TWI433526B - An equipment and method for automatic defense the mobile phone - Google Patents

An equipment and method for automatic defense the mobile phone Download PDF

Info

Publication number
TWI433526B
TWI433526B TW97126330A TW97126330A TWI433526B TW I433526 B TWI433526 B TW I433526B TW 97126330 A TW97126330 A TW 97126330A TW 97126330 A TW97126330 A TW 97126330A TW I433526 B TWI433526 B TW I433526B
Authority
TW
Taiwan
Prior art keywords
mobile communication
communication device
automatic defense
screen
data
Prior art date
Application number
TW97126330A
Other languages
Chinese (zh)
Other versions
TW201004299A (en
Inventor
Wei Shuo Lin
Original Assignee
Lin Weishuo
Shun Yi Ji Yan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lin Weishuo, Shun Yi Ji Yan filed Critical Lin Weishuo
Priority to TW97126330A priority Critical patent/TWI433526B/en
Publication of TW201004299A publication Critical patent/TW201004299A/en
Application granted granted Critical
Publication of TWI433526B publication Critical patent/TWI433526B/en

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

自動防衛模組及其通報方法 Automatic defense module and notification method thereof

本發明涉及一種機密文件之自動防衛方法,尤指一套自動防衛模組,以及一行動通訊設備結合自動防衛模組之通報方法。 The invention relates to an automatic defense method for confidential documents, in particular to an automatic defense module, and a notification method of a mobile communication device combined with an automatic defense module.

隨著各種行動通訊設備之普遍化之趨勢,尤其是手機已成為現代生活中所不可或缺之溝通設備,甚至以現有之科技技術,手機已可以作為從事商業行為之輔助工具。在這種科技時代趨勢下,行動通訊設備內往往儲存有具重要性、機密性之個人資料、技術秘密或商業秘密。因此,如何保護行動通訊設備內之機密資料已成為這趨勢下之重要課題。 With the generalization of various mobile communication devices, especially mobile phones have become an indispensable communication device in modern life, and even with existing technology, mobile phones can be used as an auxiliary tool for doing business. Under the trend of this technology era, mobile communication devices often store important and confidential personal data, technical secrets or trade secrets. Therefore, how to protect confidential information in mobile communication devices has become an important issue under this trend.

以目前最普及化之行動通訊設備一手機而言,綜觀現今手機防盜技術,約有下列幾種防盜類型,茲予以分別說明: In view of the current mobile phone device, the most popular mobile communication device, the following types of anti-theft technologies are available:

第一類型:手機必須等惡意盜取者輸入錯誤密碼才會啟動防盜裝置,以申請專利號:200510103574.2為例,然,此種防盜類型,有一缺點,若惡意盜取者直接以終端機方式登錄手機,並破解密碼,即可取得機密資料,又或是直接將SIM卡移除,使手機無法發送GPS位置,也無法報警。而手機如裝入不法複製之SIM卡來使用(俗稱王八卡,即惡意者盜打手機,由該被盜打手機之真正機主付手機費用),則警方無法以SIM卡方式來找到此惡意盜取者。 The first type: the mobile phone must wait for the malicious thief to enter the wrong password to start the anti-theft device. The patent number: 200510103574.2 is taken as an example. However, this type of anti-theft has a disadvantage. If the malicious thief directly logs in as a terminal. Mobile phone, and crack the password, you can get confidential information, or directly remove the SIM card, so that the phone can not send GPS location, and can not alarm. If the mobile phone is loaded with a SIM card that cannot be copied (commonly known as Wang Ba card, that is, the malicious person steals the mobile phone, and the real owner of the stolen mobile phone pays the mobile phone fee), the police cannot find the malicious card by means of the SIM card. The stealer.

第二類型:微軟曾推出針對手機防盜部分技術,此技術具有遠端清除手機機密資料功能,但是,此技術並無法達到完全防盜功能,即若手機被盜後,電池、SIM卡被移除,則無法遠端登錄清除機密資料;再者,遠端登錄裝置,除手機密碼保護外,並無任何安全裝置保護,一旦遠端登錄裝置功能開啟,其用意在於機主遺失手機時,可於遠端登錄清除機密資料,但卻無法限制惡意第三人者不斷於遠端測試破解手機密碼,意圖進行遠端登錄,來銷毀機主儲存於手機內之機密資料。又,當機主於遺失或被盜取手機當下,立即對該手機進行遠端清除手機機密資料時,該遺失或被盜取之手機畫面將同步顯示執行清除機密資料畫面,惡意盜取者將立即察覺所盜取之手機資料正在清除中,此時,惡意盜取者只須移除電池,則遠端登錄清除資料行動將被迫終止,無法達到防止機密資料外洩而清除機密資料之功能,只要惡意盜取者在一分鐘內取下手機電池,取出記憶卡,將可輕易取得手機機密資料,而為不法行為。 The second type: Microsoft has introduced a technology for mobile phone anti-theft, this technology has the function of remotely clearing the confidential information of the mobile phone. However, this technology cannot achieve the complete anti-theft function, that is, if the mobile phone is stolen, the battery and the SIM card are removed. The remote login cannot be cleared to clear the confidential information; in addition, the remote login device does not have any security device protection except the mobile phone password protection. Once the remote login device is enabled, the intention is that the owner loses the mobile phone when it is lost. The terminal login clears the confidential information, but it cannot limit the malicious third party to continuously crack the mobile phone password at the remote end, and intends to perform remote login to destroy the confidential information stored by the owner in the mobile phone. In addition, when the owner immediately deletes the mobile phone confidential information on the mobile phone, the lost or stolen mobile phone screen will simultaneously display the clear confidential information screen, and the malicious stealer will Immediately notice that the stolen mobile phone data is being cleared. At this time, the malicious stealer only needs to remove the battery, and the remote login and clear data action will be forced to terminate, failing to prevent the confidential information from being leaked and clearing the confidential data. As long as the malicious thief removes the battery of the mobile phone within one minute and removes the memory card, the confidential information of the mobile phone can be easily obtained, which is illegal.

第三類型:一種手機宣稱可遠端將遺失或被盜之手機鎖住,並發出大量之警報響鈴,該手機之特徵在於,只要當惡意盜取者將所盜取之手機裝上電池,手機內之警報響鈴便會持續不斷啟動。但是,此種手機防盜功能,只要惡意盜取者將電池移除,記憶卡取走,或於電池移除後,拆解手機將手機內之喇叭作短路處理,則手機內之警報響鈴即告失效,仍可被輕易取得手機內之機密資料,以為不法用途。 The third type: a mobile phone claims that the remote can lock the lost or stolen mobile phone, and issues a large number of alarm bells, the mobile phone is characterized in that, as the malicious stealer puts the stolen mobile phone on the battery, The alarm ring in the phone will continue to start. However, such a mobile phone anti-theft function, as long as the malicious stealer removes the battery, removes the memory card, or disassembles the mobile phone to short-circuit the speaker inside the mobile phone after the battery is removed, the alarm ring in the mobile phone is If it fails, the confidential information in the mobile phone can still be easily obtained for illegal use.

第四類型:手機防盜功能在於可遠程遙斃手機,以達到保密功能,雖然如此,但該手機功能只對特定之SIM卡號碼有效,惡意盜取者只要更換SIM卡,一旦SIM卡號碼非原設定之號碼,遠程遙斃手機之防盜功能便無法進行,惡意盜取者仍可輕易取得手機內之機密資料,以為不法用途。 The fourth type: the mobile phone anti-theft function is to remotely access the mobile phone to achieve the security function. However, the mobile phone function is only valid for a specific SIM card number, and the malicious stealer only needs to replace the SIM card once the SIM card number is not original. By setting the number, the anti-theft function of the remote remote mobile phone cannot be carried out, and the malicious stealer can still easily obtain the confidential information in the mobile phone for illegal use.

第五類型:屬於主動式手機防盜類型,此手機防盜方式是以遠端方式,將手機內機密資料打包後,以E-mail方式寄到指定信箱後,清除手機內機密資料。然,此防盜方式與上述四種類型相同,並無法達到真正防盜功能。因為,惡意盜取者可從手機畫面上發現機主正在使用遠端方式來打包資料,並用Outlook寄送資料,此時,只要立即拔除電池,阻斷內部作業,則仍可輕易取得手機內之機密資料,以為不法用途。 The fifth type: belongs to the active type of mobile phone anti-theft. The anti-theft method of this mobile phone is based on the remote mode. After the confidential information in the mobile phone is packaged, it is sent to the designated mailbox by E-mail, and the confidential information in the mobile phone is cleared. However, this anti-theft method is the same as the above four types, and cannot achieve the real anti-theft function. Because the malicious thief can find out from the screen of the mobile phone that the owner is using the remote method to package the data and send the data in Outlook. At this time, as long as the battery is immediately removed and the internal operation is blocked, the mobile phone can still be easily obtained. Confidential information, for illegal purposes.

第六類型:一款商務通F88手機,該款手機宣稱可遠端以簡訊下達指令方式,清除手機中之資料,但僅限於簡訊及電話簿資料,其他儲存於手機內之相片、文件、錄音或錄影之資料並無法清除,惡意盜取者仍可輕易取得手機內之機密資料。 The sixth type: a business-pass F88 mobile phone, which claims to be able to clear the data in the mobile phone by means of a short message, but only for the newsletter and phone book data, other photos, files, and recordings stored in the mobile phone. Or the video information cannot be cleared, and the malicious pirate can still easily obtain the confidential information in the mobile phone.

以目前手機被盜之情況下來看,惡意盜取者一旦取得手機後,大都先行將手機關閉或是移除電池,在無完整防盜系統規劃下,手機電力與開關系統無法被機主控制,現有之指紋、虹膜辨識或防盜蜂鳴器等手機防盜功能完全無法發揮,更遑論使用具高難度之遠端方式清除資料並打包資料之夾帶技術。 In view of the current theft of mobile phones, once a malicious stealer obtains a mobile phone, most of them will shut down or remove the battery first. Under the plan of no complete anti-theft system, the mobile phone power and switching system cannot be controlled by the owner. The anti-theft function of the mobile phone such as fingerprint, iris recognition or anti-theft buzzer can not be played at all, let alone the entrainment technology of clearing data and packing data with a highly remote method.

有鑒於此,本發明提出了一種行動通訊設備結合自動防衛模組之方法,係利用一套自動防衛模組,防止當此行動通訊設備遺失或被盜取時,可於遠端將該行動通訊設備內儲存之所有資料(如:個人資料、商業秘密、技術秘密)全部清除並以GPS定位暨整合語音通報警方系統,以防止機密資料外洩被為不法用途,而造成資料所有者重大損失或危害。 In view of this, the present invention provides a method for combining a mobile communication device with an automatic defense module, which utilizes an automatic defense module to prevent the mobile communication device from being remotely used when the mobile communication device is lost or stolen. All materials stored in the equipment (such as personal data, trade secrets, technical secrets) are all cleared and the police system is notified by GPS positioning and integrated voice to prevent the leakage of confidential information from being illegally used, resulting in significant loss to the data owner or harm.

因此本發明之目的,在於提出一種行動通訊設備結合自動防衛模組之方法。 Therefore, the object of the present invention is to provide a method for combining a mobile communication device with a mobile communication device.

本發明之另一目的,在於提出一套自動防衛模組。 Another object of the present invention is to propose an automatic defense module.

本發明之再一目的,在於提出一套自動防衛模組通報方法。 A further object of the present invention is to propose a method for notification of an automatic defense module.

於是,本發明之一種行動通訊設備結合自動防衛模組之方法,包括發送單位、行動通訊設備、自動防衛模組。所述發送單位用於發執行自動防衛模組之加密指令給行動通訊設備,其中,指令之發送方式係可為直接以機主預先設定之行動通訊設備進行命令下達或利用有線電話、有線或無線電信發送設備、電腦設備撥接、網際網路等方式以直接或轉接終端機設備方式下達指令。所述行動通訊設備係為內建式鋰電池一體成型、使用燒碼設計、特殊資料儲存架構及僅有一個電池充電接口無其他輸出入接口。其中,所述之行動通訊設備係為一特殊資料儲存架構,用於將行動通訊設備內之所有資料集中於一資料儲存料儲存區 之資料儲存架構。所述自動防衛模組包括:自動防衛系統,用於將行動通訊設備內所有資料備份於IDC(Internet Date Center,網路資料中心)第三地資料備份處後,清除行動通訊設備內所有資料;及欺敵系統,用於當自動防衛模組開始啟動執行時,控制行動通訊設備對外顯示之螢幕不斷反覆顯示假象畫面(如:密碼輸入錯誤、密碼核對中與電力不足等畫面),目的在於虛假應對惡意盜取者,以使自動防衛模組順利執行。 Therefore, the mobile communication device of the present invention combines the methods of the automatic defense module, including the transmitting unit, the mobile communication device, and the automatic defense module. The sending unit is configured to send an encryption command of the automatic defense module to the mobile communication device, wherein the sending method of the command may be directly issued by the mobile device preset by the owner, or by using a wired telephone, wired or wireless Telecommunications transmitting equipment, computer equipment dialing, Internet, etc., can be issued by direct or transfer terminal equipment. The mobile communication device is a built-in lithium battery integrated molding, using a burn code design, a special data storage structure and only one battery charging interface without other input and output interfaces. The mobile communication device is a special data storage architecture for concentrating all data in the mobile communication device in a data storage material storage area. Data storage architecture. The automatic defense module includes: an automatic defense system for backing up all the data in the mobile communication device to the third data backup office of the IDC (Internet Date Center), and clearing all the data in the mobile communication device; And the bullying system is used to control the external display screen of the mobile communication device to repeatedly display the illusion screen (such as: password input error, password check and insufficient power, etc.) when the automatic defense module starts to be executed, and the purpose is to falsely Respond to malicious thefts so that the automatic defense module can be executed smoothly.

而,本發明之一種通訊設備結合自動防衛模組之方法亦可結合行動通訊業者所提供之客服機制及GPS整合暨語音通報警方系統,來達到警民聯防,尋回被盜手機,杜絕不法行為之滋長。其中,本發明之自動防衛模組結合客服中心及GPS整合暨語音通報警方系統之方法包括客服中心、發送單位、行動通訊設備、自動防衛模組及GPS系統。 However, the communication device of the present invention combined with the automatic defense module method can also be combined with the customer service mechanism provided by the mobile communication industry and the GPS integration and voice notification police system to achieve the joint defense of the police and the people, to recover the stolen mobile phone, and to prevent illegal activities. It grows. The method of the automatic defense module of the present invention combined with the customer service center and the GPS integration and voice notification police system includes a customer service center, a sending unit, a mobile communication device, an automatic defense module and a GPS system.

述客服中心,用於確認行動通訊設備之機主1身份之任一個行動通訊業者所提供之服務機制,包括真人線上客服、語音客服在內。所述發送單位,用於發送啟動自動防衛系統指令給行動通訊設備,其中,所述發送單位用於發送執行自動防衛模組之加密指令給行動通訊設備,其中,指令之發送方式係可為直接以機主預先設定之行動通訊設備進行命令下達或利用有線電話、有線或無線電信發送設備、電腦設備撥接、網際網路等方式以直接或轉接終端機設備方式下達指令。上述亦可以單一Mac位置終端機加密發送指令。 The customer service center is used to confirm the service mechanism provided by any mobile communication provider of the mobile communication device, including live online customer service and voice customer service. The sending unit is configured to send an instruction to start an automatic defense system to the mobile communication device, where the sending unit is configured to send an encryption instruction for executing the automatic defense module to the mobile communication device, where the sending method of the instruction may be direct Commands are issued by the mobile phone's pre-set mobile communication device or by means of wired telephone, wired or wireless telecommunication transmission equipment, computer equipment dial-up, internet, etc. to directly or transfer terminal equipment. The above can also be used to encrypt and send commands to a single Mac location terminal.

所述行動通訊設備係為內建式鋰電池一體成型、使用 燒碼設計、特殊資料儲存架構及僅有一個電池充電接口無其他輸出入接口。其中,所述之行動通訊設備係為一特殊資料儲存架構,用於將行動通訊設備內之所有資料集中於一資料儲存區之資料儲存架構。所述自動防衛模組包括:自動防衛系統,用於將行動通訊設備內所有資料備份於IDC(Internet Date Center,網路資料中心)第三地資料備份處後,清除行動通訊設備內所有資料;及欺敵系統,用於當自動防衛模組開始啟動執行時,控制使手機螢幕不斷反覆顯示虛假畫面(如:密碼輸入錯誤、密碼核對中與電力不足等畫面),目的在於虛假應對惡意盜取者,以使自動防衛模組順利執行。所述GPS系統(Global Positioning System,GPS,全球定位系統),包括:利用GPS定位、發送GPS位置及將遺失或被盜取之行動通訊設備所在之經、緯度位置以語音方式通報警方或本人或第三人。 The mobile communication device is integrally formed and used for a built-in lithium battery Burn code design, special data storage architecture and only one battery charging interface without other input and output interfaces. The mobile communication device is a special data storage architecture for centralizing all data in the mobile communication device in a data storage structure of a data storage area. The automatic defense module includes: an automatic defense system for backing up all the data in the mobile communication device to the third data backup office of the IDC (Internet Date Center), and clearing all the data in the mobile communication device; And the bullying system, when the automatic defense module starts to execute, the control causes the mobile phone screen to repeatedly display false images (such as password input error, password check and insufficient power), in order to falsely respond to malicious theft. In order to make the automatic defense module run smoothly. The GPS system (Global Positioning System, GPS) includes: using GPS to locate, transmitting a GPS location, and simultaneously notifying the police or the person or the latitude and longitude position of the lost or stolen mobile communication device The third person.

上述GPS系統通報作業亦可以以行動通訊設備發送簡訊方式通報警方或第三人或本人。 The above-mentioned GPS system notification operation can also be notified to the police or a third person or himself by sending a short message to the mobile communication device.

一種行動通訊設備結合自動防衛模組方法,尤指一套自動防衛模組,其可對行動通訊設備內所有資料進行清除,包括一自動防衛系統、一欺敵系統,其中:所述自動防衛系統,用於將行動通訊設備內所有資料清除;所述欺敵系統,用於當自動防衛系統啟動時,同步控制使行動通訊設備之螢幕不斷顯示假象畫面。 A mobile communication device combined with an automatic defense module method, especially an automatic defense module, which can clear all data in the mobile communication device, including an automatic defense system and a bullying system, wherein: the automatic defense system For clearing all data in the mobile communication device; the bullying system is used for synchronous control to enable the screen of the mobile communication device to continuously display an illusion screen when the automatic defense system is started.

當自動防衛系統在接收指令後,將行動通訊系統中之所有資料以0/1覆蓋方式清除;在執行自動防衛模組之自動防衛系統時,同步啟動欺敵系統;欺敵系統之啟動會讓 行動通訊設備畫面不斷顯示假象畫面,而實際上行動通訊設備內部之自動防衛系統正在將行動通訊設備內所有資料備份於IDC(Internet Date Center,網路資料中心)第三地資料備份處後,執行清除行動通訊設備內所有資料;當自動防衛系統將資料清除完畢後,欺敵系統控制使行動通訊設備之螢幕上顯示假象畫面(如:電力不足、關機中之畫面,並將螢幕電源、鍵盤、LED光源系統,響鈴喇叭、聽筒喇叭與狀態顯示之LED關閉等),創造出行動通訊設備因電力不足關閉之假象,實際上正進行通報作業。 When the automatic defense system receives the command, all the data in the mobile communication system is cleared by 0/1; when the automatic defense system of the automatic defense module is executed, the bullying system is started synchronously; the startup of the bullying system will be The mobile communication device screen constantly displays the illusion screen, but in fact, the automatic defense system inside the mobile communication device is backing up all the data in the mobile communication device to the third place data backup office of the IDC (Internet Date Center). Clear all the information in the mobile communication device; when the automatic defense system clears the data, the system control of the bullying system displays the illusion screen on the screen of the mobile communication device (eg, insufficient power, shutdown screen, and screen power, keyboard, The LED light source system, the ringing horn, the earpiece horn and the status display LED are turned off, etc., creating an illusion that the mobile communication device is turned off due to insufficient power, and is actually conducting the notification operation.

其中,所述通報作業,係可以GPS系統(Global Positioning System,GPS,全球定位系統),包括:利用GPS定位、發送GPS位置及將遺失或被盜取之行動通訊設備所在之經、緯度位置以語音方式通報警方或本人或第三人,又或者以行動通訊設備發送簡訊方式通報以行動通訊設備發送簡訊方式通報警方或第三人或本人。 The notification operation may be a GPS system (Global Positioning System, GPS), including: using GPS to locate, transmit the GPS location, and the location of the latitude and longitude of the mobile communication device that will be lost or stolen. The police or the person or a third person may be notified by voice or by means of a mobile communication device to send a text message to the police or a third party or himself by means of a mobile communication device.

相較於習知技術,本發明之一種行動通訊設備結合自動防衛模組方法,因行動通訊設備係為內建式鋰電池一體成型,使用燒碼設計、特殊資料儲存架構、僅有一個電池充電接口無其他輸出入接口或上述組合之特徵,不易拆毀,在執行作業時,不會如同現一般市面上之行動通訊設備(如:手機),因惡意盜取者拔下該行動通訊設備之電池及SIM卡,使其中斷內部防盜作業後,取得該行動通訊設備內所有資料來進行不法行為,而且該行動通訊設備之機主可事先設定IDC(Internet Date Center,網路資料中心)第三地資料備份處,如此一來,不慎遺失或遭惡意盜取之行動 通訊設備內之資料不旦不會被外洩為不法行為,還可保留該行動通訊設備內資料,確保了行動通訊設備內機密資料之安全性,避免個人資料、技術秘密或商業秘密外洩之危險。 Compared with the prior art, the mobile communication device of the present invention is combined with the automatic defense module method, because the mobile communication device is integrally formed with a built-in lithium battery, using a burn code design, a special data storage structure, and only one battery charging. The interface has no other input/output interface or the characteristics of the above combination, and is not easy to be demolished. When performing the operation, it will not be like the mobile communication equipment (such as mobile phone) on the market, because the malicious stealer unplugs the battery of the mobile communication device. And the SIM card, after interrupting the internal anti-theft operation, obtaining all the information in the mobile communication device for illegal behavior, and the owner of the mobile communication device can set the IDC (Internet Date Center) third place in advance. Data backup office, in this way, accidentally lost or maliciously stolen The information in the communication equipment will not be leaked into illegal activities, and the information in the mobile communication equipment can be retained to ensure the security of the confidential information in the mobile communication equipment, and to avoid the leakage of personal data, technical secrets or trade secrets. Danger.

為便 貴審查委員能對本發明之目的、系統、方法、特徵及功效有更近一步之認識與了解,茲舉較佳實施例配合圖式,詳細說明如下: In order that the review committee can have a closer understanding and understanding of the objects, systems, methods, features and functions of the present invention, the preferred embodiment and the drawings are described in detail below:

先行一提的是,本較佳實施例中以終端機且具有單一Mac位置加密發送指令為其發送單位進行發送指令方式,但亦可採用其他方式為發送單位進行發送指令,所述之其他方式發送指令,包括:直接以機主預先設定之行動通訊設備進行命令下達或利用有線電話、有線或無線電信發送設備、電腦設備撥接、網際網路等方式以直接或轉接終端機設備方式下達指令。 It is to be noted that, in the preferred embodiment, the terminal device has a single Mac location encryption transmission command for sending units to transmit units, but other methods may be used to send commands to the sending unit. Sending instructions, including: directly issuing commands by the mobile communication device preset by the owner or using wired telephone, wired or wireless telecommunication transmitting device, computer device dialing, internet, etc. to directly or transfer terminal equipment instruction.

首先,請參閱圖一所示,係本發明一種行動通訊設備結合自動防衛模組方法之一較佳實施架構示意圖。該方法主要包括行動通訊設備之機主1,客服中心2,終端機3,行動通訊設備4,自動防衛模組5及GPS系統6。所述客服中心2是用於確認行動通訊設備之機主1身份之任一個行動通訊業者所提供之服務機制,包括真人線上客服、語音客服在內。客服中心2於確認行動通訊設備之機主1身份後,下達執行自動防衛模組5指令給終端機3。所述終端機3為單一Mac位置,本身具有加密稽核功能,於收到客服 中心2所下達執行自動防衛模組5指令後,發送加密指令給該行動通訊設備4進行稽核。行動通訊設備4稽核正確性無誤後,執行自動防衛模組5。所述行動通訊設備4係為內建式鋰電池一體成型,燒碼設計、特殊資料儲存架構及僅有一個電池充電接口無其他輸出入接口,使行動通訊設備4本身不易拆毀,若強行拆毀,將會一併破壞行動通訊設備4系統及行動通訊設備4內所有資料。其中,上述之特殊資料儲存架構係用於將行動通訊設備內之所有資料集中於一資料儲存區。 First, please refer to FIG. 1 , which is a schematic diagram of a preferred implementation architecture of a mobile communication device and an automatic defense module method according to the present invention. The method mainly includes a mobile communication device owner 1, a customer service center 2, a terminal device 3, a mobile communication device 4, an automatic defense module 5 and a GPS system 6. The customer service center 2 is a service mechanism provided by any mobile communication company for confirming the identity of the mobile device 1 of the mobile communication device, including live online customer service and voice customer service. After confirming the identity of the owner 1 of the mobile communication device, the customer service center 2 issues an instruction to execute the automatic defense module 5 to the terminal 3. The terminal device 3 is a single Mac location, and has a cryptographic audit function itself, and receives the customer service. After the center 2 issues an instruction to execute the automatic defense module 5, an encryption command is sent to the mobile communication device 4 for auditing. After the mobile communication device 4 audits the correctness, the automatic defense module 5 is executed. The mobile communication device 4 is a built-in lithium battery integrated molding, burning code design, special data storage structure and only one battery charging interface without other input and output interfaces, so that the mobile communication device 4 itself is not easy to be demolished, and if it is forcibly demolished, All the information in the mobile communication device 4 system and the mobile communication device 4 will be destroyed together. The special data storage architecture described above is used to concentrate all the data in the mobile communication device in a data storage area.

其中,上述之行動通訊設備4還包括其內部系統程式設定關機密碼是採用密碼組,但也可以採用指紋辨識、虹膜辨識方式,而且密碼三次輸入錯誤,該行動通訊設備4即啟動之鍵盤即被封鎖,若遺失或被盜取行動通訊設備之機主1未進行及時報失之緊急作業,則行動通訊設備4將會自動啟動自動防衛模組5,會將機密資料高度壓縮,用SSL及128bit加密備份到IDC(Internet Date Center,網路資料中心)第三地資料備份處並清除所有資料,啟動GPS系統6(Global Positioning System,GPS,全球定位系統),進行GPS定位61、發送GPS位置及GPS整合語音通報警方系統。 The mobile communication device 4 further includes an internal system program setting, and the shutdown password is a password group, but the fingerprint identification and the iris recognition method may also be adopted, and the password is input three times incorrectly, and the keyboard of the mobile communication device 4 is activated. Blocking, if the owner of the mobile communication device is lost or stolen, the mobile communication device 4 will automatically start the automatic defense module 5, which will highly compress the confidential data, using SSL and 128bit. Encrypted backup to IDC (Internet Date Center, Network Data Center) third place data backup and clear all data, start GPS System 6 (Global Positioning System, GPS, Global Positioning System), GPS positioning 61, send GPS location and GPS integrated voice notification police system.

因此,若惡意盜取者在盜取他人之行動通訊設備4時,必須先輸入關機密碼,才能將此行動通訊設備4關機,來防止行動通訊設之機主1遲延報失時,造成重大損失。所述自動防衛模組5包含自動防衛系統51及欺敵系統52,用於對行動通訊設備4內所有資料進行備份到IDC(Internet Date Center,網路資料中心)第三地資料備份處並清除所有資料後,啟動GPS系統6(Global Positioning System,GPS,全球定位系統),進行GPS定位61、發送GPS位置及GPS整合語音通報警方系統。 Therefore, if the malicious stealer is stealing another person's mobile communication device 4, the mobile communication device 4 must be input first to shut down the mobile communication device 4, so as to prevent the mobile communication device owner 1 from delaying reporting, causing a major loss. The automatic defense module 5 includes an automatic defense system 51 and a bullying system 52 for backing up all data in the mobile communication device 4 to the IDC (Internet). Date Center, Network Data Center) After the third data backup and clear all the data, start GPS System 6 (Global Positioning System, GPS, Global Positioning System), GPS positioning 61, send GPS location and GPS integrated voice notification police system.

所述,GPS整合語音通報警方系統,係利用GPS定位及發送GPS位置,將遺失或被盜取之行動通訊設備所在之經、緯度位置以語音方式通報警方,直到警方收到報警資料查緝到GPS位置為止。 The GPS integrated voice notification police system uses the GPS to locate and transmit the GPS location, and the latitude and longitude position of the lost or stolen mobile communication device is reported to the police by voice until the police receive the alarm data and check the GPS. Position up to now.

而在本較佳實施例中,是將本發明並結合客服中心機制及GPS系統為說明例,但其亦可直接實施本發明之一種通訊設備結合自動防衛模組或擇一選擇結合客服中心機制、通報作業。 In the preferred embodiment, the present invention is combined with a customer service center mechanism and a GPS system as an illustrative example, but it can also directly implement a communication device of the present invention in combination with an automatic defense module or an alternative selection of a customer service center mechanism. , reporting work.

如圖二所示,是本發明一種行動通訊設備結合自動防衛模組之一較佳實施方法流程圖(本較佳實施方法流程圖是以本發明結合客服中心機制、GPS系統之較佳實施方法流程圖)。 As shown in FIG. 2 , it is a flow chart of a preferred implementation method of a mobile communication device combined with an automatic defense module according to the present invention. The flow chart of the preferred embodiment is a preferred implementation method of the customer service center mechanism and the GPS system according to the present invention. flow chart).

首先,步驟S10,行動通訊設備之機主1於遺失或被盜取時立即向手機客服中心2進行電話報失並執行緊急作業。 First, in step S10, the owner 1 of the mobile communication device immediately reports the loss to the mobile phone customer service center 2 and performs an emergency operation when it is lost or stolen.

步驟S11,客服中心2於接到行動通訊設備之機主1報失電話後,確認行動通訊設備之機主1身份是否確為該報失行動通訊設備4之所有者。如上所述,客服中心2是用於確認行動通訊設備之機主1身份之任一個行動通訊業者所提供之服務機制,包括真人線上客服、語音客服在內。若確認該行動通訊設備之機主1之身份不正確,則步驟S12,客服中心2任務終止,不進行作業。 In step S11, after receiving the lost call from the owner 1 of the mobile communication device, the customer service center 2 confirms whether the identity of the owner 1 of the mobile communication device is indeed the owner of the lost communication device 4. As mentioned above, the customer service center 2 is a service mechanism provided by any mobile communication company for confirming the identity of the mobile communication device, including live online customer service and voice customer service. If it is confirmed that the identity of the owner 1 of the mobile communication device is incorrect, then in step S12, the call center 2 task is terminated and no work is performed.

若確認行動通訊設備之機主1身份正確,則步驟S13,客服中心2將會下達執行自動防衛模組5指令給加密設備。所述之加密設備為一單一Mac位置之終端機3。 If it is confirmed that the identity of the owner 1 of the mobile communication device is correct, then in step S13, the customer service center 2 will issue an instruction to execute the automatic defense module 5 to the encryption device. The encryption device is a terminal 3 of a single Mac location.

步驟S14,此單一Mac位置之終端機3具有加密稽核功能,透過終端機3之單一Mac位置,發送執行自動防衛模組5指令給行動通訊設備4。若行動通訊設備4無法接收指令,則步驟S15,將無法接收指令訊息透過終端機3回報給客服中心2,由客服中心2告知行動通訊設備之機主1,同時系統自動再次下達指令給加密設備S13並再次發送指令S14。所述之無法接收指令之原因,會因行動通訊設備4殘餘電力不足收訊不良或行動通訊設備4位置暫時離開發話區域,如基地台圈外,捷運進行中等情況下,導致收訊不良而暫時無法接收指令。 In step S14, the terminal 3 of the single Mac location has a cryptographic audit function, and transmits an instruction to execute the automatic defensive module 5 to the mobile communication device 4 through a single Mac location of the terminal 3. If the mobile communication device 4 is unable to receive the command, in step S15, the unreceived command message is reported to the customer service center 2 through the terminal device 3, and the customer service center 2 informs the owner 1 of the mobile communication device, and the system automatically issues the command again to the encryption device. S13 and sends instruction S14 again. The reason why the instruction cannot be received is that the residual power of the mobile communication device 4 is insufficient, or the location of the mobile communication device 4 is temporarily away from the development zone, such as the base station circle, and the MRT is in a medium condition, resulting in poor reception. The command cannot be received temporarily.

若行動通訊設備4接收到指令後,則步驟S16,行動通訊設備4進一步稽核指令之正確性,包括行動通訊設備4接收到終端機3所發送之加密指令後,進行自動解密指令並確認單一Mac位置。如上所述,當行動通訊設備4進行步驟S16稽核指令之正確性時,是一內部作業,行動通訊設備對外顯示之螢幕畫面並不會呈現響鈴、震動或亮光或任一訊號,使惡意盜取行動通訊設備者不會發現內部作業狀況。當行動通訊設備4進一步稽核指令之正確性,其結果為稽核不正確時,則步驟S17,行動通訊設備4將不執行命令後,步驟S12任務終止。 If the mobile communication device 4 receives the command, then in step S16, the mobile communication device 4 further audits the correctness of the command, including the mobile communication device 4 receiving the encrypted command sent by the terminal device 3, performing an automatic decryption command and confirming the single Mac. position. As described above, when the mobile communication device 4 performs the correctness of the auditing instruction in step S16, it is an internal operation, and the screen displayed by the mobile communication device does not present a ringing, vibrating or bright light or any signal, so that the malicious thief Those who take mobile communication devices will not find internal working conditions. When the mobile communication device 4 further audits the correctness of the instruction, and the result is that the audit is incorrect, then in step S17, after the mobile communication device 4 will not execute the command, the step S12 is terminated.

若行動通訊設備4之稽核結果正確時,則步驟S18,行動通訊設備4開始執行自動防衛模組5。所述之自動防衛模 組5,請參閱圖三以進一步說明自動防衛模組流程圖。 If the audit result of the mobile communication device 4 is correct, then in step S18, the mobile communication device 4 starts executing the automatic defense module 5. Automatic defense mode Group 5, please refer to Figure 3 to further illustrate the flow chart of the automatic defense module.

步驟S19,當行動通訊設備4執行自動防衛模組5行動通訊設備所有資料清除完畢後,即啟動GPS系統6(Global Positioning System,GPS,全球定位系統),立即進行GPS定位61、發送GPS位置62與GPS整合語音通報警方系統63。所述,GPS整合語音通報警方系統,係利用GPS定位及發送GPS位置,將遺失或被盜取之行動通訊設備所在之經、緯度位置以語音方式通報警方語音通報警方,直到警方收到報警資料查緝到GPS位置為止。 Step S19, when the mobile communication device 4 executes the automatic defense module 5, the mobile communication device clears all the data, and then starts the GPS system 6 (Global Positioning System, GPS), and immediately performs GPS positioning 61 and sends the GPS position 62. Integrated voice notification with the GPS police system 63. The GPS integrated voice notification police system uses the GPS to locate and transmit the GPS location, and the voice and the latitude and longitude position of the lost or stolen mobile communication device are notified by voice to the police until the police receive the alarm data. Check to the GPS location.

接著,請參閱圖三,是本發明之自動防衛模組流程圖。 Next, please refer to FIG. 3, which is a flow chart of the automatic defense module of the present invention.

如上述圖二之說明,當行動通訊設備4進行步驟S16稽核指令之正確性,且行動通訊設備4之稽核結果正確時,則步驟S18,行動通訊設備4開始執行自動防衛模組5。 As illustrated in FIG. 2 above, when the mobile communication device 4 performs the correctness of the auditing instruction in step S16, and the audit result of the mobile communication device 4 is correct, then in step S18, the mobile communication device 4 starts executing the automatic defense module 5.

首先,步驟S181,自動防衛模組5之啟動,會先使行動通訊設備4關閉觸控功能與鍵盤、語音等任何輸入功能。於步驟S181中,當行動通訊設備4開始執行自動防衛模組5時,將使自動防衛模組5內之自動防衛系統51及欺敵系統52同步啟動作業。 First, in step S181, the activation of the automatic defense module 5 first causes the mobile communication device 4 to turn off the touch function and any input functions such as a keyboard and a voice. In step S181, when the mobile communication device 4 starts executing the automatic defense module 5, the automatic defense system 51 and the bullying system 52 in the automatic defense module 5 are synchronized to start the operation.

於步驟S182、步驟S184中,步驟S182,執行自動防衛系統51,將行動通訊設備4中之所有資料進行備份到IDC(Internet Date Center,網路資料中心)第三地資料備份處後,將行動通訊設4之所有資料以0/1覆蓋方式清除時。如上述,在執行步驟S182自動防衛系統51時,同步執行步驟S184,啟動欺敵系統52。所述行動通訊設備4中之所有資料係為影像檔、文字檔、語音檔、音效檔、程式檔、 電影檔、網頁檔、資料庫檔及加密檔。所述資料備份到IDC(Internet Date Center,網路資料中心)第三地資料備份處,是將資料以SSL(Secure Socket Layer)及128bit加密並高度壓縮回傳到IDC(Internet Date Center,網路資料中心)第三地資料備份處。 In step S182, step S184, step S182, the automatic defense system 51 is executed, and all the data in the mobile communication device 4 is backed up to the third place data backup office of the IDC (Internet Date Center), and the action is taken. When all the data of communication setting 4 is cleared by 0/1 coverage. As described above, when the automatic defense system 51 is executed in step S182, step S184 is simultaneously executed to activate the bullying system 52. All the data in the mobile communication device 4 are an image file, a text file, a voice file, a sound file, a program file, Movie files, web files, database files and encrypted files. The data is backed up to the third data backup site of the IDC (Internet Date Center), which encrypts the data with SSL (Secure Socket Layer) and 128-bit and highly compressed back to the IDC (Internet Date Center, network). Data Center) Third place data backup office.

步驟S185,同步啟動欺敵系統52時,行動通訊設備4畫面將不斷顯示密碼輸入錯誤、密碼核對中之畫面,而實際上行動通訊設備4內部之自動防衛系統51正在將行動通訊設備4資料備份於IDC(Internet Date Center,網路資料中心)第三地資料備份處後,執行清除行動通訊設備4內所有資料。 Step S185, when the fraudulent system 52 is started synchronously, the screen of the mobile communication device 4 will continuously display the password input error and the password check screen, and in fact, the automatic defense system 51 inside the mobile communication device 4 is backing up the mobile communication device 4 After the third place data backup office of the IDC (Internet Date Center), all the data in the mobile communication device 4 is cleared.

於步驟S183、步驟S186、步驟S19中,當步驟S183,自動防衛系統51將行動通訊設備4內所有資料清除完畢後,步驟S186之欺敵系統51會同步控制使行動通訊設備之螢幕上顯示假象畫面(如:電力不足、關機中之畫面,並將螢幕電源、鍵盤、LED光源系統、響鈴喇叭、聽筒喇叭與狀態顯示之LED關閉等),創造出行動通訊設備因電力不足關閉之假象,實際上正進行步驟S19啟動GPS系統6(Global Positioning System,GPS,全球定位系統)。如上述,GPS系統6(Global Positioning System,GPS,全球定位系統)立即進行GPS定位61、發送GPS位置62與GPS整合語音通報警方系統63為止。 In step S183, step S186, step S19, after the automatic defense system 51 clears all the data in the mobile communication device 4 in step S183, the bullying system 51 in step S186 synchronously controls to display the illusion on the screen of the mobile communication device. Screens (such as power shortage, shutdown screen, and turn off the screen power, keyboard, LED light source system, ring speaker, handset speaker and status display LED), create the illusion that the mobile communication device is closed due to insufficient power. Actually, step S19 is being started to activate the GPS system 6 (Global Positioning System, GPS, Global Positioning System). As described above, the GPS system 6 (Global Positioning System, GPS) immediately performs GPS positioning 61, transmits the GPS position 62, and the GPS integrated voice notification police system 63.

值得一提的是,自動防衛系統51將行動通訊設備4資料備份於IDC(Internet Date Center,網路資料中心)第三地資料備份處後,執行清除行動通訊設備內所有資料。其所 述之IDC(Inyernet Date Center,網路資料中心)第三地資料備份處須由行動通訊設備之機主1事先設定,若行動通訊設備之機主1無設定將資料另存IDC(Internet Date Center,網路資料中心)第三地資料備份處,則自動防衛系統51將會直接執行清除行動通訊設備4內所有資料。事後,當行動通訊設備之機主1取回遺失或被惡意盜取之行動通訊設備4,行動通訊設備4因已執行自動防衛模組5,行動通訊設備4內所有資料已被銷毀且無法復原,此時行動通訊設備之機主1所取回之行動通訊設備4將還原成原始值,如同新的行動通訊設備般,行動通訊設備4內所有資料區全為空白,行動通訊設備之機主1必須重新輸入新資料或可轉賣第三人或可為其他處置。 It is worth mentioning that the automatic defense system 51 backs up the data of the mobile communication device 4 to the third data backup office of the IDC (Internet Date Center), and performs all the data in the mobile communication device. Its place The IDC (Inyernet Date Center) third-party data backup office must be set in advance by the owner 1 of the mobile communication device. If the mobile communication device owner 1 has no settings, the data will be saved in the IDC (Internet Date Center, In the third data backup area of the network data center, the automatic defense system 51 will directly execute all the data in the mobile communication device 4. Afterwards, when the owner of the mobile communication device 1 retrieves the lost or maliciously stolen mobile communication device 4, the mobile communication device 4 has executed the automatic defense module 5, and all the data in the mobile communication device 4 has been destroyed and cannot be restored. At this time, the mobile communication device 4 retrieved by the owner 1 of the mobile communication device will be restored to the original value. Like the new mobile communication device, all the data areas in the mobile communication device 4 are blank, and the owner of the mobile communication device 1 New information must be re-entered or a third person may be resold or may be disposed of.

另外,若行動通訊設備之機主1在遺失或被盜取行動通訊設備4時,未立即向客服中心2來報失行動通訊設備4並執行自動防衛模組5及GPS系統6尋回行動通訊設備4,有可能會錯失搶救機密資料與尋回所遺失或被盜取之行動通訊設備的黃金時間,因為行動通訊設備4所內建之鋰電池,會因為時間一長而電力耗盡,導致無電力可供行動通訊設備4系統啟動,而無法進行自動防衛模組5及GPS系統6來尋回所遺失或被盜取之行動通訊設備4。若行動通訊設之機主1是於行動通訊設備4已耗盡電力關機中且未即時充電,而不慎使行動通訊設備4遺失或被盜取,則依舊會因無電力可供該行動通訊設4系統啟動,而無法進行自動防衛模組5及GPS系統6來尋回所遺失或被盜取之行動通訊設備4。雖然所述行動通訊設備4因此無法執行自動防 衛模組5及GPS系統6來尋回所遺失或被盜取之行動通訊設備4,但基於本發明一種行動通訊設備結合自動防衛模組方法所述之行動通訊設備4,機體係為內建式鋰電池一體成型、使用燒碼設計、特殊資料儲存架構及僅有一個電池充電接口無其他輸出入接口之特殊設計,若強行破壞,將使行動通訊設備4內部系統亦遭強力毀壞,其行動通訊設備4內部之所有資料亦一併毀壞,並不會遭惡意盜取者取得行動通訊設備4內部所有資料來進行不法行為。 In addition, if the owner 1 of the mobile communication device loses or steals the mobile communication device 4, the mobile communication device 4 is not immediately reported to the customer service center 2, and the automatic defense module 5 and the GPS system 6 are retrieved for the mobile communication device. 4. It may miss the golden time of reserving confidential information and retrieving lost or stolen mobile communication devices, because the lithium battery built in mobile communication device 4 will run out of power due to a long time, resulting in no The power can be activated by the mobile communication device 4 system, and the automatic defense module 5 and the GPS system 6 cannot be used to retrieve the lost or stolen mobile communication device 4. If the mobile communication device 1 is in the state that the mobile communication device 4 has run out of power and is not charging immediately, and the mobile communication device 4 is inadvertently lost or stolen, the mobile communication device 4 will still be available for the mobile communication. The system is activated, and the automatic defense module 5 and the GPS system 6 cannot be used to retrieve the lost or stolen mobile communication device 4. Although the mobile communication device 4 is therefore unable to perform automatic defense The security module 5 and the GPS system 6 are used to retrieve the lost or stolen mobile communication device 4, but based on the mobile communication device of the invention, the mobile communication device 4 is integrated with the automatic defense module method. Lithium battery integrated molding, using burn code design, special data storage architecture and a special design with only one battery charging interface and no other input and output interfaces. If the damage is forcibly destroyed, the internal system of mobile communication device 4 will also be destroyed strongly. All the information inside the communication device 4 is also destroyed, and the malicious stealer obtains all the information in the mobile communication device 4 for illegal activities.

以上所述僅為本發明一種行動通訊設備結合自動防衛模組之較佳實施方式,然其並非用以限定本發明。任何未脫離本發明之精神和範圍內,而對其進行之等效修改或變更,均應包含於後所附之申請專利範圍中。 The above description is only a preferred embodiment of a mobile communication device in combination with an automatic defense module of the present invention, which is not intended to limit the present invention. Any equivalent modifications or alterations of the present invention are intended to be included within the scope of the appended claims.

1‧‧‧機主 1‧‧‧Owner

2‧‧‧客服中心 2‧‧‧Customer Service Center

3‧‧‧終端機 3‧‧‧ Terminal

4‧‧‧行動通訊設備 4‧‧‧Mobile communication equipment

5‧‧‧自動防衛模組 5‧‧‧Automatic Defense Module

51‧‧‧自動防衛系統 51‧‧‧Automatic Defence System

52‧‧‧欺敵系統 52‧‧‧ Bullying system

6‧‧‧GPS系統 6‧‧‧GPS system

61‧‧‧GPS定位 61‧‧‧GPS positioning

62‧‧‧發送GPS位置 62‧‧‧Send GPS location

63‧‧‧GPS整合語音通報警方系統 63‧‧‧GPS integrated voice notification police system

S10~S19‧‧‧行動通訊設備結合自動防衛模組之實施方法步驟 Implementation steps of S10~S19‧‧‧ mobile communication equipment combined with automatic defense module

S181~S186‧‧‧自動防衛模組流程步驟 S181~S186‧‧‧Automatic Defense Module Process Steps

圖一係為本發明一種行動通訊設備結合自動防衛模組方法之一較佳實施架構示意圖;圖二係為本發明一種行動通訊設備結合自動防衛模組之一較佳實施流程方法流程圖;及圖三係為本發明之自動防衛模組流程圖。 1 is a schematic diagram of a preferred implementation architecture of a method for combining a mobile communication device with an automatic defense module according to the present invention; and FIG. 2 is a flow chart of a preferred implementation method of a mobile communication device combined with an automatic defense module according to the present invention; Figure 3 is a flow chart of the automatic defense module of the present invention.

1‧‧‧機主 1‧‧‧Owner

2‧‧‧客服中心 2‧‧‧Customer Service Center

3‧‧‧終端機 3‧‧‧ Terminal

4‧‧‧行動通訊設備 4‧‧‧Mobile communication equipment

5‧‧‧自動防衛模組 5‧‧‧Automatic Defense Module

51‧‧‧自動防衛系統 51‧‧‧Automatic Defence System

52‧‧‧欺敵系統 52‧‧‧ Bullying system

6‧‧‧GPS系統 6‧‧‧GPS system

61‧‧‧GPS定位 61‧‧‧GPS positioning

62‧‧‧發送GPS位置 62‧‧‧Send GPS location

63‧‧‧GPS整合語音通報警方系統 63‧‧‧GPS integrated voice notification police system

S10~S19‧‧‧行動通訊設備結合自動防衛模組之實施方法步驟 Implementation steps of S10~S19‧‧‧ mobile communication equipment combined with automatic defense module

S181~S186‧‧‧自動防衛模組流程步驟 S181~S186‧‧‧Automatic Defense Module Process Steps

Claims (9)

一種自動防衛模組,其可對行動通訊設備內所有資料進行清除,包括一自動防衛系統、一欺敵系統,其中:自動防衛系統,用於將行動通訊設備內所有資料清除;欺敵系統,用於當自動防衛系統啟動時,同步控制使行動通訊設備之螢幕不斷顯示假象畫面;其中,該自動防衛系統在接收指令後,將該行動通訊設備中之所有資料以0/1覆蓋方式清除;且該欺敵系統在該行動通訊設備顯示假象畫面同時,該自動防衛系統正在進行通報作業。 An automatic defense module capable of clearing all data in a mobile communication device, including an automatic defense system and a bullying system, wherein: an automatic defense system for clearing all data in the mobile communication device; a bullying system, When the automatic defense system is started, the synchronization control causes the screen of the mobile communication device to continuously display the illusion screen; wherein the automatic defense system clears all the data in the mobile communication device by 0/1 after receiving the instruction; And the bullying system displays the illusion screen while the mobile communication device is performing the notification operation. 如申請專利範圍第1項所述之一種自動防衛模組,其中,該自動防衛系統係以一GPS系統通報警方或第三人或本人。 An automatic defense module according to claim 1, wherein the automatic defense system notifies the police or a third person or himself by a GPS system. 如申請專利範圍第1項所述之一種自動防衛模組,其中,所述所有資料,係可為影像檔、文字檔、語音檔、音效檔、程式檔、電影檔、網頁檔、資料庫檔及加密檔等資料。 An automatic defense module according to claim 1, wherein all the information may be an image file, a text file, a voice file, a sound file, a program file, a movie file, a web file file, and a database file file. And encryption files and other information. 如申請專利範圍第1項所述之一種自動防衛模組,其中,所述自動防衛系統將行動通訊設備內所有資料清除完畢後,包括:欺敵系統控制使螢幕上顯示假象畫面。 An automatic defense module according to claim 1, wherein the automatic defense system removes all the data in the mobile communication device, and includes: the system control of the bullying causes the illusion screen to be displayed on the screen. 如申請專利範圍第1或4項所述之一種自動防衛模組,其 中,所述之假象畫面,係可為行動通訊設備關閉螢幕、顯示故障、顯示操作錯誤、密碼輸入錯誤、密碼核對中、電力不足、關機中或將螢幕電源、鍵盤LED光源系統、響鈴喇叭、聽筒喇叭、狀態顯示之LED關閉畫面或上述組合之畫面。 An automatic defense module according to claim 1 or 4, wherein The imaginary picture can be used for the mobile communication device to turn off the screen, display fault, display operation error, password input error, password check, power shortage, shutdown or power on the screen, keyboard LED light source system, ringing speaker , the handset speaker, the status display LED off screen or the above combination screen. 一種自動防衛模組通報之方法,該方法包括以下步驟:(a)自動防衛模組內之自動防衛系統將行動通訊設備內所有資料清除完畢後;(b)進行通報作業;及(c)欺敵系統於步驟(a)、(b)執行時,同步控制使螢幕上顯示假象畫面。 A method for automatic defense module notification, the method comprising the steps of: (a) after the automatic defense system in the automatic defense module clears all the data in the mobile communication device; (b) performs a notification operation; and (c) deceives When the enemy system is executed in steps (a) and (b), the synchronization control causes the artifact image to be displayed on the screen. 如申請專利範圍第6項所述之一種自動防衛模組通報之方法,其中,步驟(b)所述之通報作業,係可為以行動通訊設備發送簡訊方式通報以行動通訊設備發送簡訊方式通報警方或第三人或本人。 The method for reporting the automatic defense module according to the sixth aspect of the patent application, wherein the reporting operation described in the step (b) is to notify the mobile communication device by sending a short message notification by the mobile communication device. Police or a third person or myself. 如申請專利範圍第6項所述之一種自動防衛模組通報之方法,其中,步驟(b)係可以GPS系統方式通報警方或第三人或本人,其中,包括:利用GPS定位、發送GPS位置及將遺失或被盜取之行動通訊設備所在之經、緯度位置以語音方式通報警方或本人或第三人。 A method for reporting an automatic defense module according to claim 6, wherein the step (b) is to notify the police or a third person or himself by means of a GPS system, including: using GPS to locate and transmit the GPS position. And notify the police or the person or a third person by voice of the location of the lost or stolen mobile communication equipment. 如申請專利範圍第6項所述之一種自動防衛模組通報之方法,其中,步驟(c)所述之假象畫面,係可為行動通訊設備關閉螢幕、顯示故障、顯示操作錯誤、密碼輸入錯誤、密碼核對中、電力不足、關機中或將螢幕電源、鍵盤LED光源系 統、響鈴喇叭、聽筒喇叭、狀態顯示之LED關閉畫面或上述組合之畫面。 The method for reporting the automatic defense module according to the sixth aspect of the patent application, wherein the imaginary picture described in the step (c) is capable of closing the screen, displaying a fault, displaying an operation error, and entering a password error for the mobile communication device. , password check, power shortage, shutdown or screen power, keyboard LED light source System, ring speaker, handset speaker, status display LED off screen or the combination of the above picture.
TW97126330A 2008-07-11 2008-07-11 An equipment and method for automatic defense the mobile phone TWI433526B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97126330A TWI433526B (en) 2008-07-11 2008-07-11 An equipment and method for automatic defense the mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97126330A TWI433526B (en) 2008-07-11 2008-07-11 An equipment and method for automatic defense the mobile phone

Publications (2)

Publication Number Publication Date
TW201004299A TW201004299A (en) 2010-01-16
TWI433526B true TWI433526B (en) 2014-04-01

Family

ID=44825841

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97126330A TWI433526B (en) 2008-07-11 2008-07-11 An equipment and method for automatic defense the mobile phone

Country Status (1)

Country Link
TW (1) TWI433526B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI396996B (en) * 2010-09-02 2013-05-21 Wistron Corp Method for legally unlocking a sim card lock, unlocking server, and unlocking system
TWI471042B (en) * 2012-03-09 2015-01-21 Apex Step Internat Ltd Wireless telephone search device and its searching method

Also Published As

Publication number Publication date
TW201004299A (en) 2010-01-16

Similar Documents

Publication Publication Date Title
US10681552B2 (en) Method for mitigating the unauthorized use of a device
EP2263185B1 (en) System for monitoring the unauthorized use of a device
JP5001380B2 (en) Apparatus and method for locating, tracking and / or recovering wireless communication devices
US9916481B2 (en) Systems and methods for mitigating the unauthorized use of a device
US9031536B2 (en) Method for mitigating the unauthorized use of a device
US20090249443A1 (en) Method for monitoring the unauthorized use of a device
US20090249497A1 (en) Method for monitoring the unauthorized use of a device
CN104540123A (en) Encryption backup and security deletion method and system for important data of mobile terminal
CA2757464A1 (en) System for mitigating the unauthorized use of a device
EP2263186A2 (en) System for monitoring the unauthorized use of a device
US8669870B2 (en) Location dependent monitoring for stolen devices
CN104158657A (en) Information processing method and device, as well as encryption equipment
TWI433526B (en) An equipment and method for automatic defense the mobile phone
CN101415186A (en) Method for security protection of mobile phone information
WO2013072774A2 (en) Systems and methods for recovering low power devices
WO2010067263A2 (en) A system for protection and backup of information in a mobile cell unit
GB2419783A (en) Security apparatus
CN101437066A (en) Automatic defensive communication equipment and running method thereof
TWI465954B (en) Electronic apparatus equipment union automatic defense mold & the way
WO2014027242A1 (en) Systems and methods for mitigating the unauthorized use of a device
WO2015192454A1 (en) Call encryption processing method and device
CN115941842A (en) Mobile phone safety realization method based on synchronous quick setting
KR20110013553A (en) Method and system for providing controlling personal information controlling service for mobile communication terminal
KR20100097469A (en) Method and system for providing personal information controlling service for mobile communication terminal
CN101615234A (en) Automatically defence module and in conjunction with the method for electronic installation

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees