is illegally reported to be repaired, the legal user can quickly respond, the purpose of destroying the illegally repaired user identity identification card is achieved by sending the remote instruction, the destroyed user identity identification card cannot be used when being placed on any mobile phone, the illegal user is prevented from continuously using the user identity identification card to infringe the rights and interests of the legal user, and the property of the legal user is prevented from being damaged before the user identity identification card is repaired again.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the following briefly introduces the embodiments and the drawings used in the description of the prior art, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a schematic view of an application environment of a remote destruction method for a subscriber identity module card according to a preferred embodiment of the present invention.
Fig. 2 is a flowchart illustrating an implementation of a preferred embodiment of the user id card detection in the method for remotely destroying the user id card according to the present invention.
Fig. 3 is a flowchart illustrating an implementation of a method for remotely destroying a user id card according to a preferred embodiment of the present invention.
Fig. 4 is a flowchart illustrating a first preferred embodiment of destroying a user id card in the method for remotely destroying a user id card according to the present invention.
Fig. 5 is a flowchart illustrating a second preferred embodiment of destroying a user id card in the method for remotely destroying a user id card according to the present invention.
Fig. 6 is a signaling interaction diagram of the remote destruction method for the user identification card according to the present invention.
Fig. 7 is a schematic structural diagram of a remote destruction system for a subscriber identity card according to a preferred embodiment of the present invention.
Fig. 8 is a schematic structural diagram of a preferred embodiment of the communication device of the present invention.
FIG. 9 is a schematic structural diagram of a preferred embodiment of a SIM card according to the present invention.
Description of the main elements
Communication device 1
Memory 11
Processor 12
Communication device 13
Display device 14
Input device 15
Cloud server 2
Network 3
Illegal communication device 4
Drive module 40
Power management integrated circuit 41
User identification card 5, 6
Operator network 7
Program memory 51
Microprocessor 52
Working memory 53
Data memory 54
Serial communication unit 55
Detection module 100
Control module 101
Destroy module 102
Detailed Description
The embodiment of the invention provides a remote destroying method for a user identification card of communication equipment, which aims to achieve the purpose of destroying the illegally repaired user identification card by sending a remote instruction. The embodiment of the invention also provides a corresponding user identity identification card remote destroying system, a communication device and a computer readable storage medium.
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The following are detailed descriptions of the respective embodiments.
The first embodiment,
Referring to fig. 1, a schematic diagram of an application environment of a preferred embodiment of the remote destruction method for a subscriber identity module card of the present invention is shown.
The method for remotely destroying the user identification card can be executed by a communication device 1 and the user identification card 5. In the preferred embodiment of the present invention, the communication device 1 may be a mobile phone, which is installed with the user identification card 5.
The User identification card 5 includes, but is not limited to, a Subscriber Identification Module (SIM) card, a Micro SIM, a Nano SIM, a User Identification Module (UIM) card, a Micro UIM, a Nano UIM card, and the like.
In other preferred embodiments of the present invention, the communication device 1 may also be a dual-card mobile phone, and therefore, may further include a user identification card 6.
Similarly, the subscriber identity Module card 6 may also include, but is not limited to, a Subscriber Identity Module (SIM) card, a Micro SIM, a Nano SIM, a User Identity Module (UIM) card, a Micro UIM, a Nano UIM card, and the like.
In the application scenario of the present invention, the user id card 5 in the communication device 1 is illegally implemented and installed in an illegal communication terminal 4. Therefore, the user identification card 5 in the communication apparatus 1 may be in an unusable state.
Further, the communication device 1 may be connected to a cloud server 2 via a network 3. In the embodiment of the invention, the cloud server 2 provides mobile phone cloud service. The mobile phone cloud service is characterized in that a communication device 1 such as a mobile phone is used as a carrier, a cloud server 2, a network 3 and the communication device 1 are all connected in real time to form a unified ecological system, the cloud server 2 performs a large amount of operation and information storage in the system, and a high-speed network is used for transmitting the whole information.
The network 3 may be a mobile data network or a Wireless Local Area Network (WLAN).
The cloud server 2 may have the following functions: the system comprises a contact person synchronization function, a personal data backup function, a push function, LBS positioning, automatic updating of application software, cloud storage and the like.
Further, in the embodiment of the present invention, the cloud server 2 further provides a function (described below) of forwarding a destruction instruction of the user identification card.
Example II,
Referring to fig. 2, a flowchart illustrating an implementation of a preferred embodiment of the user identification card detection in the method for remotely destroying the user identification card according to the present invention is shown. In the preferred embodiment of the present invention, the method for detecting the user id card is executed by the communication device 1.
The execution order in the flow chart shown in the figure may be changed and some may be omitted according to different needs.
S01, the communication device 1 periodically initiates interaction with the operator network 7 corresponding to the user identification card 5.
The interaction manner may include, but is not limited to, actively initiating Tracking Area Update (TAU), Routing Area Update (RAU), Location Area Update (LAU), and the like.
The period may include, for example, every 30 seconds, 1 minute, etc.
S02, the communication device 1 determines whether the network interaction fails, for example, the authentication fails, the registration is rejected, etc.
When the initiation of the network interaction fails, S03 is executed, and it is further determined that the number of failures reaches a preset number, for example, 5 times.
If the number of failures does not reach the preset number, returning to S01, and the communication device 1 initiates interaction with the operator network 7 corresponding to the user identification card 5 again.
If the number of failures reaches the preset number, S04 is executed, and the communication device 1 outputs a prompt that the user id card 5 may be illegally made to the user of the communication device 1.
In a preferred embodiment of the present invention, the communication device 1 may output a prompt message on its user interface, for example, on a display device of the communication device 1: "the user identification card XX may be illegally subsidized".
When the user receives the prompt message, the user may make a call to the user identification card 5 by any available method, for example, using another mobile phone, to determine whether the user identification card 5 is actually illegally subsidized.
For example, when the user can make a call to the user identification card 5 by using another mobile phone, it may be determined that the user identification card 5 is indeed illegally subsidized, and the user may send a remote destruction instruction to the user identification card 5 by using the flow shown in fig. 3 described below.
Example III,
Referring to fig. 3, it is a flowchart of an embodiment of the present invention for remotely transmitting a destruction instruction of a user identification card in a remote destruction method of the user identification card. In the preferred embodiment of the present invention, the method for remotely sending the user id pin destruction instruction is executed by the communication device 1.
The execution order in the flow chart shown in the figure may be changed and some may be omitted according to different needs.
S10, the communication device 1 determines whether a user id pin destruction command of the user is received.
In a preferred embodiment of the present invention, the communication device may provide a function option to send the user id card destruction command. For example, the user identification click command may be integrated in a "settings" menu of the communication device 1. When the user selects the option of destroying the user id card, the communication device 1 may receive the command to destroy the user id card and perform S11 described below.
S11, the communication apparatus 1 determines whether it can connect to the network 3.
First, the communication apparatus 1 determines whether it can connect to the WLAN network. When the connection to the WLAN network is not possible, if the communication device 1 is a dual-card mobile phone including the subscriber identity card 5 and the subscriber identity card 6, the communication device 1 determines whether it can connect to the mobile data network using the second subscriber identity card 6.
When the communication apparatus 1 can connect to the network 3, S12 and S13 described below are executed.
S12, the communication device 1 sends the destroy instruction of the user id card 5 to the cloud server 2 through the network 3, the cloud server 2 forwards the destroy instruction to the illegal communication terminal 4 equipped with the user id card 5 that is likely to be illegally subsidized, and in S13, determines whether a feedback that the destroy instruction sent by the cloud server 2 is successfully sent is received.
And when receiving the feedback that the destruction instruction sent by the cloud server 2 is successfully sent, ending the process of remotely sending the user identity identification card destruction instruction.
When the communication device 1 may not be connected to the network 3 in S11 or when the feedback that the destruction instruction sent by the cloud server 2 is successfully sent is not received in S13, S14 is executed, and the communication device 1 determines whether there is another usable user identification card, that is, the user identification card 6.
When the communication device 1 has another available subscriber identity card, S15 is executed, and the communication device 1 sends the destruction instruction to the illegal communication terminal 4 equipped with the illegal subsidized subscriber identity card 5 through the another subscriber identity card in a short message manner.
When the communication device 1 does not have any usable other user id card, S16 is executed, and the communication device 1 outputs a network link for sending a destruction instruction or a prompt for instruction content.
The network link includes, for example, a network address, a user name, a password, etc., to prompt the user to use other devices, such as a computer, to send the destruction instruction to the illegal communication terminal 4 equipped with the illegal subsidized user identification card 5 through the network 3.
The instruction content includes, for example, a short message containing the destruction instruction, so as to prompt the user to use another mobile phone to send the short message to the illegal communication terminal 4 equipped with the illegal subsidy user identification card 5.
Example four,
Referring to fig. 4, a flowchart of a first preferred embodiment of destroying a user identification card in the method for remotely destroying a user identification card according to the present invention is shown. In the preferred embodiment of the present invention, the method for destroying the user id card is executed by the illegally added user id card 5 installed in the illegal communication terminal 4.
The execution order in the flow chart shown in the figure may be changed and some may be omitted according to different needs.
S20, the user id card 5 determines whether a destroy instruction is received, and verifies whether the destroy instruction is legal when the destroy instruction is received.
As described above, the destruction instruction may be sent by the cloud server 2 through the network 3, or may be sent by the communication device 1 through a short message.
In a preferred embodiment of the present invention, the destroy instruction may include a preset identifier, for example, a unique serial number of the communication device 1, and the unique serial number may be stored when the user identification card 5 is installed in the communication device 1.
When the user identification card 5 determines that the unique serial number of the communication device 1 exists in the destruction instruction, it may be determined that the destruction instruction is legal.
When the user id card 5 receives the destruction instruction and the destruction instruction is legal, the following S21 is executed.
S21, the sim 5 sends an instruction to a sim driver module 40, so that the sim driver module 40 uses a preset voltage value provided by a Power Management IC (PMIC) 41 to continuously Power on the sim until it detects that the response of the sim cannot be received or the sim is unplugged.
In the preferred embodiment of the present invention, the preset voltage value is a voltage greater than 3V or the maximum voltage value that the power management integrated circuit 41 can provide.
The driver module 40 of the sim card is a device responsible for communication with the sim card 5. Under normal conditions, when the driving module 40 detects that a user identification card is inserted, the driving module first uses the 1.8V voltage provided by the power management integrated circuit 41 to power on the user identification card, and determines whether an Answer To Reset (ATR) of the user identification card is received, and when the answer to ATR is received, the driving module 40 starts to execute subsequent processes such as activation of the user identification card; if the voltage of 1.8V powers up the user identification card and does not receive the ATR response of the user identification card, the user identification card driving module 40 further powers up the user identification card using the voltage of 3V provided by the power management integrated circuit 41, and determines whether the ATR response of the user identification card is received, and if the ATR response is not received, the user identification card driving module 40 powers down the user identification card and does not initiate power up.
As described above, the voltages that the user id card can support are 1.8V and 3V, and if the user id card is powered up by using a voltage exceeding 3V, the user id card may be burned out, thereby achieving the purpose of being incapable of being used continuously. Therefore, after the user id card 5 receives the destroy instruction, the user id card driving module 40 is controlled to use the voltage larger than 3V, or the maximum voltage which can be provided by the power management integrated circuit 41 is directly used to power on the user id card 5 until the ATR response of the user id card 5 cannot be received. Further, in order to achieve the purpose of burning 100% of the user identification card 5, even if the ATR response is not received, the user identification card driving module 40 may continue to be powered on by using a voltage greater than 3V until the user identification card 5 is unplugged from the illegal communication device 4.
Example V,
Referring to fig. 5, a flowchart illustrating a second preferred embodiment of destroying a user identification card in the method for remotely destroying a user identification card according to the present invention is shown. In the preferred embodiment of the present invention, the destruction of the subscriber identity card is performed by the illegally subsidized subscriber identity card 5 installed in the illegal communication device 4.
The execution order in the flow chart shown in the figure may be changed and some may be omitted according to different needs.
S30, the user id card 5 determines whether a destroy instruction is received, and verifies whether the destroy instruction is legal when the destroy instruction is received.
As described above, the destruction instruction may be sent by the cloud server 2 through the network 3, or may be sent by the communication device 1 through a short message.
In a preferred embodiment of the present invention, the destroy instruction may include a preset identifier, for example, a unique serial number of the communication device 1, and the unique serial number may be stored when the user identification card 5 is installed in the communication device 1.
When the user identification card 5 determines that the unique serial number of the communication device 1 exists in the destruction instruction, it may be determined that the destruction instruction is legal.
When the user id card 5 receives the destruction instruction and the destruction instruction is legal, the following S31 is executed.
S31, the sim 5 calls the interface provided by the sim driver module 40 to enable the locking function of the sim, randomly generates and inputs a first Personal Identification Number (PIN) code, and in S32, refreshes the sim 5 to trigger the operation of the sim 5 that requires to input the PIN code.
The PIN code is a security measure for protecting the user identification card. If the power-on PIN is enabled, the PIN is entered after each power-on. When the number of errors of continuously inputting the PIN code reaches a first preset number, the user identification card is automatically locked.
S33, the sim card driver module 40 automatically and randomly generates and inputs the second PIN code according to the command of the sim card 5 until the first preset number of times is reached.
In the embodiment of the present invention, the first preset number of times is 3.
Since the PIN code input each time is randomly generated, when the input reaches the first preset number of times, the user id card 5 is locked, and an unlock code (PUK) of the PIN code is required to be input to unlock the user id card 5.
S34, the user id card driving module 40 randomly generates and inputs the PUK code again according to the command of the user id card 5 until reaching a second preset number of times, so as to completely lock the user id card and make it unusable.
In the embodiment of the present invention, the second preset number is 10.
Example six,
Fig. 6 is a signaling interaction diagram of the remote destruction method for the user identification card according to the present invention.
The communication device 1 periodically initiates an interaction with the operator network 7 corresponding to said user identification card 5.
The interaction manner may include, but is not limited to, actively initiating Tracking Area Update (TAU), Routing Area Update (RAU), Location Area Update (LAU), and the like.
The period may include, for example, every 30 seconds, 1 minute, etc.
When the number of times of initiating network interaction failure, for example, authentication failure, registration refusal, etc., reaches a preset number of times, for example, 5 times, the communication device 1 may determine that the user id card 5 may be illegally subsidized, and may prompt the user of the communication device 1.
The communication device 1 may output a prompt message on its user interface, e.g. on a display means of the communication device 1: "the user identification card XX may be illegally subsidized".
When the user receives the prompt message, the user may make a call to the user identification card 5 by any available method, for example, using another mobile phone, to determine whether the user identification card 5 is actually illegally subsidized.
For example, when the user id card 5 can be called up by using another mobile phone, it can be determined that the user id card 5 is actually illegally repaired, and the user can send a user id card destruction command to the communication device 1.
When a user identification card destruction command of a user is received, the communication device 1 sends a destruction instruction to the terminal 4 equipped with the user identification card which is likely to be illegally repaired, so as to destroy the user identification card which is likely to be illegally repaired.
Specifically, when the destruction instruction is transmitted, the communication apparatus 1 first determines whether or not it is possible to connect to the network 3.
When the communication device 1 can be connected to the network 3, the destruction instruction is sent to the cloud server 2 through the network 3, and the cloud server 2 forwards the destruction instruction to the illegal communication terminal 4 provided with the user identification card which is likely to be illegally subsidized.
When the communication device 1 cannot be connected to the network 3 or does not receive the feedback that the destruction instruction sent by the cloud server 2 is successfully sent, the communication device 1 further determines whether there is another user identification card 6.
And when other user identification cards 6 exist in the communication equipment 1, sending the destruction instruction to the illegal communication terminal 4 provided with the illegal subsidy user identification card by using the other user identification cards 6 in the communication equipment 1 in a short message manner.
When the communication device 1 judges that the connection to the network 3 is impossible and there is no other user identification card 6, a network link for transmitting a destruction instruction or a prompt of instruction contents is output on its user interface.
Wherein the network link comprises: and the network address, the user name and the password prompt the user to send a destruction instruction of the user identification card to the illegal communication terminal 4 provided with the illegal subsidized user identification card 5 by using other equipment capable of connecting with the network.
Wherein, the instruction content comprises a short message containing the destroy instruction, and prompts the user to use other communication equipment to send the short message to the terminal 4 provided with the illegal subsidy user identification card.
And when the terminal 4 receives the destruction instruction, after verifying that the destruction instruction is sent by the legal communication equipment 1, executing the burning operation or the locking operation of the illegally repaired user identity identification card.
In a preferred embodiment of the present invention, the destroy instruction may include a preset identifier, for example, a unique serial number of the communication device 1, and the unique serial number may be stored when the user identification card 5 is installed in the communication device 1.
When the user identification card 5 determines that the unique serial number of the communication device 1 exists in the destruction instruction, it may be determined that the destruction instruction is legal.
Specifically, the burn-out operation includes: sending a control instruction to a driving module of the user identity identification card, and enabling the driving module to continuously electrify the user identity identification card by using a preset voltage value provided by a power management integrated circuit until the situation that the reset response of the user identity identification card cannot be received or the user identity identification card is pulled out is detected.
Specifically, the locking operation includes: calling an interface provided by a driving module of the user identity identification card, starting a locking function of the user identity identification card, randomly generating and inputting a first PIN code, refreshing the user identity identification card, automatically and randomly generating and inputting a second PIN code after triggering an operation that the user identity identification card requires to input the PIN code, and reaching a first preset number of times, and then automatically inputting a randomly generated PUK code to reach a second preset number of times until the user identity identification card is completely locked.
Fig. 2 to 6 describe the method for remotely destroying the user identification card in detail, and in combination with fig. 7 to 9, a system for remotely destroying the user identification card, a communication device, and a user identification card for implementing the method for remotely destroying the user identification card are described.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
Example seven,
The invention provides a remote destroying system for a user identification card.
Fig. 7 is a schematic structural diagram of a preferred embodiment of the remote destruction system for a subscriber identity card according to the present invention.
The remote destruction system 10 for the user identification card of the present invention may include a plurality of program segments composed of computer program codes, and may be installed in the communication device 1 and the user identification card 5 and executed by the communication device 1 and the user identification card 5, so as to implement the remote destruction operation of the user identification card 5.
In this embodiment, the user identification card remote destruction system 10 shown in fig. 7 may be divided into a plurality of functional modules according to the functions performed by the system. In this embodiment, the functional modules at least include: a detection module 100, a control module 101, and a destruction module 102.
The detection module 100 and the control module 101 may be installed and operated in the communication device 1, and the destruction module 102 may be installed and operated in the user id card 5.
The detection module 100 is configured to periodically initiate interaction with the operator network 7 corresponding to the user identification card 5, and output a prompt that the user identification card 5 may be illegally subsidized to the user of the communication device 1 when the number of times of initiating network interaction failure, for example, authentication failure, registration refusal, or the like, reaches a preset number of times.
The interaction manner may include, but is not limited to, actively initiating Tracking Area Update (TAU), Routing Area Update (RAU), Location Area Update (LAU), and the like.
The period may include, for example, every 30 seconds, 1 minute, etc., and the preset number may be, for example, 5 times.
In a preferred embodiment of the present invention, the communication device 1 may output a prompt message on its user interface, for example, on a display device of the communication device 1: "the user identification card XX may be illegally subsidized".
When the user receives the prompt message, the user may make a call to the user identification card 5 by any available method, for example, using another mobile phone, to determine whether the user identification card 5 is actually illegally subsidized.
For example, when a call can be made to the user identification card 5 using another mobile phone, it may be determined that the user identification card 5 is actually illegally subsidized, and a user identification card destruction command may be sent to the user identification card 5.
In a preferred embodiment of the present invention, the communication device may provide a function option to send the user id card destruction command. For example, the user identification click command may be integrated in a "settings" menu of the communication device 1. When the user selects the option of destroying the user id card, the communication device 1 may receive a command to destroy the user id card.
The control module 101 is configured to, when receiving a destruction command of the user identification card, send the destruction command to the cloud server 2 through the network 3 when the communication device 1 can be connected to the network 3, and send the destruction command to the illegally-subsidized user identification card 5 installed in the illegal communication device 4 by the cloud server 2; in the case that the communication device 1 cannot be connected to the network 3, the illegal complement user identification card 5 installed in the illegal communication device 4 is sent in a short message by using the user identification card 6 of the communication device 1; or when the communication device 1 can not be connected to the network 3 and does not have the user identification card 6, outputting a network link for sending the destruction instruction or prompting the instruction content to the user.
The network link includes, for example, a network address, a user name, a password, etc., and prompts the user to send a destruction instruction of the user id card to the illegally subsidized user id card 5 installed in the illegal communication device 4 by using other devices, such as a computer, which can be connected to the network 3.
The instruction content includes a short message for destroying the user identification card, and prompts the user to use another mobile phone to send the short message to the illegal subsidized user identification card 5 installed in the illegal communication device 4.
Before sending the destruction instruction to the cloud server 2 through the network 3, the communication device 1 first determines whether it can be connected to the WLAN network; when the connection to the WLAN network is not possible, the user identification card 6 is used again to connect to the mobile data network.
The destruction module 102 is configured to send a control instruction to the sim card driver module 40 when receiving a destruction instruction of the sim card, so that the sim card driver module 40 powers on the sim card all the time by using a preset voltage value provided by the power management integrated circuit 41 until detecting that a reset response of the sim card cannot be received or the sim card is unplugged.
In the preferred embodiment of the present invention, the preset voltage value is a voltage greater than 3V or the maximum voltage value that the power management integrated circuit 41 can provide.
The sim card driver module 40 is a device responsible for communication with the sim card 5. Under normal conditions, when the user id card driving module 40 detects that a user id card is inserted, the user id card driving module first uses a voltage of 1.8V provided by a Power Management IC (PMIC) 41 to Power on the user id card, and determines whether an answer of an ATR (answer to reset) is received, and when the answer of the ATR is received, the user id card driving module 40 starts to execute subsequent processes such as activation of the user id card; if the voltage of 1.8V powers up the user identification card and does not receive the ATR response of the user identification card, the user identification card driving module 40 further powers up the user identification card using the voltage of 3V provided by the power management integrated circuit 41, and determines whether the ATR response of the mobile phone is received, and if the ATR response is not received, the user identification card driving module 40 powers down the user identification card and does not initiate power up.
As described above, the voltages that the user id card can support are 1.8V and 3V, and if the user id card is powered up by using a voltage exceeding 3V, the user id card may be burned out, thereby achieving the purpose of being incapable of being used continuously. Therefore, after the user id card driving module 40 receives the command to destroy the user id card, the voltage greater than 3V is used, or the maximum voltage that can be provided by the power management integrated circuit 41 is directly used to power on the user id card 5 until the ATR response of the user id card 5 cannot be received. Further, in order to achieve the purpose of burning 100% of the user identification card 5, even if the ATR response is not received, the user identification card driving module 40 may continue to be powered on by using a voltage greater than 3V until the user identification card 5 is unplugged from the illegal communication device 4.
In another preferred embodiment of the present invention, the destruction module 102 is configured to, when receiving a destruction instruction of the user identification card, call an interface provided by the user identification card driving module 40, enable a Personal Identification Number (PIN) code of the user identification card, input a randomly generated PIN code, refresh the user identification card 5, input the randomly generated PIN code after triggering an operation of the user identification card 5 that requires to input the PIN code, so as to reach a first preset number of times, and input a randomly generated PUK code again, so as to reach a second preset number of times, until the user identification card is completely locked and cannot be used. Wherein, the randomly generated PIN code and the PUK code which are input each time are different.
In an embodiment of the present invention, the first preset number is 3 times and the second preset number is 10 times.
The PIN code is a security measure for protecting the user identification card. If the power-on PIN is enabled, the PIN is entered after each power-on. And when the number of errors of continuously inputting the PIN code reaches the first preset number, the user identification card is automatically locked.
In the embodiment of the present invention, since the PIN code input each time is randomly generated, when the input reaches the first preset number of times, the user id card 5 is locked, and an unlock code (PUK) of the PIN code is required to be input to unlock the user id card 5, and the PUK code is also randomly generated, so that when the second preset number of times is reached, the user id card is completely locked and cannot be used.
Example eight,
The invention provides a communication device for realizing a remote destroying method of a user identity identification card.
Fig. 8 is a schematic structural diagram of a communication device for implementing the remote destruction method for a user identification card according to the present invention.
The communication device 1 of the present invention may be, but is not limited to, a device capable of installing a user identification card, such as a smart phone, a tablet computer, and a smart watch.
As shown in fig. 8, the communication apparatus 1 in the embodiment of the present invention includes at least one memory 11, at least one processor 12, at least one communication device 13, at least one display device 14, and at least one input device 15.
The processor 12 may execute an operating system of the communication device 1 as well as various installed application programs, program codes, etc., such as the user identification card remote destruction system 10. The processor 12 may include one or more microprocessors, digital processors.
The memory 11 is used for storing program codes of various program segments in the user identification card remote destruction system 10. The memory 11 may be a storage device such as a smart media card (smart media card), a secure digital card (secure digital card), and a flash memory card (flash card).
In the preferred embodiment of the present invention, the communication device 13 may be a wireless communication module, which can be connected to a network through a wireless communication technology.
The display device 14 is used for information output, and the input device 15 is used for information input. In other preferred embodiments of the present invention, the display device 14 and the input device 15 can be integrated into a same component, such as a touch screen.
In an embodiment of the present invention, the memory 11 in the communication device 1 stores a plurality of instructions to implement a method for remotely destroying a subscriber identity card, and the processor 12 can execute the plurality of instructions to implement:
periodically initiating interaction with an operator network corresponding to a user identity identification card, and outputting a prompt that the user identity identification card is possible to be illegally subsidized when the number of times of failure in initiating network interaction reaches a preset number of times; and
and when a user identification card destruction command of the user is received, sending a destruction instruction to the terminal provided with the user identification card which is possibly illegally repaired so as to destroy the user identification card which is possibly illegally repaired.
In a preferred embodiment of the present invention, the processor 12 executing the plurality of instructions may further implement:
and under the condition that the communication equipment is connected with a network, sending the destruction instruction to a cloud server through the network, and forwarding the destruction instruction to the terminal provided with the user identity identification card which is possibly illegally made.
In a preferred embodiment of the present invention, the processor 12 executing the plurality of instructions may further implement:
and under the condition that the communication equipment cannot be connected to the network, the other user identification cards of the communication equipment are utilized to send the destruction instruction to the terminal provided with the illegal subsidy user identification card in a short message mode.
In a preferred embodiment of the present invention, the processor 12 executing the plurality of instructions may further implement:
and when the communication equipment cannot be connected to the network and does not have other user identification cards, outputting a network link for sending the destruction instruction or prompting the instruction content.
In a preferred embodiment of the present invention, the network link includes: the network address, the user name and the password, and the method for remotely destroying the user identification card further comprises the following steps:
and outputting a prompt for sending the destruction instruction of the user identification card to the terminal provided with the illegal subsidized user identification card by using other equipment capable of connecting with the network.
In a preferred embodiment of the present invention, the instruction content includes a short message for destroying the user identification card, and the method for remotely destroying the user identification card further includes:
and outputting a prompt of sending the short message to the terminal provided with the illegal subsidized user identity identification card by using other communication equipment.
Examples nine,
The embodiment of the invention also provides the user identification card for realizing the remote destruction method of the user identification card.
Fig. 9 is a schematic structural diagram of a user identification card for implementing the remote destruction method of the user identification card according to the present invention.
In the preferred embodiment of the present invention, the user identification card 5 may be, but is not limited to, a SIM card, a Micro SIM, a Nano SIM, a UIM card, a Micro UIM, a Nano UIM card, etc.
The user identification card 5 includes: a program memory 51, a microprocessor 52, a working memory 53, a data memory 54 and a serial communication unit 55. The program memory 51, the microprocessor 52, the work memory 53, the data memory 54, and the serial communication unit 55 are integrated in one integrated circuit.
In the preferred embodiment of the present invention, the program memory 51 stores a plurality of instructions to implement a method for remotely destroying a user identification card, and the microprocessor 52 can execute the plurality of instructions to implement:
when a destroying instruction of the user identity identification card is received, a control instruction is sent to a driving module of the user identity identification card, the driving module is enabled to use a preset voltage value provided by a power management integrated circuit to continuously power on the user identity identification card until the situation that a reset response of the user identity identification card cannot be received or the user identity identification card is pulled out is detected; or
When a destroying instruction of the user identity identification card is received, calling an interface provided by a driving module of the user identity identification card, starting a locking function of the user identity identification card, randomly generating and inputting a first PIN code, refreshing the user identity identification card, automatically and randomly generating and inputting a second PIN code after triggering an operation that the user identity identification card requires to input the PIN code, reaching a first preset number of times, and then automatically inputting a randomly generated PUK code, reaching a second preset number of times, until the user identity identification card is completely locked.
In a preferred embodiment of the present invention, the preset voltage value includes a voltage value exceeding 3V or a maximum voltage value that can be provided by the power management integrated circuit.
Examples ten,
Embodiments of the present invention also provide a computer readable storage medium storing one or more programs, where the one or more programs include instructions, which when executed by a communication device 1 including one or more processors and a user identification card, cause the communication device 1 and the user identification card 5 to perform the method for remote destruction of a user identification card as described in the above method embodiments.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to the related descriptions of other embodiments.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable storage medium, and the storage medium may include: ROM, RAM, magnetic or optical disks, and the like.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of modules or means recited in the apparatus claims may also be implemented by one module or means through software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
It should be finally noted that the above embodiments are only intended to illustrate the technical solutions of the present invention and not to limit the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made thereto without departing from the spirit and scope of the technical solutions of the present invention.

Claims (17)

1. A method for remotely destroying a user identification card is applied to communication equipment, and is characterized by comprising the following steps:
periodically initiating interaction with an operator network corresponding to a user identity identification card, and outputting a prompt that the user identity identification card is possible to be illegally subsidized when the number of times of failure in initiating the network interaction reaches a preset number of times; and
when a destroying command of a user identification card of a user is received, sending the destroying command to a terminal provided with the user identification card which is possibly illegally repaired so as to destroy the user identification card which is possibly illegally repaired;
the mode for destroying the user identification card which is possibly illegally made up comprises the following steps:
calling an interface provided by a driving module of the user identity identification card which is possibly illegally made up, starting a locking function of the user identity identification card which is possibly illegally made up, randomly generating and inputting a first PIN code, refreshing the user identity identification card which is possibly illegally made up, automatically randomly generating and inputting a second PIN code after triggering the operation that the user identity identification card which is possibly illegally made up requires to input the PIN code, reaching a first preset time, and then automatically inputting the randomly generated PUK code, reaching a second preset time, until the user identity identification card which is possibly illegally made up is completely locked.
2. The remote destruction method for the user identification card according to claim 1, wherein the remote destruction method for the user identification card further comprises:
and under the condition that the communication equipment is connected with a network, sending the destruction instruction to a cloud server through the network, and forwarding the destruction instruction to the terminal provided with the user identity identification card which is possibly illegally made.
3. The remote destruction method for the user identification card according to claim 1, wherein the remote destruction method for the user identification card further comprises:
and under the condition that the communication equipment cannot be connected to the network, the other user identity identification cards in the communication equipment are used for sending the destruction instruction to the terminal provided with the illegal subsidy user identity identification card in a short message mode.
4. The remote destruction method for the SIM card according to claim 3, further comprising:
and when the communication equipment cannot be connected to the network and does not have other user identification cards, outputting a network link for sending the destruction instruction or prompting of instruction content.
5. The remote destruction method of the sim card according to claim 4, wherein the network link comprises: the network address, the user name and the password, and the method for remotely destroying the user identification card further comprises the following steps:
and outputting a prompt for sending the destruction instruction of the user identification card to the terminal provided with the illegal subsidized user identification card by using other equipment capable of connecting with the network.
6. The method for remotely destroying a subscriber identity module card according to claim 4, wherein said instruction content comprises a short message containing said destroy instruction, and said method for remotely destroying a subscriber identity module card further comprises:
and outputting a prompt of sending the short message to the terminal provided with the illegal subsidized user identity identification card by using other communication equipment.
