CN108769981A - A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption - Google Patents
A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption Download PDFInfo
- Publication number
- CN108769981A CN108769981A CN201810590822.8A CN201810590822A CN108769981A CN 108769981 A CN108769981 A CN 108769981A CN 201810590822 A CN201810590822 A CN 201810590822A CN 108769981 A CN108769981 A CN 108769981A
- Authority
- CN
- China
- Prior art keywords
- sim card
- information
- encryption
- user
- terminal device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
- H04W8/205—Transfer to or from user equipment or user record carrier
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Collating Specific Patterns (AREA)
Abstract
The present invention provides the personal information protecting method after a kind of encryption SIM card for terminal device and a kind of SIM card loss based on encryption; the SIM card carries out identity examination using a detection module to active user; authentication information is inputted by user; with the registration subscriber authentication information comparison stored in the encryption SIM card; to determine whether active user is the corresponding registration user of the encryption SIM card; for the active user except the encryption SIM card; it can not then be verified, the encryption SIM card starts safeguard protection automatically at this time;The method is used to realizing normal use or protection with high safety after current user identities examination;It solves the problems, such as existing simple to dial operator's customer service locking SIM card by user to carry out userspersonal information's safeguard protection and existing time delays; and the offender thus brought carries out communication swindle using this time delays so that the problem of user sustains a loss.
Description
Technical field
The present invention relates to a kind of for holding personal information security field in the SIM card communicated on terminal device, especially
It is related to the personally identifiable information protection after a kind of encryption SIM card for terminal device and a kind of SIM card loss based on encryption
Method.
Background technology
With the development of science and technology terminal device have become people's and as the function of terminal device is constantly expanded, terminal
Equipment can be completed to include many important services such as bank transfer, the important personal information of storage, therefore, the use of terminal device
Safety is more and more important.
And the existing technology for being related to terminal device safety is directed to the information peace of itself after terminal device is lost mostly
Full property is protected, and does not focus on the protection to the personal important information of user inside SIM card but;And under normal conditions, logical
Inside the SIM card for interrogating terminal, it is a few to be usually stored with the personally identifiable information of user, the contact method of friends and family and one
Other important informations of people;Once terminal device is lost, for purposive offender, no matter it is stored in
Information on terminal device, or the information that is stored in SIM card, will all be provided for condition of crime.
It itself for terminal device is most commonly opened in existing terminal device safety in utilization technical aspect
Open verification when terminal device, such as numerical ciphers, fingerprint or gesture password, but these are all based on software or system
It is arranged and completes, offender can directly skips such as above verification step by means such as brush machines, or crack and lead to
Verification is crossed, thus is not sufficient to the information security of protection terminal device, there are prodigious risks;And the information of SIM card is pacified
Full guard, then after mainly dialing communication operator customer service by user, the mode that SIM card is locked, and from SIM card loss to
In the time range of locking, offender can complete that user is pretended to be to carry out the behaviors such as telephone fraud, short message fraud completely, and make
Terminal user or its relatives sustain a loss.
In view of the criminal activity carried out using terminal device, most of communicated using SIM card to realize
, therefore, it is necessary to provide the personally identifiable information protection after a kind of encryption SIM card and a kind of SIM card loss based on encryption
Method, in terms of solving the problems, such as above SIM card information safety and the SIM card communication security existing in the prior art.
Invention content
The purpose of the present invention is to provide a kind of encryption SIM card for terminal device, the encryption SIM card can solve existing
Have in technology to dial operator's customer service by user merely and carry out locking SIM card and exist to carry out userspersonal information's safeguard protection
Time delays the problem of, and the offender thus brought carries out communication swindle using this time delays so that user
Or its relatives the problem of sustaining a loss.
The present invention also provides the personal information protecting method after a kind of SIM card loss based on encryption, the method can solve
After SIM card is lost in the prior art, operator's service calls are dialed by user to lock and then protect user in SIM card merely
The problem of low-response present in the method for personal information security, time delays;And crime crime is in loss extremely locking
Between can carry out communication swindle in range so that the problem of user or its relatives sustain a loss.
