CN1980459A - Method for realizing information destroying at network side - Google Patents

Method for realizing information destroying at network side Download PDF

Info

Publication number
CN1980459A
CN1980459A CNA2005101259620A CN200510125962A CN1980459A CN 1980459 A CN1980459 A CN 1980459A CN A2005101259620 A CNA2005101259620 A CN A2005101259620A CN 200510125962 A CN200510125962 A CN 200510125962A CN 1980459 A CN1980459 A CN 1980459A
Authority
CN
China
Prior art keywords
information
network side
destroying
user
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2005101259620A
Other languages
Chinese (zh)
Other versions
CN1980459B (en
Inventor
张峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2005101259620A priority Critical patent/CN1980459B/en
Publication of CN1980459A publication Critical patent/CN1980459A/en
Application granted granted Critical
Publication of CN1980459B publication Critical patent/CN1980459B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This method applies in the net side of the mobile comm. system. The bonding info of user identification codes (IC) and the international mobile equipment IC is stored in the net side. The corresponding relation between the user IC and the service code of spare operation is also stored in the net side. This method includes the following steps. The net side (a) receives from user the request of destroying the aim mobile terminal (AMT) info; (b) confirms the user right of destroying the info; (c) searches the user IC of AMT and waits for AMT registering; (d) orientates the new user IC of AMT in HLR once finds AMT registering; (e) sends to AMT the related info destroying instruction to destroy the info. After the handset registers on the net server, once the handset is lost, the net side auto destroys all handset info.

Description

A kind of network side is realized the method for information destroying
Technical field
The present invention relates to a kind of network side and realize the method for information destroying, belong to communication technical field.
Background technology
Along with electronic technology, the continuous development of computer technology, the hardware performance of portable terminals such as mobile phone and software function have obtained bigger lifting, become the capable assistant in people's life, store a large amount of privacy informations on the mobile phone easily, telephone number, log, memorandum, note, perhaps with game provider, value-added service provider's number of the account, passwords etc. are implemented binding, perhaps customized not binding hours, the calling of region and access service, perhaps has the sub-district inlet, the building door, the door, office door, safety cabinet, automobile, computer, " gate inhibition " open function of portable hard drive, in case hand-set from stolen or lose, disabled user's use may bring tremendous loss to validated user.
Summary of the invention
The technical problem to be solved in the present invention is: a kind of method that can realize information destroying at network side is provided, and this method makes target machine start set memory program, destroying information sending dependent instruction automatically after receiving cellphone subscriber's request.
The present invention realizes by following technical proposals:
A kind of network side is realized the method for information destroying, be applied to the network side of mobile communication system, described network side storing has the corresponding relation of the service password of the binding information of custom IC and international mobile equipment identification number and custom IC and backup operation, and this method comprises the steps:
(a) network side receives the request of the needs destruction destination mobile terminal information of reporting of user;
(b) confirm that the user has information destroying power;
(c) network side is searched the custom IC of destination mobile terminal according to the custom IC of setting up and the binding information of international mobile equipment identification number, waits for that destination mobile terminal is in the net registration;
(d) network side is found destination mobile terminal when the net registration, the new custom IC of localizing objects portable terminal in HLR;
(e) network side sends the information destroying dependent instruction to destination mobile terminal, makes it start program stored auto-destruct information.
Further, in the described step (a), the request of reporting of user destroying information is: the custom IC and the service password that send portable terminal by short message mode or liaison mode or voice service mode.
Further, the different corresponding destroying information differences of described service password.
Further, described step (b), network side confirms that then this user has information destroying power to destination mobile terminal if confirming the destination mobile terminal custom IC and the service password that report mates.
Among the present invention, mobile phone is after webserver registration, and under the situation that user mobile phone is lost, network side can be initiated the auto-destruct operation to cellphone information automatically.
Description of drawings
Fig. 1 is the method flow diagram that network side is realized information back-up in the specific embodiment of the invention.
Fig. 2 is the structured flowchart of the device that network side realization information is recovered in the specific embodiment of the invention.
Fig. 3 is the method flow diagram that network side realization information is recovered in the specific embodiment of the invention.
Fig. 4 is the method flow diagram that network side is realized information destroying in the specific embodiment of the invention.
Fig. 5 is the method flow diagram that network side is realized warning in the specific embodiment of the invention.
Embodiment
Below in conjunction with the drawings and specific embodiments the present invention is further introduced, but not as a limitation of the invention.
In order to guarantee the information security of portable terminal, the server of network side is provided with an authenticating user identification unit, is used for the user's of information resources ownership is confirmed; A user profile pretreatment unit is used to extract the type of user terminal and the storage format of various information sources; A registering unit, be used to realize the binding relationship of user's SIM card and user mobile phone, also promptly set up the binding relationship of custom IC (International Subscriber Identification Number:IMSI) and international mobile equipment identification number (International Mobile Equipment Identity:IMEI); A database is used for store various kinds of data information, also comprises: an information recovery device.This network side can be realized information back-up function, information restore funcitons, information destroying function and warning function.
Before carrying out aforesaid operations, set up the binding relationship of portable terminal IMSI and IMEI in the registering unit of the present network side of needs, the mapping relations table of pairing service password of various operations and operand, for example: back up the mapping of certain file and operator password, destroy the mapping of all files and operator password etc., carry out different operations corresponding to different service passwords.
Network side is realized the information back-up function, the information resources of portable terminal can be backuped in the database of network side server, so that be sent to portable terminal when needed, makes portable terminal rebulid the original information resource.With reference to shown in Figure 1, implementation step is as follows:
Step 101: network side receives user's backup request, also is that portable terminal proposes the backup information application by the method that destination mobile terminal IMSI and service password are provided to network side;
The information back-up request is: by short message mode, user's service password that liaison mode or voice service mode etc. send can be provided with a plurality of service passwords in registering unit, corresponding different respectively backup information requests.
Step 102: network side confirms that then the user ID information request is legal if confirming the destination mobile terminal IMSI report mates with service password, and also being the user has ownership to the information resources of destination mobile terminal;
Step 103: the information resources data to be derived that mobile terminal receive is selected, different service passwords can be selected different information resources backups, set in registering unit;
Step 104: encrypt with user cipher receiving data, be kept in the database of network side, include information such as the format name of information source and backup version in the data, these satellite informations are added when data deposit database in automatically receiving.
Network side can be realized the information restore funcitons, thereby mobile phone has lost original information resources or when information is damaged, can rebulid individual's information resources when the user has lost.Data are recovered to mean and are covered existing various information resources in the portable terminal, so must user's write permission and user be differentiated in network side message file ownership, prevent the malice recovery.Thereby before the user carries out information recovery business, can back up the information resources on the existing mobile phone in advance.
The information restore funcitons is realized that by the information recovery device with reference to shown in Figure 2, the information recovery device comprises the recovery request receiving element 21 that connects successively, is used for the information recovery request of mobile terminal receive; Recover authority judging unit 22, be used for determining whether this device has the content of data write permission and request recovery; Information call unit 23 is used for calling the backup information data of network side server; Data processing unit 24 is used for Backup Data deciphering and format conversion; Data transmission unit 25, the data that are used for handling send to target terminal.
With reference to shown in Figure 3, information returns on the portable terminal and comprises the steps:
Step 201: network side receives the information recovery request of portable terminal;
The information recovery request is: by short message mode, user's service password that liaison mode or voice service mode etc. send can be provided with a plurality of service passwords in registering unit, corresponding different respectively recovering information requests.
Step 202: network side confirms that then portable terminal has write permission if confirming the destination mobile terminal IMSI and the service password that report mates;
Step 203: utilize IMSI in database, to find corresponding backup file;
Step 204: utilize service password deciphering backup file;
Step 205: according to the needs recovering information Instruction Selection resource data of user's transmission;
Step 206: read the type information of portable terminal, extract the end message resource format, information source form in the database is changed;
Step 207: the data after the conversion send to portable terminal, carry out corresponding write operation by portable terminal.
Network side realizes that the purpose of information destroying is: after user mobile phone is lost, trigger program in the target terminal by the mode that sends instruction to target terminal, finish the destruction of information resources.
With reference to shown in Figure 4, the implementation method of network side information destroying comprises the steps:
Step 301: network side receives the request that needs the destroying information resource of reporting of user;
The destroying information request is for passing through short message mode, and liaison mode or voice service mode etc. send the IMSI and the service password of destination mobile terminal, and a plurality of service passwords can be set in registering unit, corresponding respectively request of destroying different information.
Step 302: network side confirms that then this user has information ownership to destination mobile terminal if confirming the destination mobile terminal IMSI and the service password that report mates, and then can carry out information destroying;
Step 303: network side is searched the IMEI of portable terminal according to IMSI that sets up and the binding relationship of IMEI, and the startup process waits for that destination mobile terminal is in the net registration;
Step 304: network side is found destination mobile terminal when the net registration, the new IMSI of localizing objects portable terminal in HLR;
Step 305: this portable terminal is sent the information destroying dependent instruction, make it start program stored auto-destruct information.
Network side realizes that the effect of warning function is: mobile phone is lost, and after being reused by the people, during the binding information of finding user's IMSI and IMEI at network side and preservation inconsistent, trigger and reports to the police, and forbids this SIM card use, notifies the owner of lost property with the information of neocaine simultaneously.
With reference to shown in Figure 5, the warning implementation procedure of network side is as follows:
Step 401: when portable terminal was registered on the net, network side obtained the IMSI and the IMEI information of portable terminal;
Step 402: network side compares the IMSI of the IMSI that obtains and IMEI information and storage in advance and IMEI binding information and judges, if find that both are inconsistent, then carries out next step, otherwise, do not handle;
Step 403: network side is forbidden the SIM card use of this IMSI;
Step 404: network side sends to user's appointed positions with the information of new SIM card.
In this step, new card information can send to designated terminal by the mode of short message, phone, also can send to the wap mail server of appointment by Email.

Claims (4)

1, a kind of network side is realized the method for information destroying, be applied to the network side of mobile communication system, described network side storing has the corresponding relation of the service password of the binding information of custom IC and international mobile equipment identification number and custom IC and backup operation, and this method comprises the steps:
(a) network side receives the request of the needs destruction destination mobile terminal information of reporting of user;
(b) confirm that the user has information destroying power;
(c) network side is searched the custom IC of destination mobile terminal according to the custom IC of setting up and the binding information of international mobile equipment identification number, waits for that destination mobile terminal is in the net registration;
(d) network side is found destination mobile terminal when the net registration, the new custom IC of localizing objects portable terminal in HLR;
(e) network side sends the information destroying dependent instruction to destination mobile terminal, makes it start program stored auto-destruct information.
2, a kind of network side as claimed in claim 1 is realized the method for information destroying, it is characterized in that: in the described step (a), the request of reporting of user destroying information is: the custom IC and the service password that send portable terminal by short message mode or liaison mode or voice service mode.
3, a kind of network side as claimed in claim 2 is realized the method for information destroying, it is characterized in that: the different corresponding destroying information differences of described service password.
4, a kind of network side as claimed in claim 1 is realized the method for information destroying, it is characterized in that: described step (b), network side confirms that then this user has information destroying power to destination mobile terminal if confirming the destination mobile terminal custom IC and the service password that report mates.
CN2005101259620A 2005-11-30 2005-11-30 Method for realizing information destroying at network side Expired - Fee Related CN1980459B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2005101259620A CN1980459B (en) 2005-11-30 2005-11-30 Method for realizing information destroying at network side

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2005101259620A CN1980459B (en) 2005-11-30 2005-11-30 Method for realizing information destroying at network side

Publications (2)

Publication Number Publication Date
CN1980459A true CN1980459A (en) 2007-06-13
CN1980459B CN1980459B (en) 2010-07-14

Family

ID=38131416

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2005101259620A Expired - Fee Related CN1980459B (en) 2005-11-30 2005-11-30 Method for realizing information destroying at network side

Country Status (1)

Country Link
CN (1) CN1980459B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011022914A1 (en) * 2009-08-28 2011-03-03 中兴通讯股份有限公司 Method and system for smart card remote control
WO2011022916A1 (en) * 2009-08-28 2011-03-03 中兴通讯股份有限公司 Remote control method and system for smart card
CN101252703B (en) * 2008-03-28 2012-05-30 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN102932811A (en) * 2012-09-27 2013-02-13 东莞宇龙通信科技有限公司 Method and system for detecting lost terminal
CN103079187A (en) * 2011-10-25 2013-05-01 刘艺 Method for determining cell phone identity in IP (Internet Protocol) network
CN103765938A (en) * 2011-09-06 2014-04-30 阿尔卡特朗讯公司 Mobile terminal theft detection system
US8718602B2 (en) 2009-08-28 2014-05-06 Zte Corporation Method and system for remote control of smart card
US8744403B2 (en) 2009-08-28 2014-06-03 Zte Corporation Method and system for remote control of a smart card
US10169606B2 (en) * 2015-11-11 2019-01-01 International Business Machines Corporation Verifiable data destruction in a database
CN112019684A (en) * 2020-08-10 2020-12-01 Oppo(重庆)智能科技有限公司 Control method and electronic device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1285235C (en) * 2003-10-31 2006-11-15 大唐微电子技术有限公司 Method and system of preventing handset from theft by using international id code of mobile facilities
CN1602100A (en) * 2004-10-21 2005-03-30 康健 Method of backup of cell phone note based on STK or UTK tech

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252703B (en) * 2008-03-28 2012-05-30 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
US8744403B2 (en) 2009-08-28 2014-06-03 Zte Corporation Method and system for remote control of a smart card
CN101996445B (en) * 2009-08-28 2015-05-13 中兴通讯股份有限公司 Method and system for remotely controlling intelligent card
US8718603B2 (en) 2009-08-28 2014-05-06 Zte Corporation Method and system for remote control of a smart card
EP2472923A4 (en) * 2009-08-28 2014-05-07 Zte Corp Remote control method and system for smart card
EP2472923A1 (en) * 2009-08-28 2012-07-04 ZTE Corporation Remote control method and system for smart card
US8718602B2 (en) 2009-08-28 2014-05-06 Zte Corporation Method and system for remote control of smart card
CN101996445A (en) * 2009-08-28 2011-03-30 中兴通讯股份有限公司 Method and system for remotely controlling intelligent card
US8768300B2 (en) 2009-08-28 2014-07-01 Zte Corporation Remote control method and system for smart card
WO2011022914A1 (en) * 2009-08-28 2011-03-03 中兴通讯股份有限公司 Method and system for smart card remote control
CN102005089A (en) * 2009-08-28 2011-04-06 中兴通讯股份有限公司 Method and system for remotely controlling intelligent card
WO2011022916A1 (en) * 2009-08-28 2011-03-03 中兴通讯股份有限公司 Remote control method and system for smart card
CN103765938A (en) * 2011-09-06 2014-04-30 阿尔卡特朗讯公司 Mobile terminal theft detection system
US9622082B2 (en) 2011-09-06 2017-04-11 Alcatel Lucent Mobile terminal theft detection system
CN103765938B (en) * 2011-09-06 2018-11-02 物源资产集团有限责任公司 The stolen detecting system of mobile terminal
CN103079187A (en) * 2011-10-25 2013-05-01 刘艺 Method for determining cell phone identity in IP (Internet Protocol) network
CN102932811A (en) * 2012-09-27 2013-02-13 东莞宇龙通信科技有限公司 Method and system for detecting lost terminal
US10169606B2 (en) * 2015-11-11 2019-01-01 International Business Machines Corporation Verifiable data destruction in a database
CN112019684A (en) * 2020-08-10 2020-12-01 Oppo(重庆)智能科技有限公司 Control method and electronic device

Also Published As

Publication number Publication date
CN1980459B (en) 2010-07-14

Similar Documents

Publication Publication Date Title
CN1980459B (en) Method for realizing information destroying at network side
CN101252703B (en) Terminal data protecting method, system as well as mobile communication terminal
US7054624B2 (en) Safeguarding user data stored in mobile communications devices
CN1331371C (en) Method for delocking mobile phone radio communication terminal
CN105338515B (en) Data service transmission method and mobile communication equipment
US20080090548A1 (en) Method for tracking mobile communication terminal
US20030181219A1 (en) Method of indicating unauthorized use of a mobile terminal
CN101626571A (en) Card information backup method and system of user identification card
CN103581441A (en) Mobile terminal tracking anti-theft system and method
CN112437428B (en) Verification method and server
CN1980458B (en) Method for realizing information back-up at network side
EP2040497B1 (en) Tracking mobile communication devices
CN1980457A (en) Network-side alarm-realizing method
CN100571436C (en) A kind of implementation method of mobile terminal information resource safety guarantee
CN1684411A (en) Method for verifying user's legitimate of mobile terminal
US20140120900A1 (en) Safeguarding User Data Stored in Mobile Communications Devices
CN102595376B (en) A kind of activating method, Apparatus and system of User Identity card
CN100413368C (en) A method for verifying user card validity
CN1980461A (en) Device and method for realizing information recovery at network side
CN1980424A (en) Device for mobile terminal to realize information back-up
CN1980427A (en) Device for mobile terminal to automatically deleting information, and method thereof
CN100429957C (en) Indentifying method for telecommunication smart card and terminal
CN2867777Y (en) Mobile terminal information resource security guarantee system
CN110191464B (en) Method and system for preventing SIM card from being stolen
CN2852573Y (en) Mobile terminal with information backup function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100714

Termination date: 20171130