CN1968467A - Mobile terminal and terminal user information protection method - Google Patents
Mobile terminal and terminal user information protection method Download PDFInfo
- Publication number
- CN1968467A CN1968467A CNA2006100931085A CN200610093108A CN1968467A CN 1968467 A CN1968467 A CN 1968467A CN A2006100931085 A CNA2006100931085 A CN A2006100931085A CN 200610093108 A CN200610093108 A CN 200610093108A CN 1968467 A CN1968467 A CN 1968467A
- Authority
- CN
- China
- Prior art keywords
- user
- terminal
- strategy
- user profile
- safeguard protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The invention relates to a method for protecting terminal user information and relative mobile terminal, wherein said method comprises that: a, based on user information in terminal, setting relative safe protecting strategy; b, terminal via said strategy, executes relative protection on the user information; in the step a, it can set strategy for all user information and different user information. And the strategy can be timed delete strategy, authorization access strategy, etc. The invention can improve the safety of user information.
Description
Technical field
The present invention relates to the terminal security technology, particularly relate to the method for a kind of portable terminal and protection information of terminal user.
Background technology
Growing along with telecommunications, the function and the memory space of mobile communication terminal constantly increase, and disposal ability also constantly strengthens, and its effect has been not limited only to communication.Many users utilize terminal to store personal information, even are used for storing important business data.Thereby, how to protect user information in terminal, such as in lost terminal or when stolen, how to protect user's significant data not leaked or usurp, be the problem that needs solve.
Prior art generally all is by startup password being set in terminal, the access code of user's important information perhaps is set, and avoids the disabled user to the manipulating of terminal, thus protection user profile.But the cryptoguard mode is scarcely reliable, and the password of setting is cracked by various tool software easily.In addition and since this scheme require user each all must the input password when using terminal or when carrying out associative operation, make troubles for user's use.Investigation shows that most of user is not activated cipher protection function, so this scheme is very limited to the protective effect of user profile.
And prior art is not carried out categorized protection to user profile, and the data of different significance levels are often all adopted same safeguard protection strategy.The sensitivity of various information is different, and importance is also different, and it obviously is irrational all adopting same safeguard protection strategy.Such as, the user do not need protection in the terminal number this, but need protect short message wherein, relevant solution just is not provided in the prior art.
Summary of the invention
The purpose of this invention is to provide a kind of method of protecting information of terminal user.
Another object of the present invention provides a kind of portable terminal.
The present invention protects the method for information of terminal user, comprising:
A), corresponding safeguard protection strategy is set at user information in terminal;
B) terminal is carried out corresponding safe protection treatment according to described safeguard protection strategy to user profile.
Can corresponding safeguard protection strategy be set at user profile all in the terminal in the step a), also can corresponding safeguard protection strategy be set respectively at user profile dissimilar in the terminal.
Step a) comprises that further when the user attempted to be provided with the safeguard protection strategy, terminal was discerned user identity, if recognition result is the disabled user, terminal is refused this user the safeguard protection strategy is set.
Wherein, terminal method that user identity is discerned is one or more the combination in password identification, signature identification, certificate scanning identification, face-image identification, voice recognition, the fingerprint recognition.
Described user profile is one or more the combination in number basis, short message, picture, document, the file catalogue.
Further, the safeguard protection strategy that is provided with in the step a) is the timing deletion strategy; In the step b), user profile carried out corresponding safe protection treatment be: in visit with after user profile that regularly deletion strategy is relevant finishes, through one period regular time at interval, the automatic user profile of being visited of deleting of terminal; Perhaps be: terminal is deleted all and the relevant user profile of timing deletion strategy automatically at specific time point.
Further, the safeguard protection strategy that is provided with in the step a) is a defence formula self-destruction strategy; In the step b); user profile is carried out corresponding safe protection treatment is: attempt when conducting interviews with defence formula self-destruction policy-related (noun) user profile the user; terminal is discerned user identity; if recognition result is the disabled user, terminal is refused this user capture and is deleted all and defence formula self-destruction policy-related (noun) user profile immediately.
Further, the safeguard protection strategy that is provided with in the step a) is the granted access strategy; In the step b); user profile is carried out corresponding safe protection treatment is: attempt when conducting interviews with granted access policy-related (noun) user profile the user; terminal is discerned user identity, if recognition result is the disabled user, terminal is refused this user capture.
Further, the safeguard protection strategy that is provided with in the step a) is binding card access strategy; In the step b); user profile is carried out corresponding safe protection treatment is: when the user attempts the user profile relevant with binding card access strategy conducted interviews; terminal is discerned the subscriber identification module SIM card, if recognition result is the unbundling card, terminal is refused this user capture.
Further, the safeguard protection strategy that is provided with in the step a) is notice self-destruction strategy; In the step b), user profile is carried out corresponding safe protection treatment be: when terminal is received specific message, delete all and notice self-destruction policy-related (noun) user profile immediately.
Portable terminal of the present invention comprises that the safeguard protection strategy is provided with module, safeguard protection policy enforcement module and is used for the memory module of storing subscriber information, wherein:
The safeguard protection strategy is provided with the safeguard protection strategy setting that module is used to receive the user, and user profile in the memory module and corresponding safeguard protection strategy are associated;
The safeguard protection policy enforcement module is used for the safeguard protection strategy associated according to the user profile of memory module, and user profile is carried out corresponding safe protection treatment.
With respect to prior art, the invention has the beneficial effects as follows:
Adopt corresponding safeguard protection strategy at user information in terminal, protect various informativeization, improved safety of user information;
The variation of method for identifying ID prevents that the disabled user to the cracking of password, further improving safety of user information.
Description of drawings
Fig. 1 protects the method flow diagram of information of terminal user for the present invention;
Fig. 2 is the schematic diagram of portable terminal embodiment of the present invention.
Embodiment
Describe the present invention below in conjunction with accompanying drawing.
As shown in Figure 1, the present invention protects the method for information of terminal user, comprising:
A), corresponding safeguard protection strategy is set at user information in terminal;
B) terminal is carried out corresponding safe protection treatment according to described safeguard protection strategy to user profile.
Can corresponding safeguard protection strategy be set at user profile all in the terminal in the step a), also can corresponding safeguard protection strategy be set respectively at user profile dissimilar in the terminal.
Step a) comprises that further when the user attempted to be provided with the safeguard protection strategy, terminal was discerned user identity, if recognition result is the disabled user, terminal is refused this user the safeguard protection strategy is set.
Wherein, described safeguard protection strategy is regularly one or more the combination in deletion strategy, defence formula self-destruction strategy, granted access strategy, binding card access strategy, the notice self-destruction strategy.In the present invention, user profile refers to all and user-dependent data message of terminal stored, comprises number basis, short message, picture, document and file catalogue etc.
Following table provides one at user profile dissimilar in the terminal, and the example of corresponding safeguard protection strategy is set respectively, and the setting of this table is an optimal way, the user can be as required or the hobby of self carry out different settings.
Number originally | Short message | Picture | Document | File catalogue | |
The timing deletion strategy | √ | ||||
Defence formula self-destruction strategy | √ | √ | |||
The granted access strategy | √ | √ | |||
Binding card access strategy | √ | √ | √ | √ | √ |
Notice self-destruction strategy | √ | √ | √ | √ | √ |
Below the example that is set to of above table the processing method of various safeguard protection strategies is described respectively.
(1) timing deletion strategy
Terminal is in the deletion and the relevant user profile of timing deletion strategy automatically of specific time, such as short message being carried out the timing deletion.This method has reduced the operation of the frequent deletion sensitive information of user.Regularly deletion strategy comprises following 2 kinds of modes:
(1) behind the calling party end of message, through one period regular time at interval, terminal is the deletion user profile of being visited automatically.The user can be provided with the time interval, for example 5 minutes.
(2) terminal is deleted all and the relevant user profile of timing deletion strategy automatically at specific time point.The user can be provided with time point, for example every afternoons 5 point.
(2) defence formula self-destruction strategy
Attempt when conducting interviews the user with defence formula self-destruction policy-related (noun) user profile, terminal is discerned user identity, if recognition result is the disabled user, terminal is refused this user capture and is deleted all and defence formula self-destruction policy-related (noun) user profile immediately.For example the user attempts short message is conducted interviews, and terminal recognition is illegal to user identity, then deletes all short messages and picture immediately.
When this method can guarantee that terminal is illegally used, avoid important user profile stolen.
(3) granted access strategy
Attempt when conducting interviews with granted access policy-related (noun) user profile the user, terminal is discerned user identity, if recognition result is the disabled user, terminal is refused this user capture.
Different being of granted access strategy and defence formula self-destruction strategy, when recognizing the user for the disabled user, the former denied access operation, but do not delete user profile, and the latter also deletes user profile except that the denied access operation.
(4) binding card access strategy
When the user attempted the user profile relevant with binding card access strategy conducted interviews, (Subscriber Identity Model SIM) sticked into row and discerns terminal, if recognition result is the unbundling card, terminal is refused this user capture to subscriber identification module.
After the user binds the SIM card of appointment and terminal, terminal will be stored the characteristic parameters such as ID of binding card.Whether terminal detects it according to the characteristic parameter of current SIM card is the card of binding.In case be provided with binding card, just can not adopt other card or not plug-in card carry out the operation of normal calling party information.If unbind then must insert original binding card, and could remove behind the input user password.This method is not illegally used after can protecting lost terminal.
(5) notice self-destruction strategy
The user perhaps sends a special order by network security server to terminal by the short message or the mail of network to a special form of terminal transmission, deletes all and notice self-destruction policy-related (noun) user profile after terminal is received immediately.In delete procedure, on the terminal without any prompting, can not be by Halfway Stopping.This method can guarantee that after lost terminal user can delete the important information in the terminal on one's own initiative.
Further, after terminal deletion and the notice self-destruction policy-related (noun) user profile, send the deletion successful information from the number or the address of trend user preset, with result notification user or network.
The short message example of notice self-destruction:! AT SSDR " characteristic character string "; Reply the successful short message example of deletion:! AT SSDA " characteristic character string ".This characteristic character string can be terminal serial number or be kept at machine master name in the terminal, startup password etc.
Among the present invention, can adopt multiple mode, such as password identification, signature identification, certificate scanning identification, face-image identification, voice recognition, fingerprint recognition etc. to the identification of user identity.Below various recognition methodss are simply introduced.
1) password identification: the user inputs the password of the character string composition of certain-length, and string length is generally more than 6, and terminal compares identification with the password and the original record of user's input.
2) signature identification: terminal provides handwriting functions, the user signs by handwriting input on terminal, perhaps terminal provides the scanning input function, and the user is placed on scanning input on the terminal with the card that bears the signature, and signature and original record that terminal will be imported compare identification.
3) certificate scanning identification: terminal provides the scanning input function, and the user is placed on scanning input on the terminal with personal identification card (as identity card), and terminal compares identification with the card and the original record of input.
4) face-image identification: terminal provides face-image scanning collection function, and the user aims at the terminal assigned address with face, and terminal compares identification with original record after collecting facial image information.
5) voice recognition: terminal provides the sound collection function, and the user is by sound transducer input speech signals such as microphones, and terminal compares identification with original record after collecting acoustic information.
6) fingerprint recognition: terminal provides the fingerprint collecting function, and the user will point by assigned address on terminal, and terminal compares identification with original record after collecting finger print information.
According to the method for above-described protection information of terminal user, an embodiment of portable terminal of the present invention is described below in conjunction with Fig. 2.
As shown in Figure 2, portable terminal of the present invention comprises that the safeguard protection strategy is provided with module, safeguard protection policy enforcement module and is used for the memory module of storing subscriber information, wherein:
The safeguard protection strategy is provided with the safeguard protection strategy setting that module is used to receive the user, and user profile in the memory module and corresponding safeguard protection strategy are associated;
The safeguard protection policy enforcement module is used for the safeguard protection strategy associated according to the user profile of memory module, and user profile is carried out corresponding safe protection treatment.
Described user profile is one or more the combination in number basis, short message, picture, document, the file catalogue.Described safeguard protection strategy is regularly one or more the combination in deletion strategy, defence formula self-destruction strategy, granted access strategy, binding card access strategy, the notice self-destruction strategy.
When the associated safeguard protection strategy of the user profile in memory module was regularly deletion strategy, the safeguard protection policy enforcement module was carried out corresponding safe protection treatment to user profile and is: this user profile of deletion in the specific time.This user profile of deletion is in the specific time: behind the calling party end of message, through one period regular time at interval, delete this user profile; Perhaps be: delete this user profile at specific time point.
When the associated safeguard protection strategy of the user profile in memory module is defence formula self-destruction strategy; the safeguard protection policy enforcement module is carried out corresponding safe protection treatment to user profile: when the user attempts this user profile conducted interviews; user identity is discerned; if recognition result is the disabled user, refuses this user capture and delete the user profile that all are associated with defence formula self-destruction strategy immediately.
When the associated safeguard protection strategy of the user profile in memory module is the granted access strategy; the safeguard protection policy enforcement module is carried out corresponding safe protection treatment to user profile: when the user attempts this user profile conducted interviews; user identity is discerned; if recognition result is the disabled user, refuse this user capture.
When the associated safeguard protection strategy of the user profile in memory module blocks access strategy for binding; the safeguard protection policy enforcement module is carried out corresponding safe protection treatment to user profile: when the user attempts this user profile conducted interviews; SIM card is discerned; if recognition result is the unbundling card, refuse this user capture.
When the associated safeguard protection strategy of the user profile in memory module was notice self-destruction strategy, the safeguard protection policy enforcement module was carried out corresponding safe protection treatment to user profile and is: when terminal is received specific message, delete this user profile.Terminal further sends the deletion successful information to specific address.
It will be appreciated by those skilled in the art that above-mentioned execution mode only works the effect of the present invention of explaining, and not should be understood to any restriction that it is made.
Claims (12)
1. a method of protecting information of terminal user is characterized in that, this method comprises:
A), corresponding safeguard protection strategy is set at user information in terminal;
B) terminal is carried out corresponding safe protection treatment according to described safeguard protection strategy to user profile.
2. the method for claim 1 is characterized in that,
Step a) is: at user profile all in the terminal, corresponding safeguard protection strategy is set, perhaps at user profile dissimilar in the terminal, corresponding safeguard protection strategy is set respectively.
3. method as claimed in claim 1 or 2 is characterized in that:
Step a) comprises that further when the user attempted to be provided with the safeguard protection strategy, terminal was discerned user identity, if recognition result is the disabled user, terminal is refused this user the safeguard protection strategy is set.
4. method as claimed in claim 3 is characterized in that:
The method that terminal is discerned user identity is one or more the combination in password identification, signature identification, certificate scanning identification, face-image identification, voice recognition, the fingerprint recognition.
5. method as claimed in claim 1 or 2 is characterized in that,
The safeguard protection strategy that is provided with in the step a) is the timing deletion strategy;
In the step b), user profile carried out corresponding safe protection treatment be: in visit with after user profile that regularly deletion strategy is relevant finishes, through one period regular time at interval, the automatic user profile of being visited of deleting of terminal;
Perhaps be: terminal is deleted all and the relevant user profile of timing deletion strategy automatically at specific time point.
6. method as claimed in claim 1 or 2 is characterized in that,
The safeguard protection strategy that is provided with in the step a) is a defence formula self-destruction strategy;
In the step b); user profile is carried out corresponding safe protection treatment is: attempt when conducting interviews with defence formula self-destruction policy-related (noun) user profile the user; terminal is discerned user identity; if recognition result is the disabled user, terminal is refused this user capture and is deleted all and defence formula self-destruction policy-related (noun) user profile immediately.
7. method as claimed in claim 1 or 2 is characterized in that,
The safeguard protection strategy that is provided with in the step a) is the granted access strategy;
In the step b); user profile is carried out corresponding safe protection treatment is: attempt when conducting interviews with granted access policy-related (noun) user profile the user; terminal is discerned user identity, if recognition result is the disabled user, terminal is refused this user capture.
8. method as claimed in claim 1 or 2 is characterized in that,
The safeguard protection strategy that is provided with in the step a) is binding card access strategy;
In the step b); user profile is carried out corresponding safe protection treatment is: when the user attempts the user profile relevant with binding card access strategy conducted interviews; terminal is discerned the subscriber identification module SIM card, if recognition result is the unbundling card, terminal is refused this user capture.
9. method as claimed in claim 1 or 2 is characterized in that,
The safeguard protection strategy that is provided with in the step a) is notice self-destruction strategy;
In the step b), user profile is carried out corresponding safe protection treatment be: when terminal is received specific message, delete all and notice self-destruction policy-related (noun) user profile immediately.
10. method as claimed in claim 9 is characterized in that:
This method comprises that further terminal sends the deletion successful information to specific address.
11. method as claimed in claim 1 or 2 is characterized in that:
Described user profile is one or more the combination in number basis, short message, picture, document, the file catalogue.
12. a portable terminal comprises the memory module that is used for storing subscriber information, it is characterized in that, described portable terminal also comprises:
The safeguard protection strategy is provided with module, is used to receive user's safeguard protection strategy setting, and user profile in the memory module and corresponding safeguard protection strategy are associated;
The safeguard protection policy enforcement module is used for the safeguard protection strategy associated according to the user profile of memory module, and user profile is carried out corresponding safe protection treatment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006100931085A CN1968467A (en) | 2006-06-21 | 2006-06-21 | Mobile terminal and terminal user information protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006100931085A CN1968467A (en) | 2006-06-21 | 2006-06-21 | Mobile terminal and terminal user information protection method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1968467A true CN1968467A (en) | 2007-05-23 |
Family
ID=38076950
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2006100931085A Pending CN1968467A (en) | 2006-06-21 | 2006-06-21 | Mobile terminal and terminal user information protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1968467A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101753703A (en) * | 2008-12-15 | 2010-06-23 | 康佳集团股份有限公司 | Method and system for destroying information and mobile terminal |
CN101867650A (en) * | 2010-05-21 | 2010-10-20 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting user behavior at operating terminal |
CN101894234A (en) * | 2010-07-27 | 2010-11-24 | 公安部第三研究所 | COS general file access control system |
CN102236765A (en) * | 2010-04-30 | 2011-11-09 | 深圳市合信自动化技术有限公司 | Method and device for protecting programmable logic controller (PLC) safely |
CN102255992A (en) * | 2010-05-17 | 2011-11-23 | 上海复旦天臣新技术有限公司 | Method for managing short messages by utilizing mobile phone software |
CN101389100B (en) * | 2008-10-24 | 2012-11-28 | Tcl天一移动通信(深圳)有限公司 | Personal information protecting method for mobile communication terminal equipment |
CN102946475A (en) * | 2012-10-30 | 2013-02-27 | 深圳市金立通信设备有限公司 | Information security control method and terminal |
CN103166833A (en) * | 2011-12-16 | 2013-06-19 | 北京新媒传信科技有限公司 | Electronic mail self-destruction method and system |
CN103795847A (en) * | 2012-10-31 | 2014-05-14 | 三星电子(中国)研发中心 | Method for applying traceless mode to communication terminal and communication terminal |
CN103905796A (en) * | 2014-04-16 | 2014-07-02 | 浙江宇视科技有限公司 | Privacy protection method and device in monitoring system |
CN104091119A (en) * | 2014-06-03 | 2014-10-08 | 深圳天珑无线科技有限公司 | Mobile terminal as well as protection method and protection system of data in mobile terminal |
CN104268469A (en) * | 2014-09-26 | 2015-01-07 | 深圳北控信息发展有限公司 | Mobile terminal and information security protection method and device thereof |
CN104348817A (en) * | 2013-08-07 | 2015-02-11 | 深圳市腾讯计算机系统有限公司 | User account protection method and user account protection device |
CN105631351A (en) * | 2015-06-29 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal self-destroying method and apparatus as well as mobile terminal |
CN106027746A (en) * | 2016-05-23 | 2016-10-12 | 北京京东尚科信息技术有限公司 | Call control device and call control method |
-
2006
- 2006-06-21 CN CNA2006100931085A patent/CN1968467A/en active Pending
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101389100B (en) * | 2008-10-24 | 2012-11-28 | Tcl天一移动通信(深圳)有限公司 | Personal information protecting method for mobile communication terminal equipment |
CN101753703A (en) * | 2008-12-15 | 2010-06-23 | 康佳集团股份有限公司 | Method and system for destroying information and mobile terminal |
CN102236765B (en) * | 2010-04-30 | 2015-04-15 | 深圳市合信自动化技术有限公司 | Method and device for protecting programmable logic controller (PLC) safely |
CN102236765A (en) * | 2010-04-30 | 2011-11-09 | 深圳市合信自动化技术有限公司 | Method and device for protecting programmable logic controller (PLC) safely |
CN102255992A (en) * | 2010-05-17 | 2011-11-23 | 上海复旦天臣新技术有限公司 | Method for managing short messages by utilizing mobile phone software |
CN101867650A (en) * | 2010-05-21 | 2010-10-20 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting user behavior at operating terminal |
CN101894234A (en) * | 2010-07-27 | 2010-11-24 | 公安部第三研究所 | COS general file access control system |
CN103166833A (en) * | 2011-12-16 | 2013-06-19 | 北京新媒传信科技有限公司 | Electronic mail self-destruction method and system |
CN102946475A (en) * | 2012-10-30 | 2013-02-27 | 深圳市金立通信设备有限公司 | Information security control method and terminal |
CN103795847A (en) * | 2012-10-31 | 2014-05-14 | 三星电子(中国)研发中心 | Method for applying traceless mode to communication terminal and communication terminal |
CN104348817A (en) * | 2013-08-07 | 2015-02-11 | 深圳市腾讯计算机系统有限公司 | User account protection method and user account protection device |
CN104348817B (en) * | 2013-08-07 | 2018-09-28 | 深圳市腾讯计算机系统有限公司 | The guard method of user account number and device |
CN103905796A (en) * | 2014-04-16 | 2014-07-02 | 浙江宇视科技有限公司 | Privacy protection method and device in monitoring system |
CN103905796B (en) * | 2014-04-16 | 2017-06-13 | 浙江宇视科技有限公司 | The method and device of secret protection in a kind of monitoring system |
CN104091119A (en) * | 2014-06-03 | 2014-10-08 | 深圳天珑无线科技有限公司 | Mobile terminal as well as protection method and protection system of data in mobile terminal |
CN104268469A (en) * | 2014-09-26 | 2015-01-07 | 深圳北控信息发展有限公司 | Mobile terminal and information security protection method and device thereof |
CN104268469B (en) * | 2014-09-26 | 2017-07-28 | 深圳北控信息发展有限公司 | A kind of mobile terminal and its information safety protecting method and device |
CN105631351A (en) * | 2015-06-29 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal self-destroying method and apparatus as well as mobile terminal |
CN106027746A (en) * | 2016-05-23 | 2016-10-12 | 北京京东尚科信息技术有限公司 | Call control device and call control method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1968467A (en) | Mobile terminal and terminal user information protection method | |
CN1285235C (en) | Method and system of preventing handset from theft by using international id code of mobile facilities | |
CN1933629A (en) | Method and device for protecting user storage information in mobile terminal | |
CN1913679A (en) | Protection method and system for preventing fraudulent use of mobile terminal | |
CN101035335A (en) | Mobile phone privacy protection method | |
CN101051908A (en) | Dynamic cipher certifying system and method | |
CN1881877A (en) | Method, device and system for preventing illegal subscriber log-on | |
CN1889773A (en) | Mobile phone virtus examining and protecting method and system based on base station | |
CN1487763A (en) | Method for guaranteeing mobile communication terminal safety | |
CN1675878A (en) | Mobile network authentication for protecting stored content | |
CN100337504C (en) | Intelligent alarming method of personal mobile terminal | |
CN1794759A (en) | Communication device, server possessing telephone antiinterference function and its method | |
CN1863211A (en) | Content filtering system and method thereof | |
CN1855812A (en) | Method for preventing from fakery MAC addresses | |
CN1881924A (en) | Group communication safety distribution media recording and retaking method and device | |
CN1573640A (en) | Method and system for detecting resource attacks on protected computer | |
CN1921390A (en) | User identification identifying method and system | |
CN1991799A (en) | Safety memory device and data management method | |
CN1863350A (en) | Method of intelligent mobile terminal user staged managing | |
CN100346248C (en) | Method and arrangement for automatically controlling access between a computer and a communication network | |
CN1456009A (en) | Method and device for limiting call accompanying execution of application | |
CN1787528A (en) | Method for realizing information grading authorized access in presenting service system | |
CN101039312A (en) | Method and apparatus for preventing service function entity of general authentication framework from attack | |
CN101052152A (en) | Information secret device for mobile communication terminal and relative method | |
CN101056442A (en) | SMS processing method and mobile terminal using same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination |