CN107707773A - A kind of mobile phone loses information security method - Google Patents

A kind of mobile phone loses information security method Download PDF

Info

Publication number
CN107707773A
CN107707773A CN201711177182.XA CN201711177182A CN107707773A CN 107707773 A CN107707773 A CN 107707773A CN 201711177182 A CN201711177182 A CN 201711177182A CN 107707773 A CN107707773 A CN 107707773A
Authority
CN
China
Prior art keywords
mobile phone
information
security method
locked
information security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201711177182.XA
Other languages
Chinese (zh)
Inventor
何莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201711177182.XA priority Critical patent/CN107707773A/en
Publication of CN107707773A publication Critical patent/CN107707773A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/2753Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content
    • H04M1/2757Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content by data transmission, e.g. downloading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Abstract

The invention belongs to information privacy technical field, loses information security method more particularly, to a kind of mobile phone.Comprise the following steps, S1, the first mobile phone and the second mobile phone are subjected to secret binding;S2, when the first mobile phone is lost, duplicate instructions is sent to the first mobile phone with the second mobile phone, after the first mobile phone receives the duplicate instructions of the second mobile phone, the relevant information in the first mobile phone is issued into the second mobile phone;S3, after the second mobile phone receives the relevant information of the first mobile phone transmission, send again it is locked instruct to the first mobile phone, after the first mobile phone receives locked instruction, carry out locked.

Description

A kind of mobile phone loses information security method
Technical field
The invention belongs to information privacy technical field, loses information security method more particularly, to a kind of mobile phone.
Background technology
The function of present mobile phone is stronger and stronger, and the thing that can be done is also more and more, and mobile phone is exactly our intelligence now Can terminal.But be exactly such terminal, all day is along with us, just in case when lost, can bring following safety wind Danger.
ID card information
For the mobile phone without screen-lock password or without finger-print cipher, oneself phone is dialed, obtains cell-phone number;Log in online Business hall, input handset number, password use random cipher, and see the mobile phone short message, log in;In next step, click on and " change my money Material ";The inside has whole real-name authentication information of this mobile phone owner.
For the mobile phone for having screen-lock password or finger-print cipher, SIM cards of mobile phones is taken out, inserts the mobile phone of oneself, then Oneself another phone is dialed, obtains cell-phone number, operation afterwards is same as above.
Change cellular service password
After cell-phone number and identification card number being obtained using above method, it is possible to perform another dangerous operation:" reset Service password ", after finding mobile phone, online business hall is logged in by the mobile phone, in online business hall, uses and " it is close to reset service Code " modifies the service password of mobile phone, then original subscriber just can not report the loss SIM cards of mobile phones, it is necessary in person by phone Run to business hall to report the loss, this brings greater risk to the mobile phone safe of user.
Modification service password needs the name and ID card No. of user, the method before use obtain user name and Identification card number, need to dial the 3 different numbers rung in user 3 months afterwards, open mobile phone call history, search most The number closely transferred to, is filled in into.Afterwards can smooth Modify password.
Change Mobile PIN
If the SIM card of mobile phone is provided with PIN code, then this SIM card, which inserts another mobile phone, just needs PIN code solution Lock, but if user does not set screen-lock password, then Mobile PIN can be reset by online business hall, specific method is, Online business hall is logged in, inquires the PUK code of mobile phone, can be with unlocking PIN code by PUK code.After inputing PIN code three times by mistake, it can want Ask user to input PUK code, at this moment input after correct PUK code, it is possible to new PIN code is inputted, it is achieved thereby that modification The function of Mobile PIN.
The safety of Alipay and Net silver
The operation of Alipay password can be carried out resetting by mobile phone, with previously obtained if verifying ID card No. Checking, in addition, if it is known that other bank card numbers of user, be able to can be unbinded user by ID card No. and mobile phone Other bank cards, open quick payment, then carry out bankcard consumption.
The content of the invention
For this reason, it may be necessary to which providing a kind of mobile phone loses information security method, the mobile phone loses information security method by two Mobile phone is bound, and when mobile phone is lost, a mobile phone can be sent to another mobile phone to be instructed, and lost mobile phone is controlled It is locked, prevent lost mobile phone information leakage.
To achieve the above object, the present invention adopts the following technical scheme that:
A kind of mobile phone loses information security method, comprises the following steps,
S1, the first mobile phone and the second mobile phone are subjected to secret binding;
S2, when the first mobile phone is lost, duplicate instructions is sent to the first mobile phone with the second mobile phone, the first mobile phone receives the After the duplicate instructions of two mobile phones, the relevant information in the first mobile phone is issued into the second mobile phone;
S3, the second mobile phone receive the first mobile phone transmission relevant information after, send again it is locked instruct to the first mobile phone, After first mobile phone receives locked instruction, carry out locked.
The technical program further optimizes, and the relevant information for stating the first mobile phone in step S2 is address list information.
The technical program further optimizes, in the step S3 the first mobile phone carry out it is locked be the first mobile phone input Input information is not received.
The technical program further optimizes, in addition to step S4, and the second mobile phone sends unlock instruction to the first mobile phone, the One mobile phone unlocks after receiving unlock instruction.
The technical program further optimizes, and the relevant information of the first mobile phone includes positional information in the step S2.
The technical program further optimizes, the positional information, and the first mobile phone displacement is more than 20 meters, that is, sends The positional information of first mobile phone gives the second mobile phone.
Prior art is different from, above-mentioned technical proposal has the beneficial effect that:Lost when existing mobile phone is in order to prevent that mobile phone from losing The address list gone in mobile phone, address list is put on record, cumbersome because address list often updates, it is necessary to often back up.This Two mobile phone associations are got up in invention, i.e., secret is bound, and when a mobile phone is lost, another mobile phone can be by lost mobile phone Relevant information is copied next, and can also be locked by lost mobile phone, and lost mobile phone is protected, prevents lost mobile phone information from letting out Dew, quadratic loss is caused to owner.
Brief description of the drawings
Fig. 1 is the flow chart of embodiment one;
Fig. 2 is the flow chart of embodiment two.
Embodiment
To describe the technology contents of technical scheme, construction feature, the objects and the effects in detail, below in conjunction with specific reality Apply example and coordinate accompanying drawing to be explained in detail.
The present invention proposes a kind of mobile phone and loses information security method, comprises the following steps,
S1, the first mobile phone and the second mobile phone are subjected to secret binding;
S2, when the first mobile phone is lost, duplicate instructions is sent to the first mobile phone with the second mobile phone, the first mobile phone receives the After the duplicate instructions of two mobile phones, the relevant information in the first mobile phone is issued into the second mobile phone;
S3, the second mobile phone receive the first mobile phone transmission relevant information after, send again it is locked instruct to the first mobile phone, After first mobile phone receives locked instruction, carry out locked.
Embodiment one
Refer to shown in Fig. 1, for the flow chart of the embodiment one.A kind of mobile phone loses information security method, including following Step,
S1, the first mobile phone and the second mobile phone are subjected to secret binding;
S2, when the first mobile phone is lost, duplicate instructions is sent to the first mobile phone with the second mobile phone, the first mobile phone receives the After the duplicate instructions of two mobile phones, the second mobile phone is issued after the address list information in the first mobile phone is replicated;
S3, after the second mobile phone receives the address list information of the first mobile phone transmission, locked instruct to first-hand is sent again Machine, after the first mobile phone receives locked instruction, carry out locked.
In step S3 described in the embodiment one first mobile phone carry out it is locked be the first mobile phone input do not receive input letter Breath.
Embodiment two
As shown in fig.2, being the flow chart of embodiment two, a kind of mobile phone loses information security method, comprises the following steps,
S1, the first mobile phone and the second mobile phone are subjected to secret binding;
S2, when the first mobile phone is lost, duplicate instructions is sent to the first mobile phone with the second mobile phone, the first mobile phone receives the After the duplicate instructions of two mobile phones, the second mobile phone will be issued after the address list information in the first mobile phone and positional information;
S3, after the second mobile phone receives address list information and the positional information of the transmission of the first mobile phone, locked finger is sent again Make to the first mobile phone, after the first mobile phone receives locked instruction, carry out locked;
S4, the second mobile phone send unlock instruction to the first mobile phone, and the first mobile phone unlocks after receiving unlock instruction.
For the ease of finding the first mobile phone of loss, the position of the first mobile phone needs real-time update, when the first mobile phone moves Distance is more than 20 meters, that is, sends the positional information of the first mobile phone to the second mobile phone.
Mobile phone progress of the embodiment two for loss is locked, input is not received, even if then the password of the first mobile phone is broken Xie Liao, the first mobile phone still can not be used, the information in the first mobile phone can not be also obtained, the information in the first mobile phone is carried out Protection.After mobile phone is found, the unlock instruction of the second mobile phone, it may be such that first-hand machine can receive input, input the first mobile phone Password after, first-hand machine being capable of normal use.
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality Body or operation make a distinction with another entity or operation, and not necessarily require or imply and deposited between these entities or operation In any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to Nonexcludability includes, so that process, method, article or terminal device including a series of elements not only include those Key element, but also the other element including being not expressly set out, or it is this process, method, article or end also to include The intrinsic key element of end equipment.In the absence of more restrictions, limited by sentence " including ... " or " including ... " Key element, it is not excluded that other key element in the process including the key element, method, article or terminal device also be present.This Outside, herein, " being more than ", " being less than ", " exceeding " etc. are interpreted as not including this number;" more than ", " following ", " within " etc. understand It is to include this number.
Although the various embodiments described above are described, those skilled in the art once know basic wound The property made concept, then other change and modification can be made to these embodiments, so embodiments of the invention are the foregoing is only, Not thereby the scope of patent protection of the present invention, every equivalent structure made using description of the invention and accompanying drawing content are limited Or equivalent flow conversion, or other related technical areas are directly or indirectly used in, similarly it is included in the patent of the present invention Within protection domain.

Claims (6)

1. a kind of mobile phone loses information security method, it is characterised in that:Comprise the following steps,
S1, the first mobile phone and the second mobile phone are subjected to secret binding;
S2, when the first mobile phone is lost, send duplicate instructions with the second mobile phone and receive second-hand to the first mobile phone, the first mobile phone After the duplicate instructions of machine, the relevant information in the first mobile phone is issued into the second mobile phone;
S3, after the second mobile phone receives the relevant information of the first mobile phone transmission, send again it is locked instruct to the first mobile phone, first After mobile phone receives locked instruction, carry out locked.
2. mobile phone as claimed in claim 1 loses information security method, it is characterised in that:The phase of first mobile phone in the step S2 Pass information is address list information.
3. mobile phone as claimed in claim 1 loses information security method, it is characterised in that:The first mobile phone is carried out in the step S3 Locked is that the input of the first mobile phone does not receive input information.
4. mobile phone as claimed in claim 1 loses information security method, it is characterised in that:Also include step S4, the second mobile phone to First mobile phone sends unlock instruction, and the first mobile phone unlocks after receiving unlock instruction.
5. mobile phone as claimed in claim 1 loses information security method, it is characterised in that:The phase of first mobile phone in the step S2 Closing information includes positional information.
6. mobile phone as claimed in claim 5 loses information security method, it is characterised in that:The positional information, the first mobile phone move Dynamic distance is more than 20 meters, that is, sends the positional information of the first mobile phone to the second mobile phone.
CN201711177182.XA 2017-11-22 2017-11-22 A kind of mobile phone loses information security method Withdrawn CN107707773A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711177182.XA CN107707773A (en) 2017-11-22 2017-11-22 A kind of mobile phone loses information security method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711177182.XA CN107707773A (en) 2017-11-22 2017-11-22 A kind of mobile phone loses information security method

Publications (1)

Publication Number Publication Date
CN107707773A true CN107707773A (en) 2018-02-16

Family

ID=61180740

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711177182.XA Withdrawn CN107707773A (en) 2017-11-22 2017-11-22 A kind of mobile phone loses information security method

Country Status (1)

Country Link
CN (1) CN107707773A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1781326A (en) * 2003-04-29 2006-05-31 索尼爱立信移动通讯股份有限公司 Mobile apparatus with remote lock and control function
CN101478595A (en) * 2008-09-08 2009-07-08 广东南方信息安全产业基地有限公司 Mobile communication terminal data protection method
CN102647506A (en) * 2011-02-22 2012-08-22 徐莹 Mobile phone secret divulgence prevention method
CN106851562A (en) * 2017-01-03 2017-06-13 惠州Tcl移动通信有限公司 It is a kind of prevent mobile phone lose after leakage of content method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1781326A (en) * 2003-04-29 2006-05-31 索尼爱立信移动通讯股份有限公司 Mobile apparatus with remote lock and control function
CN101478595A (en) * 2008-09-08 2009-07-08 广东南方信息安全产业基地有限公司 Mobile communication terminal data protection method
CN102647506A (en) * 2011-02-22 2012-08-22 徐莹 Mobile phone secret divulgence prevention method
CN106851562A (en) * 2017-01-03 2017-06-13 惠州Tcl移动通信有限公司 It is a kind of prevent mobile phone lose after leakage of content method and system

Similar Documents

Publication Publication Date Title
US11405781B2 (en) System and method for mobile identity protection for online user authentication
CN101141718B (en) Mobile terminal card-locking method
CN101438530A (en) Authentication method for wireless transactions
CN105847451B (en) A kind of method and system controlling intelligent entrance guard using mobile terminal
CN103828291B (en) The method that application service is provided
CN103714626A (en) Multi-password pre-warning type bank card capable of being controlled by different card
CN104574616B (en) Intelligent electronic door lock control method and control device
CN103825863B (en) A kind of accounts management method and device
CN105096111A (en) No-card account transfer or withdrawal protection method and mobile phone system
CN106251442B (en) A kind of setting of the temporary password of smart lock and its verification method
CN108271127A (en) Pseudo-base station note knows method for distinguishing and terminal
Kumar et al. Vulnerability detection of international mobile equipment identity number of smartphone and automated reporting of changed IMEI number
CN102170638B (en) Air loss reporting method and equipment
CN106097500B (en) A kind of method and system for responding user and entering
CN204375038U (en) A kind of intelligent electronic lock control device
CN106909861A (en) A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system
CN107707773A (en) A kind of mobile phone loses information security method
CN106686196A (en) Personal mobile phone safety management method
CN104157028A (en) Mobile satellite communication-based coded lock
CN100429957C (en) Indentifying method for telecommunication smart card and terminal
CN106254680A (en) Information processing method and device
CN110415114A (en) A kind of method and apparatus of the unlocking account in block chain
CN106911653A (en) A kind of method for realizing mobile terminal remote control, device, mobile terminal and system
KR101103634B1 (en) Method for attestating credit card company server and that server
CN205003757U (en) Safety device is deposited to finance seal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20180216

WW01 Invention patent application withdrawn after publication