CN1469675A - Method of bundling mobile communication terminal and subscriber identifying module - Google Patents

Method of bundling mobile communication terminal and subscriber identifying module Download PDF

Info

Publication number
CN1469675A
CN1469675A CNA031482023A CN03148202A CN1469675A CN 1469675 A CN1469675 A CN 1469675A CN A031482023 A CNA031482023 A CN A031482023A CN 03148202 A CN03148202 A CN 03148202A CN 1469675 A CN1469675 A CN 1469675A
Authority
CN
China
Prior art keywords
communication terminal
mobile communication
identification module
subscriber identification
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA031482023A
Other languages
Chinese (zh)
Inventor
林立军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHONGDIAN SAILONG COMMUNICATION RESEARCH CENTRE Co Ltd
Original Assignee
ZHONGDIAN SAILONG COMMUNICATION RESEARCH CENTRE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHONGDIAN SAILONG COMMUNICATION RESEARCH CENTRE Co Ltd filed Critical ZHONGDIAN SAILONG COMMUNICATION RESEARCH CENTRE Co Ltd
Priority to CNA031482023A priority Critical patent/CN1469675A/en
Publication of CN1469675A publication Critical patent/CN1469675A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The present invention is method of bundling mobile communication terminal and subscriber identifying module. Password information is set to bundle the mobile communication terminal and the initial subscriber identifying module. In case the replaced subscriber identifying module is different from the bundled one, the judgment for whether correct password is input within the specified time is executed, if so, the mobile communication terminal will operate normally, and if not, the mobile communication terminal will convert the number information of the replaced subscriber identifying module into data information or phonetic information and sends it to designated number. In this way, lost mobile communication terminal may be found fast, and the data information stored in the mobile communication terminal will not be browsed illegally.

Description

The method that mobile communication terminal and subscriber identification module are bound
Technical field
The present invention relates to moving communicating field, particularly relate in this field mobile communication terminal and subscriber identification module and bind the field that prevents loss.
Background technology
Current and since mobile communications network (as networks such as GSM, CDMA) technically reach its maturity and perfect, make mobile phone become the main instrument that current people communicate.Simultaneously because mobile phone has characteristics such as fuselage is light and handy, portable strong, also make mobile theft or the phenomenon of losing happen occasionally, and the general many personal informations that all store the user in mobile phone inside, as numerous other people contact method, user's oneself schedule and data messages that some are important etc., to these information also be lost if this just causes mobile phone to be lost thereupon, thereby bring very big trouble to the user.Particularly some are had losing of sensitivity level data message, if found to make the user cause enormous economic loss by other people, these all are that the user extremely is reluctant situation about taking place.
To sum up, find a kind of method that prevents that mobile phone from losing just to seem particularly important.The anti-lost method of mobile phone that adopts can be installed the anti-burglar alarm (patent No. 96243214.8) of losing on mobile phone now, when losing or be stolen, user's mobile phone sends chimes of doom, call user's attention is vigilant, though adopt this method to reduce the theft rate of losing of mobile phone, but need adjunct be installed in the outside of mobile telephone terminal, thereby bring very big trouble for carrying, after making that also if mobile phone is lost, there is not the clue can be according to searching yet, the user is given for change oneself mobile phone, and main is does not allow the personal information of the mobile phone inside of losing be stolen by others can not to give to realize.
In the prior art, also can follow the trail of International Mobile Station Equipment Identity sign indicating number IMEI (International Mobile Station Equipment Identity) by the equipment identity register EIR (Equipment Identity Register) of mobile communication carrier's exchange side and search the mobile phone of losing, but adopt this method to need mobile communication carrier's increase equipment input, also to solve the Web-compatible problem of different operators, this will increase the network input cost, and searching accuracy neither be very high simultaneously.
Secondly, application number is the method for designing that discloses a kind of digital mobile phone that can be lost and found again in 00136188.0 the patent application document, this method is: when packing subscriber identification module into illegal in mobile phone, mobile phone can be dialed the legal number of originally having imported automatically or regularly under normal ideal case, can illegal machine master get in touch so that legal machine is advocated peace by implementing this scheme, or legal machine main root is directly reported to the police according to numbers displayed on the own mobile phone, can make the mobile phone of losing lost and found again by such scheme, reduce the economic loss that people cause because of negligence.But this method also exists drawback: though first mobile phone lose or stolen after, after promptly being replaced by disabled user's identification module, the disabled user still can use this mobile phone to communicate, the legal machine master's of the inner former storage of this mobile phone personal information is browsed and checked, this is not only the loss problem of losing a mobile phone with regard to causing for legal machine master, and bigger loss then may be other economic losses and the personal damage that causes because of losing of former data information stored.The mobile phone that increases this anti-lost function simultaneously is also also for proposing a kind of processing method that how to realize increasing at a distance validated user, user to remote this mobile phone of use can not be discerned, in particular cases as use this mobile phone to bring very burden can for the friends and family of validated user at some.
Summary of the invention
The purpose of this invention is to provide a kind of method that mobile communication terminal and subscriber identification module are bound, use the mobile communication terminal that this method not only can finding lost, and the private data information that can prevent to be stored in the mobile communication terminal checked by other people, can also realize increasing at a distance simultaneously the function of other validated users.
For realizing above-mentioned mobile communication terminal that not only can finding lost, and the private data information that can prevent to be stored in the mobile communication terminal is checked purpose by other people, the present invention proposes a kind of method that mobile communication terminal and subscriber identification module are bound, comprising:
(P1) binding that password information is used for mobile communication terminal and first subscriber identification module is set, assigned number is set simultaneously;
(P2) if the follow-up subscriber identification module of described mobile communication terminal being changed differs from the subscriber identification module of having bound at every turn, carry out:
(E1) judge in the fixed length information of whether correctly entering password in the time, if, the mobile communication terminal operate as normal; If not, forward step (E2) to;
(E2) mobile communication terminal is encoded into data message to the number information of the subscriber identification module of changing or voice messaging sends to assigned number, forwards step (E1) simultaneously to.
For realizing the purpose of above-mentioned remote other validated users of increase, the present invention also proposes a kind of method that mobile communication terminal and subscriber identification module are bound, and comprising:
(p1) binding that password information is used for mobile communication terminal and first subscriber identification module is set, assigned number is set simultaneously;
(p2) if the follow-up subscriber identification module of described mobile communication terminal being changed differs from the subscriber identification module of having bound at every turn, carry out:
(e1) judge in the fixed length information of whether correctly entering password in the time, if, the mobile communication terminal operate as normal; If not, forward step (e2) to;
(e2) mobile communication terminal is encoded into data message to the number information of the subscriber identification module of changing or voice messaging sends to assigned number;
(e3) mobile communication terminal of assigned number sends and has the mobile communication terminal that the data-message of removing password information arrives the replacing subscriber identification module, makes the subscriber identification module binding of this mobile communication terminal and replacing.
For preventing that mobile communication terminal from not having and self subscriber identification module is bound when losing, the present invention also proposes a kind of method that mobile communication terminal and subscriber identification module are bound, and comprising:
(p10) first mobile communication terminal sends and comprises that the data-message of password information is to second mobile communication terminal, be used for the binding of second mobile communication terminal and self subscriber identification module, the number information that the subscriber identification module of second mobile communication terminal self is set simultaneously is an assigned number;
(p20) if the follow-up subscriber identification module of second mobile communication terminal being changed differs from the subscriber identification module of having bound at every turn, carry out:
(e10) judge in the fixed length information of whether correctly entering password in the time, if, the second mobile communication terminal operate as normal; If not, forward step (e20) to;
(e20) second mobile communication terminal is encoded into data message to the number information of the subscriber identification module of changing or voice messaging sends to assigned number, forwards step (e10) simultaneously to.
The invention has the beneficial effects as follows: by the binding relationship of mobile communication terminal and subscriber identification module, after disabled user's identification module inserts this mobile communication terminal, if in official hour, can not import correct password information, then this mobile communication terminal then can carry out data mode or voice mode is notified original validated user according to the assigned number of storage in advance, simultaneously do not allow this disabled user this mobile communication terminal to be carried out any other operation, make validated user to recover the mobile communication terminal of losing, also can guarantee to be kept at originally the interior private data information of this terminal simultaneously and do not browsed by other people according to the number information of disabled user's identification module; The function of remote increase validated user that this method is also perfect on the basis of existing technology.
Description of drawings
Fig. 1 is mobile phone detects authentication to SIM card a flow chart;
Fig. 2 is a fixed length can not correctly enter password information in the time time, the handling process of mobile phone.
Embodiment
Below in conjunction with accompanying drawing the specific embodiment of the present invention is done further sets forth in detail.
Mobile communication terminal of the present invention not only comprises mobile phone, but also comprises other mobile communication terminals that contain subscriber identification module, as: personal digital assistant PDA, notebook computer etc.
Subscriber identification module of the present invention comprises the SIM card (Subscriber Identity Module) in the GSM network and the UIM card (UserIdentity Module) of cdma network, includes user's identity information in SIM card and the UIM card.
Below be that example describes specific embodiments of the present invention in detail only with the mobile phone that in the GSM mobile communications network, moves, subscriber identification module at this moment is SIM card.The same present embodiment of know-why in a plurality of combinations of other mobile communications networks, other mobile communication terminals the processing of losing being adopted repeats no more here.
Here hypothesis has three users, and user A is a validated user, and the mobile phone that he holds has the function of binding with SIM card, and the SIM card number of user A is Numberl; User B holds the disabled user that the SIM card number is Number2; User C be hold the SIM card number be Number3's and with the user of user A understanding; To describe three different user A, B, C below uses same portion to have the concrete operating process of mobile phone of binding function.
Because the mobile phone that the party A-subscriber holds has binding function, being embodied in the basic menu of mobile phone to increase by one " binding SIM card ", and the form of next cascade menu of its " binding SIM card " menu can be set to following form: binding SIM card
Password is set
Advice method
Short message notification
Enter Number
Advise By Wire
Enter Number
Announcement period
15 minutes
30 minutes
Change password
Enter old password
Enter new password
Confirm new password
Open binding setting
Enter password
Close binding setting
Enter password
User A carries out setting progressively in the desktop menu of mobile phone, when user A for the first time is the number of oneself that the SIM card of Numberl is inserted into this one when having in the mobile phone of binding function, for losing this mobile phone after preventing because of carelessness, at first select the function menu of " binding SIM card ", activate this function, and then each cascade menu of its next stage is provided with one by one.At first user A keys in a password in the cascade menu of " password is set ", here suppose that the password that user A keys in is " Privacy ", the password information of keying on its tangible mobile phone desktop shows with the form of " * ", for further strengthening the secrecy of user password information.User A at " advice method " if cascade menu in select the mode of short message notification to be used for losing at follow-up mobile phone, send SMS message and notify oneself, also can select the verbal announcement mode of phone according to the concrete user A that requires certainly; According to the further information on the mobile phone desktop, Enter Number then, suppose the SIM card number Numberl (being assigned number) of user A input oneself here, can certainly import other legal SIM card numbers; In " announcement period " of cascade menu, select 15 minutes (being the fixed length time) then.By above-mentioned operating process, user A has just finished the binding to this mobile phone and the SIM card of oneself, user A is as long as use this SIM card of oneself always later on, then each start all need not be re-entered password information " Privacy ", then can directly carry out normal boot program and other handling procedures.
If user A holds other SIM card simultaneously, can also increase to legal card to it with this mobile phone, the increase method is: after this mobile phone is changed other a SIM card, whether mobile phone can automatic monitoring SIM card have the right during start, because this mobile phone has been changed SIM card, so this moment, mobile phone can think that this SIM card is for having no right, in this case, mobile phone can require the correct password information of user A input on self desktop, after user A imports correct password information " Privacy ", then mobile phone enters normal workflow, the SIM card of i.e. this replacing also becomes the legal SIM card of this mobile phone, when this SIM card is moved on this mobile phone later on, each start will can not carried out requirement to it again and enter password.User A can use this two SIM card in turn on this mobile phone like this, has just solved user A supports a plurality of different legal SIM card simultaneously with a mobile phone problem.
User A also can change its password information to the SIM card of each opening and closing method according to specific circumstances, specific practice is: in the selected base menu " binding SIM card ", in its next cascade menu " change password ", import old password information " Privacy ", in next menu that ejects " input casually makes ", import new password information then, suppose that user A wants to change " Safety " and is new password information, then key in " Safety " (on the mobile phone desktop, only showing " * "), next mobile phone can further require user A to confirm that the new password information of input, user A imports new password information " Safety " again and can finish change to the password information of each SIM card.
If this mobile phone of user A is stolen by disabled user B, this mobile phone of user A is when being stolen, the above-mentioned SIM card and the binding of this mobile phone have been carried out, if at this moment user B is the SIM card of Number2 to the number of this mobile phone replacing oneself, when start, can detect this SIM card automatically for having no right, require the correct password information of user B input, this mobile phone is inner simultaneously can start a timer automatically, the timing cycle of this timer is relevant according to the concrete selection of user A, as above-mentioned, at this moment timing cycle is 15 minutes; If user B does not still import correct password information (being " Privacy " as above-mentioned user A when not changing password information) in this 15 minutes fixed length times, the number Number2 in the SIM card of user B is compiled the data message form of short message automatically in this mobile phone inside, then according to inner assigned number information Numberl, this short message is sent to assigned number Numberl, and (general user A can report lost property to the authorities in unit of operation after losing the mobile phone of oneself immediately, the SIM card that its former number that has is Numberl is still effective to oneself), when user A is number that the SIM card of Numberl is when being installed on the other mobile phone, this other mobile phone can receive this short message, user A just can know the state information of the current mobile phone of losing by checking this short message, can further select to search this disabled user B with disabled user B contact or request operator.And hold at disabled user B, it is entirely ignorant of under the incorrect situation of information of oneself repeatedly entering password, the automatic and original machine master of this mobile phone of stealing (user A) gets in touch, but be in the information phase of entering password always, can not make this mobile phone enter normal work, thereby can not check the inner former data information stored of this mobile phone, make the private data information of user A storage be in confidential state always.
If user A selected liaison mode notice at that time, the then above-mentioned information that sends to user A end from disabled user B end is the voice messaging form, informs that user A will remember the telephone number of current caller, in order to follow-up further searching.
Also have a kind of more special situation: user A when stolen this mobile phone, be not provided with number be that the SIM card of Numberl is bound.Then in this case, user A is after the mobile theft of finding oneself is stolen, should send an encryption key short message (described password information may be relevant with the IMEI of this mobile phone) that includes the password information of oneself in stolen mobile phone with other mobile phones immediately, when this mobile phone receives this message, this short message can activate the function menu of " binding SIM card ", automatically the password information that comprises in this short message as the password that activates or remove this function, simultaneously number Numberl is defaulted as assigned number, its disposition was the same when user B thought further to utilize this mobile phone later on, was not giving unnecessary details here.Utilize this technology of appending at a distance can realize some carelessness in particular cases like this.
The purpose that technology also can realize removing password information is appended in same utilization at a distance, and the mobile phone with binding function that makes far-end is automatically terminated by other mobile phones of local terminal when not knowing password information.This situation occur in user A the mobile phone of oneself with binding function lend oneself understanding user C the time, and user C is when the number of this mobile phone being changed oneself is the SIM card of Number3, under the situation of the password information of not knowing user A, then user C can not work normally with this mobile phone, so also can issue short message of user A automatically in the stage of entering password, user A is by reading the number Number3 that comprises in this short message, just send one to its number Number3 and include the decoding key short message of removing password information, the mobile phone that user C holds is by the key message of the releasing password in this short message that reads reception, automatically terminate the constraint of password, enter the normal progress of work.For user A, just can guarantee so still can remove this password information at a distance and fetter the trouble of bringing to user C, increase the degree of safety of password information simultaneously not allowing user C know under the situation of password information of oneself.
To sum up the mobile phone with binding function is illustrated from three situations oneself using, stolen and lend by others others.The mobile phone that has binding function in fact all is identical for the checking process of any its program of situation, referring to Fig. 1:
At first to the mobile phone operation of starting shooting, in the start process, the SIM card that step 10 mobile phone carries himself judges that whether it has the right to use, if then carry out normal boot program, enters normal service condition; Execution in step 20 detects and whether opens binding function if not, if otherwise mobile phone enters normal operating state, if execution in step 30, the user interface of information of entering password will appear on the desktop of mobile phone requiring, start a timer in mobile phone inside in the step 40 simultaneously, be used for official hour length is carried out timing, judge in step 50 whether the user has imported correct password information in official hour length, if then this mobile phone enters normal operating state; Mobile phone sends corresponding data information or voice messaging to assigned number according to the predefined mode of validated user in step 60 if not, forwards the stage that step 30 is carried out the information of entering password in the length at the appointed time of next round then to.
When the timing of specific length arrives, if the user can not import correct password information, then flow process shown in Figure 2 is carried out in mobile phone inside: step 100 is when timing arrives, timer sends triggering signal to short message module, judge in step 200 whether sms notification is opened, if the short message module transmission comprises the validated user of the short message of current use SIM card number information to the assigned number place in step 300.If otherwise execution in step 400 judges whether the Advise By Wire mode opens, if execution in step 500, voice module is called out to validated user according to the assigned number that validated user sets in advance, and validated user and disabled user are got in touch; If otherwise forward step 600 to, after the timer zero clearing, restart timing, enter in the step 700 simultaneously and require the enter password step of information of user, step 800 judges whether the password information of input is correct, enter normal operating conditions if forward step 900 mobile phone to, forward to once more if not and enter new one in the step 100 and take turns and send the operation of the data message that comprises current disabled user's SIM card number or voice messaging to validated user.
Wherein password information can be implemented long-range mode of appending, promptly under the situation that the mobile phone with binding function does not carry out binding with self SIM card, the encryption key that can adopt one of the remote transmission of wireless mode to have password information carries out the strange land binding to this mobile phone; Can adopt also simultaneously that wireless mode is remote to be sent one and have the decruption key of removing password information and this mobile phone is carried out the strange land increase other validated users.
The above only is a preferred implementation of the present invention.Should be pointed out that for those skilled in the art under the prerequisite that does not break away from the principle of the invention, can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (10)

1, a kind of method that mobile communication terminal and subscriber identification module are bound is characterized in that, comprising:
(P1) binding that password information is used for mobile communication terminal and first subscriber identification module is set, assigned number is set simultaneously;
(P2) if the follow-up subscriber identification module of described mobile communication terminal being changed differs from the subscriber identification module of having bound at every turn, carry out:
(E1) judge in the fixed length information of whether correctly entering password in the time, if, the mobile communication terminal operate as normal; If not, forward step (E2) to;
(E2) number information of mobile communication terminal subscriber identification module that step (P2) is changed is encoded into data message or voice messaging sends to assigned number, forwards step (E1) simultaneously to.
2, method of binding according to claim 1 is characterized in that, also further comprises in the described step (P2) subscriber identification module of changing is judged whether the step of having bound.
3, method of binding according to claim 2 is characterized in that, described step (E1) if in the information of correctly entering password also further comprise the step of changing password information.
4, method of binding according to claim 3 is characterized in that, also comprises in the described step (E1) with the timer step of control fixed length time.
5, a kind of method that mobile communication terminal and subscriber identification module are bound is characterized in that, comprising:
(p1) binding that password information is used for mobile communication terminal and first subscriber identification module is set, assigned number is set simultaneously;
(p2) if the follow-up subscriber identification module of described mobile communication terminal being changed differs from the subscriber identification module of having bound at every turn, carry out:
(e1) judge in the fixed length information of whether correctly entering password in the time, if, the mobile communication terminal operate as normal; If not, forward step (e2) to;
(e2) number information of mobile communication terminal subscriber identification module that step (p2) is changed is encoded into data message or voice messaging sends to assigned number;
(e3) mobile communication terminal of assigned number sends and has the mobile communication terminal that the data-message of removing password information arrives the replacing subscriber identification module, makes the subscriber identification module binding of this mobile communication terminal and replacing.
6, method of binding according to claim 5 is characterized in that, also further comprises in the described step (p2) subscriber identification module of changing is judged whether the step of having bound.
7, method of binding according to claim 6 is characterized in that, described step (e1) if in the information of correctly entering password also further comprise the step of changing password information.
8, method of binding according to claim 7 is characterized in that, also comprises in the described step (e1) with the timer step of control fixed length time.
9, a kind of method that mobile communication terminal and subscriber identification module are bound is characterized in that, comprising:
(p10) first mobile communication terminal sends and comprises that the data-message of password information is to second mobile communication terminal, be used for the binding of second mobile communication terminal and self subscriber identification module, the number information that the subscriber identification module of second mobile communication terminal self is set simultaneously is an assigned number;
(p20) if the follow-up subscriber identification module of second mobile communication terminal being changed differs from the subscriber identification module of having bound at every turn, carry out:
(e10) judge in the fixed length information of whether correctly entering password in the time, if, the second mobile communication terminal operate as normal; If not, forward step (e20) to;
(e20) second mobile communication terminal is encoded into data message to the number information of the subscriber identification module of changing or voice messaging sends to assigned number, forwards step (e10) simultaneously to.
10, method of binding according to claim 9 is characterized in that, also further comprises in the described step (p20) subscriber identification module of changing is judged whether the step of having bound; Described step (e10) if in the information of correctly entering password also further comprise the step of changing password information.
CNA031482023A 2003-07-01 2003-07-01 Method of bundling mobile communication terminal and subscriber identifying module Pending CN1469675A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA031482023A CN1469675A (en) 2003-07-01 2003-07-01 Method of bundling mobile communication terminal and subscriber identifying module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA031482023A CN1469675A (en) 2003-07-01 2003-07-01 Method of bundling mobile communication terminal and subscriber identifying module

Publications (1)

Publication Number Publication Date
CN1469675A true CN1469675A (en) 2004-01-21

Family

ID=34156229

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA031482023A Pending CN1469675A (en) 2003-07-01 2003-07-01 Method of bundling mobile communication terminal and subscriber identifying module

Country Status (1)

Country Link
CN (1) CN1469675A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100376120C (en) * 2004-09-09 2008-03-19 日本电气株式会社 Portable cellular phone terminal and portable phone system including the same
CN100420324C (en) * 2006-03-15 2008-09-17 华为技术有限公司 Method for protecting information safety in mobile terminal
CN100452813C (en) * 2004-11-23 2009-01-14 乐金电子(中国)研究开发中心有限公司 User verification processing system for contemporary mobile communication terminal and its running method
CN101106768B (en) * 2006-07-12 2010-05-12 英华达(南京)科技有限公司 Data confidentiality and data return method for mobile communication device
CN1988552B (en) * 2005-12-20 2010-11-10 中国电信股份有限公司 Method for automatic identifying and configuring terminal
CN1921390B (en) * 2006-09-08 2011-11-02 网之易信息技术(北京)有限公司 User identification identifying method and system
US8089589B2 (en) 2002-07-10 2012-01-03 Nlt Technologies, Ltd. Semi-transmissive-type liquid crystal display device and method for manufacturing same
CN101083816B (en) * 2007-07-30 2012-04-18 中兴通讯股份有限公司 Wireless terminal and method for mutual locking and unlocking with user recognition card
CN103813335A (en) * 2014-03-05 2014-05-21 上海优思通信科技有限公司 Security protection method of mobile communication terminal
CN104024992A (en) * 2012-01-10 2014-09-03 内奥诺德公司 Combined radio-frequency identification and touch input for a touch screen
WO2015077947A1 (en) * 2013-11-28 2015-06-04 任明 System for recovering lost device
CN106470268A (en) * 2015-08-20 2017-03-01 腾讯科技(深圳)有限公司 A kind of method and apparatus of antitheft mobile phone

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8089589B2 (en) 2002-07-10 2012-01-03 Nlt Technologies, Ltd. Semi-transmissive-type liquid crystal display device and method for manufacturing same
US7778668B2 (en) 2004-09-09 2010-08-17 Nec Corporation Portable cellular phone system and portable cellular phone terminal device used in same system
CN100376120C (en) * 2004-09-09 2008-03-19 日本电气株式会社 Portable cellular phone terminal and portable phone system including the same
CN100452813C (en) * 2004-11-23 2009-01-14 乐金电子(中国)研究开发中心有限公司 User verification processing system for contemporary mobile communication terminal and its running method
CN1988552B (en) * 2005-12-20 2010-11-10 中国电信股份有限公司 Method for automatic identifying and configuring terminal
CN100420324C (en) * 2006-03-15 2008-09-17 华为技术有限公司 Method for protecting information safety in mobile terminal
CN101106768B (en) * 2006-07-12 2010-05-12 英华达(南京)科技有限公司 Data confidentiality and data return method for mobile communication device
CN1921390B (en) * 2006-09-08 2011-11-02 网之易信息技术(北京)有限公司 User identification identifying method and system
CN101083816B (en) * 2007-07-30 2012-04-18 中兴通讯股份有限公司 Wireless terminal and method for mutual locking and unlocking with user recognition card
CN104024992A (en) * 2012-01-10 2014-09-03 内奥诺德公司 Combined radio-frequency identification and touch input for a touch screen
WO2015077947A1 (en) * 2013-11-28 2015-06-04 任明 System for recovering lost device
CN103813335A (en) * 2014-03-05 2014-05-21 上海优思通信科技有限公司 Security protection method of mobile communication terminal
CN103813335B (en) * 2014-03-05 2017-03-15 上海优思通信科技有限公司 Communication terminal method for security protection
CN106470268A (en) * 2015-08-20 2017-03-01 腾讯科技(深圳)有限公司 A kind of method and apparatus of antitheft mobile phone

Similar Documents

Publication Publication Date Title
CN1302682C (en) Mobile communication terminal and method for managing use-history information
US9048926B2 (en) Multi-card mobile terminal and SIM card data dumping method thereof
CN1181664C (en) Mobile telephone apparatus and method for call divert service
CN100556052C (en) Telephone number change notification method and telephone number change notification system
CN1665260A (en) A remote control method for mobile telephone
CN1533207A (en) Method for delocking mobile phone radio communication terminal
CN101141722B (en) Safety mobile telephone based on user vocal feature and implementing method thereof
CN101616212B (en) Mobile phone and method for automatically searching same
CN104967748A (en) Application service safe operation method
CN101873395B (en) Mobile phone and urgent help seeking method thereof
CN1305258C (en) Patabase maintenance method and system for communication network
CN1469675A (en) Method of bundling mobile communication terminal and subscriber identifying module
CN1767681A (en) Dual mode mobile communication terminal and auto-recognition card are also selected the method for drive pattern
CN1377199A (en) Telecommunication system
CN1541015A (en) Method and system of preventing handset from theft by using international id code of mobile facilities
CN1929665A (en) Short message control method of mobile phone function
CN1801869A (en) Anti-theft method for mobile communication terminal and its anti-theft system
CN1398097A (en) Portable terminal device having calling control and personal data insertion control
CN1859677A (en) Method for protecting information safety in mobile terminal
CN101309136A (en) Private short message inbox, private short message protecting method and mobile terminal
CN1606326A (en) Security management method for mobile phone
CN1434626A (en) Theft-proof device and method for mobile telephone
CN1302681C (en) Method for preventing burglarious of mobile phone and anti-theft mobile phone
CN103338314A (en) Method for realizing information safety through conversation and mobile terminal thereof
CN1984404A (en) Method for destroying terminal information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
C20 Patent right or utility model deemed to be abandoned or is abandoned