In order to solve the above technical problems, the technical solution adopted by the present invention is:
A kind of encryption SIM card for terminal device, the encryption SIM cards are built-in with a detection module, the detection module packet
It includes:
One information input submodule, described information input submodule are provided user and need to be tested using input when the SIM encrypted cards
Demonstrate,prove information;
One information storage submodule, described information sub-module stored store the personal identification of the corresponding user of the encryption SIM card
Information;
One verification submodule, the verification submodule compare the individual subscriber identity information of verification information input by user and storage
It is whether consistent;
In use, the detection module starts automatically, user needs to carry out identity by the detection module encryption SIM card
After being verified, the encryption SIM card can normal use;Otherwise the encryption SIM card starts safeguard protection operation automatically.
It is a kind of based on encryption SIM card lose after personal information protecting method, the described method comprises the following steps:
SIM card is encrypted described in S1 to lose;
The encryption SIM card that S2 loses is inserted into another terminal device,
Another terminal devices of S3 are opened or to have turned on state;
The detection module encrypted described in S4 in SIM card starts automatically;
Whether S5 active users are verified by the identity information of the detection module,
If so, into S6;If it is not, then entering S7;
Another terminal device normal uses of S6;
Another terminal devices of S7 can not carry out communicating and can not obtain the user information in SIM card;
SIM card is encrypted described in S8 starts safeguard protection operation automatically.
Advantageous effect:
Compared with prior art, the advantageous effect of present patent application is:
A kind of encryption SIM card for terminal device of the present invention uses the built-in detection module to make needs
The user communicated with the encryption SIM card carries out identity examination, pre-set by communicating operator by user's input
Authentication information, registration subscriber authentication corresponding with the encryption SIM card stored in described information sub-module stored
Information is compared to pair, to determine whether active user is the corresponding registration user of the encryption SIM card, for the encryption SIM card
Except active user, then can not verify comparison and pass through, at this time the encryption SIM card start automatically safeguard protection operation, to
Realize that the encryption SIM card is nullified, can not be communicated;As it can be seen that encryption SIM card of the present invention obviously can solve list in the prior art
It is pure by user dial operator's customer service and carry out locking SIM card carry out userspersonal information's safeguard protection and existing time delays
The problem of, and the offender thus brought carries out communication swindle using this time delays so that user or its relatives cover
The problem of suffering a loss.
Compared with prior art, another advantageous effect of present patent application is:
The present invention also provides the personal information protecting methods after a kind of SIM card loss based on encryption, and the method is in the encryption
When SIM card is inserted into another terminal device after losing, the encryption SIM card will start detection module automatically, to present terminal equipment
User carries out authentication, and user is registered for the non-encryption SIM card, then verify not by while, startup safeguard protection
Operation so that present terminal equipment user can not carry out the activity such as communicating by the encryption SIM, and then efficiently solve existing
After SIM card is lost in technology, operator's service calls are dialed by user to lock and then protect individual subscriber in SIM card merely
The problem of low-response present in the method for information security, time delays;And crime crime is being lost to the time model of locking
Communication swindle can be carried out in enclosing so that the problem of user or its relatives sustain a loss thoroughly has been strangled existing in the prior art
By SIM card carry out crime in the way of;The generation for solving such case from source, protects individual subscriber to greatest extent
Information security.
Description of the drawings
Fig. 1 is encryption SIM card detection module diagram.
The step of Fig. 2 is the personal information protecting method after being lost based on encryption SIM card is schemed.
Fig. 3 is the sub-step figure that step S5 identity is verified by identity information.
Fig. 4 is the sub-step figure that step S8 encrypts that SIM card starts safeguard protection operation automatically.
Specific implementation mode
Below with reference to attached drawing to a kind of encryption SIM card and one kind for terminal device proposed by the present invention based on encryption
The method of personal information protection after SIM card loss is described in more detail.
Embodiment one
The present embodiment will mainly be specifically described encryption SIM card described herein, due to encryption SIM of the present invention
Card is provided by communicating operator, and the encryption SIM card needs insertion terminal device that could carry out communication function, and therefore, having must
Will pair with the application it is relevant communication operator related content illustrate in advance.
In the application, communication operator need to provide a server, and a registered users information is provided on the server
Library and an exception information typing library;User obtains the encryption via communication operator by personally identifiable information typing
SIM card;All typings when obtaining the encryption SIM card via communication operator are stored in the registered users information bank
The personally identifiable information of user;And exception information typing library is then all relevant different with the encryption SIM card for storing
All kinds of personal information at common family.
In addition it is also necessary to which explanation, use of the application for the encryption SIM card, refer to using the encryption
SIM card is communicated;For it is described encryption SIM card personally identifiable information, then refer to it is described encryption SIM card on store its
Register the personally identifiable information of user;And for the personal information security of the encryption SIM card, then further include the encryption SIM
The safety for other people's important informations that card registration user is stored thereon.
Herein described encryption SIM card is built-in with a detection module, please refers to Fig. 1, is illustrated for the detection module, described
Detection module includes:
One information input submodule 10, described information input submodule 10 provide defeated when user needs using the SIM encrypted cards
Enter verification information;
One information storage submodule 20, described information sub-module stored 20 store the individual of the corresponding user of the encryption SIM card
Identity information;
One verification submodule 30, the verification submodule 30 compare verification information input by user and the individual subscriber identity of storage
Whether information is consistent.
It should be noted that when described information sub-module stored 20 is in addition to being stored with user's registration typing identity information
Outside, be also stored with registration user important personal information, the important personal information include but not limited to important relation people information,
Fund bank and all kinds of encrypted messages etc..
In practical applications, the application be only limitted to it is described encryption SIM card registration user uniquely use, be based on this, it is described
SIM card is encrypted in use, the detection module will start automatically, active user needs to test by detection module progress identity
After card verification passes through, the encryption SIM card can normal use;Otherwise, the encryption SIM card starts safeguard protection operation automatically.
Further, in order to ensure the information security in the encryption SIM card, the encryption SIM card is in active user's body
In the case of part authentication failed, safeguard protection operation will be started automatically, specifically included:
All information stored in described information sub-module stored 20 upload is backed up into communication carrier server;
The errors validity information of active user's input is sent to public security organ simultaneously;Meanwhile
It reports communication operator and is uploaded to the exception information typing library of communication operator;And
The encryption SIM card is nullified after receiving errors validity information by communication operator, to which the encryption SIM card is entirely ineffective.
As previously mentioned, the user information in described information sub-module stored 20 is from the registered of communication operator offer
User information database, when the registered users information bank obtains the encryption SIM card by user via communication operator, to described
It is established when encryption SIM card is registered.
Specifically, when encrypting SIM cards described in user's registration, synchronous typing user fingerprints information, the identity of user letter are needed
Breath and other customized necessary authentication informations;Communication modes are utilized to prevent unauthorized person from being registered
Implement crime, when user's registration also further matches with the personal files of the Ministry of Public Security, and inquires the user criminal of whether there is
Crime record, the user of no previous conviction can encrypt SIM card described in successful registration, and log-on message enters registered users information
Library;There is the user of previous conviction then can not encrypt SIM card, the log-on message entry communication fortune of all typings described in successful registration
Seeking the exception information typing library that quotient provides can be quick when carrying out unlawful activities so as to the personnel in exception information typing library
It is able to conveniently find corresponding identity information and is prevented.
Preferably, when encryption SIM card registration, user can more than two finger print informations of typing simultaneously, all typings
Finger print information be stored in identity information sub-module stored.
The application in practical applications, has stronger flexibility, the authentication for the detection module can be via
Operator is communicated flexibly be arranged and change.
In practical applications, when encrypting SIM card described in user's registration, described information input can be specified via communication operator
The authentication information that submodule 10 inputs, and by the verification submodule 30 by the authentication information of input and the letter
Verification is compared in the corresponding informance stored in breath sub-module stored 20.
In the present embodiment, described information input submodule 10 specify the authentication of active user be set as user input refer to
Line information matches with the corresponding finger print information of the registration user stored in described information sub-module stored 20 carry out identity later
Verification;Preferably, when being stored with the registration more than two finger print informations of user in described information sub-module stored 20, in Wu Te
Under the premise of very specifying, active user can input the finger print information of any storage in described information input submodule 10, and lead to
The verification submodule 30 is crossed to compare with the corresponding finger print information in described information sub-module stored 20 and then carry out authentication.
It will be apparent that the encryption SIM card user can also believe the fingerprint to be entered of described information input submodule 10
Breath is appointed as a certain specific finger print information.
Moreover, in the application, authentication information to be entered is except above-mentioned in described information input submodule 10
Outside finger print information, any single personal information of typing when can also be designed to input the encryption SIM card registration user's registration, or
For typing more than two information be combined after compound verification information;As long as in described information sub-module stored 20 in advance
It is stored with corresponding personal information, the comparison of the two can be completed via the verification submodule 30 and then is made whether that verification is logical
The judgement crossed.
It will be apparent that in order to carry out safer personal information protection to the encryption SIM card, when described information is deposited
When being stored with more than two finger print informations of the encryption SIM card registration user in storage submodule 20, registration user can also be through
Verification fingerprint is specified or changed by communicating operator;Moreover, user is registered indeed, it is possible to be runed via communication
Quotient is modified the verification information to be entered that identity is screened at any time.
Above in relation to the specific cipher mode encrypted in SIM card and the encryption SIM card and the terminal device
After connection, how to carry out its storage registration userspersonal information carry out safely protection illustrated, especially by institute
When stating the identity information to be entered in information input submodule 10 and being set as compound, it is clear that there is higher safety.
It below will be to described herein a kind of specific based on the personal information protecting method progress after SIM card is lost is encrypted
It illustrates.
Embodiment two
The present embodiment is the personal information protecting method after a kind of SIM card loss based on encryption, for the institute in embodiment one
After the encryption SIM card stated is lost, identification of the encryption SIM card for nonregistered user, and it is being identified as nonregistered user
Take a kind of method for implementing protection to the personal information stored in the encryption SIM card rapidly afterwards.
It should be noted that after the encryption SIM card is lost, or can directly open the corresponding original of the encryption SIM card
Terminal device, or be connected with another terminal device after taking out, either which kind of situation, as long as being related to the encryption
The use of SIM card will all start the detection module built in the encryption SIM card, and following embodiment will be with the encryption SIM
Card illustrates for being connect with another terminal device, for other situations, since principle is consistent, just without repeating.
Fig. 2 is please referred to, the described method comprises the following steps:
SIM card is encrypted described in S1 to lose;
The encryption SIM card that S2 loses is inserted into another terminal device;
Another terminal devices of S3 are opened or to have turned on state;
The detection module encrypted described in S4 in SIM card starts automatically;
Whether another terminal user of S5 is verified by the identity information of the detection module,
If so, into S6;If it is not, then entering S7;
Another terminal device normal uses of S6;
Another terminal devices of S7 can not carry out communicating and can not obtain the user information in SIM card;
SIM card is encrypted described in S8 starts safeguard protection operation automatically.
Due to being built-in with the detection module in the encryption SIM card, it is non-after the encryption SIM card is lost
Registration user directly opens;When the encryption SIM card being either inserted into another terminal device, the detection module all can be automatic
Startup program, it is desirable that identification is carried out to active user, to effectively prevent nonregistered user to steal in the encryption SIM card
Important personal information.
Further, after the detection module starts authentication program, to the specific of the detection module in step S5
Verification method is illustrated, and please refers to Fig. 3, specifically includes following sub-step:
S51 described information input submodules prompt user to input authentication information;
S52 described information sub-module storeds extract stored correspondence identity information;
Submodule is verified described in S53 by the authentication information of input compared with the correspondence identity information of storage pair, judge identity
It verifies whether to pass through;
If so, into S6;If it is not, then entering S7.
It will be apparent that inputting subscriber identity information in sub-step S51, it can be identity card relevant issues, can also be
The finger print information of typing when encrypting SIM card described in other problems set by user and user's registration, in short, can be user
The single piece of information of typing when registering the encryption SIM card also can be compound after more than two information of typing are combined
Verification information;In practical applications, authentication information is preset by the encryption SIM card user in registration, subsequently may be used
To be modified by communicating operator.
It is noted that working as current user identities authentication failed, it is non-note that the encryption SIM card, which recognizes active user,
When volume user, multiple methods for the encryption SIM card and its personal information protection with high safety stored will be taken, are asked
With reference to Fig. 4, the following sub-step in step S8 is specifically included:
SIM card is encrypted described in S81, and the userspersonal information stored on the detection module is sent to communication carrier server
Storage;
SIM card is encrypted described in S82, and the subscriber authentication information of input is sent to public security organ's alarm;
SIM card is encrypted described in S83 the authentication information of input is reported communication operator and is uploaded to the different of communication operator
Normal data input library;
S84 communications operator is unregistered operation to the encryption SIM card.
As it can be seen that it is nonregistered user that once the encryption SIM card recognizes active user by the detection module, for
The personal information stored in the encryption SIM card itself and the encryption SIM card realizes comprehensive protection, effectively prevents
It is existing in the prior art lose about SIM card after the security risk that generates, it is therefore prevented that after criminal is lost using SIM card
Via the alarm of communication operator, to communication carrier-lock SIM card this time delay within the scope of all criminals of communicating for being carried out
Crime.
It is after a kind of herein described encryption SIM card and one kind for terminal device is lost based on encryption SIM card above
Personally identifiable information protection method cited by two embodiments, wherein
For a kind of encryption SIM card of terminal device, using communication operator be rigid in checking up user note, prevent illegal
Molecule is registered;The built-in detection module in the encryption SIM card simultaneously, any user need to use the encryption SIM card
Communication function, be required for registration user carry out authentication matching;For the user of authentication failed, then can not utilize described
Encryption SIM card is communicated, and can not get any information in the encryption SIM card, and the encryption SIM card also can be automatic
It sends information to communication operator and realizes cancellation;The possibility that criminal carries out crime using SIM card is prevented from source
Property, the personal information security of effective protection registration user.
For a kind of method of the personally identifiable information protection after SIM card loss based on encryption, first against
It is the encryption SIM card, the method for use includes that the encryption SIM card is lost, used by nonregistered user, can not pass through identity
Verification, the encryption SIM card start all processes of automatic protection operation, provide it is a kind of it is new, from source protection it is described plus
The method of close SIM card has effectively prevented because the encryption SIM card loses the various security risks brought.
It is noted that two embodiments described herein, although the main body of protection is different, it is being used
Protection philosophy have certain general character therefore cross-referenced can be understood.
The above is only some embodiments of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (12)
1. a kind of encryption SIM card for terminal device, which is characterized in that the encryption SIM cards are built-in with a detection module,
The detection module includes:
One information input submodule, described information input submodule are provided user and need to be tested using input when the SIM encrypted cards
Demonstrate,prove information;
One information storage submodule, described information sub-module stored store the personal identification of the corresponding user of the encryption SIM card
Information;
One verification submodule, the verification submodule compare the individual subscriber identity information of verification information input by user and storage
It is whether consistent;
In use, the detection module starts automatically, user needs to carry out identity by the detection module encryption SIM card
After being verified, the encryption SIM card can normal use;Otherwise the encryption SIM card starts safeguard protection operation automatically.
2. being used for the encryption SIM card of terminal device as described in claim 1, which is characterized in that described information sub-module stored
It is also stored with the important personal information of registration user, the important personal information includes but not limited to important relation people information, money
Gold and silver row and all kinds of encrypted messages;The encryption SIM card starts safeguard protection operation, will be in described information sub-module stored
All information upload of storage backs up to communication carrier server;The errors validity information that active user inputs is sent simultaneously
To public security organ, and reports communication operator and be uploaded to the exception information typing library of communication operator;And communication operator
The encryption SIM card is nullified after receiving errors validity information.
3. being used for the encryption SIM card of terminal device as claimed in claim 2, which is characterized in that described information sub-module stored
On individual subscriber identity information from communication operator provide registered users information bank, the registered users information
When library obtains the encryption SIM card by user via communication operator, established when being registered to the encryption SIM card.
4. being used for the encryption SIM card of terminal device as claimed in claim 3, which is characterized in that the encryption SIM cards registration
When, synchronous typing user fingerprints information, the identity information of user and other customized necessary authentication informations;
Also further match with the personal files of the Ministry of Public Security, inquiry user whether there is previous conviction, the use of no previous conviction
Family can encrypt SIM card described in successful registration, and log-on message enters registered users information bank;Have the user of previous conviction then without
SIM card, the exception information typing of the log-on message entry communication operator offer of all typings are provided described in method successful registration
Library.
5. being used for the encryption SIM card of terminal device as claimed in claim 4, which is characterized in that the encryption SIM card registration
When, user the more than two finger print informations of typing, the finger print information of all typings can be stored in identity information storage simultaneously
In module.
6. being used for the encryption SIM card of terminal device as claimed in claim 5, which is characterized in that, can be via logical when user's registration
Interrogate the authentication information that operator specifies the input of described information input submodule, and by the verification submodule by input
Verification is compared with the corresponding informance stored in described information sub-module stored in authentication information.
7. being used for the encryption SIM card of terminal device as claimed in claim 6, which is characterized in that, can be via logical after user's registration
News operator is modified the authentication information of specified described information input submodule input.
8. being used for the encryption SIM card of terminal device as claimed in claim 6, which is characterized in that described information input submodule
The authentication information of input can be the single piece of information of typing when encrypting SIM card described in user's registration, also can be two of typing
Information above be combined after compound verification information.
9. the personal information protecting method after a kind of SIM card loss based on encryption, which is characterized in that the encryption SIM card is such as
Claim 1 to 7 any one of them encrypts SIM card, the described method comprises the following steps:
SIM card is encrypted described in S1 to lose;
The encryption SIM card that S2 loses is inserted into another terminal device;
Another terminal devices of S3 are opened or to have turned on state;
The detection module encrypted described in S4 in SIM card starts automatically;
Whether S5 active users are verified by the identity information of the detection module,
If so, into S6;If it is not, then entering S7;
Another terminal device normal uses of S6;
Another terminal devices of S7 can not carry out communicating and can not obtain the user information in SIM card;
SIM card is encrypted described in S8 starts safeguard protection operation automatically.
10. the personal information protecting method after being lost as claimed in claim 8 based on encryption SIM card, which is characterized in that step
S5 includes following sub-step:
S51 described information input submodules prompt user to input authentication information;
S52 described information sub-module storeds extract stored correspondence identity information;
Submodule is verified described in S53 by the authentication information of input compared with the correspondence identity information of storage pair, judge identity
It verifies whether to pass through;
If so, into S6;If it is not, then entering S7.
11. the personal information protecting method after being lost as claimed in claim 9 based on encryption SIM card, which is characterized in that sub-step
Rapid S51 prompts user inputs authentication information, and the authentication information can be typing when encrypting SIM card described in user's registration
Single piece of information, also can be typing more than two information be combined after compound verification information.
12. the personal information protecting method after being lost as claimed in claim 10 based on encryption SIM card, which is characterized in that step
Rapid S8 further includes following sub-step:
SIM card is encrypted described in S81, and the userspersonal information stored on the detection module is sent to communication carrier server
Storage;
SIM card is encrypted described in S82, and the authentication information of input is sent to public security organ's alarm;
SIM card is encrypted described in S83 the authentication information of input is reported communication operator and is uploaded to the different of communication operator
Normal data input library;
S84 communications operator is unregistered operation to the encryption SIM card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810590822.8A CN108769981A (en) | 2018-06-09 | 2018-06-09 | A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810590822.8A CN108769981A (en) | 2018-06-09 | 2018-06-09 | A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108769981A true CN108769981A (en) | 2018-11-06 |
Family
ID=64000789
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810590822.8A Withdrawn CN108769981A (en) | 2018-06-09 | 2018-06-09 | A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108769981A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020142864A1 (en) * | 2019-01-07 | 2020-07-16 | Citrix Systems, Inc. | Subscriber identity management |
CN114710775A (en) * | 2022-03-30 | 2022-07-05 | 湖南塔澳通信有限公司 | Intelligent integrated SIM card management system |
WO2023284633A1 (en) * | 2021-07-15 | 2023-01-19 | 华为技术有限公司 | Personal identification number (pin) code processing method and apparatus |
CN116456324A (en) * | 2023-06-14 | 2023-07-18 | 荣耀终端有限公司 | Terminal control method and device, mobile terminal and computer readable storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1545358A (en) * | 2003-11-14 | 2004-11-10 | Method for preventing illegal use of user identification module | |
CN101426198A (en) * | 2008-09-27 | 2009-05-06 | Tcl天一移动通信(深圳)有限公司 | Mobile phone information protecting method |
CN101753682A (en) * | 2009-11-27 | 2010-06-23 | 华为终端有限公司 | Right management method for user identification card and terminal unit |
CN101800806A (en) * | 2009-12-29 | 2010-08-11 | 闻泰集团有限公司 | Method for locking SIM card on mobile phone |
US20120309432A1 (en) * | 2010-09-03 | 2012-12-06 | Huizhou Tcl Mobile Communication Co., Ltd | System and method for tracking stolen communication terminal, and communication terminal |
CN103957105A (en) * | 2014-04-28 | 2014-07-30 | 中国联合网络通信集团有限公司 | Use identity authentication method and SIM card |
EP2836052A1 (en) * | 2012-10-12 | 2015-02-11 | Huawei Device Co., Ltd. | Method and device for data secrecy based on embedded universal integrated circuit card |
CN104820805A (en) * | 2015-04-23 | 2015-08-05 | 广东欧珀移动通信有限公司 | Method and device for burglary prevention of user identity identification card information |
CN106650373A (en) * | 2016-12-15 | 2017-05-10 | 珠海格力电器股份有限公司 | SIM card information protection method and device |
-
2018
- 2018-06-09 CN CN201810590822.8A patent/CN108769981A/en not_active Withdrawn
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1545358A (en) * | 2003-11-14 | 2004-11-10 | Method for preventing illegal use of user identification module | |
CN101426198A (en) * | 2008-09-27 | 2009-05-06 | Tcl天一移动通信(深圳)有限公司 | Mobile phone information protecting method |
CN101753682A (en) * | 2009-11-27 | 2010-06-23 | 华为终端有限公司 | Right management method for user identification card and terminal unit |
CN101800806A (en) * | 2009-12-29 | 2010-08-11 | 闻泰集团有限公司 | Method for locking SIM card on mobile phone |
US20120309432A1 (en) * | 2010-09-03 | 2012-12-06 | Huizhou Tcl Mobile Communication Co., Ltd | System and method for tracking stolen communication terminal, and communication terminal |
EP2836052A1 (en) * | 2012-10-12 | 2015-02-11 | Huawei Device Co., Ltd. | Method and device for data secrecy based on embedded universal integrated circuit card |
CN103957105A (en) * | 2014-04-28 | 2014-07-30 | 中国联合网络通信集团有限公司 | Use identity authentication method and SIM card |
CN104820805A (en) * | 2015-04-23 | 2015-08-05 | 广东欧珀移动通信有限公司 | Method and device for burglary prevention of user identity identification card information |
CN106650373A (en) * | 2016-12-15 | 2017-05-10 | 珠海格力电器股份有限公司 | SIM card information protection method and device |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020142864A1 (en) * | 2019-01-07 | 2020-07-16 | Citrix Systems, Inc. | Subscriber identity management |
US10986085B2 (en) | 2019-01-07 | 2021-04-20 | Citrix Systems, Inc. | Subscriber identity management |
US11647017B2 (en) | 2019-01-07 | 2023-05-09 | Citrix Systems, Inc. | Subscriber identity management |
WO2023284633A1 (en) * | 2021-07-15 | 2023-01-19 | 华为技术有限公司 | Personal identification number (pin) code processing method and apparatus |
CN114710775A (en) * | 2022-03-30 | 2022-07-05 | 湖南塔澳通信有限公司 | Intelligent integrated SIM card management system |
CN116456324A (en) * | 2023-06-14 | 2023-07-18 | 荣耀终端有限公司 | Terminal control method and device, mobile terminal and computer readable storage medium |
CN116456324B (en) * | 2023-06-14 | 2023-11-07 | 荣耀终端有限公司 | Terminal control method and device, mobile terminal and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200358614A1 (en) | Securing Transactions with a Blockchain Network | |
CN101051908B (en) | Dynamic cipher certifying system and method | |
CN101350723B (en) | USB Key equipment and method for implementing verification thereof | |
JP4204093B2 (en) | Authentication method and apparatus for implementing authentication method in data transmission system | |
CN108769981A (en) | A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption | |
JP2009510644A (en) | Method and configuration for secure authentication | |
CN101467430A (en) | Portable telecommunication apparatus | |
CN101616003B (en) | Password-protecting system and method | |
CN109151820A (en) | One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 " | |
CN107864124B (en) | Terminal information security protection method, terminal and Bluetooth lock | |
CN100353787C (en) | Security guarantee for memory data information of mobile terminal | |
CN105868975B (en) | Management method, management system and the mobile terminal of electronic banking account | |
CN108965222A (en) | Identity identifying method, system and computer readable storage medium | |
CN112398816A (en) | Transaction identification and verification system based on block chain | |
CN110298149A (en) | Account permission locking means, device, computer equipment and storage medium | |
US7177425B2 (en) | Device and method for securing information associated with a subscriber in a communication apparatus | |
CN101262669B (en) | A secure guarantee method for information stored in a mobile terminal | |
CN108667801A (en) | A kind of Internet of Things access identity safety certifying method and system | |
WO2018137309A1 (en) | Wireless communication processing method and device | |
CN108512858A (en) | Realize the dynamic input system and method for static password | |
JP2001312477A (en) | System, device, and method for authentication | |
CN104010306A (en) | Mobile device user identity authentication system and method | |
CN115547441B (en) | Safety acquisition method and system based on personal health medical data | |
CN106778334A (en) | The guard method of account information and mobile terminal | |
JP4303952B2 (en) | Multiple authentication system, computer program, and multiple authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20181106 |
|
WW01 | Invention patent application withdrawn after publication |