CN108769981A - A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption - Google Patents

A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption Download PDF

Info

Publication number
CN108769981A
CN108769981A CN201810590822.8A CN201810590822A CN108769981A CN 108769981 A CN108769981 A CN 108769981A CN 201810590822 A CN201810590822 A CN 201810590822A CN 108769981 A CN108769981 A CN 108769981A
Authority
CN
China
Prior art keywords
sim card
information
encryption
user
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810590822.8A
Other languages
Chinese (zh)
Inventor
陈东明
韩笑
吕亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Power Idea Technology Shenzhen Co Ltd
Original Assignee
Power Idea Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Power Idea Technology Shenzhen Co Ltd filed Critical Power Idea Technology Shenzhen Co Ltd
Priority to CN201810590822.8A priority Critical patent/CN108769981A/en
Publication of CN108769981A publication Critical patent/CN108769981A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention provides the personal information protecting method after a kind of encryption SIM card for terminal device and a kind of SIM card loss based on encryption; the SIM card carries out identity examination using a detection module to active user; authentication information is inputted by user; with the registration subscriber authentication information comparison stored in the encryption SIM card; to determine whether active user is the corresponding registration user of the encryption SIM card; for the active user except the encryption SIM card; it can not then be verified, the encryption SIM card starts safeguard protection automatically at this time;The method is used to realizing normal use or protection with high safety after current user identities examination;It solves the problems, such as existing simple to dial operator's customer service locking SIM card by user to carry out userspersonal information's safeguard protection and existing time delays; and the offender thus brought carries out communication swindle using this time delays so that the problem of user sustains a loss.

Description

After a kind of encryption SIM card and one kind for terminal device is lost based on encryption SIM card Personal information protecting method
Technical field
The present invention relates to a kind of for holding personal information security field in the SIM card communicated on terminal device, especially It is related to the personally identifiable information protection after a kind of encryption SIM card for terminal device and a kind of SIM card loss based on encryption Method.
Background technology
With the development of science and technology terminal device have become people's and as the function of terminal device is constantly expanded, terminal Equipment can be completed to include many important services such as bank transfer, the important personal information of storage, therefore, the use of terminal device Safety is more and more important.
And the existing technology for being related to terminal device safety is directed to the information peace of itself after terminal device is lost mostly Full property is protected, and does not focus on the protection to the personal important information of user inside SIM card but;And under normal conditions, logical Inside the SIM card for interrogating terminal, it is a few to be usually stored with the personally identifiable information of user, the contact method of friends and family and one Other important informations of people;Once terminal device is lost, for purposive offender, no matter it is stored in Information on terminal device, or the information that is stored in SIM card, will all be provided for condition of crime.
It itself for terminal device is most commonly opened in existing terminal device safety in utilization technical aspect Open verification when terminal device, such as numerical ciphers, fingerprint or gesture password, but these are all based on software or system It is arranged and completes, offender can directly skips such as above verification step by means such as brush machines, or crack and lead to Verification is crossed, thus is not sufficient to the information security of protection terminal device, there are prodigious risks;And the information of SIM card is pacified Full guard, then after mainly dialing communication operator customer service by user, the mode that SIM card is locked, and from SIM card loss to In the time range of locking, offender can complete that user is pretended to be to carry out the behaviors such as telephone fraud, short message fraud completely, and make Terminal user or its relatives sustain a loss.
In view of the criminal activity carried out using terminal device, most of communicated using SIM card to realize , therefore, it is necessary to provide the personally identifiable information protection after a kind of encryption SIM card and a kind of SIM card loss based on encryption Method, in terms of solving the problems, such as above SIM card information safety and the SIM card communication security existing in the prior art.
Invention content
The purpose of the present invention is to provide a kind of encryption SIM card for terminal device, the encryption SIM card can solve existing Have in technology to dial operator's customer service by user merely and carry out locking SIM card and exist to carry out userspersonal information's safeguard protection Time delays the problem of, and the offender thus brought carries out communication swindle using this time delays so that user Or its relatives the problem of sustaining a loss.
The present invention also provides the personal information protecting method after a kind of SIM card loss based on encryption, the method can solve After SIM card is lost in the prior art, operator's service calls are dialed by user to lock and then protect user in SIM card merely The problem of low-response present in the method for personal information security, time delays;And crime crime is in loss extremely locking Between can carry out communication swindle in range so that the problem of user or its relatives sustain a loss.
In order to solve the above technical problems, the technical solution adopted by the present invention is:
A kind of encryption SIM card for terminal device, the encryption SIM cards are built-in with a detection module, the detection module packet It includes:
One information input submodule, described information input submodule are provided user and need to be tested using input when the SIM encrypted cards Demonstrate,prove information;
One information storage submodule, described information sub-module stored store the personal identification of the corresponding user of the encryption SIM card Information;
One verification submodule, the verification submodule compare the individual subscriber identity information of verification information input by user and storage It is whether consistent;
In use, the detection module starts automatically, user needs to carry out identity by the detection module encryption SIM card After being verified, the encryption SIM card can normal use;Otherwise the encryption SIM card starts safeguard protection operation automatically.
It is a kind of based on encryption SIM card lose after personal information protecting method, the described method comprises the following steps:
SIM card is encrypted described in S1 to lose;
The encryption SIM card that S2 loses is inserted into another terminal device,
Another terminal devices of S3 are opened or to have turned on state;
The detection module encrypted described in S4 in SIM card starts automatically;
Whether S5 active users are verified by the identity information of the detection module,
If so, into S6;If it is not, then entering S7;
Another terminal device normal uses of S6;
Another terminal devices of S7 can not carry out communicating and can not obtain the user information in SIM card;
SIM card is encrypted described in S8 starts safeguard protection operation automatically.
Advantageous effect:
Compared with prior art, the advantageous effect of present patent application is:
A kind of encryption SIM card for terminal device of the present invention uses the built-in detection module to make needs The user communicated with the encryption SIM card carries out identity examination, pre-set by communicating operator by user's input Authentication information, registration subscriber authentication corresponding with the encryption SIM card stored in described information sub-module stored Information is compared to pair, to determine whether active user is the corresponding registration user of the encryption SIM card, for the encryption SIM card Except active user, then can not verify comparison and pass through, at this time the encryption SIM card start automatically safeguard protection operation, to Realize that the encryption SIM card is nullified, can not be communicated;As it can be seen that encryption SIM card of the present invention obviously can solve list in the prior art It is pure by user dial operator's customer service and carry out locking SIM card carry out userspersonal information's safeguard protection and existing time delays The problem of, and the offender thus brought carries out communication swindle using this time delays so that user or its relatives cover The problem of suffering a loss.
Compared with prior art, another advantageous effect of present patent application is:
The present invention also provides the personal information protecting methods after a kind of SIM card loss based on encryption, and the method is in the encryption When SIM card is inserted into another terminal device after losing, the encryption SIM card will start detection module automatically, to present terminal equipment User carries out authentication, and user is registered for the non-encryption SIM card, then verify not by while, startup safeguard protection Operation so that present terminal equipment user can not carry out the activity such as communicating by the encryption SIM, and then efficiently solve existing After SIM card is lost in technology, operator's service calls are dialed by user to lock and then protect individual subscriber in SIM card merely The problem of low-response present in the method for information security, time delays;And crime crime is being lost to the time model of locking Communication swindle can be carried out in enclosing so that the problem of user or its relatives sustain a loss thoroughly has been strangled existing in the prior art By SIM card carry out crime in the way of;The generation for solving such case from source, protects individual subscriber to greatest extent Information security.
Description of the drawings
Fig. 1 is encryption SIM card detection module diagram.
The step of Fig. 2 is the personal information protecting method after being lost based on encryption SIM card is schemed.
Fig. 3 is the sub-step figure that step S5 identity is verified by identity information.
Fig. 4 is the sub-step figure that step S8 encrypts that SIM card starts safeguard protection operation automatically.
Specific implementation mode
Below with reference to attached drawing to a kind of encryption SIM card and one kind for terminal device proposed by the present invention based on encryption The method of personal information protection after SIM card loss is described in more detail.
Embodiment one
The present embodiment will mainly be specifically described encryption SIM card described herein, due to encryption SIM of the present invention Card is provided by communicating operator, and the encryption SIM card needs insertion terminal device that could carry out communication function, and therefore, having must Will pair with the application it is relevant communication operator related content illustrate in advance.
In the application, communication operator need to provide a server, and a registered users information is provided on the server Library and an exception information typing library;User obtains the encryption via communication operator by personally identifiable information typing SIM card;All typings when obtaining the encryption SIM card via communication operator are stored in the registered users information bank The personally identifiable information of user;And exception information typing library is then all relevant different with the encryption SIM card for storing All kinds of personal information at common family.
In addition it is also necessary to which explanation, use of the application for the encryption SIM card, refer to using the encryption SIM card is communicated;For it is described encryption SIM card personally identifiable information, then refer to it is described encryption SIM card on store its Register the personally identifiable information of user;And for the personal information security of the encryption SIM card, then further include the encryption SIM The safety for other people's important informations that card registration user is stored thereon.
Herein described encryption SIM card is built-in with a detection module, please refers to Fig. 1, is illustrated for the detection module, described Detection module includes:
One information input submodule 10, described information input submodule 10 provide defeated when user needs using the SIM encrypted cards Enter verification information;
One information storage submodule 20, described information sub-module stored 20 store the individual of the corresponding user of the encryption SIM card Identity information;
One verification submodule 30, the verification submodule 30 compare verification information input by user and the individual subscriber identity of storage Whether information is consistent.
It should be noted that when described information sub-module stored 20 is in addition to being stored with user's registration typing identity information Outside, be also stored with registration user important personal information, the important personal information include but not limited to important relation people information, Fund bank and all kinds of encrypted messages etc..
In practical applications, the application be only limitted to it is described encryption SIM card registration user uniquely use, be based on this, it is described SIM card is encrypted in use, the detection module will start automatically, active user needs to test by detection module progress identity After card verification passes through, the encryption SIM card can normal use;Otherwise, the encryption SIM card starts safeguard protection operation automatically.
Further, in order to ensure the information security in the encryption SIM card, the encryption SIM card is in active user's body In the case of part authentication failed, safeguard protection operation will be started automatically, specifically included:
All information stored in described information sub-module stored 20 upload is backed up into communication carrier server;
The errors validity information of active user's input is sent to public security organ simultaneously;Meanwhile
It reports communication operator and is uploaded to the exception information typing library of communication operator;And
The encryption SIM card is nullified after receiving errors validity information by communication operator, to which the encryption SIM card is entirely ineffective.
As previously mentioned, the user information in described information sub-module stored 20 is from the registered of communication operator offer User information database, when the registered users information bank obtains the encryption SIM card by user via communication operator, to described It is established when encryption SIM card is registered.
Specifically, when encrypting SIM cards described in user's registration, synchronous typing user fingerprints information, the identity of user letter are needed Breath and other customized necessary authentication informations;Communication modes are utilized to prevent unauthorized person from being registered Implement crime, when user's registration also further matches with the personal files of the Ministry of Public Security, and inquires the user criminal of whether there is Crime record, the user of no previous conviction can encrypt SIM card described in successful registration, and log-on message enters registered users information Library;There is the user of previous conviction then can not encrypt SIM card, the log-on message entry communication fortune of all typings described in successful registration Seeking the exception information typing library that quotient provides can be quick when carrying out unlawful activities so as to the personnel in exception information typing library It is able to conveniently find corresponding identity information and is prevented.
Preferably, when encryption SIM card registration, user can more than two finger print informations of typing simultaneously, all typings Finger print information be stored in identity information sub-module stored.
The application in practical applications, has stronger flexibility, the authentication for the detection module can be via Operator is communicated flexibly be arranged and change.
In practical applications, when encrypting SIM card described in user's registration, described information input can be specified via communication operator The authentication information that submodule 10 inputs, and by the verification submodule 30 by the authentication information of input and the letter Verification is compared in the corresponding informance stored in breath sub-module stored 20.
In the present embodiment, described information input submodule 10 specify the authentication of active user be set as user input refer to Line information matches with the corresponding finger print information of the registration user stored in described information sub-module stored 20 carry out identity later Verification;Preferably, when being stored with the registration more than two finger print informations of user in described information sub-module stored 20, in Wu Te Under the premise of very specifying, active user can input the finger print information of any storage in described information input submodule 10, and lead to The verification submodule 30 is crossed to compare with the corresponding finger print information in described information sub-module stored 20 and then carry out authentication.
It will be apparent that the encryption SIM card user can also believe the fingerprint to be entered of described information input submodule 10 Breath is appointed as a certain specific finger print information.
Moreover, in the application, authentication information to be entered is except above-mentioned in described information input submodule 10 Outside finger print information, any single personal information of typing when can also be designed to input the encryption SIM card registration user's registration, or For typing more than two information be combined after compound verification information;As long as in described information sub-module stored 20 in advance It is stored with corresponding personal information, the comparison of the two can be completed via the verification submodule 30 and then is made whether that verification is logical The judgement crossed.
It will be apparent that in order to carry out safer personal information protection to the encryption SIM card, when described information is deposited When being stored with more than two finger print informations of the encryption SIM card registration user in storage submodule 20, registration user can also be through Verification fingerprint is specified or changed by communicating operator;Moreover, user is registered indeed, it is possible to be runed via communication Quotient is modified the verification information to be entered that identity is screened at any time.
Above in relation to the specific cipher mode encrypted in SIM card and the encryption SIM card and the terminal device After connection, how to carry out its storage registration userspersonal information carry out safely protection illustrated, especially by institute When stating the identity information to be entered in information input submodule 10 and being set as compound, it is clear that there is higher safety.
It below will be to described herein a kind of specific based on the personal information protecting method progress after SIM card is lost is encrypted It illustrates.
Embodiment two
The present embodiment is the personal information protecting method after a kind of SIM card loss based on encryption, for the institute in embodiment one After the encryption SIM card stated is lost, identification of the encryption SIM card for nonregistered user, and it is being identified as nonregistered user Take a kind of method for implementing protection to the personal information stored in the encryption SIM card rapidly afterwards.
It should be noted that after the encryption SIM card is lost, or can directly open the corresponding original of the encryption SIM card Terminal device, or be connected with another terminal device after taking out, either which kind of situation, as long as being related to the encryption The use of SIM card will all start the detection module built in the encryption SIM card, and following embodiment will be with the encryption SIM Card illustrates for being connect with another terminal device, for other situations, since principle is consistent, just without repeating.
Fig. 2 is please referred to, the described method comprises the following steps:
SIM card is encrypted described in S1 to lose;
The encryption SIM card that S2 loses is inserted into another terminal device;
Another terminal devices of S3 are opened or to have turned on state;
The detection module encrypted described in S4 in SIM card starts automatically;
Whether another terminal user of S5 is verified by the identity information of the detection module,
If so, into S6;If it is not, then entering S7;
Another terminal device normal uses of S6;
Another terminal devices of S7 can not carry out communicating and can not obtain the user information in SIM card;
SIM card is encrypted described in S8 starts safeguard protection operation automatically.
Due to being built-in with the detection module in the encryption SIM card, it is non-after the encryption SIM card is lost Registration user directly opens;When the encryption SIM card being either inserted into another terminal device, the detection module all can be automatic Startup program, it is desirable that identification is carried out to active user, to effectively prevent nonregistered user to steal in the encryption SIM card Important personal information.
Further, after the detection module starts authentication program, to the specific of the detection module in step S5 Verification method is illustrated, and please refers to Fig. 3, specifically includes following sub-step:
S51 described information input submodules prompt user to input authentication information;
S52 described information sub-module storeds extract stored correspondence identity information;
Submodule is verified described in S53 by the authentication information of input compared with the correspondence identity information of storage pair, judge identity It verifies whether to pass through;
If so, into S6;If it is not, then entering S7.
It will be apparent that inputting subscriber identity information in sub-step S51, it can be identity card relevant issues, can also be The finger print information of typing when encrypting SIM card described in other problems set by user and user's registration, in short, can be user The single piece of information of typing when registering the encryption SIM card also can be compound after more than two information of typing are combined Verification information;In practical applications, authentication information is preset by the encryption SIM card user in registration, subsequently may be used To be modified by communicating operator.
It is noted that working as current user identities authentication failed, it is non-note that the encryption SIM card, which recognizes active user, When volume user, multiple methods for the encryption SIM card and its personal information protection with high safety stored will be taken, are asked With reference to Fig. 4, the following sub-step in step S8 is specifically included:
SIM card is encrypted described in S81, and the userspersonal information stored on the detection module is sent to communication carrier server Storage;
SIM card is encrypted described in S82, and the subscriber authentication information of input is sent to public security organ's alarm;
SIM card is encrypted described in S83 the authentication information of input is reported communication operator and is uploaded to the different of communication operator Normal data input library;
S84 communications operator is unregistered operation to the encryption SIM card.
As it can be seen that it is nonregistered user that once the encryption SIM card recognizes active user by the detection module, for The personal information stored in the encryption SIM card itself and the encryption SIM card realizes comprehensive protection, effectively prevents It is existing in the prior art lose about SIM card after the security risk that generates, it is therefore prevented that after criminal is lost using SIM card Via the alarm of communication operator, to communication carrier-lock SIM card this time delay within the scope of all criminals of communicating for being carried out Crime.
It is after a kind of herein described encryption SIM card and one kind for terminal device is lost based on encryption SIM card above Personally identifiable information protection method cited by two embodiments, wherein
For a kind of encryption SIM card of terminal device, using communication operator be rigid in checking up user note, prevent illegal Molecule is registered;The built-in detection module in the encryption SIM card simultaneously, any user need to use the encryption SIM card Communication function, be required for registration user carry out authentication matching;For the user of authentication failed, then can not utilize described Encryption SIM card is communicated, and can not get any information in the encryption SIM card, and the encryption SIM card also can be automatic It sends information to communication operator and realizes cancellation;The possibility that criminal carries out crime using SIM card is prevented from source Property, the personal information security of effective protection registration user.
For a kind of method of the personally identifiable information protection after SIM card loss based on encryption, first against It is the encryption SIM card, the method for use includes that the encryption SIM card is lost, used by nonregistered user, can not pass through identity Verification, the encryption SIM card start all processes of automatic protection operation, provide it is a kind of it is new, from source protection it is described plus The method of close SIM card has effectively prevented because the encryption SIM card loses the various security risks brought.
It is noted that two embodiments described herein, although the main body of protection is different, it is being used Protection philosophy have certain general character therefore cross-referenced can be understood.
The above is only some embodiments of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (12)

1. a kind of encryption SIM card for terminal device, which is characterized in that the encryption SIM cards are built-in with a detection module, The detection module includes:
One information input submodule, described information input submodule are provided user and need to be tested using input when the SIM encrypted cards Demonstrate,prove information;
One information storage submodule, described information sub-module stored store the personal identification of the corresponding user of the encryption SIM card Information;
One verification submodule, the verification submodule compare the individual subscriber identity information of verification information input by user and storage It is whether consistent;
In use, the detection module starts automatically, user needs to carry out identity by the detection module encryption SIM card After being verified, the encryption SIM card can normal use;Otherwise the encryption SIM card starts safeguard protection operation automatically.
2. being used for the encryption SIM card of terminal device as described in claim 1, which is characterized in that described information sub-module stored It is also stored with the important personal information of registration user, the important personal information includes but not limited to important relation people information, money Gold and silver row and all kinds of encrypted messages;The encryption SIM card starts safeguard protection operation, will be in described information sub-module stored All information upload of storage backs up to communication carrier server;The errors validity information that active user inputs is sent simultaneously To public security organ, and reports communication operator and be uploaded to the exception information typing library of communication operator;And communication operator The encryption SIM card is nullified after receiving errors validity information.
3. being used for the encryption SIM card of terminal device as claimed in claim 2, which is characterized in that described information sub-module stored On individual subscriber identity information from communication operator provide registered users information bank, the registered users information When library obtains the encryption SIM card by user via communication operator, established when being registered to the encryption SIM card.
4. being used for the encryption SIM card of terminal device as claimed in claim 3, which is characterized in that the encryption SIM cards registration When, synchronous typing user fingerprints information, the identity information of user and other customized necessary authentication informations; Also further match with the personal files of the Ministry of Public Security, inquiry user whether there is previous conviction, the use of no previous conviction Family can encrypt SIM card described in successful registration, and log-on message enters registered users information bank;Have the user of previous conviction then without SIM card, the exception information typing of the log-on message entry communication operator offer of all typings are provided described in method successful registration Library.
5. being used for the encryption SIM card of terminal device as claimed in claim 4, which is characterized in that the encryption SIM card registration When, user the more than two finger print informations of typing, the finger print information of all typings can be stored in identity information storage simultaneously In module.
6. being used for the encryption SIM card of terminal device as claimed in claim 5, which is characterized in that, can be via logical when user's registration Interrogate the authentication information that operator specifies the input of described information input submodule, and by the verification submodule by input Verification is compared with the corresponding informance stored in described information sub-module stored in authentication information.
7. being used for the encryption SIM card of terminal device as claimed in claim 6, which is characterized in that, can be via logical after user's registration News operator is modified the authentication information of specified described information input submodule input.
8. being used for the encryption SIM card of terminal device as claimed in claim 6, which is characterized in that described information input submodule The authentication information of input can be the single piece of information of typing when encrypting SIM card described in user's registration, also can be two of typing Information above be combined after compound verification information.
9. the personal information protecting method after a kind of SIM card loss based on encryption, which is characterized in that the encryption SIM card is such as Claim 1 to 7 any one of them encrypts SIM card, the described method comprises the following steps:
SIM card is encrypted described in S1 to lose;
The encryption SIM card that S2 loses is inserted into another terminal device;
Another terminal devices of S3 are opened or to have turned on state;
The detection module encrypted described in S4 in SIM card starts automatically;
Whether S5 active users are verified by the identity information of the detection module,
If so, into S6;If it is not, then entering S7;
Another terminal device normal uses of S6;
Another terminal devices of S7 can not carry out communicating and can not obtain the user information in SIM card;
SIM card is encrypted described in S8 starts safeguard protection operation automatically.
10. the personal information protecting method after being lost as claimed in claim 8 based on encryption SIM card, which is characterized in that step S5 includes following sub-step:
S51 described information input submodules prompt user to input authentication information;
S52 described information sub-module storeds extract stored correspondence identity information;
Submodule is verified described in S53 by the authentication information of input compared with the correspondence identity information of storage pair, judge identity It verifies whether to pass through;
If so, into S6;If it is not, then entering S7.
11. the personal information protecting method after being lost as claimed in claim 9 based on encryption SIM card, which is characterized in that sub-step Rapid S51 prompts user inputs authentication information, and the authentication information can be typing when encrypting SIM card described in user's registration Single piece of information, also can be typing more than two information be combined after compound verification information.
12. the personal information protecting method after being lost as claimed in claim 10 based on encryption SIM card, which is characterized in that step Rapid S8 further includes following sub-step:
SIM card is encrypted described in S81, and the userspersonal information stored on the detection module is sent to communication carrier server Storage;
SIM card is encrypted described in S82, and the authentication information of input is sent to public security organ's alarm;
SIM card is encrypted described in S83 the authentication information of input is reported communication operator and is uploaded to the different of communication operator Normal data input library;
S84 communications operator is unregistered operation to the encryption SIM card.
CN201810590822.8A 2018-06-09 2018-06-09 A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption Withdrawn CN108769981A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810590822.8A CN108769981A (en) 2018-06-09 2018-06-09 A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810590822.8A CN108769981A (en) 2018-06-09 2018-06-09 A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption

Publications (1)

Publication Number Publication Date
CN108769981A true CN108769981A (en) 2018-11-06

Family

ID=64000789

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810590822.8A Withdrawn CN108769981A (en) 2018-06-09 2018-06-09 A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption

Country Status (1)

Country Link
CN (1) CN108769981A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020142864A1 (en) * 2019-01-07 2020-07-16 Citrix Systems, Inc. Subscriber identity management
CN114710775A (en) * 2022-03-30 2022-07-05 湖南塔澳通信有限公司 Intelligent integrated SIM card management system
WO2023284633A1 (en) * 2021-07-15 2023-01-19 华为技术有限公司 Personal identification number (pin) code processing method and apparatus
CN116456324A (en) * 2023-06-14 2023-07-18 荣耀终端有限公司 Terminal control method and device, mobile terminal and computer readable storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1545358A (en) * 2003-11-14 2004-11-10 Method for preventing illegal use of user identification module
CN101426198A (en) * 2008-09-27 2009-05-06 Tcl天一移动通信(深圳)有限公司 Mobile phone information protecting method
CN101753682A (en) * 2009-11-27 2010-06-23 华为终端有限公司 Right management method for user identification card and terminal unit
CN101800806A (en) * 2009-12-29 2010-08-11 闻泰集团有限公司 Method for locking SIM card on mobile phone
US20120309432A1 (en) * 2010-09-03 2012-12-06 Huizhou Tcl Mobile Communication Co., Ltd System and method for tracking stolen communication terminal, and communication terminal
CN103957105A (en) * 2014-04-28 2014-07-30 中国联合网络通信集团有限公司 Use identity authentication method and SIM card
EP2836052A1 (en) * 2012-10-12 2015-02-11 Huawei Device Co., Ltd. Method and device for data secrecy based on embedded universal integrated circuit card
CN104820805A (en) * 2015-04-23 2015-08-05 广东欧珀移动通信有限公司 Method and device for burglary prevention of user identity identification card information
CN106650373A (en) * 2016-12-15 2017-05-10 珠海格力电器股份有限公司 SIM card information protection method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1545358A (en) * 2003-11-14 2004-11-10 Method for preventing illegal use of user identification module
CN101426198A (en) * 2008-09-27 2009-05-06 Tcl天一移动通信(深圳)有限公司 Mobile phone information protecting method
CN101753682A (en) * 2009-11-27 2010-06-23 华为终端有限公司 Right management method for user identification card and terminal unit
CN101800806A (en) * 2009-12-29 2010-08-11 闻泰集团有限公司 Method for locking SIM card on mobile phone
US20120309432A1 (en) * 2010-09-03 2012-12-06 Huizhou Tcl Mobile Communication Co., Ltd System and method for tracking stolen communication terminal, and communication terminal
EP2836052A1 (en) * 2012-10-12 2015-02-11 Huawei Device Co., Ltd. Method and device for data secrecy based on embedded universal integrated circuit card
CN103957105A (en) * 2014-04-28 2014-07-30 中国联合网络通信集团有限公司 Use identity authentication method and SIM card
CN104820805A (en) * 2015-04-23 2015-08-05 广东欧珀移动通信有限公司 Method and device for burglary prevention of user identity identification card information
CN106650373A (en) * 2016-12-15 2017-05-10 珠海格力电器股份有限公司 SIM card information protection method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020142864A1 (en) * 2019-01-07 2020-07-16 Citrix Systems, Inc. Subscriber identity management
US10986085B2 (en) 2019-01-07 2021-04-20 Citrix Systems, Inc. Subscriber identity management
US11647017B2 (en) 2019-01-07 2023-05-09 Citrix Systems, Inc. Subscriber identity management
WO2023284633A1 (en) * 2021-07-15 2023-01-19 华为技术有限公司 Personal identification number (pin) code processing method and apparatus
CN114710775A (en) * 2022-03-30 2022-07-05 湖南塔澳通信有限公司 Intelligent integrated SIM card management system
CN116456324A (en) * 2023-06-14 2023-07-18 荣耀终端有限公司 Terminal control method and device, mobile terminal and computer readable storage medium
CN116456324B (en) * 2023-06-14 2023-11-07 荣耀终端有限公司 Terminal control method and device, mobile terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
US20200358614A1 (en) Securing Transactions with a Blockchain Network
CN101051908B (en) Dynamic cipher certifying system and method
CN101350723B (en) USB Key equipment and method for implementing verification thereof
JP4204093B2 (en) Authentication method and apparatus for implementing authentication method in data transmission system
CN108769981A (en) A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption
JP2009510644A (en) Method and configuration for secure authentication
CN101467430A (en) Portable telecommunication apparatus
CN101616003B (en) Password-protecting system and method
CN109151820A (en) One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 "
CN107864124B (en) Terminal information security protection method, terminal and Bluetooth lock
CN100353787C (en) Security guarantee for memory data information of mobile terminal
CN105868975B (en) Management method, management system and the mobile terminal of electronic banking account
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN112398816A (en) Transaction identification and verification system based on block chain
CN110298149A (en) Account permission locking means, device, computer equipment and storage medium
US7177425B2 (en) Device and method for securing information associated with a subscriber in a communication apparatus
CN101262669B (en) A secure guarantee method for information stored in a mobile terminal
CN108667801A (en) A kind of Internet of Things access identity safety certifying method and system
WO2018137309A1 (en) Wireless communication processing method and device
CN108512858A (en) Realize the dynamic input system and method for static password
JP2001312477A (en) System, device, and method for authentication
CN104010306A (en) Mobile device user identity authentication system and method
CN115547441B (en) Safety acquisition method and system based on personal health medical data
CN106778334A (en) The guard method of account information and mobile terminal
JP4303952B2 (en) Multiple authentication system, computer program, and multiple authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20181106

WW01 Invention patent application withdrawn after publication