CN1984404A - Method for destroying terminal information - Google Patents

Method for destroying terminal information Download PDF

Info

Publication number
CN1984404A
CN1984404A CNA200610060652XA CN200610060652A CN1984404A CN 1984404 A CN1984404 A CN 1984404A CN A200610060652X A CNA200610060652X A CN A200610060652XA CN 200610060652 A CN200610060652 A CN 200610060652A CN 1984404 A CN1984404 A CN 1984404A
Authority
CN
China
Prior art keywords
terminal
information
destroying
zone
active coding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200610060652XA
Other languages
Chinese (zh)
Inventor
丁送星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNA200610060652XA priority Critical patent/CN1984404A/en
Publication of CN1984404A publication Critical patent/CN1984404A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The method comprises: the second terminal sends information to first terminal; after comparing said information with the information of active code, if they are matched, the first terminal deletes its saved information. By invention, the deleted information saved in the terminal will not be easy to be restored.

Description

A kind of method of destroying terminal information
Technical field
The present invention relates to a kind of information privacy technology of communication field, especially a kind of method of destroying terminal information.
Background technology
Along with development of Communication Technique, mobile phone is as one of important tool of people's periodic traffic, and its function also becomes and becomes stronger day by day.Small and exquisite, portable, the multiduty characteristics of mobile phone make it receive consumers in general's favor.In daily life since mobile phone light and handy, cost an arm and a leg, lost mobile phone, stolen situation happen occasionally, and this situation is in case take place, generally speaking, the cellphone subscriber is difficult to give for change and loses or stolen mobile phone, therefore brings great loss to the cellphone subscriber.
Except direct economic loss, the cellphone subscriber's of mobile phone EMS memory storage personal information is also utilized by the person of picking up any lost article from the road or thief probably, causes material and the emotional distress that can't retrieve to the machine master.And along with the continuous decline of mobile phone price, the damnous proportion of the abuse of personal information will increase day by day, under these circumstances, the cellphone subscriber is concerned about more whether the personal information that leaves in the mobile phone is utilized by other people, and wish lost mobile phone or stolen after, the important personal information of mobile phone EMS memory storage is not used by other people.
A kind of method that shields message in mobile phone is provided in the prior art, the mobile phone security service that this method is used when lost mobile phone or stolen after, in the time of can can't normally starting because of wrong reasons such as security password input,, be presented on the screen such as telephone number with machine master's contact method.After starting safe mode, then only allowing normally to dial a fixed telephone number, can be other contact numbers that the machine master sets, and can allow the mobile phone of giving for change that the owner of lost property tries one's best like this.This method is owing to make the mobile phone after losing always be in safe mode, if can't relate to the cellphone subscriber, personal information in the mobile phone is sightless so, has controlled mobile phone to a certain extent and has not been used by other people, and the information of mobile phone EMS memory storage is not utilized by other people.
Though described scheme of the prior art can meet the demands to a certain extent, but still there is following shortcoming: after having adopted safe mode, the locking mobile phone is shown in machine master contact method on the screen, equally also cause machine master information by the possibility of other people utilization, and adopt safe mode can only prevent that the mobile phone holder from can not obtain the machine master private data of storing on the mobile phone at short notice, but because these data are present in the mobile phone EMS memory always, can't guarantee that this safe mode is not cracked by the people and the data message that makes the mobile phone EMS memory storage by steal.
Summary of the invention
The object of the present invention is to provide a kind of method of destroying cellphone information voluntarily.
For achieving the above object, technical scheme provided by the invention is as follows:
A kind of method of destroying terminal information is characterized in that, the method comprising the steps of:
Second terminal is to first terminal transmits information;
Described information and active coding information are compared;
When the match is successful, its canned data of first terminal deletion.
Described active coding information is provided with by first terminal, deposits in first terminal or the network communication services device.
Described second terminal comprises before first terminal transmits information:
Described first terminal is provided with the transmission list of numbers, and described transmission list of numbers comprises at least one termination number; The number of described second terminal is arranged in described transmission list of numbers.
Described first terminal is provided with can destroy the zone, and the described zone of destroying comprises the first terminal information storage area;
It is described when the match is successful, its canned data of first terminal deletion is specially: the information that sends to first terminal in described second terminal is during with the active coding information matches, and then first terminal is destroyed the information that the corresponding described stored information region memory in zone stores up and carried out deletion action described.
Also comprise behind described its canned data of first terminal deletion:
First terminal is extracted and describedly and non-to be destroyed in the regional first corresponding end message storage area not deleted information described deleted information stores zone is filled.
Also comprise step before described its canned data of first terminal deletion:
Detect the information state that can destroy corresponding information stores zone, zone in first terminal, if described information is in and is consulted or upgrade mode of operation, then first terminal is jumped out this mode of operation.
Described method also comprises:
Described first terminal is to described second terminal transmits information, and described information carries the execution result of described destroying terminal information.
Need to start end message before the operation of described first terminal execution destroying terminal information and destroy service.
The beneficial effect that the present invention adopts this technical scheme to bring is as follows:
1, first terminal is when the transmission information that receives with the active coding information matches, automatically delete the information of its stored, make end message for the holder terminal finding, and the information after the deletion can't recover thereby can't utilize, guarantee the fail safe of information;
2, by sending active coding information destroying end message, make the time of destroying information more flexible, and can judge that according to actual conditions whether will start end message destroys task by first terminal use;
3, transmission number restriction tabulation is set, make that the active coding information transmitter can be for a plurality of, first terminal use can send active coding information by terminal under the arbitrary numbers in the tabulation behind terminal loss, can carry out end message effectively, fast and destroy function;
4, setting can be destroyed the zone, makes first terminal use can set the information of the terminal stored that needs destruction as required flexibly;
5, if receiving the active coding information terminal then jumps out and consult or upgrade mode of operation, prevent the continuation of operation to carry out, and forbidden consulting or update request in delete procedure, reduced terminal use's loss;
6, the destroying information zone is covered, can further guarantee reliability and fail safe after personal information is deleted;
7, transmit operation execution result information can make the terminal use know clearly whether the destruction of information is successful, to determine whether will continue to carry out the operation of destroying terminal information.
8, by starting the end message service of destroying can reduce by first terminal when not needing this operation operating load.
Description of drawings
Fig. 1 is a basic principle flow chart of the present invention;
Fig. 2 is a specific embodiment of the invention schematic diagram.
Embodiment
The invention provides a kind of method of destroying terminal information, reach the protection information of terminal user and be not other people used purpose by sending the method for deleting the terminal inner storag information to first terminal with the information of active coding information matches.
A kind of method of destroying terminal information is seen shown in Figure 1ly, and this method comprises following step:
Second terminal is to first terminal transmits information;
Described information and active coding information are compared;
When the match is successful, the information of first its stored of terminal deletion.
Be explained in detail below in conjunction with the concrete enforcement of accompanying drawing, see shown in Figure 2 the method for a kind of destroying terminal information of the present invention.
Step 1: the first starting terminal end message is destroyed service;
Described destruction service starts according to first terminal use's demand, can when opening, first terminal start, perhaps in the operation use of first terminal, start, also can adopt default setting when first starting terminal, to start described information destroying service voluntarily.
Step 2: second terminal is to first terminal transmits information;
Described second terminal and described first terminal are mobile phone terminal, also can be the communicating terminals that PDA etc. possesses the information interaction function.After first terminal use starts end message destruction service; when first terminal use can't obtain terminal owing to reasons such as losses; not used for the information of protecting the terminal stored for other people, can finish the destruction operation of first end message by second terminal to first terminal transmits information.
Step 3: described information and active coding information are compared;
Described first terminal is provided with active coding information, described first terminal use carries out the setting of active coding information to first terminal before the end message service of destroying starts, described active coding information setting is in described first terminal or be stored in the communication server, and described active coding information is the information type that Word message or other-end can be discerned and can send as information carrier.Second terminal is after first terminal transmits information, first terminal receives described information and itself and the active coding information that is arranged in first terminal is compared, perhaps described information and the active coding information that is stored in server end are compared, carry out follow-up operation according to described comparative result.
Step 4: when the match is successful, the information of first its stored of terminal deletion;
If the information of described transmission and described active coding information relatively after, if the match is successful for both, its canned data of first terminal deletion.
If the described first terminal mobile phone terminal, then the information default setting of the first terminal stored is all information of mobile phone terminal SIM card.
First terminal use also can be provided with which information that needs are deleted the first terminal stored, but finishes above-mentioned operation by the destroying information zone is set.The information of the first terminal stored can be divided into necessary information and inessential information according to the self-defining privacy degrees of terminal use, necessary information is not wherein wished the information that the people except that own knows for the terminal use, first terminal use selects necessary information wherein, these information can be the telephone numbers of telephone directory, memo pad and memorandum, receive calls, do not receive calls or content such as short message, but it is arranged at the destroying information zone, destroy the execution area of operation as follow-up, and but first terminal can carry out the renewal of destroying information zone internal information according to the needs of the change in information of the first terminal stored and first terminal use's reality, comprises interpolation, operations such as modification and deletion.
Second terminal to first terminal transmits information can be the communication terminal of arbitrary numbers, also can be provided with by the number of first terminal to second terminal, just carry out the destruction operation of information when only allowing the part number terminal to send information with the active coding information matches, be provided with by first terminal and send number restriction tabulation and realize aforesaid operations.Just carrying out corresponding information destroying when the terminal that is provided with active coding information only receives information that the number in the tabulation of its setting sends with the active coding information matches operates, number in the tabulation can be one or more, terminal is for sending the communicating terminal of active coding information arbitrarily to the terminal that active coding is set under the number, the arbitrary numbers of such first terminal use in can selective listing, and terminal sends active coding information to first terminal that active coding is set under utilizing this number timely.
But described active coding information destroying information zone or transmission number restriction tabulation are dynamically arranged by first terminal use, described information can be upgraded, the operation that first terminal use can add, delete, revise above-mentioned information, do not having to adopt default value under the situation about being provided with, but the information that promptly all terminals is sent needs only the destruction operation of then carrying out first all destroying informations of terminal with the active coding information matches that is provided with.
But when being provided with the destroying information zone, in case terminal loss, stolen or when any time first, the terminal use required to destroy the information that can destroy area stores in the terminal, send the information of mating to first terminal by second terminal with active coding, after first terminal receives the information of second terminal transmission, carrying out system detects, this information and the active coding information that is stored in first terminal are compared, and perhaps the webserver receives and after second terminal sends to first terminal information described information and the active coding information that is stored in server end is compared.If information that described second terminal sends and the success of the active coding information matches of setting, then first starting terminal is carried out the operation of destroying terminal information, but the information in the first terminal storage zone that will be corresponding with described destroying information zone is deleted.
When being provided with the transmission list of numbers, in case terminal loss, it is stolen or when any time first, the terminal use required to destroy the information of first terminal storage, send the information of mating to first terminal by second terminal with active coding, after first terminal receives the information of second terminal transmission, carrying out system detects, judge at first whether the number with second terminal is arranged in the transmission list of numbers of setting, if the number of described second terminal belongs to described transmission list of numbers, then the information that second terminal is sent compares with the active coding information that is stored in first terminal, and perhaps the webserver receives and after second terminal sends to first terminal information described information and the active coding information that is stored in server end compared.If information that described second terminal sends and the success of the active coding information matches of setting, then first starting terminal is carried out the operation of destroying terminal information, deletes the information in the first terminal storage zone.
But when being provided with the destroying information zone and sending list of numbers, in case terminal loss, it is stolen or when any time first, the terminal use required to destroy the information that can destroy area stores in the terminal, send the information of mating to first terminal by second terminal with active coding, after first terminal receives the information of second terminal transmission, carrying out system detects, judge at first whether the number with second terminal is arranged in the transmission list of numbers of setting, if the number of described second terminal belongs to described transmission list of numbers, then this information and the active coding information that is stored in first terminal are carried out matching ratio, perhaps the webserver receives and after second terminal sends to first terminal information described information and the active coding information that is stored in server end is compared.If information that described second terminal sends and the success of the active coding information matches of setting, then first starting terminal is carried out the operation of destroying terminal information, but the information in the first terminal storage zone that will be corresponding with described destroying information zone is deleted.
When terminal receives the information of that arrival sends to second terminal and active coding coupling, whether terminal at first detects has information to consult or upgrades operation just in commission, comprise that information consults, edits, adds, deletes or revise, if detect the execution of this operation, then first terminal is jumped out the aforesaid operations state, forbids the execution of aforesaid operations.
Further, but if to described destroying information zone or send one of number restriction tabulation or both are when all being provided with, when terminal receive to arrive information that send to second terminal that sends the tabulation number and the active coding coupling, whether terminal at first detects consults or upgrades operation just in commission, if detect the execution of this operation, then first terminal is searched the destroying information zone, determine whether identical with the corresponding first terminal region of memory in this zone and the execution area of consulting under the state, if it is identical, first terminal is jumped out and is consulted or update mode, forbids consulting or upgrading the execution of operation.
Further, first terminal is in carrying out the process of deletion action, if consulting arranged or upgrade the operation requests of the first terminal memory information, first terminal is forbidden the execution of this operation, effectively protects the reliability and the fail safe of the information of the first terminal internal memory.
After the deletion of information was finished, for the recovery that the information that prevents to have deleted is had a mind to, first terminal will cover the storage area in first terminal corresponding with the information destroying zone with inessential information, the further thorough destruction of information.
After finishing end message destruction operation, first terminal can be carried out the result who destroys operation to replying it with the transmission number terminal of active coding match information, inform whether the information content in destroying information zone destroys, if operation is success not, transmission number terminal can resend with the information of active coding coupling and destroy operation, destroys successful execution result up to receiving end message.
The machine master terminal lose or stolen after, holder terminal may utilize under the no signal condition can't receive the reception that active coding has a mind to avoid active coding information, after the service of destroying is enabled, when if the information that do not receive can't receive active coding, all private data information of machine master can forbid consulting.For example holder terminal will be consulted short message, and system can consult the intensity of current received signal simultaneously when this operation start, if be lower than a certain particular value, this lookup operations is forbidden immediately.
Under the situation of default setting, first terminal can detect each information that receives, whether detect and the active coding information matches, first terminal also can start end message at any time and destroy service, after described information destroying service starts, first terminal is just carried out matching detection, and then carries out the destruction operation of end message according to the match information that is received.

Claims (8)

1, a kind of method of destroying terminal information is characterized in that, the method comprising the steps of:
Second terminal is to first terminal transmits information;
Described information and active coding information are compared;
When the match is successful, its canned data of first terminal deletion.
2, method according to claim 1 is characterized in that, described active coding information is provided with by first terminal, deposits in first terminal or the network communication services device.
3, method according to claim 1 is characterized in that, described second terminal comprises before first terminal transmits information:
Described first terminal is provided with the transmission list of numbers, and described transmission list of numbers comprises at least one termination number; The number of described second terminal is arranged in described transmission list of numbers.
4, method according to claim 1 is characterized in that, described first terminal is provided with can destroy the zone, and the described zone of destroying comprises the first terminal information storage area;
It is described when the match is successful, its canned data of first terminal deletion is specially: the information that sends to first terminal in described second terminal is during with the active coding information matches, and then first terminal is destroyed the information that the corresponding described stored information region memory in zone stores up and carried out deletion action described.
5, method according to claim 4 is characterized in that, also comprises behind described its canned data of first terminal deletion:
First terminal is extracted and describedly and non-to be destroyed in the regional first corresponding end message storage area not deleted information described deleted information stores zone is filled.
6, method according to claim 4 is characterized in that, also comprises step before described its canned data of first terminal deletion:
Detect the information state that can destroy corresponding information stores zone, zone in first terminal, if described information is in and is consulted or upgrade mode of operation, then first terminal is jumped out this mode of operation.
7, method according to claim 1 is characterized in that, described method also comprises:
Described first terminal is to described second terminal transmits information, and described information carries the execution result of described destroying terminal information.
8, method according to claim 1 is characterized in that: need to start end message before the operation of described first terminal execution destroying terminal information and destroy service.
CNA200610060652XA 2006-05-01 2006-05-01 Method for destroying terminal information Pending CN1984404A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200610060652XA CN1984404A (en) 2006-05-01 2006-05-01 Method for destroying terminal information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA200610060652XA CN1984404A (en) 2006-05-01 2006-05-01 Method for destroying terminal information

Publications (1)

Publication Number Publication Date
CN1984404A true CN1984404A (en) 2007-06-20

Family

ID=38166543

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200610060652XA Pending CN1984404A (en) 2006-05-01 2006-05-01 Method for destroying terminal information

Country Status (1)

Country Link
CN (1) CN1984404A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281361A (en) * 2011-09-08 2011-12-14 北京无限新锐网络科技有限公司 Method and system for displaying information at mobile phone terminal in flash mode
CN103619002A (en) * 2013-12-16 2014-03-05 北京百纳威尔科技有限公司 Remote safety protection method of mobile phone
CN104423928A (en) * 2013-09-09 2015-03-18 腾讯科技(深圳)有限公司 Data processing method, data processing device and terminal equipment
CN104486735A (en) * 2014-12-17 2015-04-01 百度在线网络技术(北京)有限公司 Method and device for traceless communication
CN105657694A (en) * 2015-05-21 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Control method, controller and electronic equipment
CN105898051A (en) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 User terminal information deleting method and user terminal information deleting device
CN107392005A (en) * 2017-05-31 2017-11-24 广东网金控股股份有限公司 A kind of Activiation method and system of business finance terminal device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281361A (en) * 2011-09-08 2011-12-14 北京无限新锐网络科技有限公司 Method and system for displaying information at mobile phone terminal in flash mode
CN104423928A (en) * 2013-09-09 2015-03-18 腾讯科技(深圳)有限公司 Data processing method, data processing device and terminal equipment
CN103619002A (en) * 2013-12-16 2014-03-05 北京百纳威尔科技有限公司 Remote safety protection method of mobile phone
CN104486735A (en) * 2014-12-17 2015-04-01 百度在线网络技术(北京)有限公司 Method and device for traceless communication
CN105657694A (en) * 2015-05-21 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Control method, controller and electronic equipment
CN105657694B (en) * 2015-05-21 2019-08-23 宇龙计算机通信科技(深圳)有限公司 A kind of control method, controller and electronic equipment
CN105898051A (en) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 User terminal information deleting method and user terminal information deleting device
CN107392005A (en) * 2017-05-31 2017-11-24 广东网金控股股份有限公司 A kind of Activiation method and system of business finance terminal device

Similar Documents

Publication Publication Date Title
EP1298947B1 (en) Telecommunications system
CN100559800C (en) Honeycomb telephone device and method
US7627767B2 (en) Methods and systems for remotely securing data in a wireless device in a communications network
KR101065341B1 (en) Dual standbay portable terminal and method for communicating thereof
CN104376263B (en) The method and apparatus that application behavior intercepts
CN101960738B (en) Method and system of providing personal information control service for mobile communication terminal
CN1984404A (en) Method for destroying terminal information
US20060031541A1 (en) System and methods for remotely recovering and purging data from a wireless device in a communications network
EP1901577B1 (en) Apparatus and method for controlling bluetooth in portable terminal
CN101252703A (en) Terminal data protecting method, system as well as mobile communication terminal
CN104486727A (en) Mobile phone anti-theft method and system based on Android system
JP2000270376A (en) Mobile phone maintenance service system and method for maintenance service
CN102457606A (en) Mobile phone and anti-theft method thereof
CN101616495A (en) The method and system of individual privacy in the protection mobile phone
CN102387498A (en) Anti-theft system and method for mobile telephone
GB2379583A (en) Outgoing call control and data transfer for a portable terminal device
CN101610500A (en) Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system
CN100571436C (en) A kind of implementation method of mobile terminal information resource safety guarantee
JP2003264631A (en) Security method for sim card information
CN1469675A (en) Method of bundling mobile communication terminal and subscriber identifying module
JP2008092294A (en) Mobile communication network system and lock method for mobile terminal apparatus
CN101316386A (en) System and method for monitoring geographical position of stolen mobile phone
CN1060006C (en) Anti-theft method for the number code of mobile telephone
KR20010044083A (en) Private information protect method for a lost mobile terminal
CN100477686C (en) Mobile communication device possessing functions of guarding against theft and automatic notification, and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20070620