CN1980428B - Method for mobile terminal to automatically encipher and automatically protect subscriber identifying module - Google Patents
Method for mobile terminal to automatically encipher and automatically protect subscriber identifying module Download PDFInfo
- Publication number
- CN1980428B CN1980428B CN2005101259692A CN200510125969A CN1980428B CN 1980428 B CN1980428 B CN 1980428B CN 2005101259692 A CN2005101259692 A CN 2005101259692A CN 200510125969 A CN200510125969 A CN 200510125969A CN 1980428 B CN1980428 B CN 1980428B
- Authority
- CN
- China
- Prior art keywords
- automatically
- portable terminal
- module
- detecting
- shutdown
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The mobile terminal (MT) configures an encryption module (EM) possessing opened and closed states. When EM is in opened state, MT cannot be turned on without inputting a password. When EM is in closed state, password is not needed. After MT is turned on, EM is auto set to the opened state and the encryption sign of SIM card is auto modified to 'encrypted'. When MT is normally turned off, EM is auto set to the closed state and the encryption sign of SIM card is auto modified to 'unencrypted'. However, when MT is abnormally turned off, this invention ensures effectively the info safety of SIM card and prohibits from using MT. The personal info will not leak out without password.
Description
Technical field
The present invention relates to the method that a kind of portable terminal is encrypted and protection SIM (subscriber identification module, SubscriberIdentity Model) blocks, the method that particularly a kind of portable terminal is encrypted and protected subscriber identification module automatically automatically.
Background technology
From the development of portable terminal self, its function evolution has been passed through from initial call terminal communication terminal finally, has increased SMS, has enriched ability to communicate; Develop into the personal information terminal from communication terminal again, possessed intelligentized characteristic, can move complicated applications, greatly near the boundary of PC (PC, Personal Computer).Enriching of function, the lifting of performance makes people constantly increase " use and rely on ", " the function expectation " of portable terminal.States such as Japan advanced person's operator is the sign of portable terminal as personal identification, and the meaning that how outstanding giving mobile terminal is more is like stored value card, electronic business card even mobile TV or the like.Change from this, in the near future, portable terminal will outclass other any electronics portable product to user's importance.And how to protect the safety at this so important personal identification terminal, be that the industry forerunner pays close attention to and the problem of practice.
As the portable terminal of " communication terminal ", how protecting the legal use of communication terminal and the personal secrets of communications records has been the problem that merits attention.In 20th century of just passing by, people are the safety that can not be concerned about phone directory, message registration or short message also when continuing saying it with interest for the profile weight of portable terminal.But Along with people's makes portable terminal and people's privacy life, business activity constantly be closely related to the significantly raising of portable terminal usage degree.Gradually, when beginning on the portable terminal to stay the vestige of personal lifestyle or work, it is safe in utilization to highlight with demands personal secrets.
And the portable terminal of conduct " information terminal ", the safety of abundant personal information is an importance of mobile message safety on the portable terminal.The intelligent mobile terminal of a new generation has possessed powerful personal information management capabilities.WORD (Word) and EXCEL (electrical form software) office documents, Email, media file, electronic money, electronic business card or the like all are the important component parts of personal information on the portable terminal.And most of intelligent mobile terminal has been equipped with the above memory of 64M, even the portable terminal that has begins to support micro harddisk.This is indicating portable terminal will store increasing individual privacy information or important work document.In so far, portable terminal important has not been because mobile terminal function powerful, and is because the value of information in the portable terminal more at most.Portable terminal and can not repurchase, and information has not had, and difficult lives again again.Why more important than carrier information that Here it is is.
Same, in SIM (subscriber identification module, Subscriber Identity Model) card, also store the information that has many consumers, the information in it and the portable terminal has constituted the information security issue of the portable terminal that we paid close attention to.
The function that is widely used and increases day by day of portable terminal is also for we have brought some safety issues, and mobile phone has become the basic tool of our life, and its universal existence is stolen phone becomes one of modal theft form.Regrettably, increasing young man even child become stolen object.Though suffering to steal, mobile phone has settlement of insurance claim, but, be that what kind of insurance has all stoped not thief to make a phone call to harass your friend with your mobile phone.
From another perspective; Bulk informations such as the often in store telephone number in mobile phone the inside of domestic consumer, note, message registration, mail; These information are unusual secret a bit, and also some is in very important liaison data in aspect such as work, commercial affairs; For some unique people, regular handset is just as an information warehouse of setting up defences not, leaves that they arbitrarily pass in and out, in case ripe just possibly cause huge injury to the machine master opportunity.
For the theft portable terminal, portable terminal is closed rapidly under the situation that stolen person has no to perceive, thereby let stolen person have no way of searching extremely important.But owing to the time that the portable terminal normal shutdown is required is longer; Usually the sound equipment that also is provided with the user can let stolen person's vigilance; So the thief of portable terminal is in order to close portable terminal faster; Normally let the portable terminal abnormal shutdown, steal the battery mode of pulling out or the like such as using.
But also not effectively after portable terminal is stolen, under the situation of abnormal shutdown, prevent the method for portable terminal and SIM information leakage at present.
Summary of the invention
The method that the technical problem that the present invention solved has been to provide a kind of portable terminal automatically to encrypt and protect subscriber identification module automatically when reaching, abnormal shutdown stolen at portable terminal, prevents leaking and using of information in portable terminal and the SIM.
For solving the problems of the technologies described above, the invention provides the method that a kind of portable terminal is encrypted and protected subscriber identification module automatically automatically, protect the method for subscriber identification module to comprise the steps: in this method automatically
Behind mobile terminal-opening, automatically the SIM encryption identification in the portable terminal is revised as " encrypting ";
When the portable terminal normal shutdown, automatically said SIM encryption identification is revised as " unencryption ".
This method can comprise the steps:
An encrypting module is set in portable terminal; This encrypting module has opening and two states of closed condition; When said mobile terminal-opening,, then require to start shooting behind the input startup password if said encrypting module is in opening; When if said encrypting module is in closed condition, normal boot-strap then;
Behind mobile terminal-opening, said automatically encrypting module is set to opening;
When said portable terminal normal shutdown, said automatically encrypting module is set to closed condition.
The step that could start shooting behind the wherein said requirement input startup password can comprise the steps:
The startup password that the startup password memory cell receives and the storage user imports;
The startup password comparing unit receives the startup password of user's input and compares with the startup password that is stored in the said startup password memory cell, if password is different, then requires the user to input password once more.
The step that said input password is compared may further include:
When input startup password number of times surpasses the number of times of password comparison limiting valve setting, stop the comparison of input password.
When said start back and said normal shutdown, may further include following steps:
Behind mobile terminal-opening, automatically the SIM encryption identification in the portable terminal is revised as " encrypting ";
When the portable terminal normal shutdown, automatically said SIM encryption identification is revised as " unencryption ".
Because in the method, open the encrypting module of portable terminal when having adopted normal boot-strap automatically and SIM is denoted as " encrypting ", the encrypting module of automatic turning-off mobile terminal when normal shutdown, SIM is set to " unencryption ".And work as portable terminal under the situation of abnormal shutdown; The encryption function of unlatching when starting and the sign of " encrypting " have been preserved in SIM and the portable terminal; So when the portable terminal of abnormal shutdown started, the user will be asked to input password and decipher, input password in the time of both can avoiding start next time again thereby reach; Can also when the portable terminal abnormal shutdown, effectively protect the information security and the purpose of restriction of SIM to the use of portable terminal.Even portable terminal is stolen, as long as the user does not know password, portable terminal just can not be used with its SIM, can prevent the leakage of personal information effectively, can also reduce the circulation of illegal mobile phone in market.
Description of drawings
Fig. 1 is the implementing procedure figure that described in the embodiment SIM is indicated automatically;
Fig. 2 be open automatically described in the embodiment, the flow chart of steps of turning-off mobile terminal encrypting module;
Fig. 3 is for automatic simultaneously unlatching, turning-off mobile terminal encrypting module described in the embodiment and sign " is encrypted ", the implementing procedure figure of " unencryption ".
Embodiment
For the information security of giving portable terminal and SIM provides safeguard, after portable terminal is stolen, through the use that password comes limiting mobile terminal is set, and password is set on SIM prevents wherein leaking of information.The embodiment of this method is, when normal boot-strap, portable terminal and SIM encryption function is opened the encryption function of being opened when when normal shutdown, closing start.When normal turning-off mobile terminal, the encrypting module function is closed like this, then turning-off mobile terminal; And work as portable terminal under the situation of abnormal shutdown; Preserved the encryption function of having opened in SIM and the portable terminal; So when the portable terminal of abnormal shutdown started, the user will be asked to input password and decipher, input password in the time of both can avoiding start next time again thereby reach; Can also when the portable terminal abnormal shutdown, effectively protect the information security and the purpose of restriction of SIM to the use of portable terminal.
The practical implementation step that in this method SIM is indicated automatically is described below in conjunction with Fig. 1.
Step 101: portable terminal starts;
Step 102: behind mobile terminal-opening, modified module is revised as " encrypting " with the SIM encryption identification in the portable terminal automatically automatically;
Step 103: when the portable terminal normal shutdown, modified module is revised as " unencryption " with said SIM encryption identification automatically automatically;
Step 104: portable terminal is closed.
After start, automatically modified module is revised as " encrypting " with the SIM encryption identification in the portable terminal, can be when detecting boot action and all accomplishing, and also can be a period of time that detects after boot action is all accomplished.
During normal shutdown, be when detecting shutdown command, automatically said SIM encryption identification be revised as " unencryption " earlier, and then carry out shutdown command.Can certainly be after detecting shutdown command, in the process of carrying out shutdown command, automatically said SIM encryption identification is revised as " unencryption ".
Fig. 2 is that this method is opened automatically, the flow chart of steps of turning-off mobile terminal encrypting module.As shown in the figure, the practical implementation step is:
Step 201: start portable terminal;
Step 202: judge whether encrypting module closes, and is then to change step 205 over to; Otherwise change step 203 over to;
Step 203: the startup password comparing unit requires the input password to compare;
Step 204: whether the startup password comparing unit will be inputed password identical with the password comparison in the startup password memory cell, is then to change step 205 over to; Otherwise change step 203 over to, continue to require the input password, wherein can set a password comparison limiting valve; In case surpassing, password input number of times sets; Just no longer allow the input password, also will end the operation to portable terminal, this is in order to prevent that the user from constantly importing the password attempt decryption;
Step 205: the portable terminal normal boot-strap, automatically the modified module encrypting module is set to opening, after start, just can be in the startup password memory cell have needed setting code by oneself;
Step 206: the turning-off mobile terminal instruction is sent;
Step 207: the modified module encrypting module is set to closed condition automatically;
Step 208: portable terminal is closed.
After the start, automatically modified module is provided with encrypting module position opening, can be when detecting boot action and all accomplishing after this start.
After the start, modified module is provided with encrypting module position opening automatically, also can be a period of time that detects after boot action is all accomplished.
Behind the normal shutdown, modified module is provided with encrypting module position closed condition automatically, and this normal shutdown can be when detecting shutdown command, and encrypting module is set to closed condition automatically earlier, and then carries out shutdown command.
Behind the normal shutdown, modified module is provided with encrypting module position closed condition automatically, and this normal shutdown also can be after detecting shutdown command, and in the process of carrying out shutdown command, said automatically encrypting module is set to closed condition.
Combine again below that Fig. 3 explains that this method is opened simultaneously automatically, turning-off mobile terminal encrypting module and sign " is encrypted ", the practical implementation step of " unencryption " is:
Step 301: start portable terminal;
Step 302: judging whether encrypting module closes, and whether SIM is designated " unencryption ", is then to change step 305 over to; Otherwise change step 303 over to;
Step 303: the startup password comparing unit requires the input password to compare;
Step 304: the startup password comparing unit will be inputed the password in password and the startup password memory cell, and whether the comparison of the password in the SIM is identical, is then to change step 305 over to; Otherwise forward step 303 to, continue to require the input password, wherein can set a password comparison limiting valve; In case surpassing, password input number of times sets; Just no longer allow the input password, also will end the operation to portable terminal, this is in order to prevent that the user from constantly importing the password attempt decryption;
Step 305: the portable terminal normal boot-strap, automatically the modified module encrypting module is set to opening, and simultaneously after starting shooting, the user just can be in the startup password memory cell have needed setting code by oneself;
Step 306: modified module is designated SIM " encrypting " automatically;
Step 307: the turning-off mobile terminal instruction is sent;
Step 308: the modified module encrypting module is set to closed condition automatically;
Step 309: modified module is designated SIM " unencryption " automatically;
Step 310: portable terminal is closed.
Certainly, we can also comprise further that is revised a control module, are used for that the work with automatic modified module stops according to user's needs.
Through the description of this method implementation step flow process among the embodiment, we can see, after use this method; Because encrypting module can be encrypted SIM and portable terminal; During abnormal shutdown, as long as the user does not know password, portable terminal just can not be used with its SIM portable terminal in stolen back; The leakage of personal information can be prevented effectively, of the circulation of illegal mobile phone can also be reduced in market.
Claims (15)
1. a portable terminal is protected the method for subscriber identification module automatically, it is characterized in that, comprises the steps:
Behind mobile terminal-opening, automatically the modified module encrypting module is set to opening, simultaneously after the start, the user can be in the startup password memory cell setting code, modified module is revised as " encrypting " with the subscriber identification module encryption identification automatically;
When the portable terminal normal shutdown, after the instruction of turning-off mobile terminal was sent, the modified module encrypting module was set to closed condition automatically, and said subscriber identification module encryption identification is revised as " unencryption ".
2. the method for claim 1 is characterized in that, after the said start, when all accomplishing for detecting boot action.
3. the method for claim 1 is characterized in that, after the said start, for detecting a period of time after boot action is all accomplished.
4. the method for claim 1 is characterized in that, during described normal shutdown, when detecting shutdown command, automatically said subscriber identification module encryption identification is revised as " unencryption " earlier, and then carries out shutdown command.
5. the method for claim 1 is characterized in that, during described normal shutdown, after detecting shutdown command, in the process of carrying out shutdown command, automatically said subscriber identification module encryption identification is revised as " unencryption ".
6. the automatic method of encrypting of portable terminal comprises the steps:
An encrypting module is set in portable terminal; This encrypting module has opening and two states of closed condition; When said mobile terminal-opening,, then require to start shooting behind the input startup password if said encrypting module is in opening; When if said encrypting module is in closed condition, normal boot-strap then;
Behind mobile terminal-opening, said automatically encrypting module is set to opening;
When said portable terminal normal shutdown, said automatically encrypting module is set to closed condition.
7. method as claimed in claim 6 is characterized in that, further comprises the steps:
Behind mobile terminal-opening, automatically the subscriber identification module encryption identification in the portable terminal is revised as " encrypting ";
When the portable terminal normal shutdown, automatically said subscriber identification module encryption identification is revised as " unencryption ".
8. method as claimed in claim 7 is characterized in that, after the said start, when all accomplishing for detecting boot action.
9. method as claimed in claim 7 is characterized in that, after the said start, for detecting a period of time after boot action is all accomplished.
10. method as claimed in claim 7 is characterized in that, during described normal shutdown, when detecting shutdown command, automatically said subscriber identification module encryption identification is revised as " unencryption " earlier, and then carries out shutdown command.
11. method as claimed in claim 7 is characterized in that, during described normal shutdown, after detecting shutdown command, in the process of carrying out shutdown command, automatically said subscriber identification module encryption identification is revised as " unencryption ".
12. method as claimed in claim 6 is characterized in that, after the said start, when all accomplishing for detecting boot action.
13. method as claimed in claim 6 is characterized in that, after the said start, for detecting a period of time after boot action is all accomplished.
14. method as claimed in claim 6 is characterized in that, during described normal shutdown, when detecting shutdown command, said automatically encrypting module is set to closed condition earlier, and then carries out shutdown command.
15. method as claimed in claim 6 is characterized in that, during described normal shutdown, after detecting shutdown command, in the process of carrying out shutdown command, said automatically encrypting module is set to closed condition.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2005101259692A CN1980428B (en) | 2005-11-30 | 2005-11-30 | Method for mobile terminal to automatically encipher and automatically protect subscriber identifying module |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2005101259692A CN1980428B (en) | 2005-11-30 | 2005-11-30 | Method for mobile terminal to automatically encipher and automatically protect subscriber identifying module |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1980428A CN1980428A (en) | 2007-06-13 |
CN1980428B true CN1980428B (en) | 2012-05-09 |
Family
ID=38131390
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2005101259692A Expired - Fee Related CN1980428B (en) | 2005-11-30 | 2005-11-30 | Method for mobile terminal to automatically encipher and automatically protect subscriber identifying module |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1980428B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101534502B (en) * | 2008-03-12 | 2012-09-05 | 中兴通讯股份有限公司 | Mobile phone camouflaging method |
US9392092B2 (en) | 2011-07-14 | 2016-07-12 | Qualcomm Incorporated | Method and apparatus for detecting and dealing with a lost electronics device |
CN103106358B (en) * | 2011-11-15 | 2018-03-02 | 研祥智能科技股份有限公司 | The method and apparatus for distributing computer system authority |
CN103458394A (en) * | 2012-05-28 | 2013-12-18 | 中兴通讯股份有限公司 | Mobile terminal, processing method and processing device for internal information of mobile terminal |
CN102891749A (en) * | 2012-09-25 | 2013-01-23 | 东莞宇龙通信科技有限公司 | Method and communication terminal for data encryption |
CN105611030A (en) * | 2014-11-20 | 2016-05-25 | 中兴通讯股份有限公司 | Method, device and terminal for card locking |
CN105391865A (en) * | 2015-11-27 | 2016-03-09 | 上海斐讯数据通信技术有限公司 | Method and system for starting anti-theft function of mobile terminal via shutdown mode |
CN106446629A (en) * | 2016-09-13 | 2017-02-22 | 中国电子科技集团公司第三十二研究所 | Security encryption method and system for intelligent mobile terminal |
CN109842714B (en) * | 2017-11-24 | 2021-06-15 | 奇酷互联网络科技(深圳)有限公司 | Anti-theft processing method and device and mobile terminal |
-
2005
- 2005-11-30 CN CN2005101259692A patent/CN1980428B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN1980428A (en) | 2007-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1980428B (en) | Method for mobile terminal to automatically encipher and automatically protect subscriber identifying module | |
CN101917513B (en) | Method and device for implementing graded display of privacy information | |
CN104123506B (en) | Data access method, device, data encryption, storage and access method, device | |
CN102781001A (en) | Method for encrypting built-in file of mobile terminal and mobile terminal | |
CN103037370A (en) | Portable storage device and identity authentication method | |
EP2835997B1 (en) | Cell phone data encryption method and decryption method | |
CN102694920A (en) | Mobile phone antitheft method | |
CN102521169B (en) | Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk | |
CN103413102A (en) | Secret data management device and secret data management method as well as mobile terminal | |
CN1997188A (en) | A recognition method of the user identity and its handset | |
EP2840818B1 (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
CN102495983A (en) | Method for encrypting and decrypting data of intelligent mobile terminal in real time | |
WO2011130970A1 (en) | Device and method for protecting data of mobile terminal | |
CN101409944A (en) | Method and apparatus for encrypting keyboard | |
CN101895829A (en) | Method and system for retrieving FLASH data from mobile telephone, and mobile telephone | |
CN103379478A (en) | Control method, control system, client terminal and server | |
CN2867771Y (en) | Mobile terminal capabal of automatic coding | |
CN101355740A (en) | Method and system for protecting smart card data | |
CN104036203A (en) | Information security management method and information security management system | |
CN101778094B (en) | Mobile storage system used for monitoring | |
CN101400055B (en) | Method for setting ciphering information of mobile terminal security card | |
CN102568555A (en) | USB (Universal Serial Bus) memory disc based on mobile module and remote management method thereof | |
CN2894167Y (en) | Mobile terminal capable of automatic protecting user identification module | |
CN103824029B (en) | Intelligent card data treating method and apparatus | |
CN104869255A (en) | Application access method and device and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120509 Termination date: 20171130 |