CN1606326A - Security management method for mobile phone - Google Patents
Security management method for mobile phone Download PDFInfo
- Publication number
- CN1606326A CN1606326A CN 200310105812 CN200310105812A CN1606326A CN 1606326 A CN1606326 A CN 1606326A CN 200310105812 CN200310105812 CN 200310105812 CN 200310105812 A CN200310105812 A CN 200310105812A CN 1606326 A CN1606326 A CN 1606326A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- control centre
- management program
- security management
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
A safe management method for cell phones characterizes in storing a safety management process containing 'a safety code' in a cell phone then sending primary user information to a control center storing the information, activating the cell phone safety management program. When the control center receives the unlock service request of a user, it confirms it to send the information with the 'safety code' to unlock it and close down the safety management program. This invention is used after the cell phone is lost.
Description
Technical field
The present invention relates to a kind of mobile phone method for managing security.
Background technology
According to statistics, there is 710,000 hand-set from stolen every year in Britain now, and just have a mobile phone stolen average per 45 seconds.The mobile phone loss by theft rate has risen 190% than the nineteen ninety-five.Simultaneously according to incompletely statistics, had 40,000 cellphone subscribers to lose mobile phone in this year in Beijing in 1999, time mobile phone was reported the loss business surplus Beijing mobile operator had handled 35000 the same period, handled 4000 at most in one month surplus.Beijing UNICOM handles the mobile phone business of reporting the loss approximately also to be had about 5000 times.Avoid the technological means of hand-set from stolen more at present, but all in various degree have shortcoming or a defective.
1. by the password lock machine: self has cipher protection function mobile phone.It is by mobile phone " coded lock " order, or the PIN code of setting mobile phone, prevents that unauthorized from using mobile phone or SIM card.This method is after inputing three PIN code by mistake, and SIM card can pintle hook lock.If the number of times of inputing by mistake surpasses ten times, SIM card will be burnt out.Its shortcoming is: the cellphone subscriber must be familiar to the function of mobile phone, if program error occurs in cryptographic processes is set, can cause handset program destroyed, and mobile phone is by locked and can't use; Password cracks easily.
2. handset identity code: handset identity code aims at GSM mobile communication design, and it is monitored mobile phone by the identification code of each MOBI.Shortcoming is: 1] cost is too high, and mobile communication carrier of average every family will spend about 1,600 ten thousand pounds; 2] repeated code might appear in handset identity code, only stops the continuation of mobile phone to be used with identification code, may make the user of same handset identity code disabled; 3] because present each wireless network can't be taked restriction simultaneously to mobile phone, make this scheme implementation difficulty.Adopt a kind of " international mobile subscriber identity catcher ".Instrument, can utilize the leak of GSM communication network to obtain the details of all mobile phones within the specific limits, also can write down handset identity code.By this instrument, can under situation about not discovered, search stolen mobile phone.But, also implement difficulty because this technology can be intercepted and captured the dialog context of all mobile phones.
3. antitheft mobile phone Antistealing device is to be one group with handset of a machine tool band, and behind the machine tool setting program, handset is left set during apart from 3-8 rice or 20-30 rice, and machine tool can be responded to rapidly and give the alarm.Kobra is that kind is the warning system of prototype with " attack alarm ", when mobile phone is robbed, can send the shriek of high-decibel." intelligent anti-theft cell-phone cover ", the patent No.: ZL01275422.6, utilization be principles such as human body sensing, controlled in wireless, anyone opens cell-phone cover except that the machine master, just reports to the police automatically at once before hand touches mobile phone; Even mobile phone drops out in leather sheath, also can send alarm sound.Such anti-theft device uses all inconvenient, has not only increased extra cost, and the limitation of using is bigger.
4. stolen mobile phone self-destruction and remote control self-destruction, the patent No.: 03126570.X and 03126571.X.Can send self damaging order, comprise the illegal replacing that has limited Subscriber Identity Module; Shortcoming: the right to choose that has limited the user; Shutdown can't self-destruction, uses inconveniently, has also caused economic loss.
5. mobile phone screen constant mark can stamp photo in the mobile phone screen background, the technology of name and telephone number, but do not influence the original function of mobile phone, use, almost there is not antitheft effect.
6. mode identificating software, when the mode identificating software system works usually at mobile phone, automatically some characteristic parameters of mobile phone are used in storage at every turn, according to the content of parameter of collecting each time, analyze summary, analyzing total is born next data as last pattern recognition standard, give the more integrated intelligent monitored control modules of this identification software again, form a last complete cover recognition system, and this system is installed on the mobile communications network.Afterwards, if there are other users to use this mobile phone, in case when the standard use pattern that provides in pattern of using and the recognition system software has than big difference, this system identification software will send the information requirements user automatically and import correct PIN; If PIN is incorrect, the cell phone network system just assert that this user is the disabled user, thereby cuts off network system automatically, allows the disabled user can't continue to use mobile phone.Shortcoming: can't distinguish misoperation of users.
7. based on the anti-mobile phone free call on sb. else's expense through illegal means detecting system of SIM cards of mobile phones.This mobile phone antitheft system and Virtual network operator cooperation by SIMLOCK is set, make mobile phone become complete personalized products.Use this burglary-resisting system, the user can be locked in the mobile phone that oneself uses on the SIM card of own appointment in advance regularly, if after mobile phone is lost, when other users need change other SIM card, mobile phone was with cisco unity malfunction.The cellphone subscriber also can set mobile phone antitheft system in addition, allow cell-phone lock fix on the whole network of operator, these are all is provided with parameter all with encrypted and be distributed on the memory, other users are when using mobile phone, and this system will be automatically carries out information check to information that stores on the mobile phone and corresponding SIM card store information and contrasts.If find inconsistently will automatically lock mobile phone, and allow other users can't continue to use mobile phone.In a single day this function enables, and mobile phone then can not re-use other SIM card.Use inconvenience, user oneself can not change SIM card.
8. fingerprint recognition system is to utilize people's physiological characteristic to discern individual identity.Because people's fingerprint has uniqueness and stability.The phone-holder is placed on the fingerprint inductor place with finger when dialing, whether mobile phone can be recognized this fingerprint consistent with the mobile phone machine master sample fingerprint of prior input.In case different, the phone-holder then can't get.Limited user's right to choose; The user uses inconvenience, and especially cost is very high.
Summary of the invention
The invention solves background technology qualification user's right to choose, feasibility is poor, is subject to the influence of misoperation; Realization is influenced by the open and close machine, and password easily cracks, and reliability is low, influences the technical problem of other validated user.
Technical solution of the present invention is:
A kind of mobile phone method for managing security, its special character is: this method comprises
1). at first, the security management program that will contain " safety code " is stored in the mobile phone;
2). send first user profile to control centre, control centre stores information;
3). the security management program that Activates Phone
(1). when the user when control centre sends service request, after control centre confirms user identity, send the information that contains " safety code ", the security management program that Activates Phone to this mobile phone; When mobile phone is inserted as former SIM card, after security management program is confirmed safety code, the display system of locking mobile phone, and show information warning, the while sends the affirmation information of having moved to control centre;
(2). when no SIM card is inserted in the mobile phone, there is not communication between mobile phone and reception control centre; Still do not have SIM card to insert after surpassing setting-up time in the mobile phone, security management program will start automatically, the display system of locking mobile phone, and show information warning;
(3). when mobile phone inserts new SIM card, security management program will start automatically, and send information to control centre, and whether check this SIM card number consistent with user profile; Not, then security management program continues operation, the display system of locking mobile phone, and show information warning; Be that then security management program is out of service;
4). when control centre received user's release service request, control centre sent the information that contains " safety code " to this mobile phone after confirming, to the mobile phone release, the closed safe hypervisor.
Above-mentioned security management program can adopt the embedded type control system, and its structure comprises:
1). the control module of carrying out safety code access, control program and the synchronous operation of mobile phone correlation module, mistake being handled;
2). be connected, receive and send the communication module of information with the mobile communication system;
3). accept information that control centre sends, make and start and close judgement, and command transfer is given the signaling processing module of device driver module;
4). the device driver module of blocking-up mobile phone input and output system after the order of receiving signaling processing module.
Above-mentioned safety code can be the number that security management program is assert handset identities, is the key that control centre and mobile phone are all discerned.
After above-mentioned control centre received first user profile, when receiving service request, first user profile can be called or revise in control centre.
The send mode of above-mentioned first user profile can adopt short message, phone or the Internet etc.
Above-mentioned user profile can comprise that address name, phone number, address, identification card number or password and password forget the problem clew under the situation etc.
The present invention has following advantage:
1. application of the present invention is lost the back at mobile phone and is started, and therefore uses more conveniently, can not increase extra use cost simultaneously; Production cost is also lower;
2. lost mobile phone or stolen and promptly can't use after leaving the machine master can effectively be protected the personal information of machine primary storage in mobile phone inside, to user's right to choose indefinite, and defines the ownership of mobile phone;
3. can handle at the concrete condition of mobile phone, processing mode is flexible, has made full use of existing communication resources;
4. implementation method is easy, grasps easily, is not subjected to the influence of misoperation; The user can change SIM card as required, is not subjected to of the present invention the influence;
5. realization of the present invention is not subjected to the influence of open and close machine; Password is difficult for cracking; Safe in utilization, reliable; Other validated user there is not influence.
Description of drawings
Accompanying drawing is a principle schematic of the present invention.
Embodiment
Referring to accompanying drawing, this method comprises
1. at first, security management program is stored in the mobile phone, this program is the program that contains " safety code ".
2. by control centre mobile phone is carried out first user profile input, control centre stores information, and information can be called by control centre after receiving service request.User profile can comprise that address name, phone number, address, identification card number or password and password forget the problem clew under the situation etc.After first user profile input was finished, the user can make amendment to the information content.The send mode of first user profile can be short message, phone or the Internet etc.
3. the security management program that Activates Phone
(1). when the user when control centre sends service request, after control centre confirms user identity, send the information that contains " safety code ", the security management program that Activates Phone to this mobile phone; When mobile phone is inserted as former SIM card, after security management program is confirmed safety code, the display system of locking mobile phone, and show information warning, the while sends the affirmation information of having moved to control centre;
(2). when no SIM card is inserted in the mobile phone, there is not communication between mobile phone and reception control centre; Still do not have SIM card to insert after surpassing setting-up time in the mobile phone, security management program will start automatically, the display system of locking mobile phone, and show information warning;
(3). when mobile phone inserts new SIM card, security management program will start automatically, and send information to control centre, and whether check this SIM card number consistent with user profile; Not, then security management program continues operation, the display system of locking mobile phone, and show information warning; Be that then security management program is out of service;
4. after mobile phone was returned validated user, the user sent service request to control centre, and control centre sends the information that contains " safety code " to this mobile phone after confirming, to the mobile phone release, and the closed safe hypervisor.
The mobile phone of this patent indication has comprised existing GSM, CDMA and PHS mobile phone PAS, also relates to the personal digital assistant PDA product of subsidiary wireless communication function simultaneously.
After mobile phone adopts 3G technology, owing to be not subjected to the restriction of bandwidth, the SM program can be monitored in real time to mobile phone, for example the communication between control centre and the mobile phone is needing the data in server conversion in the GSM network at present, behind the full-digital network that enters 3G, just can directly set up communication end to end by circuit switch.Therefore mobile phone safety code technology can faster, more effectively be realized after adopting 3G technology.
Claims (6)
1. mobile phone method for managing security, it is characterized in that: this method comprises
1). at first, the security management program that will contain " safety code " is stored in the mobile phone;
2). send first user profile to control centre, control centre stores information;
3). the security management program that Activates Phone
(1). when the user when control centre sends service request, after control centre confirms user identity, send the information that contains " safety code ", the security management program that Activates Phone to this mobile phone; When mobile phone is inserted as former SIM card, after security management program is confirmed safety code, the display system of locking mobile phone, and show information warning, the while sends the affirmation information of having moved to control centre;
(2). when no SIM card is inserted in the mobile phone, there is not communication between mobile phone and reception control centre; Still do not have SIM card to insert after surpassing setting-up time in the mobile phone, security management program will start automatically, the display system of locking mobile phone, and show information warning;
(3). when mobile phone inserts new SIM card, security management program will start automatically, and send information to control centre, and whether check this SIM card number consistent with user profile; Not, then security management program continues operation, the display system of locking mobile phone, and show information warning; Be that then security management program is out of service;
4). when control centre received user's release service request, control centre sent the information that contains " safety code " to this mobile phone after confirming, to the mobile phone release, the closed safe hypervisor.
2. mobile phone method for managing security as claimed in claim 1 is characterized in that: described security management program is the embedded type control system, and its structure comprises:
1). the control module of carrying out safety code access, control program and the synchronous operation of mobile phone correlation module, mistake being handled;
2). be connected, receive and send the communication module of information with the mobile communication system;
3). accept information that control centre sends, make and start and close judgement, and command transfer is given the signaling processing module of device driver module;
4). the device driver module of blocking-up mobile phone input and output system after the order of receiving signaling processing module.
3. mobile phone method for managing security as claimed in claim 1 or 2 is characterized in that: described safety code is the number that security management program is assert handset identities, is the key that control centre and mobile phone are all discerned.
4. mobile phone method for managing security as claimed in claim 3 is characterized in that: after described control centre received first user profile, when receiving service request, first user profile is called or revised in control centre.
5. mobile phone method for managing security as claimed in claim 4 is characterized in that: the send mode of described first user profile is short message, phone or the Internet.
6. mobile phone method for managing security as claimed in claim 5 is characterized in that: described user profile comprises that address name, phone number, address, identification card number or password and password forget the problem clew under the situation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2003101058124A CN100502599C (en) | 2003-10-10 | 2003-10-10 | Security management method for mobile phone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2003101058124A CN100502599C (en) | 2003-10-10 | 2003-10-10 | Security management method for mobile phone |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1606326A true CN1606326A (en) | 2005-04-13 |
CN100502599C CN100502599C (en) | 2009-06-17 |
Family
ID=34757426
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2003101058124A Expired - Fee Related CN100502599C (en) | 2003-10-10 | 2003-10-10 | Security management method for mobile phone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100502599C (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007056951A1 (en) * | 2005-11-16 | 2007-05-24 | Chao Qiao | System and method for preventing the theft of software and hardware with communication condition/function |
CN100431369C (en) * | 2005-06-03 | 2008-11-05 | 乐金电子(中国)研究开发中心有限公司 | Locking method of mobile communication terminal |
CN100452908C (en) * | 2005-11-16 | 2009-01-14 | 乔超 | System and method for preventing software and hardware with communication condition / function from being embezzled |
WO2011026361A1 (en) * | 2009-09-04 | 2011-03-10 | 中兴通讯股份有限公司 | Method and apparatus for realizing unlocking for terminal device |
CN101198121B (en) * | 2007-12-28 | 2011-07-20 | 中国移动通信集团四川有限公司 | Authentication method for limiting mobile phone without using by others |
WO2011127697A1 (en) * | 2010-04-16 | 2011-10-20 | 中兴通讯股份有限公司 | Security management method for mobile terminal and mobile terminal thereof |
CN102576401A (en) * | 2009-10-09 | 2012-07-11 | 日本电气株式会社 | Mobile device, and security lock control method and program thereof |
CN101600260B (en) * | 2008-06-04 | 2012-11-14 | 宇龙计算机通信科技(深圳)有限公司 | Method and terminal for realizing terminal parameter setting |
CN103856620A (en) * | 2012-12-06 | 2014-06-11 | 华为终端有限公司 | Method and device for controlling terminal to close down |
CN101960738B (en) * | 2008-02-28 | 2014-11-05 | 思蒙株式会社 | Method and system of providing personal information control service for mobile communication terminal |
CN104281811A (en) * | 2013-07-10 | 2015-01-14 | 中国移动通信集团北京有限公司 | Terminal self-destruction method, system and device |
CN101827160B (en) * | 2009-12-29 | 2015-04-08 | 华为终端有限公司 | Locking/unlocking control method and device and mobile terminal |
CN105447345A (en) * | 2014-09-30 | 2016-03-30 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal application control method and apparatus |
CN108537039A (en) * | 2018-04-08 | 2018-09-14 | 中国联合网络通信集团有限公司 | Control device, method, equipment and the computer readable storage medium of mobile terminal |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103020503B (en) * | 2012-12-19 | 2015-11-18 | 东莞宇龙通信科技有限公司 | The verification method of terminal and user identity |
US11500653B2 (en) | 2020-02-05 | 2022-11-15 | International Business Machines Corporation | Signal handling between programs associated with different addressing modes |
-
2003
- 2003-10-10 CN CNB2003101058124A patent/CN100502599C/en not_active Expired - Fee Related
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100431369C (en) * | 2005-06-03 | 2008-11-05 | 乐金电子(中国)研究开发中心有限公司 | Locking method of mobile communication terminal |
CN100452908C (en) * | 2005-11-16 | 2009-01-14 | 乔超 | System and method for preventing software and hardware with communication condition / function from being embezzled |
WO2007056951A1 (en) * | 2005-11-16 | 2007-05-24 | Chao Qiao | System and method for preventing the theft of software and hardware with communication condition/function |
CN101198121B (en) * | 2007-12-28 | 2011-07-20 | 中国移动通信集团四川有限公司 | Authentication method for limiting mobile phone without using by others |
CN101960738B (en) * | 2008-02-28 | 2014-11-05 | 思蒙株式会社 | Method and system of providing personal information control service for mobile communication terminal |
CN101600260B (en) * | 2008-06-04 | 2012-11-14 | 宇龙计算机通信科技(深圳)有限公司 | Method and terminal for realizing terminal parameter setting |
US8750831B2 (en) | 2009-09-04 | 2014-06-10 | Zte Corporation | Method and apparatus for realizing unlocking for terminal device |
WO2011026361A1 (en) * | 2009-09-04 | 2011-03-10 | 中兴通讯股份有限公司 | Method and apparatus for realizing unlocking for terminal device |
CN102576401A (en) * | 2009-10-09 | 2012-07-11 | 日本电气株式会社 | Mobile device, and security lock control method and program thereof |
CN101827160B (en) * | 2009-12-29 | 2015-04-08 | 华为终端有限公司 | Locking/unlocking control method and device and mobile terminal |
WO2011127697A1 (en) * | 2010-04-16 | 2011-10-20 | 中兴通讯股份有限公司 | Security management method for mobile terminal and mobile terminal thereof |
CN103856620A (en) * | 2012-12-06 | 2014-06-11 | 华为终端有限公司 | Method and device for controlling terminal to close down |
CN103856620B (en) * | 2012-12-06 | 2016-09-28 | 华为终端有限公司 | Control the method and device of terminal closedown |
CN104281811A (en) * | 2013-07-10 | 2015-01-14 | 中国移动通信集团北京有限公司 | Terminal self-destruction method, system and device |
CN105447345A (en) * | 2014-09-30 | 2016-03-30 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal application control method and apparatus |
CN108537039A (en) * | 2018-04-08 | 2018-09-14 | 中国联合网络通信集团有限公司 | Control device, method, equipment and the computer readable storage medium of mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN100502599C (en) | 2009-06-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100502599C (en) | Security management method for mobile phone | |
CN1469674A (en) | Method for locking mobile telecommunication terminal | |
CN101568119A (en) | Mobile terminal with antitheft function and antitheft method thereof | |
CN1487763A (en) | Method for guaranteeing mobile communication terminal safety | |
US20030220096A1 (en) | Paired SIM card function | |
CN1533207A (en) | Method for delocking mobile phone radio communication terminal | |
CN101873395B (en) | Mobile phone and urgent help seeking method thereof | |
GB2393616A (en) | Terminal device lock system | |
CN1665260A (en) | A remote control method for mobile telephone | |
CN102011523B (en) | Automobile fingerprint password computer burglar-proof lock | |
CN1963128A (en) | Intelligent antitheft lock and its construction method | |
CN1980459A (en) | Method for realizing information destroying at network side | |
CN108510635A (en) | A kind of intelligent lock system and its method for unlocking based on light sensation identification | |
CN108347730B (en) | Wireless communication processing method and device | |
CN1302681C (en) | Method for preventing burglarious of mobile phone and anti-theft mobile phone | |
CN1469675A (en) | Method of bundling mobile communication terminal and subscriber identifying module | |
CN100571436C (en) | A kind of implementation method of mobile terminal information resource safety guarantee | |
CN101656966A (en) | Data protection method of mobile terminal, device thereof and mobile terminal | |
CN1710976A (en) | Method for preventing hand-set from stolen | |
CN108533074A (en) | A kind of cloud lock theft preventing method based on NB-IOT | |
CN2638376Y (en) | Locking device using radio communication device | |
CN105897708A (en) | Information protection method and mobile terminal | |
CN1262132C (en) | Method for realizing remote cipher key destruction for secret mobile phone | |
CN1429043A (en) | Method for locking user's identification card and mobile telephone by using short message | |
CN2866731Y (en) | Intelligent antitheft lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090617 Termination date: 20131010 |