CN1606326A - Security management method for mobile phone - Google Patents

Security management method for mobile phone Download PDF

Info

Publication number
CN1606326A
CN1606326A CN 200310105812 CN200310105812A CN1606326A CN 1606326 A CN1606326 A CN 1606326A CN 200310105812 CN200310105812 CN 200310105812 CN 200310105812 A CN200310105812 A CN 200310105812A CN 1606326 A CN1606326 A CN 1606326A
Authority
CN
China
Prior art keywords
mobile phone
control centre
management program
security management
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200310105812
Other languages
Chinese (zh)
Other versions
CN100502599C (en
Inventor
高延飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNB2003101058124A priority Critical patent/CN100502599C/en
Publication of CN1606326A publication Critical patent/CN1606326A/en
Application granted granted Critical
Publication of CN100502599C publication Critical patent/CN100502599C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

A safe management method for cell phones characterizes in storing a safety management process containing 'a safety code' in a cell phone then sending primary user information to a control center storing the information, activating the cell phone safety management program. When the control center receives the unlock service request of a user, it confirms it to send the information with the 'safety code' to unlock it and close down the safety management program. This invention is used after the cell phone is lost.

Description

The mobile phone method for managing security
Technical field
The present invention relates to a kind of mobile phone method for managing security.
Background technology
According to statistics, there is 710,000 hand-set from stolen every year in Britain now, and just have a mobile phone stolen average per 45 seconds.The mobile phone loss by theft rate has risen 190% than the nineteen ninety-five.Simultaneously according to incompletely statistics, had 40,000 cellphone subscribers to lose mobile phone in this year in Beijing in 1999, time mobile phone was reported the loss business surplus Beijing mobile operator had handled 35000 the same period, handled 4000 at most in one month surplus.Beijing UNICOM handles the mobile phone business of reporting the loss approximately also to be had about 5000 times.Avoid the technological means of hand-set from stolen more at present, but all in various degree have shortcoming or a defective.
1. by the password lock machine: self has cipher protection function mobile phone.It is by mobile phone " coded lock " order, or the PIN code of setting mobile phone, prevents that unauthorized from using mobile phone or SIM card.This method is after inputing three PIN code by mistake, and SIM card can pintle hook lock.If the number of times of inputing by mistake surpasses ten times, SIM card will be burnt out.Its shortcoming is: the cellphone subscriber must be familiar to the function of mobile phone, if program error occurs in cryptographic processes is set, can cause handset program destroyed, and mobile phone is by locked and can't use; Password cracks easily.
2. handset identity code: handset identity code aims at GSM mobile communication design, and it is monitored mobile phone by the identification code of each MOBI.Shortcoming is: 1] cost is too high, and mobile communication carrier of average every family will spend about 1,600 ten thousand pounds; 2] repeated code might appear in handset identity code, only stops the continuation of mobile phone to be used with identification code, may make the user of same handset identity code disabled; 3] because present each wireless network can't be taked restriction simultaneously to mobile phone, make this scheme implementation difficulty.Adopt a kind of " international mobile subscriber identity catcher ".Instrument, can utilize the leak of GSM communication network to obtain the details of all mobile phones within the specific limits, also can write down handset identity code.By this instrument, can under situation about not discovered, search stolen mobile phone.But, also implement difficulty because this technology can be intercepted and captured the dialog context of all mobile phones.
3. antitheft mobile phone Antistealing device is to be one group with handset of a machine tool band, and behind the machine tool setting program, handset is left set during apart from 3-8 rice or 20-30 rice, and machine tool can be responded to rapidly and give the alarm.Kobra is that kind is the warning system of prototype with " attack alarm ", when mobile phone is robbed, can send the shriek of high-decibel." intelligent anti-theft cell-phone cover ", the patent No.: ZL01275422.6, utilization be principles such as human body sensing, controlled in wireless, anyone opens cell-phone cover except that the machine master, just reports to the police automatically at once before hand touches mobile phone; Even mobile phone drops out in leather sheath, also can send alarm sound.Such anti-theft device uses all inconvenient, has not only increased extra cost, and the limitation of using is bigger.
4. stolen mobile phone self-destruction and remote control self-destruction, the patent No.: 03126570.X and 03126571.X.Can send self damaging order, comprise the illegal replacing that has limited Subscriber Identity Module; Shortcoming: the right to choose that has limited the user; Shutdown can't self-destruction, uses inconveniently, has also caused economic loss.
5. mobile phone screen constant mark can stamp photo in the mobile phone screen background, the technology of name and telephone number, but do not influence the original function of mobile phone, use, almost there is not antitheft effect.
6. mode identificating software, when the mode identificating software system works usually at mobile phone, automatically some characteristic parameters of mobile phone are used in storage at every turn, according to the content of parameter of collecting each time, analyze summary, analyzing total is born next data as last pattern recognition standard, give the more integrated intelligent monitored control modules of this identification software again, form a last complete cover recognition system, and this system is installed on the mobile communications network.Afterwards, if there are other users to use this mobile phone, in case when the standard use pattern that provides in pattern of using and the recognition system software has than big difference, this system identification software will send the information requirements user automatically and import correct PIN; If PIN is incorrect, the cell phone network system just assert that this user is the disabled user, thereby cuts off network system automatically, allows the disabled user can't continue to use mobile phone.Shortcoming: can't distinguish misoperation of users.
7. based on the anti-mobile phone free call on sb. else's expense through illegal means detecting system of SIM cards of mobile phones.This mobile phone antitheft system and Virtual network operator cooperation by SIMLOCK is set, make mobile phone become complete personalized products.Use this burglary-resisting system, the user can be locked in the mobile phone that oneself uses on the SIM card of own appointment in advance regularly, if after mobile phone is lost, when other users need change other SIM card, mobile phone was with cisco unity malfunction.The cellphone subscriber also can set mobile phone antitheft system in addition, allow cell-phone lock fix on the whole network of operator, these are all is provided with parameter all with encrypted and be distributed on the memory, other users are when using mobile phone, and this system will be automatically carries out information check to information that stores on the mobile phone and corresponding SIM card store information and contrasts.If find inconsistently will automatically lock mobile phone, and allow other users can't continue to use mobile phone.In a single day this function enables, and mobile phone then can not re-use other SIM card.Use inconvenience, user oneself can not change SIM card.
8. fingerprint recognition system is to utilize people's physiological characteristic to discern individual identity.Because people's fingerprint has uniqueness and stability.The phone-holder is placed on the fingerprint inductor place with finger when dialing, whether mobile phone can be recognized this fingerprint consistent with the mobile phone machine master sample fingerprint of prior input.In case different, the phone-holder then can't get.Limited user's right to choose; The user uses inconvenience, and especially cost is very high.
Summary of the invention
The invention solves background technology qualification user's right to choose, feasibility is poor, is subject to the influence of misoperation; Realization is influenced by the open and close machine, and password easily cracks, and reliability is low, influences the technical problem of other validated user.
Technical solution of the present invention is:
A kind of mobile phone method for managing security, its special character is: this method comprises
1). at first, the security management program that will contain " safety code " is stored in the mobile phone;
2). send first user profile to control centre, control centre stores information;
3). the security management program that Activates Phone
(1). when the user when control centre sends service request, after control centre confirms user identity, send the information that contains " safety code ", the security management program that Activates Phone to this mobile phone; When mobile phone is inserted as former SIM card, after security management program is confirmed safety code, the display system of locking mobile phone, and show information warning, the while sends the affirmation information of having moved to control centre;
(2). when no SIM card is inserted in the mobile phone, there is not communication between mobile phone and reception control centre; Still do not have SIM card to insert after surpassing setting-up time in the mobile phone, security management program will start automatically, the display system of locking mobile phone, and show information warning;
(3). when mobile phone inserts new SIM card, security management program will start automatically, and send information to control centre, and whether check this SIM card number consistent with user profile; Not, then security management program continues operation, the display system of locking mobile phone, and show information warning; Be that then security management program is out of service;
4). when control centre received user's release service request, control centre sent the information that contains " safety code " to this mobile phone after confirming, to the mobile phone release, the closed safe hypervisor.
Above-mentioned security management program can adopt the embedded type control system, and its structure comprises:
1). the control module of carrying out safety code access, control program and the synchronous operation of mobile phone correlation module, mistake being handled;
2). be connected, receive and send the communication module of information with the mobile communication system;
3). accept information that control centre sends, make and start and close judgement, and command transfer is given the signaling processing module of device driver module;
4). the device driver module of blocking-up mobile phone input and output system after the order of receiving signaling processing module.
Above-mentioned safety code can be the number that security management program is assert handset identities, is the key that control centre and mobile phone are all discerned.
After above-mentioned control centre received first user profile, when receiving service request, first user profile can be called or revise in control centre.
The send mode of above-mentioned first user profile can adopt short message, phone or the Internet etc.
Above-mentioned user profile can comprise that address name, phone number, address, identification card number or password and password forget the problem clew under the situation etc.
The present invention has following advantage:
1. application of the present invention is lost the back at mobile phone and is started, and therefore uses more conveniently, can not increase extra use cost simultaneously; Production cost is also lower;
2. lost mobile phone or stolen and promptly can't use after leaving the machine master can effectively be protected the personal information of machine primary storage in mobile phone inside, to user's right to choose indefinite, and defines the ownership of mobile phone;
3. can handle at the concrete condition of mobile phone, processing mode is flexible, has made full use of existing communication resources;
4. implementation method is easy, grasps easily, is not subjected to the influence of misoperation; The user can change SIM card as required, is not subjected to of the present invention the influence;
5. realization of the present invention is not subjected to the influence of open and close machine; Password is difficult for cracking; Safe in utilization, reliable; Other validated user there is not influence.
Description of drawings
Accompanying drawing is a principle schematic of the present invention.
Embodiment
Referring to accompanying drawing, this method comprises
1. at first, security management program is stored in the mobile phone, this program is the program that contains " safety code ".
2. by control centre mobile phone is carried out first user profile input, control centre stores information, and information can be called by control centre after receiving service request.User profile can comprise that address name, phone number, address, identification card number or password and password forget the problem clew under the situation etc.After first user profile input was finished, the user can make amendment to the information content.The send mode of first user profile can be short message, phone or the Internet etc.
3. the security management program that Activates Phone
(1). when the user when control centre sends service request, after control centre confirms user identity, send the information that contains " safety code ", the security management program that Activates Phone to this mobile phone; When mobile phone is inserted as former SIM card, after security management program is confirmed safety code, the display system of locking mobile phone, and show information warning, the while sends the affirmation information of having moved to control centre;
(2). when no SIM card is inserted in the mobile phone, there is not communication between mobile phone and reception control centre; Still do not have SIM card to insert after surpassing setting-up time in the mobile phone, security management program will start automatically, the display system of locking mobile phone, and show information warning;
(3). when mobile phone inserts new SIM card, security management program will start automatically, and send information to control centre, and whether check this SIM card number consistent with user profile; Not, then security management program continues operation, the display system of locking mobile phone, and show information warning; Be that then security management program is out of service;
4. after mobile phone was returned validated user, the user sent service request to control centre, and control centre sends the information that contains " safety code " to this mobile phone after confirming, to the mobile phone release, and the closed safe hypervisor.
The mobile phone of this patent indication has comprised existing GSM, CDMA and PHS mobile phone PAS, also relates to the personal digital assistant PDA product of subsidiary wireless communication function simultaneously.
After mobile phone adopts 3G technology, owing to be not subjected to the restriction of bandwidth, the SM program can be monitored in real time to mobile phone, for example the communication between control centre and the mobile phone is needing the data in server conversion in the GSM network at present, behind the full-digital network that enters 3G, just can directly set up communication end to end by circuit switch.Therefore mobile phone safety code technology can faster, more effectively be realized after adopting 3G technology.

Claims (6)

1. mobile phone method for managing security, it is characterized in that: this method comprises
1). at first, the security management program that will contain " safety code " is stored in the mobile phone;
2). send first user profile to control centre, control centre stores information;
3). the security management program that Activates Phone
(1). when the user when control centre sends service request, after control centre confirms user identity, send the information that contains " safety code ", the security management program that Activates Phone to this mobile phone; When mobile phone is inserted as former SIM card, after security management program is confirmed safety code, the display system of locking mobile phone, and show information warning, the while sends the affirmation information of having moved to control centre;
(2). when no SIM card is inserted in the mobile phone, there is not communication between mobile phone and reception control centre; Still do not have SIM card to insert after surpassing setting-up time in the mobile phone, security management program will start automatically, the display system of locking mobile phone, and show information warning;
(3). when mobile phone inserts new SIM card, security management program will start automatically, and send information to control centre, and whether check this SIM card number consistent with user profile; Not, then security management program continues operation, the display system of locking mobile phone, and show information warning; Be that then security management program is out of service;
4). when control centre received user's release service request, control centre sent the information that contains " safety code " to this mobile phone after confirming, to the mobile phone release, the closed safe hypervisor.
2. mobile phone method for managing security as claimed in claim 1 is characterized in that: described security management program is the embedded type control system, and its structure comprises:
1). the control module of carrying out safety code access, control program and the synchronous operation of mobile phone correlation module, mistake being handled;
2). be connected, receive and send the communication module of information with the mobile communication system;
3). accept information that control centre sends, make and start and close judgement, and command transfer is given the signaling processing module of device driver module;
4). the device driver module of blocking-up mobile phone input and output system after the order of receiving signaling processing module.
3. mobile phone method for managing security as claimed in claim 1 or 2 is characterized in that: described safety code is the number that security management program is assert handset identities, is the key that control centre and mobile phone are all discerned.
4. mobile phone method for managing security as claimed in claim 3 is characterized in that: after described control centre received first user profile, when receiving service request, first user profile is called or revised in control centre.
5. mobile phone method for managing security as claimed in claim 4 is characterized in that: the send mode of described first user profile is short message, phone or the Internet.
6. mobile phone method for managing security as claimed in claim 5 is characterized in that: described user profile comprises that address name, phone number, address, identification card number or password and password forget the problem clew under the situation.
CNB2003101058124A 2003-10-10 2003-10-10 Security management method for mobile phone Expired - Fee Related CN100502599C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2003101058124A CN100502599C (en) 2003-10-10 2003-10-10 Security management method for mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2003101058124A CN100502599C (en) 2003-10-10 2003-10-10 Security management method for mobile phone

Publications (2)

Publication Number Publication Date
CN1606326A true CN1606326A (en) 2005-04-13
CN100502599C CN100502599C (en) 2009-06-17

Family

ID=34757426

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2003101058124A Expired - Fee Related CN100502599C (en) 2003-10-10 2003-10-10 Security management method for mobile phone

Country Status (1)

Country Link
CN (1) CN100502599C (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007056951A1 (en) * 2005-11-16 2007-05-24 Chao Qiao System and method for preventing the theft of software and hardware with communication condition/function
CN100431369C (en) * 2005-06-03 2008-11-05 乐金电子(中国)研究开发中心有限公司 Locking method of mobile communication terminal
CN100452908C (en) * 2005-11-16 2009-01-14 乔超 System and method for preventing software and hardware with communication condition / function from being embezzled
WO2011026361A1 (en) * 2009-09-04 2011-03-10 中兴通讯股份有限公司 Method and apparatus for realizing unlocking for terminal device
CN101198121B (en) * 2007-12-28 2011-07-20 中国移动通信集团四川有限公司 Authentication method for limiting mobile phone without using by others
WO2011127697A1 (en) * 2010-04-16 2011-10-20 中兴通讯股份有限公司 Security management method for mobile terminal and mobile terminal thereof
CN102576401A (en) * 2009-10-09 2012-07-11 日本电气株式会社 Mobile device, and security lock control method and program thereof
CN101600260B (en) * 2008-06-04 2012-11-14 宇龙计算机通信科技(深圳)有限公司 Method and terminal for realizing terminal parameter setting
CN103856620A (en) * 2012-12-06 2014-06-11 华为终端有限公司 Method and device for controlling terminal to close down
CN101960738B (en) * 2008-02-28 2014-11-05 思蒙株式会社 Method and system of providing personal information control service for mobile communication terminal
CN104281811A (en) * 2013-07-10 2015-01-14 中国移动通信集团北京有限公司 Terminal self-destruction method, system and device
CN101827160B (en) * 2009-12-29 2015-04-08 华为终端有限公司 Locking/unlocking control method and device and mobile terminal
CN105447345A (en) * 2014-09-30 2016-03-30 宇龙计算机通信科技(深圳)有限公司 Mobile terminal application control method and apparatus
CN108537039A (en) * 2018-04-08 2018-09-14 中国联合网络通信集团有限公司 Control device, method, equipment and the computer readable storage medium of mobile terminal

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103020503B (en) * 2012-12-19 2015-11-18 东莞宇龙通信科技有限公司 The verification method of terminal and user identity
US11500653B2 (en) 2020-02-05 2022-11-15 International Business Machines Corporation Signal handling between programs associated with different addressing modes

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100431369C (en) * 2005-06-03 2008-11-05 乐金电子(中国)研究开发中心有限公司 Locking method of mobile communication terminal
CN100452908C (en) * 2005-11-16 2009-01-14 乔超 System and method for preventing software and hardware with communication condition / function from being embezzled
WO2007056951A1 (en) * 2005-11-16 2007-05-24 Chao Qiao System and method for preventing the theft of software and hardware with communication condition/function
CN101198121B (en) * 2007-12-28 2011-07-20 中国移动通信集团四川有限公司 Authentication method for limiting mobile phone without using by others
CN101960738B (en) * 2008-02-28 2014-11-05 思蒙株式会社 Method and system of providing personal information control service for mobile communication terminal
CN101600260B (en) * 2008-06-04 2012-11-14 宇龙计算机通信科技(深圳)有限公司 Method and terminal for realizing terminal parameter setting
US8750831B2 (en) 2009-09-04 2014-06-10 Zte Corporation Method and apparatus for realizing unlocking for terminal device
WO2011026361A1 (en) * 2009-09-04 2011-03-10 中兴通讯股份有限公司 Method and apparatus for realizing unlocking for terminal device
CN102576401A (en) * 2009-10-09 2012-07-11 日本电气株式会社 Mobile device, and security lock control method and program thereof
CN101827160B (en) * 2009-12-29 2015-04-08 华为终端有限公司 Locking/unlocking control method and device and mobile terminal
WO2011127697A1 (en) * 2010-04-16 2011-10-20 中兴通讯股份有限公司 Security management method for mobile terminal and mobile terminal thereof
CN103856620A (en) * 2012-12-06 2014-06-11 华为终端有限公司 Method and device for controlling terminal to close down
CN103856620B (en) * 2012-12-06 2016-09-28 华为终端有限公司 Control the method and device of terminal closedown
CN104281811A (en) * 2013-07-10 2015-01-14 中国移动通信集团北京有限公司 Terminal self-destruction method, system and device
CN105447345A (en) * 2014-09-30 2016-03-30 宇龙计算机通信科技(深圳)有限公司 Mobile terminal application control method and apparatus
CN108537039A (en) * 2018-04-08 2018-09-14 中国联合网络通信集团有限公司 Control device, method, equipment and the computer readable storage medium of mobile terminal

Also Published As

Publication number Publication date
CN100502599C (en) 2009-06-17

Similar Documents

Publication Publication Date Title
CN100502599C (en) Security management method for mobile phone
CN1469674A (en) Method for locking mobile telecommunication terminal
CN101568119A (en) Mobile terminal with antitheft function and antitheft method thereof
CN1487763A (en) Method for guaranteeing mobile communication terminal safety
US20030220096A1 (en) Paired SIM card function
CN1533207A (en) Method for delocking mobile phone radio communication terminal
CN101873395B (en) Mobile phone and urgent help seeking method thereof
GB2393616A (en) Terminal device lock system
CN1665260A (en) A remote control method for mobile telephone
CN102011523B (en) Automobile fingerprint password computer burglar-proof lock
CN1963128A (en) Intelligent antitheft lock and its construction method
CN1980459A (en) Method for realizing information destroying at network side
CN108510635A (en) A kind of intelligent lock system and its method for unlocking based on light sensation identification
CN108347730B (en) Wireless communication processing method and device
CN1302681C (en) Method for preventing burglarious of mobile phone and anti-theft mobile phone
CN1469675A (en) Method of bundling mobile communication terminal and subscriber identifying module
CN100571436C (en) A kind of implementation method of mobile terminal information resource safety guarantee
CN101656966A (en) Data protection method of mobile terminal, device thereof and mobile terminal
CN1710976A (en) Method for preventing hand-set from stolen
CN108533074A (en) A kind of cloud lock theft preventing method based on NB-IOT
CN2638376Y (en) Locking device using radio communication device
CN105897708A (en) Information protection method and mobile terminal
CN1262132C (en) Method for realizing remote cipher key destruction for secret mobile phone
CN1429043A (en) Method for locking user's identification card and mobile telephone by using short message
CN2866731Y (en) Intelligent antitheft lock

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090617

Termination date: 20131010