CN112492587A - Personal information protection method and system - Google Patents

Personal information protection method and system Download PDF

Info

Publication number
CN112492587A
CN112492587A CN202011355099.9A CN202011355099A CN112492587A CN 112492587 A CN112492587 A CN 112492587A CN 202011355099 A CN202011355099 A CN 202011355099A CN 112492587 A CN112492587 A CN 112492587A
Authority
CN
China
Prior art keywords
mobile terminal
state
visitor
account
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011355099.9A
Other languages
Chinese (zh)
Other versions
CN112492587B (en
Inventor
杨小勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202011355099.9A priority Critical patent/CN112492587B/en
Publication of CN112492587A publication Critical patent/CN112492587A/en
Application granted granted Critical
Publication of CN112492587B publication Critical patent/CN112492587B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Abstract

The application relates to a personal information protection method and a system, which are applied to a mobile terminal, wherein the method comprises the following steps: identifying a current account status of the mobile terminal, wherein the current usage status comprises an administrator status and a visitor status; and if the current account state of the mobile terminal is the visitor state, hiding the administrator account storing the user information of the mobile terminal, and restarting the mobile terminal so as to enable the restarted mobile terminal to enter a visitor account interface. The method and the device solve the technical problem that personal information in the mobile phone is leaked due to the fact that the mobile phone is lost.

Description

Personal information protection method and system
Technical Field
The present application relates to the field of information security technologies, and in particular, to a personal information protection method and a personal information protection system.
Background
With the popularization of smart phones and the large increase of network coverage area, mobile phone banks and mobile phone payment slowly become an indispensable part of life of people, work files, private photos, WeChat, QQ and other chat records related to personal privacy and the like can be stored in the mobile phones, the protection of mobile phone information becomes very important, once the mobile phones are lost, even if passwords are set, the mobile phones can be cracked, personal information on the mobile phones is leaked, and even economic loss and unnecessary troubles are brought to the mobile phones.
Disclosure of Invention
In order to solve the technical problem that personal information in a mobile phone is leaked due to loss, the application provides a personal information protection method and a personal information protection system.
In a first aspect, the present application provides a personal information protection method, applied to a mobile terminal, the method including:
identifying a current account status of the mobile terminal, wherein the current usage status comprises an administrator status and a visitor status;
if the current account status of the mobile terminal is the visitor status,
the administrator account storing the mobile terminal user information is hidden,
restarting the mobile terminal to enable the restarted mobile terminal to enter a visitor account interface.
Optionally, the guest state includes a lost state and an unreleased state,
after identifying that the current account status of the mobile terminal is the guest status, the method further comprises:
identifying whether the guest state is a lost state;
if the current use state of the mobile terminal is the loss state, destroying all the information of the hidden administrator account after the mobile terminal is restarted.
Optionally, after the rebooted mobile terminal enters the guest account interface, the method further includes:
the mobile terminal operates according to a preset use authority;
the preset use authority is an emergency call and/or communication to a preset number of the mobile terminal.
Optionally, the identifying that the current usage state of the mobile terminal is the lost state includes:
acquiring the current SIM card information of the mobile terminal,
if the current use state of the SIM card of the mobile terminal is detected to be invalid, judging that the current use state of the mobile terminal is a lost state;
or, judging whether the current SIM card of the mobile terminal is the SIM card bound with the mobile terminal in advance,
if the current SIM card of the mobile terminal is not the SIM card bound with the mobile terminal in advance,
judging that the current using state of the mobile terminal is a lost state.
Optionally, if the visitor state of the mobile terminal is identified as the non-lost state, after the restarted mobile terminal enters the visitor account interface, the method further includes:
the mobile terminal displays the visitor account password input interface;
judging whether the password input by the visitor account page is matched with a preset visitor account password or not;
if the password input by the visitor account page is not matched with the preset visitor account password, locking the mobile terminal;
and if the password input by the visitor account page is matched with a preset visitor account password, entering the visitor account.
Optionally, the method further comprises:
identifying the administrator state and the visitor state according to preset user characteristic information;
if the identified characteristic information is consistent with the preset user characteristic information, identifying the current use state of the mobile terminal as an administrator state;
and if the identified characteristic information is inconsistent with the preset user characteristic information, identifying the current use state of the mobile terminal as a visitor state.
In a second aspect, the present application provides a personal information protection system applied to a mobile terminal, the system comprising:
the identification module is used for identifying the current use state of the mobile terminal, and the current use state comprises an administrator state and a visitor state;
the information processing module is used for hiding the user account storing the user information of the mobile terminal if the identification module identifies that the current use state of the mobile terminal is a non-user state;
and the control module is used for restarting the mobile terminal if the identification module identifies that the current use state of the mobile terminal is a non-user state, and sending an instruction for entering a visitor account interface to the restarted mobile terminal.
Optionally, if the identification module identifies that the current use state of the mobile terminal is a lost state, the control module is further configured to send an instruction to destroy all information of the hidden user account to the information processing module;
the information processing module is further used for destroying all the information of the hidden user account according to the instruction.
Optionally, if the identification module identifies that the current usage state of the mobile terminal is an unreleased state,
the control module is further configured to send an instruction to the mobile terminal to enter the visitor account password input interface;
the control module is also used for receiving the input visitor account password and judging whether the password input by the visitor account page is matched with a preset visitor account password or not;
if the control module judges that the password input by the visitor account page is not matched with the preset visitor account password, the control module is also used for locking the mobile terminal;
and if the control module judges that the password input by the visitor account page is matched with the preset visitor account password, the control module sends an instruction of entering the visitor account with the preset permission to the mobile terminal.
Optionally, the identification module is further configured to identify the administrator status and the visitor status according to preset user characteristic information;
if the identified characteristic information is consistent with the preset user characteristic information, identifying the current use state of the mobile terminal as an administrator state;
and if the identified characteristic information is inconsistent with the preset user characteristic information, identifying the current use state of the mobile terminal as a visitor state.
By the personal information protection method, if the current account state of the mobile terminal is the visitor state, the administrator account storing the user information of the mobile terminal is hidden, and the mobile terminal is restarted, so that the restarted mobile terminal enters a visitor account interface. The method has the advantages that the information protection effect is achieved, leakage of personal information stored in the mobile terminal is avoided, particularly information related to personal privacy is avoided, and unnecessary troubles and possible unnecessary economic losses caused by leakage of the personal privacy are reduced.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1 is a flow chart illustrating a method for protecting personal information according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for protecting personal information according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating a personal information protection system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
FIG. 1 is a first flowchart of a method for personal information protection in an embodiment. Referring to fig. 1, the personal information protection method is applied to a mobile terminal. The method comprises the following steps:
step 101: identifying the current account state of the mobile terminal, wherein the current use state comprises an administrator state and a visitor state;
step 102: if the current account status of the mobile terminal is the guest status,
hiding the administrator account for storing the user information of the mobile terminal;
step 103: and restarting the mobile terminal so that the restarted mobile terminal enters the visitor account interface.
In the embodiment of the application, the personal information protection method is applied to a mobile terminal, and the mobile terminal is a communication device capable of communicating, such as a mobile phone, a tablet computer and the like; the storage area of the mobile terminal is divided into an administrator area and a visitor area in advance, and the administrator area and the visitor area correspond to the administrator state and the visitor state displayed in the use of the mobile terminal respectively. The administrator area stores personal information of the mobile terminal user, such as information related to personal privacy, such as an address book, a work file, a private photo, a mobile phone bank, a payment account and the like; the visitor area opens part of the above-mentioned information of the administrator area to the visitor or does not open it at all according to the user's setting.
In the embodiment of the application, the current account state of the mobile terminal is firstly identified, if the current account state is the visitor state, an administrator account storing personal privacy information of a user is hidden, the mobile terminal is restarted, and the restarted mobile terminal enters a visitor account interface; the method has the advantages that the leakage of personal information in the mobile terminal is effectively prevented, the effective protection effect on the personal privacy is realized, and especially, under the condition that the current mobile phone is frequently applied to payment, the effective protection on the personal bank account information is realized.
As shown in fig. 2, in the embodiment of the present application, at step 102: if the current account state of the mobile terminal is the visitor state, after hiding the administrator account storing the user information of the mobile terminal, the method for protecting the personal information further comprises the following steps:
step 1021: identifying whether the visitor state is a lost state;
if the guest state is identified as the lost state, step 103 is entered: restarting the mobile terminal to enable the restarted mobile terminal to enter a visitor account interface;
step 1022 is entered simultaneously: destroying all information of the hidden administrator account.
In an embodiment of the application, the guest state is set to a lost state and an unreleased state; according to the method, if the mobile terminal is identified as the lost state, the mobile terminal is restarted, a time opportunity is provided for a user who loses the mobile terminal within a restart time period, all information of the administrator account is destroyed through remote control or a preset program in the mobile terminal, a third person who obtains the lost mobile phone is prevented from cracking the hidden information of the administrator account, and the effect of protecting personal information is further achieved.
In the embodiment of the application, in the restarting time period, all information of the administrator account to be destroyed can be remotely backed up to a background terminal associated with the mobile terminal in advance through a network while all information of the administrator account to be destroyed is destroyed, and after the lost mobile terminal can be retrieved, the backed-up information is retrieved through inputting a preset password or other identity authentication modes.
In an embodiment of the present application, after the rebooted mobile terminal enters the guest account interface, the method further includes:
the mobile terminal operates according to a preset use authority;
the preset use authority is emergency call and/or communication with a preset number of the mobile terminal.
In the embodiment of the application, the preset use permission can enable a person who finds the lost mobile terminal to contact the user who loses the mobile terminal, so that the loss of the lost mobile terminal is avoided.
In an embodiment of the present application, identifying that the current usage state of the mobile terminal is the loss state includes:
acquiring the current SIM card information of the mobile terminal,
if the current use state of the SIM card of the mobile terminal is detected to be invalid, judging that the current use state of the mobile terminal is a lost state;
or, judging whether the current SIM card of the mobile terminal is the SIM card bound with the mobile terminal in advance,
if the current SIM card of the mobile terminal is not a SIM card previously bound to the mobile terminal,
the current use state of the mobile terminal is judged to be the lost state.
In the embodiment of the application, if the mobile terminal is lost, the loss is reported to a network service provider of the mobile terminal, the network service is required to be suspended or stopped, and under the condition that the network service provider suspends or stops the network service, the SIM of the mobile terminal is in a failure state;
in another application scenario of the embodiment of the present application, the mobile terminal is bound with a used SIM card in advance, and under a situation that a person who obtains a lost mobile terminal replaces the SIM card, whether the current SIM card of the mobile terminal is the SIM card bound with the mobile terminal in advance is determined, and if the current SIM card of the mobile terminal is not the SIM card bound with the mobile terminal in advance, the current use state of the mobile terminal is determined to be the lost state.
With the advancement of science and technology, the method for identifying the loss of the mobile terminal is not limited to the method provided in the present application, and any method capable of determining the loss of the mobile terminal can be applied to the personal information protection method in the present application.
In an embodiment of the application, if the visitor state of the mobile terminal is identified as the unreleased state, after the restarted mobile terminal enters the visitor account interface, the method further includes:
the mobile terminal displays a visitor account password input interface;
judging whether a password input by the visitor account page is matched with a preset visitor account password or not;
if the password input by the visitor account page is not matched with the preset visitor account password, locking the mobile terminal;
and if the password input by the visitor account page is matched with the preset visitor account password, entering the visitor account.
In the embodiment of the present application, the situation that the visitor status is not lost may be a good third party, for example, a friend of the mobile terminal user is using the mobile terminal, at this time, the mobile terminal displays a visitor account password input interface for privacy, and enters the visitor account after acquiring the password; or the input password is not matched with the preset visitor account password, which indicates that the permission of the mobile terminal user is not obtained, the mobile terminal is locked, personal information in the mobile terminal is further protected, and unnecessary troubles and economic loss caused by privacy disclosure are avoided.
In the embodiment of the application, the state of an administrator and the state of a visitor are identified according to preset user characteristic information; if the identified characteristic information is consistent with the preset user characteristic information, identifying the current use state of the mobile terminal as an administrator state; and if the identified characteristic information is inconsistent with the preset user characteristic information, identifying the current use state of the mobile terminal as the visitor state.
In the embodiment of the application, the characteristic information of the user, such as the fingerprint, the head portrait or the voice, is preset, and the administrator status or the visitor status is judged by recognizing the characteristics.
As shown in fig. 3, in an embodiment of the present application, there is provided a personal information protection system 300 applied to a mobile terminal, where the system 300 includes:
an identifying module 301, configured to identify a current use state of the mobile terminal, where the current use state includes an administrator state and a visitor state;
the information processing module 302 is configured to hide a user account storing the user information of the mobile terminal if the identification module 301 identifies that the current usage state of the mobile terminal is a non-user state;
a control module 303, configured to restart the mobile terminal if the identification module 301 identifies that the current usage state of the mobile terminal is a non-user state, and to issue an instruction to enter the visitor account interface to the restarted mobile terminal.
In the embodiment of the application, the personal protection system can effectively prevent the leakage of personal information in the mobile terminal, thereby reducing unnecessary trouble and economic loss.
In the embodiment of the present application, if the identification module 301 identifies that the current usage state of the mobile terminal is a lost state, the control module 303 is further configured to send an instruction to destroy all information of the hidden user account to the information processing module 302;
the information processing module 302 is further configured to destroy all information of the hidden user account according to an instruction of the control module 303.
In the embodiment of the present application, if the identification module 301 identifies the current usage state of the mobile terminal as the unreleased state,
the control module 303 is further configured to send an instruction to the mobile terminal to enter a visitor account password input interface;
the control module 303 is further configured to receive an input visitor account password, and determine whether the password input by the visitor account page matches a preset visitor account password;
if the control module 303 determines that the password input by the visitor account page does not match the preset visitor account password, the control module 303 is further configured to lock the mobile terminal;
if the control module 303 determines that the password input by the visitor account page matches the preset visitor account password, the control module 303 sends an instruction to enter the visitor account with the preset permission to the mobile terminal.
In an embodiment of the present application, the system further comprises:
the identification module 301 is further configured to identify an administrator state and the visitor state according to preset user feature information;
if the identified characteristic information is consistent with the preset user characteristic information, identifying the current use state of the mobile terminal as an administrator state;
and if the identified characteristic information is inconsistent with the preset user characteristic information, identifying the current use state of the mobile terminal as the visitor state.
In an embodiment of the present application, the control module 303 is further configured to operate according to a preset usage right; the preset use authority is emergency call and/or communication with a preset number of the mobile terminal.
In an embodiment of the present application, the identifying module 301 is further configured to identify that a current usage state of the mobile terminal is a lost state, and includes:
acquiring the current SIM card information of the mobile terminal,
if the control module 303 detects that the current use state of the SIM card of the mobile terminal is invalid, the identification module 301 identifies that the current use state of the mobile terminal is a lost state;
or, the control module 303 determines whether the current SIM card of the mobile terminal is a SIM card bound with the mobile terminal in advance,
if the current SIM card of the mobile terminal is not a SIM card previously bound to the mobile terminal,
the identification module 301 is further configured to identify the current usage state of the mobile terminal as a lost state.
In an embodiment of the present application, the identifying module 301 is further configured to identify an administrator state and a visitor state according to preset user feature information; if the identified characteristic information is consistent with the preset user characteristic information, identifying the current use state of the mobile terminal as an administrator state;
and if the identified characteristic information is inconsistent with the preset user characteristic information, identifying the current use state of the mobile terminal as the visitor state.
Fig. 1 and fig. 2 are schematic flow charts of a personal information protection method in an embodiment. It should be understood that although the steps in the flowcharts of fig. 1 and 2 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in fig. 1 or 2 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present invention, which enable those skilled in the art to understand or practice the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A personal information protection method is applied to a mobile terminal, and is characterized by comprising the following steps:
identifying a current account status of the mobile terminal, wherein the current usage status comprises an administrator status and a visitor status;
if the current account status of the mobile terminal is the visitor status,
the administrator account storing the mobile terminal user information is hidden,
restarting the mobile terminal to enable the restarted mobile terminal to enter a visitor account interface.
2. The personal information protection method according to claim 1,
the guest state includes a lost state and an unreleased state,
after identifying that the current account status of the mobile terminal is the guest status, the method further comprises:
identifying whether the guest state is a lost state;
if the current use state of the mobile terminal is the loss state, destroying all the information of the hidden administrator account after the mobile terminal is restarted.
3. The personal information protection method of claim 2, wherein after the rebooted mobile terminal enters the guest account interface, the method further comprises:
the mobile terminal operates according to a preset use authority;
the preset use authority is an emergency call and/or communication to a preset number of the mobile terminal.
4. The personal information protection method of claim 2, wherein identifying the current usage state of the mobile terminal as a lost state comprises:
acquiring the current SIM card information of the mobile terminal,
if the current use state of the SIM card of the mobile terminal is detected to be invalid, judging that the current use state of the mobile terminal is a lost state;
or, judging whether the current SIM card of the mobile terminal is the SIM card bound with the mobile terminal in advance,
if the current SIM card of the mobile terminal is not the SIM card bound with the mobile terminal in advance,
judging that the current using state of the mobile terminal is a lost state.
5. The personal information protection method of claim 1, wherein if the visitor status of the mobile terminal is identified as a non-lost status, after the rebooted mobile terminal enters a visitor account interface, the method further comprises:
the mobile terminal displays the visitor account password input interface;
judging whether the password input by the visitor account page is matched with a preset visitor account password or not;
if the password input by the visitor account page is not matched with the preset visitor account password, locking the mobile terminal;
and if the password input by the visitor account page is matched with a preset visitor account password, entering the visitor account.
6. The personal information guard method of any one of claims 1-5, further comprising:
identifying the administrator state and the visitor state according to preset user characteristic information;
if the identified characteristic information is consistent with the preset user characteristic information, identifying the current use state of the mobile terminal as an administrator state;
and if the identified characteristic information is inconsistent with the preset user characteristic information, identifying the current use state of the mobile terminal as a visitor state.
7. A personal information protection system applied to a mobile terminal, the system comprising:
the identification module is used for identifying the current use state of the mobile terminal, and the current use state comprises an administrator state and a visitor state;
the information processing module is used for hiding the user account storing the user information of the mobile terminal if the identification module identifies that the current use state of the mobile terminal is a non-user state;
and the control module is used for restarting the mobile terminal if the identification module identifies that the current use state of the mobile terminal is a non-user state, and sending an instruction for entering a visitor account interface to the restarted mobile terminal.
8. The personal information protection system according to claim 7, wherein if the identification module identifies that the current usage state of the mobile terminal is a lost state, the control module is further configured to issue an instruction to destroy all information of the hidden user account to the information processing module;
the information processing module is further used for destroying all the information of the hidden user account according to the instruction.
9. The personal information protection system according to claim 7, wherein if the identification module identifies the current usage state of the mobile terminal as an unreleased state,
the control module is further configured to send an instruction to the mobile terminal to enter the visitor account password input interface;
the control module is also used for receiving the input visitor account password and judging whether the password input by the visitor account page is matched with a preset visitor account password or not;
if the control module judges that the password input by the visitor account page is not matched with the preset visitor account password, the control module is also used for locking the mobile terminal;
and if the control module judges that the password input by the visitor account page is matched with the preset visitor account password, the control module sends an instruction of entering the visitor account with the preset permission to the mobile terminal.
10. The personal information guard system of any one of claims 7-9,
the identification module is also used for identifying the administrator state and the visitor state according to preset user characteristic information;
if the identified characteristic information is consistent with the preset user characteristic information, identifying the current use state of the mobile terminal as an administrator state;
and if the identified characteristic information is inconsistent with the preset user characteristic information, identifying the current use state of the mobile terminal as a visitor state.
CN202011355099.9A 2020-11-26 2020-11-26 Personal information protection method and system Active CN112492587B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011355099.9A CN112492587B (en) 2020-11-26 2020-11-26 Personal information protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011355099.9A CN112492587B (en) 2020-11-26 2020-11-26 Personal information protection method and system

Publications (2)

Publication Number Publication Date
CN112492587A true CN112492587A (en) 2021-03-12
CN112492587B CN112492587B (en) 2022-10-11

Family

ID=74935715

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011355099.9A Active CN112492587B (en) 2020-11-26 2020-11-26 Personal information protection method and system

Country Status (1)

Country Link
CN (1) CN112492587B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105074761A (en) * 2013-02-15 2015-11-18 钥匙咖啡馆公司 Methods and systems for management of key exchanges
WO2016035384A1 (en) * 2014-09-04 2016-03-10 株式会社 日立産業制御ソリューションズ Entry and exit management system and authentication control method
CN106126994A (en) * 2016-06-26 2016-11-16 深圳市智汇十方科技有限公司 The user management method of a kind of mobile terminal and system
CN106231080A (en) * 2016-07-22 2016-12-14 努比亚技术有限公司 Mobile terminal based on virtual client identification module card recovers method and mobile terminal
CN106851562A (en) * 2017-01-03 2017-06-13 惠州Tcl移动通信有限公司 It is a kind of prevent mobile phone lose after leakage of content method and system
CN107590404A (en) * 2016-07-08 2018-01-16 中国电信股份有限公司 Method for tracing and system and terminal device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105074761A (en) * 2013-02-15 2015-11-18 钥匙咖啡馆公司 Methods and systems for management of key exchanges
WO2016035384A1 (en) * 2014-09-04 2016-03-10 株式会社 日立産業制御ソリューションズ Entry and exit management system and authentication control method
CN106126994A (en) * 2016-06-26 2016-11-16 深圳市智汇十方科技有限公司 The user management method of a kind of mobile terminal and system
CN107590404A (en) * 2016-07-08 2018-01-16 中国电信股份有限公司 Method for tracing and system and terminal device
CN106231080A (en) * 2016-07-22 2016-12-14 努比亚技术有限公司 Mobile terminal based on virtual client identification module card recovers method and mobile terminal
CN106851562A (en) * 2017-01-03 2017-06-13 惠州Tcl移动通信有限公司 It is a kind of prevent mobile phone lose after leakage of content method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
羊驼尼玛: "手机丢失一个月后找回。魅族太强大了 https://tieba.baidu.com/p/5433274394?red_tag=1996738056", 《百度贴吧》 *

Also Published As

Publication number Publication date
CN112492587B (en) 2022-10-11

Similar Documents

Publication Publication Date Title
US11882221B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN101252703B (en) Terminal data protecting method, system as well as mobile communication terminal
US9800577B2 (en) Method and apparatus for controlling communications terminal and corresponding communications terminal
US8463234B2 (en) Method for providing security services by using mobile terminal password and mobile terminal thereof
CN104008321A (en) Judging method and judging system for identifying user right based on fingerprint for mobile terminal
CN1395407A (en) Mobile telephone burglary-resisting design and its operation method
WO2017166689A1 (en) Privacy protection method and device
CN104700050A (en) Mobile terminal safety positioning method and device
CN106326709B (en) A kind of intelligent terminal security processing and device
CN106231092A (en) A kind of phone information security protection method
WO2016145849A1 (en) Short message security management method, device and terminal
CN108347730B (en) Wireless communication processing method and device
JP7278345B2 (en) Mobile terminal privacy protection method and protection device, and mobile terminal
CN107172602B (en) Data security protection method and device for mobile terminal
CN105516500B (en) A kind of method and system selecting equipment mode
CN112492587B (en) Personal information protection method and system
CN105141736A (en) Information security protection method and apparatus
CN105307135A (en) Mobile terminal and information protection method thereof
JPH1069436A (en) Storage medium having security function and remote security system for the storage medium
CN110636493B (en) Information backup method, device and equipment of virtual SIM card and storage medium
CN111125660B (en) Privacy protection method, mobile terminal and device with storage function
JP2006228253A (en) Remote security system for storage medium having security function
CN108769411A (en) A kind of method and terminal of the protection of incoming number
KR101124585B1 (en) Method and system for providing private information protecting services in mobile communication terminal
CN109447629B (en) Identification card identification method, device and system and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant