WO2010133108A1 - Procédé, système et terminal mobile de récupération de données flash de terminal mobile - Google Patents

Procédé, système et terminal mobile de récupération de données flash de terminal mobile Download PDF

Info

Publication number
WO2010133108A1
WO2010133108A1 PCT/CN2010/071550 CN2010071550W WO2010133108A1 WO 2010133108 A1 WO2010133108 A1 WO 2010133108A1 CN 2010071550 W CN2010071550 W CN 2010071550W WO 2010133108 A1 WO2010133108 A1 WO 2010133108A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
data
mobile terminal
mobile
module
Prior art date
Application number
PCT/CN2010/071550
Other languages
English (en)
Chinese (zh)
Inventor
黄翠荣
李娜娜
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2010133108A1 publication Critical patent/WO2010133108A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier

Definitions

  • the invention belongs to the field of mobile communications, and in particular relates to a method and system for retrieving FLASH data in a mobile terminal and a mobile terminal. Background technique
  • a mobile phone as an ordinary mobile phone as an example, information is stored on a subscriber identity card (SIM) card and a mobile phone flash memory (FLASH).
  • SIM subscriber identity card
  • FLASH mobile phone flash memory
  • the user can buy a new mobile phone, buy back the original card number from the network business hall, copy the FLASH data of the original mobile phone to the new mobile phone, and the user can use the original information.
  • users no longer worry that their important information is illegally used by others.
  • the method of detecting the user is based on the mobile phone card number detection, but the user after the mobile phone exchanges the card is not necessarily an illegal user;
  • the user authentication information of the mobile phone is only the mobile phone card number, and there is no ID card information. Used for assistance, so that the information in the mobile phone is easily stolen;
  • an object of the present invention is to provide a method and system for retrieving FLASH data in a mobile terminal and a mobile terminal, which effectively solves the problem that information in the mobile terminal is easily stolen in the prior art.
  • a method for retrieving FLASH data in a mobile terminal comprising:
  • the user management setting module backs up the FLASH data of the mobile terminal to the mobile data server;
  • the mobile terminal sends the user authentication information to the mobile data server. After the authentication is passed, the mobile data server sends the backed up FLASH data to the mobile terminal.
  • the method further includes: the administrator user viewing and modifying all the information of the mobile terminal, and setting a different unlocking password to the limited user; the limited user can view the information set by the administrator user to allow the viewing.
  • the backed up FLASH data is: sent to the mobile data server in the form of a short message or a data file.
  • the user authentication information includes at least an identity card information, a subscriber identity card (SIM) card number, and an International Mobile Equipment Identity (IMEI) number of the mobile terminal.
  • SIM subscriber identity card
  • IMEI International Mobile Equipment Identity
  • the preset value is 3, 4 or 5.
  • the FLASH data backed up to the mobile data server has an expiration date.
  • the user can go to the network operator to retrieve the FLASH data, and the FLASH data exceeds the valid period, and the mobile data server automatically deletes the data.
  • a system for retrieving FLASH data in a mobile terminal comprising a mobile data server, a wireless network and a mobile terminal, the mobile terminal comprising a user management setting module, the user management setting module comprising a user and a password setting sub-module, security Management submodule, sending user authentication information submodule;
  • the user and password setting sub-module is configured to set an unlock password for the administrator user and the limited user;
  • the security management sub-module is configured to use the FLASH of the mobile terminal when the number of times the mobile terminal receives the wrong password exceeds a preset value. Data backup to mobile data server;
  • the mobile data server is configured to store the backed up FLASH data, authenticate the user, and send the backed up FLASH data to the mobile terminal after the authentication is passed.
  • the security management sub-module is further configured to set a priority of different data in the FLASH of the mobile terminal and data requiring anti-theft, and back up the FLASH data to the mobile data server according to the priority of the FLASH data.
  • the security management sub-module is further configured to destroy FLASH data; initiate destruction of FLASH data, when the mobile terminal receives the wrong password more than a preset value and when the FLASH data is backed up to the mobile data server, the security management device The module automatically destroys the FLASH data.
  • the security management sub-module is further configured to set a backup validity period of the FLASH data, and the user can go to the network operator to retrieve the FLASH data during the validity period of the backup and during the validity period of the FLASH data of the mobile data server.
  • a mobile terminal includes the above user management setting module.
  • the invention has the following beneficial effects:
  • FIG. 2, FIG. 3, FIG. 4, and FIG. 5 together constitute an interface operation diagram of the user management setting module of the present invention
  • Figure 1 is an interface operation diagram of user management settings
  • Figure 2 is an interface operation diagram of user and password settings
  • Figure 3 is an interface operation diagram of mobile phone security management
  • Figure 4 is an interface operation diagram of data priority setting
  • FIG. 6 is a flow chart of a software implementation of the user management setup module of the present invention.
  • BEST MODE FOR CARRYING OUT THE INVENTION In order to better understand the present invention, the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.
  • FIG. 1, FIG. 2, FIG. 3, FIG. 4 and FIG. 5 taking a mobile terminal as a mobile phone as an example, and adding a user management setting module to the mobile phone software.
  • This module is only used when the administrator user uses the mobile phone. It is visible.
  • the specific implementation steps are as follows:
  • step A In the user management setting interface, as shown by X01 in Figure 1, you can select user and password settings, mobile phone security management, and send user authentication information. Select “User and password settings” to enter step B, select " Mobile Phone Security Management "Go to Step E, select "Send User Authentication Information”. Go to step ⁇
  • step E Enter the mobile phone security management interface, as shown in X012 in Figure 3, you can set the management properties related to mobile phone anti-theft.
  • the anti-theft function can be turned on or off.
  • the mobile phone automatically enters the anti-theft mode.
  • the anti-theft function is turned off, the mobile phone does not have the anti-theft function, just like an ordinary mobile phone.
  • G Set the data priority of the mobile phone.
  • the data priority of mobile phones is divided into priority according to priority: urgent data, important data and general data.
  • the data priority setting includes four items: urgent data, important data, general data, and recovery default.
  • Select "emergency data” then enter the emergency data settings, as shown in X0122111 to X0122114 in Figure 4, you can set and modify the type of emergency data, the emergency data type is the first to back up.
  • Select "Important Data” to enter the settings of important data, as shown in X0122121 to X0122124 in Figure 4, you can set and modify the type of important data, and the type set as urgent data does not appear on the list of important data.
  • the backup validity period can be set.
  • the backup validity period can be set.
  • the network operator sets the expiration date of the FLASH data storage and the FLASH backup data space of each mobile phone, and the data exceeding the validity period is automatically deleted.
  • the data capacity of the backup is too large, and data exceeding the capacity will be lost.
  • the network operator can charge the mobile phone user according to the saved validity period and data size. Users can apply for the expiration date and capacity at the location specified by the network operator.
  • J Set the number of attempts to unlock the password. As shown by X01251 to X01254 in Fig. 3, values of 0 to 127 can be set in advance. When set to 0, it means that the number of attempts to enter the wrong password is not limited, and the mobile phone can test the wrong password indefinitely. When setting other values, such as 3, 4 or 5, when the number of times the mobile phone enters the wrong password reaches 3, 4 or 5, the mobile phone is If it is determined to be illegal, the mobile phone will automatically back up the data to the mobile data server. It is generally appropriate to set it to 5 times, which will not allow the illegal person to quickly crack the unlock password, nor will it easily back up the mobile phone data to the mobile data server.
  • the FLASH data backup of the mobile phone is secret, silent, undetectable by the illegal person, can be sent to the mobile data server as a short message, or can be sent to the mobile data server as a data file.
  • K Set the sending user authentication information.
  • the user authentication information can be sent to the mobile data server, indicating that the current user is the legal owner of the mobile phone.
  • ID information As shown in X013 in Figure 5, there are four options for ID information, user name, password, and send message.
  • the mobile phone After inputting the ID card information, select to send the message, and the mobile phone will send the ID card information, the SIM card number and the mobile phone's International Mobile Equipment Identity (IMEI) number as the user authentication information to the mobile data server. Save the owner information of the mobile phone.
  • the mobile phone exchanges the card the user needs to resend the user authentication information once and update the new card number to the mobile data server. After the mobile phone is lost, the user can retrieve the FLASH data from the operator based on this information.
  • IMEI International Mobile Equipment Identity
  • Step 201 Insert the SIM card and turn it on, and the mobile phone enters the standby interface. After not operating the mobile phone for a period of time, the mobile phone automatically enters the lock screen state.
  • Step 202 Enter the unlock password and judge the user identity according to the unlock password. After the user enters a few digits, the mobile phone compares the entered password with the previously set user password of the mobile phone. If it is the administrator user account password, go to step 203; if it is a limited user account password, go to step 204; if it is a wrong password, go to step 205. Administrator users can set up one restricted user or set up two or more restricted users.
  • Step 203 The current user is an administrator user.
  • the mobile phone will automatically clear the counter of the error unlock password.
  • Enter the standby interface you can enter the user management settings module on the main menu.
  • the relevant settings can be modified. Administrator users can use all FLASH data and mobile phone features on their mobile phones.
  • Step 204 Description The current user is a restricted user.
  • the mobile phone does not automatically clear the calculator that incorrectly unlocks the password, but it does not increase. Entering the standby interface, the user management setting module is not displayed on the main menu, and the value of the setting module cannot be modified. Restricted users can view the information that the administrator user has set to allow them to view, using some of the main features of the mobile phone.
  • Step 205 The current user is not a legitimate user.
  • the mobile phone automatically increments the counter of the error unlocking password by one. If the number of times the error is unlocked is less than the number of allowed attempts, the mobile phone can enter the standby interface.
  • the illegal user can use the little functions of the mobile phone, but cannot view and modify the private information on the mobile phone, such as phone book or information. Otherwise, proceed to step 206
  • Step 206 Back up the data.
  • the number of times the error unlock password is entered is greater than or equal to the number of allowed attempts, the current user is confirmed as an illegal user, and the mobile phone starts automatically backing up the data to the mobile data server. If it is set to destroy FLASH data, the mobile phone will automatically clear the FLASH data after the data is backed up.
  • Step 207 The mobile phone automatically shuts down. If the FLASH data of the mobile phone is not destroyed, you can continue to boot. Otherwise, the mobile phone cannot be turned on and completely destroyed.
  • the present invention can effectively protect all information on the mobile phone and prevent the FLASH data from being stolen.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

La présente invention porte sur un procédé, un système et un terminal mobile destinés à récupérer des données de mémoire flash (FLASH) d'un terminal mobile. Ledit procédé comprend les opérations suivantes : au moins deux types de mots de passe de déverrouillage de clavier sont définis, dont l'un est un mot de passe de compte d'utilisateur-administrateur et les autres sont des mots de passe de compte d'utilisateur restreint; lorsque le nombre de mauvais mots de passe reçus par le terminal mobile dépasse une valeur prédéterminée, les données flash du terminal mobile sont sauvegardées vers un serveur de données mobile par un module de configuration de gestion d'utilisateur; des informations d'authentification d'utilisateur sont envoyées au serveur de données mobile par le terminal mobile; après réussite de l'authentification, les données flash sauvegardées sont envoyées au terminal mobile par le serveur de données mobile. Le procédé, le système et le terminal mobile décrits par la présente invention sont adoptés pour résoudre efficacement le problème selon lequel les informations dans le terminal mobile sont faciles à voler dans l'état de la technique.
PCT/CN2010/071550 2009-05-19 2010-04-02 Procédé, système et terminal mobile de récupération de données flash de terminal mobile WO2010133108A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2009101074961A CN101895829A (zh) 2009-05-19 2009-05-19 找回移动电话中flash数据的方法和系统及移动电话
CN200910107496.1 2009-05-19

Publications (1)

Publication Number Publication Date
WO2010133108A1 true WO2010133108A1 (fr) 2010-11-25

Family

ID=43104864

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/071550 WO2010133108A1 (fr) 2009-05-19 2010-04-02 Procédé, système et terminal mobile de récupération de données flash de terminal mobile

Country Status (2)

Country Link
CN (1) CN101895829A (fr)
WO (1) WO2010133108A1 (fr)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102394968A (zh) * 2011-09-16 2012-03-28 南鑫民 手机数据保全系统
CN103052060B (zh) * 2011-10-17 2017-09-22 联想(北京)有限公司 一种提高移动终端信息安全的方法及一种移动终端
CN102638790A (zh) * 2012-03-15 2012-08-15 华为终端有限公司 密码控制方法、装置及系统
CN102722427A (zh) * 2012-06-04 2012-10-10 上海斐讯数据通信技术有限公司 数据信息备份方法及数据信息备份系统
CN103841559B (zh) * 2012-11-27 2018-11-27 富泰华工业(深圳)有限公司 Sim卡认证系统及方法
CN105245701A (zh) * 2015-09-25 2016-01-13 上海斐讯数据通信技术有限公司 移动终端的数据保护系统和数据保护方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1805372A (zh) * 2005-12-30 2006-07-19 赵颜 一种可为无线移动终端用户提供设备和数据安全服务的方法
CN1997188A (zh) * 2006-01-06 2007-07-11 乐金电子(中国)研究开发中心有限公司 一种识别用户身份的方法及其手机
CN101252703A (zh) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 一种终端资料的保护方法、系统以及移动通信终端

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1805372A (zh) * 2005-12-30 2006-07-19 赵颜 一种可为无线移动终端用户提供设备和数据安全服务的方法
CN1997188A (zh) * 2006-01-06 2007-07-11 乐金电子(中国)研究开发中心有限公司 一种识别用户身份的方法及其手机
CN101252703A (zh) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 一种终端资料的保护方法、系统以及移动通信终端

Also Published As

Publication number Publication date
CN101895829A (zh) 2010-11-24

Similar Documents

Publication Publication Date Title
US7184750B2 (en) Smart terminal remote lock and format
CN100466861C (zh) 手机防盗的方法
CN102693381B (zh) 一种便携计算机设备的防盗方法、装置和系统
WO2010133108A1 (fr) Procédé, système et terminal mobile de récupération de données flash de terminal mobile
WO2014079139A1 (fr) Procédé et système de protection de données d'un terminal mobile
WO2013182119A1 (fr) Procédé, dispositif et terminal de déverroullage d'écran
WO2012088974A1 (fr) Procédé et dispositif de déverrouillage d'un système d'exploitation
WO2011088652A1 (fr) Terminal mobile avec sécurité antivol et procédé de sécurité antivol pour terminal mobile
WO2008092336A1 (fr) Système et procédé pour réaliser de la télégestion en direction de données de terminaux
WO2012151785A1 (fr) Procédé de cryptage de fichier incorporé pour un terminal mobile, et terminal mobile
CN101252703A (zh) 一种终端资料的保护方法、系统以及移动通信终端
CN101616495A (zh) 保护手机中个人隐私的方法及系统
CN101772017A (zh) 远程销毁通信终端的信息的方法及其通信终端
CN101155212A (zh) 一种限制移动终端使用的方法
CN101163290A (zh) 一种通过机卡相互认证限制移动终端使用的方法
WO2017166689A1 (fr) Procédé et dispositif de protection de la confidentialité
US20110230166A1 (en) Authentication method for the mobile terminal and a system thereof
CN101426198A (zh) 一种手机信息的保护方法
EP2840818B1 (fr) Procédé et dispositif de gestion de sécurité d'informations de terminal mobile, et terminal mobile
JP2006526208A (ja) 電子機器へのアクセスを承認するための装置
WO2011015075A1 (fr) Procédé permettant de réserver des informations de carte d'une carte de module d'identité d'abonné et système associé
WO2012089057A1 (fr) Procédé d'authentification et dispositif électronique
WO2011130970A1 (fr) Dispositif et procédé pour protéger les données d'un terminal mobile
WO2011140756A1 (fr) Terminal mobile, procédé de protection de données d'un terminal mobile et système de dispositif de surveillance d'un terminal mobile
CN101409944A (zh) 键盘加密的方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10777312

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10777312

Country of ref document: EP

Kind code of ref document: A1