TWI393022B - Mobile termination having anti-theft function and anti-theft method thereof - Google Patents

Mobile termination having anti-theft function and anti-theft method thereof Download PDF

Info

Publication number
TWI393022B
TWI393022B TW97117164A TW97117164A TWI393022B TW I393022 B TWI393022 B TW I393022B TW 97117164 A TW97117164 A TW 97117164A TW 97117164 A TW97117164 A TW 97117164A TW I393022 B TWI393022 B TW I393022B
Authority
TW
Taiwan
Prior art keywords
theft
module
password
mobile terminal
data
Prior art date
Application number
TW97117164A
Other languages
Chinese (zh)
Other versions
TW200947254A (en
Inventor
Young-Way Liu
Original Assignee
Hon Hai Prec Ind Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hon Hai Prec Ind Co Ltd filed Critical Hon Hai Prec Ind Co Ltd
Priority to TW97117164A priority Critical patent/TWI393022B/en
Publication of TW200947254A publication Critical patent/TW200947254A/en
Application granted granted Critical
Publication of TWI393022B publication Critical patent/TWI393022B/en

Links

Landscapes

  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Description

具防盜功能之移動終端及其防盜方法 Mobile terminal with anti-theft function and anti-theft method thereof

本發明係關於一種移動終端,尤指一種具防盜功能之移動終端及其防盜方法。 The invention relates to a mobile terminal, in particular to a mobile terminal with anti-theft function and an anti-theft method thereof.

隨著電子技術、電腦技術之不斷發展,手機之硬體性能及軟體功能得到了較大提升,已經成為了人們生活中之得力助手,手機上方便地存儲有大量之隱私數據,如聯繫電話、通訊記錄、備忘錄,或者與遊戲供應商、增值服務供應商之帳號、密碼等實施綁定,或者制定了不限制時間、地域之呼叫和接入業務,或者具有社區門口、樓門、家門、辦公室門、保險櫃、汽車、電腦、移動硬碟之“門禁”開啟功能,一旦手機被盜或者丟失,非法用戶可能給合法用戶帶來巨大損失。 With the continuous development of electronic technology and computer technology, the hardware performance and software functions of mobile phones have been greatly improved, and it has become a powerful assistant in people's lives. The mobile phone conveniently stores a large amount of private data, such as contact telephone numbers. Communication records, memos, or bindings with game providers, value-added service providers' account numbers, passwords, etc., or no-time, regional call and access services, or community gates, doors, doors, offices The "access control" function of the door, safe, car, computer, and mobile hard disk can cause huge losses to legitimate users once the mobile phone is stolen or lost.

目前,最常用之防盜方法是用戶透過設置開機密碼來防止手機被盜換卡後之換卡使用。但對於這種防盜方法,用戶每次開機都必須輸入開機密碼,使得操作極為不便,很多用戶因此就不會去設置開機密碼,致使手機被盜後,還可以被換卡使用。而且這種防盜方法也無法阻止非法用戶使用駭客軟體破解密碼後盜用用戶手機上之數據。 At present, the most commonly used anti-theft method is to prevent the user from changing the card after the card is stolen by setting the power-on password. However, for this anti-theft method, the user must input the power-on password every time the user turns on, which makes the operation extremely inconvenient, and many users will not set the power-on password, so that the phone can be used after being stolen. Moreover, this anti-theft method can not prevent illegal users from using the hacker software to crack the password and then steal the data on the user's mobile phone.

鑒於以上內容,有必要提供一種具防盜功能之移動終端及其防盜方法,以避免用戶存儲於移動終端上之數據被盜用而帶來損失。 In view of the above, it is necessary to provide a mobile terminal with anti-theft function and an anti-theft method thereof to avoid loss of data stolen by the user stored on the mobile terminal.

一種具防盜功能之移動終端,其包括一中央處理器、一存儲單元及一用於讀取用戶識別卡之用戶識別卡讀取單元,該存儲單元包括一寄存器及一用於處理防盜操作之防盜模組,該防盜模組包括一加密/綁定模組、一密碼比對模組、一鎖定/解鎖模組及一數據刪除模組,該中央處理器可調用該加密/綁定模組將一防盜密碼與該用戶識別卡數據進行綁定,並將該防盜密碼紀錄於該寄存器中;該中央處理器可調用該密碼比對模組從該寄存器中取出該防盜密碼並將其與該用戶識別卡數據進行比對;該中央處理器可調用該鎖定/解鎖模組將該移動終端鎖定或解除鎖定;該中央處理器可調用該數據刪除模組執行刪除操作,當第一次使用該移動終端時插入一用戶識別卡,開機後透過彈出之密碼輸入視窗設置一防盜密碼,該中央處理器調用該加密/綁定模組將該防盜密碼與該用戶識別卡數據進行綁定,並將該防盜密碼紀錄於該寄存器中,當該移動終端再次開機時,該中央處理器調用該密碼比對模組從該寄存器中取出該防盜密碼並將其與移動終端內之用戶識別卡數據進行比對,在兩者不匹配時調用該鎖定/解鎖模組將移動終端進行鎖定,當移動終端更換用戶識別卡被鎖定後,再次彈出密碼輸入視窗,該中央處理器調用該密碼比對模組判斷用戶輸入之防盜密碼是否正確,在用戶輸入正確之防盜密碼時,該中央處理器調用該鎖定/解鎖模組將移動終端解除鎖定,且該中央處理器調用該加密/綁定模組將該防盜密碼重新與更換後之用戶識別卡數據進行綁定;在輸入之防盜密碼不正確時,該中央處理器調用該數據刪除模組紀錄上述操作數據,若在一預設時間內輸入了正確之防盜密碼,該中央處理器調用該鎖定/解鎖模組將移動終端解除鎖定,且該中央處理器調用該加密/綁定模組將該防盜密碼將重新與更換後之用戶識別卡數據進行綁定,如在該預設時間內沒有輸入正確之防盜密碼,該中央處理器調用該數據刪除模組將該移動終端存儲單元中之用戶資源數據刪除。 A mobile terminal with anti-theft function includes a central processing unit, a storage unit and a user identification card reading unit for reading a user identification card, the storage unit including a register and an anti-theft for handling anti-theft operation The module includes an encryption/binding module, a password comparison module, a lock/unlock module, and a data deletion module, and the central processor can invoke the encryption/binding module to An anti-theft password is bound to the user identification card data, and the anti-theft password is recorded in the register; the central processor can call the password comparison module to take the anti-theft password from the register and associate it with the user Identifying the card data for comparison; the central processor may call the lock/unlock module to lock or unlock the mobile terminal; the central processor may invoke the data deletion module to perform a delete operation when the mobile phone is used for the first time Inserting a user identification card when the terminal is turned on, and setting an anti-theft password through the pop-up password input window after booting, the central processor calls the encryption/binding module to activate the anti-theft password. The user identification card data is bound, and the anti-theft password is recorded in the register. When the mobile terminal is powered on again, the central processor calls the password comparison module to take the anti-theft password from the register and Comparing with the user identification card data in the mobile terminal, calling the lock/unlock module to lock the mobile terminal when the two do not match, and popping up the password input window again after the mobile terminal replaces the user identification card is locked, The central processor calls the password comparison module to determine whether the anti-theft password input by the user is correct. When the user inputs the correct anti-theft password, the central processor calls the lock/unlock module to unlock the mobile terminal, and the central processor Invoking the encryption/binding module to re-bind the anti-theft password with the replaced user identification card data; when the input anti-theft password is incorrect, the central processing unit calls the data deletion module to record the operation data, if The correct anti-theft password is entered within a preset time, and the central processor calls the lock/unlock module to move the end Unlocking, and the central processor calls the encryption/binding module to bind the anti-theft password to the replaced user identification card data. If the correct anti-theft password is not input within the preset time, the central The processor calls the data deletion module to delete the user resource data in the mobile terminal storage unit.

一種具防盜功能之移動終端防盜方法,包括以下步驟: A mobile terminal anti-theft method with anti-theft function includes the following steps:

當第一次使用該移動終端時插入一用戶識別卡,開機後透過彈出之密碼輸入視窗設置一防盜密碼,該中央處理器調用該加密/綁定模組將該防盜密碼與該用戶識別卡數據進行綁定,並將該防盜密碼紀錄於該寄存器中;該中央處理器調用該密碼比對模組從該寄存器中取出該防盜密碼並將其與移動終端內之用戶識別卡數據進行比對,如果兩者匹配則移動終端進入後續正常操作過程;如果兩者不匹配,則該中央處理器調用該鎖定/解鎖模組將移動終端進行鎖定;當移動終端更換用戶識別卡被鎖定後,再次彈出密碼輸入視窗,該中央處理器調用該密碼比對模組判斷用戶輸入之防盜密碼是否正確,如果用戶輸入正確之防盜密碼,則該中央處理器調用該鎖定/解鎖模組將移動終端解除鎖定,且該中央處理器調用該加密/綁定模組將該防盜密碼重新與更換後之用戶識別卡數據進行綁定,隨後移動終端進入後續正常操作過程;如果用戶輸入之防盜密碼不正確時,該中央處理器調用該數據刪除模組紀錄上述操作數據,當經過一預設時間後,如果用戶在這段時間內重新輸入了正確之防盜密碼,則該中央處理器調用該鎖定/解鎖模組將移動終端解除鎖定,且該中央處理器調用該加密/綁定模組將該防盜密碼將重新與更換後之用戶識別卡數據進行綁定,隨後移動終端進入後續正常操作過程;及如果用戶在該預設時間內沒有重新輸入正確之防盜密碼,則該中央處理器調用該數據刪除模組執行刪除操作,即將移動終端存儲單元中之用戶各種資源數據進行刪除。 When the mobile terminal is used for the first time, a user identification card is inserted, and after the power is turned on, an anti-theft password is set through the pop-up password input window, and the central processor calls the encryption/binding module to the anti-theft password and the user identification card data. Binding, and recording the anti-theft password in the register; the central processor calls the password comparison module to take the anti-theft password from the register and compare it with the user identification card data in the mobile terminal, If the two match, the mobile terminal enters a subsequent normal operation process; if the two do not match, the central processor calls the lock/unlock module to lock the mobile terminal; when the mobile terminal replaces the user identification card and is locked, the second terminal pops up again. The password input window, the central processor calls the password comparison module to determine whether the anti-theft password input by the user is correct. If the user inputs the correct anti-theft password, the central processor calls the lock/unlock module to unlock the mobile terminal. And the central processor calls the encryption/binding module to re-identify the anti-theft password with the replaced user. The card data is bound, and then the mobile terminal enters a subsequent normal operation process; if the anti-theft password input by the user is incorrect, the central processor calls the data deletion module to record the operation data, and after a preset time, if the user After re-entering the correct anti-theft password during this time, the central processor calls the lock/unlock module to unlock the mobile terminal, and the central processor calls the encryption/binding module to re-enable the anti-theft password. Binding with the replaced user identification card data, and then the mobile terminal enters a subsequent normal operation process; and if the user does not re-enter the correct anti-theft password within the preset time, the central processor calls the data deletion module to execute The deletion operation deletes various resource data of the user in the storage unit of the mobile terminal.

相較習知技術,該移動終端透過該密碼比對模組設置防盜密碼並使其與機主之用戶識別卡數據進行綁定,以使用戶在插入其他用戶識別卡時需要密 碼登錄,如果用戶沒有重新輸入正確之防盜密碼,則該鎖定/解鎖模組將該移動終端鎖定,並且當經過一預設時間後,該數據刪除模組將執行刪除操作,即將移動終端記憶體中之用戶各種資源數據進行刪除,從而避免了用戶存儲於移動終端上之數據被盜用而帶來損失。 Compared with the prior art, the mobile terminal sets an anti-theft password through the password comparison module and binds it to the user identification card data of the owner, so that the user needs to be dense when inserting other user identification cards. Code registration, if the user does not re-enter the correct anti-theft password, the lock/unlock module locks the mobile terminal, and after a predetermined time, the data deletion module will perform a delete operation, that is, the mobile terminal memory The user's various resource data is deleted, thereby avoiding the loss of the data stored by the user on the mobile terminal being stolen.

10‧‧‧中央處理器 10‧‧‧Central processor

20‧‧‧存儲單元 20‧‧‧ storage unit

22‧‧‧寄存器 22‧‧‧ Register

24‧‧‧防盜模組 24‧‧‧Anti-theft module

240‧‧‧加密/綁定模組 240‧‧‧Encryption/Binding Module

242‧‧‧密碼比對模組 242‧‧‧Password comparison module

244‧‧‧鎖定/解鎖模組 244‧‧‧Lock/unlock module

246‧‧‧數據刪除模組 246‧‧‧Data Delete Module

248‧‧‧數據讀取模組 248‧‧‧Data reading module

30‧‧‧用戶識別卡讀取單元 30‧‧‧User Identification Card Reading Unit

40‧‧‧鍵盤 40‧‧‧ keyboard

50‧‧‧監視器 50‧‧‧ monitor

圖1係本發明具防盜功能之移動終端較佳實施方式之局部框圖。 1 is a partial block diagram of a preferred embodiment of a mobile terminal with anti-theft function according to the present invention.

圖2係圖1中防盜模組之框圖。 2 is a block diagram of the anti-theft module of FIG.

圖3係本發明具防盜功能之移動終端防盜方法較佳實施方式之流程圖。 3 is a flow chart of a preferred embodiment of a mobile terminal anti-theft method with anti-theft function according to the present invention.

請參考圖1及圖2,本發明具防盜功能之移動終端之較佳實施方式以一手機為例加以說明,其包括一中央處理器10、一存儲單元20、一用戶識別卡讀取單元30、一鍵盤40、一監視器50以及輔助電路和天線(未示出)。該存儲單元20包括一寄存器22及一用於處理防盜操作之防盜模組24。該中央處理器10與該存儲單元20相連,用於調用該存儲單元之數據或程式進行相關處理。該用戶識別卡讀取單元30與該中央處理器10相連,用戶放置用戶識別卡,如SIM(Subscriber Identity Module,用戶數據識別模組)卡,以便該中央處理器10與用戶識別卡進行通訊。該鍵盤40與該中央處理器10相連,以便用戶輸入相應指令給該中央處理器10進行相應處理。該監視器50與該中央處理器10相連,用於提供用戶操作視窗。 Referring to FIG. 1 and FIG. 2, a preferred embodiment of the mobile terminal with the anti-theft function of the present invention is described by taking a mobile phone as an example, and includes a central processing unit 10, a storage unit 20, and a user identification card reading unit 30. A keyboard 40, a monitor 50, and auxiliary circuits and antennas (not shown). The storage unit 20 includes a register 22 and an anti-theft module 24 for handling anti-theft operations. The central processing unit 10 is connected to the storage unit 20 for invoking data or a program of the storage unit for related processing. The user identification card reading unit 30 is connected to the central processing unit 10. The user places a user identification card, such as a SIM (Subscriber Identity Module) card, so that the central processing unit 10 communicates with the user identification card. The keyboard 40 is coupled to the central processing unit 10 for the user to input corresponding commands to the central processing unit 10 for corresponding processing. The monitor 50 is coupled to the central processing unit 10 for providing a user operating window.

該防盜模組24包括一加密/綁定模組240、一密碼比對模組242、一鎖定/解鎖模組244、一數據刪除模組246及一數據讀取模組248,以上模組用來處理該手機之防盜操作。 The anti-theft module 24 includes an encryption/binding module 240, a password comparison module 242, a lock/unlock module 244, a data deletion module 246, and a data reading module 248. To handle the anti-theft operation of the phone.

該存儲單元20還用於存儲機主之各種資源數據,當機主第一次使用該手機 時插入一SIM卡,開機後透過該鍵盤40在監視器50內彈出之密碼輸入視窗中設置一防盜密碼,該中央處理器10調用該防盜模組24中之加密/綁定模組240將該防盜密碼與該SIM卡數據進行綁定,並將該防盜密碼紀錄於該寄存器22中。 The storage unit 20 is further configured to store various resource data of the owner, when the owner uses the mobile phone for the first time. When a SIM card is inserted, an anti-theft password is set in the password input window popped up in the monitor 50 through the keyboard 40, and the central processing unit 10 calls the encryption/binding module 240 in the anti-theft module 24 to The anti-theft password is bound to the SIM card data, and the anti-theft password is recorded in the register 22.

請繼續參考圖3,本發明具防盜功能之移動終端防盜方法之較佳實施方式包括以下步驟: With continued reference to FIG. 3, a preferred embodiment of the anti-theft method for a mobile terminal with anti-theft function includes the following steps:

步驟S1,當用戶再次開機時,該中央處理器10首先調用該防盜模組24中之密碼比對模組242從該寄存器22中取出該防盜密碼並將其與手機內之SIM卡數據進行比對,如果兩者匹配則手機進入後續正常操作過程。 In step S1, when the user is powered on again, the central processing unit 10 first calls the password comparison module 242 in the anti-theft module 24 to retrieve the anti-theft password from the register 22 and compare it with the SIM card data in the mobile phone. Yes, if the two match, the phone enters the subsequent normal operation process.

步驟S2,如果兩者不匹配(即此時換上了另一個SIM卡而導致之密碼不匹配),則該中央處理器10調用該防盜模組24中之鎖定/解鎖模組244將手機進行鎖定。 In step S2, if the two do not match (ie, the password is not matched when another SIM card is replaced), the central processing unit 10 calls the lock/unlock module 244 in the anti-theft module 24 to perform the mobile phone. locking.

步驟S3,當手機更換SIM卡被鎖定後,再次彈出密碼輸入視窗,該中央處理器10調用該防盜模組24中之密碼比對模組242判斷用戶輸入之防盜密碼是否正確,如果用戶輸入正確之防盜密碼,則該中央處理器10調用該防盜模組24中之鎖定/解鎖模組244將手機解除鎖定,此時該中央處理器10調用該防盜模組24中之加密/綁定模組240將該防盜密碼將重新與更換後之SIM卡數據進行綁定,隨後手機進入後續正常操作過程。 Step S3, after the mobile phone replacement SIM card is locked, the password input window is popped up again, and the central processing unit 10 calls the password comparison module 242 in the anti-theft module 24 to determine whether the anti-theft password input by the user is correct, if the user input is correct. The anti-theft password, the central processing unit 10 calls the lock/unlock module 244 in the anti-theft module 24 to unlock the mobile phone. At this time, the central processing unit 10 calls the encryption/binding module in the anti-theft module 24. 240 will bind the anti-theft password to the replaced SIM card data, and then the mobile phone enters the subsequent normal operation process.

步驟S4,如果用戶輸入之防盜密碼不正確時,該中央處理器10調用該防盜模組24中之數據刪除模組246紀錄上述操作數據,當經過一預設時間後(如24小時,也可根據實際需要進行設定),如果用戶在這段時間內重新輸入了正確之防盜密碼,則該中央處理器10調用該防盜模組24中之鎖定/解鎖模組244將手機解除鎖定,此時該中央處理器10調用該防盜模組24中之加密/ 綁定模組240將該防盜密碼重新與更換後之SIM卡數據進行綁定,隨後手機進入後續正常操作過程。 In step S4, if the anti-theft password input by the user is incorrect, the central processing unit 10 calls the data deletion module 246 in the anti-theft module 24 to record the operation data, and after a predetermined period of time (for example, 24 hours) According to actual needs, if the user re-enters the correct anti-theft password during this time, the central processing unit 10 calls the lock/unlock module 244 in the anti-theft module 24 to unlock the mobile phone. The central processing unit 10 calls the encryption in the anti-theft module 24 The binding module 240 re-binds the anti-theft password with the replaced SIM card data, and then the mobile phone enters a subsequent normal operation process.

步驟S5,如果用戶在該預設時間內沒有重新輸入正確之防盜密碼,則該中央處理器10調用該防盜模組24中之數據刪除模組246執行刪除操作,即將手機存儲單元20中之用戶各種資源數據進行刪除,並在刪除前將刪除之數據透過網路運營商提供之附加服務傳輸到事先註冊之網路硬碟或其他網路終端中,以備可以重新取回。如果用戶認為手機上之各種資源數據不重要或其他原因也可設置不將刪除之數據透過網路運營商提供之附加服務傳輸到事先註冊之網路硬碟或其他網路終端中,可節省與網路運營商之間產生之費用。 In step S5, if the user does not re-enter the correct anti-theft password within the preset time, the central processing unit 10 calls the data deletion module 246 in the anti-theft module 24 to perform a deletion operation, that is, the user in the mobile phone storage unit 20. The various resource data is deleted, and the deleted data is transmitted to the pre-registered network hard disk or other network terminal through the additional service provided by the network operator before being deleted, so that it can be retrieved. If the user thinks that the various resource data on the mobile phone is not important or for other reasons, it can be saved without transferring the deleted data to the pre-registered network hard disk or other network terminal through the additional service provided by the network operator. The cost incurred between network operators.

步驟S6,刪除數據後,該中央處理器10調用該防盜模組24中之數據讀取模組248讀取該更換後之SIM卡之數據,並將該等數據透過網路運營商提供之附加服務傳輸到事先註冊之網路硬碟或其他網路終端中,以便瞭解非法用戶之SIM卡數據,從而可以給偵查部門提供線索。該步驟S6也可設置在其他更換SIM卡後之步驟中或不進行設置,具體可根據需要選擇。其中,該網路運營商提供之附加服務是事先與該手機進行了綁定,並需網路運營商可以提供該附加服務且與機主簽訂相關協定來實現,這樣不管非法用戶使用何種SIM卡,機主都可以透過網路運營商提供之附加服務得到非法用戶SIM上之相關數據。 Step S6, after deleting the data, the central processing unit 10 calls the data reading module 248 in the anti-theft module 24 to read the data of the replaced SIM card, and the data is provided by the network operator. The service is transmitted to a pre-registered network hard drive or other network terminal to learn the illegal user's SIM card data, so that the investigation department can be provided with clues. The step S6 can also be set in other steps after the SIM card is replaced or not, and can be selected according to requirements. The additional service provided by the network operator is bound to the mobile phone in advance, and the network operator can provide the additional service and sign a related agreement with the owner, so that no matter which SIM is used by the illegal user. Cards, the owner can obtain the relevant data on the illegal user SIM through the additional services provided by the network operator.

由於該防盜密碼與SIM卡數據進行了綁定,只要不更換SIM卡,則以後開機時均不需要重新輸入防盜密碼,這對用戶來說十分方便。另外,用戶可以透過另一部手機或聯網電腦向網路運營商之用戶作業系統平臺上對應輸入一鎖卡指令或一刪除指令,該手機透過天線接收到該鎖卡指令或刪除指令後,該中央處理器10調用該鎖定/解鎖模組244或數據刪除模組246將丟失 後之手機鎖定或刪除存儲單元20中之用戶各種資源數據。 Since the anti-theft password is bound to the SIM card data, as long as the SIM card is not replaced, it is not necessary to re-enter the anti-theft password after booting, which is very convenient for the user. In addition, the user can input a lock card command or a delete command to the network operator's user operating system platform through another mobile phone or a networked computer. After the mobile phone receives the lock card command or deletes the command through the antenna, the mobile phone The central processor 10 calls the lock/unlock module 244 or the data deletion module 246 will be lost. The latter mobile phone locks or deletes various resource data of the user in the storage unit 20.

下面舉一實例對該手機防盜方法加以說明,當該手機丟失後,機主首先可透過另一部手機或聯網電腦向網路運營商之用戶作業系統平臺上對應輸入一鎖卡指令,該手機接收到該鎖卡指令後,即將丟失後之手機進行鎖定;此時,拿到該手機之非法用戶便不能用原來機主之SIM卡操作手機,故其可能更換SIM卡來使用該手機,當其換上新之SIM卡後,但更換後之SIM卡並未與該防盜密碼進行綁定,故手機仍處於鎖定狀態,所以非法用戶即使換上SIM卡後也無法使用手機;隨後,非法用戶還可能會透過其他駭客軟體對手機進行解密,不過這時該防盜模組24中之數據刪除模組246已經紀錄了上述操作數據,當經過一預設時間後將執行刪除操作(機主也可用另一部手機遠端控制進行刪除操作),即將手機存儲單元20中之機主各種資源數據進行刪除,並在刪除前將該等數據透過網路運營商提供之附加服務傳輸到事先註冊之網路硬碟或其他網路終端中,已備機主可以重新取回,從而使非法用戶也無法透過駭客軟體盜取機主手機內之數據,進而避免了非法用戶可能給合法機主帶來巨大之損失。此外,如果防盜程式讀取之非法用戶SIM很有用的話,也可幫助偵查部門迅速破案。 The following is an example to illustrate the anti-theft method of the mobile phone. When the mobile phone is lost, the owner can first input a lock card instruction to the network operator's user operating system platform through another mobile phone or a networked computer. After receiving the lock card command, the lost mobile phone is locked; at this time, the illegal user who gets the mobile phone cannot use the SIM card of the original owner to operate the mobile phone, so it may replace the SIM card to use the mobile phone. After replacing the new SIM card, the replaced SIM card is not bound to the anti-theft password, so the mobile phone is still locked, so the illegal user cannot use the mobile phone even after replacing the SIM card; subsequently, the illegal user It is also possible to decrypt the mobile phone through other hacking software, but at this time, the data deletion module 246 in the anti-theft module 24 has recorded the above operation data, and after a predetermined time, the deletion operation will be performed (the owner can also use Another remote control of the mobile phone performs the deletion operation, that is, the various resource data of the owner in the mobile phone storage unit 20 is deleted, and the data is transmitted before being deleted. The additional services provided by the road operator are transmitted to the pre-registered network hard disk or other network terminal, and the backup machine owner can retrieve it again, so that the illegal user can not steal the data in the owner's mobile phone through the hacker software. In order to avoid illegal users may bring huge losses to legitimate owners. In addition, if the anti-theft program reads the illegal user SIM is very useful, it can also help the investigation department to quickly solve the case.

綜上所述,本發明符合發明專利要件,爰依法提出專利申請。惟,以上所述者僅為本發明之較佳實施方式,舉凡熟悉本案技藝之人士,在爰依本發明精神所作之等效修飾或變化,皆應涵蓋於以下之申請專利範圍內。 In summary, the present invention complies with the requirements of the invention patent and submits a patent application according to law. The above description is only the preferred embodiment of the present invention, and equivalent modifications or variations made by those skilled in the art will be included in the following claims.

24‧‧‧防盜模組 24‧‧‧Anti-theft module

240‧‧‧加密/綁定模組 240‧‧‧Encryption/Binding Module

242‧‧‧密碼比對模組 242‧‧‧Password comparison module

244‧‧‧鎖定/解鎖模組 244‧‧‧Lock/unlock module

246‧‧‧數據刪除模組 246‧‧‧Data Delete Module

248‧‧‧數據讀取模組 248‧‧‧Data reading module

Claims (10)

一種具防盜功能之移動終端,其包括一中央處理器、一存儲單元及一用於讀取用戶識別卡之用戶識別卡讀取單元,其改良在於:該存儲單元包括一寄存器及一用於處理防盜操作之防盜模組,該防盜模組包括一加密/綁定模組、一密碼比對模組、一鎖定/解鎖模組及一數據刪除模組,該中央處理器可調用該加密/綁定模組將一防盜密碼與該用戶識別卡數據進行綁定,並將該防盜密碼紀錄於該寄存器中;該中央處理器可調用該密碼比對模組從該寄存器中取出該防盜密碼並將其與該用戶識別卡數據進行比對;該中央處理器可調用該鎖定/解鎖模組將該移動終端鎖定或解除鎖定;該中央處理器可調用該數據刪除模組執行刪除操作,當第一次使用該移動終端時插入一用戶識別卡,開機後透過彈出之密碼輸入視窗設置一防盜密碼,該中央處理器調用該加密/綁定模組將該防盜密碼與該用戶識別卡數據進行綁定,並將該防盜密碼紀錄於該寄存器中,當該移動終端再次開機時,該中央處理器調用該密碼比對模組從該寄存器中取出該防盜密碼並將其與移動終端內之用戶識別卡數據進行比對,在兩者不匹配時調用該鎖定/解鎖模組將移動終端進行鎖定,當移動終端更換用戶識別卡被鎖定後,再次彈出密碼輸入視窗,該中央處理器調用該密碼比對模組判斷用戶輸入之防盜密碼是否正確,在用戶輸入正確之防盜密碼時,該中央處理器調用該鎖定/解鎖模組將移動終端解除鎖定,且該中央處理器調用該加密/綁定模組將該防盜密碼重新與更換後之用戶識別卡數據進行綁定;在輸入之防盜密碼不正確時,該中央處理器調用該數據刪除模組紀錄上述操作數據,若在一預設時間內輸入了正確之防盜密碼,該中央處理器調用該鎖定/解鎖模組將移動終端解除鎖定,且該中央處理器調用 該加密/綁定模組將該防盜密碼將重新與更換後之用戶識別卡數據進行綁定,如在該預設時間內沒有輸入正確之防盜密碼,該中央處理器調用該數據刪除模組將該移動終端存儲單元中之用戶資源數據刪除。 A mobile terminal with anti-theft function, comprising a central processing unit, a storage unit and a user identification card reading unit for reading a user identification card, wherein the storage unit comprises a register and a processing unit The anti-theft module of the anti-theft operation, the anti-theft module comprises an encryption/binding module, a password comparison module, a locking/unlocking module and a data deletion module, the central processor can call the encryption/binding The fixed module binds an anti-theft password to the user identification card data, and records the anti-theft password in the register; the central processor can call the password comparison module to take the anti-theft password from the register and Comparing with the user identification card data; the central processor may call the lock/unlock module to lock or unlock the mobile terminal; the central processor may invoke the data deletion module to perform a delete operation, when the first When the mobile terminal is used, a user identification card is inserted, and after booting, an anti-theft password is set through the pop-up password input window, and the central processor calls the encryption/binding module. The anti-theft password is bound to the user identification card data, and the anti-theft password is recorded in the register. When the mobile terminal is powered on again, the central processor calls the password comparison module to remove the anti-theft from the register. The password is compared with the user identification card data in the mobile terminal, and the locking/unlocking module is called to lock the mobile terminal when the two do not match. When the mobile terminal replaces the user identification card and is locked, the password is popped again. In the input window, the central processor calls the password comparison module to determine whether the anti-theft password input by the user is correct. When the user inputs the correct anti-theft password, the central processor calls the lock/unlock module to unlock the mobile terminal, and The central processor calls the encryption/binding module to re-bind the anti-theft password with the replaced user identification card data; when the input anti-theft password is incorrect, the central processor calls the data deletion module to record the above Operation data, if the correct anti-theft password is input within a preset time, the central processor calls the lock/unlock Group unlock the mobile terminal, and the central call processor The encryption/binding module will re-bind the anti-theft password with the replaced user identification card data. If the correct anti-theft password is not input within the preset time, the central processor calls the data deletion module to User resource data in the mobile terminal storage unit is deleted. 如申請專利範圍第1項所述之具防盜功能之移動終端,其中該中央處理器還可在該數據刪除模組執行刪除操作前將刪除之數據傳輸到網路硬碟中。 The mobile terminal with the anti-theft function described in claim 1, wherein the central processor can also transmit the deleted data to the network hard disk before the data deletion module performs the deletion operation. 如申請專利範圍第1項所述之具防盜功能之移動終端,其中該防盜模組還包括一數據讀取模組,該中央處理器可調用該數據讀取模組讀取該用戶識別卡之數據,並將該等數據傳輸到網路硬碟中。 The mobile terminal with the anti-theft function as described in claim 1, wherein the anti-theft module further includes a data reading module, and the central processing unit can call the data reading module to read the user identification card. Data and transfer the data to a network drive. 如申請專利範圍第1項所述之具防盜功能之移動終端,其中該移動終端為一手機。 The mobile terminal with anti-theft function as described in claim 1, wherein the mobile terminal is a mobile phone. 如申請專利範圍第1項所述之具防盜功能之移動終端,其中該用戶識別卡為一SIM卡。 The mobile terminal with anti-theft function according to claim 1, wherein the user identification card is a SIM card. 一種應用於申請專利範圍第1項中移動終端之防盜方法,包括以下步驟:當第一次使用該移動終端時插入一用戶識別卡,開機後透過彈出之密碼輸入視窗設置一防盜密碼,該中央處理器調用該加密/綁定模組將該防盜密碼與該用戶識別卡數據進行綁定,並將該防盜密碼紀錄於該寄存器中;該中央處理器調用該密碼比對模組從該寄存器中取出該防盜密碼並將其與移動終端內之用戶識別卡數據進行比對,如果兩者匹配則移動終端進入後續正常操作過程;如果兩者不匹配,則該中央處理器調用該鎖定/解鎖模組將移動終端進行鎖定;當移動終端更換用戶識別卡被鎖定後,再次彈出密碼輸入視窗,該中央處理器調用該密碼比對模組判斷用戶輸入之防盜密碼是否正確,如果用 戶輸入正確之防盜密碼,則該中央處理器調用該鎖定/解鎖模組將移動終端解除鎖定,且該中央處理器調用該加密/綁定模組將該防盜密碼重新與更換後之用戶識別卡數據進行綁定,隨後移動終端進入後續正常操作過程;如果用戶輸入之防盜密碼不正確時,該中央處理器調用該數據刪除模組紀錄上述操作數據,當經過一預設時間後,如果用戶在這段時間內重新輸入了正確之防盜密碼,則該中央處理器調用該鎖定/解鎖模組將移動終端解除鎖定,且該中央處理器調用該加密/綁定模組將該防盜密碼將重新與更換後之用戶識別卡數據進行綁定,隨後移動終端進入後續正常操作過程;及如果用戶在該預設時間內沒有重新輸入正確之防盜密碼,則該中央處理器調用該數據刪除模組執行刪除操作,即將移動終端存儲單元中之用戶各種資源數據進行刪除。 An anti-theft method applied to the mobile terminal in the first claim of the patent scope includes the following steps: inserting a user identification card when the mobile terminal is used for the first time, and setting an anti-theft password through the pop-up password input window after booting, the central The processor calls the encryption/binding module to bind the anti-theft password to the user identification card data, and records the anti-theft password in the register; the central processor calls the password comparison module from the register The anti-theft password is taken out and compared with the user identification card data in the mobile terminal. If the two match, the mobile terminal enters a subsequent normal operation process; if the two do not match, the central processor calls the lock/unlock mode. The group locks the mobile terminal; when the mobile terminal replaces the user identification card and is locked, the password input window pops up again, and the central processor calls the password comparison module to determine whether the anti-theft password input by the user is correct, if When the user inputs the correct anti-theft password, the central processor calls the lock/unlock module to unlock the mobile terminal, and the central processor calls the encryption/binding module to re-establish the anti-theft password with the replaced user identification card. The data is bound, and then the mobile terminal enters a subsequent normal operation process; if the anti-theft password input by the user is incorrect, the central processing unit calls the data deletion module to record the operation data, and after a preset time, if the user is During this period of time, the correct anti-theft password is re-entered, and the central processor calls the lock/unlock module to unlock the mobile terminal, and the central processor calls the encryption/binding module to re-establish the anti-theft password. After the replacement, the user identification card data is bound, and then the mobile terminal enters a subsequent normal operation process; and if the user does not re-enter the correct anti-theft password within the preset time, the central processor calls the data deletion module to perform deletion. The operation is to delete various resource data of the user in the storage unit of the mobile terminal. 如申請專利範圍6項所述之防盜方法,其中該數據刪除模組執行刪除操作前還包括如下步驟:該中央處理器調用該數據刪除模組將刪除之數據傳輸到網路硬碟中。 The anti-theft method of claim 6, wherein the data deletion module further comprises the following steps: the central processor calls the data deletion module to transmit the deleted data to the network hard disk. 如申請專利範圍6項所述之防盜方法,其中該防盜模組還包括一數據讀取模組,在用戶識別卡更換後還包括如下步驟:該中央處理器調用該數據讀取模組讀取該更換後之用戶識別卡之數據,並將該等數據傳輸到網路硬碟中。 The anti-theft method of claim 6, wherein the anti-theft module further comprises a data reading module, and after the user identification card is replaced, the method further comprises the following steps: the central processing unit calls the data reading module to read The data of the replaced subscriber identity card is transmitted to the network hard disk. 如申請專利範圍6項所述之防盜方法,其中用戶可透過另一部移動終端或聯網電腦向網路運營商之用戶作業系統平臺上對應輸入一鎖卡指令,該移動終端接收到該鎖卡指令後,該中央處理器調用該鎖定/解鎖模組將該移動終端鎖定。 The anti-theft method of claim 6, wherein the user can input a lock card instruction to the network operator's user operating system platform through another mobile terminal or a networked computer, and the mobile terminal receives the lock card. After the instruction, the central processor calls the lock/unlock module to lock the mobile terminal. 如申請專利範圍6項所述之防盜方法,其中用戶可透過另一部移動終端或 聯網電腦向網路運營商之用戶作業系統平臺上對應輸入一刪除指令,該移動終端接收到該刪除指令後,該中央處理器調用該數據刪除模組刪除該存儲單元中之用戶各種資源數據。 The anti-theft method of claim 6, wherein the user can pass through another mobile terminal or The networked computer inputs a delete command to the network operator's user operating system platform. After the mobile terminal receives the delete command, the central processor calls the data deletion module to delete various resource data of the user in the storage unit.
TW97117164A 2008-05-09 2008-05-09 Mobile termination having anti-theft function and anti-theft method thereof TWI393022B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97117164A TWI393022B (en) 2008-05-09 2008-05-09 Mobile termination having anti-theft function and anti-theft method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97117164A TWI393022B (en) 2008-05-09 2008-05-09 Mobile termination having anti-theft function and anti-theft method thereof

Publications (2)

Publication Number Publication Date
TW200947254A TW200947254A (en) 2009-11-16
TWI393022B true TWI393022B (en) 2013-04-11

Family

ID=44870275

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97117164A TWI393022B (en) 2008-05-09 2008-05-09 Mobile termination having anti-theft function and anti-theft method thereof

Country Status (1)

Country Link
TW (1) TWI393022B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1170969A1 (en) * 2000-07-06 2002-01-09 Nokia Mobile Phones Ltd. Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused
TWI271992B (en) * 2004-07-28 2007-01-21 Mediatek Inc Mobile communication apparatus having anti-theft and auto-notification functions and method of operating the same
US20080014990A1 (en) * 2005-07-25 2008-01-17 Pixtel Media Technology (P) Ltd. Method of locating a mobile communication system for providing anti theft and data protection during successive boot-up procedure
TW200808017A (en) * 2006-07-17 2008-02-01 Inventec Appliances Corp Method of retrieving and encrypting data for mobile communication apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1170969A1 (en) * 2000-07-06 2002-01-09 Nokia Mobile Phones Ltd. Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused
TWI271992B (en) * 2004-07-28 2007-01-21 Mediatek Inc Mobile communication apparatus having anti-theft and auto-notification functions and method of operating the same
US20080014990A1 (en) * 2005-07-25 2008-01-17 Pixtel Media Technology (P) Ltd. Method of locating a mobile communication system for providing anti theft and data protection during successive boot-up procedure
TW200808017A (en) * 2006-07-17 2008-02-01 Inventec Appliances Corp Method of retrieving and encrypting data for mobile communication apparatus

Also Published As

Publication number Publication date
TW200947254A (en) 2009-11-16

Similar Documents

Publication Publication Date Title
CN101568119A (en) Mobile terminal with antitheft function and antitheft method thereof
US8001375B2 (en) Mobile device, and access control method
US20060206720A1 (en) Method, program and system for limiting I/O access of client
US7174159B2 (en) Method of securing a mobile telecommunication terminal
EP2383675B1 (en) Thin client-server system, thin client terminal, data management method, and computer readable recording medium
EP1837790A1 (en) Device and method for controlling usage of a memory card
JP2004166215A (en) Method of locking mobile communication terminal
CN101656955A (en) Information processing apparatus, information processing method, information processing program and information processing system
CN1980459B (en) Method for realizing information destroying at network side
KR100834270B1 (en) Method and system for providing virtual private network services based on mobile communication and mobile terminal for the same
WO2010060242A1 (en) An authentication method for the mobile terminal and a system thereof
WO2014180345A1 (en) User identity verification and authorization system
JP2012199751A (en) Management server, communication system, management method and program
JP2007267006A (en) Information protecting system, portable terminal, information medium, information protecting method, and information protecting program
CN107305608A (en) The management method and device of terminal device
CN1980458B (en) Method for realizing information back-up at network side
US20190297504A1 (en) Terminal device, registration-processing method, and non-transitory computer-readable recording medium storing program
TWI393022B (en) Mobile termination having anti-theft function and anti-theft method thereof
WO2008038355A1 (en) Portable terminal system, portable terminal, and function locking method
CN1980427A (en) Device for mobile terminal to automatically deleting information, and method thereof
CN110191464B (en) Method and system for preventing SIM card from being stolen
CN110636493B (en) Information backup method, device and equipment of virtual SIM card and storage medium
KR100641167B1 (en) Initialization method for mobile communication terminal
JP2009212784A (en) Communication system, mobile terminal and communication method
WO2017156931A1 (en) Locking method and system for mobile terminal

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees