WO2009052732A1 - Method, system and apparatus for terminal information protection - Google Patents
Method, system and apparatus for terminal information protection Download PDFInfo
- Publication number
- WO2009052732A1 WO2009052732A1 PCT/CN2008/072661 CN2008072661W WO2009052732A1 WO 2009052732 A1 WO2009052732 A1 WO 2009052732A1 CN 2008072661 W CN2008072661 W CN 2008072661W WO 2009052732 A1 WO2009052732 A1 WO 2009052732A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- identifier
- command
- password
- data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the embodiments of the present invention relate to the field of device management (DM), and in particular, to a method, system, and device for protecting terminal data in a DM. Background technique
- the Open Mobile Alliance ( ⁇ ) DM (hereinafter referred to as the DM specification) is the latest unified device management standard specification.
- the DM system provides a low-cost solution for third-party management and setting up wireless networks.
- the environment and configuration information of terminal devices (such as mobile phone terminals and functional objects in the terminal), solve the problems encountered during the use of these network devices, and perform software and firmware installation and upgrade operations through the wireless network (OTA) mode. And provide more personalized and personalized services to enhance the user experience.
- OTA wireless network
- the DM command is used to lock the terminal in the prior art.
- the DM server locks or unlocks the terminal by modifying the value of the TerminalSecurity/DeviceLock/LockLevel sub-node under the management tree in the terminal. If the value of the child node is true, the terminal is locked. If the value is false, the terminal is unlocked.
- the DM server can also operate the TerminalSecurity/DeviceWipe node through the DM command, and issue a data erasure command to the node to instruct the terminal to erase all relevant data of the user saved by itself, including the expansion card. The data in .
- Locking and unlocking of the terminal are implemented in the prior art, specifically, the terminal is locked. It is a lock on all functions; when unlocked, it can only be unlocked by the server that initiated the lock, and the user experience is poor.
- the process of data erasing implemented in the prior art only all data related to the user in the terminal can be erased, so that some useful data is also erased at the same time, the erasing effect is poor, and the user experience is also compared. difference.
- the embodiment of the invention provides a method, a system and a device for protecting data of a terminal, so as to solve the problem that the authority control mechanism of the server existing in the prior art is unreasonable and the user experience is poor.
- a method for protecting data of a terminal comprising:
- the first device management server sends a lock command to the terminal, where the lock command includes lock information indicating that the terminal locks all functions or locks some functions; and the command is carried by the device management DM protocol.
- the terminal 4 locks all or part of the functions according to the locking command.
- a method for protecting data of a terminal comprising:
- the device management server sends an erase command to the terminal according to the erasable data item, and the command is carried by the DM protocol;
- the terminal erases the data item to be erased.
- a system for protecting terminal data comprising:
- the first device management server includes a lock command issuing module, and is configured to send a lock command, where the command includes lock information indicating that the terminal locks all functions or locks some functions, and the command is carried by the device management DM protocol;
- Terminal including:
- a first receiving module configured to receive the locking command
- a system for protecting terminal data comprising:
- the terminal includes:
- a first receiving module configured to receive an erase command issued by the device management server, and an erasing module, configured to erase a data item corresponding to the data item identifier.
- the embodiment of the present invention sends a lock information locking command including the lock information indicating that the terminal locks all functions or locks some functions to the terminal by the DM server, and the terminal locks the function indicated by the lock information. Users can lock as needed to make the user experience better.
- FIG. 1 is a schematic diagram of a management tree structure for locking or unlocking a terminal in the prior art
- FIG. 2 (a), FIG. 2 (b), FIG. 2 (c), FIG. 2 (d), and FIG. 2 (e) are A schematic diagram of a system structure for terminal data protection in the first embodiment of the present invention
- FIG. 3 is a schematic flowchart of protecting terminal data in Embodiment 2 of the present invention
- FIG. 4 is a schematic structural diagram of a terminal management tree according to an embodiment of the present invention
- FIG. 5 is a schematic flowchart of a terminal determining whether a DM server has an unlocking right according to Embodiment 3 of the present invention
- FIG. 6 is a schematic flowchart of determining, by a terminal, whether a user has an unlocking right according to Embodiment 4 of the present invention
- FIG. 7 is a schematic structural diagram of a terminal management tree in Embodiment 5 of the present invention.
- FIG. 8 is a schematic structural diagram of a terminal management tree in Embodiment 5 of the present invention.
- FIG. 9 is a schematic flowchart of a data item corresponding to a terminal erasing a data item identifier according to Embodiment 7 of the present invention.
- FIG. 10 is a schematic structural diagram of a system for protecting data of a terminal according to Embodiment 9 of the present invention. detailed description
- FIG. 2 is a schematic structural diagram of a system for protecting data of a terminal according to Embodiment 1 of the present invention, where the system includes: a first device management server 11 and a terminal 12
- the first device management server 11 includes a lock command issuing module 21, configured to send a lock command, where the command includes lock information indicating that the terminal locks all functions or locks some functions
- the terminal 12 includes a first receiving module. 31 and a locking module 32, wherein the first receiving module 31 is configured to receive the locking command; and the locking module 32 is configured to lock all or part of the function according to the locking information.
- the lock information is an identifier of whether all locks, and if the identifier is all locks, the lock module 32 is used to lock all functions; if the identifier is partially locked The lock module 32 is used to lock a preset function.
- the second case is as shown in FIG. 2( b ): the lock information is a data item identifier corresponding to one or more data items to be locked; then the lock module 32 is configured to lock the data item corresponding to the identifier .
- the first device management server 11 further includes an acquisition command issuing module 22 and a second receiving module 23, wherein the obtaining command issuing module 22 is configured to send an obtaining command to the terminal; and the second receiving module 23 is configured to receive the terminal reporting.
- the data item identifier; the terminal 12 further includes a storage module 33 and a reporting module 34, wherein the storage module 33 is configured to store a data item identifier corresponding to the data item that can be locked by itself; the reporting module 34 is configured to store the data item The data item identifier is reported to the first device management server 11.
- the lock information is one of the IDs that are all locked, and/or the data item identifier corresponding to the data item to be locked. If the identifier is all locked, the locking module 32 is used to lock all functions; if the identifier is partially locked, the locking module 32 is used to lock a preset function; if the identifier is a data item identifier
- the locked information may also be a combination of all the lock identifiers and the data item identifiers, or a combination of the partial lock identifiers and the data item identifiers. In this embodiment, it is set whether the identifiers of all the locked identifiers have higher priority than the data item identifiers.
- the locking module 32 can execute only all the locking labels The operation corresponding to the identification or partial locking is not performed, and the operation corresponding to the data item identification is not performed.
- the DM server can instruct the terminal to unlock the locked function, that is, the so-called unlocking process in the embodiment of the present invention.
- the process of unlocking may be various, including but not limited to the following:
- the system further includes a second device management server 13 for delivering the data to the terminal 12.
- the terminal 12 further includes a first judging module 35 and an unlocking module 36, wherein the first judging module 35 is configured to determine the received security password and the first device management server delivered by the second device management server 13.
- the security passwords issued by the 11 are the same.
- the unlocking module 36 is triggered.
- the unlocking module 36 is configured to perform an unlocking operation.
- the terminal 12 further includes a second determining module 37, configured to use the second device management server.
- the identifier of 13 is compared with the identifier of the first device management server 11, and if the identifier is the same, the unlocking module 36 is instructed to perform an operation.
- the terminal further includes a third determining module 38, configured to receive the password. Compared with the preset password, if the password is the same, the unlocking module 36 is instructed to perform an operation.
- the pre-set password is the issued unlock password.
- the lock command issuing module 21 is further configured to issue an identifier that allows unlocking with the local password
- the preset password is a local password saved by the terminal itself.
- Fig. 2 (c), Fig. 2 (d) and Fig. 2 (e) can also be combined together, such as stepwise judgment according to the set priority conditions. When the set conditions are met, the terminal will be Unlock.
- various commands and parameters sent by the DM server are carried by the DM protocol, and the parameters sent by the DM may be delivered together with the lock command or the unlock command, or may be the DM protocol. Issued separately.
- the method of the present invention is described in detail below in conjunction with specific embodiments.
- the server involved in the embodiments of the present invention is a DM server.
- FIG. 3 it is a schematic flowchart of protecting terminal data in Embodiment 2 corresponding to Embodiment 1 of the present invention.
- all or part of the functions of the DM server are first locked, and in the subsequent unlocking process,
- the function of the unlocked function is as follows: Step S301: The DM server sends a lock command to the terminal, where the command includes lock information, the lock information indicates that the terminal locks all functions, or locks some functions.
- Step S302 After receiving the lock command, the terminal locks all functions or partial functions according to the lock information, and reports a response message indicating whether the lock is successful to the DM server.
- the terminal locks all functions means: except for legally allowed sessions (eg, emergency call sessions) and DM sessions, the user will not be able to use the functions of the terminal, all external connections (such as Bluetooth) , USB connection, etc.) can not get the data of the terminal.
- the terminal locks part of the function means: The terminal or server predetermines the function to be locked when receiving the lock information, such as the call-in function, the legally allowed session, and the DM session, all other functions are locked. However, in order to subsequently enable the user to implement the unlocking process, the locked terminal can provide an input interface to receive the password entered by the user, which will be described in the subsequent embodiments.
- the first case the terminal and the server pre-agreed, when the terminal receives the lock information sent by the DM server as an all-locked identifier, if the identifier is all locked, the terminal locks all functions; if the identifier is part When locked, the terminal locks the preset function.
- the lock information sent by the DM server to the terminal is the identifier of the data item that is to be locked. If the data item identifier includes all the data item identifiers that the terminal can lock, the terminal locks all functions; if the data item identifier The terminal identifies the data item corresponding to the identifier, and the terminal locks the data item corresponding to the identifier.
- the third case the lock information sent by the DM server to the terminal is one of the all locked identifiers, and/or the data item identifier corresponding to the data item to be locked.
- the operation is performed according to the first case or the second case; when the lock information includes one of the all locked identifiers and the data item identifier corresponding to the data item to be locked, due to Whether the priority of all the locked identifiers is higher than the data item identifier, the terminal only performs operations corresponding to whether the all locked identifiers are used.
- Step S303 If the DM server also sends a security password to the terminal, the terminal can be unlocked as long as the DM server can correctly provide the security password during the unlocking process.
- the second DM server that meets the access control authority (ACL) can initiate an unlocking command to the terminal, and if the unlocking command carries the correct security password, the terminal will Its own lock is released.
- ACL access control authority
- the DM server that originally issued the lock command and the user who knows the security password can also decode the terminal.
- Step S304 The DM server sends an erasure command to the terminal, where the erasure command includes one or more data item identifiers corresponding to the data items to be erased.
- Step S305 The terminal erases the data item corresponding to the identifier saved by the terminal, and reports to the DM server whether the response message is successfully erased.
- the data item to be erased is a data content information classification in the terminal, such as a short message, a multimedia message, an address book, a call record, a notepad, a mail, a photo, a recording, a video, a password, etc., and the terminal receives the wipe.
- the terminal In addition to the command carrying one or more identifiers indicating the data items to be erased, the terminal erases the data items to be erased.
- Step S304 and step S305 and the foregoing steps S301 to S303 have no absolute sequence, and the erasing command may be issued before the terminal is locked, or may be executed after the terminal is locked.
- the solution in the embodiment of the present invention may be implemented by using a terminal management tree.
- the commands sent by the DM server may be operations on nodes in the terminal management tree.
- the following sections describe the locking, unlocking, and erasing data of the terminal in detail.
- the locking and solution of the terminal can be implemented by operating some or all of the nodes in FIG. Lock and erase data operations.
- Embodiment 3 of the present invention describes a solution for realizing data protection for a terminal by locking and unlocking the terminal.
- a Lock sub-node is generated under the Operation node, and the Lock sub-node is an executable node.
- the lock command issued by the DM server can be received, and the corresponding operation is performed.
- the description of the Lock sub-node is as shown in Table 1.
- the parameter information carried in the command is saved in each sub-node of the LockConfig node.
- the LAWMO/LockConfig/IsFullLocked subnode is used to hold the lock information.
- the value of the IsFullLocked subnode is true or false. When the value is true, it indicates that the terminal will lock all functions. When it is false, it indicates that the terminal will lock some functions.
- the description of the IsFullLocked subnode is shown in Table 2.
- the LAWMO/LockConfig/Security Code sub-node is used to save the security password sent by the DM server, and is used to verify the identity of the DM server that needs to be unlocked.
- the number of occurrences of the child node is 0 or 1. If the DM server does not send a security password, the node may not exist.
- the description of the Security Code sub-node is shown in Table 3. Status Tree Occurrence Format Min.Access Types
- the LAWMO/LockConfig/Server ID sub-node is used to save the ID of the DM server that issued the lock command. If the DM server subsequently requests to unlock the terminal, the AAA server may not need to verify the security password, as long as it passes through the server ID sub-node.
- the ID information determines that the terminal is required to be locked and the same DM server is required to be unlocked, and the unlocking operation is performed.
- the description of the Server ID sub-node is shown in Table 4.
- the LAWMO/Operation/UnLock sub-node is an executable node that receives the unlock command issued by the DM server and performs an unlock operation.
- the description of the UnLock subnode is shown in Table 5.
- the LAWMO/Operation/UnLock/SecurityCode sub-node is used to match the security password in the received unlock command with the security password saved in LAWMO/LockConfig/SecurityCode to verify the unlocking authority of the DM server that issued the unlock command.
- the description of the UnLock/SecurityCode subnode is shown in Table 6.
- the first DM server sends a lock command to the LAWMO/Operation/Lock executable node of the terminal, where the lock command carries the lock information, the security password, and the ID information of the lock.
- the lock information, the security password, and the ID information of the user may be delivered together with the lock command, or may be directly sent by the DM server using the DM protocol.
- the lock information may be an identifier of whether or not all locks, the identifier may be a parameter of IsFullLocked, and its value is true. If the terminal needs to maintain the incoming call function, set the value of the issued IsFullLocked parameter to false.
- the first DM server After the first DM server locks the terminal, if you want to assign the unlocking authority to the second DM server, you need to send the SecurityCode parameter. When the second DM server unlocks the terminal, you need to provide SecurityCode to verify the permission.
- the first DM server does not set SecurityCode, you can set it to any other DM server to unlock the terminal, or any other DM server does not have the right to unlock.
- the SecurityCode may not be provided, and the terminal may determine the authority of the first DM server through the recorded Server1D.
- the terminal After receiving the lock command, the terminal assigns the parameter carried in the lock command to the corresponding node, and performs a lock operation according to the parameter.
- the terminal After receiving the security password, the terminal assigns the value of the security password to the LAWMO/LockConfig/SecurityCode node. After receiving the lock information, the terminal assigns the lock information value to the LAWMO/LockConfig /IsFullLocked node. The terminal extracts the ID of the DM server that issued the lock command from the DM session, and assigns the ID value to the LAWMO/LockConfig/ServerlD node.
- the terminal After receiving the Lock command, the terminal performs corresponding operations according to the parameters carried.
- the unlock command is sent to the LAMO/Operation/UnLock node of the terminal; otherwise, the second DM server needs to carry the security password when sending the unlock command to the terminal. .
- the second DM server can send security passwords in two ways:
- the Replace command directly delivers the parameters, and the second is carried by the data element in Exec.
- the specific implementations of the two schemes are as follows:
- the terminal After receiving the unlocking command, the terminal determines whether the second DM server has an unlocking function. Permissions, if yes, perform an unlock operation, otherwise, refuse execution and return an error message.
- the authentication process of the terminal to the DM server is shown in Figure 5.
- the process mainly includes the following steps:
- Step S501 The terminal determines whether the ID of the second DM server that sends the unlock command is the same as the ID of the first DM server that sends the lock command. If yes, step S504 is performed. Otherwise, step S502 is performed.
- the terminal extracts the ID of the second DM server that sends the unlocking command from the DM session. If the DM server that sends the command twice is the same, the second DM server has the unlocking authority by default, and the terminal directly performs the unlocking operation. If the server that issued the command is different, you need to continue to determine whether the second DM server that issued the unlock command has the unlock permission.
- Step S502 The terminal determines whether the security password is carried in the lock command. If yes, step S503 is performed. Otherwise, step S504 is performed.
- the matching security password is required to be sent when the unlock command is sent. If the security password is not carried in the original lock command, the DM server can be unlocked by default. Permission, the terminal directly performs the unlock operation.
- Step S503 Determine whether the security password carried in the unlocking command matches the security password carried in the locking command. If yes, go to step S504; otherwise, go to step S505.
- the second DM server that issued the unlocking command provides the security password
- the second DM server that issues the unlocking command is considered to be the same as the security password carried in the locking command. Has unlock permission.
- Step S504 The terminal performs an unlocking operation.
- Step S505 The terminal maintains the original locked state.
- the terminal is The security password saved in the LAWMO/Operation/UnLock/SecurityCode node will be cleared to prevent it from being used by the next unlock command.
- the second DM server is authenticated by comprehensively determining the DM server ID and the security password. This is only a case of the embodiment of the present invention.
- the terminal may also use other different judgment sequences, or may only use
- the second DM server is authenticated according to the DM server ID or the security password.
- a process for manually unlocking by a user which mainly includes the following steps:
- the DM server sends a lock command to the terminal, and the command includes an identifier that allows manual unlocking.
- the process of issuing the lock command in this step is similar to that in the third embodiment.
- the DM server can also send the parameter information that is sent together with the lock command in the first step of the third embodiment, and the user can be implemented in this embodiment. Manually unlocking, the DM server can also be implemented to unlock according to the third embodiment.
- the lock command may carry an identifier indicating whether manual unlocking is allowed, and the identifier indicates whether the terminal is allowed to manually unlock by inputting an unlock password by the user.
- the terminal saves the identifier to the LAWMO/LockConfig/AllowLocallyUnlock sub-node. If the identifier is true, the user is allowed to unlock the terminal. If the identifier is false, the user is not allowed to unlock the terminal.
- the description of the AllowLocallyUnlock subnode is shown in Table 7.
- the identifier is not carried in the lock command, it can be manually unlocked by default, or the manual unlock is not allowed by default.
- the DM server allows the user to manually unlock, and the lock command may also include a solution. Lock the password, the terminal saves the received unlock password to
- the unlock password is the check code when the user manually unlocks. If the user correctly inputs the unlock password to the terminal when unlocking, the user is considered to have the decoding right.
- the description of the LAWMO/LockConfig/UnLockCode sub-node is shown in Table 8.
- the lock command also carries an identifier that allows the unlocking with the local password, and the terminal saves the identifier in the LAWMO/LockConfig/LocalPwdAvailable sub-node. If the identifier is true, the user is allowed to input the local password. To unlock the terminal's LAW MO level; if the value is false, it means not allowed.
- the description of the LocalPwdAvailable subnode is shown in Table 9.
- the terminal After receiving the unlocking command, the terminal determines whether the user who inputs the unlocking password has the right to unlock. If yes, the unlocking operation is performed. Otherwise, the execution is refused.
- Step S601 If the terminal determines that the identifier saved in the LAWMO/LockConfig/AllowLocallyUnlock sub-node is true, step S602 is performed, and if it is false, the process is performed. Step S607.
- Step S602 The terminal determines whether the unlock password is saved. If yes, step S603 is performed; otherwise, step S604 is performed.
- LAWMO/LockConfig/UnLockCode subnode value is blank, further determination is required to allow the user to unlock using the terminal's native password.
- Step S603 The terminal determines whether the received unlock password input by the user matches the saved unlock password. If yes, step S606 is performed; otherwise, step S607 is performed.
- the password matching involved in the various embodiments of the present invention can be considered as the same password.
- the terminal can provide the user with a UI interface through which the user can enter a password, regardless of whether the terminal is in the full function lock state or in the state in which the set function is locked.
- Step S604 The terminal determines whether the user is allowed to use the local password to unlock. If yes, step S605 is performed; otherwise, step S607 is performed.
- Step S605 The terminal determines whether the received local password input by the user matches the saved local password. If yes, step S606 is performed; otherwise, step S607 is performed.
- Step S606 The terminal is unlocked.
- Step S607 The terminal remains in a locked state.
- the user is manually unlocked by using the unlocking password unlocking and the local password unlocking.
- the terminal may also use other different order to judge, or only unlock according to the unlocking password or the local device.
- the way to unlock the password is to achieve manual unlocking.
- FIG. 4 is only one implementation of the solution of the present invention.
- the structure of the terminal management tree may also be the structure shown in FIG. 7.
- the ⁇ Y>* child node under the LockConfig node is used instead of the LAWMO/LockConfig/IsFullLocked node in FIG.
- LAWMO /LockConfig/ SecurityCode node LAWMO/LockConfig/UnlockCode node
- LAWMO/LockConfig/ServerlD node LAWMO/LockConfig One or more of the /AllowLocallyUnlock node and the LAWMO/LockConfig/LocalPwdAvailable node, etc., of course, the present embodiment is not limited to the above several nodes.
- the process of implementing the locking and unlocking in the fifth embodiment of the present invention is similar to the process in the third embodiment and the fourth embodiment.
- the DM server issues the locking command, it will be IsFullLocked, SecurityCode, UnlockCode, ServerlD,
- AllowLocallyUnlock and LocalPwdAvailable parameters are also sent to the terminal and saved in the ⁇ Y >* node.
- the terminal then sets the lock status according to these parameters and configures the terminal's unlock permission.
- the specific delivery process can be described by the following procedure.
- the procedure only describes the process of the security password, and the other parameters are similar.
- Embodiments 3 through 5 provide various schemes for terminal data protection, corresponding to the system described in Embodiment 1.
- the sixth embodiment of the present invention further provides protection of the terminal data by locking the data item.
- So-called data items include, but are not limited to, short messages, contact information, and email.
- the list of data item information can be saved in the LAWMO/OperableContent/ ⁇ X> node, as shown in Figure 4, and its content can be determined by the terminal.
- the description of the node is shown in Table 10.
- a child node ⁇ X>* is generated under the Lock node, as shown in Figure 8.
- the X node stores the name of the data item that the DM server requires to lock.
- the IsFullLocked subnode may not be required under the LockConfig node.
- the DM server sends an acquisition command and obtains a data item that the terminal can lock.
- the DM server can use the Get command to get the terminal management tree.
- the DM server requests to obtain an identifier of the lockable data item.
- the terminal returns the content under the OperableContent node to the DM server by using the Results command.
- step 1 may not appear.
- the data agreed by the terminal and the server, or the data items that have been standardized may not appear.
- the DM server sends a lock command to the terminal, where the command includes one or more data item identifiers corresponding to the data items to be locked, and the terminal locks the data item corresponding to the identifier.
- the DM server can use the data element in the Add command, the Replace command, or the Exec command to deliver the data item identifier.
- the process of delivering the data element in the Exec command and the process in the third embodiment is similar to the process in the third embodiment, and is not described here.
- the process of sending an identifier using the Add command is as follows:
- the terminal After receiving the lock command, the terminal determines whether there is a child node under the Lock node, or the content of the child node is empty, indicating that the DM server does not specify a data item to be locked, and the terminal may follow the third and fourth embodiments.
- the solution of the fifth is locked; if the terminal determines that the content of the child node under the Lock node is SMS and AddressBook, the terminal locks the SMS and AddressBook functions, that is, the terminal cannot send and receive text messages, and cannot view or modify the phone.
- the terminal unlocks according to the unlock command issued by the DM server.
- This unlocking process can be similar to the ones in the third, fourth and fifth embodiments.
- the third embodiment and the sixth embodiment of the present invention respectively describe two schemes for performing full locking or partial locking on the terminal, and the two schemes can also be combined to realize full locking or partial locking of the terminal.
- the three identifiers in the issued lock information are in the relationship of "or”; when the values are 0 and 2 (or 1 and 2), at this time, whether the lock information of all the lock information and the data item identifier are "and" in the lock information, indicating that the lock information is the identifier of all (partial) lock, but the child under the lock node If one or more data item identifiers are added to the node ⁇ X>*, the schemes of the third embodiment and the sixth embodiment can be simultaneously performed. Further, if it is set whether the priority of the all-locked identifier is higher than the data item identifier, the operation may be performed according to the scheme of the third embodiment, and the scheme of the sixth embodiment is not executed.
- a solution for protecting data of a terminal by erasing the content of the terminal item by item includes:
- the DM server obtains a data item that the terminal can erase.
- the DM server can obtain the erasable data item of the terminal before issuing the erasing command, and the obtaining manner is similar to that in the sixth embodiment. In addition, this step may not appear.
- the data items are the same, that is, the values of the child nodes under the LAWMO/OperableContent node. Other nodes can also be generated under the terminal management tree to save data items that the terminal can erase.
- the DM server sends an erasure command to the terminal, where the command carries one or more data item identifiers corresponding to the data items to be erased by the terminal.
- the erase command issued by the DM server is to operate the LAWMO/Operation/wipe executable node under the terminal management tree.
- the description of the wipe node is shown in Table 11.
- Table 11 There may also be a child node ⁇ X>* under the wipe node. This node holds the data item identifier corresponding to the data item that the DM server wishes to erase when executing the erase command. The description of the node is shown in Table 12.
- the DM server sends one or more data item identifiers corresponding to the data items to be erased by the terminal.
- There are two ways to deliver the parameters one is to directly send the parameters through the Replace command, and the second is to use the data in the Exec.
- the element is carried, similar to the process of the sixth embodiment. 3.
- the terminal erases the data item corresponding to the data item identifier. As shown in FIG. 9, the process may include:
- step S901 if there is no X child node or the X child node value is null under the LAWMO/Operation/wipe node of the terminal, that is, the data item identifier corresponding to the data item to be erased by the terminal is not delivered, step S904 is performed, otherwise execution is performed. Step S902.
- Step S902 The terminal determines whether the data item identifier that is erasable by the terminal includes the received data item identifier. If yes, step S903 is performed; otherwise, step S905 is performed.
- Step S903 The terminal erases the data item corresponding to the received data item identifier. If the DM server sends a data item identifier to the terminal, the command is as follows:
- Step S904 The terminal erases all data of the user according to the erasure command, including data on the storage space of the device, data on the extended storage medium, and even data on the SIM card.
- Step S905 The terminal refuses to perform an erase operation.
- Embodiment 7 of the present invention describes a scheme for realizing data protection for a terminal by erasing the content of the terminal item by item.
- the DM server sends an erase command to the terminal, and sends a data item identifier corresponding to the data item to be erased by one or more terminals; the difference of the alternative is that the DM server
- the terminal sends an erase command and delivers an indication of the data item to be erased on one or more terminals.
- the indication may be the name of the data item to be erased, the identifier of the data item to be erased, or the erasure indication of the erasable data item on the terminal management tree.
- the DM server There are two ways for the DM server to deliver the indication. One is to directly send parameters through the Replace command, and the second is to use the data element in Exec. The specific method is similar to the procedure in the sixth embodiment.
- the terminal After receiving the erase command, the terminal erases the data item to be erased.
- erasing the password is a more specific embodiment.
- the DM server can also instruct the terminal to modify or set the password.
- the eighth embodiment of the present invention is a method for a terminal to erase and modify a password, and the method mainly includes the following steps:
- the DM server sends an erase command to the terminal.
- the DM server issues a command to erase the password on the terminal by operating the Wipe executable node.
- the LAWMO/LocalLock/ClearPwd sub-node can also be operated under the terminal management tree.
- the sub-node is used to erase the password on the terminal.
- the description of the sub-node is shown in Table 13.
- the instructions for the DM server to operate on the ClearPwd subnode are as follows:
- the instructions for the DM server to operate on the ChangePwd subnode are as follows:
- the terminal replaces the original terminal password, and the received new terminal password is used as its own terminal password; or the terminal receives the new terminal password to overwrite the original terminal. password.
- a LAWMO/Operation/FactoryReset subnode can be generated under the terminal management tree.
- the child node is an executable node, and the DM server can operate the node to instruct the terminal to set its own parameter to the factory value.
- the description of the node is shown in Table 15.
- a LAWMO/State node can be generated, which is used to reflect whether the state of the current terminal is locked. According to different values, different states of the terminal are reflected. For example, when the value of the node is set to 0, the terminal is locked and locked for all functions. When the value of the node is 1, the terminal is locked and set. The function is locked. When the value of the node is 2, the terminal is in the unlocked state. When the value of the node is 3, the terminal is in other states.
- the ninth embodiment of the present invention further provides a system for protecting data of the terminal.
- the system includes: a device management server 41, including an erasure command issuing module 51.
- the command is used to send an erase command, where the command carries one or more data item identifiers corresponding to data items to be erased, and the command is carried by the DM protocol;
- the terminal 42 includes a first receiving module 61 and an erasing module 62.
- the first receiving module 61 is configured to receive an erase command issued by the device management server 41
- the erasing module 62 is configured to erase the data item corresponding to the data item identifier.
- the device management server 41 further includes an acquisition command issuing module 52 and a second receiving module 53, wherein the obtaining command issuing module 52 is configured to send an obtaining command to the terminal; and the second receiving module 53 is configured to receive data reported by the terminal. Item identifier.
- the terminal 42 further includes a storage module 63 and a reporting module 64, wherein the storage module 63 is configured to save the data item identifier corresponding to the data item that can be erased by itself; the reporting module 64 is configured to report the stored data item identifier.
- the server is managed by the device.
- the terminal further includes a setting module 65, configured to erase the original terminal password, and receive the The new terminal password is used as its own terminal password; or the terminal will overwrite the original terminal password with the new terminal password received.
- the user can lock some or all functions of the terminal according to requirements, and the permission control mechanism is more reasonable, and is more flexible in the unlocking process, which facilitates the user and reduces the pressure of the DM server; , allowing single or multiple erasure of the terminal's operable content, improving the erasing efficiency.
- Non-volatile storage medium which can be a CD-ROM, a USB flash drive, a mobile hard disk, etc.
- a computer device may It is a personal computer, a server, or a network device, etc. that performs the methods described in various embodiments of the present invention.
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020097013685A KR101118971B1 (en) | 2007-10-17 | 2008-10-10 | Method, system and apparatus for terminal information protection |
JP2009545810A JP5065416B2 (en) | 2007-10-17 | 2008-10-10 | Method, system and apparatus for protecting terminal data |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710182008.4 | 2007-10-17 | ||
CN2007101820084A CN101415182B (en) | 2007-10-17 | 2007-10-17 | Method, system and apparatus for protecting terminal data |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009052732A1 true WO2009052732A1 (en) | 2009-04-30 |
Family
ID=40579078
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2008/072661 WO2009052732A1 (en) | 2007-10-17 | 2008-10-10 | Method, system and apparatus for terminal information protection |
Country Status (4)
Country | Link |
---|---|
JP (2) | JP5065416B2 (en) |
KR (1) | KR101118971B1 (en) |
CN (2) | CN101415182B (en) |
WO (1) | WO2009052732A1 (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101765076A (en) * | 2009-12-17 | 2010-06-30 | 中兴通讯股份有限公司 | Method, device and system for partially locking termination function |
CN101730106A (en) * | 2009-12-25 | 2010-06-09 | 中兴通讯股份有限公司 | Terminal management method, device and system |
KR101402956B1 (en) * | 2012-09-24 | 2014-06-02 | 웹싱크 주식회사 | Method and system of providing authorization in dm server |
CN102917098A (en) * | 2012-10-17 | 2013-02-06 | 广东欧珀移动通信有限公司 | Method and device for preventing important linkman from being wrongly deleted |
JP5544409B2 (en) * | 2012-11-15 | 2014-07-09 | 株式会社Nttドコモ | Communication terminal, mobile communication system and method |
CN103856938B (en) * | 2012-12-04 | 2017-07-28 | 中兴通讯股份有限公司 | A kind of method of encrypting and decrypting, system and equipment |
EP2930879B1 (en) | 2012-12-05 | 2021-02-24 | LG Electronics Inc. | Method and apparatus for authenticating access authorization in wireless communication system |
DE102015210294A1 (en) * | 2015-06-03 | 2016-12-08 | Siemens Aktiengesellschaft | Client device and server device for secure activation of functions of a client |
EP3516789A4 (en) * | 2016-09-23 | 2020-05-06 | Wilson Electronics, LLC | Booster with an integrated satellite location system module |
CN106357865B (en) * | 2016-09-26 | 2019-03-22 | 宇龙计算机通信科技(深圳)有限公司 | Delete the method and system of contact information |
CN111488560A (en) * | 2020-04-07 | 2020-08-04 | 四川虹美智能科技有限公司 | Intelligent device control method and system and intelligent device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040110488A1 (en) * | 2002-12-10 | 2004-06-10 | Nokia Corporation | System and method for performing security functions of a mobile station |
CN1545358A (en) * | 2003-11-14 | 2004-11-10 | Method for preventing illegal use of user identification module | |
CN1717082A (en) * | 2004-07-02 | 2006-01-04 | 乐金电子(中国)研究开发中心有限公司 | Anti-theft method and system of mobile communication terminal |
CN1780485A (en) * | 2004-11-25 | 2006-05-31 | 乐金电子(中国)研究开发中心有限公司 | Method for preventing from illegal duplication of mobile communication terminal |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001268216A (en) * | 2000-03-15 | 2001-09-28 | Hitachi Ltd | Mobile terminal and its control method |
KR100547712B1 (en) * | 2003-02-28 | 2006-01-31 | 삼성전자주식회사 | How to lock and unlock the camera on a portable device with a camera |
JP2006211377A (en) * | 2005-01-28 | 2006-08-10 | Matsushita Electric Ind Co Ltd | Wireless terminal device |
KR100941540B1 (en) * | 2005-06-02 | 2010-02-10 | 엘지전자 주식회사 | System and method for setting configuration-value inthereof |
CN1852138A (en) * | 2005-07-30 | 2006-10-25 | 华为技术有限公司 | Terminal management method and system |
WO2007099938A1 (en) * | 2006-02-27 | 2007-09-07 | Kyocera Corporation | Communication system and communication device |
-
2007
- 2007-10-17 CN CN2007101820084A patent/CN101415182B/en active Active
- 2007-10-17 CN CN201210239140.5A patent/CN102752741B/en active Active
-
2008
- 2008-10-10 WO PCT/CN2008/072661 patent/WO2009052732A1/en active Application Filing
- 2008-10-10 JP JP2009545810A patent/JP5065416B2/en active Active
- 2008-10-10 KR KR1020097013685A patent/KR101118971B1/en active IP Right Grant
-
2011
- 2011-11-22 JP JP2011255119A patent/JP5447882B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040110488A1 (en) * | 2002-12-10 | 2004-06-10 | Nokia Corporation | System and method for performing security functions of a mobile station |
CN1545358A (en) * | 2003-11-14 | 2004-11-10 | Method for preventing illegal use of user identification module | |
CN1717082A (en) * | 2004-07-02 | 2006-01-04 | 乐金电子(中国)研究开发中心有限公司 | Anti-theft method and system of mobile communication terminal |
CN1780485A (en) * | 2004-11-25 | 2006-05-31 | 乐金电子(中国)研究开发中心有限公司 | Method for preventing from illegal duplication of mobile communication terminal |
Also Published As
Publication number | Publication date |
---|---|
CN102752741B (en) | 2016-01-27 |
CN101415182A (en) | 2009-04-22 |
JP2010516212A (en) | 2010-05-13 |
CN102752741A (en) | 2012-10-24 |
KR101118971B1 (en) | 2012-02-28 |
JP5447882B2 (en) | 2014-03-19 |
CN101415182B (en) | 2013-01-30 |
KR20090087941A (en) | 2009-08-18 |
JP5065416B2 (en) | 2012-10-31 |
JP2012065349A (en) | 2012-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009052732A1 (en) | Method, system and apparatus for terminal information protection | |
US10575174B2 (en) | Secure protocol for peer-to-peer network | |
US10162959B2 (en) | Method and apparatus for providing subscriber identity module-based data encryption and remote management of portable storage devices | |
US9596232B2 (en) | Managing sharing of wireless network login passwords | |
US9917698B2 (en) | Management of certificates for mobile devices | |
CN100486173C (en) | Configuring of network settings of thin client devices using portable storage media | |
EP2560346B1 (en) | Method and apparatuses for locking information for a mobile terminal | |
CN102204304B (en) | Support of multiple pre-shared keys in access point | |
JP4764012B2 (en) | Configuring an ad hoc wireless network using portable media devices | |
US8571522B2 (en) | Authentication method for the mobile terminal and a system thereof | |
TW201211815A (en) | Method for legally unlocking a SIM card lock, unlocking server, and unlocking system | |
WO2009015585A1 (en) | Method, system and terminal for right control in device management | |
WO2007003103A1 (en) | A method for sharing data and a method for recovering the backup data | |
US20140184394A1 (en) | Communication device and method for controlling electronic device | |
CN102917098A (en) | Method and device for preventing important linkman from being wrongly deleted | |
WO2018165983A1 (en) | Euicc profile deletion method and device | |
WO2009076866A1 (en) | Method, system and device for remote control terminal | |
JP2011108183A (en) | Communication control system, central device, terminal device, and computer program | |
KR101564733B1 (en) | Mobile terminal operation lock system and method thereof | |
KR101495766B1 (en) | System and method for remote security management | |
JP6223878B2 (en) | Communication system, communication terminal, and terminal control method | |
WO2013104151A1 (en) | Device management server and method for executing user data erasure by management device | |
CN115664692A (en) | Control method for restoring factory settings of door lock | |
US7974267B2 (en) | Telephone system, and main unit and terminal registration method therefor | |
WO2009033431A1 (en) | A method to erase terminal data and terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 2323/KOLNP/2009 Country of ref document: IN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08843111 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2009545810 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020097013685 Country of ref document: KR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08843111 Country of ref document: EP Kind code of ref document: A1 |