TW200947254A - Mobile termination having anti-theft function and anti-theft method thereof - Google Patents

Mobile termination having anti-theft function and anti-theft method thereof Download PDF

Info

Publication number
TW200947254A
TW200947254A TW97117164A TW97117164A TW200947254A TW 200947254 A TW200947254 A TW 200947254A TW 97117164 A TW97117164 A TW 97117164A TW 97117164 A TW97117164 A TW 97117164A TW 200947254 A TW200947254 A TW 200947254A
Authority
TW
Taiwan
Prior art keywords
module
theft
data
mobile terminal
user
Prior art date
Application number
TW97117164A
Other languages
Chinese (zh)
Other versions
TWI393022B (en
Inventor
Young-Way Liu
Original Assignee
Hon Hai Prec Ind Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hon Hai Prec Ind Co Ltd filed Critical Hon Hai Prec Ind Co Ltd
Priority to TW97117164A priority Critical patent/TWI393022B/en
Publication of TW200947254A publication Critical patent/TW200947254A/en
Application granted granted Critical
Publication of TWI393022B publication Critical patent/TWI393022B/en

Links

Landscapes

  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

A mobile termination having anti-theft function includes a CPU and a memory unit. The memory unit includes an encrypting/binding module, a password comparing module, a locking/unlocking module, and a data deleting module. The CPU can call the encrypting/binding module to blind an anti-theft password to a subscriber identity card and save data to a register. The CPU can call the password comparing module to compare the anti-theft password with the subscriber identity card. The CPU can call the locking/unlocking module to lock or unlock the mobile termination. The CPU can call the data deleting module to delete data of the mobile termination.

Description

200947254 九、發明說明: 【發明所屬之技術領域】 • I發明係關於—種移動終端,尤指—種㈣盜功能之 移動終端及其防盜方法。 【先前技術】 隨著電子技術、電腦技術之不斷發展,手機之硬體性 能及軟體功能得到了較大提升,已經成為了人們生活中之 ❹得力助手’手機上方便地存儲有大量之隱私數據,如聯繫 電話、通訊記錄、備忘錄,或者與遊戲供應商、增值 供應商之帳號、密碼等實施綁定,或者制定了不限制時間、 地域之呼叫和接入業務,或者具有社區門口、樓門、家門、 辦公室門、保險櫃、汽車、電腦、移動硬碟之“門林 ,一旦手機被盜或者丟失,非法用戶可能給:法; 戶帶來巨大損失。 π ,最常用之防盜方法是用戶透過設置開機 ❹防止:機被盜換卡後之換卡使用。但對於這種防盜方法, 用=每次開機都必須輸入開機密碼,使得操作極為不便, 很夕用戶因此就不會去設置開機密碼,致使 被換卡使用。Μ這種防盜方法也無法阻止非法用 戶使用骇客軟體破解密碼後盜㈣戶手機上之數據。 【發明内容】 蓉於以上内容,有必要提供 端及其防盜方法,以避讼功能之移動終 盜用而帶來損失。免用戶存儲於移動終端上之數據被 -種具防盜功能之移動終端,其包括一中央處理器、 .200947254200947254 IX. Description of the invention: [Technical field to which the invention pertains] • The invention relates to a mobile terminal, and more particularly to a mobile terminal of the (four) piracy function and an antitheft method thereof. [Prior Art] With the continuous development of electronic technology and computer technology, the hardware performance and software functions of mobile phones have been greatly improved, and it has become a powerful assistant in people's lives. It is convenient to store a large amount of private data on mobile phones. , such as contact telephone number, communication record, memo, or binding with the game provider, value-added supplier account, password, etc., or set up unlimited time, regional call and access services, or have community door, floor door , door, office door, safe, car, computer, mobile hard disk "door forest, once the phone is stolen or lost, illegal users may give: law; households bring huge losses. π, the most commonly used anti-theft method is the user through Set the boot to prevent: the card is used after the card is stolen. However, for this anti-theft method, you must enter the power-on password every time you turn it on, which makes the operation extremely inconvenient, so the user will not set the power-on password. , causing the card to be used for change. Μ This anti-theft method can not prevent illegal users from using the hacker software to crack the password. The data on the mobile phone of the (4) household. [Invention content] In the above content, it is necessary to provide the end and its anti-theft method to avoid the loss of the mobile terminal use of the function. The data stored by the user on the mobile terminal is A mobile terminal with anti-theft function, comprising a central processing unit, .200947254

:存=元及一用於讀取用戶識別卡 兀,該存儲單元包括一寄在別卡讀取早 盜模組,該防盜減^ 詩處理防盜操作之防 模▲包括一加密/綁定模組、一 二一鎖定/解鎖模組及-數據刪除模組,該中央處= :用該:密:綁定模組將一防盜密碼與該用;::::: '订綁疋’並將該防盜密碼紀錄於該寄存器中;該中央 ί = ^該密碼比對模組從該寄存器中取出該防盜密碼 並將〜、刻戶朗卡數據進行比對;該巾央處 钢 =該鎖定/解鎖模組將該移動終端鎖定或解除鎖^該;央 處理器可調用該數據刪除模組執行刪除操作。 、 一種具防盜功能之移動終端防盜方法,包括以下步驟: 該中央處理器調用該密碼比對模組從該寄存器中取 該防盜密碼並將其與移動終端内之用戶識別卡數據進行比 對,如果兩者匹配則移動終端進入後續正常操作過程;: save = yuan and one for reading the user identification card 该, the storage unit includes a mailing card to read the early burglar module, the anti-theft smashing poetry anti-theft operation anti-module ▲ includes an encryption / binding mode Group, one-two lock/unlock module and - data deletion module, the central office =: use the: secret: binding module to an anti-theft password and the use of :::::: 'binding kidnapped' Recording the anti-theft password in the register; the central ί = ^ the password comparison module takes the anti-theft password from the register and compares the ~ and the Langka data; the towel is at the steel = the lock The unlocking module locks or unlocks the mobile terminal; the central processor can call the data deletion module to perform a delete operation. The anti-theft function of the mobile terminal anti-theft function comprises the following steps: the central processor calls the password comparison module to take the anti-theft password from the register and compare it with the user identification card data in the mobile terminal. If the two match, the mobile terminal enters a subsequent normal operation process;

如果兩者不匹配,則該中央處理器調用該鎖定/解鎖模 組將移動終端進行鎖定; 當移動終端更換用戶識別卡被鎖定後,再次彈出密碼 輸入視窗,該中央處理器調用該密碼比對模組判斷用戶輸 入之防金雄、碼是否正確,如果用戶輸入正確之防盜密竭,' 則該中央處理器調用該鎖定/解鎖模組將移動終端解除鎖 定,且該中央處理器調用該加密/綁定模組將該防盜密碼重 新與更換後之用戶識別卡數據進行綁定,隨後移動終端進 入後續正常操作過程; 如果用戶輸入之防盜密碼不正確時,該中央處理器, 用該數據刪除模組紀錄上述操作數據,當經過一預設時間 6 200947254 .'姑:果用戶在这段時間内重新輸人了正確之防盜密碼, =央處理器調用該鎖定/解鎖模組將移動終端解除鎖 =且該中央處理器調用該加密/綁定模組將該防盜密碼將 、新與更換後之用戶識別卡數據進行綁定,隨後移動終端 進入後續正常操作過程;及 如果用戶在該預設時間内沒有重新輸入正確之防盜密 馬則該中央處理器調用該數據刪除模組執行刪除操作, ©即將移動終端存儲單元中之用戶各種資源數據進行刪除。 =較習知技術,該移動終端透過該密碼比對模組設置 防k畨碼並使其與機主之用戶識別卡數據進行綁定,以使 用戶在插入其他用戶識別卡時需要密碼登陸,如果用戶沒 有重新輸入正確之防盜密碼,則該鎖定/解鎖模組將該移動 終端鎖定,並且當經過一預設時間後,該數據刪除模組將 執行刪除操作,即將移動終端記憶體中之用戶各種資源數 據進行刪除,從而避免了用戶存儲於移動終端上之數據被 Q 盜用而帶來損失。 【實施方式】 請參考圖1及圖2,本發明具防盜功能之移動終端之 較佳實施方式以一手機為例加以說明,其包括一中央處理 器10、一存儲單元20、一用戶識別卡讀取單元3〇、一鍵 盤40、一監視器50以及輔助電路和天線(未示出)。該存 儲單元20包括一寄存器22及一用於處理防盜操作之防盜 模組24。該中央處理器10與該存儲單元2〇相連,用於調 用該存儲單元之數據或程式進行相關處理。該用戶識別卡 7 200947254 讀取單元30與該中央處理器10相連,用戶放置用戶識別 卡,如 SIM ( Subscriber Identity Module,用戶數據識別模 • 組)卡,以便該中央處理器10與用戶識別卡進行通訊。該 鍵盤40與該中央處理器10相連,以便用戶輸入相應指令 給該中央處理器10進行相應處理。該監視器50與該中央 處理器10相連,用於提供用戶操作視窗。 該防盜模組24包括一加密/綁定模組240、一密碼比 ❹對模組242、一鎖定/解鎖模組244、一數據刪除模組246 及一數據讀取模組248,以上模組用來處理該手機之防盜 操作。 該存儲單元20還用於存儲機主之各種資源數據,當機 主第一次使用該手機時插入一 SIM卡,開機後透過該鍵盤 40在監視器50内彈出之密碼輸入視窗中設置一防盜密 碼,該中央處理器10調用該防盜模組24中之加密/綁定模 組240將該防盜密碼與該SIM卡數據進行綁定,並將該防 © 盜密碼紀錄於該寄存器22中。 請繼續參考圖3,本發明具防盜功能之移動終端防盜 方法之較佳實施方式包括以下步驟: 步驟S1,當用戶再次開機時,該中央處理器10首先 調用該防盜模組24中之密碼比對模組242從該寄存器22 中取出該防盜密碼並將其與手機内之SIM卡數據進行比 對,如果兩者匹配則手機進入後續正常操作過程。 步驟S2,如果兩者不匹配(即此時換上了另一個SIM 卡而導致之密碼不匹配),則該中央處理器10調用該防盜 8 200947254 模組24中之鎖定/解鎖模組244將手機進行鎖定。 . 步驟S3 ’當手機更換SIM卡被鎖定後,再次彈出密 碼輸入視窗,該中央處理器10調用該防盜模組24中之密 碼比對模組242判斷用戶輸入之防盜密碼是否正確,如果 用戶輸人正確之防盜密碼,則該中央處理器⑺則該防盜 模組24中之鎖定/解鎖模組2料將手機解除鎖定,此時該 中央處理器10調用該防盜模組24中之加密,綁定模组施 ®將該防盜密碼將重新與更換後之sm卡數據進行綁定,隨 後手機進入後續正常操作過程。 步驟S4’如果用戶輸入之防盜密碼不正確時,該中央 處理器10調用該防盜模組24中之數據刪除模組246紀錄 上述操作數據’當經過—預設時間後(如24小時,也 據實際需要進行設定),如果用戶在這段時間内重新輸入了 正確之防盜密碼,則該中央處理器10則該防盜模組24 α中之鎖定/解鎖模組244將手機解除鎖定,此時該中央處理 ,ίο調用β亥防盜模組24中之加密/綁定模組24G將該防盜 达、馬重新與更換後之SIM卡數據進行鄉定,隨後手機 後續正常操作過程。 S5’如果用戶在該預設時間内沒有重新輸入正確 之防现畨碼,則該中央處理器10調用該防盜模組24中之 數據冊!l除模組246執行冊j除操作,即將手機存儲單元 中之用戶各種貧源數據進行刪除,並在刪除前將刪除之數 康透過網路運營商提供之附加服務傳輸到事先註冊之網路 硬碟或其他網路終端中’已備可以重新取回。如果用戶認 200947254 為手機上之各種資源數據不重要或其他原因也可設置不將 刪除之數據透過網路運營商提供之附加服務傳輸到事先註 冊之網路硬碟或其他網路終端中,可節省與網路 間產生之費用。 步驟S6,刪除數據後,該中央處理器1〇調用該防盜 ΟIf the two do not match, the central processor calls the lock/unlock module to lock the mobile terminal; when the mobile terminal replaces the user identification card and is locked, the password input window is popped up again, and the central processor calls the password comparison. The module determines whether the user inputs the anti-jinxiong, whether the code is correct, and if the user inputs the correct anti-theft, 'the central processor calls the lock/unlock module to unlock the mobile terminal, and the central processor calls the encryption/ The binding module re-binds the anti-theft password with the replaced user identification card data, and then the mobile terminal enters a subsequent normal operation process; if the anti-theft password input by the user is incorrect, the central processor uses the data to delete the mode. The group records the above operation data when a predetermined time is 6 200947254. 'Gu: If the user re-enters the correct anti-theft password during this time, the central processor calls the lock/unlock module to unlock the mobile terminal. = and the central processor calls the encryption/binding module to set the anti-theft password, the new and replaced user identification card data Binding, then the mobile terminal enters the subsequent normal operation process; and if the user does not re-enter the correct anti-theft pony within the preset time, the central processor calls the data deletion module to perform the deletion operation, © the mobile terminal is stored The user's various resource data in the unit is deleted. = Compared with the prior art, the mobile terminal sets the anti-k code through the password comparison module and binds it to the user identification card data of the owner, so that the user needs to log in when inserting other user identification cards. If the user does not re-enter the correct anti-theft password, the locking/unlocking module locks the mobile terminal, and after a predetermined time, the data deletion module performs a deletion operation, that is, the user in the mobile terminal memory. The various resource data are deleted, thereby avoiding the loss of the data stored by the user on the mobile terminal being stolen by the Q. [Embodiment] Referring to FIG. 1 and FIG. 2, a preferred embodiment of the mobile terminal with anti-theft function of the present invention is described by taking a mobile phone as an example, which includes a central processing unit 10, a storage unit 20, and a user identification card. A reading unit 3A, a keyboard 40, a monitor 50, and an auxiliary circuit and antenna (not shown) are provided. The storage unit 20 includes a register 22 and an anti-theft module 24 for handling anti-theft operations. The central processing unit 10 is connected to the storage unit 2A for calling data or programs of the storage unit for related processing. The user identification card 7 200947254 is connected to the central processing unit 10, and the user places a user identification card, such as a SIM (Subscriber Identity Module) card, so that the central processing unit 10 and the user identification card are provided. Communicate. The keyboard 40 is coupled to the central processing unit 10 for the user to input corresponding commands to the central processing unit 10 for corresponding processing. The monitor 50 is coupled to the central processor 10 for providing a user operating window. The anti-theft module 24 includes an encryption/binding module 240, a password matching module 242, a locking/unlocking module 244, a data deleting module 246, and a data reading module 248. Used to handle the anti-theft operation of the phone. The storage unit 20 is further configured to store various resource data of the machine owner. When the owner uses the mobile phone for the first time, a SIM card is inserted, and after the device is turned on, an anti-theft is set in the password input window popped up in the monitor 50 through the keyboard 40. The central processor 10 invokes the encryption/binding module 240 in the anti-theft module 24 to bind the anti-theft password to the SIM card data, and records the anti-piracy password in the register 22. With reference to FIG. 3, a preferred embodiment of the anti-theft function of the mobile terminal with the anti-theft function includes the following steps: Step S1: When the user is powered on again, the central processing unit 10 first calls the password ratio in the anti-theft module 24. The module 242 retrieves the anti-theft password from the register 22 and compares it with the SIM card data in the mobile phone. If the two match, the mobile phone enters a subsequent normal operation process. Step S2, if the two do not match (ie, the password is not matched when another SIM card is replaced), the central processing unit 10 calls the lock/unlock module 244 in the anti-theft 8 200947254 module 24 The phone is locked. Step S3 'When the mobile phone replacement SIM card is locked, the password input window is popped up again, and the central processing unit 10 calls the password comparison module 242 in the anti-theft module 24 to determine whether the anti-theft password input by the user is correct, if the user loses If the correct anti-theft password is used, the central processing unit (7) unlocks the mobile phone in the anti-theft module 24, and the central processing unit 10 calls the encryption in the anti-theft module 24, and binds The module will be re-attached to the replaced sm card data, and then the phone enters the subsequent normal operation. Step S4', if the anti-theft password input by the user is incorrect, the central processing unit 10 calls the data deletion module 246 in the anti-theft module 24 to record the operation data 'when the elapsed time is preset (eg, 24 hours, according to Actually, the setting needs to be made. If the user re-enters the correct anti-theft password during this time, the central processing unit 10 unlocks the mobile phone by the locking/unlocking module 244 in the anti-theft module 24α. The central processing, ίο calls the encryption/binding module 24G in the beta burglar anti-theft module 24 to re-establish the anti-theft, re-horse and the replaced SIM card data, and then the subsequent normal operation of the mobile phone. S5' If the user does not re-enter the correct anti-default weight within the preset time, the central processing unit 10 calls the data book in the anti-theft module 24! The user's various poor source data in the storage unit is deleted, and the deleted service is transmitted to the pre-registered network hard disk or other network terminal by the deleted service before the deletion. retrieve. If the user believes that 200947254 is not important for various resource data on the mobile phone or for other reasons, it can be set to not transfer the deleted data to the pre-registered network hard disk or other network terminal through the additional service provided by the network operator. Save money on the network. Step S6, after deleting the data, the central processing unit 1 calls the anti-theft device.

模組24中之數據讀取模組248讀取該更換後之SIM卡之 數據,並將該4數據透過網路運營商提供之附加服務傳輸 到事先註冊之網路硬碟或其他網路終端中,以便瞭解非法 用戶之SIM卡數據,從而可以給偵查部門提供線索。該步 驟S6也可設置在其他更換SIM卡後之步驟中或不進行設 置’具體可根據需要選擇。其中,該網路運營商提供之附 加服務是事先與該手機進行了綁定,並需網路運營商可以 提供該附加服務且與機主簽訂相關協定來實現,這樣不管 非法用戶使用何種㈣卡,機主料料過網路運營商提 供之附加服務得到非法用戶SIM上之相關數據。 由於該防盜密碼與SIM卡數據進行了較,只要不更 換SIM卡,則以後開機時均不需要重新輪入防盜密碼,這 對用戶來說十分方便。另外,用戶可以透過另—部手機或 聯㈣腦向網路運營商之用戶作㈣統平臺上對應輸入一 或—刪除指令,該手機透過天線純到該鎖卡指 後該中央處理器1G調用該鎖定/解鎖模組 或數據崎频248料失後之手機射或刪 早兀2〇中之用戶各種資源數據。 下面舉t例對該手機防盜方法加以說明’當該手機 200947254 參 .丟失後,機主首先可透過另一部手機或聯網電腦向網路運 •呂商之用戶作㈣統平臺上對應輸人—鎖卡指令,該手機 接收到該鎖卡指令後,㈣*失後之手機时鎖定;此時, 拿到該手機之非法用戶便不能用原來機主之⑽卡操作手 機’故其可能更換SIM卡來使用該手機,當其換上新之 SIM卡後’但更換後之謹卡並未與該防盜密碼進行鄉 定/故手機仍處於較狀態,所以非法用戶即使換上㈣ 卡後也無法使用手機;隨後,非法用戶還可能會透過其他 駭客軟體對手機進行解密,不過這時該防盜模組24中之刪 除/傳輸模組246已經紀錄了上述操作數據,當經過一預嗖 時間後將執行删除操作(機主也可用另一部手機遠端控制 進订刪除操作),即將手機存儲單元2()中 數據進行刪除,並在刪除前將該等數據透過網路運 =之附加服務傳輸到事先註冊之網路硬碟或其他網路終端 機主可以重新取回’從而使非法用戶也無法透過 骇客軟體盜取機主手機内之數據,進而避免了非法用戶可The data reading module 248 in the module 24 reads the data of the replaced SIM card, and transmits the 4 data to the pre-registered network hard disk or other network terminal through the additional service provided by the network operator. In order to understand the SIM card data of illegal users, it can provide clues to the investigation department. This step S6 can also be set in other steps after the SIM card is replaced or not set ‘specifically, it can be selected as needed. The additional service provided by the network operator is bound to the mobile phone in advance, and the network operator can provide the additional service and sign a related agreement with the owner, so that no matter what the illegal user uses (4) Card, the owner feeds the additional services provided by the network operator to obtain the relevant data on the illegal user SIM. Since the anti-theft password is compared with the SIM card data, as long as the SIM card is not replaced, it is not necessary to re-enter the anti-theft password after booting, which is very convenient for the user. In addition, the user can use the other mobile phone or the (4) brain to make a corresponding input or deletion command to the user of the network operator. The mobile phone transmits the antenna to the central processor 1G through the antenna. The lock/unlock module or the data packet of the data-sand frequency 248 is lost or the user's various resource data is deleted. Let's take a t-example to explain the anti-theft method of the mobile phone. 'When the mobile phone 200947254 is lost, the owner can first use the other mobile phone or networked computer to transport the network to the user of Lu Shang (4). - The lock card command, after the mobile phone receives the lock card command, (4) * the lost mobile phone is locked; at this time, the illegal user who gets the mobile phone cannot use the original (10) card to operate the mobile phone 'so it may be replaced SIM card to use the phone, when it is replaced with a new SIM card, but the replacement card does not match the anti-theft password / so the phone is still in a relatively state, so the illegal user even after replacing the (four) card The mobile phone cannot be used; subsequently, the illegal user may decrypt the mobile phone through other hacking software, but at this time, the deletion/transmission module 246 in the anti-theft module 24 has recorded the above operation data, after a predetermined time. The deletion operation will be performed (the owner can also use another mobile phone to remotely control the order deletion operation), that is, the data in the mobile phone storage unit 2 () is deleted, and the data is transmitted through the network before being deleted. If the additional service is transferred to the pre-registered network hard drive or other network terminal, the owner can retrieve it again, so that illegal users can not steal the data in the owner's mobile phone through the hacker software, thus avoiding illegal users. can

月色給合法機主帶來巨大之指生。LL aL V水Η大之相失。此外,如果防盜程式讀取 之非法用戶讀很有用的話,也可幫助偵查部門迅速破案。 ^上所述、’本發明符合發明專利要件,爰依法提出專 太^ ’以上所述者僅為本發明之較佳實施方式,舉 “本案L之人士,在爰依本發明精神所作之等效修 舞或變化’皆應涵蓋於以下之中請專利範圍内。 少 【圖式簡單說明】 圖1係本發明具防盜功能之移動終端較佳實施方式之 11 200947254 局部框圖。 . 圖2係圖1中防盜模組之框圖。 ’ 圖3係本發明具防盜功能之移動終端防盜方法較佳實 施方式之流程圖。 【主要元件符號說明】 中央處理器 10 存儲單元 20 寄存器 22 防盜模組 24 加密/綁定模組 240 密碼比對模組 242 鎖定/解鎖模組 244 數據刪除模組 246 數據讀取模組 248 用戶識別卡讀取單元 30 鍵盤 40 監視器 50 12The moonlight brings a huge finger to the legal owner. LL aL V is lost. In addition, if the illegal user reading of the anti-theft program is useful, it can also help the investigation department to quickly solve the case. ^The above description, 'the invention is in accordance with the requirements of the invention patents, and the above is based on the law. 'The above is only a preferred embodiment of the present invention, and the person in the case L is in the spirit of the invention. The effect of the dance or the change should be covered in the following patents. Less [Simplified illustration] Figure 1 is a partial block diagram of a preferred embodiment of the mobile terminal with anti-theft function of the present invention. 200947254 Partial block diagram. Figure 2 1 is a block diagram of a preferred embodiment of the mobile terminal anti-theft method with the anti-theft function of the present invention. [Main component symbol description] Central processing unit 10 storage unit 20 register 22 anti-theft mode Group 24 Encryption/Binding Module 240 Password Alignment Module 242 Lock/Unlock Module 244 Data Delete Module 246 Data Read Module 248 User Identification Card Read Unit 30 Keyboard 40 Monitor 50 12

Claims (1)

200947254 .十、申請專利範圍 1·-種具防盜功能之移動終端,其包括—中央處理器、一 存儲單元及—用於讀取用戶朗卡之用戶識別卡讀取單 凡,,良在於:該存儲單元包括一寄存器及一用於處 理防盜操作之防盜模組,該防盜模組包括一加密/綁定模 組、一密碼比對模組、一鎖定/解鎖模組及一數據刪除模 、,且,該中央處理器可調用該加密/綁定模組將一防盜密碼 β與該用戶識別卡數據進行綁定,並將該防盜密碼紀錄於 該寄存器中;該中央處理器可調用該密碼比對模組從該 ,存器中取出該防盜密碼並將其與該用戶識別卡數據進 行t對;該中央處理器可調用該鎖定/解鎖模組將該移動 終端鎖定或解除鎖定;該中央處理器可調用該數據刪除 模組執行刪除操作。 .如申研專利範圍第1項所述之具防盜功能之移動終端, ❹ 、中”亥中央處理器還可在該數據刪除模組執行刪除操作 後將刪除之數據傳輸到網路硬碟中。 .如申明專利範圍第1項所述之具防盜功能之移動終端, 其中該防盜模組還包括一數據讀取模組,該中央處理器 可調用該數據讀取模組讀取該用戶識別卡之數據,並將 該等數據傳輸到網路硬碟中。 4. 如申請專利範圍第1項所述之具防盜功能之移動終端, 其中該移動終端為一手機。 5. 如申請專利範圍第1項所述之具防盜功能之移動終端, 其中該用戶設別卡為一 SIM卡。 13 200947254 6· 一種應用於申請糞剎玆閣# .•法,㈣訂^移祕端之㈣方 ’該中央處理器調用該密碼 益密職料與料終心出該防 二果兩者匹配則移動終端 =比 ❹ ^::财央處理咖_解=將 中H鎖定後’再次彈出密碼輸入 之防盜調碼比對模組判斷用戶輸人 確如果用戶輸入正確之防盜穿踽, 鎖mu調用該鎖定/解鎖模組將移動終端解除 竭重新與;密 終端進入後續正常二物進仃綁定,隨後移動 如=戶輪人之防盜料不正確時,該中央處理器調用該 ^據刪除模組紀錄上述操作數據,當經過一預設時間 後,如果用戶在這段時間内重新輸入了正確之防盜密 码’則該中央處理H則該鎖定/解鎖模組將移動終端解 =鎖定’且該中央處理器調用該加密/較模組將該防盜 密碼將重新與更換後之用戶識別卡數據進行綁定,隨後 移動終端進入後續正常操作過程;及 如果用戶在該預設時間内沒有重新輸入正確之防盜密碼, 則該中央處理器調用該數據刪除模組執行刪除操作,即 將移動終端存儲單元中之用戶各種資源數據進行刪除。 200947254 模4且^利祀圍6項所述之防盜方法,其中該數據刪除 ^仃刪除操作前還包括如下步驟·該中央處理器調 R /二據刪除模組將刪除之數據傳輸到網路硬碟中。 吻專利範圍6項所述之防盜方法,其中該防盜模組 、L括-數據讀取触,在用戶識別卡更換後還包括如 下步驟·該中央處理器調用該數據讀取模組讀取該更換 後之用戶識別卡之數據,並將該等數據傳輸到網路硬碟 〇 中。 9·如申請專利範圍6項所述之防盜方法,其中用戶可透過 另一部移動終端或聯網電腦向網路運營商之用戶作業系 統平臺上對應輸入一鎖卡指令,該移動終端接收到該鎖 卡指令後,該中央處理器調用該鎖定/解鎖模組將該移動 終端鎖定。 1〇’如申清專利範圍6項所述之防盜方法,其中用戶可透過 另一部移動終端或聯網電腦向網路運營商之用戶作業系 統平臺上對應輸入一刪除指令’該移動終端接收到該刪 除指令後,該中央處理器調用該數據刪除模組刪除該存 儲單元中之用戶各種資源數據。 15200947254. X. Patent Application Scope 1. A mobile terminal with anti-theft function, which includes a central processing unit, a storage unit and a user identification card for reading the user's Langka, which is: The storage unit includes a register and an anti-theft module for processing the anti-theft operation. The anti-theft module includes an encryption/binding module, a password comparison module, a lock/unlock module, and a data deletion module. And the central processor may invoke the encryption/binding module to bind an anti-theft password β with the user identification card data, and record the anti-theft password in the register; the central processor may invoke the password The comparison module takes the anti-theft password from the storage and performs t-pairing with the user identification card data; the central processor can call the locking/unlocking module to lock or unlock the mobile terminal; The processor can call the data deletion module to perform a delete operation. If the mobile terminal with the anti-theft function described in the first paragraph of the patent research scope, the central processing unit can transmit the deleted data to the network hard disk after the data deletion module performs the deletion operation. The mobile terminal with the anti-theft function according to claim 1, wherein the anti-theft module further comprises a data reading module, wherein the central processing unit can call the data reading module to read the user identification. The data of the card is transmitted to the network hard disk. 4. The mobile terminal with anti-theft function as described in claim 1 wherein the mobile terminal is a mobile phone. The mobile terminal with the anti-theft function described in Item 1, wherein the user setting card is a SIM card. 13 200947254 6· A method applied to the application of the feces of the Zizzi #.•法, (4) the order of the secret end (4) 'The central processor calls the password to benefit the secret material and the material is finally out of the defense. If the two match, then the mobile terminal = ❹ ^:: The central bank handles the coffee _ solution = after the H lock, 'pops the password again. Anti-theft code matching module If the user inputs the correct anti-theft, the lock mu calls the lock/unlock module to deactivate the mobile terminal; the secret terminal enters the subsequent normal two-in-one binding, and then moves as = When the anti-theft material is incorrect, the central processing unit calls the data deletion module to record the operation data, and after a predetermined time, if the user re-enters the correct anti-theft password during the period, the central processing H, the locking/unlocking module unlocks the mobile terminal and the central processor calls the encryption/comparison module to bind the anti-theft password to the replaced user identification card data, and then the mobile terminal enters the follow-up The normal operation process; and if the user does not re-enter the correct anti-theft password within the preset time, the central processing unit calls the data deletion module to perform a deletion operation, that is, deleting various resource data of the user in the storage unit of the mobile terminal. 200947254 modulo 4 and ^ 祀 祀 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 Step: The central processing unit adjusts the R/two data deletion module to transmit the deleted data to the network hard disk. The anti-theft method described in the patent scope of the invention, wherein the anti-theft module, the L-data reading touch After the user identification card is replaced, the following steps are further included: the central processing unit calls the data reading module to read the data of the replaced user identification card, and transmits the data to the network hard disk. The anti-theft method of claim 6, wherein the user can input a lock card instruction to the network operator's user operating system platform through another mobile terminal or a networked computer, and the mobile terminal receives the lock After the card command, the central processor calls the lock/unlock module to lock the mobile terminal. 1〇'The anti-theft method described in the patent scope of claim 6, wherein the user can input a delete command to the network operator's user operating system platform through another mobile terminal or a networked computer. After the deletion instruction, the central processing unit calls the data deletion module to delete various resource data of the user in the storage unit. 15
TW97117164A 2008-05-09 2008-05-09 Mobile termination having anti-theft function and anti-theft method thereof TWI393022B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97117164A TWI393022B (en) 2008-05-09 2008-05-09 Mobile termination having anti-theft function and anti-theft method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97117164A TWI393022B (en) 2008-05-09 2008-05-09 Mobile termination having anti-theft function and anti-theft method thereof

Publications (2)

Publication Number Publication Date
TW200947254A true TW200947254A (en) 2009-11-16
TWI393022B TWI393022B (en) 2013-04-11

Family

ID=44870275

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97117164A TWI393022B (en) 2008-05-09 2008-05-09 Mobile termination having anti-theft function and anti-theft method thereof

Country Status (1)

Country Link
TW (1) TWI393022B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6662023B1 (en) * 2000-07-06 2003-12-09 Nokia Mobile Phones Ltd. Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused
TWI271992B (en) * 2004-07-28 2007-01-21 Mediatek Inc Mobile communication apparatus having anti-theft and auto-notification functions and method of operating the same
US20080014990A1 (en) * 2005-07-25 2008-01-17 Pixtel Media Technology (P) Ltd. Method of locating a mobile communication system for providing anti theft and data protection during successive boot-up procedure
TWI325715B (en) * 2006-07-17 2010-06-01 Inventec Appliances Corp Method of retrieving and encrypting data for mobile communication apparatus

Also Published As

Publication number Publication date
TWI393022B (en) 2013-04-11

Similar Documents

Publication Publication Date Title
CN101568119A (en) Mobile terminal with antitheft function and antitheft method thereof
JP3859450B2 (en) Secret information management system and information terminal
CN102693381B (en) Method, device and system for anti-theft of portable computer equipment
US8364952B2 (en) Methods and system for a key recovery plan
US10440013B2 (en) Method for using and maintaining user data stored on a smart card
US20060206720A1 (en) Method, program and system for limiting I/O access of client
CA2665961C (en) Method and system for delivering a command to a mobile device
US20130166920A1 (en) Mobile data vault
EP2798565A2 (en) Secure user authentication for bluetooth enabled computer storage devices
US8225386B1 (en) Personalizing an anonymous multi-application smart card by an end-user
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN112673600A (en) Multi-security authentication system and method between mobile phone terminal and IoT (Internet of things) equipment based on block chain
CN101815292B (en) Device and method for protecting data of mobile terminal
WO2010060242A1 (en) An authentication method for the mobile terminal and a system thereof
CN102521169B (en) Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk
US8152074B1 (en) Method for preparing by a smart card issuer an anonymous smart card and resulting structure
WO2010133108A1 (en) Method, system and mobile terminal for retrieving flash data of a mobile terminal
US8555376B2 (en) Method and system for supporting portable desktop with enhanced functionality
JP4303952B2 (en) Multiple authentication system, computer program, and multiple authentication method
CN102970273A (en) USB flash disk with command and capable of being unlocked through short messages
TW200947254A (en) Mobile termination having anti-theft function and anti-theft method thereof
CN201233601Y (en) File concealment system and apparatus based on USB equipment
CN100449990C (en) User centrificating apparatus and method for fixed network terminal
WO2017197689A1 (en) Sim card processing method and apparatus, terminal, and esam chip
CN110191464B (en) Method and system for preventing SIM card from being stolen

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees