CN107707773A - A kind of mobile phone loses information security method - Google Patents
A kind of mobile phone loses information security method Download PDFInfo
- Publication number
- CN107707773A CN107707773A CN201711177182.XA CN201711177182A CN107707773A CN 107707773 A CN107707773 A CN 107707773A CN 201711177182 A CN201711177182 A CN 201711177182A CN 107707773 A CN107707773 A CN 107707773A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- information
- security method
- locked
- information security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72415—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/2753—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content
- H04M1/2757—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips providing data content by data transmission, e.g. downloading
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Abstract
The invention belongs to information privacy technical field, loses information security method more particularly, to a kind of mobile phone.Comprise the following steps, S1, the first mobile phone and the second mobile phone are subjected to secret binding;S2, when the first mobile phone is lost, duplicate instructions is sent to the first mobile phone with the second mobile phone, after the first mobile phone receives the duplicate instructions of the second mobile phone, the relevant information in the first mobile phone is issued into the second mobile phone;S3, after the second mobile phone receives the relevant information of the first mobile phone transmission, send again it is locked instruct to the first mobile phone, after the first mobile phone receives locked instruction, carry out locked.
Description
Technical field
The invention belongs to information privacy technical field, loses information security method more particularly, to a kind of mobile phone.
Background technology
The function of present mobile phone is stronger and stronger, and the thing that can be done is also more and more, and mobile phone is exactly our intelligence now
Can terminal.But be exactly such terminal, all day is along with us, just in case when lost, can bring following safety wind
Danger.
ID card information
For the mobile phone without screen-lock password or without finger-print cipher, oneself phone is dialed, obtains cell-phone number;Log in online
Business hall, input handset number, password use random cipher, and see the mobile phone short message, log in;In next step, click on and " change my money
Material ";The inside has whole real-name authentication information of this mobile phone owner.
For the mobile phone for having screen-lock password or finger-print cipher, SIM cards of mobile phones is taken out, inserts the mobile phone of oneself, then
Oneself another phone is dialed, obtains cell-phone number, operation afterwards is same as above.
Change cellular service password
After cell-phone number and identification card number being obtained using above method, it is possible to perform another dangerous operation:" reset
Service password ", after finding mobile phone, online business hall is logged in by the mobile phone, in online business hall, uses and " it is close to reset service
Code " modifies the service password of mobile phone, then original subscriber just can not report the loss SIM cards of mobile phones, it is necessary in person by phone
Run to business hall to report the loss, this brings greater risk to the mobile phone safe of user.
Modification service password needs the name and ID card No. of user, the method before use obtain user name and
Identification card number, need to dial the 3 different numbers rung in user 3 months afterwards, open mobile phone call history, search most
The number closely transferred to, is filled in into.Afterwards can smooth Modify password.
Change Mobile PIN
If the SIM card of mobile phone is provided with PIN code, then this SIM card, which inserts another mobile phone, just needs PIN code solution
Lock, but if user does not set screen-lock password, then Mobile PIN can be reset by online business hall, specific method is,
Online business hall is logged in, inquires the PUK code of mobile phone, can be with unlocking PIN code by PUK code.After inputing PIN code three times by mistake, it can want
Ask user to input PUK code, at this moment input after correct PUK code, it is possible to new PIN code is inputted, it is achieved thereby that modification
The function of Mobile PIN.
The safety of Alipay and Net silver
The operation of Alipay password can be carried out resetting by mobile phone, with previously obtained if verifying ID card No.
Checking, in addition, if it is known that other bank card numbers of user, be able to can be unbinded user by ID card No. and mobile phone
Other bank cards, open quick payment, then carry out bankcard consumption.
The content of the invention
For this reason, it may be necessary to which providing a kind of mobile phone loses information security method, the mobile phone loses information security method by two
Mobile phone is bound, and when mobile phone is lost, a mobile phone can be sent to another mobile phone to be instructed, and lost mobile phone is controlled
It is locked, prevent lost mobile phone information leakage.
To achieve the above object, the present invention adopts the following technical scheme that:
A kind of mobile phone loses information security method, comprises the following steps,
S1, the first mobile phone and the second mobile phone are subjected to secret binding;
S2, when the first mobile phone is lost, duplicate instructions is sent to the first mobile phone with the second mobile phone, the first mobile phone receives the
After the duplicate instructions of two mobile phones, the relevant information in the first mobile phone is issued into the second mobile phone;
S3, the second mobile phone receive the first mobile phone transmission relevant information after, send again it is locked instruct to the first mobile phone,
After first mobile phone receives locked instruction, carry out locked.
The technical program further optimizes, and the relevant information for stating the first mobile phone in step S2 is address list information.
The technical program further optimizes, in the step S3 the first mobile phone carry out it is locked be the first mobile phone input
Input information is not received.
The technical program further optimizes, in addition to step S4, and the second mobile phone sends unlock instruction to the first mobile phone, the
One mobile phone unlocks after receiving unlock instruction.
The technical program further optimizes, and the relevant information of the first mobile phone includes positional information in the step S2.
The technical program further optimizes, the positional information, and the first mobile phone displacement is more than 20 meters, that is, sends
The positional information of first mobile phone gives the second mobile phone.
Prior art is different from, above-mentioned technical proposal has the beneficial effect that:Lost when existing mobile phone is in order to prevent that mobile phone from losing
The address list gone in mobile phone, address list is put on record, cumbersome because address list often updates, it is necessary to often back up.This
Two mobile phone associations are got up in invention, i.e., secret is bound, and when a mobile phone is lost, another mobile phone can be by lost mobile phone
Relevant information is copied next, and can also be locked by lost mobile phone, and lost mobile phone is protected, prevents lost mobile phone information from letting out
Dew, quadratic loss is caused to owner.
Brief description of the drawings
Fig. 1 is the flow chart of embodiment one;
Fig. 2 is the flow chart of embodiment two.
Embodiment
To describe the technology contents of technical scheme, construction feature, the objects and the effects in detail, below in conjunction with specific reality
Apply example and coordinate accompanying drawing to be explained in detail.
The present invention proposes a kind of mobile phone and loses information security method, comprises the following steps,
S1, the first mobile phone and the second mobile phone are subjected to secret binding;
S2, when the first mobile phone is lost, duplicate instructions is sent to the first mobile phone with the second mobile phone, the first mobile phone receives the
After the duplicate instructions of two mobile phones, the relevant information in the first mobile phone is issued into the second mobile phone;
S3, the second mobile phone receive the first mobile phone transmission relevant information after, send again it is locked instruct to the first mobile phone,
After first mobile phone receives locked instruction, carry out locked.
Embodiment one
Refer to shown in Fig. 1, for the flow chart of the embodiment one.A kind of mobile phone loses information security method, including following
Step,
S1, the first mobile phone and the second mobile phone are subjected to secret binding;
S2, when the first mobile phone is lost, duplicate instructions is sent to the first mobile phone with the second mobile phone, the first mobile phone receives the
After the duplicate instructions of two mobile phones, the second mobile phone is issued after the address list information in the first mobile phone is replicated;
S3, after the second mobile phone receives the address list information of the first mobile phone transmission, locked instruct to first-hand is sent again
Machine, after the first mobile phone receives locked instruction, carry out locked.
In step S3 described in the embodiment one first mobile phone carry out it is locked be the first mobile phone input do not receive input letter
Breath.
Embodiment two
As shown in fig.2, being the flow chart of embodiment two, a kind of mobile phone loses information security method, comprises the following steps,
S1, the first mobile phone and the second mobile phone are subjected to secret binding;
S2, when the first mobile phone is lost, duplicate instructions is sent to the first mobile phone with the second mobile phone, the first mobile phone receives the
After the duplicate instructions of two mobile phones, the second mobile phone will be issued after the address list information in the first mobile phone and positional information;
S3, after the second mobile phone receives address list information and the positional information of the transmission of the first mobile phone, locked finger is sent again
Make to the first mobile phone, after the first mobile phone receives locked instruction, carry out locked;
S4, the second mobile phone send unlock instruction to the first mobile phone, and the first mobile phone unlocks after receiving unlock instruction.
For the ease of finding the first mobile phone of loss, the position of the first mobile phone needs real-time update, when the first mobile phone moves
Distance is more than 20 meters, that is, sends the positional information of the first mobile phone to the second mobile phone.
Mobile phone progress of the embodiment two for loss is locked, input is not received, even if then the password of the first mobile phone is broken
Xie Liao, the first mobile phone still can not be used, the information in the first mobile phone can not be also obtained, the information in the first mobile phone is carried out
Protection.After mobile phone is found, the unlock instruction of the second mobile phone, it may be such that first-hand machine can receive input, input the first mobile phone
Password after, first-hand machine being capable of normal use.
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality
Body or operation make a distinction with another entity or operation, and not necessarily require or imply and deposited between these entities or operation
In any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to
Nonexcludability includes, so that process, method, article or terminal device including a series of elements not only include those
Key element, but also the other element including being not expressly set out, or it is this process, method, article or end also to include
The intrinsic key element of end equipment.In the absence of more restrictions, limited by sentence " including ... " or " including ... "
Key element, it is not excluded that other key element in the process including the key element, method, article or terminal device also be present.This
Outside, herein, " being more than ", " being less than ", " exceeding " etc. are interpreted as not including this number;" more than ", " following ", " within " etc. understand
It is to include this number.
Although the various embodiments described above are described, those skilled in the art once know basic wound
The property made concept, then other change and modification can be made to these embodiments, so embodiments of the invention are the foregoing is only,
Not thereby the scope of patent protection of the present invention, every equivalent structure made using description of the invention and accompanying drawing content are limited
Or equivalent flow conversion, or other related technical areas are directly or indirectly used in, similarly it is included in the patent of the present invention
Within protection domain.
Claims (6)
1. a kind of mobile phone loses information security method, it is characterised in that:Comprise the following steps,
S1, the first mobile phone and the second mobile phone are subjected to secret binding;
S2, when the first mobile phone is lost, send duplicate instructions with the second mobile phone and receive second-hand to the first mobile phone, the first mobile phone
After the duplicate instructions of machine, the relevant information in the first mobile phone is issued into the second mobile phone;
S3, after the second mobile phone receives the relevant information of the first mobile phone transmission, send again it is locked instruct to the first mobile phone, first
After mobile phone receives locked instruction, carry out locked.
2. mobile phone as claimed in claim 1 loses information security method, it is characterised in that:The phase of first mobile phone in the step S2
Pass information is address list information.
3. mobile phone as claimed in claim 1 loses information security method, it is characterised in that:The first mobile phone is carried out in the step S3
Locked is that the input of the first mobile phone does not receive input information.
4. mobile phone as claimed in claim 1 loses information security method, it is characterised in that:Also include step S4, the second mobile phone to
First mobile phone sends unlock instruction, and the first mobile phone unlocks after receiving unlock instruction.
5. mobile phone as claimed in claim 1 loses information security method, it is characterised in that:The phase of first mobile phone in the step S2
Closing information includes positional information.
6. mobile phone as claimed in claim 5 loses information security method, it is characterised in that:The positional information, the first mobile phone move
Dynamic distance is more than 20 meters, that is, sends the positional information of the first mobile phone to the second mobile phone.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711177182.XA CN107707773A (en) | 2017-11-22 | 2017-11-22 | A kind of mobile phone loses information security method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711177182.XA CN107707773A (en) | 2017-11-22 | 2017-11-22 | A kind of mobile phone loses information security method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107707773A true CN107707773A (en) | 2018-02-16 |
Family
ID=61180740
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711177182.XA Withdrawn CN107707773A (en) | 2017-11-22 | 2017-11-22 | A kind of mobile phone loses information security method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107707773A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1781326A (en) * | 2003-04-29 | 2006-05-31 | 索尼爱立信移动通讯股份有限公司 | Mobile apparatus with remote lock and control function |
CN101478595A (en) * | 2008-09-08 | 2009-07-08 | 广东南方信息安全产业基地有限公司 | Mobile communication terminal data protection method |
CN102647506A (en) * | 2011-02-22 | 2012-08-22 | 徐莹 | Mobile phone secret divulgence prevention method |
CN106851562A (en) * | 2017-01-03 | 2017-06-13 | 惠州Tcl移动通信有限公司 | It is a kind of prevent mobile phone lose after leakage of content method and system |
-
2017
- 2017-11-22 CN CN201711177182.XA patent/CN107707773A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1781326A (en) * | 2003-04-29 | 2006-05-31 | 索尼爱立信移动通讯股份有限公司 | Mobile apparatus with remote lock and control function |
CN101478595A (en) * | 2008-09-08 | 2009-07-08 | 广东南方信息安全产业基地有限公司 | Mobile communication terminal data protection method |
CN102647506A (en) * | 2011-02-22 | 2012-08-22 | 徐莹 | Mobile phone secret divulgence prevention method |
CN106851562A (en) * | 2017-01-03 | 2017-06-13 | 惠州Tcl移动通信有限公司 | It is a kind of prevent mobile phone lose after leakage of content method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11405781B2 (en) | System and method for mobile identity protection for online user authentication | |
CN101141718B (en) | Mobile terminal card-locking method | |
CN101438530A (en) | Authentication method for wireless transactions | |
CN105847451B (en) | A kind of method and system controlling intelligent entrance guard using mobile terminal | |
CN103828291B (en) | The method that application service is provided | |
CN103714626A (en) | Multi-password pre-warning type bank card capable of being controlled by different card | |
CN104574616B (en) | Intelligent electronic door lock control method and control device | |
CN103825863B (en) | A kind of accounts management method and device | |
CN105096111A (en) | No-card account transfer or withdrawal protection method and mobile phone system | |
CN106251442B (en) | A kind of setting of the temporary password of smart lock and its verification method | |
CN108271127A (en) | Pseudo-base station note knows method for distinguishing and terminal | |
Kumar et al. | Vulnerability detection of international mobile equipment identity number of smartphone and automated reporting of changed IMEI number | |
CN102170638B (en) | Air loss reporting method and equipment | |
CN106097500B (en) | A kind of method and system for responding user and entering | |
CN204375038U (en) | A kind of intelligent electronic lock control device | |
CN106909861A (en) | A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system | |
CN107707773A (en) | A kind of mobile phone loses information security method | |
CN106686196A (en) | Personal mobile phone safety management method | |
CN104157028A (en) | Mobile satellite communication-based coded lock | |
CN100429957C (en) | Indentifying method for telecommunication smart card and terminal | |
CN106254680A (en) | Information processing method and device | |
CN110415114A (en) | A kind of method and apparatus of the unlocking account in block chain | |
CN106911653A (en) | A kind of method for realizing mobile terminal remote control, device, mobile terminal and system | |
KR101103634B1 (en) | Method for attestating credit card company server and that server | |
CN205003757U (en) | Safety device is deposited to finance seal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180216 |
|
WW01 | Invention patent application withdrawn after publication |