WO2011140756A1 - Terminal mobile, procédé de protection de données d'un terminal mobile et système de dispositif de surveillance d'un terminal mobile - Google Patents
Terminal mobile, procédé de protection de données d'un terminal mobile et système de dispositif de surveillance d'un terminal mobile Download PDFInfo
- Publication number
- WO2011140756A1 WO2011140756A1 PCT/CN2010/076031 CN2010076031W WO2011140756A1 WO 2011140756 A1 WO2011140756 A1 WO 2011140756A1 CN 2010076031 W CN2010076031 W CN 2010076031W WO 2011140756 A1 WO2011140756 A1 WO 2011140756A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile terminal
- data
- password
- management system
- push notification
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
Definitions
- Mobile terminal mobile terminal data protection method and mobile terminal monitoring system
- the present invention relates to mobile communication technologies, and in particular, to a mobile terminal, a mobile terminal data protection method, and a mobile terminal monitoring system. Background technique
- mobile phones or mobile terminals such as personal digital assistants (PDAs) have not only been used as mere communication tools. Since the mobile terminal has the advantages of small size, easy portability, convenient use, etc., it has gradually become a personal information storage carrier of the user. Many mobile terminal users are accustomed to storing important personal information related to personal information, such as contacts, photos, and schedules, in the mobile terminal. Although it can greatly facilitate personal work and life, when the mobile terminal is lost or stolen, if it falls into the hands of the criminals, the stored personal information data of the mobile terminal may be used by the criminals to make the mobile The user of the terminal suffers a mental and material loss. Therefore, it is necessary to provide a mobile terminal with data protection function. Summary of the invention
- the main object of the present invention is to provide a mobile terminal, a mobile terminal data protection method, and a mobile terminal monitoring system, which can delete data of the monitored mobile terminal, prevent data leakage of the monitored mobile terminal, and ensure the personal information of the lost owner.
- the invention provides a mobile terminal data protection method, and the mobile terminal is provided with an application management system and a data deletion module.
- the mobile terminal data protection method includes the following steps: The application management system determines whether a push notification or a platform request is received; when receiving the push notification or the platform request, the application management system starts the data deletion module; and the data deletion module deletes the data.
- the method further includes: after the mobile terminal is powered on, automatically starting the SIM card verification module; the SIM card verification module verifies the SIM card, and determining whether the SIM card verification is passed .
- the mobile terminal data protection method further includes: when the SIM card verification passes, the application management system of the mobile terminal monitors the push notification on the listening port; the application management system determines whether the push notification is sent by the monitoring mobile terminal, when the judgment is When the monitoring mobile terminal is issued, the application management system starts the data deletion module to delete the data.
- the mobile terminal data protection method further includes: prompting the user to input a password when the SIM card verification fails; receiving the password input by the user, and determining whether the password is correct; recording the number of failed password entries, and determining that the password input fails Whether the number is greater than the preset value.
- the data protection method for the mobile terminal further includes: when the number of times the password input fails is greater than a preset value, the application management system starts the data deletion module to delete the data.
- the present invention also provides a mobile terminal, including an application management system and a data deletion module, where: an application management system, configured to determine whether a push notification or a platform request is received; and for receiving a push notification or a platform request , start data deletion module; data deletion module, used to delete data.
- the mobile terminal further includes a SIM card verification module, configured to verify the SIM card, and determine whether the SIM card verification is passed.
- SIM card verification module configured to verify the SIM card, and determine whether the SIM card verification is passed.
- the application management system is further configured to: monitor, when the SIM card passes, listen for a push notification on the listening port; and determine whether the push notification is sent by the monitoring mobile terminal, and when the monitoring mobile terminal issues, initiate data deletion.
- the module deletes the data.
- the mobile terminal further includes a password module, configured to prompt the user to input a password when the SIM card verification fails, and receive the password input by the user, and determine whether the password is correct.
- a password module configured to prompt the user to input a password when the SIM card verification fails, and receive the password input by the user, and determine whether the password is correct.
- the cipher module is further configured to record the number of times the password is failed, and determine whether the number of failed passwords is greater than a preset value.
- the present invention also provides a mobile terminal monitoring system, including a monitoring mobile terminal and a monitored mobile terminal, wherein: the monitoring mobile terminal is configured to send a push notification to the monitored mobile terminal; the monitored mobile terminal includes an application management system and data deletion. Module.
- the application management system is configured to determine whether the platform request or the push notification is received, and when the push notification or the platform request is received, start the data deletion module; and the data deletion module is configured to delete the data.
- the monitored mobile terminal further includes a SIM card verification module, configured to verify the SIM card, and determine whether the SIM card verification is passed.
- SIM card verification module configured to verify the SIM card, and determine whether the SIM card verification is passed.
- the application management system is further configured to: when the SIM card verification passes, monitor the push notification on the listening port; and determine whether the push notification is sent by the monitoring mobile terminal, when the monitoring mobile terminal sends out, Start the data deletion module to delete the data.
- the monitored mobile terminal further includes a password module, configured to prompt the user to input a password when the SIM card verification fails, and receive a password input by the user, and determine whether the input password is correct.
- a password module configured to prompt the user to input a password when the SIM card verification fails, and receive a password input by the user, and determine whether the input password is correct.
- the mobile terminal, the mobile terminal data protection method, and the mobile terminal monitoring system provided by the embodiment of the present invention, after the owner discovers that the mobile terminal is lost, uses the monitoring mobile terminal to send a push notification to the monitored mobile terminal, and the monitored mobile terminal is timely The data is deleted to prevent the data of the monitored mobile terminal from leaking out, and the personal information of the owner is secured.
- FIG. 1 is a schematic flowchart of a mobile terminal data protection method according to an embodiment of the present invention
- FIG. 2 is a schematic flowchart of another embodiment of a mobile terminal data protection method according to the present invention
- the invention relates to a monitoring mobile terminal and a monitored mobile terminal, both of which support Java functions.
- the monitored mobile terminal is further provided with an application management system (AMS) and a data deletion module (MID let Data Clear).
- AMS application management system
- MID let Data Clear data deletion module
- the monitoring mobile terminal is configured to send a Push Notification to the monitored mobile terminal, so that the application management system of the monitored mobile terminal initiates the data deletion module to delete data by using the push notification.
- the monitored mobile terminal registers an inbound network connection for the data deletion module, and the application management system is responsible for monitoring whether a push notification sent by the monitoring mobile terminal is received on the registered inbound network connection, when receiving When the notification is pushed, the data deletion module is started to delete the data.
- the method for registering an inbound network connection for the data deletion module includes a static registration mode and a dynamic registration mode.
- the present invention will be described by taking static registration as an example. Those skilled in the art can obtain a scheme of dynamic registration mode according to the scheme of the static registration method provided.
- the overall technical solution of the present invention is that the application management system of the mobile terminal determines whether a push notification or a platform request is received; when receiving the push notification or the platform request, the application management system starts the data deletion module; and the data deletion module deletes the mobile terminal.
- the data The technical solutions of the present invention will be further described below in conjunction with the drawings and specific embodiments.
- FIG. 1 is a schematic flow chart of an embodiment of a data protection method for a mobile terminal according to the present invention.
- Step S101 The application management system of the mobile terminal monitors the push notification on the listening port.
- a MIDlet-Push- ⁇ 1> attribute is added to the Java Application Description (JAD, Java Application Description) file, and the attribute is set to: MIDlet-Push-l: sms://:5000, MIDletDataClear, 13911111111.
- the connection protocol used is the Short Message Service (SMS) protocol
- the registered listening port number is 5000.
- the MIDlet category name is MIDlet Data Clear
- the effective source of the push notification is the mobile terminal with the mobile terminal number 13911111111, that is, the monitoring mobile terminal.
- SMS Short Message Service
- the present invention may also use a transmission control protocol or a user datagram protocol, which is not limited by the present invention.
- Step S102 The application management system determines whether the push notification is sent by the monitoring mobile terminal. When the monitoring mobile terminal issues, the process proceeds to step S103; otherwise, the process returns to step S101 to continue monitoring.
- the application management system monitors whether the push notification is sent to the monitoring mobile terminal of the number 13911111111 at the 5000 port.
- Step S103 The application management system starts the data deletion module to delete the data.
- the data deletion module uses Java's JSR75 extended function package to implement data deletion.
- the specific implementation is as follows: Use javax.microedition.io.file package FileSystemRegistry class static method listRoots () method to get all file system root directory, call Connector. open () in turn open the file connection, and then use FileConnection delete () method to delete All files in this directory.
- the monitoring mobile terminal sends a push notification to the monitored mobile terminal, and the data of the monitored mobile terminal is deleted in time to prevent data leakage of the monitored mobile terminal.
- the personal information of the owner is guaranteed to be safe.
- FIG. 2 is a schematic flow chart of another embodiment of a data protection method for a mobile terminal according to the present invention.
- Step S201 After the mobile terminal is powered on, the SIM (Subscriber Identity Module) card verification module is automatically started.
- SIM Subscriber Identity Module
- the SIM card verification module is automatically activated to verify the SIM card.
- the implementation of the boot auto start function uses the following methods:
- Step S202 the SIM card verification module verifies the SIM card, and determines whether the SIM card verification is passed.
- the SIM card verification it indicates that the mobile terminal does not replace the SIM card, and proceeds to step S203; when the SIM card verification fails, the mobile terminal is illustrated. The SIM card has been replaced, and the process proceeds to step S206.
- the SIM card verification module verifies whether the mobile terminal replaces the SIM card by comparing the International Mobile Subscriber Identity (IMSI) and the International Mobile Subscriber Identity (IPSI) before the mobile terminal is powered on.
- IMSI International Mobile Subscriber Identity
- IPSI International Mobile Subscriber Identity
- the International Mobile Subscriber ID is globally unique and consists of 20 digits, for example 8986 00 79 09 04 4 9311287.
- Step S203 The application management system of the mobile terminal monitors the push notification on the listening port.
- a MIDlet-Push- ⁇ 1> attribute is added to the Java Application Description (JAD) file, and the attribute is set to:
- MIDlet-Push-l sms://:5000, MIDletDataClear, 13911111111.
- connection protocol used is SMS protocol
- the registered listening port number is 5000
- the MID let category name is MID let Data Clear.
- the effective source of the push notification is a mobile terminal with a mobile terminal number of 13911111111, that is, a mobile terminal is monitored.
- Step S204 The application management system determines whether the push notification is sent by the monitoring mobile terminal. When the monitoring mobile terminal issues, the process proceeds to step S208; otherwise, the process returns to step S203 to continue monitoring.
- the application management system monitors whether the push notification is a number on the 5000 port. 13911111111 is monitored by the mobile terminal.
- Step S205 prompting the user to input a password.
- Step S206 receiving the password input by the user, and determining whether the password is correct; when the password is correct, the process ends; when the password is wrong, the process proceeds to step S207.
- Step S207 Record the number of times the password is failed, and determine whether the number of failed passwords is greater than a preset value. When the number of times the password input fails is greater than the preset value, the process proceeds to step S208, otherwise, the process returns to step S205.
- the preset value in this embodiment can be set as needed, for example, three times, and of course, other values can be set, which is not limited by the present invention.
- Step S208 the application management system starts the data deletion module to delete the data, and the process ends.
- the application management system is triggered to start the data deletion module, which is the push notification in step 205, or is directly sent to the data deletion module by the application management system, and the format of the request is: this. platformRequest ( "MIDletDataClear" ).
- the data deletion module uses Java's JSR75 extended feature package for data deletion.
- the specific implementation is as follows: Use j avax. microedition.io. file package FileSystemRegistry class static method listRoots () method to get all file system root directory, call Connector. open () in turn open the file connection, and then use the FileConnection delete () method Delete all files in this directory.
- FIG. 3 is a schematic structural diagram of an embodiment of a mobile terminal according to the present invention.
- the mobile terminal 30 includes an application management system 301 and a data deletion module 302.
- the application management system 301 is configured to monitor the push notification on the listening port, determine whether the push notification is sent by the monitoring mobile terminal, and start the data deletion module 302.
- the data deletion module 302 is used to delete data.
- the monitoring mobile terminal sends a push notification to the monitored mobile terminal, and the monitored mobile terminal starts the data deletion module 302 through the application management system 301 to delete the data in time to prevent the data from being deleted.
- the data of the monitored mobile terminal is leaked, which ensures the security of the lost personal information.
- FIG. 4 is a schematic structural diagram of another embodiment of a mobile terminal according to the present invention.
- the mobile terminal 30 includes a SIM card verification module 303 and a cryptographic module 304 in addition to the application management system 301 and the data deletion module 302.
- the SIM card verification module 303 is configured to verify the SIM card and determine whether the SIM card verification is passed.
- the cryptographic module 304 is configured to prompt the user to input a password, receive the password input by the user, and determine whether the password is correct; and record the number of failed attempts to enter the password, and determine whether the number of failed password entries is greater than a preset value.
- the picker or the thief closes the monitored mobile terminal, and then opens the monitored mobile terminal again, first through the SIM card.
- the verification module 303 verifies whether the monitored mobile terminal has replaced the SIM card.
- the SIM card receives the push notification sent by the monitoring mobile terminal to the monitored mobile terminal, and the data of the monitored mobile terminal is timely detected by the data deletion module 302.
- Delete prevent data leakage of the monitored mobile terminal, and ensure the personal information of the lost owner; or the monitored mobile terminal does not replace the card, but does not input the correct password after being verified by the password module 304, and the mobile terminal will also be monitored.
- Data deletion preventing monitored mobile terminals The leakage of data ensures the security of the personal information of the owner.
- the monitoring mobile terminal 520 sends a push notification to the monitored mobile terminal 520, and the monitored mobile terminal 520 starts the data deletion module 302 through the application management system 301 to promptly
- the data deletion prevents the data of the monitored mobile terminal 520 from being leaked, thereby ensuring the security of the lost personal information.
- the SIM card verification module 303 verifies whether the monitored mobile terminal 520 has replaced the SIM card.
- the SIM card receives the push notification sent by the monitoring mobile terminal 510 to the monitored mobile terminal 520, and passes the data deletion module 302.
- the data of the monitored mobile terminal 520 is deleted in time to prevent the data of the monitored mobile terminal 520 from leaking out, and the personal information of the lost owner is secured; or the monitored mobile terminal 520 does not replace the card, but is not verified by the password module 304. Entering the correct password also deletes the data of the monitored mobile terminal 520, preventing the data of the monitored mobile terminal 520 from leaking out, and ensuring the security of the lost personal information.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
L'invention porte sur un terminal mobile, sur un procédé de protection de données du terminal mobile et sur un système de dispositif de surveillance du terminal mobile. Le terminal mobile est configuré pour contenir un système de gestion d'application et un module d'effacement de données, et le procédé de protection de données du terminal mobile consiste à déterminer, par le système de gestion d'application, si une notification de pousser ou une demande de plateforme est reçue ou non; lorsque la notification de pousser ou la demande de plateforme est reçue, le système de gestion d'application initialise le module d'effacement de données, et le module d'échange de données supprime les données. Au moyen du procédé, par envoi de la notification de pousser d'un terminal mobile de dispositif de surveillance à un terminal mobile surveillé, les données du terminal mobile surveillé sont supprimées à temps, de telle sorte qu'on empêche une fuite organisée de données à partir du terminal mobile surveillé et que la sécurité des informations personnelles du simple utilisateur est assurée.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010174791.1 | 2010-05-11 | ||
CN201010174791.1A CN101877848B (zh) | 2010-05-11 | 2010-05-11 | 移动终端、移动终端数据保护方法以及移动终端监控系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011140756A1 true WO2011140756A1 (fr) | 2011-11-17 |
Family
ID=43020291
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2010/076031 WO2011140756A1 (fr) | 2010-05-11 | 2010-08-16 | Terminal mobile, procédé de protection de données d'un terminal mobile et système de dispositif de surveillance d'un terminal mobile |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101877848B (fr) |
WO (1) | WO2011140756A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111343265A (zh) * | 2020-02-20 | 2020-06-26 | 深圳前海微众银行股份有限公司 | 信息推送方法、装置、设备及可读存储介质 |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9462061B2 (en) | 2012-09-14 | 2016-10-04 | Tencent Technology (Shenzhen) Company Limited | Method, device, server, and system for managing devices |
CN102843436B (zh) * | 2012-09-14 | 2016-06-01 | 腾讯科技(深圳)有限公司 | 一种设备管理方法、设备、服务器以及系统 |
EA201300533A1 (ru) * | 2013-03-07 | 2014-09-30 | Общество с ограниченной ответственностью "Синезис" | Способ и система оперативной передачи сообщения с видеоданными |
CN103338301A (zh) * | 2013-06-13 | 2013-10-02 | 福建伊时代信息科技股份有限公司 | 数据清除方法、装置及终端 |
CN104732150B (zh) * | 2015-03-05 | 2018-09-04 | 广东欧珀移动通信有限公司 | 一种移动终端开机方法及装置 |
CN112910868A (zh) * | 2021-01-21 | 2021-06-04 | 平安信托有限责任公司 | 企业网络安全管理方法、装置、计算机设备及存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101600208A (zh) * | 2008-06-02 | 2009-12-09 | 深圳富泰宏精密工业有限公司 | 手机存储数据自动销毁系统及方法 |
TW200951756A (en) * | 2008-06-12 | 2009-12-16 | Unication Co Ltd | Security and protection system of a mobile communication device |
CN101656966A (zh) * | 2009-09-01 | 2010-02-24 | 成都市华为赛门铁克科技有限公司 | 移动终端的数据保护方法、装置及移动终端 |
-
2010
- 2010-05-11 CN CN201010174791.1A patent/CN101877848B/zh active Active
- 2010-08-16 WO PCT/CN2010/076031 patent/WO2011140756A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101600208A (zh) * | 2008-06-02 | 2009-12-09 | 深圳富泰宏精密工业有限公司 | 手机存储数据自动销毁系统及方法 |
TW200951756A (en) * | 2008-06-12 | 2009-12-16 | Unication Co Ltd | Security and protection system of a mobile communication device |
CN101656966A (zh) * | 2009-09-01 | 2010-02-24 | 成都市华为赛门铁克科技有限公司 | 移动终端的数据保护方法、装置及移动终端 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111343265A (zh) * | 2020-02-20 | 2020-06-26 | 深圳前海微众银行股份有限公司 | 信息推送方法、装置、设备及可读存储介质 |
CN111343265B (zh) * | 2020-02-20 | 2021-03-19 | 深圳前海微众银行股份有限公司 | 信息推送方法、装置、设备及可读存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN101877848A (zh) | 2010-11-03 |
CN101877848B (zh) | 2014-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8554176B2 (en) | Method and apparatus for creating a remotely activated secure backup service for mobile handsets | |
US11736292B2 (en) | Access token management method, terminal, and server | |
US8213971B2 (en) | Apparatus and method for activating computer applications with SMS messaging | |
WO2011140756A1 (fr) | Terminal mobile, procédé de protection de données d'un terminal mobile et système de dispositif de surveillance d'un terminal mobile | |
JP5893169B2 (ja) | 携帯電話のための盗難防止保護方法およびデバイス | |
EP2448303B1 (fr) | Procédé et système pour sécuriser des données sur un dispositif de communications mobiles | |
US8732827B1 (en) | Smartphone security system | |
US20090298468A1 (en) | System and method for deleting data in a communication device | |
WO2014032612A1 (fr) | Procédé, dispositif, serveur, système, et appareil pour empêcher la divulgation de données | |
US20130324090A1 (en) | System and method for providing offers for mobile devices | |
WO2008092336A1 (fr) | Système et procédé pour réaliser de la télégestion en direction de données de terminaux | |
CN101426198A (zh) | 一种手机信息的保护方法 | |
WO2011137605A1 (fr) | Système de localisation de terminal mobile, procédé et terminal mobile | |
WO2015024261A1 (fr) | Procédé, gestionnaire, serveur et système de gestion de numéros de comptes internet | |
WO2010060242A1 (fr) | Procédé d'authentification pour terminal mobile et système correspondant | |
US8626121B2 (en) | Tracking mobile communication devices | |
WO2015096501A1 (fr) | Procédé et appareil de gestion d'un super mot de passe d'utilisateur sur un terminal mobile intelligent | |
WO2013185689A1 (fr) | Procédé d'authentification, appareil d'authentification et dispositif d'authentification | |
CN104969176B (zh) | 一种管理应用对证书和密钥的访问的方法、设备及介质 | |
WO2010133108A1 (fr) | Procédé, système et terminal mobile de récupération de données flash de terminal mobile | |
CN108664805B (zh) | 一种应用程序安全校验方法及系统 | |
US8849247B2 (en) | Remote mobile device information retrieval | |
WO2008089638A1 (fr) | Procédé et terminal de communication pour contrôler l'information d'usager dans le terminal de communication | |
JP2008026929A (ja) | セキュリティシステム、情報処理装置、情報保護方法、プログラム | |
WO2016015199A1 (fr) | Procédé de verrouillage, dispositif, terminal et serveur |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10851261 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10851261 Country of ref document: EP Kind code of ref document: A1 |