CN108430062A - Mobile phone self-desttruction equipment and system - Google Patents
Mobile phone self-desttruction equipment and system Download PDFInfo
- Publication number
- CN108430062A CN108430062A CN201810162779.5A CN201810162779A CN108430062A CN 108430062 A CN108430062 A CN 108430062A CN 201810162779 A CN201810162779 A CN 201810162779A CN 108430062 A CN108430062 A CN 108430062A
- Authority
- CN
- China
- Prior art keywords
- self
- mobile phone
- destruction
- destruct
- desttruction equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72418—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
- H04M1/72421—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72484—User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Abstract
The present embodiments relate to technical field of mobile phones, a kind of mobile phone self-desttruction equipment and system are provided, mobile phone self-desttruction equipment includes self-destruction controller and self-destruction module, self-destruction controller is set on the mainboard of mobile phone, self-destruction module is set at the storage device of mobile phone, when the continuous frequency of failure of the processor counting user identity authentication of mobile phone, and when the continuous frequency of failure reaches self-destruction predetermined threshold value, command-destruct is generated;After self-destruction controller receives command-destruct, the storage device of mobile phone is damaged according to command-destruct control self-destruction module.Compared with prior art, the embodiment of the present invention can ensure the information security in mobile phone after hand-set from stolen, and criminal is effectively avoided to steal the personal information of user.
Description
Technical field
The present invention relates to technical field of mobile phones, in particular to a kind of mobile phone self-desttruction equipment and system.
Background technology
With the development of technology and the improvement of people ’ s living standards, the application of mobile phone is more and more extensive, also brings many
Information security issue.Currently, most of mobile phone is all to protect the information security in mobile phone by coded lock or Fingerprint Lock, but
It is that after hand-set from stolen, coded lock and Fingerprint Lock will be unable to continue to ensure the information security in mobile phone, once the individual of user
Information is disclosed, it will is brought and is seriously affected to user.
Invention content
The embodiment of the present invention is designed to provide a kind of mobile phone self-desttruction equipment and system, to ensure after hand-set from stolen
Information security in mobile phone.
To achieve the goals above, technical solution used in the embodiment of the present invention is as follows:
In a first aspect, an embodiment of the present invention provides a kind of mobile phone self-desttruction equipment, it is applied to mobile phone, the mobile phone self-destruction dress
It sets including self-destruction controller and self-destruction module, the self-destruction controller is set on the mainboard of mobile phone, the self-destruction module setting
At the storage device of mobile phone, the self-destruction controller is electrically connected with the processor of mobile phone, and is electrically connected with the self-destruction module;
The processor is used for the continuous frequency of failure of counting user identity authentication, and reaches self-destruction in the continuous frequency of failure and preset
When threshold value, generates command-destruct and be sent to the self-destruction controller;The self-destruction controller is used to receive the command-destruct, and
The self-destruction module work is controlled according to the command-destruct, so that the self-destruction module damages the storage device of mobile phone.
Further, the automatic self-destruction controller is electrically connected with the processor of mobile phone, and the processor is used for counting
The continuous frequency of failure of family identity authentication, and when the continuous frequency of failure reaches self-destruction predetermined threshold value, generate command-destruct
It is sent to the self-destruction controller.
Further, the self-destruction controller is electrically connected with the display screen of mobile phone, and the display screen and the processor
Electrical connection;The processor is additionally operable to, when the continuous frequency of failure reaches alarm predetermined threshold value, generate alarm command, and lead to
It crosses the display screen to be shown, wherein the alarm predetermined threshold value is less than or equal to the self-destruction predetermined threshold value.
Further, the alarm command includes authentication information, and the processor is additionally operable to obtain user according to institute
The verification result of authentication information input is stated, and the verification result is compared with default result, if the verification is tied
Fruit is consistent with default result, then carries out user identity identification;If the verification result is inconsistent with default result, self-destruction is generated
Instruction.
Further, the mobile phone self-desttruction equipment further includes communication module, the communication module and remotely administered server
Communication connection, and be electrically connected with the self-destruction controller;The communication module is issued for receiving the remotely administered server
Command-destruct, and the command-destruct is sent to the self-destruction controller.
Further, the self-destruction controller includes the erasable chips of EPROM.
Further, the self-destruction module includes power amplifier and device for fusing, the self-destruction controller, power amplification
Device, device for fusing are sequentially connected electrically;The self-destruction controller is additionally operable to control the power amplifier according to the command-destruct
The power of the device for fusing is amplified, to damage the storage device of mobile phone.
Further, the storage device includes at least one of mobile phone memory, mobile phone card.
A kind of mobile phone destruct system, including above-mentioned mobile phone self-desttruction equipment, the mobile phone self-desttruction equipment are applied to mobile phone, packet
Self-destruction controller and self-destruction module are included, the self-destruction controller is set on the mainboard of mobile phone, and the self-destruction module is set to hand
At the storage device of machine, the self-destruction controller is electrically connected with the processor of mobile phone, and is electrically connected with the self-destruction module;It is described
Processor is used for the continuous frequency of failure of counting user identity authentication, and reaches self-destruction predetermined threshold value in the continuous frequency of failure
When, it generates command-destruct and is sent to the self-destruction controller;The self-destruction controller is for receiving the command-destruct, and foundation
The command-destruct controls the self-destruction module work, so that the self-destruction module damages the storage device of mobile phone.The mobile phone
Destruct system further includes remotely administered server, and the remotely administered server is communicated to connect with the mobile phone self-desttruction equipment;Institute
It states remotely administered server and is asked for receiving the destruction of user, and command-destruct is issued to the hand based on destruction request
Machine self-desttruction equipment, so that the mobile phone self-desttruction equipment damages the storage device of mobile phone.
Further, the mobile phone self-desttruction equipment be it is multiple, multiple mobile phone self-desttruction equipments with the remote management
Server communication connects;The remotely administered server is additionally operable to receive user's destruction request, is existed according to the destruction of user request
It determines to ask associated target mobile phones self-desttruction equipment with the destruction in multiple mobile phone self-desttruction equipments, and issues self-destruction and refer to
It enables to the target mobile phones self-desttruction equipment, so that the target mobile phones self-desttruction equipment damages the storage device of target mobile phones.
Further, the remotely administered server is additionally operable to obtain the hand with remotely administered server communication connection
The communication identifier of machine self-desttruction equipment, and identification list is generated according to the communication identifier and is stored;The remote management services
Device is additionally operable to receive user's destruction request, and the user destroys the communication identifier that request includes mobile phone self-desttruction equipment, according to user
The communication identifier and the identification list destroyed in request determine target mobile phones self-desttruction equipment, and issue command-destruct to the mesh
Mobile phone self-desttruction equipment is marked, so that the target mobile phones self-desttruction equipment damages the storage device of target mobile phones.
Compared with the prior art, a kind of mobile phone self-desttruction equipment provided in an embodiment of the present invention and system, mobile phone self-desttruction equipment packet
Self-destruction controller and self-destruction module are included, self-destruction controller is set on the mainboard of mobile phone, and self-destruction module is set to the storage of mobile phone
At device, when the continuous frequency of failure of the processor counting user identity authentication of mobile phone reaches self-destruction predetermined threshold value, it is produced from
It ruins instruction and is sent to self-destruction controller;After self-destruction controller receives command-destruct, self-destruction mould is controlled according to the command-destruct
Block damages the storage device of mobile phone.Compared with prior art, the embodiment of the present invention can ensure after hand-set from stolen in mobile phone
Information security effectively avoids criminal from stealing the personal information of user.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment cited below particularly, and coordinate
Appended attached drawing, is described in detail below.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows the structure diagram for the mobile phone destruct system that first embodiment of the invention is provided.
Fig. 2 shows the structure diagrams for the mobile phone self-desttruction equipment that first embodiment of the invention is provided.
Fig. 3 shows the work flow diagram for the mobile phone self-desttruction equipment that first embodiment of the invention is provided.
Fig. 4 shows the structure diagram for the mobile phone destruct system that second embodiment of the invention is provided.
Icon:100,200- mobile phone destruct systems;110- mobile phone self-desttruction equipments;120- networks;130- remote management services
Device;111- self-destruction controllers;112- self-destruction modules;113- communication modules;114- power modules.
Specific implementation mode
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, the detailed description of the embodiment of the present invention to providing in the accompanying drawings is not intended to limit claimed invention below
Range, but it is merely representative of the selected embodiment of the present invention.Based on the embodiment of the present invention, those skilled in the art are not doing
The every other embodiment obtained under the premise of going out creative work, shall fall within the protection scope of the present invention.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.Meanwhile the present invention's
In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
Fig. 1 is please referred to, Fig. 1 shows the structural frames of the mobile phone destruct system 100 provided in one embodiment of the invention
Figure.Mobile phone destruct system 100 includes mobile phone self-desttruction equipment 110 and remotely administered server 130, and mobile phone self-desttruction equipment 110 passes through
Network 120 and remotely administered server 130 communicate to connect.
Fig. 2 is please referred to, Fig. 2 shows the structural frames of the mobile phone self-desttruction equipment 110 provided in one embodiment of the invention
Figure.Mobile phone self-desttruction equipment 110 be mounted on mobile phone in comprising self-destruction controller 111, self-destruction module 112, communication module 113 and
Power module 114, self-destruction controller 111 are set on the mainboard of mobile phone, and are electrically connected with the processor of mobile phone;Self-destruction module
112 are set at the storage device of mobile phone, and communication module 113 is communicated to connect with remotely administered server 130.
In embodiments of the present invention, self-destruction controller 111 is electrically connected with the processor of mobile phone, and with self-destruction module 112 and
Communication module 113 is electrically connected.The processor of mobile phone is used for the continuous frequency of failure of counting user identity authentication, and is continuously losing
When losing number and reaching self-destruction predetermined threshold value (for example, 4 times), generates command-destruct and be sent to self-destruction controller 111.User identity reflects
Fixed mode may be, but not limited to, self-defined password identification, fingerprint recognition, recognition of face etc..
As an implementation, user can be all provided with the application of the mobile phone in mobile phone, mobile phone power-on and mobile phone upgrade etc.
User password is set, after hand-set from stolen, when thief operates mobile phone, for example, booting, the application of opening mobile phone, brush machine etc.,
It is required to input correct user password, the processor of mobile phone is detected the user password of input, judges whether to be correct
User password, recorded if Password Input mistake, once the number of Password Input mistake be more than predetermined threshold value (example
Such as, 4 times), then it is determined as mobile phone operator non-user, generates command-destruct at this time.
In embodiments of the present invention, before processor generates command-destruct, in order to avoid user misoperation causes mobile phone
Self-destruction, self-destruction controller 111 are also electrically connected with the display screen of mobile phone, and the display screen of mobile phone is electrically connected with the processor of mobile phone,
When the continuous frequency of failure that processor is additionally operable to identify when user identity reaches alarm predetermined threshold value (for example, 3 times), alarm is generated
It instructs and is shown by display screen, to prompt user misoperation, alarm predetermined threshold value to be less than or equal to self-destruction predetermined threshold value.
As an implementation, the alarm command that display screen is shown may include mobile phone i.e. by self-destructed prompt message,
And the authentication information of secondary-confirmation is carried out to user identity, authentication information can be that user is voluntarily arranged in advance
Verification information, for example, numerical ciphers, fingerprint etc..Processor is additionally operable to obtain user's testing according to authentication information input
Card as a result, and verification result and default result are compared, if verification result is consistent with default result, carry out user identity
Identification;If verification result is inconsistent with default result, command-destruct is generated.That is, the maloperation if it is user is produced
Raw alarm command, then user only need to input correct verification result, you can prevent processor generate command-destruct, avoid hand
Machine self-destruction.
In embodiments of the present invention, the command-destruct that self-destruction controller 111 is generated for receiving the processor of mobile phone, and according to
It works according to command-destruct control self-destruction module 112, so that self-destruction module 112 damages the storage device of mobile phone.As a kind of implementation
Mode after self-destruction controller 111 receives command-destruct, rewrites the program segment in self-destruction controller 111 so that revised
Program segment controls self-destruction module 112 and works, to damage the storage device of mobile phone.As an implementation, self-destruction controller
111 may be, but not limited to, the erasable chips of EPROM.
In embodiments of the present invention, self-destruction module 112 is set at the storage device of mobile phone, self-destruction module 112 and self-destruction
Controller 111 is electrically connected, and is electrically connected with power module 114.Self-destruction module 112 is used under the control of self-destruction controller 111
Work, to damage the storage device of mobile phone.
As an implementation, self-destruction module 112 includes power amplifier and device for fusing, self-destruction controller 111, work(
Rate amplifier and device for fusing are sequentially connected electrically, and self-destruction controller 111 controls power amplifier according to command-destruct and filled to fusing
The power set is amplified, to damage the storage device of mobile phone.
In embodiments of the present invention, storage device may be, but not limited to, mobile phone memory, mobile phone card etc..Namely
It says, self-destruction module 112 may be mounted at the memory of mobile phone, can also be mounted at the memory and mobile phone card of mobile phone, make
Derived from the memory and mobile phone card for ruining the breaking-up mobile phone of module 112.
In embodiments of the present invention, communication module 113 is electrically connected with self-destruction controller 111 and power module 114, and logical
Network 120 is crossed to communicate to connect with remotely administered server 130.Communication module 113 is issued for receiving remotely administered server 130
Command-destruct, and command-destruct is sent to self-destruction controller 111 so that self-destruction controller 111 is according to the command-destruct control
Self-destruction module 112 processed damages the storage device of mobile phone.
As an implementation, communication module 113 may be, but not limited to, WIFI devices.
In embodiments of the present invention, power module 114 and self-destruction controller 111, self-destruction module 112 and communication module 113
It is electrically connected, power module 114 is used to provide supply of electric power for self-destruction controller 111, self-destruction module 112 and communication module 113.
As an implementation, power module 114 can be battery of mobile phone, can also be provided in spare in mobile phone
Battery, when power module 114 is the reserve battery being arranged in mobile phone, power module 114 and battery of mobile phone are mutual indepedent, from
And it is that self-destruction controller 111, self-destruction module 112 and communication module 113 provide supply of electric power.
In embodiments of the present invention, network 120 may be, but not limited to, WIFI network, 4G networks etc..
In the present embodiment, remotely administered server 130 is used to receive the destruction request of user, and based under destruction request
Command-destruct is sent out to mobile phone self-desttruction equipment 110, so that mobile phone self-desttruction equipment 110 damages the storage device of mobile phone.
As an implementation, after user mobile phone is stolen, user can be on Telnet remotely administered server 130
User management website send destroy request, be at this moment necessary to ensure that the communication module 113 of mobile phone self-desttruction equipment 110 is connected to network
120, after remotely administered server 130 receives the destruction request of user, the identity of user is authenticated, if identity is reflected
It weighs successfully, then remotely administered server 130, which is based on destroying, asks to issue command-destruct to mobile phone self-desttruction equipment 110.
In the present embodiment, remotely administered server 130 may be, but not limited to, Web server.
Fig. 3 is please referred to, Fig. 3 shows the workflow for the mobile phone self-desttruction equipment 110 that first embodiment of the invention is provided
Figure.The workflow of mobile phone self-desttruction equipment 110 includes:
Step S1, the continuous frequency of failure of the processor counting user identity authentication of mobile phone, and reached in the continuous frequency of failure
When to self-destruction predetermined threshold value, generates command-destruct and be sent to self-destruction controller 111.
In embodiments of the present invention, user can be all provided with the application of the mobile phone in mobile phone, mobile phone power-on and mobile phone upgrade etc.
User password is set, after hand-set from stolen, when thief operates mobile phone, for example, booting, the application of opening mobile phone, brush machine etc.,
It is required to input correct user password, the processor of mobile phone is detected the user password of input, judges whether to be correct
User password, recorded if Password Input mistake, once the number of Password Input mistake be more than predetermined threshold value (example
Such as, 4 times), then it is determined as mobile phone operator non-user, generates command-destruct at this time.
Step S2, self-destruction controller 111 receives command-destruct, and works according to command-destruct control self-destruction module 112, with
Self-destruction module 112 is set to damage the storage device of mobile phone.
In embodiments of the present invention, it after self-destruction controller 111 receives command-destruct, rewrites in self-destruction controller 111
Program segment so that revised program segment control self-destruction module 112 works, to damage the storage device of mobile phone.
In embodiments of the present invention, self-destruction module 112 includes power amplifier and device for fusing, self-destruction controller 111, work(
Rate amplifier and device for fusing are sequentially connected electrically, and self-destruction controller 111 controls power amplifier according to command-destruct and filled to fusing
The power set is amplified, to damage the storage device of mobile phone.
The operation principle for the mobile phone self-desttruction equipment 110 that the embodiment of the present invention is provided is:
First, the processor realtime qualification user identity of mobile phone, and the continuous frequency of failure of counting user identity authentication, when
When the continuous frequency of failure reaches self-destruction predetermined threshold value (for example, 4 times), then it is determined as mobile phone operator non-user, processor
Generate command-destruct;
Secondly, self-destruction controller 111 receives the command-destruct that the processor of mobile phone generates, and certainly according to command-destruct control
Ruin the storage device that module 112 damages mobile phone;
Then, when the communication module 113 of mobile phone self-desttruction equipment 110 is communicated by network 120 with remotely administered server 130
When connection, communication module 113 receives the command-destruct that remotely administered server 130 issues, and command-destruct is sent to self-destruction
Controller 111 so that self-destruction controller 111 damages the storage device of mobile phone according to command-destruct control self-destruction module 112.
Fig. 4 is please referred to, Fig. 4 shows the structural frames of the mobile phone destruct system 200 provided in one embodiment of the invention
Figure.Mobile phone destruct system 200 includes multiple mobile phone self-desttruction equipments 110 and remotely administered server 130, each mobile phone self-desttruction equipment
110 are communicated to connect by network 120 and remotely administered server 130.Mobile phone destruct system 200 in the embodiment includes more
A mobile phone self-desttruction equipment 110, multiple mobile phone self-desttruction equipments 110 pass through network 120 and 130 communication link of remotely administered server
It connects, each mobile phone self-desttruction equipment 110 is installed in corresponding mobile phone, and the mobile phone self-desttruction equipment 110 in each mobile phone has
There is unique communication identifier.
In embodiments of the present invention, remotely administered server 130 can in real time be obtained by network 120 and establish communication therewith
110 corresponding communication identifier of mobile phone self-desttruction equipment, and generate identification list and stored, after user mobile phone is stolen, Yong Huke
It is sent with the user management website on Telnet remotely administered server 130 and destroys request, be at this moment necessary to ensure that user mobile phone
The communication module 113 of mobile phone self-desttruction equipment 110 be connected to network 120, and destroy to carry in request and send out destruction request
110 corresponding communication identifier of mobile phone self-desttruction equipment, remotely administered server 130 receive user destruction request after, to
The identity at family is authenticated, if identification authentication success, remotely administered server 130 carries in being asked according to the destruction of user
110 corresponding communication identifier of mobile phone self-desttruction equipment and currently stored identification list, in multiple mobile phone self-desttruction equipments 110
It determines and destroys the associated target mobile phones self-desttruction equipment of request, and issue command-destruct to target mobile phones self-desttruction equipment, so that
Target mobile phones self-desttruction equipment damages the storage device of target mobile phones, ensures the information security in user mobile phone.
In conclusion a kind of mobile phone self-desttruction equipment provided in an embodiment of the present invention and system, the mobile phone self-desttruction equipment are answered
For mobile phone comprising self-destruction controller and self-destruction module, self-destruction controller are set on the mainboard of mobile phone, the setting of self-destruction module
At the storage device of mobile phone, self-destruction controller is electrically connected with the processor of mobile phone, and is electrically connected with self-destruction module;Processor is used
In the continuous frequency of failure of counting user identity authentication, and when the continuous frequency of failure reaches self-destruction predetermined threshold value, self-destruction is generated
Instruction is sent to self-destruction controller;Self-destruction controller controls self-destruction module work for receiving command-destruct, and according to command-destruct
Make, so that self-destruction module damages the storage device of mobile phone.The mobile phone destruct system includes remotely administered server and above-mentioned
Mobile phone self-desttruction equipment, remotely administered server are communicated to connect with mobile phone destruct system;Remotely administered server is for receiving user
Destruction request, and command-destruct is issued to mobile phone self-desttruction equipment based on request is destroyed, so that mobile phone self-desttruction equipment damages mobile phone
Storage device.Compared with prior art, the embodiment of the present invention can ensure the information security in mobile phone after hand-set from stolen, have
Imitate the personal information for avoiding criminal from stealing user.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also include other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should be noted that:Similar label and letter exist
Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing
It is further defined and is explained.
Claims (10)
1. a kind of mobile phone self-desttruction equipment, which is characterized in that be applied to mobile phone, the mobile phone self-desttruction equipment include self-destruction controller and
Self-destruction module, the self-destruction controller are set on the mainboard of mobile phone, and the self-destruction module is set at the storage device of mobile phone,
The self-destruction controller is electrically connected with the processor of mobile phone, and is electrically connected with the self-destruction module;
The processor is used for the continuous frequency of failure of counting user identity authentication, and reaches self-destruction in the continuous frequency of failure
When predetermined threshold value, generates command-destruct and be sent to the self-destruction controller;
The self-destruction controller controls the self-destruction module work for receiving the command-destruct, and according to the command-destruct
Make, so that the self-destruction module damages the storage device of mobile phone.
2. mobile phone self-desttruction equipment as described in claim 1, which is characterized in that the display screen of the self-destruction controller and mobile phone electricity
Connection, and the display screen is electrically connected with the processor;
The processor is additionally operable to, when the continuous frequency of failure reaches alarm predetermined threshold value, generate alarm command, and pass through
The display screen is shown, wherein the alarm predetermined threshold value is less than or equal to the self-destruction predetermined threshold value.
3. mobile phone self-desttruction equipment according to claim 2, which is characterized in that the alarm command includes authentication letter
Breath, the processor is additionally operable to obtain the verification result that user inputs according to the authentication information, and the verification is tied
Fruit is compared with default result, if the verification result is consistent with default result, carries out user identity identification;If described test
It is inconsistent with default result to demonstrate,prove result, then generates command-destruct.
4. mobile phone self-desttruction equipment as described in claim 1, which is characterized in that the mobile phone self-desttruction equipment further includes communication mould
Block, the communication module is communicated to connect with remotely administered server, and is electrically connected with the self-destruction controller;
The communication module sends the command-destruct for receiving the command-destruct that the remotely administered server issues
To the self-destruction controller.
5. mobile phone self-desttruction equipment as described in claim 1, which is characterized in that the self-destruction controller includes EPROM erasable
Chip.
6. mobile phone self-desttruction equipment as described in claim 1, which is characterized in that the self-destruction module includes power amplifier and melts
Disconnected device, the self-destruction controller, power amplifier, device for fusing are sequentially connected electrically;
The self-destruction controller is additionally operable to the work(for controlling the power amplifier to the device for fusing according to the command-destruct
Rate is amplified, to damage the storage device of mobile phone.
7. mobile phone self-desttruction equipment as described in claim 1, which is characterized in that the storage device includes mobile phone memory, hand
At least one of machine card.
8. a kind of mobile phone destruct system, which is characterized in that including claim 1-7 any one of them mobile phone self-desttruction equipments, institute
It further includes remotely administered server to state mobile phone destruct system, the remotely administered server and the mobile phone self-desttruction equipment communication link
It connects;
The remotely administered server is used to receive the destruction request of user, and issues command-destruct extremely based on destruction request
The mobile phone self-desttruction equipment, so that the mobile phone self-desttruction equipment damages the storage device of mobile phone.
9. mobile phone destruct system as claimed in claim 8, which is characterized in that the mobile phone self-desttruction equipment is multiple, Duo Gesuo
Mobile phone self-desttruction equipment is stated to communicate to connect with the remotely administered server;The remotely administered server is additionally operable to receive user
Request is destroyed, determines to ask with the destruction in multiple mobile phone self-desttruction equipments according to the destruction of user request associated
Target mobile phones self-desttruction equipment, and command-destruct is issued to the target mobile phones self-desttruction equipment, so that the target mobile phones self-destruction fills
Set the storage device for damaging target mobile phones.
10. mobile phone destruct system according to claim 9, which is characterized in that the remotely administered server is additionally operable to obtain
The communication identifier of the mobile phone self-desttruction equipment communicated to connect with the remotely administered server is taken, and is generated according to the communication identifier
Identification list is stored;
The remotely administered server is additionally operable to receive user's destruction request, and it includes mobile phone self-desttruction equipment that the user, which destroys request,
Communication identifier, according to user destroy request in communication identifier and the identification list determine target mobile phones self-desttruction equipment, and
Command-destruct is issued to the target mobile phones self-desttruction equipment, so that the target mobile phones self-desttruction equipment damages the storage of target mobile phones
Device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810162779.5A CN108430062A (en) | 2018-02-27 | 2018-02-27 | Mobile phone self-desttruction equipment and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810162779.5A CN108430062A (en) | 2018-02-27 | 2018-02-27 | Mobile phone self-desttruction equipment and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108430062A true CN108430062A (en) | 2018-08-21 |
Family
ID=63157320
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810162779.5A Pending CN108430062A (en) | 2018-02-27 | 2018-02-27 | Mobile phone self-desttruction equipment and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108430062A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109583241A (en) * | 2018-10-29 | 2019-04-05 | 深圳龙图腾创新设计有限公司 | It is a kind of can long-range and auto-destruct memory |
CN109889986A (en) * | 2019-03-22 | 2019-06-14 | 深圳市趣创科技有限公司 | Mobile phone remote method for retrieving, device, system and storage medium |
CN110276218A (en) * | 2019-06-26 | 2019-09-24 | 昆山国显光电有限公司 | Display module, self-destruction method, the electronic equipment of display module |
CN112052485A (en) * | 2020-09-07 | 2020-12-08 | 深圳市亿道信息股份有限公司 | One-key self-destruction method and system with false touch prevention function |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100250968A1 (en) * | 2009-03-25 | 2010-09-30 | Lsi Corporation | Device for data security using user selectable one-time pad |
CN102905025A (en) * | 2012-10-11 | 2013-01-30 | 西安北斗星数码信息股份有限公司 | Mobile phone with self-destruction function |
CN203522853U (en) * | 2013-09-05 | 2014-04-02 | 深圳旗瀚和力科技有限公司 | Mobile phone mainboard circuit |
CN104869247A (en) * | 2015-05-15 | 2015-08-26 | 河南机电高等专科学校 | Intelligent self-destruction system for cellphone |
CN105898011A (en) * | 2015-10-26 | 2016-08-24 | 乐视致新电子科技(天津)有限公司 | Hardware cipher-based mobile phone data protection method and device |
CN107241452A (en) * | 2017-08-15 | 2017-10-10 | 江苏北弓智能科技有限公司 | A kind of data destruct system and method for mobile terminal |
-
2018
- 2018-02-27 CN CN201810162779.5A patent/CN108430062A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100250968A1 (en) * | 2009-03-25 | 2010-09-30 | Lsi Corporation | Device for data security using user selectable one-time pad |
CN102905025A (en) * | 2012-10-11 | 2013-01-30 | 西安北斗星数码信息股份有限公司 | Mobile phone with self-destruction function |
CN203522853U (en) * | 2013-09-05 | 2014-04-02 | 深圳旗瀚和力科技有限公司 | Mobile phone mainboard circuit |
CN104869247A (en) * | 2015-05-15 | 2015-08-26 | 河南机电高等专科学校 | Intelligent self-destruction system for cellphone |
CN105898011A (en) * | 2015-10-26 | 2016-08-24 | 乐视致新电子科技(天津)有限公司 | Hardware cipher-based mobile phone data protection method and device |
CN107241452A (en) * | 2017-08-15 | 2017-10-10 | 江苏北弓智能科技有限公司 | A kind of data destruct system and method for mobile terminal |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109583241A (en) * | 2018-10-29 | 2019-04-05 | 深圳龙图腾创新设计有限公司 | It is a kind of can long-range and auto-destruct memory |
CN109889986A (en) * | 2019-03-22 | 2019-06-14 | 深圳市趣创科技有限公司 | Mobile phone remote method for retrieving, device, system and storage medium |
CN110276218A (en) * | 2019-06-26 | 2019-09-24 | 昆山国显光电有限公司 | Display module, self-destruction method, the electronic equipment of display module |
CN110276218B (en) * | 2019-06-26 | 2021-03-26 | 昆山国显光电有限公司 | Display module, self-destruction method of display module and electronic equipment |
CN112052485A (en) * | 2020-09-07 | 2020-12-08 | 深圳市亿道信息股份有限公司 | One-key self-destruction method and system with false touch prevention function |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108430062A (en) | Mobile phone self-desttruction equipment and system | |
US11216549B2 (en) | Security verification method and device | |
CN108475447B (en) | System and method for controlling access to a physical space | |
CN104641669B (en) | The device and method of control switching for the electronic access client in the case where not requiring network to access | |
EP2579220A1 (en) | Entrance guard control method and system thereof | |
CN110719203B (en) | Operation control method, device and equipment of intelligent household equipment and storage medium | |
CN105704332B (en) | Mobile payment method and device | |
US11171784B2 (en) | Systems and methods for providing a secured password and authentication mechanism for programming and updating software or firmware | |
CN101577907B (en) | Method and device for managing mobile terminal | |
US20160226862A1 (en) | Wireless authentication system and wireless authentication method for one time password of mobile communication terminal having near field communication function | |
CN105259771A (en) | Authentication method and associated device | |
CN109818742A (en) | A kind of apparatus debugging method, device and storage medium | |
CN105050061A (en) | Method and device for sending messages on the basis of user voiceprint information | |
WO2016072833A1 (en) | System and method to disable factory reset | |
CN107437997B (en) | Radio frequency communication device and method | |
US20040268133A1 (en) | Secure personal identification entry system | |
KR20080099117A (en) | Method for removable element authentication in an embedded system | |
CN111541641A (en) | Password management system and method | |
CN105871840B (en) | A kind of certificate management method and system | |
CN107835170A (en) | Machine system and method is torn in a kind of intelligent Pos equipment safeties mandate open | |
CN111770100B (en) | Method and system for verifying safe access of external equipment to Internet of things terminal | |
CN113704061A (en) | Secret-related computer protection system | |
KR101159984B1 (en) | On line door lock control system for automatic teller machine | |
EP1632838A2 (en) | Secure personal identification entry system | |
CN111147656A (en) | Data interaction method of mobile terminal, mobile terminal and computer storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180821 |