7. A remote destroying method of a user identification card is applied to the user identification card and is characterized by comprising the following steps:
when a destroying instruction of a user identity identification card is received, calling an interface provided by a driving module of the user identity identification card, starting a locking function of the user identity identification card, randomly generating and inputting a first PIN code, refreshing the user identity identification card, automatically and randomly generating and inputting a second PIN code after triggering an operation that the user identity identification card requires to input the PIN code, reaching a first preset number of times, and then automatically inputting a randomly generated PUK code, reaching a second preset number of times, until the user identity identification card is completely locked;
the mode that the user identification card receives the destruction instruction comprises the following steps:
the communication equipment periodically initiates the interaction of an operator network corresponding to the user identity identification card, and outputs a prompt that the user identity identification card is possible to be illegally subsidized when the number of times of failure of initiating the network interaction reaches a preset number of times; when a user identification card destruction command of a user is received, the communication equipment sends a destruction instruction to a terminal provided with the user identification card which is possibly illegally repaired;
and the user identity identification card which is possibly illegally made up obtains the destruction instruction from the terminal.
8. A user identification card remote destroying system is applied to communication equipment and is characterized by comprising the following components:
the system comprises a detection module, a processing module and a processing module, wherein the detection module is used for periodically initiating the interaction of an operator network corresponding to a user identity identification card and outputting a prompt that the user identity identification card is possible to be illegally subsidized when the number of times of failure of initiating the network interaction reaches a preset number of times; and
the control module is used for sending the destruction instruction to a terminal provided with the user identity identification card which is possibly illegally repaired when receiving a destruction command of the user identity identification card of the user;
the mode for destroying the user identification card which is possibly illegally made up comprises the following steps:
calling an interface provided by a driving module of the user identity identification card which is possibly illegally made up, starting a locking function of the user identity identification card which is possibly illegally made up, randomly generating and inputting a first PIN code, refreshing the user identity identification card which is possibly illegally made up, automatically randomly generating and inputting a second PIN code after triggering the operation that the user identity identification card which is possibly illegally made up requires to input the PIN code, reaching a first preset time, and then automatically inputting the randomly generated PUK code, reaching a second preset time, until the user identity identification card which is possibly illegally made up is completely locked.
9. The remote destruction system for a sim card according to claim 8, wherein the control module is further configured to:
and under the condition that the communication equipment is connected with a network, sending the destruction instruction to a cloud server through the network, and forwarding the destruction instruction to the terminal provided with the user identity identification card which is possibly illegally made.
10. The remote destruction system for a sim card according to claim 8, wherein the control module is further configured to:
and under the condition that the communication equipment cannot be connected to the network, the other user identity identification cards in the communication equipment are used for sending the destruction instruction to the terminal provided with the illegal subsidy user identity identification card in a short message mode.
11. The system for remotely destroying a subscriber identity card as recited in claim 10, wherein said control module is further adapted to:
and when the communication equipment cannot be connected to the network and does not have other user identification cards, outputting a network link for sending the destruction instruction or prompting of instruction content.
12. The remote destruction system for a sim card according to claim 11, wherein the network link comprises: a network address, a username, and a password, and the control module is further to:
and outputting a prompt for sending the user identification card destruction command to the terminal provided with the illegal subsidized user identification card by using other equipment capable of being connected with the network.
13. The system for remotely destroying a subscriber identity module card according to claim 11, wherein said instruction content comprises a short message containing said destroy instruction, and said control module is further configured to:
and outputting a prompt of sending the short message to the terminal provided with the illegal subsidized user identity identification card by using other communication equipment.
14. A user identification card remote destroying system is applied to a user identification card and is characterized by comprising the following components:
a destruction module to:
when a destroying instruction of a user identity identification card is received, calling an interface provided by a driving module of the user identity identification card, starting a locking function of the user identity identification card, randomly generating and inputting a first PIN code, refreshing the user identity identification card, automatically and randomly generating and inputting a second PIN code after triggering an operation that the user identity identification card requires to input the PIN code, reaching a first preset number of times, and then automatically inputting a randomly generated PUK code, reaching a second preset number of times, until the user identity identification card is completely locked;
the mode that the user identification card receives the destruction instruction comprises the following steps:
the communication equipment periodically initiates the interaction of an operator network corresponding to the user identity identification card, and outputs a prompt that the user identity identification card is possible to be illegally subsidized when the number of times of failure of initiating the network interaction reaches a preset number of times; when a user identification card destruction command of a user is received, the communication equipment sends a destruction instruction to a terminal provided with the user identification card which is possibly illegally repaired;
and the user identity identification card which is possibly illegally made up obtains the destruction instruction from the terminal.
15. A communication device comprising a memory and a processor, characterized in that:
the memory stores a program;
the processor is configured to execute the program in the memory to:
periodically initiating interaction with an operator network corresponding to a user identity identification card, and outputting a prompt that the user identity identification card is possible to be illegally subsidized when the number of times of failure in initiating the network interaction reaches a preset number of times; and
when a destroying command of a user identification card of a user is received, sending the destroying command to a terminal provided with the user identification card which is possibly illegally repaired so as to destroy the user identification card which is possibly illegally repaired;
the mode for destroying the user identification card which is possibly illegally made up comprises the following steps:
calling an interface provided by a driving module of the user identity identification card which is possibly illegally made up, starting a locking function of the user identity identification card which is possibly illegally made up, randomly generating and inputting a first PIN code, refreshing the user identity identification card which is possibly illegally made up, automatically randomly generating and inputting a second PIN code after triggering the operation that the user identity identification card which is possibly illegally made up requires to input the PIN code, reaching a first preset time, and then automatically inputting the randomly generated PUK code, reaching a second preset time, until the user identity identification card which is possibly illegally made up is completely locked.
16. The communications device of claim 15, wherein:
under the condition that the communication equipment is connected with a network, the destruction instruction is sent to a cloud server through the network, and the cloud server forwards the destruction instruction to the terminal provided with the user identity identification card which is possibly illegally made;
under the condition that the communication equipment cannot be connected to the network, the destruction instruction is sent to the terminal provided with the illegal subsidy user identity identification card by using other user identity identification cards in the communication equipment in a short message mode; or
And when the communication equipment cannot be connected to the network and does not have other user identification cards, outputting a network link for sending the destruction instruction or prompting of instruction content.
17. A user identification card comprises a program memory and a microprocessor, and is characterized in that:
the program memory stores a program;
the microprocessor is configured to execute the program in the memory to:
when a destroying instruction of a user identity identification card is received, calling an interface provided by a driving module of the user identity identification card, starting a locking function of the user identity identification card, randomly generating and inputting a first PIN code, refreshing the user identity identification card, automatically and randomly generating and inputting a second PIN code after triggering an operation that the user identity identification card requires to input the PIN code, reaching a first preset number of times, and then automatically inputting a randomly generated PUK code, reaching a second preset number of times, until the user identity identification card is completely locked;
the mode that the user identification card receives the destruction instruction comprises the following steps:
the communication equipment periodically initiates the interaction of an operator network corresponding to the user identity identification card, and outputs a prompt that the user identity identification card is possible to be illegally subsidized when the number of times of failure of initiating the network interaction reaches a preset number of times; when a user identification card destruction command of a user is received, the communication equipment sends a destruction instruction to a terminal provided with the user identification card which is possibly illegally repaired;
and the user identity identification card which is possibly illegally made up obtains the destruction instruction from the terminal.
CN201610975478.5A 2016-11-07 2016-11-07 User identity identification card and remote destroying method, system and equipment thereof Active CN106535159B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610975478.5A CN106535159B (en) 2016-11-07 2016-11-07 User identity identification card and remote destroying method, system and equipment thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610975478.5A CN106535159B (en) 2016-11-07 2016-11-07 User identity identification card and remote destroying method, system and equipment thereof

Publications (2)

Publication Number Publication Date
CN106535159A CN106535159A (en) 2017-03-22
CN106535159B true CN106535159B (en) 2020-03-17

Family

ID=58350204

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610975478.5A Active CN106535159B (en) 2016-11-07 2016-11-07 User identity identification card and remote destroying method, system and equipment thereof

Country Status (1)

Country Link
CN (1) CN106535159B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108668260B (en) * 2018-04-17 2021-12-24 北京华大智宝电子系统有限公司 SIM card data self-destruction method, SIM card, device and server

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1941958A (en) * 2005-09-28 2007-04-04 乐金电子(中国)研究开发中心有限公司 Method for automatically destroying cell phone and cell phone thereof

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252703B (en) * 2008-03-28 2012-05-30 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN102005089A (en) * 2009-08-28 2011-04-06 中兴通讯股份有限公司 Method and system for remotely controlling intelligent card
CN102006584A (en) * 2009-08-28 2011-04-06 中兴通讯股份有限公司 Intelligent card remote control method and system
JP2014186400A (en) * 2013-03-21 2014-10-02 Sharp Corp Portable terminal device
CN106060796B (en) * 2016-06-01 2018-12-25 宇龙计算机通信科技(深圳)有限公司 The backup destroying method and device of terminal

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1941958A (en) * 2005-09-28 2007-04-04 乐金电子(中国)研究开发中心有限公司 Method for automatically destroying cell phone and cell phone thereof

Also Published As

Publication number Publication date
CN106535159A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
US8463234B2 (en) Method for providing security services by using mobile terminal password and mobile terminal thereof
US11107073B2 (en) Method and device for linking to account and providing service process
US9344896B2 (en) Method and system for delivering a command to a mobile device
US8768300B2 (en) Remote control method and system for smart card
JP2015517151A (en) System, method, and computer program product for detecting and managing changes associated with a mobile wallet
US10171456B2 (en) Wireless authentication system and wireless authentication method for one time password of mobile communication terminal having near field communication function
US9325704B2 (en) Data access method and device
CN101600208A (en) Mobile phone storage data auto-destruct system and method
US7702907B2 (en) System and method for safe booting electronic devices
CN104199654A (en) Open platform calling method and device
US20170091730A1 (en) Method and system for dynamic pin authorisation for atm or pos transactions
CN109496443B (en) Mobile authentication method and system therefor
CN103595851A (en) Personal-information leakage-proof method for mobile terminal and mobile terminal
US20140150104A1 (en) Electronic assembly comprising a disabling module
JP5839598B2 (en) Smart card remote control method and system
US20220300960A1 (en) System and method for confirming instructions over a communication channel
CN106535159B (en) User identity identification card and remote destroying method, system and equipment thereof
KR102178804B1 (en) Authorizing service systmem, authorizing service method and apparatus useing image in the system
CN116233851A (en) Verification method, device, equipment and medium based on SIM card
CN105556536A (en) One-time power-on password
CN110493785A (en) A kind of login method of mobile client, SIM card and system
KR20160038450A (en) Method for providing authentication service based on network and authentication server
EP2919178A1 (en) System and method of account access notification
CN103929398A (en) Security information interaction system, device and method
CN106453292A (en) Electronic endorsement user management method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant