CN1645951A - Method for clearing sensitive content in mobile by short message - Google Patents
Method for clearing sensitive content in mobile by short message Download PDFInfo
- Publication number
- CN1645951A CN1645951A CN200510008639.5A CN200510008639A CN1645951A CN 1645951 A CN1645951 A CN 1645951A CN 200510008639 A CN200510008639 A CN 200510008639A CN 1645951 A CN1645951 A CN 1645951A
- Authority
- CN
- China
- Prior art keywords
- short message
- mobile phone
- mobile
- program
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The method includes following steps: the system sends a short message with special format; the system can be the system of email service provider or the system of related service provider or the system of mobile operator; when the mobile phone receives the short message, the program in mobile phone, which dedicatedly detects some kinds of short message, captures the short message and analyzes it; then the sensitive content is removed.
Description
Technical field
The present invention relates to computer information processing and wireless communication technology, particularly relate to the method for utilizing the short message clearing sensitive content in mobile.
Background technology
At present the data communication function of mobile phone and disposal ability from strength to strength, information that writes down on the mobile phone and content are also more and more, it is highstrung that a lot of contents are wherein arranged, such as the content of Email, account/password etc.And mobile phone just is easy to cause the leakage of these sensitive informations owing to be very easy to lose after mobile phone is lost.After mobile phone is lost at present,, can't remove the information of having preserved on the mobile phone though the user can stop the use of mobile phone by mobile operator.
Summary of the invention
The technical problem to be solved in the present invention is to overcome prior art can't be removed the information of having preserved on the mobile phone after mobile phone is lost shortcoming, provides a kind of short message that utilizes that can remove existing information on the user mobile phone after user mobile phone is lost quickly and automatically to remove the method for sensitive information on the mobile phone automatically.
The technical scheme that addresses the above problem that the present invention proposes is, the short message that utilizes of the present invention removes automatically that the method for sensitive information may further comprise the steps on the mobile phone:
(1) system sends the short message of a special format for user's mobile phone, and the system here can be the system of Email service provider or related service provider, also can be the system of mobile operator;
(2) after mobile phone is received this short message, intercept the Automatic Program of this type of short message in the mobile phone specially and intercept and capture this short message, and this program is is only intercepted and captured this type of short message;
(3) after the program in the mobile phone is intercepted and captured this short message, analyze and verify the legitimacy of this short message and remove content and information responsive on the mobile phone.
Adopt technique scheme to have following effect and advantage:
(1) after user mobile phone is lost,, can remove the sensitive content on the mobile phone by sending a specific short message to mobile phone.
(2) sending to note on the mobile phone, can be that user oneself sends, and also can send by mobile operator or service provider, have convenient, flexible property.
(3) specific short message of Fa Songing can't be forged through authorizing.Any other people or system under the situation of not grasping user's specific cryptosystem, are to send this type of short message that can be accepted by mobile phone, thereby can guarantee that the content on the user mobile phone can not removed by other people.
Embodiment
The present invention " utilizes short message to remove the method for sensitive information on the mobile phone automatically " and has adopted the short message that sends specific format to mobile phone, and protects information and content responsive on the user mobile phone by the method for content on the Automatic Program removing mobile phone built-in on the mobile phone.
The short message that this method at first sends a special format for user's mobile phone by system, the system here can be the service provider's that is correlated with a system, also can be mobile operator or other service providers' system.
Following table is an example of the form of this short message:
Data | Implication | Explanation |
06 | Short message User Data Length=6 | With reference to UDHL definition among the GSM 03.40 |
05 | User data type=port | The same |
04 | The length of port data=4 | The same |
3E80 | Destination interface=16000 | The same |
23F0 | Source port=9200 | The same |
01 | PushID=01 | Definition with reference to WSP in the wap protocol.WAP:Wireless Application Protocol WSP:Wireless Session Protocol |
06 | Type of data packet=06, Push | The same |
1B | Data packet head total length=27 | The same |
18 | The length of Content-Type=24 | The same |
61,70,70,6C, 69,63,61,74,69,6F, 6E, 2F, 63,6D, 63,63,2E, 62,6F, 6D, 62 | Content-Type is: application/cmcc.bomb | Represent that this short message is a short message of removing sensitive information |
00 | The Content-Type end mark | |
81 | The character set sign | Definition with reference to WSP in the wap protocol |
EA | Character set is UTF-8 | The same |
01,00 | Protocol version=1.00 | Packet begins |
06 | Type of data packet=06 | Remove the packet of sensitive information |
00,00 | Reserve bytes | |
00,00,00,3A | Data length=58 | |
7F,24,1C,48,4D, 77,EC,01,8A,3C, D0,C6,36,51,73, DA | MD5 verification nuclear | Character string (comprising: Email Accounts, password, timestamp) is carried out the MD5 computing |
32,30,30,35,2D, 30,32,2D,32,32, 54,31,33,3A,34, 35,3A,31,39,5A | Timestamp is: 2005-02-22T13:45:19Z | Send the time of message |
67,65,62,40,63, 6F,72,70,2E,6C, 65,61,64,74,6F, 6E,65,2E,63,6F, 6D | The Email number of the account: for: geb@corp.leadtone.com | |
00 | End mark | Packet finishes |
After mobile phone is received this short message, intercept the Automatic Program of this type of short message in the mobile phone specially and intercept and capture this short message, this program is is only intercepted and captured this type of short message, can not tackle the short message of other types, such as common short message, WAP (Wireless Application Protocol) Push short message, OTA short message.
After specific program is intercepted and captured this short message in the mobile phone, analyze and verify the legitimacy of this short message and remove content and information responsive on the mobile phone.The legitimacy of checking short message is necessary, because this can guarantee that the content on the user mobile phone can not removed by other people.
Claims (1)
1. method of utilizing short message to remove sensitive information on the mobile phone automatically is characterized in that may further comprise the steps:
(1) system sends the short message of a special format for user's mobile phone, and described system can be the system of Email service provider or related service provider, also can be the system of mobile operator;
(2) after mobile phone is received this short message, intercept the Automatic Program of this type of short message in the mobile phone specially and intercept and capture this short message, and this program is is only intercepted and captured this type of short message;
(3) after the program in the mobile phone is intercepted and captured this short message, analyze and verify the legitimacy of this short message and remove content and information responsive on the mobile phone.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200510008639.5A CN1645951A (en) | 2005-03-01 | 2005-03-01 | Method for clearing sensitive content in mobile by short message |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200510008639.5A CN1645951A (en) | 2005-03-01 | 2005-03-01 | Method for clearing sensitive content in mobile by short message |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1645951A true CN1645951A (en) | 2005-07-27 |
Family
ID=34875335
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200510008639.5A Pending CN1645951A (en) | 2005-03-01 | 2005-03-01 | Method for clearing sensitive content in mobile by short message |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1645951A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007054004A1 (en) * | 2005-11-11 | 2007-05-18 | Huawei Technologies Co., Ltd. | Method for protecting the information in mobile terminal and the mobile terminal thereof |
CN100420324C (en) * | 2006-03-15 | 2008-09-17 | 华为技术有限公司 | Method for protecting information safety in mobile terminal |
CN101808318A (en) * | 2009-02-18 | 2010-08-18 | 深圳富泰宏精密工业有限公司 | Data protection system and method for communication device |
CN105072603A (en) * | 2015-06-25 | 2015-11-18 | 邱兰 | Mobile terminal equipment management method |
-
2005
- 2005-03-01 CN CN200510008639.5A patent/CN1645951A/en active Pending
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007054004A1 (en) * | 2005-11-11 | 2007-05-18 | Huawei Technologies Co., Ltd. | Method for protecting the information in mobile terminal and the mobile terminal thereof |
US7809352B2 (en) | 2005-11-11 | 2010-10-05 | Huawei Technologies Co., Ltd. | Method for protecting information in a mobile terminal and a mobile terminal |
CN101161006B (en) * | 2005-11-11 | 2012-07-04 | 华为技术有限公司 | Method to protect information in mobile terminal and mobile terminal |
CN100420324C (en) * | 2006-03-15 | 2008-09-17 | 华为技术有限公司 | Method for protecting information safety in mobile terminal |
CN101808318A (en) * | 2009-02-18 | 2010-08-18 | 深圳富泰宏精密工业有限公司 | Data protection system and method for communication device |
US8336111B2 (en) | 2009-02-18 | 2012-12-18 | Shenzhen Futaihong Precision Industry Co., Ltd. | Communication device and method for securing data |
CN101808318B (en) * | 2009-02-18 | 2013-11-20 | 深圳富泰宏精密工业有限公司 | Data protection system and method for communication device |
CN105072603A (en) * | 2015-06-25 | 2015-11-18 | 邱兰 | Mobile terminal equipment management method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108712426B (en) | Crawler identification method and system based on user behavior buried points | |
CN101136801B (en) | Network fault detecting method | |
KR100964375B1 (en) | Interception Method | |
CN101350957A (en) | Method and equipment for shielding rubbish short message | |
AU3116702A (en) | A method of improving the availability of a computer clustering system through the use of a network medium link state function | |
WO2007050590A3 (en) | Media content delivery audit and verification services | |
CN104244254A (en) | Method and device for detecting pseudo base station based on short message center number | |
CN104244253A (en) | Method and device for recognizing false base station | |
CN103391547A (en) | Information processing method and terminal | |
CN1645951A (en) | Method for clearing sensitive content in mobile by short message | |
CN104010068A (en) | Text message processing method and device for mobile terminal | |
CN102098640B (en) | Method, device and system for distinguishing and stopping equipment from sending SMS (short messaging service) spam | |
CN102594780A (en) | Method and device for detecting and clearing mobile terminal viruses | |
CN102572814B (en) | A kind of mobile terminal virus monitor method, system and device | |
CN102905236B (en) | A kind of junk short message monitoring method, Apparatus and system | |
CN205584504U (en) | Pseudo - basic station early warning device | |
CN101017522A (en) | Method and device for preventing mobile terminal from being infracting by virus | |
CN102231874A (en) | Short message processing method, device and system | |
CN102480722A (en) | Sucking fee terminal identification method, apparatus and system thereof | |
CN105763713A (en) | Harassing call intercepting method based on combination of Internet technology and communication technology | |
CN110312240A (en) | A kind of method and device identifying mobile phone of not putting on record | |
CN109428803A (en) | A kind of method for sending voice message and system | |
CN105871937A (en) | Data processing method, data processing device and data processing system | |
CN105893845A (en) | Data processing method and device | |
TW201521407A (en) | Confidential data blocking system based on packet analysis and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |