CN109041059B - Mobile terminal security authentication method, management and control platform and mobile terminal - Google Patents
Mobile terminal security authentication method, management and control platform and mobile terminal Download PDFInfo
- Publication number
- CN109041059B CN109041059B CN201810967551.3A CN201810967551A CN109041059B CN 109041059 B CN109041059 B CN 109041059B CN 201810967551 A CN201810967551 A CN 201810967551A CN 109041059 B CN109041059 B CN 109041059B
- Authority
- CN
- China
- Prior art keywords
- information
- mobile terminal
- identification information
- registration
- user identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a mobile terminal security authentication method, a management and control platform and a mobile terminal. The mobile terminal security authentication method comprises the following steps: receiving information to be verified sent by a mobile terminal; the information to be verified comprises identification information of the mobile terminal, identification information of the memory card, SIM card information and user identity authentication information; verifying information to be verified; and sending a verification result to the mobile terminal, and managing and controlling the operation of the mobile terminal according to the verification result. According to the mobile terminal safety authentication method, authenticity verification is carried out on the identification information of the mobile terminal, the identification information of the memory card, the SIM card information and the user identity authentication information, multiple safety authentications of the mobile terminal are achieved, operation of the mobile terminal is controlled according to a verification result, and the use safety of the mobile terminal can be ensured in a higher intensity mode.
Description
Technical Field
The invention relates to the technical field of communication, in particular to a mobile terminal security authentication method, a management and control platform and a mobile terminal.
Background
In professional mobile terminal devices used in some special industries, due to the sensitivity of service applications and information contents in the terminal devices (e.g., law enforcement devices, payment devices, etc.), a high-strength security authentication mechanism is required to ensure the security of the professional mobile terminal during the use process.
The traditional security authentication mechanism of a professional mobile terminal usually only authenticates the identity information of a user, for example, the operation of the mobile terminal is authenticated safely by inputting a password or fingerprint information by the user; when the professional mobile terminal equipment is lost, the risk caused by the internal data leakage of the equipment can be ensured only by a manual reporting and stopping mode (manual reporting and stopping request). The current professional mobile terminal has single safety authentication means and lacks a systematic safety guarantee mode.
How to perform more secure authentication on a professional mobile terminal to ensure the use security thereof has become a problem to be solved urgently at present.
Disclosure of Invention
Aiming at the technical problems in the prior art, the invention provides a mobile terminal security authentication method, a management and control platform and a mobile terminal. The mobile terminal safety authentication method realizes multiple safety authentications of the mobile terminal, controls the operation of the mobile terminal according to the verification result, and can ensure the use safety of the mobile terminal with higher intensity.
The invention provides a mobile terminal security authentication method, which comprises the following steps:
receiving information to be verified sent by a mobile terminal; the information to be verified comprises identification information of the mobile terminal, identification information of a memory card, SIM card information and user identity authentication information;
verifying the information to be verified;
and sending a verification result to the mobile terminal, and controlling the operation of the mobile terminal according to the verification result.
Preferably, the verifying the information to be verified includes:
comparing the information to be verified with the information of the mobile terminal prestored in an information table; the information of the mobile terminal prestored in the information table comprises registration identification information of the mobile terminal, registration memory card identification information, registration SIM card information and registration user identity authentication information;
and judging whether the identification information is consistent with the registration identification information, the storage card identification information is consistent with the registration storage card identification information, the SIM card information is consistent with the registration SIM card information, and the user identity authentication information is consistent with the registration user identity authentication information.
Preferably, the sending the verification result to the mobile terminal and controlling the operation of the mobile terminal according to the verification result includes:
when the identification information is judged to be consistent with the registration identification information, the storage card identification information is judged to be consistent with the registration storage card identification information, the SIM card information is judged to be consistent with the registration SIM card information, and the user identity authentication information is judged to be consistent with the registration user identity authentication information, verification success information is sent to the mobile terminal, and normal operation of the mobile terminal is controlled;
when judging that at least one of the identification information and the registration identification information, the storage card identification information and the registration storage card identification information, and the SIM card information and the registration SIM card information is inconsistent, sending authentication failure information to the mobile terminal, prohibiting the mobile terminal from performing any operation, and clearing all local data of the mobile terminal;
and when the user identity authentication information is judged to be inconsistent with the registered user identity authentication information, sending verification failure information to the mobile terminal, and forbidding the mobile terminal to perform any operation.
The invention also provides a mobile terminal security authentication method, which comprises the following steps:
the mobile terminal sends information to be verified to the control platform; the information to be verified comprises identification information of the mobile terminal, identification information of a memory card, SIM card information and user identity authentication information;
and receiving a verification result returned by the control platform, and executing operation according to a control instruction sent by the control platform.
Preferably, the mobile terminal sends the information to be verified to the management and control platform when the mobile terminal is powered on and/or any one of the identification information, the storage card identification information, the SIM card information and the user identity authentication information of the mobile terminal is changed.
The invention also provides a management and control platform, comprising:
the first receiving module is used for receiving information to be verified sent by the mobile terminal; the information to be verified comprises identification information of the mobile terminal, identification information of a memory card, SIM card information and user identity authentication information;
the verification module is used for verifying the information to be verified;
and the management and control module is used for sending a verification result to the mobile terminal and managing and controlling the operation of the mobile terminal according to the verification result.
Preferably, the verification module comprises:
the comparison unit is used for comparing the information to be verified with the information of the mobile terminal prestored in an information table; the information of the mobile terminal prestored in the information table comprises registration identification information of the mobile terminal, registration memory card identification information, registration SIM card information and registration user identity authentication information;
and the judging unit is used for judging whether the identification information is consistent with the registration identification information, the storage card identification information is consistent with the registration storage card identification information, the SIM card information is consistent with the registration SIM card information, and the user identity authentication information is consistent with the registration user identity authentication information.
Preferably, the management and control module includes:
the first control unit is used for sending verification success information to the mobile terminal and controlling the normal operation of the mobile terminal when the judgment result of the judgment unit is that the identification information is consistent with the registration identification information, the storage card identification information is consistent with the registration storage card identification information, the SIM card information is consistent with the registration SIM card information, and the user identity authentication information is consistent with the registration user identity authentication information;
a second management and control unit, configured to send authentication failure information to the mobile terminal, prohibit the mobile terminal from performing any operation, and clear all local data of the mobile terminal when a determination result of the determining unit is that at least one of the identifier information is inconsistent with the registration identifier information, the memory card identifier information is inconsistent with the registration memory card identifier information, and the SIM card information is inconsistent with the registration SIM card information;
and the third control unit is used for sending verification failure information to the mobile terminal and forbidding the mobile terminal to perform any operation when the judgment result of the judgment unit is that the user identity authentication information is inconsistent with the registered user identity authentication information.
The present invention also provides a mobile terminal, comprising:
the sending module is used for sending information to be verified to the control platform; the information to be verified comprises identification information of the mobile terminal, identification information of a memory card, SIM card information and user identity authentication information;
and the second receiving module is used for receiving the verification result returned by the control platform and executing operation according to the control instruction sent by the control platform.
Preferably, the sending module is configured to send the information to be verified to the management and control platform when the mobile terminal is powered on and/or any one of the identification information of the mobile terminal, the identification information of the memory card, the SIM card information, and the user identity authentication information is changed.
The invention has the beneficial effects that: according to the mobile terminal safety authentication method, the control platform and the mobile terminal, authenticity verification is carried out on the identification information of the mobile terminal, the identification information of the memory card, the SIM card information and the user identity authentication information, multiple safety authentications of the mobile terminal are achieved, operation of the mobile terminal is controlled according to verification results, and the use safety of the mobile terminal can be ensured in a higher intensity mode.
Drawings
Fig. 1 is a flowchart of a security authentication method for a mobile terminal in embodiment 1 of the present invention;
fig. 2 is a flowchart of a security authentication method for a mobile terminal according to embodiment 2 of the present invention;
fig. 3 is a schematic block diagram of a management platform in embodiment 3 of the present invention;
fig. 4 is a flowchart of a security authentication method for a mobile terminal according to embodiment 4 of the present invention;
fig. 5 is a schematic block diagram of a mobile terminal in embodiment 5 of the present invention.
Wherein the reference numbers indicate:
1. a first receiving module; 2. a verification module; 21. a comparison unit; 22. a judgment unit; 3. a management and control module; 31. a first management and control unit; 32. a second management and control unit; 33. a third management and control unit; 4. a sending module; 5. and a second receiving module.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the following describes in detail a mobile terminal security authentication method, a management and control platform, and a mobile terminal provided by the present invention with reference to the accompanying drawings and the detailed description.
Example 1:
the embodiment provides a security authentication method for a mobile terminal, as shown in fig. 1, including:
step S10: and receiving information to be verified sent by the mobile terminal. The information to be verified comprises identification information of the mobile terminal, identification information of the memory card, SIM card information and user identity authentication information.
In the step, the identification information of the Mobile terminal is an International Mobile Equipment Identity (IMEI), and the Mobile Equipment is identified through the Identity, so that the uniqueness and the authenticity of the Mobile terminal Equipment are ensured. The memory card identification information of the mobile terminal is that when the memory card of the mobile terminal is registered for the first time, the remote control platform loads the issued certificate into the memory card, and the certificate is issued once and cannot be tampered; the safety of the memory card is guaranteed through the certification of the certificate and the remote control platform. The SIM card information of the Mobile terminal is an International Mobile Subscriber Identity (IMSI), and the SIM card in the Mobile equipment is identified through the IMSI, so that the validity and the authenticity of the SIM card are ensured. The user identity authentication information of the mobile terminal is that the mobile equipment verifies the identity of a user through fingerprint identification, password authentication and face identification technologies of the user, so that the safety of the use permission of the mobile equipment is ensured.
The identification information of the mobile terminal, the identification information of the memory card, the information of the SIM card and the authentication information of the user identity need to be registered in the remote control platform in advance.
Step S11: and verifying the information to be verified.
In this step, the authenticity of the information to be verified is verified.
Step S12: and sending a verification result to the mobile terminal, and managing and controlling the operation of the mobile terminal according to the verification result.
In this embodiment, the mobile terminal includes a professional mobile terminal, that is, the service application and the information content of the mobile terminal have strong sensitivity and confidentiality, such as law enforcement equipment and payment equipment.
According to the mobile terminal safety authentication method, authenticity verification is carried out on the identification information of the mobile terminal, the identification information of the memory card, the SIM card information and the user identity authentication information, multiple safety authentications of the mobile terminal are achieved, operation of the mobile terminal is controlled according to a verification result, and the use safety of the mobile terminal can be ensured in a higher intensity mode.
Example 2:
on the basis of embodiment 1, this embodiment provides a mobile terminal security authentication method, as shown in fig. 2, including:
step S10: and receiving information to be verified sent by the mobile terminal. The information to be verified comprises identification information of the mobile terminal, identification information of the memory card, SIM card information and user identity authentication information.
In the step, the identification information of the Mobile terminal is an International Mobile Equipment Identity (IMEI), and the Mobile Equipment is identified through the Identity, so that the uniqueness and the authenticity of the Mobile terminal Equipment are ensured. The memory card identification information of the mobile terminal is that when the memory card of the mobile terminal is registered for the first time, the remote control platform loads the issued certificate into the memory card, and the certificate is issued once and cannot be tampered; the safety of the memory card is guaranteed through the certification of the certificate and the remote control platform. The SIM card information of the Mobile terminal is an International Mobile Subscriber Identity (IMSI), and the SIM card in the Mobile equipment is identified through the IMSI, so that the validity and the authenticity of the SIM card are ensured. The user identity authentication information of the mobile terminal is that the mobile equipment verifies the identity of a user through fingerprint identification, password authentication and face identification technologies of the user, so that the safety of the use permission of the mobile equipment is ensured.
The identification information of the mobile terminal, the identification information of the memory card, the information of the SIM card and the authentication information of the user identity need to be registered in the remote control platform in advance.
Step S11: and verifying the information to be verified.
The method specifically comprises the following steps: step S110: and comparing the information to be verified with the information of the mobile terminal prestored in the information table. The information of the mobile terminal pre-stored in the information table comprises registration identification information of the mobile terminal, registration memory card identification information, registration SIM card information and registration user identity authentication information.
Step S111: and judging whether the identification information is consistent with the registered identification information, the storage card identification information is consistent with the registered storage card identification information, the SIM card information is consistent with the registered SIM card information, and the user identity authentication information is consistent with the registered user identity authentication information.
Step S12: and sending a verification result to the mobile terminal, and managing and controlling the operation of the mobile terminal according to the verification result.
The method specifically comprises the following steps:
when the identification information is judged to be consistent with the registered identification information, the storage card identification information is judged to be consistent with the registered storage card identification information, the SIM card information is judged to be consistent with the registered SIM card information, and the user identity authentication information is judged to be consistent with the registered user identity authentication information, the step S120 is executed: and sending verification success information to the mobile terminal, and managing and controlling the normal operation of the mobile terminal.
When it is determined that at least one of the identification information and the registration identification information, the memory card identification information and the registration memory card identification information, and the SIM card information and the registration SIM card information is inconsistent, step S121 is executed: and sending authentication failure information to the mobile terminal, prohibiting the mobile terminal from performing any operation, and clearing all data local to the mobile terminal.
In the judging step, for example: when the SIM card built in the mobile terminal is abnormally changed, the network is activated again due to the SIM card replacement, and in the network activation process, the corresponding relationship between the IMSI, the IMEI, and the memory card certificate used by the current mobile terminal needs to be sent to the remote management and control platform for security verification. After the SIM card is abnormally replaced, because the IMSI information changes and cannot pass the safety verification, the behavior is marked as the abnormal change of the SIM card, all local data of the mobile terminal are automatically cleared, the mobile terminal is locked, and the mobile terminal cannot be used continuously, so that the data safety of the mobile terminal is ensured.
Similarly, when the memory card in the mobile terminal is abnormally changed, the memory card certificate information used by the current mobile terminal is periodically and frequently verified, and as the memory card certificate is issued once and cannot be tampered, when the memory card is changed, the replaced memory card cannot pass the verification of the memory card certificate, the behavior is marked as memory card abnormality, all local data of the mobile terminal is automatically cleared, the mobile terminal is locked, the mobile terminal cannot be continuously used, and the data safety of the mobile terminal is ensured.
When it is determined that the user authentication information is inconsistent with the registered user authentication information, step S122 is executed: and sending authentication failure information to the mobile terminal, and forbidding the mobile terminal to perform any operation.
In the judging step, for example: when the user identity authentication information is continuously input for more than 3 times within 2 minutes, if the user identity authentication information cannot pass the safety authentication (namely the user identity authentication information is inconsistent with the registered user identity authentication information), the behavior is marked as user authentication abnormity, a locking operation is triggered, the mobile terminal is locked, the mobile terminal cannot be used continuously, and the mobile terminal can be recovered to be normally used after being unlocked through the remote control platform.
The beneficial effects of the embodiments 1-2 are that the mobile terminal security authentication method provided by the embodiments 1-2 realizes multiple security authentications for the mobile terminal by performing authenticity verification on the identification information of the mobile terminal, the identification information of the memory card, the information of the SIM card, and the user identity authentication information, controls the operation of the mobile terminal according to the verification result, and can ensure the use security of the mobile terminal with higher intensity.
Example 3:
based on the mobile terminal security authentication method provided in embodiment 2, this embodiment provides a management and control platform, as shown in fig. 3, including: the first receiving module 1 is configured to receive information to be verified sent by the mobile terminal. The information to be verified comprises identification information of the mobile terminal, identification information of the memory card, SIM card information and user identity authentication information. And the verification module 2 is used for verifying the information to be verified. And the management and control module 3 is used for sending the verification result to the mobile terminal and managing and controlling the operation of the mobile terminal according to the verification result.
This management and control platform can carry out authenticity verification to mobile terminal's identification information, memory card identification information, SIM card information and user authentication information through setting up first receiving module 1 and verification module 2, has realized multiple security authentication to mobile terminal, manages and controls mobile terminal's operation according to the verification result, can ensure the security that mobile terminal used more intensely.
Wherein, the verification module 2 comprises: the comparing unit 21 is configured to compare the information to be verified with information of the mobile terminal pre-stored in the information table. The information of the mobile terminal pre-stored in the information table comprises registration identification information of the mobile terminal, registration memory card identification information, registration SIM card information and registration user identity authentication information. And a judging unit 22, configured to judge whether the identification information is consistent with the registration identification information, the memory card identification information is consistent with the registered memory card identification information, the SIM card information is consistent with the registered SIM card information, and the user identity authentication information is consistent with the registered user identity authentication information.
In this embodiment, the management and control module 3 includes: the first control unit 31 is configured to send verification success information to the mobile terminal and control normal operation of the mobile terminal when the determination result of the determining unit 22 is that the identification information is consistent with the registration identification information, the memory card identification information is consistent with the registration memory card identification information, the SIM card information is consistent with the registration SIM card information, and the user identity authentication information is consistent with the registration user identity authentication information. And a second control unit 32, configured to send authentication failure information to the mobile terminal, prohibit the mobile terminal from performing any operation, and clear all local data of the mobile terminal when the determination result of the determining unit 22 is that at least one of the identifier information and the registration identifier information, the memory card identifier information and the registration memory card identifier information, and the SIM card information and the registration SIM card information is inconsistent. And a third control unit 33, configured to send verification failure information to the mobile terminal and prohibit the mobile terminal from performing any operation when the determination result of the determining unit 22 is that the user identity authentication information is inconsistent with the registered user identity authentication information.
The management and control platform can verify the authenticity of the identification information, the storage card identification information, the SIM card information and the user identity authentication information of the mobile terminal by arranging the first receiving module, the verification module and the management and control module, so that multiple safety authentications to the mobile terminal are realized, the operation of the mobile terminal is managed and controlled according to the verification result, and the use safety of the mobile terminal can be ensured with higher intensity.
Example 4:
the present embodiment provides a mobile terminal security authentication method, as shown in fig. 4, including: step S20: and the mobile terminal sends information to be verified to the control platform. The information to be verified comprises identification information of the mobile terminal, identification information of the memory card, SIM card information and user identity authentication information.
Step S21: and receiving a verification result returned by the management and control platform, and executing operation according to the management and control instruction sent by the management and control platform.
Wherein the mobile terminal performs steps S20-S21 through the security authentication APP installed thereon.
In this embodiment, the mobile terminal sends the information to be verified to the management and control platform when the mobile terminal is started up each time and/or any one of the identification information of the mobile terminal, the identification information of the memory card, the information of the SIM card and the user identity authentication information is changed, so that the mobile terminal is safely authenticated when the mobile terminal is started up each time and/or any one of the identification information of the mobile terminal, the identification information of the memory card, the information of the SIM card and the user identity authentication information is changed, and the safety of data on the mobile terminal is ensured.
In this embodiment, the mobile terminal includes a professional mobile terminal, that is, the service application and the information content of the mobile terminal have strong sensitivity and confidentiality, such as law enforcement equipment and payment equipment.
According to the mobile terminal security authentication method provided by the embodiment, the mobile terminal sends information to be authenticated to the management and control platform, receives the authentication result returned by the management and control platform, and executes operation according to the management and control instruction sent by the management and control platform, so that authenticity authentication can be performed on the identification information of the mobile terminal, the identification information of the memory card, the SIM card information and the user identity authentication information, multiple security authentications of the mobile terminal are realized, the operation of the mobile terminal is managed and controlled according to the authentication result, and the use security of the mobile terminal can be ensured at higher intensity.
Example 5:
based on the mobile terminal security authentication method provided in embodiment 4, this embodiment provides a mobile terminal, as shown in fig. 5, including: and the sending module 4 is used for sending the information to be verified to the control platform. The information to be verified comprises identification information of the mobile terminal, identification information of the memory card, SIM card information and user identity authentication information. And the second receiving module 5 is configured to receive the verification result returned by the management and control platform, and execute an operation according to the management and control instruction sent by the management and control platform.
The sending module 4 is configured to send information to be verified to the management and control platform when the mobile terminal is powered on and/or any one of the identification information of the mobile terminal, the identification information of the memory card, the information of the SIM card, and the user identity authentication information is changed.
The mobile terminal can verify the authenticity of the identification information, the identification information of the memory card, the identification information of the SIM card and the authentication information of the user identity by arranging the sending module and the second receiving module, so that multiple safety authentications of the mobile terminal are realized, the operation of the mobile terminal is controlled according to the verification result, and the use safety of the mobile terminal can be ensured with higher intensity.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.
Claims (8)
1. A mobile terminal security authentication method is characterized by comprising the following steps:
receiving information to be verified sent by a mobile terminal; the information to be verified comprises identification information of the mobile terminal, identification information of a memory card, SIM card information and user identity authentication information;
verifying the information to be verified;
sending a verification result to the mobile terminal, and controlling the operation of the mobile terminal according to the verification result;
the verifying the information to be verified comprises:
comparing the information to be verified with the information of the mobile terminal prestored in an information table; the information of the mobile terminal prestored in the information table comprises registration identification information of the mobile terminal, registration memory card identification information, registration SIM card information and registration user identity authentication information; the memory card identification information is loaded in the memory card by the management and control platform when the memory card of the mobile terminal is registered for the first time;
and judging whether the identification information is consistent with the registration identification information, the storage card identification information is consistent with the registration storage card identification information, the SIM card information is consistent with the registration SIM card information, and the user identity authentication information is consistent with the registration user identity authentication information.
2. The method for security authentication of a mobile terminal according to claim 1, wherein the sending of the verification result to the mobile terminal and the controlling of the operation of the mobile terminal according to the verification result comprise:
when the identification information is judged to be consistent with the registration identification information, the storage card identification information is judged to be consistent with the registration storage card identification information, the SIM card information is judged to be consistent with the registration SIM card information, and the user identity authentication information is judged to be consistent with the registration user identity authentication information, verification success information is sent to the mobile terminal, and normal operation of the mobile terminal is controlled;
when judging that at least one of the identification information and the registration identification information, the storage card identification information and the registration storage card identification information, and the SIM card information and the registration SIM card information is inconsistent, sending authentication failure information to the mobile terminal, prohibiting the mobile terminal from performing any operation, and clearing all local data of the mobile terminal;
and when the user identity authentication information is judged to be inconsistent with the registered user identity authentication information, sending verification failure information to the mobile terminal, and forbidding the mobile terminal to perform any operation.
3. A mobile terminal security authentication method is characterized by comprising the following steps:
the mobile terminal sends information to be verified to the control platform; the information to be verified comprises identification information of the mobile terminal, identification information of a memory card, SIM card information and user identity authentication information, so that the management and control platform verifies the information to be verified, wherein the verification of the information to be verified comprises the following steps: comparing the information to be verified with the information of the mobile terminal prestored in an information table; the information of the mobile terminal prestored in the information table comprises registration identification information of the mobile terminal, registration memory card identification information, registration SIM card information and registration user identity authentication information; the memory card identification information is loaded in the memory card by the management and control platform when the memory card of the mobile terminal is registered for the first time; judging whether the identification information is consistent with the registration identification information, the storage card identification information is consistent with the registration storage card identification information, the SIM card information is consistent with the registration SIM card information, and the user identity authentication information is consistent with the registration user identity authentication information;
and receiving a verification result returned by the control platform, and executing operation according to a control instruction sent by the control platform.
4. The mobile terminal security authentication method according to claim 3, wherein the mobile terminal sends the information to be verified to the management and control platform each time the mobile terminal is powered on and/or any one of the identification information of the mobile terminal, the identification information of the memory card, the information of the SIM card, and the user identity authentication information is changed.
5. A management platform, comprising:
the first receiving module is used for receiving information to be verified sent by the mobile terminal; the information to be verified comprises identification information of the mobile terminal, identification information of a memory card, SIM card information and user identity authentication information;
the verification module is used for verifying the information to be verified;
the management and control module is used for sending a verification result to the mobile terminal and managing and controlling the operation of the mobile terminal according to the verification result;
the authentication module includes:
the comparison unit is used for comparing the information to be verified with the information of the mobile terminal prestored in an information table; the information of the mobile terminal prestored in the information table comprises registration identification information of the mobile terminal, registration memory card identification information, registration SIM card information and registration user identity authentication information; the memory card identification information is loaded in the memory card by the management and control platform when the memory card of the mobile terminal is registered for the first time;
and the judging unit is used for judging whether the identification information is consistent with the registration identification information, the storage card identification information is consistent with the registration storage card identification information, the SIM card information is consistent with the registration SIM card information, and the user identity authentication information is consistent with the registration user identity authentication information.
6. The management and control platform according to claim 5, wherein the management and control module comprises:
the first control unit is used for sending verification success information to the mobile terminal and controlling the normal operation of the mobile terminal when the judgment result of the judgment unit is that the identification information is consistent with the registration identification information, the storage card identification information is consistent with the registration storage card identification information, the SIM card information is consistent with the registration SIM card information, and the user identity authentication information is consistent with the registration user identity authentication information;
a second management and control unit, configured to send authentication failure information to the mobile terminal, prohibit the mobile terminal from performing any operation, and clear all local data of the mobile terminal when a determination result of the determining unit is that at least one of the identifier information is inconsistent with the registration identifier information, the memory card identifier information is inconsistent with the registration memory card identifier information, and the SIM card information is inconsistent with the registration SIM card information;
and the third control unit is used for sending verification failure information to the mobile terminal and forbidding the mobile terminal to perform any operation when the judgment result of the judgment unit is that the user identity authentication information is inconsistent with the registered user identity authentication information.
7. A mobile terminal, comprising:
the sending module is used for sending information to be verified to the control platform; the information to be verified comprises identification information of the mobile terminal, identification information of a memory card, SIM card information and user identity authentication information, so that the management and control platform verifies the information to be verified, wherein the verification of the information to be verified comprises the following steps: comparing the information to be verified with the information of the mobile terminal prestored in an information table; the information of the mobile terminal prestored in the information table comprises registration identification information of the mobile terminal, registration memory card identification information, registration SIM card information and registration user identity authentication information; the memory card identification information is loaded in the memory card by the management and control platform when the memory card of the mobile terminal is registered for the first time; judging whether the identification information is consistent with the registration identification information, the storage card identification information is consistent with the registration storage card identification information, the SIM card information is consistent with the registration SIM card information, and the user identity authentication information is consistent with the registration user identity authentication information;
and the second receiving module is used for receiving the verification result returned by the control platform and executing operation according to the control instruction sent by the control platform.
8. The mobile terminal according to claim 7, wherein the sending module is configured to send the to-be-verified information to the management and control platform each time the mobile terminal is powered on and/or any one of the identification information of the mobile terminal, the identification information of the memory card, the SIM card information, and the user identity authentication information is changed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810967551.3A CN109041059B (en) | 2018-08-23 | 2018-08-23 | Mobile terminal security authentication method, management and control platform and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810967551.3A CN109041059B (en) | 2018-08-23 | 2018-08-23 | Mobile terminal security authentication method, management and control platform and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109041059A CN109041059A (en) | 2018-12-18 |
CN109041059B true CN109041059B (en) | 2022-01-21 |
Family
ID=64628131
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810967551.3A Active CN109041059B (en) | 2018-08-23 | 2018-08-23 | Mobile terminal security authentication method, management and control platform and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109041059B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109041059B (en) * | 2018-08-23 | 2022-01-21 | 中国联合网络通信集团有限公司 | Mobile terminal security authentication method, management and control platform and mobile terminal |
CN111182536A (en) * | 2019-12-30 | 2020-05-19 | 中移(杭州)信息技术有限公司 | SIM card state detection method, device, network equipment and storage medium |
CN111400699B (en) * | 2020-06-04 | 2020-09-25 | 北京云迹科技有限公司 | Terminal verification method, device and system and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101494854A (en) * | 2009-03-02 | 2009-07-29 | 深圳华为通信技术有限公司 | Method, system and equipment for preventing SIM LOCK from being unlocked illegally |
CN101616495A (en) * | 2008-06-23 | 2009-12-30 | 网秦无限(北京)科技有限公司 | The method and system of individual privacy in the protection mobile phone |
CN102711108A (en) * | 2012-06-07 | 2012-10-03 | 北京慧眼智行科技有限公司 | Method and system for managing the authentication information of mobile terminal |
CN102984689A (en) * | 2012-11-21 | 2013-03-20 | 东莞宇龙通信科技有限公司 | System and method for verifying mobile terminal |
CN103220637A (en) * | 2012-01-19 | 2013-07-24 | 腾讯科技(深圳)有限公司 | Mobile phone anti-theft protection method and mobile phone anti-theft protection device |
CN106961678A (en) * | 2017-04-13 | 2017-07-18 | 上海与德科技有限公司 | A kind of method, mobile terminal and service end for preventing mobile terminal stolen |
CN108696870A (en) * | 2018-04-26 | 2018-10-23 | 越亮传奇科技股份有限公司 | A kind of mobile terminal authentication method based on SWP-SIM technologies |
CN109041059A (en) * | 2018-08-23 | 2018-12-18 | 中国联合网络通信集团有限公司 | A kind of mobile terminal safety authentication method, control platform and mobile terminal |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102811280A (en) * | 2011-06-03 | 2012-12-05 | 上海晨兴希姆通电子科技有限公司 | Information backup system and method of mobile terminal |
CN104540123B (en) * | 2015-01-07 | 2018-10-16 | 北卡科技有限公司 | The method and system of mobile terminal significant data encrypted backup and safety deleting |
CN104834872A (en) * | 2015-06-01 | 2015-08-12 | 上海斐讯数据通信技术有限公司 | Mobile terminal antitheft control system and method |
CN106921799A (en) * | 2017-02-24 | 2017-07-04 | 深圳市金立通信设备有限公司 | A kind of mobile terminal safety means of defence and mobile terminal |
-
2018
- 2018-08-23 CN CN201810967551.3A patent/CN109041059B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101616495A (en) * | 2008-06-23 | 2009-12-30 | 网秦无限(北京)科技有限公司 | The method and system of individual privacy in the protection mobile phone |
CN101494854A (en) * | 2009-03-02 | 2009-07-29 | 深圳华为通信技术有限公司 | Method, system and equipment for preventing SIM LOCK from being unlocked illegally |
CN103220637A (en) * | 2012-01-19 | 2013-07-24 | 腾讯科技(深圳)有限公司 | Mobile phone anti-theft protection method and mobile phone anti-theft protection device |
CN102711108A (en) * | 2012-06-07 | 2012-10-03 | 北京慧眼智行科技有限公司 | Method and system for managing the authentication information of mobile terminal |
CN102984689A (en) * | 2012-11-21 | 2013-03-20 | 东莞宇龙通信科技有限公司 | System and method for verifying mobile terminal |
CN106961678A (en) * | 2017-04-13 | 2017-07-18 | 上海与德科技有限公司 | A kind of method, mobile terminal and service end for preventing mobile terminal stolen |
CN108696870A (en) * | 2018-04-26 | 2018-10-23 | 越亮传奇科技股份有限公司 | A kind of mobile terminal authentication method based on SWP-SIM technologies |
CN109041059A (en) * | 2018-08-23 | 2018-12-18 | 中国联合网络通信集团有限公司 | A kind of mobile terminal safety authentication method, control platform and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN109041059A (en) | 2018-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101216306B1 (en) | Updating configuration parameters in a mobile terminal | |
CN109041059B (en) | Mobile terminal security authentication method, management and control platform and mobile terminal | |
CN102027480B (en) | System and method for providing a system management command | |
CN111835689B (en) | Identity authentication method of digital key, terminal device and medium | |
EP2579220A1 (en) | Entrance guard control method and system thereof | |
EP2530964B1 (en) | Method and device for terminal network locking | |
US20140025964A1 (en) | Mobile terminal encryption method, hardware encryption device and mobile terminal | |
CN107231346A (en) | A kind of method of cloud platform identification | |
RU2523927C2 (en) | Checking configuration modification for ied | |
US9767264B2 (en) | Apparatus, method for controlling apparatus, and program | |
KR20160121775A (en) | THIRD PARTY'S SECURITY AUTHENTICATION SYSTEM BETWEEN MOBILE DEVICE AND IoT DEVICES AND METHOD THEREOF | |
CN106027467B (en) | A kind of identity card reading response system | |
CN109496443B (en) | Mobile authentication method and system therefor | |
CN108959973A (en) | A kind of guard method and system refreshed for BMC firmware | |
CN105282166A (en) | Identity authentication method and system for linux operating system | |
CN110839215B (en) | Cluster communication method, server, terminal equipment and storage medium | |
CN113763602A (en) | Information processing apparatus, information processing method, and non-transitory storage medium | |
CN114157438A (en) | Network equipment management method and device and computer readable storage medium | |
JP6344170B2 (en) | Device, management module, program, and control method | |
CN111090841A (en) | Authentication method and device for industrial control system | |
CN101394394A (en) | Centralized authentication access mode for cipher server | |
KR102201218B1 (en) | Access control system and method to security engine of mobile terminal | |
WO2020034162A1 (en) | Trunking communication method, server, terminal device and storage medium | |
CN107819786B (en) | QQ authentication-based operating system login system and method | |
BR112021013966A2 (en) | DEVICE, METHOD AND COMPUTER PROGRAM PRODUCT FOR CLAIMS MANAGEMENT DEVICE BLOCK |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |