CN112019684A - Control method and electronic device - Google Patents
Control method and electronic device Download PDFInfo
- Publication number
- CN112019684A CN112019684A CN202010795643.5A CN202010795643A CN112019684A CN 112019684 A CN112019684 A CN 112019684A CN 202010795643 A CN202010795643 A CN 202010795643A CN 112019684 A CN112019684 A CN 112019684A
- Authority
- CN
- China
- Prior art keywords
- identification module
- electronic equipment
- electronic device
- customer identification
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
- H04M1/673—Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
Abstract
The application discloses a control method and electronic equipment. The control method is used for controlling the electronic equipment, and the electronic equipment is used for setting the customer identification module. The control method comprises the following steps: processing the information protection instruction to determine whether to destroy the client identification module when the information protection instruction is received; when the customer identification module is determined to be destroyed, controlling the electronic equipment to verify the personal identification code of the customer identification module and input an incorrect identification code so as to enable the customer identification module to enter a state to be unlocked; and under the state of waiting to be unlocked, controlling the electronic equipment to input an incorrect unlocking password so as to enable the client identification module to enter a scrapped state. Therefore, the customer identification module enters the scrapped state through the mode of automatically inputting the wrong identification password and unlocking the password, and the scrapped state of the customer identification module is irreversible, so that the information in the customer identification module can be effectively prevented from being cracked, and the safety of the user information is high.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a control method and an electronic device.
Background
When the mobile phone is lost, the leakage of the related information in the mobile phone can be prevented in a specific mode. In the related technology, because the adopted modes are common, the related information can be easily identified after being cracked, and therefore, a large information leakage risk still exists.
Disclosure of Invention
The application provides a control method and electronic equipment.
The control method of the embodiment of the application can be used for electronic equipment, wherein the electronic equipment is used for setting a customer identification module, and the control method comprises the following steps: processing an information protection instruction to determine whether to destroy the customer identification module upon receipt of the information protection instruction; when the customer identification module is determined to be destroyed, controlling the electronic equipment to verify the personal identification code of the customer identification module and input an incorrect identification code so as to enable the customer identification module to enter a state to be unlocked; and under the state to be unlocked, controlling the electronic equipment to input an incorrect unlocking password so as to enable the customer identification module to enter a scrapped state.
The electronic device of the embodiment of the application comprises a client identification module and a processor, wherein the processor is used for: processing an information protection instruction to determine whether to destroy the customer identification module upon receipt of the information protection instruction; when the customer identification module is determined to be destroyed, controlling the electronic equipment to verify the personal identification code of the customer identification module and input an incorrect identification code so as to enable the customer identification module to enter a state to be unlocked; and under the state to be unlocked, controlling the electronic equipment to input an incorrect unlocking password so as to enable the customer identification module to enter a scrapped state.
According to the control method and the electronic equipment, the client identification module enters the scrapped state through the mode of automatically inputting the wrong identification password and the unlocking password, and the scrapped state of the client identification module is irreversible, so that the information in the client identification module can be effectively prevented from being cracked, and the safety of the user information is high.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flow chart of a control method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
FIG. 3 is another schematic flow chart diagram of a control method according to an embodiment of the present application;
FIG. 4 is a schematic flow chart of a control method according to an embodiment of the present application;
FIG. 5 is a further schematic flow chart of a control method according to an embodiment of the present application;
the main characteristic reference numbers:
an electronic device 100;
a client identification module 200.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
The following disclosure provides many different embodiments or examples for implementing different features of the application. In order to simplify the disclosure of the present application, specific example components and arrangements are described below. Of course, they are merely examples and are not intended to limit the present application. Moreover, the present application may repeat reference numerals and/or letters in the various examples, such repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed.
In the description herein, reference to the description of the terms "one embodiment," "some embodiments," "an illustrative embodiment," "an example," "a specific example" or "some examples" or the like means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Referring to fig. 1 and fig. 2, a control method according to an embodiment of the present application may be applied to an electronic device 100, where the electronic device 100 is used to set a client identification module 200, and the control method includes:
01, upon receiving the information protection instruction, processing the information protection instruction to determine whether to destroy the client identification module 200;
02, when it is determined to destroy the customer identification module 200, controlling the electronic device 100 to verify a personal identification number (PIN code) of the customer identification module 200 and input an incorrect identification number to cause the customer identification module 200 to enter a to-be-unlocked state;
03, in the to-be-unlocked state, controlling the electronic device 100 to input an incorrect unlocking password (PUK code) so as to enable the sim 200 to enter a disabled state.
The electronic device 100 of the embodiment of the present application includes a processor 10, a housing 20, and a display screen 30. The control method of the embodiment of the present application can be implemented by the electronic device 100 of the embodiment of the present application, wherein step 01, step 02 and step 03 can be implemented by the processor 10. That is, the processor 10 is configured to: upon receiving the information protection instruction, processing the information protection instruction to determine whether to destroy the client identification module 200; when it is determined to destroy the customer identification module 200, controlling the electronic device 100 to verify the personal identification code of the customer identification module 200 and input an incorrect identification code to cause the customer identification module 200 to enter a to-be-unlocked state; in the to-be-unlocked state, the electronic device 100 is controlled to input an incorrect unlocking password so that the sim 200 enters a disabled state.
The subscriber identity module 200 may refer to a SIM card, and the subscriber identity module 200 is disposed in the electronic device 100, as shown in fig. 2. The control method according to the embodiment of the present application is applied to the case where the electronic device 100 of the user and the client identification module 200 in the electronic device 100 are lost. Specifically, if the electronic device 100 of the user is lost and wants to remotely destroy the data in the client identification module 200 or the electronic device 100, an information protection instruction may be sent to the lost electronic device 100.
The information protection instruction may be a short message containing preset instruction content, and the processor 10 confirms the instruction content in the information protection instruction and processes the user data in the electronic device 100 and the client identification module 200 through the instruction content.
For example, after the user finds that the electronic device 100 is lost, in order to avoid the user data leakage therein, the user may use other electronic devices to compile the following short message to the lost electronic device 100 in order to destroy the client identification module 200:
abc_remote*S<0,1>
wherein abc _ remote is the content of the preset short message of the electronic device 100, and S is the command of whether to destroy the SIM. The command is followed by <0, 1> (the command is judged yes if the number in <0, 1> is 1 and the command is judged no if the number in <0, 1> is 0).
When the electronic device 100 receives the short message with the short header abc _ remote, it recognizes that the short message is a remote command short message, and determines that the content of the short message needs to be hidden and is not recognized by the user. Then, entering command identification, identifying the command and the number after the command is 1, the processor 10 determines that the electronic device 100 needs to enable the destruction client identification module 200, and then performs step 02 and step 03.
In step 02, the processor 10 controls the electronic device 100 to verify the personal identification number of the client identification module 200, and then randomly inputs an incorrect personal identification number to enable the client identification module 200 to enter a state to be unlocked. Since the state to be unlocked is a reversible state (which can be exited by inputting a correct unlocking password), step 03 is continued.
In step 03, in the to-be-unlocked state, the processor 10 controls the electronic device 100 to input an incorrect unlocking password to enable the sim 200 to enter a disabled state, which is irreversible (i.e., cannot exit the disabled state).
Therefore, the customer identification module 200 enters the scrapped state by automatically inputting the wrong identification password and the unlocking password, and the scrapped state of the customer identification module 200 is irreversible, so that the information in the customer identification module 200 is effectively prevented from being cracked, and the safety of the user information is improved.
In order to ensure the validity of the short message, the short message may be checked, for example, in the following manner: judging whether the short message contains the check code of the electronic equipment 100, determining that the short message meets the legality requirement when the check code passes, and continuously destroying the client identification module 200; when the check code fails to pass the check, it is determined that the short message does not satisfy the legitimacy requirement and the client identification module 200 cannot be destroyed. Thus, it is able to prevent a malicious person from sending a short message to interfere with the normal use of the electronic device 100.
In certain embodiments, step 02 comprises:
021, when it is determined to destroy the client identification module 200, controlling the electronic device 100 to verify the personal identification password and input a wrong identification password for a first predetermined number of times so as to make the client identification module 200 enter a state to be unlocked;
031, in the to-be-unlocked state, control the electronic device 100 to input a second predetermined number of wrong unlocking passwords to enable the customer identification module 200 to enter the disabled state.
In some embodiments, step 021 and step 031 may both be implemented by the processor 10, that is, the processor 10 may be configured to, when determining to destroy the client identification module 200, control the electronic device 100 to verify the personal identification code and input a wrong identification code for a first predetermined number of times so as to enable the client identification module 200 to enter the state to be unlocked; in the to-be-unlocked state, the electronic device 100 is controlled to input a second predetermined number of wrong unlocking passwords to enable the customer identification module 200 to enter the disabled state.
It should be noted that the preset rules of the client identification module 200 are as follows: when the misrecognition password is input for the first predetermined number of times, the sim 200 enters the unlock state. When the unlocking password is input for the second preset number of times in the state to be unlocked, the client identification module 200 enters the disabled state.
In this way, the processor 10 may implement remote and automatic destruction of the client identification module 200, which improves the security of the electronic device 100.
The first predetermined number of times may be 3 times, and the second predetermined number of times may be 10 times. The first predetermined number and the second predetermined number are set so that there is a sufficient fault tolerance when the user normally uses the customer identification module 200 and triggers the verification of the personal identification code.
Referring to fig. 3, in some embodiments, the control method further includes:
04, processing the information protection instruction to determine whether to shut down the network communication capability of the electronic device 100;
05, upon determining to turn off the network communication capability of the electronic apparatus 100, turning off the communication capability of the electronic apparatus 100 and making the electronic apparatus 100 unable to recognize the client recognition module 200.
In some embodiments, step 04 and step 05 may be implemented by the processor 10, that is, the processor 10 may be configured to process the information protection instruction to determine whether to turn off the network communication capability of the electronic device 100; upon determining to turn off the network communication capability of the electronic apparatus 100, the communication capability of the electronic apparatus 100 is turned off and the electronic apparatus 100 is made unable to recognize the client identification module 200.
It is understood that, in the information protection instruction, preset contents of whether to turn off the network communication capability of the electronic apparatus 100 may be added. The processor 10 may determine whether to turn off the network communication capability of the electronic device 100 by the content of the setting form. For example, abc _ remote _ F <0, 1>, the processor 10 may recognize the command F and the number after the command, and if the number after the command is 1, the processor 10 may determine that the electronic device 100 needs to start to shut down the network communication capability of the electronic device 100.
In this way, the lost electronic device 100 can implement the function of remotely turning off the network communication capability, and prevent other people from continuing to use the electronic device 100.
In certain embodiments, step 05 comprises:
051, when determining to close the network communication capability of the electronic equipment 100, closing all the communication support capability of the electronic equipment 100 and sending the information that the electronic equipment 100 has no communication capability to the client identification module 200;
052, turning off the subscriber identity module 200 and determining that the subscriber identity module 200 is in a non-powered-on state;
053, closing the port of the electronic device 100 for identifying the customer identification module 200, and closing the active power-on function of the port.
In some embodiments, steps 051, 052 and 053 may all be implemented by the processor 10, that is, the processor 10 may be configured to, upon determining to turn off the network communication capability of the electronic device 100, turn off all communication support capability of the electronic device 100 and send information that the electronic device 100 does not have communication capability to the client identification module 200; shutting down the subscriber identity module 200 and determining that the subscriber identity module 200 is in a non-powered-on state; the port of the electronic device 100 for identifying the subscriber identity module 200 is turned off and the active power-on function of the port is turned off.
Specifically, in step 051, after the lost electronic device 100 receives the information protection instruction and judges that the network communication capability of the electronic device 100 needs to be closed, the information that the electronic device 100 has no communication capability is sent to the client identification module 200. This step may be implemented by the internal functions of the electronic device 100: first, all the support capabilities of the electronic device 100 are set to false, and the client identification module 200 is informed through Terminal Profile that the electronic device 100 currently has no communication capability.
Step 052 may be implemented by processor 10 setting client identification module 200 to a Power Down state and setting the Power On function of client identification module 200 to disable. In this way, the electronic device 100 loses the function of identifying the subscriber identity module 200 and the communication function in software design.
Step 053 may be executed by setting the gpio port of the electronic device 100 for identifying the sim 200 to false, and setting the high/low level of the port to false, so that it cannot be powered up actively.
Thus, the electronic device 100 cannot be powered on at the hardware physical drive end.
Referring to fig. 4, in some embodiments, the control method further includes:
06, processing the information protection instruction to determine whether to clear the information of the client identification module 200;
07, upon determining to clear the information of the client identification module 200, deleting the information stored in the client identification module 200.
In some embodiments, both steps 06 and 07 may be implemented by the processor 10, that is, the processor 10 may be configured to process the information protection instruction to determine whether to clear the information of the customer identification module 200; when it is determined to clear the information of the client identification module 200, the information stored in the client identification module 200 is deleted.
It is to be understood that, in the information protection instruction, a preset content of whether to clear the information of the client recognition module 200 may be added. The processor 10 may determine whether to clear the information of the subscriber identity module 200 by setting the form. For example, abc _ remote _ T <0, 1>, the processor 10 may recognize the command T and the number after the command, and if the number after the command is 1, the processor 10 may determine that the electronic device 100 needs to start the purge of the information of the sim 200.
After the processor 10 determines that the instruction for clearing the information of the client identification module 200 is needed, the information of the client identification module 200 of the electronic device 100 is cleared, where the information needed to be cleared may include user data such as a contact, a call record, and a short message.
In this manner, an information protection instruction may be sent to the missing electronic device 100 to clear the information of the client identification module 200.
Referring to fig. 5, in some embodiments, the control method further includes:
08, processing the information protection instruction to determine whether to clear the information of the electronic device 100;
09, upon determining to clear the information of the electronic device 100, deleting the information stored in the electronic device 100.
In some embodiments, both steps 08 and 09 can be implemented by the processor 10, that is, the processor 10 can be configured to process the information protection instruction to determine whether to clear the information of the electronic device 100; when it is determined to clear the information of the electronic apparatus 100, the information stored in the electronic apparatus 100 is deleted.
It is understood that, in the information protection instruction, a preset content of whether to clear the information of the electronic apparatus 100 may be added. The processor 10 may determine whether to clear the information of the electronic device 100 by setting the form of the content. For example, abc _ remote P <0, 1>, the processor 10 may recognize the P command and the number after the command, and if the number after the command is 1, the processor 10 may determine that the electronic device 100 needs to start to clear the information of the electronic device 100.
After the processor 10 determines that the instruction for clearing the information of the electronic device 100 is needed, the information of the electronic device 100 is cleared, and the information needed to be cleared may include user data such as image data, audio data, and communication data.
In this way, an information protection instruction can be sent to the lost electronic device 100 to clear the information of the electronic device 100, and information leakage of the electronic device 100 can be prevented.
In one embodiment, the user may destroy the client identification module 200, disable the network communication capability of the electronic device 100, clear the client identification module 200, and clear the electronic device 100. This may be achieved by sending information protection instructions to the electronic device 100 as follows:
abc_remote*P<1>*T<1>*S<1>*F<1>
wherein abc _ remote is a preset short message content of the electronic device 100, when the electronic device 100 receives a short message with an abc _ remote header, the short message is identified as a remote command short message, the content of the short message needs to be hidden is determined, and instruction identification is performed. Recognizing the P command and the number after the command is 1, the processor 10 will determine that the electronic device 100 needs to be started to clear the information of the electronic device 100; recognizing the command T and the number after the command is 1, the processor 10 determines that the electronic device 100 needs to start the clear client identification module 200; recognizing the command and the number after the command is 1, the processor 10 will determine that the electronic device 100 needs to start the destruction client recognition module 200; recognizing the command F and the number after the command is 1, the processor 10 determines that the electronic device 100 needs to start to shut down the network communication capability of the electronic device 100.
It should be noted that, in this embodiment, the order of instruction execution may be: determining whether to clear the information of the electronic device 100, determining whether to clear the information of the client identification module 200, determining whether to destroy the client identification module 200, and determining whether to turn off the network communication capability of the electronic device 100. Thus, the information of the client identification module 200 can be removed as much as possible before the client identification module 200 is destroyed, and the protection of information security is further improved.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
The logic and/or steps represented in the flowcharts or otherwise described herein, such as an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processing module-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. It should be understood that portions of the embodiments of the present application may be implemented in hardware, software, firmware, or a combination thereof.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in an electronic device readable storage medium, and when executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in an electronic device readable storage medium.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations of the above embodiments may be made by those of ordinary skill in the art within the scope of the present application.
Claims (12)
1. A control method for controlling an electronic device, wherein the electronic device is configured to set a subscriber identity module, the control method comprising:
processing an information protection instruction to determine whether to destroy the customer identification module upon receipt of the information protection instruction;
when the customer identification module is determined to be destroyed, controlling the electronic equipment to verify the personal identification code of the customer identification module and input an incorrect identification code so as to enable the customer identification module to enter a state to be unlocked;
and under the state to be unlocked, controlling the electronic equipment to input an incorrect unlocking password so as to enable the customer identification module to enter a scrapped state.
2. The control method according to claim 1, wherein when it is determined to destroy the customer identification module, controlling the electronic device to verify a personal identification code of the customer identification module and input a wrong identification code to cause the customer identification module to enter a to-be-unlocked state includes:
when the customer identification module is determined to be destroyed, controlling the electronic equipment to verify the personal identification password and input a wrong identification password for a first preset number of times so as to enable the customer identification module to enter the state to be unlocked;
under the state of waiting to unlock, controlling the electronic device to input an incorrect unlocking password so as to enable the customer identification module to enter a scrapped state, including:
and under the state to be unlocked, controlling the electronic equipment to input wrong unlocking passwords for a second preset number of times so as to enable the client identification module to enter a scrapped state.
3. The control method according to claim 1, characterized by further comprising:
processing the information protection instruction to determine whether to turn off a network communication capability of the electronic device;
when the network communication capability of the electronic equipment is determined to be closed, the communication capability of the electronic equipment is closed, and the electronic equipment cannot identify the client identification module.
4. The control method according to claim 3, wherein the turning off the communication capability of the electronic device and making the electronic device unable to recognize the customer identification module when it is determined to turn off the network communication capability of the electronic device comprises:
when determining to close the network communication capability of the electronic equipment, closing all communication support capabilities of the electronic equipment and sending information that the electronic equipment has no communication capability to the client identification module;
closing the customer identification module and determining that the customer identification module is in a non-power-on state;
and closing a port of the electronic equipment for identifying the customer identification module and closing an active power-on function of the port.
5. The control method according to claim 1, characterized by further comprising:
processing the information protection instruction to determine whether to clear the information of the customer identification module;
and deleting the information stored in the client identification module when the information of the client identification module is determined to be cleared.
6. The control method according to claim 1, characterized by further comprising:
processing the information protection instruction to determine whether to clear the information of the electronic device;
and deleting the information stored in the electronic equipment when the information of the electronic equipment is determined to be cleared.
7. An electronic device configured to configure a subscriber identity module, the electronic device comprising a processor configured to:
processing an information protection instruction to determine whether to destroy the customer identification module upon receipt of the information protection instruction;
when the customer identification module is determined to be destroyed, controlling the electronic equipment to verify the personal identification code of the customer identification module and input an incorrect identification code so as to enable the customer identification module to enter a state to be unlocked;
and under the state to be unlocked, controlling the electronic equipment to input an incorrect unlocking password so as to enable the customer identification module to enter a scrapped state.
8. The electronic device of claim 7, wherein the processor is further configured to:
when the customer identification module is determined to be destroyed, controlling the electronic equipment to verify the personal identification password and input a wrong identification password for a first preset number of times so as to enable the customer identification module to enter the state to be unlocked;
and under the state to be unlocked, controlling the electronic equipment to input wrong unlocking passwords for a second preset number of times so as to enable the client identification module to enter a scrapped state.
9. The electronic device of claim 7, wherein the processor is further configured to:
processing the information protection instruction to determine whether to turn off a network communication capability of the electronic device;
when the network communication capability of the electronic equipment is determined to be closed, the communication capability of the electronic equipment is closed, and the electronic equipment cannot identify the client identification module.
10. The electronic device of claim 9, wherein the processor is further configured to:
when determining to close the network communication capability of the electronic equipment, closing all communication support capabilities of the electronic equipment and sending information that the electronic equipment has no communication capability to the client identification module;
closing the customer identification module and determining that the customer identification module is in a non-power-on state;
and closing a port of the electronic equipment for identifying the customer identification module and closing an active power-on function of the port.
11. The electronic device of claim 7, wherein the processor is further configured to:
processing the information protection instruction to determine whether to clear the information of the customer identification module;
and deleting the information stored in the client identification module when the information of the client identification module is determined to be cleared.
12. The electronic device of claim 7, wherein the processor is further configured to:
processing the information protection instruction to determine whether to clear the information of the electronic device;
and deleting the information stored in the electronic equipment when the information of the electronic equipment is determined to be cleared.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010795643.5A CN112019684A (en) | 2020-08-10 | 2020-08-10 | Control method and electronic device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010795643.5A CN112019684A (en) | 2020-08-10 | 2020-08-10 | Control method and electronic device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112019684A true CN112019684A (en) | 2020-12-01 |
Family
ID=73500176
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010795643.5A Pending CN112019684A (en) | 2020-08-10 | 2020-08-10 | Control method and electronic device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112019684A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1980459A (en) * | 2005-11-30 | 2007-06-13 | 中兴通讯股份有限公司 | Method for realizing information destroying at network side |
CN101083806A (en) * | 2006-05-30 | 2007-12-05 | 英华达(南京)科技有限公司 | Method for dual-mode mobile phone to connect respectively with plurality of telecom network |
CN101119565A (en) * | 2007-09-03 | 2008-02-06 | 华为技术有限公司 | Mobile communications terminal data protection method, system and equipment |
CN101355740A (en) * | 2007-07-27 | 2009-01-28 | 佛山市顺德区顺达电脑厂有限公司 | Method and system for protecting smart card data |
CN104660613A (en) * | 2015-03-16 | 2015-05-27 | 联想(北京)有限公司 | Authentication method of user identification module and electronic equipment |
CN105790949A (en) * | 2015-11-17 | 2016-07-20 | 广东欧珀移动通信有限公司 | Subscriber identity module card unlocking method and subscriber identity module card unlocking device |
CN108781359A (en) * | 2016-03-30 | 2018-11-09 | T移动美国公司 | The adaptive equipment locking of safety |
-
2020
- 2020-08-10 CN CN202010795643.5A patent/CN112019684A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1980459A (en) * | 2005-11-30 | 2007-06-13 | 中兴通讯股份有限公司 | Method for realizing information destroying at network side |
CN101083806A (en) * | 2006-05-30 | 2007-12-05 | 英华达(南京)科技有限公司 | Method for dual-mode mobile phone to connect respectively with plurality of telecom network |
CN101355740A (en) * | 2007-07-27 | 2009-01-28 | 佛山市顺德区顺达电脑厂有限公司 | Method and system for protecting smart card data |
CN101119565A (en) * | 2007-09-03 | 2008-02-06 | 华为技术有限公司 | Mobile communications terminal data protection method, system and equipment |
CN104660613A (en) * | 2015-03-16 | 2015-05-27 | 联想(北京)有限公司 | Authentication method of user identification module and electronic equipment |
CN105790949A (en) * | 2015-11-17 | 2016-07-20 | 广东欧珀移动通信有限公司 | Subscriber identity module card unlocking method and subscriber identity module card unlocking device |
CN108781359A (en) * | 2016-03-30 | 2018-11-09 | T移动美国公司 | The adaptive equipment locking of safety |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111835689B (en) | Identity authentication method of digital key, terminal device and medium | |
US8463234B2 (en) | Method for providing security services by using mobile terminal password and mobile terminal thereof | |
US7480805B1 (en) | Method and system for identifying and processing an unauthorized access request | |
EP1679925A1 (en) | Authentication of a mobile station | |
CN101577907B (en) | Method and device for managing mobile terminal | |
JP4245151B2 (en) | Mobile phone with use restriction function and method of restricting use of the machine | |
US7702907B2 (en) | System and method for safe booting electronic devices | |
CN101772017A (en) | Method for remotely destroying information of communication terminal and communication terminal thereof | |
EP2437198B1 (en) | Secure PIN reset process | |
CN104573463B (en) | system switching method, system switching device and terminal | |
EP2919499A2 (en) | Version protection method and apparatus for mobile terminals | |
WO2017166689A1 (en) | Privacy protection method and device | |
CN107832616B (en) | Computer pre-boot security verification, enforcement and repair | |
CN104820805A (en) | Method and device for burglary prevention of user identity identification card information | |
US20040268133A1 (en) | Secure personal identification entry system | |
CN112019684A (en) | Control method and electronic device | |
CN105292020B (en) | Control method for vehicle, controller of vehicle and terminal | |
CN108122111B (en) | Secure payment method, device, storage medium and computer equipment | |
CN105635090B (en) | System access method, system access mechanism and terminal | |
KR100982254B1 (en) | System and method for processing log-in request | |
EP3467693B1 (en) | Identity verification method and apparatus | |
JP2003067338A (en) | Security protection system, security protection method and security protection program | |
CN107358092A (en) | Reset the method for screen-lock password and the terminal of screen-lock password can be reset | |
CN112671979A (en) | Terminal anti-theft method and device | |
CN111680270A (en) | Anti-theft method and device for camera, electronic equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201201 |
|
RJ01 | Rejection of invention patent application after publication |