CN108430062A - Mobile phone self-desttruction equipment and system - Google Patents

Mobile phone self-desttruction equipment and system Download PDF

Info

Publication number
CN108430062A
CN108430062A CN201810162779.5A CN201810162779A CN108430062A CN 108430062 A CN108430062 A CN 108430062A CN 201810162779 A CN201810162779 A CN 201810162779A CN 108430062 A CN108430062 A CN 108430062A
Authority
CN
China
Prior art keywords
self
mobile phone
destruction
destruct
desttruction equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810162779.5A
Other languages
Chinese (zh)
Inventor
张磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wingtech Electronic Technology Co Ltd
Original Assignee
Xian Wingtech Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wingtech Electronic Technology Co Ltd filed Critical Xian Wingtech Electronic Technology Co Ltd
Priority to CN201810162779.5A priority Critical patent/CN108430062A/en
Publication of CN108430062A publication Critical patent/CN108430062A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • H04M1/72421User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Abstract

The present embodiments relate to technical field of mobile phones, a kind of mobile phone self-desttruction equipment and system are provided, mobile phone self-desttruction equipment includes self-destruction controller and self-destruction module, self-destruction controller is set on the mainboard of mobile phone, self-destruction module is set at the storage device of mobile phone, when the continuous frequency of failure of the processor counting user identity authentication of mobile phone, and when the continuous frequency of failure reaches self-destruction predetermined threshold value, command-destruct is generated;After self-destruction controller receives command-destruct, the storage device of mobile phone is damaged according to command-destruct control self-destruction module.Compared with prior art, the embodiment of the present invention can ensure the information security in mobile phone after hand-set from stolen, and criminal is effectively avoided to steal the personal information of user.

Description

Mobile phone self-desttruction equipment and system
Technical field
The present invention relates to technical field of mobile phones, in particular to a kind of mobile phone self-desttruction equipment and system.
Background technology
With the development of technology and the improvement of people ’ s living standards, the application of mobile phone is more and more extensive, also brings many Information security issue.Currently, most of mobile phone is all to protect the information security in mobile phone by coded lock or Fingerprint Lock, but It is that after hand-set from stolen, coded lock and Fingerprint Lock will be unable to continue to ensure the information security in mobile phone, once the individual of user Information is disclosed, it will is brought and is seriously affected to user.
Invention content
The embodiment of the present invention is designed to provide a kind of mobile phone self-desttruction equipment and system, to ensure after hand-set from stolen Information security in mobile phone.
To achieve the goals above, technical solution used in the embodiment of the present invention is as follows:
In a first aspect, an embodiment of the present invention provides a kind of mobile phone self-desttruction equipment, it is applied to mobile phone, the mobile phone self-destruction dress It sets including self-destruction controller and self-destruction module, the self-destruction controller is set on the mainboard of mobile phone, the self-destruction module setting At the storage device of mobile phone, the self-destruction controller is electrically connected with the processor of mobile phone, and is electrically connected with the self-destruction module; The processor is used for the continuous frequency of failure of counting user identity authentication, and reaches self-destruction in the continuous frequency of failure and preset When threshold value, generates command-destruct and be sent to the self-destruction controller;The self-destruction controller is used to receive the command-destruct, and The self-destruction module work is controlled according to the command-destruct, so that the self-destruction module damages the storage device of mobile phone.
Further, the automatic self-destruction controller is electrically connected with the processor of mobile phone, and the processor is used for counting The continuous frequency of failure of family identity authentication, and when the continuous frequency of failure reaches self-destruction predetermined threshold value, generate command-destruct It is sent to the self-destruction controller.
Further, the self-destruction controller is electrically connected with the display screen of mobile phone, and the display screen and the processor Electrical connection;The processor is additionally operable to, when the continuous frequency of failure reaches alarm predetermined threshold value, generate alarm command, and lead to It crosses the display screen to be shown, wherein the alarm predetermined threshold value is less than or equal to the self-destruction predetermined threshold value.
Further, the alarm command includes authentication information, and the processor is additionally operable to obtain user according to institute The verification result of authentication information input is stated, and the verification result is compared with default result, if the verification is tied Fruit is consistent with default result, then carries out user identity identification;If the verification result is inconsistent with default result, self-destruction is generated Instruction.
Further, the mobile phone self-desttruction equipment further includes communication module, the communication module and remotely administered server Communication connection, and be electrically connected with the self-destruction controller;The communication module is issued for receiving the remotely administered server Command-destruct, and the command-destruct is sent to the self-destruction controller.
Further, the self-destruction controller includes the erasable chips of EPROM.
Further, the self-destruction module includes power amplifier and device for fusing, the self-destruction controller, power amplification Device, device for fusing are sequentially connected electrically;The self-destruction controller is additionally operable to control the power amplifier according to the command-destruct The power of the device for fusing is amplified, to damage the storage device of mobile phone.
Further, the storage device includes at least one of mobile phone memory, mobile phone card.
A kind of mobile phone destruct system, including above-mentioned mobile phone self-desttruction equipment, the mobile phone self-desttruction equipment are applied to mobile phone, packet Self-destruction controller and self-destruction module are included, the self-destruction controller is set on the mainboard of mobile phone, and the self-destruction module is set to hand At the storage device of machine, the self-destruction controller is electrically connected with the processor of mobile phone, and is electrically connected with the self-destruction module;It is described Processor is used for the continuous frequency of failure of counting user identity authentication, and reaches self-destruction predetermined threshold value in the continuous frequency of failure When, it generates command-destruct and is sent to the self-destruction controller;The self-destruction controller is for receiving the command-destruct, and foundation The command-destruct controls the self-destruction module work, so that the self-destruction module damages the storage device of mobile phone.The mobile phone Destruct system further includes remotely administered server, and the remotely administered server is communicated to connect with the mobile phone self-desttruction equipment;Institute It states remotely administered server and is asked for receiving the destruction of user, and command-destruct is issued to the hand based on destruction request Machine self-desttruction equipment, so that the mobile phone self-desttruction equipment damages the storage device of mobile phone.
Further, the mobile phone self-desttruction equipment be it is multiple, multiple mobile phone self-desttruction equipments with the remote management Server communication connects;The remotely administered server is additionally operable to receive user's destruction request, is existed according to the destruction of user request It determines to ask associated target mobile phones self-desttruction equipment with the destruction in multiple mobile phone self-desttruction equipments, and issues self-destruction and refer to It enables to the target mobile phones self-desttruction equipment, so that the target mobile phones self-desttruction equipment damages the storage device of target mobile phones.
Further, the remotely administered server is additionally operable to obtain the hand with remotely administered server communication connection The communication identifier of machine self-desttruction equipment, and identification list is generated according to the communication identifier and is stored;The remote management services Device is additionally operable to receive user's destruction request, and the user destroys the communication identifier that request includes mobile phone self-desttruction equipment, according to user The communication identifier and the identification list destroyed in request determine target mobile phones self-desttruction equipment, and issue command-destruct to the mesh Mobile phone self-desttruction equipment is marked, so that the target mobile phones self-desttruction equipment damages the storage device of target mobile phones.
Compared with the prior art, a kind of mobile phone self-desttruction equipment provided in an embodiment of the present invention and system, mobile phone self-desttruction equipment packet Self-destruction controller and self-destruction module are included, self-destruction controller is set on the mainboard of mobile phone, and self-destruction module is set to the storage of mobile phone At device, when the continuous frequency of failure of the processor counting user identity authentication of mobile phone reaches self-destruction predetermined threshold value, it is produced from It ruins instruction and is sent to self-destruction controller;After self-destruction controller receives command-destruct, self-destruction mould is controlled according to the command-destruct Block damages the storage device of mobile phone.Compared with prior art, the embodiment of the present invention can ensure after hand-set from stolen in mobile phone Information security effectively avoids criminal from stealing the personal information of user.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment cited below particularly, and coordinate Appended attached drawing, is described in detail below.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows the structure diagram for the mobile phone destruct system that first embodiment of the invention is provided.
Fig. 2 shows the structure diagrams for the mobile phone self-desttruction equipment that first embodiment of the invention is provided.
Fig. 3 shows the work flow diagram for the mobile phone self-desttruction equipment that first embodiment of the invention is provided.
Fig. 4 shows the structure diagram for the mobile phone destruct system that second embodiment of the invention is provided.
Icon:100,200- mobile phone destruct systems;110- mobile phone self-desttruction equipments;120- networks;130- remote management services Device;111- self-destruction controllers;112- self-destruction modules;113- communication modules;114- power modules.
Specific implementation mode
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, the detailed description of the embodiment of the present invention to providing in the accompanying drawings is not intended to limit claimed invention below Range, but it is merely representative of the selected embodiment of the present invention.Based on the embodiment of the present invention, those skilled in the art are not doing The every other embodiment obtained under the premise of going out creative work, shall fall within the protection scope of the present invention.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.Meanwhile the present invention's In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
Fig. 1 is please referred to, Fig. 1 shows the structural frames of the mobile phone destruct system 100 provided in one embodiment of the invention Figure.Mobile phone destruct system 100 includes mobile phone self-desttruction equipment 110 and remotely administered server 130, and mobile phone self-desttruction equipment 110 passes through Network 120 and remotely administered server 130 communicate to connect.
Fig. 2 is please referred to, Fig. 2 shows the structural frames of the mobile phone self-desttruction equipment 110 provided in one embodiment of the invention Figure.Mobile phone self-desttruction equipment 110 be mounted on mobile phone in comprising self-destruction controller 111, self-destruction module 112, communication module 113 and Power module 114, self-destruction controller 111 are set on the mainboard of mobile phone, and are electrically connected with the processor of mobile phone;Self-destruction module 112 are set at the storage device of mobile phone, and communication module 113 is communicated to connect with remotely administered server 130.
In embodiments of the present invention, self-destruction controller 111 is electrically connected with the processor of mobile phone, and with self-destruction module 112 and Communication module 113 is electrically connected.The processor of mobile phone is used for the continuous frequency of failure of counting user identity authentication, and is continuously losing When losing number and reaching self-destruction predetermined threshold value (for example, 4 times), generates command-destruct and be sent to self-destruction controller 111.User identity reflects Fixed mode may be, but not limited to, self-defined password identification, fingerprint recognition, recognition of face etc..
As an implementation, user can be all provided with the application of the mobile phone in mobile phone, mobile phone power-on and mobile phone upgrade etc. User password is set, after hand-set from stolen, when thief operates mobile phone, for example, booting, the application of opening mobile phone, brush machine etc., It is required to input correct user password, the processor of mobile phone is detected the user password of input, judges whether to be correct User password, recorded if Password Input mistake, once the number of Password Input mistake be more than predetermined threshold value (example Such as, 4 times), then it is determined as mobile phone operator non-user, generates command-destruct at this time.
In embodiments of the present invention, before processor generates command-destruct, in order to avoid user misoperation causes mobile phone Self-destruction, self-destruction controller 111 are also electrically connected with the display screen of mobile phone, and the display screen of mobile phone is electrically connected with the processor of mobile phone, When the continuous frequency of failure that processor is additionally operable to identify when user identity reaches alarm predetermined threshold value (for example, 3 times), alarm is generated It instructs and is shown by display screen, to prompt user misoperation, alarm predetermined threshold value to be less than or equal to self-destruction predetermined threshold value.
As an implementation, the alarm command that display screen is shown may include mobile phone i.e. by self-destructed prompt message, And the authentication information of secondary-confirmation is carried out to user identity, authentication information can be that user is voluntarily arranged in advance Verification information, for example, numerical ciphers, fingerprint etc..Processor is additionally operable to obtain user's testing according to authentication information input Card as a result, and verification result and default result are compared, if verification result is consistent with default result, carry out user identity Identification;If verification result is inconsistent with default result, command-destruct is generated.That is, the maloperation if it is user is produced Raw alarm command, then user only need to input correct verification result, you can prevent processor generate command-destruct, avoid hand Machine self-destruction.
In embodiments of the present invention, the command-destruct that self-destruction controller 111 is generated for receiving the processor of mobile phone, and according to It works according to command-destruct control self-destruction module 112, so that self-destruction module 112 damages the storage device of mobile phone.As a kind of implementation Mode after self-destruction controller 111 receives command-destruct, rewrites the program segment in self-destruction controller 111 so that revised Program segment controls self-destruction module 112 and works, to damage the storage device of mobile phone.As an implementation, self-destruction controller 111 may be, but not limited to, the erasable chips of EPROM.
In embodiments of the present invention, self-destruction module 112 is set at the storage device of mobile phone, self-destruction module 112 and self-destruction Controller 111 is electrically connected, and is electrically connected with power module 114.Self-destruction module 112 is used under the control of self-destruction controller 111 Work, to damage the storage device of mobile phone.
As an implementation, self-destruction module 112 includes power amplifier and device for fusing, self-destruction controller 111, work( Rate amplifier and device for fusing are sequentially connected electrically, and self-destruction controller 111 controls power amplifier according to command-destruct and filled to fusing The power set is amplified, to damage the storage device of mobile phone.
In embodiments of the present invention, storage device may be, but not limited to, mobile phone memory, mobile phone card etc..Namely It says, self-destruction module 112 may be mounted at the memory of mobile phone, can also be mounted at the memory and mobile phone card of mobile phone, make Derived from the memory and mobile phone card for ruining the breaking-up mobile phone of module 112.
In embodiments of the present invention, communication module 113 is electrically connected with self-destruction controller 111 and power module 114, and logical Network 120 is crossed to communicate to connect with remotely administered server 130.Communication module 113 is issued for receiving remotely administered server 130 Command-destruct, and command-destruct is sent to self-destruction controller 111 so that self-destruction controller 111 is according to the command-destruct control Self-destruction module 112 processed damages the storage device of mobile phone.
As an implementation, communication module 113 may be, but not limited to, WIFI devices.
In embodiments of the present invention, power module 114 and self-destruction controller 111, self-destruction module 112 and communication module 113 It is electrically connected, power module 114 is used to provide supply of electric power for self-destruction controller 111, self-destruction module 112 and communication module 113.
As an implementation, power module 114 can be battery of mobile phone, can also be provided in spare in mobile phone Battery, when power module 114 is the reserve battery being arranged in mobile phone, power module 114 and battery of mobile phone are mutual indepedent, from And it is that self-destruction controller 111, self-destruction module 112 and communication module 113 provide supply of electric power.
In embodiments of the present invention, network 120 may be, but not limited to, WIFI network, 4G networks etc..
In the present embodiment, remotely administered server 130 is used to receive the destruction request of user, and based under destruction request Command-destruct is sent out to mobile phone self-desttruction equipment 110, so that mobile phone self-desttruction equipment 110 damages the storage device of mobile phone.
As an implementation, after user mobile phone is stolen, user can be on Telnet remotely administered server 130 User management website send destroy request, be at this moment necessary to ensure that the communication module 113 of mobile phone self-desttruction equipment 110 is connected to network 120, after remotely administered server 130 receives the destruction request of user, the identity of user is authenticated, if identity is reflected It weighs successfully, then remotely administered server 130, which is based on destroying, asks to issue command-destruct to mobile phone self-desttruction equipment 110.
In the present embodiment, remotely administered server 130 may be, but not limited to, Web server.
Fig. 3 is please referred to, Fig. 3 shows the workflow for the mobile phone self-desttruction equipment 110 that first embodiment of the invention is provided Figure.The workflow of mobile phone self-desttruction equipment 110 includes:
Step S1, the continuous frequency of failure of the processor counting user identity authentication of mobile phone, and reached in the continuous frequency of failure When to self-destruction predetermined threshold value, generates command-destruct and be sent to self-destruction controller 111.
In embodiments of the present invention, user can be all provided with the application of the mobile phone in mobile phone, mobile phone power-on and mobile phone upgrade etc. User password is set, after hand-set from stolen, when thief operates mobile phone, for example, booting, the application of opening mobile phone, brush machine etc., It is required to input correct user password, the processor of mobile phone is detected the user password of input, judges whether to be correct User password, recorded if Password Input mistake, once the number of Password Input mistake be more than predetermined threshold value (example Such as, 4 times), then it is determined as mobile phone operator non-user, generates command-destruct at this time.
Step S2, self-destruction controller 111 receives command-destruct, and works according to command-destruct control self-destruction module 112, with Self-destruction module 112 is set to damage the storage device of mobile phone.
In embodiments of the present invention, it after self-destruction controller 111 receives command-destruct, rewrites in self-destruction controller 111 Program segment so that revised program segment control self-destruction module 112 works, to damage the storage device of mobile phone.
In embodiments of the present invention, self-destruction module 112 includes power amplifier and device for fusing, self-destruction controller 111, work( Rate amplifier and device for fusing are sequentially connected electrically, and self-destruction controller 111 controls power amplifier according to command-destruct and filled to fusing The power set is amplified, to damage the storage device of mobile phone.
The operation principle for the mobile phone self-desttruction equipment 110 that the embodiment of the present invention is provided is:
First, the processor realtime qualification user identity of mobile phone, and the continuous frequency of failure of counting user identity authentication, when When the continuous frequency of failure reaches self-destruction predetermined threshold value (for example, 4 times), then it is determined as mobile phone operator non-user, processor Generate command-destruct;
Secondly, self-destruction controller 111 receives the command-destruct that the processor of mobile phone generates, and certainly according to command-destruct control Ruin the storage device that module 112 damages mobile phone;
Then, when the communication module 113 of mobile phone self-desttruction equipment 110 is communicated by network 120 with remotely administered server 130 When connection, communication module 113 receives the command-destruct that remotely administered server 130 issues, and command-destruct is sent to self-destruction Controller 111 so that self-destruction controller 111 damages the storage device of mobile phone according to command-destruct control self-destruction module 112.
Fig. 4 is please referred to, Fig. 4 shows the structural frames of the mobile phone destruct system 200 provided in one embodiment of the invention Figure.Mobile phone destruct system 200 includes multiple mobile phone self-desttruction equipments 110 and remotely administered server 130, each mobile phone self-desttruction equipment 110 are communicated to connect by network 120 and remotely administered server 130.Mobile phone destruct system 200 in the embodiment includes more A mobile phone self-desttruction equipment 110, multiple mobile phone self-desttruction equipments 110 pass through network 120 and 130 communication link of remotely administered server It connects, each mobile phone self-desttruction equipment 110 is installed in corresponding mobile phone, and the mobile phone self-desttruction equipment 110 in each mobile phone has There is unique communication identifier.
In embodiments of the present invention, remotely administered server 130 can in real time be obtained by network 120 and establish communication therewith 110 corresponding communication identifier of mobile phone self-desttruction equipment, and generate identification list and stored, after user mobile phone is stolen, Yong Huke It is sent with the user management website on Telnet remotely administered server 130 and destroys request, be at this moment necessary to ensure that user mobile phone The communication module 113 of mobile phone self-desttruction equipment 110 be connected to network 120, and destroy to carry in request and send out destruction request 110 corresponding communication identifier of mobile phone self-desttruction equipment, remotely administered server 130 receive user destruction request after, to The identity at family is authenticated, if identification authentication success, remotely administered server 130 carries in being asked according to the destruction of user 110 corresponding communication identifier of mobile phone self-desttruction equipment and currently stored identification list, in multiple mobile phone self-desttruction equipments 110 It determines and destroys the associated target mobile phones self-desttruction equipment of request, and issue command-destruct to target mobile phones self-desttruction equipment, so that Target mobile phones self-desttruction equipment damages the storage device of target mobile phones, ensures the information security in user mobile phone.
In conclusion a kind of mobile phone self-desttruction equipment provided in an embodiment of the present invention and system, the mobile phone self-desttruction equipment are answered For mobile phone comprising self-destruction controller and self-destruction module, self-destruction controller are set on the mainboard of mobile phone, the setting of self-destruction module At the storage device of mobile phone, self-destruction controller is electrically connected with the processor of mobile phone, and is electrically connected with self-destruction module;Processor is used In the continuous frequency of failure of counting user identity authentication, and when the continuous frequency of failure reaches self-destruction predetermined threshold value, self-destruction is generated Instruction is sent to self-destruction controller;Self-destruction controller controls self-destruction module work for receiving command-destruct, and according to command-destruct Make, so that self-destruction module damages the storage device of mobile phone.The mobile phone destruct system includes remotely administered server and above-mentioned Mobile phone self-desttruction equipment, remotely administered server are communicated to connect with mobile phone destruct system;Remotely administered server is for receiving user Destruction request, and command-destruct is issued to mobile phone self-desttruction equipment based on request is destroyed, so that mobile phone self-desttruction equipment damages mobile phone Storage device.Compared with prior art, the embodiment of the present invention can ensure the information security in mobile phone after hand-set from stolen, have Imitate the personal information for avoiding criminal from stealing user.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also include other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should be noted that:Similar label and letter exist Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and is explained.

Claims (10)

1. a kind of mobile phone self-desttruction equipment, which is characterized in that be applied to mobile phone, the mobile phone self-desttruction equipment include self-destruction controller and Self-destruction module, the self-destruction controller are set on the mainboard of mobile phone, and the self-destruction module is set at the storage device of mobile phone, The self-destruction controller is electrically connected with the processor of mobile phone, and is electrically connected with the self-destruction module;
The processor is used for the continuous frequency of failure of counting user identity authentication, and reaches self-destruction in the continuous frequency of failure When predetermined threshold value, generates command-destruct and be sent to the self-destruction controller;
The self-destruction controller controls the self-destruction module work for receiving the command-destruct, and according to the command-destruct Make, so that the self-destruction module damages the storage device of mobile phone.
2. mobile phone self-desttruction equipment as described in claim 1, which is characterized in that the display screen of the self-destruction controller and mobile phone electricity Connection, and the display screen is electrically connected with the processor;
The processor is additionally operable to, when the continuous frequency of failure reaches alarm predetermined threshold value, generate alarm command, and pass through The display screen is shown, wherein the alarm predetermined threshold value is less than or equal to the self-destruction predetermined threshold value.
3. mobile phone self-desttruction equipment according to claim 2, which is characterized in that the alarm command includes authentication letter Breath, the processor is additionally operable to obtain the verification result that user inputs according to the authentication information, and the verification is tied Fruit is compared with default result, if the verification result is consistent with default result, carries out user identity identification;If described test It is inconsistent with default result to demonstrate,prove result, then generates command-destruct.
4. mobile phone self-desttruction equipment as described in claim 1, which is characterized in that the mobile phone self-desttruction equipment further includes communication mould Block, the communication module is communicated to connect with remotely administered server, and is electrically connected with the self-destruction controller;
The communication module sends the command-destruct for receiving the command-destruct that the remotely administered server issues To the self-destruction controller.
5. mobile phone self-desttruction equipment as described in claim 1, which is characterized in that the self-destruction controller includes EPROM erasable Chip.
6. mobile phone self-desttruction equipment as described in claim 1, which is characterized in that the self-destruction module includes power amplifier and melts Disconnected device, the self-destruction controller, power amplifier, device for fusing are sequentially connected electrically;
The self-destruction controller is additionally operable to the work(for controlling the power amplifier to the device for fusing according to the command-destruct Rate is amplified, to damage the storage device of mobile phone.
7. mobile phone self-desttruction equipment as described in claim 1, which is characterized in that the storage device includes mobile phone memory, hand At least one of machine card.
8. a kind of mobile phone destruct system, which is characterized in that including claim 1-7 any one of them mobile phone self-desttruction equipments, institute It further includes remotely administered server to state mobile phone destruct system, the remotely administered server and the mobile phone self-desttruction equipment communication link It connects;
The remotely administered server is used to receive the destruction request of user, and issues command-destruct extremely based on destruction request The mobile phone self-desttruction equipment, so that the mobile phone self-desttruction equipment damages the storage device of mobile phone.
9. mobile phone destruct system as claimed in claim 8, which is characterized in that the mobile phone self-desttruction equipment is multiple, Duo Gesuo Mobile phone self-desttruction equipment is stated to communicate to connect with the remotely administered server;The remotely administered server is additionally operable to receive user Request is destroyed, determines to ask with the destruction in multiple mobile phone self-desttruction equipments according to the destruction of user request associated Target mobile phones self-desttruction equipment, and command-destruct is issued to the target mobile phones self-desttruction equipment, so that the target mobile phones self-destruction fills Set the storage device for damaging target mobile phones.
10. mobile phone destruct system according to claim 9, which is characterized in that the remotely administered server is additionally operable to obtain The communication identifier of the mobile phone self-desttruction equipment communicated to connect with the remotely administered server is taken, and is generated according to the communication identifier Identification list is stored;
The remotely administered server is additionally operable to receive user's destruction request, and it includes mobile phone self-desttruction equipment that the user, which destroys request, Communication identifier, according to user destroy request in communication identifier and the identification list determine target mobile phones self-desttruction equipment, and Command-destruct is issued to the target mobile phones self-desttruction equipment, so that the target mobile phones self-desttruction equipment damages the storage of target mobile phones Device.
CN201810162779.5A 2018-02-27 2018-02-27 Mobile phone self-desttruction equipment and system Pending CN108430062A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810162779.5A CN108430062A (en) 2018-02-27 2018-02-27 Mobile phone self-desttruction equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810162779.5A CN108430062A (en) 2018-02-27 2018-02-27 Mobile phone self-desttruction equipment and system

Publications (1)

Publication Number Publication Date
CN108430062A true CN108430062A (en) 2018-08-21

Family

ID=63157320

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810162779.5A Pending CN108430062A (en) 2018-02-27 2018-02-27 Mobile phone self-desttruction equipment and system

Country Status (1)

Country Link
CN (1) CN108430062A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583241A (en) * 2018-10-29 2019-04-05 深圳龙图腾创新设计有限公司 It is a kind of can long-range and auto-destruct memory
CN109889986A (en) * 2019-03-22 2019-06-14 深圳市趣创科技有限公司 Mobile phone remote method for retrieving, device, system and storage medium
CN110276218A (en) * 2019-06-26 2019-09-24 昆山国显光电有限公司 Display module, self-destruction method, the electronic equipment of display module
CN112052485A (en) * 2020-09-07 2020-12-08 深圳市亿道信息股份有限公司 One-key self-destruction method and system with false touch prevention function

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100250968A1 (en) * 2009-03-25 2010-09-30 Lsi Corporation Device for data security using user selectable one-time pad
CN102905025A (en) * 2012-10-11 2013-01-30 西安北斗星数码信息股份有限公司 Mobile phone with self-destruction function
CN203522853U (en) * 2013-09-05 2014-04-02 深圳旗瀚和力科技有限公司 Mobile phone mainboard circuit
CN104869247A (en) * 2015-05-15 2015-08-26 河南机电高等专科学校 Intelligent self-destruction system for cellphone
CN105898011A (en) * 2015-10-26 2016-08-24 乐视致新电子科技(天津)有限公司 Hardware cipher-based mobile phone data protection method and device
CN107241452A (en) * 2017-08-15 2017-10-10 江苏北弓智能科技有限公司 A kind of data destruct system and method for mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100250968A1 (en) * 2009-03-25 2010-09-30 Lsi Corporation Device for data security using user selectable one-time pad
CN102905025A (en) * 2012-10-11 2013-01-30 西安北斗星数码信息股份有限公司 Mobile phone with self-destruction function
CN203522853U (en) * 2013-09-05 2014-04-02 深圳旗瀚和力科技有限公司 Mobile phone mainboard circuit
CN104869247A (en) * 2015-05-15 2015-08-26 河南机电高等专科学校 Intelligent self-destruction system for cellphone
CN105898011A (en) * 2015-10-26 2016-08-24 乐视致新电子科技(天津)有限公司 Hardware cipher-based mobile phone data protection method and device
CN107241452A (en) * 2017-08-15 2017-10-10 江苏北弓智能科技有限公司 A kind of data destruct system and method for mobile terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583241A (en) * 2018-10-29 2019-04-05 深圳龙图腾创新设计有限公司 It is a kind of can long-range and auto-destruct memory
CN109889986A (en) * 2019-03-22 2019-06-14 深圳市趣创科技有限公司 Mobile phone remote method for retrieving, device, system and storage medium
CN110276218A (en) * 2019-06-26 2019-09-24 昆山国显光电有限公司 Display module, self-destruction method, the electronic equipment of display module
CN110276218B (en) * 2019-06-26 2021-03-26 昆山国显光电有限公司 Display module, self-destruction method of display module and electronic equipment
CN112052485A (en) * 2020-09-07 2020-12-08 深圳市亿道信息股份有限公司 One-key self-destruction method and system with false touch prevention function

Similar Documents

Publication Publication Date Title
CN108430062A (en) Mobile phone self-desttruction equipment and system
US11216549B2 (en) Security verification method and device
CN108475447B (en) System and method for controlling access to a physical space
CN104641669B (en) The device and method of control switching for the electronic access client in the case where not requiring network to access
EP2579220A1 (en) Entrance guard control method and system thereof
CN110719203B (en) Operation control method, device and equipment of intelligent household equipment and storage medium
CN105704332B (en) Mobile payment method and device
US11171784B2 (en) Systems and methods for providing a secured password and authentication mechanism for programming and updating software or firmware
CN101577907B (en) Method and device for managing mobile terminal
US20160226862A1 (en) Wireless authentication system and wireless authentication method for one time password of mobile communication terminal having near field communication function
CN105259771A (en) Authentication method and associated device
CN109818742A (en) A kind of apparatus debugging method, device and storage medium
CN105050061A (en) Method and device for sending messages on the basis of user voiceprint information
WO2016072833A1 (en) System and method to disable factory reset
CN107437997B (en) Radio frequency communication device and method
US20040268133A1 (en) Secure personal identification entry system
KR20080099117A (en) Method for removable element authentication in an embedded system
CN111541641A (en) Password management system and method
CN105871840B (en) A kind of certificate management method and system
CN107835170A (en) Machine system and method is torn in a kind of intelligent Pos equipment safeties mandate open
CN111770100B (en) Method and system for verifying safe access of external equipment to Internet of things terminal
CN113704061A (en) Secret-related computer protection system
KR101159984B1 (en) On line door lock control system for automatic teller machine
EP1632838A2 (en) Secure personal identification entry system
CN111147656A (en) Data interaction method of mobile terminal, mobile terminal and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180821