CN1980459A - Method for realizing information destroying at network side - Google Patents
Method for realizing information destroying at network side Download PDFInfo
- Publication number
- CN1980459A CN1980459A CNA2005101259620A CN200510125962A CN1980459A CN 1980459 A CN1980459 A CN 1980459A CN A2005101259620 A CNA2005101259620 A CN A2005101259620A CN 200510125962 A CN200510125962 A CN 200510125962A CN 1980459 A CN1980459 A CN 1980459A
- Authority
- CN
- China
- Prior art keywords
- information
- network side
- destroying
- user
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
This method applies in the net side of the mobile comm. system. The bonding info of user identification codes (IC) and the international mobile equipment IC is stored in the net side. The corresponding relation between the user IC and the service code of spare operation is also stored in the net side. This method includes the following steps. The net side (a) receives from user the request of destroying the aim mobile terminal (AMT) info; (b) confirms the user right of destroying the info; (c) searches the user IC of AMT and waits for AMT registering; (d) orientates the new user IC of AMT in HLR once finds AMT registering; (e) sends to AMT the related info destroying instruction to destroy the info. After the handset registers on the net server, once the handset is lost, the net side auto destroys all handset info.
Description
Technical field
The present invention relates to a kind of network side and realize the method for information destroying, belong to communication technical field.
Background technology
Along with electronic technology, the continuous development of computer technology, the hardware performance of portable terminals such as mobile phone and software function have obtained bigger lifting, become the capable assistant in people's life, store a large amount of privacy informations on the mobile phone easily, telephone number, log, memorandum, note, perhaps with game provider, value-added service provider's number of the account, passwords etc. are implemented binding, perhaps customized not binding hours, the calling of region and access service, perhaps has the sub-district inlet, the building door, the door, office door, safety cabinet, automobile, computer, " gate inhibition " open function of portable hard drive, in case hand-set from stolen or lose, disabled user's use may bring tremendous loss to validated user.
Summary of the invention
The technical problem to be solved in the present invention is: a kind of method that can realize information destroying at network side is provided, and this method makes target machine start set memory program, destroying information sending dependent instruction automatically after receiving cellphone subscriber's request.
The present invention realizes by following technical proposals:
A kind of network side is realized the method for information destroying, be applied to the network side of mobile communication system, described network side storing has the corresponding relation of the service password of the binding information of custom IC and international mobile equipment identification number and custom IC and backup operation, and this method comprises the steps:
(a) network side receives the request of the needs destruction destination mobile terminal information of reporting of user;
(b) confirm that the user has information destroying power;
(c) network side is searched the custom IC of destination mobile terminal according to the custom IC of setting up and the binding information of international mobile equipment identification number, waits for that destination mobile terminal is in the net registration;
(d) network side is found destination mobile terminal when the net registration, the new custom IC of localizing objects portable terminal in HLR;
(e) network side sends the information destroying dependent instruction to destination mobile terminal, makes it start program stored auto-destruct information.
Further, in the described step (a), the request of reporting of user destroying information is: the custom IC and the service password that send portable terminal by short message mode or liaison mode or voice service mode.
Further, the different corresponding destroying information differences of described service password.
Further, described step (b), network side confirms that then this user has information destroying power to destination mobile terminal if confirming the destination mobile terminal custom IC and the service password that report mates.
Among the present invention, mobile phone is after webserver registration, and under the situation that user mobile phone is lost, network side can be initiated the auto-destruct operation to cellphone information automatically.
Description of drawings
Fig. 1 is the method flow diagram that network side is realized information back-up in the specific embodiment of the invention.
Fig. 2 is the structured flowchart of the device that network side realization information is recovered in the specific embodiment of the invention.
Fig. 3 is the method flow diagram that network side realization information is recovered in the specific embodiment of the invention.
Fig. 4 is the method flow diagram that network side is realized information destroying in the specific embodiment of the invention.
Fig. 5 is the method flow diagram that network side is realized warning in the specific embodiment of the invention.
Embodiment
Below in conjunction with the drawings and specific embodiments the present invention is further introduced, but not as a limitation of the invention.
In order to guarantee the information security of portable terminal, the server of network side is provided with an authenticating user identification unit, is used for the user's of information resources ownership is confirmed; A user profile pretreatment unit is used to extract the type of user terminal and the storage format of various information sources; A registering unit, be used to realize the binding relationship of user's SIM card and user mobile phone, also promptly set up the binding relationship of custom IC (International Subscriber Identification Number:IMSI) and international mobile equipment identification number (International Mobile Equipment Identity:IMEI); A database is used for store various kinds of data information, also comprises: an information recovery device.This network side can be realized information back-up function, information restore funcitons, information destroying function and warning function.
Before carrying out aforesaid operations, set up the binding relationship of portable terminal IMSI and IMEI in the registering unit of the present network side of needs, the mapping relations table of pairing service password of various operations and operand, for example: back up the mapping of certain file and operator password, destroy the mapping of all files and operator password etc., carry out different operations corresponding to different service passwords.
Network side is realized the information back-up function, the information resources of portable terminal can be backuped in the database of network side server, so that be sent to portable terminal when needed, makes portable terminal rebulid the original information resource.With reference to shown in Figure 1, implementation step is as follows:
Step 101: network side receives user's backup request, also is that portable terminal proposes the backup information application by the method that destination mobile terminal IMSI and service password are provided to network side;
The information back-up request is: by short message mode, user's service password that liaison mode or voice service mode etc. send can be provided with a plurality of service passwords in registering unit, corresponding different respectively backup information requests.
Step 102: network side confirms that then the user ID information request is legal if confirming the destination mobile terminal IMSI report mates with service password, and also being the user has ownership to the information resources of destination mobile terminal;
Step 103: the information resources data to be derived that mobile terminal receive is selected, different service passwords can be selected different information resources backups, set in registering unit;
Step 104: encrypt with user cipher receiving data, be kept in the database of network side, include information such as the format name of information source and backup version in the data, these satellite informations are added when data deposit database in automatically receiving.
Network side can be realized the information restore funcitons, thereby mobile phone has lost original information resources or when information is damaged, can rebulid individual's information resources when the user has lost.Data are recovered to mean and are covered existing various information resources in the portable terminal, so must user's write permission and user be differentiated in network side message file ownership, prevent the malice recovery.Thereby before the user carries out information recovery business, can back up the information resources on the existing mobile phone in advance.
The information restore funcitons is realized that by the information recovery device with reference to shown in Figure 2, the information recovery device comprises the recovery request receiving element 21 that connects successively, is used for the information recovery request of mobile terminal receive; Recover authority judging unit 22, be used for determining whether this device has the content of data write permission and request recovery; Information call unit 23 is used for calling the backup information data of network side server; Data processing unit 24 is used for Backup Data deciphering and format conversion; Data transmission unit 25, the data that are used for handling send to target terminal.
With reference to shown in Figure 3, information returns on the portable terminal and comprises the steps:
Step 201: network side receives the information recovery request of portable terminal;
The information recovery request is: by short message mode, user's service password that liaison mode or voice service mode etc. send can be provided with a plurality of service passwords in registering unit, corresponding different respectively recovering information requests.
Step 202: network side confirms that then portable terminal has write permission if confirming the destination mobile terminal IMSI and the service password that report mates;
Step 203: utilize IMSI in database, to find corresponding backup file;
Step 204: utilize service password deciphering backup file;
Step 205: according to the needs recovering information Instruction Selection resource data of user's transmission;
Step 206: read the type information of portable terminal, extract the end message resource format, information source form in the database is changed;
Step 207: the data after the conversion send to portable terminal, carry out corresponding write operation by portable terminal.
Network side realizes that the purpose of information destroying is: after user mobile phone is lost, trigger program in the target terminal by the mode that sends instruction to target terminal, finish the destruction of information resources.
With reference to shown in Figure 4, the implementation method of network side information destroying comprises the steps:
Step 301: network side receives the request that needs the destroying information resource of reporting of user;
The destroying information request is for passing through short message mode, and liaison mode or voice service mode etc. send the IMSI and the service password of destination mobile terminal, and a plurality of service passwords can be set in registering unit, corresponding respectively request of destroying different information.
Step 302: network side confirms that then this user has information ownership to destination mobile terminal if confirming the destination mobile terminal IMSI and the service password that report mates, and then can carry out information destroying;
Step 303: network side is searched the IMEI of portable terminal according to IMSI that sets up and the binding relationship of IMEI, and the startup process waits for that destination mobile terminal is in the net registration;
Step 304: network side is found destination mobile terminal when the net registration, the new IMSI of localizing objects portable terminal in HLR;
Step 305: this portable terminal is sent the information destroying dependent instruction, make it start program stored auto-destruct information.
Network side realizes that the effect of warning function is: mobile phone is lost, and after being reused by the people, during the binding information of finding user's IMSI and IMEI at network side and preservation inconsistent, trigger and reports to the police, and forbids this SIM card use, notifies the owner of lost property with the information of neocaine simultaneously.
With reference to shown in Figure 5, the warning implementation procedure of network side is as follows:
Step 401: when portable terminal was registered on the net, network side obtained the IMSI and the IMEI information of portable terminal;
Step 402: network side compares the IMSI of the IMSI that obtains and IMEI information and storage in advance and IMEI binding information and judges, if find that both are inconsistent, then carries out next step, otherwise, do not handle;
Step 403: network side is forbidden the SIM card use of this IMSI;
Step 404: network side sends to user's appointed positions with the information of new SIM card.
In this step, new card information can send to designated terminal by the mode of short message, phone, also can send to the wap mail server of appointment by Email.
Claims (4)
1, a kind of network side is realized the method for information destroying, be applied to the network side of mobile communication system, described network side storing has the corresponding relation of the service password of the binding information of custom IC and international mobile equipment identification number and custom IC and backup operation, and this method comprises the steps:
(a) network side receives the request of the needs destruction destination mobile terminal information of reporting of user;
(b) confirm that the user has information destroying power;
(c) network side is searched the custom IC of destination mobile terminal according to the custom IC of setting up and the binding information of international mobile equipment identification number, waits for that destination mobile terminal is in the net registration;
(d) network side is found destination mobile terminal when the net registration, the new custom IC of localizing objects portable terminal in HLR;
(e) network side sends the information destroying dependent instruction to destination mobile terminal, makes it start program stored auto-destruct information.
2, a kind of network side as claimed in claim 1 is realized the method for information destroying, it is characterized in that: in the described step (a), the request of reporting of user destroying information is: the custom IC and the service password that send portable terminal by short message mode or liaison mode or voice service mode.
3, a kind of network side as claimed in claim 2 is realized the method for information destroying, it is characterized in that: the different corresponding destroying information differences of described service password.
4, a kind of network side as claimed in claim 1 is realized the method for information destroying, it is characterized in that: described step (b), network side confirms that then this user has information destroying power to destination mobile terminal if confirming the destination mobile terminal custom IC and the service password that report mates.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2005101259620A CN1980459B (en) | 2005-11-30 | 2005-11-30 | Method for realizing information destroying at network side |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2005101259620A CN1980459B (en) | 2005-11-30 | 2005-11-30 | Method for realizing information destroying at network side |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1980459A true CN1980459A (en) | 2007-06-13 |
CN1980459B CN1980459B (en) | 2010-07-14 |
Family
ID=38131416
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2005101259620A Expired - Fee Related CN1980459B (en) | 2005-11-30 | 2005-11-30 | Method for realizing information destroying at network side |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1980459B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011022914A1 (en) * | 2009-08-28 | 2011-03-03 | 中兴通讯股份有限公司 | Method and system for smart card remote control |
WO2011022916A1 (en) * | 2009-08-28 | 2011-03-03 | 中兴通讯股份有限公司 | Remote control method and system for smart card |
CN101252703B (en) * | 2008-03-28 | 2012-05-30 | 宇龙计算机通信科技(深圳)有限公司 | Terminal data protecting method, system as well as mobile communication terminal |
CN102932811A (en) * | 2012-09-27 | 2013-02-13 | 东莞宇龙通信科技有限公司 | Method and system for detecting lost terminal |
CN103079187A (en) * | 2011-10-25 | 2013-05-01 | 刘艺 | Method for determining cell phone identity in IP (Internet Protocol) network |
CN103765938A (en) * | 2011-09-06 | 2014-04-30 | 阿尔卡特朗讯公司 | Mobile terminal theft detection system |
US8718602B2 (en) | 2009-08-28 | 2014-05-06 | Zte Corporation | Method and system for remote control of smart card |
US8744403B2 (en) | 2009-08-28 | 2014-06-03 | Zte Corporation | Method and system for remote control of a smart card |
US10169606B2 (en) * | 2015-11-11 | 2019-01-01 | International Business Machines Corporation | Verifiable data destruction in a database |
CN112019684A (en) * | 2020-08-10 | 2020-12-01 | Oppo(重庆)智能科技有限公司 | Control method and electronic device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1285235C (en) * | 2003-10-31 | 2006-11-15 | 大唐微电子技术有限公司 | Method and system of preventing handset from theft by using international id code of mobile facilities |
CN1602100A (en) * | 2004-10-21 | 2005-03-30 | 康健 | Method of backup of cell phone note based on STK or UTK tech |
-
2005
- 2005-11-30 CN CN2005101259620A patent/CN1980459B/en not_active Expired - Fee Related
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252703B (en) * | 2008-03-28 | 2012-05-30 | 宇龙计算机通信科技(深圳)有限公司 | Terminal data protecting method, system as well as mobile communication terminal |
US8744403B2 (en) | 2009-08-28 | 2014-06-03 | Zte Corporation | Method and system for remote control of a smart card |
CN101996445B (en) * | 2009-08-28 | 2015-05-13 | 中兴通讯股份有限公司 | Method and system for remotely controlling intelligent card |
US8718603B2 (en) | 2009-08-28 | 2014-05-06 | Zte Corporation | Method and system for remote control of a smart card |
EP2472923A4 (en) * | 2009-08-28 | 2014-05-07 | Zte Corp | Remote control method and system for smart card |
EP2472923A1 (en) * | 2009-08-28 | 2012-07-04 | ZTE Corporation | Remote control method and system for smart card |
US8718602B2 (en) | 2009-08-28 | 2014-05-06 | Zte Corporation | Method and system for remote control of smart card |
CN101996445A (en) * | 2009-08-28 | 2011-03-30 | 中兴通讯股份有限公司 | Method and system for remotely controlling intelligent card |
US8768300B2 (en) | 2009-08-28 | 2014-07-01 | Zte Corporation | Remote control method and system for smart card |
WO2011022914A1 (en) * | 2009-08-28 | 2011-03-03 | 中兴通讯股份有限公司 | Method and system for smart card remote control |
CN102005089A (en) * | 2009-08-28 | 2011-04-06 | 中兴通讯股份有限公司 | Method and system for remotely controlling intelligent card |
WO2011022916A1 (en) * | 2009-08-28 | 2011-03-03 | 中兴通讯股份有限公司 | Remote control method and system for smart card |
CN103765938A (en) * | 2011-09-06 | 2014-04-30 | 阿尔卡特朗讯公司 | Mobile terminal theft detection system |
US9622082B2 (en) | 2011-09-06 | 2017-04-11 | Alcatel Lucent | Mobile terminal theft detection system |
CN103765938B (en) * | 2011-09-06 | 2018-11-02 | 物源资产集团有限责任公司 | The stolen detecting system of mobile terminal |
CN103079187A (en) * | 2011-10-25 | 2013-05-01 | 刘艺 | Method for determining cell phone identity in IP (Internet Protocol) network |
CN102932811A (en) * | 2012-09-27 | 2013-02-13 | 东莞宇龙通信科技有限公司 | Method and system for detecting lost terminal |
US10169606B2 (en) * | 2015-11-11 | 2019-01-01 | International Business Machines Corporation | Verifiable data destruction in a database |
CN112019684A (en) * | 2020-08-10 | 2020-12-01 | Oppo(重庆)智能科技有限公司 | Control method and electronic device |
Also Published As
Publication number | Publication date |
---|---|
CN1980459B (en) | 2010-07-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1980459B (en) | Method for realizing information destroying at network side | |
CN101252703B (en) | Terminal data protecting method, system as well as mobile communication terminal | |
US7054624B2 (en) | Safeguarding user data stored in mobile communications devices | |
CN1331371C (en) | Method for delocking mobile phone radio communication terminal | |
CN105338515B (en) | Data service transmission method and mobile communication equipment | |
US20080090548A1 (en) | Method for tracking mobile communication terminal | |
US20030181219A1 (en) | Method of indicating unauthorized use of a mobile terminal | |
CN101626571A (en) | Card information backup method and system of user identification card | |
CN103581441A (en) | Mobile terminal tracking anti-theft system and method | |
CN112437428B (en) | Verification method and server | |
CN1980458B (en) | Method for realizing information back-up at network side | |
EP2040497B1 (en) | Tracking mobile communication devices | |
CN1980457A (en) | Network-side alarm-realizing method | |
CN100571436C (en) | A kind of implementation method of mobile terminal information resource safety guarantee | |
CN1684411A (en) | Method for verifying user's legitimate of mobile terminal | |
US20140120900A1 (en) | Safeguarding User Data Stored in Mobile Communications Devices | |
CN102595376B (en) | A kind of activating method, Apparatus and system of User Identity card | |
CN100413368C (en) | A method for verifying user card validity | |
CN1980461A (en) | Device and method for realizing information recovery at network side | |
CN1980424A (en) | Device for mobile terminal to realize information back-up | |
CN1980427A (en) | Device for mobile terminal to automatically deleting information, and method thereof | |
CN100429957C (en) | Indentifying method for telecommunication smart card and terminal | |
CN2867777Y (en) | Mobile terminal information resource security guarantee system | |
CN110191464B (en) | Method and system for preventing SIM card from being stolen | |
CN2852573Y (en) | Mobile terminal with information backup function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100714 Termination date: 20171130 |