WO2010133108A1 - Procédé, système et terminal mobile de récupération de données flash de terminal mobile - Google Patents
Procédé, système et terminal mobile de récupération de données flash de terminal mobile Download PDFInfo
- Publication number
- WO2010133108A1 WO2010133108A1 PCT/CN2010/071550 CN2010071550W WO2010133108A1 WO 2010133108 A1 WO2010133108 A1 WO 2010133108A1 CN 2010071550 W CN2010071550 W CN 2010071550W WO 2010133108 A1 WO2010133108 A1 WO 2010133108A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- data
- mobile terminal
- mobile
- module
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
Definitions
- the invention belongs to the field of mobile communications, and in particular relates to a method and system for retrieving FLASH data in a mobile terminal and a mobile terminal. Background technique
- a mobile phone as an ordinary mobile phone as an example, information is stored on a subscriber identity card (SIM) card and a mobile phone flash memory (FLASH).
- SIM subscriber identity card
- FLASH mobile phone flash memory
- the user can buy a new mobile phone, buy back the original card number from the network business hall, copy the FLASH data of the original mobile phone to the new mobile phone, and the user can use the original information.
- users no longer worry that their important information is illegally used by others.
- the method of detecting the user is based on the mobile phone card number detection, but the user after the mobile phone exchanges the card is not necessarily an illegal user;
- the user authentication information of the mobile phone is only the mobile phone card number, and there is no ID card information. Used for assistance, so that the information in the mobile phone is easily stolen;
- an object of the present invention is to provide a method and system for retrieving FLASH data in a mobile terminal and a mobile terminal, which effectively solves the problem that information in the mobile terminal is easily stolen in the prior art.
- a method for retrieving FLASH data in a mobile terminal comprising:
- the user management setting module backs up the FLASH data of the mobile terminal to the mobile data server;
- the mobile terminal sends the user authentication information to the mobile data server. After the authentication is passed, the mobile data server sends the backed up FLASH data to the mobile terminal.
- the method further includes: the administrator user viewing and modifying all the information of the mobile terminal, and setting a different unlocking password to the limited user; the limited user can view the information set by the administrator user to allow the viewing.
- the backed up FLASH data is: sent to the mobile data server in the form of a short message or a data file.
- the user authentication information includes at least an identity card information, a subscriber identity card (SIM) card number, and an International Mobile Equipment Identity (IMEI) number of the mobile terminal.
- SIM subscriber identity card
- IMEI International Mobile Equipment Identity
- the preset value is 3, 4 or 5.
- the FLASH data backed up to the mobile data server has an expiration date.
- the user can go to the network operator to retrieve the FLASH data, and the FLASH data exceeds the valid period, and the mobile data server automatically deletes the data.
- a system for retrieving FLASH data in a mobile terminal comprising a mobile data server, a wireless network and a mobile terminal, the mobile terminal comprising a user management setting module, the user management setting module comprising a user and a password setting sub-module, security Management submodule, sending user authentication information submodule;
- the user and password setting sub-module is configured to set an unlock password for the administrator user and the limited user;
- the security management sub-module is configured to use the FLASH of the mobile terminal when the number of times the mobile terminal receives the wrong password exceeds a preset value. Data backup to mobile data server;
- the mobile data server is configured to store the backed up FLASH data, authenticate the user, and send the backed up FLASH data to the mobile terminal after the authentication is passed.
- the security management sub-module is further configured to set a priority of different data in the FLASH of the mobile terminal and data requiring anti-theft, and back up the FLASH data to the mobile data server according to the priority of the FLASH data.
- the security management sub-module is further configured to destroy FLASH data; initiate destruction of FLASH data, when the mobile terminal receives the wrong password more than a preset value and when the FLASH data is backed up to the mobile data server, the security management device The module automatically destroys the FLASH data.
- the security management sub-module is further configured to set a backup validity period of the FLASH data, and the user can go to the network operator to retrieve the FLASH data during the validity period of the backup and during the validity period of the FLASH data of the mobile data server.
- a mobile terminal includes the above user management setting module.
- the invention has the following beneficial effects:
- FIG. 2, FIG. 3, FIG. 4, and FIG. 5 together constitute an interface operation diagram of the user management setting module of the present invention
- Figure 1 is an interface operation diagram of user management settings
- Figure 2 is an interface operation diagram of user and password settings
- Figure 3 is an interface operation diagram of mobile phone security management
- Figure 4 is an interface operation diagram of data priority setting
- FIG. 6 is a flow chart of a software implementation of the user management setup module of the present invention.
- BEST MODE FOR CARRYING OUT THE INVENTION In order to better understand the present invention, the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.
- FIG. 1, FIG. 2, FIG. 3, FIG. 4 and FIG. 5 taking a mobile terminal as a mobile phone as an example, and adding a user management setting module to the mobile phone software.
- This module is only used when the administrator user uses the mobile phone. It is visible.
- the specific implementation steps are as follows:
- step A In the user management setting interface, as shown by X01 in Figure 1, you can select user and password settings, mobile phone security management, and send user authentication information. Select “User and password settings” to enter step B, select " Mobile Phone Security Management "Go to Step E, select "Send User Authentication Information”. Go to step ⁇
- step E Enter the mobile phone security management interface, as shown in X012 in Figure 3, you can set the management properties related to mobile phone anti-theft.
- the anti-theft function can be turned on or off.
- the mobile phone automatically enters the anti-theft mode.
- the anti-theft function is turned off, the mobile phone does not have the anti-theft function, just like an ordinary mobile phone.
- G Set the data priority of the mobile phone.
- the data priority of mobile phones is divided into priority according to priority: urgent data, important data and general data.
- the data priority setting includes four items: urgent data, important data, general data, and recovery default.
- Select "emergency data” then enter the emergency data settings, as shown in X0122111 to X0122114 in Figure 4, you can set and modify the type of emergency data, the emergency data type is the first to back up.
- Select "Important Data” to enter the settings of important data, as shown in X0122121 to X0122124 in Figure 4, you can set and modify the type of important data, and the type set as urgent data does not appear on the list of important data.
- the backup validity period can be set.
- the backup validity period can be set.
- the network operator sets the expiration date of the FLASH data storage and the FLASH backup data space of each mobile phone, and the data exceeding the validity period is automatically deleted.
- the data capacity of the backup is too large, and data exceeding the capacity will be lost.
- the network operator can charge the mobile phone user according to the saved validity period and data size. Users can apply for the expiration date and capacity at the location specified by the network operator.
- J Set the number of attempts to unlock the password. As shown by X01251 to X01254 in Fig. 3, values of 0 to 127 can be set in advance. When set to 0, it means that the number of attempts to enter the wrong password is not limited, and the mobile phone can test the wrong password indefinitely. When setting other values, such as 3, 4 or 5, when the number of times the mobile phone enters the wrong password reaches 3, 4 or 5, the mobile phone is If it is determined to be illegal, the mobile phone will automatically back up the data to the mobile data server. It is generally appropriate to set it to 5 times, which will not allow the illegal person to quickly crack the unlock password, nor will it easily back up the mobile phone data to the mobile data server.
- the FLASH data backup of the mobile phone is secret, silent, undetectable by the illegal person, can be sent to the mobile data server as a short message, or can be sent to the mobile data server as a data file.
- K Set the sending user authentication information.
- the user authentication information can be sent to the mobile data server, indicating that the current user is the legal owner of the mobile phone.
- ID information As shown in X013 in Figure 5, there are four options for ID information, user name, password, and send message.
- the mobile phone After inputting the ID card information, select to send the message, and the mobile phone will send the ID card information, the SIM card number and the mobile phone's International Mobile Equipment Identity (IMEI) number as the user authentication information to the mobile data server. Save the owner information of the mobile phone.
- the mobile phone exchanges the card the user needs to resend the user authentication information once and update the new card number to the mobile data server. After the mobile phone is lost, the user can retrieve the FLASH data from the operator based on this information.
- IMEI International Mobile Equipment Identity
- Step 201 Insert the SIM card and turn it on, and the mobile phone enters the standby interface. After not operating the mobile phone for a period of time, the mobile phone automatically enters the lock screen state.
- Step 202 Enter the unlock password and judge the user identity according to the unlock password. After the user enters a few digits, the mobile phone compares the entered password with the previously set user password of the mobile phone. If it is the administrator user account password, go to step 203; if it is a limited user account password, go to step 204; if it is a wrong password, go to step 205. Administrator users can set up one restricted user or set up two or more restricted users.
- Step 203 The current user is an administrator user.
- the mobile phone will automatically clear the counter of the error unlock password.
- Enter the standby interface you can enter the user management settings module on the main menu.
- the relevant settings can be modified. Administrator users can use all FLASH data and mobile phone features on their mobile phones.
- Step 204 Description The current user is a restricted user.
- the mobile phone does not automatically clear the calculator that incorrectly unlocks the password, but it does not increase. Entering the standby interface, the user management setting module is not displayed on the main menu, and the value of the setting module cannot be modified. Restricted users can view the information that the administrator user has set to allow them to view, using some of the main features of the mobile phone.
- Step 205 The current user is not a legitimate user.
- the mobile phone automatically increments the counter of the error unlocking password by one. If the number of times the error is unlocked is less than the number of allowed attempts, the mobile phone can enter the standby interface.
- the illegal user can use the little functions of the mobile phone, but cannot view and modify the private information on the mobile phone, such as phone book or information. Otherwise, proceed to step 206
- Step 206 Back up the data.
- the number of times the error unlock password is entered is greater than or equal to the number of allowed attempts, the current user is confirmed as an illegal user, and the mobile phone starts automatically backing up the data to the mobile data server. If it is set to destroy FLASH data, the mobile phone will automatically clear the FLASH data after the data is backed up.
- Step 207 The mobile phone automatically shuts down. If the FLASH data of the mobile phone is not destroyed, you can continue to boot. Otherwise, the mobile phone cannot be turned on and completely destroyed.
- the present invention can effectively protect all information on the mobile phone and prevent the FLASH data from being stolen.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
La présente invention porte sur un procédé, un système et un terminal mobile destinés à récupérer des données de mémoire flash (FLASH) d'un terminal mobile. Ledit procédé comprend les opérations suivantes : au moins deux types de mots de passe de déverrouillage de clavier sont définis, dont l'un est un mot de passe de compte d'utilisateur-administrateur et les autres sont des mots de passe de compte d'utilisateur restreint; lorsque le nombre de mauvais mots de passe reçus par le terminal mobile dépasse une valeur prédéterminée, les données flash du terminal mobile sont sauvegardées vers un serveur de données mobile par un module de configuration de gestion d'utilisateur; des informations d'authentification d'utilisateur sont envoyées au serveur de données mobile par le terminal mobile; après réussite de l'authentification, les données flash sauvegardées sont envoyées au terminal mobile par le serveur de données mobile. Le procédé, le système et le terminal mobile décrits par la présente invention sont adoptés pour résoudre efficacement le problème selon lequel les informations dans le terminal mobile sont faciles à voler dans l'état de la technique.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009101074961A CN101895829A (zh) | 2009-05-19 | 2009-05-19 | 找回移动电话中flash数据的方法和系统及移动电话 |
CN200910107496.1 | 2009-05-19 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010133108A1 true WO2010133108A1 (fr) | 2010-11-25 |
Family
ID=43104864
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2010/071550 WO2010133108A1 (fr) | 2009-05-19 | 2010-04-02 | Procédé, système et terminal mobile de récupération de données flash de terminal mobile |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101895829A (fr) |
WO (1) | WO2010133108A1 (fr) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102394968A (zh) * | 2011-09-16 | 2012-03-28 | 南鑫民 | 手机数据保全系统 |
CN103052060B (zh) * | 2011-10-17 | 2017-09-22 | 联想(北京)有限公司 | 一种提高移动终端信息安全的方法及一种移动终端 |
CN102638790A (zh) * | 2012-03-15 | 2012-08-15 | 华为终端有限公司 | 密码控制方法、装置及系统 |
CN102722427A (zh) * | 2012-06-04 | 2012-10-10 | 上海斐讯数据通信技术有限公司 | 数据信息备份方法及数据信息备份系统 |
CN103841559B (zh) * | 2012-11-27 | 2018-11-27 | 富泰华工业(深圳)有限公司 | Sim卡认证系统及方法 |
CN105245701A (zh) * | 2015-09-25 | 2016-01-13 | 上海斐讯数据通信技术有限公司 | 移动终端的数据保护系统和数据保护方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1805372A (zh) * | 2005-12-30 | 2006-07-19 | 赵颜 | 一种可为无线移动终端用户提供设备和数据安全服务的方法 |
CN1997188A (zh) * | 2006-01-06 | 2007-07-11 | 乐金电子(中国)研究开发中心有限公司 | 一种识别用户身份的方法及其手机 |
CN101252703A (zh) * | 2008-03-28 | 2008-08-27 | 宇龙计算机通信科技(深圳)有限公司 | 一种终端资料的保护方法、系统以及移动通信终端 |
-
2009
- 2009-05-19 CN CN2009101074961A patent/CN101895829A/zh active Pending
-
2010
- 2010-04-02 WO PCT/CN2010/071550 patent/WO2010133108A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1805372A (zh) * | 2005-12-30 | 2006-07-19 | 赵颜 | 一种可为无线移动终端用户提供设备和数据安全服务的方法 |
CN1997188A (zh) * | 2006-01-06 | 2007-07-11 | 乐金电子(中国)研究开发中心有限公司 | 一种识别用户身份的方法及其手机 |
CN101252703A (zh) * | 2008-03-28 | 2008-08-27 | 宇龙计算机通信科技(深圳)有限公司 | 一种终端资料的保护方法、系统以及移动通信终端 |
Also Published As
Publication number | Publication date |
---|---|
CN101895829A (zh) | 2010-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7184750B2 (en) | Smart terminal remote lock and format | |
CN100466861C (zh) | 手机防盗的方法 | |
CN102693381B (zh) | 一种便携计算机设备的防盗方法、装置和系统 | |
WO2010133108A1 (fr) | Procédé, système et terminal mobile de récupération de données flash de terminal mobile | |
WO2014079139A1 (fr) | Procédé et système de protection de données d'un terminal mobile | |
WO2013182119A1 (fr) | Procédé, dispositif et terminal de déverroullage d'écran | |
WO2012088974A1 (fr) | Procédé et dispositif de déverrouillage d'un système d'exploitation | |
WO2011088652A1 (fr) | Terminal mobile avec sécurité antivol et procédé de sécurité antivol pour terminal mobile | |
WO2008092336A1 (fr) | Système et procédé pour réaliser de la télégestion en direction de données de terminaux | |
WO2012151785A1 (fr) | Procédé de cryptage de fichier incorporé pour un terminal mobile, et terminal mobile | |
CN101252703A (zh) | 一种终端资料的保护方法、系统以及移动通信终端 | |
CN101616495A (zh) | 保护手机中个人隐私的方法及系统 | |
CN101772017A (zh) | 远程销毁通信终端的信息的方法及其通信终端 | |
CN101155212A (zh) | 一种限制移动终端使用的方法 | |
CN101163290A (zh) | 一种通过机卡相互认证限制移动终端使用的方法 | |
WO2017166689A1 (fr) | Procédé et dispositif de protection de la confidentialité | |
US20110230166A1 (en) | Authentication method for the mobile terminal and a system thereof | |
CN101426198A (zh) | 一种手机信息的保护方法 | |
EP2840818B1 (fr) | Procédé et dispositif de gestion de sécurité d'informations de terminal mobile, et terminal mobile | |
JP2006526208A (ja) | 電子機器へのアクセスを承認するための装置 | |
WO2011015075A1 (fr) | Procédé permettant de réserver des informations de carte d'une carte de module d'identité d'abonné et système associé | |
WO2012089057A1 (fr) | Procédé d'authentification et dispositif électronique | |
WO2011130970A1 (fr) | Dispositif et procédé pour protéger les données d'un terminal mobile | |
WO2011140756A1 (fr) | Terminal mobile, procédé de protection de données d'un terminal mobile et système de dispositif de surveillance d'un terminal mobile | |
CN101409944A (zh) | 键盘加密的方法和装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10777312 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10777312 Country of ref document: EP Kind code of ref document: A1 |