CN1882131A - Method for protecting stolen handset telephone directory - Google Patents
Method for protecting stolen handset telephone directory Download PDFInfo
- Publication number
- CN1882131A CN1882131A CNA2005100267526A CN200510026752A CN1882131A CN 1882131 A CN1882131 A CN 1882131A CN A2005100267526 A CNA2005100267526 A CN A2005100267526A CN 200510026752 A CN200510026752 A CN 200510026752A CN 1882131 A CN1882131 A CN 1882131A
- Authority
- CN
- China
- Prior art keywords
- stolen
- mobile phone
- telephone directory
- phone
- mobile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention relates to a method for protecting the telephone directory of lost mobile phone, which comprises: first, recognizing if the mobile phone is in lost condition; if it is lost, using message to back up the telephone directory stored in mobile phone; deleting the phone number stored in the mobile phone; entering into the normal application mode. When the invention detects the SIM card is exchanged, and the mobile phone is used by other, the mobile phone switches on the phone number protect mechanism, to use message to send all phone numbers of mobile phone to appointed mobile phone or electric mail; when the back up is completed, deleting the number stored in mobile phone to avoid the illegal motion. The invention can be used in mobile phone and PDA, etc.
Description
Technical field
The present invention relates to the information and the telephone directory guard method of preserving in a kind of mobile communication facility, relate in particular to a kind of method for protecting stolen handset telephone directory.
Background technology
Along with moving ahead of information age paces, mobile phone becomes people's irreplaceable instrument of communicating by letter day by day, also is simultaneously the important means of preserving various information and contact method.Thereby protect the safety of these important informations and contact method to greatest extent, become an importance of cell-phone function.
At present, mobile phone is preserved information and telephone number has user's identification marking (SubscriberIdentification Module, hereinafter to be referred as SIM) card storage and mobile phone EMS memory storage dual mode, and the capacity of SIM card storage is limited, the capacity of mobile phone EMS memory constantly enlarges along with improving constantly of memory technology, thereby selects mobile phone EMS memory to store a kind of important way that various important information become cellphone subscribers.
Yet mobile phone is stolen, can cause the various important informations of user storage on mobile phone to be lost, and these important informations may comprise relative, friend, and the classmate, client's or the like contact method is lost these information and may be brought very big loss to the cellphone subscriber.And after stealer obtains mobile phone, might further utilize the number that is stored in the mobile phone, personation machine master practices extortion, illegal activity such as swindle by false pretences.Therefore, no matter losing of number is to the owner of lost property or the owner of lost property's friends and family in the mobile phone, all may bring risk and loss.Also the telephone number of stolen mobile phone and the information of preservation are not protected in the prior art.These all may bring immeasurable loss to the user, even may cause the instability of society.
Summary of the invention
Technical problem to be solved by this invention provides a kind of method for protecting stolen handset telephone directory, the telephone directory of cellphone subscriber's storage can be duplicated and preserves, and makes the user can give telephone number in the stolen handset telephone directory again for change.Avoid in the mobile phone number to divulge a secret and bring further loss, also can protect the safety of number in the mobile phone simultaneously.
For solving the problems of the technologies described above a kind of method for protecting stolen handset telephone directory of the present invention, may further comprise the steps, the first step, whether the identification mobile phone is in stolen state; In second step, if mobile phone is in stolen state, then the telephone number that will be stored in the mobile phone by SMS backs up; In the 3rd step, deletion is stored in the telephone number in the mobile phone; The 4th step, the normal use pattern that enters mobile phone.
Whether the first step identification mobile phone in a kind of method for protecting stolen handset telephone directory of the present invention is in stolen state can comprise following a few step: the first step, after user's start, judge whether SIM cards of mobile phones is changed, if SIM cards of mobile phones is not changed, then enter the normal boot-strap pattern; Second step if SIM cards of mobile phones is changed, then required the user to input the protection password of prior setting, if the password input is correct, then entered the normal boot-strap pattern; In the 3rd step,,, then enter the normal boot-strap pattern if the input of PIN password is correct if the protection password bad of being imported then requires user's input handset PIN password; If the input of PIN password is incorrect, judge that then mobile phone is in stolen state.
In a kind of method for protecting stolen handset telephone directory of the present invention second step is if mobile phone is in stolen state, then will be stored in telephone number in the mobile phone by SMS backs up and can comprise following a few step: the first step, duplicate the telephone directory that is stored in the mobile phone, and with this content of duplicating by way of short messages, send note to the short message server of mobile phone production company and back up; The perhaps mode by Email sends to the E-mail address that mobile phone that mobile phone production company produces for the said firm provides to the content of duplicating; In second step, judge whether the user is set in the thin phone number of this stolen mobile portable phone of backup under the stolen situation of mobile phone; In the 3rd step,, then send the telephone directory that is duplicated in the first step to the mobile phone that the user sets if the user has set the thin phone number of this stolen mobile portable phone of backup under the stolen situation of mobile phone.
The telephone number that the deletion of in a kind of method for protecting stolen handset telephone directory of the present invention the 3rd step is stored in the mobile phone can comprise following a few step: the first step, judge whether all telephone numbers in the stolen handset telephone directory to be duplicated and preservation finishes, if do not duplicate and preservation finishes, then continue to duplicate and preserve the telephone number in the stolen handset telephone directory; Second step, if the mobile portable phone of will having had things stolen thin in all telephone numbers duplicate and preservation finishes, then deletion should stolen mobile portable phone thin in all telephone numbers.
A kind of method for protecting stolen handset telephone directory of the present invention is judging that mobile phone is under the situation of stolen state; duplicate the telephone number in the stolen handset telephone directory; and this telephone number sent to customer data service node or the predefined phone number of cellphone subscriber, delete telephone numbers all in this stolen handset telephone directory and whole message registration and all short messages then.The present invention can protect the telephone number in the stolen handset telephone directory can not lose, and can protect telephone number and other information in the stolen mobile phone not to be utilized by other people.
Description of drawings
Below in conjunction with drawings and Examples the present invention is further described:
Fig. 1 is a kind of method for protecting stolen handset telephone directory flow chart of the present invention;
Fig. 2 is first step flow chart in a kind of method for protecting stolen handset telephone directory of the present invention;
Fig. 3 is the second step flow chart in a kind of method for protecting stolen handset telephone directory of the present invention;
Fig. 4 is the 3rd step flow chart in a kind of method for protecting stolen handset telephone directory of the present invention;
Fig. 5 is a kind of method for protecting stolen handset telephone directory specific embodiment of the present invention flow chart.
Embodiment
The present invention proposes a kind of method for protecting stolen handset telephone directory, is applicable to telephone number and the various information protected in the mobile communication facility of losing.
As shown in Figure 1, a kind of method for protecting stolen handset telephone directory of the present invention may further comprise the steps, and at first, whether the identification mobile phone is in stolen state; Secondly, if mobile phone is in stolen state, then the telephone number that will be stored in the mobile phone by SMS backs up; Once more, deletion is stored in the telephone number in the mobile phone; In the 4th step, mobile phone enters the normal service state.
As shown in Figure 2, the step whether the identification mobile phone of a kind of method for protecting stolen handset telephone directory first step of the present invention is in stolen state may further comprise the steps: the first step, after user's start, judge whether SIM cards of mobile phones is changed,, then enter the normal boot-strap pattern if SIM cards of mobile phones is not changed; Second step if SIM cards of mobile phones is changed, then required the user to input the protection password of prior setting, if the password input is correct, then entered the normal boot-strap pattern; In the 3rd step,,, then enter the normal boot-strap pattern if the input of PIN password is correct if the protection password bad of being imported then requires user's input handset person identification password (Personal Identification Number is hereinafter to be referred as PIN); If the input of PIN password is incorrect, judge that then mobile phone is in stolen state.
When mobile phone used for the first time, mobile phone was automatically noted the phone number of SIM, and whether the inquiry user starts the stolen defencive function of Intelligent Recognition.If the user enables this function, then mobile phone requires the user to set the protection password.After the user changes the SIM card start, whether mobile phone will automatically carry out the SIM card school, check the phone number of new SIM consistent with the phone number in being stored in mobile phone, if card number is identical, then carry out normally other boot program; If the phone number that detects new SIN card number and be stored in originally in the mobile phone is inequality, then start the mobile phone protection mechanism, the protection password that requires interrogation responder to take charge and set earlier.If all input the protection password by mistake, system start-up Mobile PIN password continuous three times at this moment; If the password input is correct, then enter normal boot program; If continuous again three times are inputed by mistake the PIN password, this moment system to judge this " machine master " be not original machine master, judge that mobile phone is in stolen state at this moment.
As shown in Figure 3, second step of a kind of method for protecting stolen handset telephone directory of the present invention will be stored in telephone number in the mobile phone by SMS and back up and may further comprise the steps: the first step, duplicate the telephone directory that is stored in the mobile phone, and with this content of duplicating by way of short messages, send note to the short message server of mobile phone production company and back up; The perhaps mode by Email sends to the E-mail address that mobile phone that mobile phone production company produces for the said firm provides to the content of duplicating; In second step, judge whether the user is set in the thin phone number of this stolen mobile portable phone of backup under the stolen situation of mobile phone; In the 3rd step,, then send the telephone directory that is duplicated in the first step to the mobile phone that the user sets if the user has set the thin phone number of this stolen mobile portable phone of backup under the stolen situation of mobile phone.
After judging mobile phone and being in stolen state, handset starting duplicates the phonebook function module.Duplicate the telephone directory that is stored in the mobile phone successively, with way of short messages, the sending short message by mobile phone of when enabling this intelligent protection module, setting to the user successively; When enabling intelligent protection module, also can set the thin E-mail address of this stolen mobile portable phone of backup the user.Mobile phone also automatically backs up to the short message server transmission note of mobile phone production company simultaneously; The perhaps mode by Email sends to the E-mail address that mobile phone that mobile phone production company produces for the said firm provides to the content of the telephone directory that duplicates.Like this, machine master's telephone directory is just transferred on the customer data services sites of mobile phone that the user sets and our company safely.Thereby the user not only can obtain original telephone directory from the mobile phone of setting and the E-mail address of setting, more regain original telephone directory E-mail address that can provide from the mobile phone that mobile phone production company produces for the said firm and the short message server.
As shown in Figure 4, the telephone number that the 3rd step deletion of a kind of method for protecting stolen handset telephone directory of the present invention is stored in the mobile phone may further comprise the steps: the first step, judge whether all telephone numbers in the stolen handset telephone directory to be duplicated and preservation finishes, if do not duplicate and preservation finishes, then continue to duplicate and preserve the telephone number in the stolen handset telephone directory; Second step, if the mobile portable phone of will having had things stolen thin in all telephone numbers duplicate and preservation finishes, then deletion should stolen mobile portable phone thin in all telephone numbers.
Mobile phone has duplicated and has stored in the stolen handset telephone directory after the information of telephone number, will delete all telephone directories seriatim, all message registrations and all notes, and it is dangerous to avoid the leakage of these numbers and information to come for other machine master tapes.
Fig. 5 is the detail flowchart of a kind of method for protecting stolen handset telephone directory embodiment of the present invention.It comprises the concrete steps of four steps of the present invention.
A kind of method for protecting stolen handset telephone directory of the present invention goes for mobile communication equipments such as mobile phone, PDA.
Claims (6)
1. a method for protecting stolen handset telephone directory is characterized in that, may further comprise the steps, and the first step, whether the identification mobile phone is in stolen state; In second step, if mobile phone is in stolen state, then the telephone number that will be stored in the mobile phone by SMS backs up; In the 3rd step, deletion is stored in the telephone number in the mobile phone; The 4th step, the normal use pattern that enters mobile phone.
2. a kind of method for protecting stolen handset telephone directory as claimed in claim 1, it is characterized in that the described first step may further comprise the steps: the first step, after user's start, judge whether SIM cards of mobile phones is changed, if SIM cards of mobile phones is not changed, then enter the normal boot-strap pattern; Second step if SIM cards of mobile phones is changed, then required the user to input the protection password of prior setting, if the password input is correct, then entered the normal boot-strap pattern; In the 3rd step,,, then enter the normal boot-strap pattern if the input of PIN password is correct if the protection password bad of being imported then requires user's input handset PIN password; If the input of PIN password is incorrect, judge that then mobile phone is in stolen state.
3. a kind of method for protecting stolen handset telephone directory as claimed in claim 1, it is characterized in that, described second step may further comprise the steps: the first step, duplicate the telephone directory that is stored in the mobile phone, and with this content of duplicating by way of short messages, send note to the short message server of mobile phone production company and back up; The perhaps mode by Email sends to the E-mail address that mobile phone that mobile phone production company produces for the said firm provides to the content of duplicating; In second step, judge whether the user is set in the thin phone number of this stolen mobile portable phone of backup under the stolen situation of mobile phone; In the 3rd step,, then send the telephone directory that is duplicated in the first step to the mobile phone that the user sets if the user has set the thin phone number of this stolen mobile portable phone of backup under the stolen situation of mobile phone.
4. a kind of method for protecting stolen handset telephone directory as claimed in claim 1, it is characterized in that, described the 3rd step may further comprise the steps: the first step, judge whether all telephone numbers in the stolen handset telephone directory to be duplicated and preservation finishes, if do not duplicate and preservation finishes, then continue to duplicate and preserve the telephone number in the stolen handset telephone directory; Second step, if the mobile portable phone of will having had things stolen thin in all telephone numbers duplicate and preservation finishes, then deletion should stolen mobile portable phone thin in all telephone numbers.
5. a kind of method for protecting stolen handset telephone directory as claimed in claim 3 is characterized in that, described second step and the 3rd step are: in second step, judge whether the user is set in the thin E-mail address of this stolen mobile portable phone of backup under the stolen situation of mobile phone; In the 3rd step,, then send the telephone directory that is duplicated in the first step to the E-mail address that the user sets if the user has set the thin E-mail address of this stolen mobile portable phone of backup under the stolen situation of mobile phone.
6. a kind of method for protecting stolen handset telephone directory as claimed in claim 4; it is characterized in that; described second step; if will have things stolen mobile portable phone thin in all telephone numbers duplicate and preservation finishes, then deletion should stolen mobile portable phone thin in all telephone numbers, deletion should stolen mobile phone in all message registrations and deletion should stolen mobile phone in whole short messages.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2005100267526A CN1882131A (en) | 2005-06-15 | 2005-06-15 | Method for protecting stolen handset telephone directory |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2005100267526A CN1882131A (en) | 2005-06-15 | 2005-06-15 | Method for protecting stolen handset telephone directory |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1882131A true CN1882131A (en) | 2006-12-20 |
Family
ID=37520058
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2005100267526A Pending CN1882131A (en) | 2005-06-15 | 2005-06-15 | Method for protecting stolen handset telephone directory |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1882131A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009030081A1 (en) * | 2007-09-07 | 2009-03-12 | Zte Corporation | System and method of resetting leaving factory state of mobile terminal |
CN101640722A (en) * | 2009-05-19 | 2010-02-03 | 上海闻泰电子科技有限公司 | Mobile phone with safety protection function and safety protection method thereof |
CN101141743B (en) * | 2007-10-17 | 2010-06-02 | 北京立通无限科技有限公司 | Method, mobile station and server for protecting user data of mobile station |
CN101355424B (en) * | 2007-07-27 | 2010-09-08 | 深圳兆日技术有限公司 | Method for safely migrating handhold equipment data |
CN101964963A (en) * | 2010-10-14 | 2011-02-02 | 鸿富锦精密工业(深圳)有限公司 | Name card sending, receiving and updating method and system for electronic equipment |
CN102460451A (en) * | 2009-06-10 | 2012-05-16 | 高通股份有限公司 | Method and apparatus for preventing unauthorized use of computing devices |
CN102857615A (en) * | 2012-09-24 | 2013-01-02 | 武汉大学 | Unlocking method for touch screen mobile phone based on dynamic password |
CN102857887A (en) * | 2011-06-30 | 2013-01-02 | 上海闻泰电子科技有限公司 | Mobile phone with function of retrieving mobile phone book and method for retrieving mobile phone book |
CN102929807A (en) * | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
CN103020534A (en) * | 2012-11-30 | 2013-04-03 | 北京网秦天下科技有限公司 | Method and system for managing mobile terminal |
CN103533026A (en) * | 2013-09-22 | 2014-01-22 | 四川智爱电子信息科技有限责任公司 | Cloud platform-based mobile phone contact list information disguising method |
CN105138925A (en) * | 2015-09-25 | 2015-12-09 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN109492439A (en) * | 2018-09-29 | 2019-03-19 | 南昌与德通讯技术有限公司 | Information protecting method, terminal device and computer readable storage medium |
CN116401651A (en) * | 2023-06-08 | 2023-07-07 | 深圳市晨歌电子有限公司 | Information storage safety protection method, system and storage medium |
-
2005
- 2005-06-15 CN CNA2005100267526A patent/CN1882131A/en active Pending
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101355424B (en) * | 2007-07-27 | 2010-09-08 | 深圳兆日技术有限公司 | Method for safely migrating handhold equipment data |
WO2009030081A1 (en) * | 2007-09-07 | 2009-03-12 | Zte Corporation | System and method of resetting leaving factory state of mobile terminal |
CN101141743B (en) * | 2007-10-17 | 2010-06-02 | 北京立通无限科技有限公司 | Method, mobile station and server for protecting user data of mobile station |
CN101640722A (en) * | 2009-05-19 | 2010-02-03 | 上海闻泰电子科技有限公司 | Mobile phone with safety protection function and safety protection method thereof |
CN102460451A (en) * | 2009-06-10 | 2012-05-16 | 高通股份有限公司 | Method and apparatus for preventing unauthorized use of computing devices |
CN101964963A (en) * | 2010-10-14 | 2011-02-02 | 鸿富锦精密工业(深圳)有限公司 | Name card sending, receiving and updating method and system for electronic equipment |
CN102857887B (en) * | 2011-06-30 | 2018-01-09 | 上海闻泰信息技术有限公司 | The method of mobile phone and getting back mobile phone telephone directory with getting back mobile phone phonebook function |
CN102857887A (en) * | 2011-06-30 | 2013-01-02 | 上海闻泰电子科技有限公司 | Mobile phone with function of retrieving mobile phone book and method for retrieving mobile phone book |
CN102857615A (en) * | 2012-09-24 | 2013-01-02 | 武汉大学 | Unlocking method for touch screen mobile phone based on dynamic password |
CN102929807A (en) * | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
WO2014082399A1 (en) * | 2012-11-30 | 2014-06-05 | 北京网秦天下科技有限公司 | Method and system for management of mobile terminal |
CN103020534A (en) * | 2012-11-30 | 2013-04-03 | 北京网秦天下科技有限公司 | Method and system for managing mobile terminal |
CN103533026A (en) * | 2013-09-22 | 2014-01-22 | 四川智爱电子信息科技有限责任公司 | Cloud platform-based mobile phone contact list information disguising method |
CN103533026B (en) * | 2013-09-22 | 2017-03-08 | 四川智爱电子信息科技有限责任公司 | Cell phone address book information disguising method based on cloud platform |
CN105138925A (en) * | 2015-09-25 | 2015-12-09 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN105138925B (en) * | 2015-09-25 | 2019-03-29 | 联想(北京)有限公司 | A kind of information processing method and electronic equipment |
CN109492439A (en) * | 2018-09-29 | 2019-03-19 | 南昌与德通讯技术有限公司 | Information protecting method, terminal device and computer readable storage medium |
CN116401651A (en) * | 2023-06-08 | 2023-07-07 | 深圳市晨歌电子有限公司 | Information storage safety protection method, system and storage medium |
CN116401651B (en) * | 2023-06-08 | 2023-09-19 | 深圳市晨歌电子有限公司 | Information storage safety protection method, system and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1882131A (en) | Method for protecting stolen handset telephone directory | |
CN100391282C (en) | Method for locking mobile telecommunication terminal | |
CN103347131B (en) | A kind of intelligent mobile phone anti-theft method and system | |
CN101897204B (en) | For promoting the system and method for the development of mobile community | |
CN101252703B (en) | Terminal data protection method, system and mobile communication terminal | |
US20060031399A1 (en) | Methods and systems for remotely securing data in a wireless device in a communications network | |
CN101141722B (en) | Safety mobile telephone based on user vocal feature and implementing method thereof | |
WO2016045191A1 (en) | Information processing method and information processing device | |
CN101150629A (en) | Contact book management system and method | |
US7817992B2 (en) | Method for updating a personal data file in mobile units of communication networks | |
CN1929665A (en) | Short message control method of mobile phone function | |
CN100407831C (en) | Method of intelligent mobile terminal user staged managing | |
CN102984689A (en) | System and method for verifying mobile terminal | |
CN101702840A (en) | Method and device for automatically processing message content | |
CN102316407A (en) | Mobile phone and mobile phone stolen tracking method | |
CN103188672A (en) | Mobile terminal and data protection method thereof | |
CN107172194B (en) | Virtual SIM card management method and device and communication terminal | |
CN101330692A (en) | Mobile phone with lose-proof function and method for preventing mobile phone from losing | |
CN101207842A (en) | System and method for contents sharing among mobile terminals | |
CN1984404A (en) | Method for destroying terminal information | |
CN105141736A (en) | Information security protection method and apparatus | |
CN1964531A (en) | Mobile phone information remote inquiring method | |
CN1980427A (en) | Device for mobile terminal to automatically deleting information, and method thereof | |
EP2846528A1 (en) | Mobile terminal and anti-stolen method thereof | |
CN110719365A (en) | Information processing method, mobile terminal and computer storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |