TWI416931B - System and method for deleting data stored in the mobile phone automatically - Google Patents

System and method for deleting data stored in the mobile phone automatically Download PDF

Info

Publication number
TWI416931B
TWI416931B TW97123100A TW97123100A TWI416931B TW I416931 B TWI416931 B TW I416931B TW 97123100 A TW97123100 A TW 97123100A TW 97123100 A TW97123100 A TW 97123100A TW I416931 B TWI416931 B TW I416931B
Authority
TW
Taiwan
Prior art keywords
mobile phone
password
data
short message
security command
Prior art date
Application number
TW97123100A
Other languages
Chinese (zh)
Other versions
TW201002037A (en
Inventor
Chih Pu Hsu
Original Assignee
Chi Mei Comm Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chi Mei Comm Systems Inc filed Critical Chi Mei Comm Systems Inc
Priority to TW97123100A priority Critical patent/TWI416931B/en
Publication of TW201002037A publication Critical patent/TW201002037A/en
Application granted granted Critical
Publication of TWI416931B publication Critical patent/TWI416931B/en

Links

Landscapes

  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A system for deleting data stored in the mobile phone automatically is provided. The system is installed in a mobile phone, which includes a SIM (Subscriber Identity Model) card. The system includes a setting module for setting a user name, password, and identifying codes, and setting contents of a secure command for deleting all data stored in the mobile phone; a comparing module for comparing a received message with the secure command, determining whether the received message is equal to the contents of the secure command, and confirming that the received message is the secure command; and an executing module for executing the secure command to delete all the data stored in the mobile phone. A related method for deleting data stored in the mobile phone automatically is also disclosed. By utilizing the system and the related method, the data stored in the mobile phones may be deleted automatically if the mobile phones are in the abnormal state.

Description

手機存儲資料自動銷毀系統及方法 Mobile phone storage data automatic destruction system and method

本發明涉及一種對手機內存儲的資料進行管理的系統及方法,尤其涉及一種自動銷毀手機內存儲資料的系統及方法。 The present invention relates to a system and method for managing data stored in a mobile phone, and more particularly to a system and method for automatically destroying stored data in a mobile phone.

隨著通訊技術的發展,各類用於通訊的電子產品成本越來越低,市場價格也隨之下降,從而得以更普遍地應用,例如,手機的普及率越來越高,成為廣大用戶日常生活中不可缺少的通訊工具。 此外,隨著手機的軟硬體配置的不斷提升,手機內存儲的資料量也越來越多。例如,手機攝像頭已具備一定的解析度,很多用戶喜歡用手機拍攝照片、視頻等,並將拍攝的照片與視頻存儲於手機記憶體中。 With the development of communication technology, the cost of various electronic products for communication is getting lower and lower, and the market price is also falling, so that it can be more widely used. For example, the popularity of mobile phones is getting higher and higher, and it becomes a daily life of users. An indispensable communication tool in life. In addition, as the software and hardware configuration of mobile phones continues to increase, the amount of data stored in mobile phones is also increasing. For example, mobile phone cameras have a certain degree of resolution, many users like to use mobile phones to take photos, videos, etc., and store the photos and videos in the phone memory.

由於手機記憶體資料量的增加,雖給用戶帶來了很大的便利,卻也不可避免的產生相應的風險。例如,當手機遺失或者被盜時,手機內的資料就有被外泄的風險,尤其當手機內存儲了涉及個人隱私方面的資料或者需要被保密的資料,例如銀行卡帳號、密碼等,手機的遺失將給用戶造成很大的損失。 Due to the increase in the amount of data in the mobile phone memory, although it brings great convenience to the user, it also inevitably generates corresponding risks. For example, when a mobile phone is lost or stolen, the data in the mobile phone is exposed to risk, especially when the mobile phone stores information related to personal privacy or information that needs to be kept confidential, such as a bank card account number, password, etc. The loss will cause great losses to the user.

鑒於以上內容,有必要提供一種手機存儲資料自動銷毀系統及方 法,可在手機發生異常時及時刪除手機內資料。 In view of the above, it is necessary to provide a mobile phone storage data automatic destruction system and party The law can delete the data in the mobile phone in time when the mobile phone is abnormal.

一種手機存儲資料自動銷毀系統,該系統安裝於手機中,該手機包括SIM卡,該系統包括:設置模組,用於設置用戶名、密碼以及系統識別碼,以及設置安全指令以銷毀所述手機內的所有資料;比對模組,用於將所述手機接收之短信的內容與所設置之安全指令進行比對,判斷兩者是否一致,並在短信內容與所設置之安全指令一致時確認該短信為安全指令;及執行模組,用於執行該安全指令,銷毀所述手機內的所有資料。 A mobile phone storage data automatic destruction system, the system is installed in a mobile phone, the mobile phone comprises a SIM card, the system comprises: a setting module, configured to set a user name, a password and a system identification code, and set a security instruction to destroy the mobile phone All the data; the comparison module is configured to compare the content of the short message received by the mobile phone with the set security command, determine whether the two are consistent, and confirm when the content of the short message is consistent with the set security command The short message is a security instruction; and an execution module is configured to execute the security instruction to destroy all data in the mobile phone.

一種手機存儲資料自動銷毀方法,該方法運用於手機中,該手機包括SIM卡,該方法包括如下步驟:設置用戶名、密碼以及系統識別碼;設置安全指令以銷毀所述手機內的所有資料;所述手機開機後,判斷該手機內的SIM卡是否被更換;若所述手機內的SIM卡沒有被更換,進入作業系統;所述手機接收短信,將該手機接收之短信的內容與所設置之安全指令進行比對,判斷兩者是否一致;若短信內容與所設置之安全指令一致,確認該短信為安全指令;及執行該安全指令,銷毀所述手機內的所有資料。 A mobile phone storage data automatic destruction method, the method is applied to a mobile phone, the mobile phone comprises a SIM card, and the method comprises the steps of: setting a user name, a password and a system identification code; and setting a security instruction to destroy all the data in the mobile phone; After the mobile phone is turned on, it is determined whether the SIM card in the mobile phone is replaced; if the SIM card in the mobile phone is not replaced, the operating system is entered; the mobile phone receives the short message, and the content of the short message received by the mobile phone is set The security instructions are compared to determine whether the two are consistent; if the content of the short message is consistent with the set security command, the short message is confirmed as a security command; and the security command is executed to destroy all the data in the mobile phone.

相較於習知技術,所述之手機存儲資料自動銷毀系統及方法,其可在手機發生異常時及時刪除手機內資料,從而避免手機內存儲的涉及個人隱私的資料外泄。 Compared with the prior art, the mobile phone storage data automatic destruction system and method can delete the data in the mobile phone in time when the mobile phone is abnormal, thereby avoiding leakage of data related to personal privacy stored in the mobile phone.

1‧‧‧手機 1‧‧‧Mobile phone

2‧‧‧資料銷毀系統 2‧‧‧Data destruction system

20‧‧‧設置模組 20‧‧‧Setup module

22‧‧‧比對模組 22‧‧‧ Alignment module

24‧‧‧執行模組 24‧‧‧Execution module

26‧‧‧驗證模組 26‧‧‧ verification module

3‧‧‧接收裝置 3‧‧‧ Receiving device

4‧‧‧發送裝置 4‧‧‧Send device

5‧‧‧記憶體 5‧‧‧ memory

圖1係本發明手機存儲資料自動銷毀系統之較佳實施例之功能模組圖。 1 is a functional block diagram of a preferred embodiment of the mobile phone storage data automatic destruction system of the present invention.

圖2係本發明手機存儲資料自動銷毀方法之較佳實施例之資料設置流程圖。 2 is a flow chart showing the setting of a preferred embodiment of the method for automatically destroying stored data of the mobile phone of the present invention.

圖3係本發明手機存儲資料自動銷毀方法之較佳實施例之流程圖。 3 is a flow chart of a preferred embodiment of the method for automatically destroying stored data of the mobile phone of the present invention.

如圖1所示,係本發明手機存儲資料自動銷毀系統之較佳實施例之功能模組圖。本發明手機存儲資料自動銷毀系統2(下文稱“資料銷毀系統2”)安裝在手機1中,用於在手機1發生異常時自動銷毀手機1內存儲的所有資料,例如:通訊錄、短信記錄、照片、影像檔(例如:視頻檔)等資料。手機1的異常情況可包括:手機1遺失、被盜、SIM(Subscriber Identity Model,客戶識別模組)卡被更換等。所述之資料銷毀系統2提供一個互動式人機操作介面用以執行相關操作,例如,在該手機1中啟動資料銷毀系統2、設置相關內容等。 FIG. 1 is a functional block diagram of a preferred embodiment of the mobile phone storage data automatic destruction system of the present invention. The mobile phone storage data automatic destruction system 2 (hereinafter referred to as "data destruction system 2") is installed in the mobile phone 1 for automatically destroying all data stored in the mobile phone 1 when an abnormality occurs in the mobile phone 1, for example, an address book and a short message record. , photos, image files (for example: video files) and other information. The abnormal situation of the mobile phone 1 may include: the mobile phone 1 is lost, stolen, and the SIM (Subscriber Identity Model) card is replaced. The data destruction system 2 provides an interactive human-machine interface for performing related operations, for example, starting the data destruction system 2, setting related content, and the like in the mobile phone 1.

所述之手機1包括接收裝置3以及發送裝置4用於藉由各種通訊網路或者連接傳送相關資料,例如:通電話、接發短信等。所述連接可以是藍牙連接,或者藉由USB(Universal Serial Bus,通用串列匯流排)介面與其他電子裝置之間的連接。 The mobile phone 1 includes a receiving device 3 and a transmitting device 4 for transmitting related materials by using various communication networks or connections, for example, calling, sending and receiving short messages, and the like. The connection may be a Bluetooth connection or a connection between the USB (Universal Serial Bus) interface and other electronic devices.

所述之手機1還包括記憶體5,用於存儲各類資料,包括通訊錄、短信記錄、照片、在所述資料銷毀系統2中所作的設置等資料。所述之記憶體5可以是該手機1本身的記憶體,還可以是外部存儲卡,如SM卡(Smart Media Card,智慧媒體卡)、SD卡(Secure Digital Card,安全數位卡)、CF卡(Compact Flash Card,標 準快閃記憶體卡)、MMC卡(Multi Media Card,多媒體卡)、MS卡(Memory Stick,記憶棒)、XD卡(Extreme Digital Card,極限數字卡)、TF卡(Trans Flash Card)等。 The mobile phone 1 further includes a memory 5 for storing various types of materials, including an address book, a short message record, a photo, and settings made in the data destruction system 2. The memory 5 may be the memory of the mobile phone 1 itself, or may be an external memory card, such as a SIM card (Smart Media Card), an SD card (Secure Digital Card), a CF card. (Compact Flash Card, standard Quasi-flash memory card), MMC card (Multi Media Card), MS card (Memory Stick), XD card (Extreme Digital Card), TF card (Trans Flash Card).

所述之資料銷毀系統2主要包括三個功能模組,分別是:設置模組20、比對模組22以及執行模組24。所述資料銷毀系統2在完成安裝後即行啟動並提示用戶設置相關內容,在其他實施例中,所述資料銷毀系統2也可嵌入至手機1的作業系統中。 The data destruction system 2 mainly includes three functional modules, namely: a setting module 20, a comparison module 22, and an execution module 24. The data destruction system 2 is activated upon completion of the installation and prompts the user to set related content. In other embodiments, the data destruction system 2 can also be embedded in the operating system of the mobile phone 1.

所述之設置模組20用於設置用戶名、密碼以及系統識別碼以便於所述資料銷毀系統2識別用戶身份,還用於設置啟動所述資料銷毀系統2的快捷鍵。在本較佳實施例中,所述資料銷毀系統2具有自動隱藏的功能,在完成安裝後並不顯示於手機1的各功能功能表中,藉由設置快捷鍵,可供手機1的用戶在需要時調用該資料銷毀系統2。例如,設置快捷鍵為“*@56@*”,當用戶需要更改用戶名、密碼或者系統識別碼等設置內容時,即可利用所設置之快捷鍵進入該資料銷毀系統2。 The setting module 20 is configured to set a user name, a password, and a system identification code to facilitate the data destruction system 2 to identify the user identity, and is also used to set a shortcut key for starting the data destruction system 2. In the preferred embodiment, the data destruction system 2 has an automatic hiding function, and is not displayed in each function menu of the mobile phone 1 after the installation is completed. By setting a shortcut key, the user of the mobile phone 1 can be used by This data destruction system 2 is called when needed. For example, if the shortcut key is set to "*@56@*", when the user needs to change the setting contents such as the user name, password or system identification code, the data shortcut system can be accessed by using the shortcut key set.

所述之設置模組20進一步用於設置安全指令,該安全指令用於銷毀手機1內的所有資料,對SIM卡以及記憶體5中的資料進行永久性刪除。在本較佳實施例中,該安全指令為用戶名、密碼以及系統識別碼的組合,例如,用戶名為xzp,密碼為10@#,系統識別碼為123*,則該安全指令可以是“xzp/10@#/123*”。所述安全指令可藉由短信的形式進行發送。 The setting module 20 is further configured to set a security command for destroying all the data in the mobile phone 1 and permanently deleting the data in the SIM card and the memory 5. In the preferred embodiment, the security command is a combination of a username, a password, and a system identifier. For example, if the username is xzp, the password is 10@#, and the system identifier is 123*, the security command may be “ Xzp/10@#/123*”. The security command can be sent by means of a short message.

完成上述設置後,所述資料銷毀系統2詢問是否啟動系統,若手 機1的用戶確認啟動所述資料銷毀系統2,則當手機1開機後該資料銷毀系統2即自行啟動。 After completing the above settings, the data destruction system 2 asks whether to start the system, if the hand The user of the machine 1 confirms that the data destruction system 2 is activated, and the data destruction system 2 starts up automatically when the mobile phone 1 is turned on.

所述之比對模組22用於當手機1的接收裝置3接收到短信後,將所接收之短信內容與所設置之安全指令進行比對,判斷兩者是否一致,若一致,則確認該短信為安全指令。 The comparison module 22 is configured to compare the received short message content with the set security command after receiving the short message of the mobile phone 1, and determine whether the two are consistent. If they are consistent, confirm the The text message is a security command.

所述之執行模組24用於執行所接收之安全指令,銷毀手機1內的所有資料。若所述之比對模組22判斷短信內容與所設置之安全指令不一致,則執行模組24提示用戶接收到一條新的短信。 The execution module 24 is configured to execute the received security command and destroy all data in the mobile phone 1. If the comparison module 22 determines that the short message content is inconsistent with the set security command, the execution module 24 prompts the user to receive a new short message.

當手機1發生異常時,例如遺失或被盜,用戶可發送內容為安全指令的短信至手機1,則手機1接收到該安全指令後,可將手機1內存儲的所有資料進行銷毀以防止手機1內存儲的私人資料外泄。 When the mobile phone 1 is abnormal, such as lost or stolen, the user can send a text message with the security command to the mobile phone 1. After receiving the security command, the mobile phone 1 can destroy all the data stored in the mobile phone 1 to prevent the mobile phone. The private data stored in 1 is leaked.

當手機1在發生異常後且手機1內的SIM卡被更換時,則手機1無法藉由接收安全指令對資料進行銷毀,因此,所述資料銷毀系統2進一步包括驗證模組26,用於在手機1開機時判斷手機1內的SIM卡是否被更換。每一個SIM卡都具備一個唯一的IMSI(International Mobile Subscriber Identify)代碼,手機1在開機過程中會讀取SIM卡中的IMSI代碼。所述之驗證模組26記錄手機1每次開機時所讀取的IMSI代碼,並藉由比對開機後讀取的IMSI代碼與前一次開機所記錄的IMSI代碼是否一致從而判斷手機1內的SIM卡是否被更換。 When the mobile phone 1 is abnormal and the SIM card in the mobile phone 1 is replaced, the mobile phone 1 cannot destroy the data by receiving the security command. Therefore, the data destruction system 2 further includes a verification module 26 for When the mobile phone 1 is turned on, it is determined whether the SIM card in the mobile phone 1 has been replaced. Each SIM card has a unique IMSI (International Mobile Subscriber Identify) code, and the mobile phone 1 reads the IMSI code in the SIM card during the boot process. The verification module 26 records the IMSI code read by the mobile phone 1 each time it is turned on, and determines the SIM in the mobile phone 1 by comparing whether the IMSI code read after the power-on is the same as the IMSI code recorded in the previous power-on. Whether the card has been replaced.

所述驗證模組26還用於確認手機1內的SIM卡被更換後,提示用戶 輸入用戶名以及密碼,並根據預先設置之用戶名與密碼判斷所輸入的用戶名與密碼是否正確。 The verification module 26 is further configured to: after confirming that the SIM card in the mobile phone 1 is replaced, prompting the user Enter the user name and password, and judge whether the entered user name and password are correct according to the preset user name and password.

所述設置模組20可預設次數供用戶多次輸入,當用戶輸入用戶名與密碼的次數達到該預設次數,且仍然輸入錯誤時,則執行模組24自動生成所述安全指令,並執行該安全指令對手機1內存儲的資料進行銷毀。 The setting module 20 can be preset for the user to input multiple times. When the number of times the user inputs the user name and the password reaches the preset number of times, and the input error is still entered, the execution module 24 automatically generates the safety instruction, and The security command is executed to destroy the data stored in the mobile phone 1.

若驗證模組26判斷用戶輸入正確的用戶名以及密碼,則正常進入手機1的作業系統。 If the verification module 26 determines that the user inputs the correct username and password, the authentication system 26 normally enters the operating system of the mobile phone 1.

在其他實施例中,所述之驗證模組26還可用於在手機1與其他電子裝置連接時提示輸入用戶名與密碼(例如,手機1藉由其USB介面與電腦相連接),並在驗證用戶名或密碼輸入錯誤時,藉由執行模組24生成並執行安全指令對手機1內的資料進行銷毀,從而防止手機1內的資料被竊取。 In other embodiments, the verification module 26 can also be used to prompt for a username and password when the mobile phone 1 is connected to other electronic devices (for example, the mobile phone 1 is connected to the computer through its USB interface) and is verified. When the user name or password is input incorrectly, the execution module 24 generates and executes a security command to destroy the data in the mobile phone 1, thereby preventing the data in the mobile phone 1 from being stolen.

如圖2所示,係本發明手機存儲資料自動銷毀方法之較佳實施例之資料設置流程圖。首先,步驟S2,將所述資料銷毀系統2安裝於手機1後,所述之設置模組20設置用戶名、密碼以及系統識別碼以便於所述資料銷毀系統2識別用戶身份。 As shown in FIG. 2, it is a data setting flowchart of a preferred embodiment of the method for automatically destroying stored data of the mobile phone of the present invention. First, in step S2, after the data destruction system 2 is installed in the mobile phone 1, the setting module 20 sets a user name, a password, and a system identification code to facilitate the data destruction system 2 to identify the user identity.

步驟S4,所述之設置模組20設置可供用戶多次輸入用戶名及密碼以進行驗證的次數(下文簡稱“預設次數”)。 In step S4, the setting module 20 sets a number of times (hereinafter referred to as "preset number of times") that the user can input the user name and password multiple times for verification.

步驟S6,所述之設置模組20設置啟動所述資料銷毀系統2的快捷鍵。藉由設置快捷鍵,可直接調用隱藏的資料銷毀系統2。 In step S6, the setting module 20 sets a shortcut key for starting the data destruction system 2. The hidden data destruction system 2 can be directly invoked by setting a shortcut key.

步驟S8,所述之設置模組20設置安全指令,該安全指令用於銷毀手機1內的所有資料,即對SIM卡以及記憶體5中的資料進行永久性刪除。在本較佳實施例中,該安全指令為用戶名、密碼以及系統識別碼的組合。所述安全指令可藉由短信的形式進行發送。 In step S8, the setting module 20 sets a security command for destroying all the data in the mobile phone 1, that is, permanently deleting the data in the SIM card and the memory 5. In the preferred embodiment, the security command is a combination of a username, a password, and a system identification code. The security command can be sent by means of a short message.

步驟S10,完成上述設置後,啟動所述資料銷毀系統2從而開始監控所述手機1是否接收到安全指令。 Step S10, after the above setting is completed, the data destruction system 2 is started to start monitoring whether the mobile phone 1 receives a security instruction.

如圖3所示,係本發明手機存儲資料自動銷毀方法之較佳實施例之流程圖。步驟S20,手機1開機,且所述資料銷毀系統2啟動。 As shown in FIG. 3, it is a flowchart of a preferred embodiment of the method for automatically destroying stored data of the mobile phone of the present invention. In step S20, the mobile phone 1 is powered on, and the data destruction system 2 is started.

步驟S22,所述之驗證模組26判斷手機1內的SIM卡是否被更換。每一個SIM卡都具備一個唯一的IMSI(International Mobile Subscriber Identify)代碼,手機1在開機過程中會讀取SIM卡中的IMSI代碼。所述之驗證模組26記錄手機1每次開機時所讀取的IMSI代碼,並藉由比對開機後讀取的IMSI代碼與前一次開機所記錄的IMSI代碼是否一致從而判斷手機1內的SIM卡是否被更換。 In step S22, the verification module 26 determines whether the SIM card in the mobile phone 1 is replaced. Each SIM card has a unique IMSI (International Mobile Subscriber Identify) code, and the mobile phone 1 reads the IMSI code in the SIM card during the boot process. The verification module 26 records the IMSI code read by the mobile phone 1 each time it is turned on, and determines the SIM in the mobile phone 1 by comparing whether the IMSI code read after the power-on is the same as the IMSI code recorded in the previous power-on. Whether the card has been replaced.

若手機1內的SIM卡沒有被更換,於步驟S24,手機1進入作業系統,所述接收裝置3接收一條短信。 If the SIM card in the mobile phone 1 has not been replaced, the mobile phone 1 enters the operating system in step S24, and the receiving device 3 receives a short message.

步驟S26,所述之比對模組22將所接收之短信內容與所設置之安全指令進行比對,判斷兩者是否一致。若所接收之短信內容與所設置之安全指令一致,於步驟S28,所述比對模組22確認該短信為安全指令。 In step S26, the comparison module 22 compares the received short message content with the set security command to determine whether the two are consistent. If the received short message content is consistent with the set security command, the comparison module 22 confirms that the short message is a security command in step S28.

步驟S30,所述之執行模組24執行該安全指令,銷毀手機1內的所有資料,並結束本流程。 In step S30, the execution module 24 executes the security instruction, destroys all the data in the mobile phone 1, and ends the process.

若在步驟S26中,所述之比對模組22判斷短信內容與所設置之安全指令不一致,於步驟S32,所述之執行模組24提示用戶接收到一條新的短信,並結束本流程。 If the comparison module 22 determines that the short message content is inconsistent with the set security command in step S26, the execution module 24 prompts the user to receive a new short message in step S32, and ends the process.

若在步驟S22中,所述之驗證模組26確認手機1內的SIM卡被更換,於步驟S34,提示用戶輸入用戶名以及密碼。 If the verification module 26 confirms that the SIM card in the mobile phone 1 is replaced in step S22, the user is prompted to input the user name and password in step S34.

步驟S36,所述之驗證模組26根據預先設置之用戶名與密碼判斷所輸入的用戶名與密碼是否正確。 In step S36, the verification module 26 determines whether the input user name and password are correct according to the preset user name and password.

若所輸入的用戶名或密碼不正確,於步驟S38,所述之驗證模組26記錄輸入次數。步驟S40,所述之驗證模組26判斷輸入次數是否等於預設次數。若輸入次數不等於預設次數,則返回步驟S34重新輸入用戶名與密碼。若輸入次數等於預設次數,則直接執行步驟S30以銷毀手機1內的所有資料。 If the entered username or password is incorrect, the verification module 26 records the number of inputs in step S38. In step S40, the verification module 26 determines whether the input number is equal to the preset number of times. If the number of inputs is not equal to the preset number of times, return to step S34 to re-enter the username and password. If the number of inputs is equal to the preset number of times, step S30 is directly executed to destroy all the data in the mobile phone 1.

若在步驟S36中,驗證模組26判斷用戶輸入正確的用戶名以及密碼,於步驟S42,進入手機1的作業系統,並結束本流程。 If the verification module 26 determines in step S36 that the user has entered the correct user name and password, the operation system of the mobile phone 1 is entered in step S42, and the flow is terminated.

綜上所述,本發明符合發明專利要件,爰依法提出專利申請。惟,以上所述者僅為本發明之較佳實施例,本發明之範圍並不以上述實施例為限,舉凡熟悉本案技藝之人士爰依本發明之精神所作之等效修飾或變化,皆應涵蓋於以下申請專利範圍內。 In summary, the present invention complies with the requirements of the invention patent and submits a patent application according to law. However, the above description is only the preferred embodiment of the present invention, and the scope of the present invention is not limited to the above embodiments, and equivalent modifications or variations made by those skilled in the art in accordance with the spirit of the present invention are It should be covered by the following patent application.

1‧‧‧手機 1‧‧‧Mobile phone

2‧‧‧資料銷毀系統 2‧‧‧Data destruction system

20‧‧‧設置模組 20‧‧‧Setup module

22‧‧‧比對模組 22‧‧‧ Alignment module

24‧‧‧執行模組 24‧‧‧Execution module

26‧‧‧驗證模組 26‧‧‧ verification module

3‧‧‧接收裝置 3‧‧‧ Receiving device

4‧‧‧發送裝置 4‧‧‧Send device

5‧‧‧記憶體 5‧‧‧ memory

Claims (9)

一種手機存儲資料自動銷毀系統,該系統安裝於手機中,該手機包括SIM卡,該系統包括:設置模組,用於設置用戶名、密碼以及系統識別碼,以及設置安全指令以銷毀所述手機內的所有資料;比對模組,用於將所述手機接收之短信的內容與所設置之安全指令進行比對,判斷兩者是否一致,並在短信內容與所設置之安全指令一致時確認該短信為安全指令;執行模組,用於執行該安全指令,銷毀所述手機內的所有資料;驗證模組,用於判斷所述手機是否與其他電子裝置連接,在確認所述手機與其他電子裝置連接後提示用戶輸入用戶名以及密碼,並判斷所輸入的用戶名以及密碼是否正確;及所述之執行模組,還用於當所述驗證模組判斷用戶輸入的用戶名或密碼不正確時自動生成安全指令,並執行該安全指令對所述手機內存儲的資料進行銷毀。 A mobile phone storage data automatic destruction system, the system is installed in a mobile phone, the mobile phone comprises a SIM card, the system comprises: a setting module, configured to set a user name, a password and a system identification code, and set a security instruction to destroy the mobile phone All the data; the comparison module is configured to compare the content of the short message received by the mobile phone with the set security command, determine whether the two are consistent, and confirm when the content of the short message is consistent with the set security command The short message is a security command; the execution module is configured to execute the security command, and destroy all the data in the mobile phone; the verification module is configured to determine whether the mobile phone is connected to other electronic devices, and confirm the mobile phone and other After the electronic device is connected, the user is prompted to input the user name and the password, and the user name and password are determined to be correct; and the execution module is further configured to: when the verification module determines that the user name or password entered by the user is not When it is correct, the security instruction is automatically generated, and the security instruction is executed to destroy the data stored in the mobile phone. 如申請專利範圍第1項所述之手機存儲資料自動銷毀系統,所述之驗證模組,用於判斷所述手機內的SIM卡是否被更換,在確認所述手機內的SIM卡被更換後提示用戶輸入用戶名以及密碼,並判斷所輸入的用戶名以及密碼是否正確。 The mobile phone storage data automatic destruction system according to claim 1, wherein the verification module is configured to determine whether the SIM card in the mobile phone is replaced, after confirming that the SIM card in the mobile phone is replaced The user is prompted to enter a username and password and determine whether the entered username and password are correct. 如申請專利範圍第2項所述之手機存儲資料自動銷毀系統,所述之執行模組還用於當所述驗證模組判斷用戶輸入的用戶名或密碼不正確時自動生成安全指令,並執行該安全指令對所述手機內存 儲的資料進行銷毀。 The mobile phone storage data automatic destruction system according to claim 2, wherein the execution module is further configured to automatically generate a safety instruction when the verification module determines that the user name or password input by the user is incorrect, and execute The safety instruction is to the mobile phone memory The stored data is destroyed. 如申請專利範圍第1項所述之手機存儲資料自動銷毀系統,所述安全指令為用戶名、密碼以及系統識別碼的組合,並且該安全指令可藉由短信的方式發送。 The mobile phone storage data automatic destruction system according to claim 1, wherein the security command is a combination of a username, a password, and a system identification code, and the security command can be sent by using a short message. 一種手機存儲資料自動銷毀方法,該方法運用於手機中,該手機包括SIM卡,該方法包括如下步驟:設置用戶名、密碼以及系統識別碼;設置安全指令以銷毀所述手機內的所有資料;所述手機開機後,判斷該手機內的SIM卡是否被更換;若所述手機內的SIM卡沒有被更換,進入作業系統;及所述手機接收短信,將該手機接收之短信的內容與所設置之安全指令進行比對,判斷兩者是否一致,若短信內容與所設置之安全指令一致,確認該短信為安全指令,執行該安全指令,銷毀所述手機內的所有資料;或判斷所述手機是否與其他電子裝置連接,在確認所述手機與其他電子裝置連接後提示用戶輸入用戶名以及密碼,當用戶輸入的用戶名或密碼不正確時自動生成安全指令,並執行該安全指令對所述手機內存儲的資料進行銷毀。 A mobile phone storage data automatic destruction method, the method is applied to a mobile phone, the mobile phone comprises a SIM card, and the method comprises the steps of: setting a user name, a password and a system identification code; and setting a security instruction to destroy all the data in the mobile phone; After the mobile phone is turned on, it is determined whether the SIM card in the mobile phone is replaced; if the SIM card in the mobile phone is not replaced, the operating system is entered; and the mobile phone receives the short message, and the content and the content of the short message received by the mobile phone The set security instructions are compared to determine whether the two are consistent. If the content of the short message is consistent with the set security command, the short message is confirmed as a security command, and the security command is executed to destroy all the data in the mobile phone; or Whether the mobile phone is connected to other electronic devices, prompting the user to input a user name and a password after confirming that the mobile phone is connected with other electronic devices, automatically generating a safety instruction when the user name or password input by the user is incorrect, and executing the safety instruction The data stored in the mobile phone is destroyed. 如申請專利範圍第5項所述之手機存儲資料自動銷毀方法,該方法還包括:若所述手機內的SIM卡被更換,提示用戶輸入用戶名以及密碼;判斷所輸入的用戶名以及密碼是否正確;及若所輸入的用戶名或密碼不正確,自動生成安全指令,並執行該安全指令對所述手機內存儲的資料進行銷毀。 The method for automatically destroying a mobile phone storage data according to claim 5, wherein the method further comprises: prompting the user to input a user name and a password if the SIM card in the mobile phone is replaced; determining whether the entered user name and password are Correct; and if the entered username or password is incorrect, a security command is automatically generated, and the security command is executed to destroy the data stored in the mobile phone. 如申請專利範圍第6項所述之手機存儲資料自動銷毀方法,該方法還包括:若所輸入的用戶名以及密碼正確,進入所述手機的作業系統。 The method for automatically destroying a stored data of a mobile phone according to claim 6, wherein the method further comprises: if the entered username and password are correct, entering the operating system of the mobile phone. 如申請專利範圍第5項所述之手機存儲資料自動銷毀方法,所述安全指令為用戶名、密碼以及系統識別碼的組合,並且該安全指令可藉由短信的方式發送。 The method for automatically destroying a stored data of a mobile phone according to claim 5, wherein the security command is a combination of a username, a password, and a system identifier, and the security command can be sent by using a short message. 如申請專利範圍第5項所述之手機存儲資料自動銷毀方法,該方法還包括:若短信內容與所設置之安全指令不一致,提示所述手機接收到新的短信。 The method for automatically destroying a stored data of a mobile phone according to claim 5, wherein the method further comprises: if the content of the short message is inconsistent with the set security command, prompting the mobile phone to receive a new short message.
TW97123100A 2008-06-20 2008-06-20 System and method for deleting data stored in the mobile phone automatically TWI416931B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97123100A TWI416931B (en) 2008-06-20 2008-06-20 System and method for deleting data stored in the mobile phone automatically

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97123100A TWI416931B (en) 2008-06-20 2008-06-20 System and method for deleting data stored in the mobile phone automatically

Publications (2)

Publication Number Publication Date
TW201002037A TW201002037A (en) 2010-01-01
TWI416931B true TWI416931B (en) 2013-11-21

Family

ID=44825053

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97123100A TWI416931B (en) 2008-06-20 2008-06-20 System and method for deleting data stored in the mobile phone automatically

Country Status (1)

Country Link
TW (1) TWI416931B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI602058B (en) * 2016-09-08 2017-10-11 宜鼎國際股份有限公司 Flash memory device having physical destroy means

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005003932A1 (en) * 2003-07-08 2005-01-13 Guido Costa Souza De Araujo External cipher and authentication device for use with keyboard units
TW200522696A (en) * 2003-12-30 2005-07-01 Inventec Appliances Corp Method of using short message service to transmit command to the mobile phone
TW200640215A (en) * 2005-05-12 2006-11-16 Benq Corp Method of assuring data security for data stored in mobile electronic device
TW200705944A (en) * 2005-07-20 2007-02-01 Inventec Appliances Corp Protect method thereof
TW200823712A (en) * 2006-11-30 2008-06-01 Inventec Corp Method of data protecting

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005003932A1 (en) * 2003-07-08 2005-01-13 Guido Costa Souza De Araujo External cipher and authentication device for use with keyboard units
TW200522696A (en) * 2003-12-30 2005-07-01 Inventec Appliances Corp Method of using short message service to transmit command to the mobile phone
TW200640215A (en) * 2005-05-12 2006-11-16 Benq Corp Method of assuring data security for data stored in mobile electronic device
TW200705944A (en) * 2005-07-20 2007-02-01 Inventec Appliances Corp Protect method thereof
TW200823712A (en) * 2006-11-30 2008-06-01 Inventec Corp Method of data protecting

Also Published As

Publication number Publication date
TW201002037A (en) 2010-01-01

Similar Documents

Publication Publication Date Title
KR101435295B1 (en) Method and system for performing multi-stage virtual sim provisioning and setup on mobile devices
US9292680B2 (en) Mobile terminal detection method and mobile terminal
CN101600208A (en) Mobile phone storage data auto-destruct system and method
WO2017032029A1 (en) Method for encrypting application and user terminal
CN101106455A (en) Identity authentication method and intelligent secret key device
EP2437198B1 (en) Secure PIN reset process
CN104902028A (en) Onekey registration authentication method, device and system
CN110598384B (en) Information protection method, information protection device and mobile terminal
CN105072080A (en) Information verification method, device and system
CN107273150B (en) Preloading firmware downloading and writing method and device
CN111786995B (en) Account password management method, management middleware, system, equipment and storage medium
TWI416931B (en) System and method for deleting data stored in the mobile phone automatically
CN104796532A (en) Method and device for destroying mobile terminal
CN112231649A (en) Firmware encryption processing method, device, equipment and medium
EP3805969B1 (en) Safe operation method and system for storage data
WO2016187966A1 (en) Terminal and method for protecting data security of terminal
CN105488436A (en) Mobile storage equipment access method and device
CN112367339B (en) System security login management method and device
WO2017197689A1 (en) Sim card processing method and apparatus, terminal, and esam chip
JP2008003962A (en) Terminal device authentication system and authentication method and its program using portable telephone
CN110781527B (en) Control register protection method and device
CN110366161B (en) Card opening method and device, related equipment and storage medium
CN103020509A (en) Terminal equipment encryption and decryption method, device and terminal equipment
KR20220093316A (en) Systems and methods for cross-linking risk analysis and one-time encryption
TWI709044B (en) Storage apparatus managing method and storage apparatus managing system

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees