WO2014026505A1 - 数据访问方法和装置 - Google Patents

数据访问方法和装置 Download PDF

Info

Publication number
WO2014026505A1
WO2014026505A1 PCT/CN2013/077714 CN2013077714W WO2014026505A1 WO 2014026505 A1 WO2014026505 A1 WO 2014026505A1 CN 2013077714 W CN2013077714 W CN 2013077714W WO 2014026505 A1 WO2014026505 A1 WO 2014026505A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
server
sim card
authentication
message
Prior art date
Application number
PCT/CN2013/077714
Other languages
English (en)
French (fr)
Inventor
王延平
薛子涛
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to IN2094DEN2015 priority Critical patent/IN2015DN02094A/en
Priority to CA2882033A priority patent/CA2882033C/en
Priority to US14/421,630 priority patent/US9325704B2/en
Publication of WO2014026505A1 publication Critical patent/WO2014026505A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/18Service support devices; Network management devices

Definitions

  • the present invention relates to the field of communications, and in particular to a data access method and apparatus. Background technique
  • the machine card there are many methods for binding the machine card, and some of the card binding schemes can only play the role of the card locking.
  • many card binding schemes on the market are simply the terminal and the card.
  • the SIM card is bound, that is: the terminal can only use the corresponding card, and other cards cannot be applied to the terminal. This is called machine card binding.
  • the embodiment of the present invention provides a data access method and apparatus, so as to solve at least the state in which the terminal and the SIM card are only one binding in the prior art, and does not play a technical problem of improving data security.
  • a data access method includes: the terminal sending an authentication request to a server, where the authentication request is used to request the server to determine whether the SIM card in the current terminal is the terminal The SIM card bound in the server is used for verification; if the terminal receives the message that the authentication returned by the server fails, the terminal does not allow the user to access the data in the terminal, where the above authentication The failing message is used to indicate that the SIM card in the current terminal is not the SIM card bound by the terminal in the server.
  • the method further includes: the terminal uploading the identifier information of the terminal and the identifier information of the SIM card in the current terminal to the server.
  • the method further includes: the terminal sending an indication message to the server, where the indication message is used to instruct the server to send the authentication failure message to the server The user corresponding to the above terminal.
  • the terminal sending the authentication request to the server includes at least one of the following methods: when the terminal detects that it is performing a booting operation, the terminal sends the authentication request to the server; when the terminal detects its own SIM card and the last detection When the obtained SIM card is not the same SIM card, the terminal sends the authentication request to the server; or when the terminal detects that the current registration network is not the same registered network as the last detected registration network, the terminal sends the server to the server.
  • the above certification request when the terminal detects that it is performing a booting operation, the terminal sends the authentication request to the server; when the terminal detects its own SIM card and the last detection When the obtained SIM card is not the same SIM card, the terminal sends the authentication request to the server; or when the terminal detects that the current registration network is not the same registered network as the last detected registration network, the terminal sends the server to the server.
  • the method further includes: if the terminal receives the message that the server returns the authentication, the terminal allows the user to access the data in the terminal, where the authentication pass message
  • the SIM card used to indicate that the current terminal is a SIM card that is bound by the terminal in the server.
  • the server returns the foregoing authentication pass message, including: the server, the SIM card identifier of the SIM card in the current terminal carried in the authentication request, and the SIM card of the SIM card bound to the terminal in the server.
  • the identifiers are compared; if they are the same, it indicates that the SIM card in the current terminal is the SIM card bound by the terminal in the server, and the server sends the authentication pass message to the terminal.
  • the method further includes: the terminal sending an unbinding request message to the server, where the unbinding request message is used to instruct the server to cancel a binding relationship between the terminal and the bound SIM card in the server.
  • the method further includes: the terminal receiving the deletion data request sent by the server; and the terminal responding to the deleting data request, and deleting the data stored by the terminal.
  • a data access device which is located in a terminal, and includes:
  • the first sending unit is configured to send an authentication request to the server, where the foregoing authentication request is used to request the server to verify whether the SIM card in the current terminal is the SIM card bound by the terminal in the server;
  • the forbidden unit is configured to: if the terminal receives the message that the authentication returned by the server fails, the user is not allowed to access the data in the terminal, where the authentication failure message is used to indicate the SIM in the current terminal.
  • the card is not the SIM card to which the above terminal is bound in the above server.
  • the device further includes: a second sending unit, configured to: after the terminal receives the authentication fail message returned by the server, send an indication message to the server, where the indication message is used to instruct the server to perform the authentication The message is not sent to the user corresponding to the above terminal.
  • a second sending unit configured to: after the terminal receives the authentication fail message returned by the server, send an indication message to the server, where the indication message is used to instruct the server to perform the authentication The message is not sent to the user corresponding to the above terminal.
  • the terminal and the SIM card are in a bound state, that is, the corresponding state, the terminal may send an authentication request to the server to determine whether the current SIM card of the terminal is in the server.
  • the registered SIM card is used to determine whether the terminal is secure. If not, it is determined that the terminal is currently insecure.
  • the terminal sets the data stored by itself to an unreadable state, thereby effectively improving data security.
  • the technology in the prior art that the terminal and the SIM card are only one binding state does not solve the problem of improving data security.
  • the technical problem has achieved the technical effect of improving data security in the terminal.
  • FIG. 1 is a preferred flowchart of a data access method according to an embodiment of the present invention
  • FIG. 2 is another preferred flowchart of a data access method according to an embodiment of the present invention
  • FIG. 3 is a data access according to an embodiment of the present invention.
  • FIG. 4 is a block diagram showing another preferred structure of a data access device according to an embodiment of the present invention
  • FIG. 5 is a flowchart of a card binding determination according to an embodiment of the present invention;
  • FIG. 6 is a flow chart of interaction of a terminal requesting unbinding according to an embodiment of the present invention
  • FIG. 7 is an interaction flowchart of key information reporting by a terminal according to an embodiment of the present invention
  • FIG. 8 is a server initiated by a server according to an embodiment of the present invention.
  • FIG. 9 is an interaction flowchart of terminal self-destruct data according to an embodiment of the present invention.
  • Step S102 The terminal sends an authentication request to the server, where the authentication request is used to request the server to use the current SIM card in the terminal. Whether the above terminal is authenticated by the SIM card bound in the above server;
  • Step S104 If the terminal receives the authentication failure message returned by the server, the terminal does not allow the user to access the data in the terminal, where the authentication failure message is used to indicate that the terminal is currently in the terminal.
  • SIM card is not the above terminal in the above The SIM card bound in the server.
  • the terminal and the SIM card are in a bound state, that is, the corresponding state, the terminal may send an authentication request to the server to determine whether the current SIM card of the terminal is in the server.
  • the registered SIM card is used to determine whether the terminal is secure. If not, it is determined that the current terminal is currently insecure.
  • the terminal sets the data stored by itself to an unreadable state, thereby effectively improving data security.
  • the technical problem that the terminal and the SIM card are only one binding state in the prior art does not serve the purpose of improving data security is achieved, and the technical effect of improving data security in the terminal is achieved.
  • the terminal When the terminal determines that it is in an unsafe state, it can actively upload some key information of its own to the server, so that the server can perform corresponding processing according to the key information.
  • the above key information may be the identification information of the SIM card or the identification of the terminal. Information, for example: International Mobile Equipment Identity (IMEI) of the terminal.
  • IMEI International Mobile Equipment Identity
  • the method further includes: the terminal uploading the identifier information of the terminal and the identifier information of the SIM card in the current terminal to the server.
  • the terminal may actively notify the server to use the user information registered in the server in advance, and notify the user of the abnormality of the terminal through a predefined channel, for example, the pre-stored
  • the user's mailbox of the terminal informs the user of the abnormal information through the mailbox.
  • the method further includes: the terminal sending an indication message to the server, where the indication message is used to instruct the server to perform the authentication. The message is not sent to the user corresponding to the above terminal.
  • the trigger condition for sending the authentication request may be that the user turns on the device, detects a SIM card change, or changes the registration network of the terminal.
  • the terminal sends an authentication request to the server including but not limited to one of the following situations: 1) when the terminal detects that it is performing a power-on operation, the terminal sends the foregoing authentication request to the server;
  • the terminal When the terminal detects that the current registered network is not the same registered network as the last detected registration network, the terminal sends the above authentication request to the server.
  • the inventive idea of the embodiment of the present invention is that the user is allowed to access the data stored by the user only when the terminal passes the verification.
  • the method may further include: when the terminal receives the authentication pass message returned by the server, the terminal allows the user to access data in the terminal.
  • the foregoing authentication pass message is used to indicate that the SIM card in the current terminal is a SIM card bound by the terminal in the server.
  • the process of performing authentication on the server side may be determined according to the SIM card identifier.
  • the foregoing server returns the foregoing authentication pass message including the following steps:
  • Step S202 The server compares the SIM card identifier of the SIM card in the current terminal carried in the foregoing authentication request with the SIM card identifier of the SIM card bound to the terminal in the server;
  • Step S204 If the same, it indicates that the SIM card in the current terminal is the SIM card bound by the terminal in the server, and the server sends the authentication to the terminal, and the terminal may automatically initiate unbinding.
  • the request can be implemented to release the binding on the server side or to re-bind a SIM card. However, in order to ensure security, the binding release is allowed only when the terminal is currently in the authentication state.
  • the terminal may send an unbinding request message to the server, where the unbinding request message is used to instruct the server to cancel the binding relationship between the terminal and the bound SIM card in the server. .
  • the terminal After registering on the server side, the terminal can receive the self-destruct data message or command on the service side and destroy the user data under any circumstances, that is, the terminal deletes the data stored by itself when receiving the instruction of deleting the data sent by the server, thereby Data security can be guaranteed through the server.
  • the method may further include: the terminal may receive the delete data request sent by the server, and request to delete the data stored by itself according to the deleted data request.
  • a data access device is also provided, which is located in the terminal, and is used to implement the above-mentioned embodiments and preferred embodiments, and has not been described again.
  • the term "unit” or “module” may implement a combination of software and/or hardware for a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and conceivable.
  • FIG. 3 is a block diagram showing a preferred structure of a data access apparatus according to an embodiment of the present invention. As shown in FIG. 3, the present invention includes: a first transmitting unit 302 and a prohibiting unit 304, which will be described below.
  • the first sending unit 302 is configured to send an authentication request to the server, where the foregoing authentication request is used to request the server to verify whether the SIM card in the current terminal is the SIM card bound by the terminal in the server;
  • the prohibiting unit 304 is coupled to the first sending unit 302, and configured to: when the terminal receives the authentication fail message returned by the server, the user is not allowed to access the data in the terminal, where the authentication fails.
  • the message is used to indicate that the SIM card in the current terminal is not the SIM card bound by the terminal in the server.
  • the foregoing apparatus further includes: a second sending unit 402, coupled to the first sending unit 302, configured to receive the server return at the terminal After the authentication failure message is sent, the indication message is sent to the server, where the indication message is used to instruct the server to send the authentication failure message to the user corresponding to the terminal.
  • a second sending unit 402 coupled to the first sending unit 302, configured to receive the server return at the terminal After the authentication failure message is sent, the indication message is sent to the server, where the indication message is used to instruct the server to send the authentication failure message to the user corresponding to the terminal.
  • the purpose of the embodiments of the present invention is to provide a method for binding a card, so that the card and the private information in the card can be effectively protected.
  • the process of binding the card of the embodiment of the present invention is as follows, including: The situation requires the terminal to initiate an authentication request:
  • the terminal is turned on; 2) The U card/SIM card is replaced; 3) The terminal registration network changes.
  • the server determines whether the SIM card is legal by comparing the registration information reported by the terminal;
  • the protected user data mainly includes:
  • the device can initiate the unbinding request and set the terminal and the SIM card to the unbound state. Only when the terminal is in the unbound state, the terminal can replace the SIM card and re-install the SIM card. Register the new SIM card.
  • the terminal cannot identify other SIM cards in the state of binding the SIM card. If the terminal is replaced with a SIM card that is not authenticated, the user data cannot be read after the card is replaced, and the terminal is set to an illegal state;
  • the background service program of the terminal may automatically initiate a message notification with the server, thereby uploading the key information of the current SIM card to the server;
  • the terminal After the terminal registers on the server side, it can receive the server self-destruct data message or command and destroy the user data under any circumstances; after the self-destruct data, it does not change the current status of the terminal. State.
  • the initialization process includes the following steps:
  • Step S502 After the terminal is powered on, initiate an authentication request to the server and report the authentication parameter, where the foregoing authentication parameter includes an identifier of the terminal and an identification code of the card;
  • Step S504 The server verifies the authentication parameter, and sends an authentication success message to the terminal after the verification, and performs step S506; otherwise, step S508 is performed;
  • Step S506 After receiving the authentication success message, the terminal sets the terminal to a legal state, that is, the authentication pass state, and the user can perform a read operation on the data in the terminal;
  • Step S508 If the server verifies that the card information is illegal, that is, if the authentication fails, the authentication unsuccessful message is sent to the terminal. After the terminal receives the authentication unsuccessful message, the terminal is set to an illegal state, and the private data is started. Protection program.
  • the process for the terminal to initiate the request unbinding request process includes the following steps: Step S602: After the terminal succeeds in the verification by the specific application, the terminal initiates the unbinding request, and reports the current card information of the terminal.
  • Step S604 After receiving the unbinding request, and verifying the success, the server resets the state of the machine card in the server to an unbound state, and sends information to the terminal to confirm unbinding;
  • Step S606 Received at the terminal After confirming the unbind information, set the terminal to the unbound state;
  • the process of reporting critical information by the terminal includes the following steps:
  • Step S702 If the terminal is in an illegal state after being turned on, the terminal automatically reports the current illegal status and key information to the server through the background application;
  • Step S704 After receiving the message reported by the terminal, the server notifies the key information to the registered user corresponding to the terminal through other channels.
  • the server initiates the unbinding process including the following steps: S802: The server sends an unbinding message to the terminal.
  • the terminal After receiving the message, the terminal sets the terminal to an unbound state, and sends an unbinding success message to the server.
  • the self-destructing private data flow includes the following steps:
  • Step S902 The server sends a self-destruct data message to the terminal, that is, sends an indication message indicating that the terminal deletes the data stored by the terminal.
  • Step S904 After the terminal receives the message, the terminal starts to destroy the private data program and deletes the internally stored data, where all the data stored in the terminal may be deleted, or some preset data may be deleted.
  • the legality of the authentication card is synchronized through the network, and the user's private data is protected by receiving the short message or the instruction in the background; when the terminal is in an illegal state, the terminal may Actively initiates an interaction process with the server and uploads key information, so that the user data in the terminal can be effectively protected, and the key information in the terminal is reported, so that the user can track the terminal after losing the terminal, and at the same time, through self-destruct data.
  • the process can effectively avoid the leakage of user data.
  • a software is also provided for performing the technical solutions described in the above embodiments and preferred embodiments.
  • a storage medium is also provided, the software being stored, including but not limited to: an optical disk, a floppy disk, a hard disk, a rewritable memory, and the like.
  • the present invention achieves the following technical effects: On the server side, the terminal and the SIM card are in a bound state, that is, the corresponding state, the terminal can send an authentication request to the server. Determining whether the current SIM card of the terminal is a SIM card registered in the server, to determine whether the terminal is secure, and if not, determining that the current terminal is currently insecure, and the terminal sets the data stored by itself to an unreadable state, thereby Effectively increased the number According to the security.
  • the technical problem that the terminal and the SIM card are only one binding state in the prior art does not serve the purpose of improving data security, and the technical effect of improving data security in the terminal is achieved.
  • modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the server side, the terminal, and the SIM card are in a binding state
  • the terminal may send an authentication request to the server to determine whether the current SIM card of the terminal is a SIM card registered in the server, and if not, It is determined that the terminal is currently insecure, and the terminal sets the data stored by itself to an unreadable state, thereby effectively improving data security.
  • the technical problem that the terminal and the SIM card in the prior art are only one binding state and does not serve the purpose of improving data security is solved, and the technical effect of improving data security in the terminal is achieved.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种数据访问方法和装置,其中,该方法包括:终端向服务器发送认证请求;其中,认证请求用于请求服务器对当前终端中的SIM卡是否是终端在服务器中绑定的SIM卡进行验证;如果终端收到服务器返回的认证未通过的消息,终端不允许用户对终端中的数据进行访问;其中,认证未通过消息用于指示当前终端中的SIM卡不是终端在服务器中绑定的SIM卡。本发明可解决现有技术中终端和SIM卡仅仅是一个绑定的状态而未起到提高数据安全性的目的的技术问题,达到了提高终端中数据安全性的技术效果。

Description

数据访问方法和装置 技术领域
本发明涉及通信领域, 具体而言, 涉及一种数据访问方法和装置。 背景技术
目前, 有很多机卡绑定的方法, 其中有的机卡绑定的方案只能起到机 卡锁定的作用, 目前市面上的很多机卡绑定方案也都是单纯地将终端和卡, 如: SIM卡进行绑定, 即: 该终端仅可以利用对应的卡, 其它的卡无法应 用到该终端中, 这就是所谓的机卡绑定。
然而, 这种单纯的机卡绑定的方案并没有对用户数据的安全性起到保 护作用, 即: 目前这种机卡绑定的方案, 并通过锁定的方法也无法防止用 户的数据泄露。 同时, 如果终端丟失或者是卡不在该终端中时, 也无法自 针对上述的问题, 目前尚未提出有效的解决方案。 发明内容
本发明实施例提供了一种数据访问方法和装置, 以至少解决现有技术 中终端和 SIM卡仅仅是一个绑定的状态, 而并未起到提高数据安全性的技 术问题。
根据本发明实施例的一个方面, 提供了一种数据访问方法, 该方法包 括: 终端向服务器发送认证请求, 其中, 上述认证请求用于请求上述服务 器对当前上述终端中的 SIM卡是否是上述终端在上述服务器中绑定的 SIM 卡进行验证; 如果上述终端接收到上述服务器返回的认证未通过的消息, 上述终端不允许上述用户对上述终端中的数据进行访问, 其中, 上述认证 未通过消息用于指示当前上述终端中的 SIM卡不是上述终端在上述服务器 中绑定的 SIM卡。
优选地, 在上述终端接收到上述服务器返回的认证未通过消息之后, 上述方法还包括: 上述终端将终端的标识信息和当前上述终端中 SIM卡的 标识信息上传至上述服务器。
优选地, 在上述终端接收到上述服务器返回的认证未通过消息之后, 上述方法还包括: 上述终端向上述服务器发送指示消息, 其中, 上述指示 消息用于指示上述服务器将上述认证未通过消息发送给上述终端对应的用 户。
优选地, 终端向服务器发送认证请求至少包括以下方法之一: 当上述 终端检测到自身正在进行开机操作时, 上述终端向服务器发送上述认证请 求; 当上述终端检测到自身的 SIM卡与上一次检测到的 SIM卡不是同一张 SIM卡时, 上述终端向服务器发送上述认证请求; 或者当上述终端检测到 当前的注册网络与上一次检测到的注册网络不是同一个注册网络时, 上述 终端向服务器发送上述认证请求。
优选地, 在终端向服务器发送认证请求之后, 上述方法还包括: 如果 上述终端接收到上述服务器返回的认证通过的消息, 上述终端允许用户对 上述终端中的数据进行访问, 其中, 上述认证通过消息用于指示当前上述 终端中的 SIM卡是上述终端在上述服务器中绑定的 SIM卡。
优选地, 上述服务器返回上述认证通过消息, 包括: 上述服务器将上 述认证请求中携带的当前上述终端中的 SIM卡的 SIM卡标识, 与在上述服 务器中与该终端绑定的 SIM卡的 SIM卡标识进行比较; 如果相同, 则表明 当前上述终端中的 SIM卡是上述终端在上述服务器中绑定的 SIM卡, 上述 服务器向上述终端发送上述认证通过消息。
优选地, 在上述终端接收到上述服务器返回的认证通过消息之后, 上 述方法还包括: 上述终端向上述服务器发送解除绑定请求消息, 其中, 上 述解除绑定请求消息用于指示上述服务器取消终端在上述服务器中与上述 绑定的 SIM卡之间的绑定关系。
优选地, 在上述终端接收到上述服务器返回的认证通过消息之后, 上 述方法还包括: 上述终端接收上述服务器发送的删除数据请求; 上述终端 响应上述删除数据请求, 并删除自身存储的数据。
根据本发明实施例的另一方面, 提供了一种数据访问装置, 位于终端 中, 包括:
第一发送单元, 配置为向服务器发送认证请求, 其中, 上述认证请求 用于请求上述服务器对当前上述终端中的 SIM卡是否是上述终端在上述服 务器中绑定的 SIM卡进行验证;
禁止单元, 配置为如果上述终端接收到上述服务器返回的认证未通过 的消息, 则不允许上述用户对上述终端中的数据进行访问, 其中, 上述认 证未通过消息用于指示当前上述终端中的 SIM卡不是上述终端在上述服务 器中绑定的 SIM卡。
优选地, 上述装置还包括: 第二发送单元, 配置为在上述终端接收到 上述服务器返回的认证未通过消息之后, 向上述服务器发送指示消息, 其 中, 上述指示消息用于指示上述服务器将上述认证未通过消息发送给上述 终端对应的用户。
在本发明实施例中,在服务器侧, 终端和 SIM卡处于一种绑定的状态, 即——对应的状态, 终端可以向服务器发送一个认证请求以确定终端当前 的 SIM卡是否是在服务器中注册的 SIM卡, 以判断终端是否安全, 如果不 是, 则认定终端当前不安全, 此时终端并将自身存储的数据设置为不可读 状态, 从而有效提高了数据的安全性。 通过上述方式, 解决了现有技术中 终端和 SIM卡仅仅是一个绑定的状态并未起到提高数据安全性的目的的技 术问题, 达到了提高终端中数据安全性的技术效果。 附图说明
此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一 部分, 本发明的示意性实施例及其说明用于解释本发明, 并不构成对本发 明的不当限定。 在附图中:
图 1是根据本发明实施例的数据访问方法的一种优选流程图; 图 2是根据本发明实施例的数据访问方法的另一种优选流程图; 图 3是根据本发明实施例的数据访问装置的一种优选结构框图; 图 4是根据本发明实施例的数据访问装置的另一种优选结构框图; 图 5是根据本发明实施例的机卡绑定认定的流程图;
图 6是根据本发明实施例的终端请求解除绑定的交互流程图; 图 7是根据本发明实施例的终端关键信息上报的交互流程图; 图 8是根据本发明实施例的服务端发起的解除绑定的交互流程图; 图 9是根据本发明实施例的终端自毁数据的交互流程图。 具体实施方式
下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在不沖突的情况下, 本申请中的实施例及实施例中的特征可以相互组合。
本发明实施例提供了一种数据访问方法, 如图 1所示, 包括以下步驟: 步驟 S102: 终端向服务器发送认证请求, 其中, 上述认证请求用于请 求上述服务器对当前上述终端中的 SIM卡是否是上述终端在上述服务器中 绑定的 SIM卡进行验证;
步驟 S104: 在上述终端收到上述服务器返回的认证未通过消息的情况 下, 上述终端不允许上述用户对上述终端中的数据进行访问, 其中, 上述 认证未通过消息, 用于指示当前上述终端中的 SIM卡不是上述终端在上述 服务器中绑定的 SIM卡。
在上述优选实施方式中, 在服务器侧, 终端和 SIM卡处于一种绑定的 状态, 即——对应的状态, 终端可以向服务器发送一个认证请求以确定终 端当前的 SIM卡是否是在服务器中注册的 SIM卡, 以判断终端是否安全, 如果不是, 则认定当前终端当前是不安全, 此时终端并将自身存储的数据 设置为不可读状态, 从而有效提高了数据的安全性。 通过上述方式, 解决 了现有技术中终端和 SIM卡仅仅是一个绑定的状态并未起到提高数据安全 性的目的的技术问题, 达到了提高终端中数据安全性的技术效果。
当终端确定自身处于不安全状态时, 可以主动将自身的一些关键信息 上传至服务器以便服务器可以根据这些关键信息进行相应的处理, 上述的 关键信息可以是 SIM卡的标识信息, 或者是终端的识别信息, 例如: 终端 的国际移动设备识别码 ( International Mobile Equipment Identity, 简称为 IMEI )等。 在一个优选实施方式中, 在上述终端接收到上述服务器返回的 认证未通过消息之后, 上述方法还包括: 终端将终端的标识信息和当前上 述终端中 SIM卡的标识信息上传至上述服务器。
在终端接收到服务器返回的认证失败消息之后, 可以主动地通知服务 器采用预先在服务器上注册的用户信息, 将该终端出现异常的信息通过预 先定义的渠道告知用户, 例如: 可以通过预先存储的该终端的用户的邮箱 将该异常信息通过该邮箱告知用户。 在一个优选实施方式中, 在上述终端 接收到上述服务器返回的认证未通过消息之后, 上述方法还包括: 上述终 端向上述服务器发送指示消息, 其中, 上述指示消息, 用于指示上述服务 器将上述认证未通过消息发送给上述终端对应的用户。
对于上述发送认证请求的触发条件可以是用户开机、 检测到 SIM卡变 化或者终端的注册网络变化。 在一个优选实施方式中, 终端向服务器发送 认证请求包括但不限于以下情形之一: 1 ) 当上述终端检测到自身正在进行开机操作时, 上述终端向服务器发 送上述认证请求;
2 ) 当上述终端检测到自身的 SIM卡与上一次检测到的 SIM卡不是同 一张 SIM卡时, 上述终端向服务器发送上述认证请求; 或者,
3 ) 当上述终端检测到当前的注册网络与上一次检测到的注册网络不是 同一个注册网络时, 上述终端向服务器发送上述认证请求。
本发明实施例的发明构思就是只有在终端通过验证的情况下, 才会允 许用户对自身存储的数据进行访问。 在一个优选实施方式中, 在终端向服 务器发送认证请求之后, 上述方法还可以包括: 在上述终端接收到上述服 务器返回的认证通过消息的情况下, 上述终端允许用户对上述终端中的数 据进行访问, 其中, 上述认证通过消息, 用于指示当前上述终端中的 SIM 卡是上述终端在上述服务器中绑定的 SIM卡。
对于服务器侧在进行认证的过程可以是根据 SIM卡标识进行判断, 在 一个优选实施方式中, 如图 2所示, 上述服务器返回上述认证通过消息包 括以下步驟:
步驟 S202: 上述服务器将上述认证请求中携带的当前上述终端中的 SIM卡的 SIM卡标识,与在上述服务器中与该终端绑定的 SIM卡的 SIM卡 标识进行比较;
步驟 S204: 如果相同, 则表明当前上述终端中的 SIM卡是上述终端在 上述服务器中绑定的 SIM卡, 上述服务器向上述终端发送上述认证通过消 优选地, 终端也可以自动发起解除绑定的请求, 从而可以实现在服务 器侧的绑定解除, 或者重新绑定一个 SIM卡。 然而, 为了保证安全性, 只 有在终端当前处于认证通过的状态下, 才会允许进行绑定解除。 在一个优 选实施方式中, 在上述终端接收到上述服务器返回的认证通过消息之后, 上述方法还可以包括: 终端可以向上述服务器发送解除绑定请求消息, 其 中, 上述解除绑定请求消息用于指示上述服务器取消终端在上述服务器中 与上述绑定的 SIM卡之间的绑定关系。
终端在服务器侧进行注册后, 可以在任何情况下接收服务侧自毁数据 短信或指令并将用户数据销毁, 即: 只要接收到服务器发送的删除数据的 指示, 终端便删除自身存储的数据, 从而可以达到通过服务器保证数据安 全性的目的。 在一个优选实施方式中, 在终端接收到服务器返回的认证通 过消息之后, 上述方法还可以包括: 终端可以接收上述服务器发送的删除 数据请求, 并应于上述删除数据请求删除自身存储的数据。
在本实施例中还提供了一种数据访问装置, 位于终端中, 该装置用于 实现上述实施例及优选实施方式, 已经进行过说明的不再赘述。 如以下所 使用的, 术语 "单元" 或者 "模块" 可以实现预定功能的软件和 /或硬件的 组合。 尽管以下实施例所描述的装置较佳地以软件来实现, 但是硬件, 或 者软件和硬件的组合的实现也是可能并被构想的。
图 3是根据本发明实施例的数据访问装置的一种优选结构框图,如图 3 所示, 包括: 第一发送单元 302和禁止单元 304, 下面对该结构进行说明。
第一发送单元 302, 用于向服务器发送认证请求, 其中, 上述认证请求 用于请求上述服务器对当前上述终端中的 SIM卡是否是上述终端在上述服 务器中绑定的 SIM卡进行验证;
禁止单元 304, 与第一发送单元 302耦合, 用于在上述终端接收到上述 服务器返回的认证未通过消息的情况下, 不允许上述用户对上述终端中的 数据进行访问,其中,上述认证未通过消息用于指示当前上述终端中的 SIM 卡不是上述终端在上述服务器中绑定的 SIM卡。
在一个优选实施方式中, 如图 4所示, 上述装置还包括: 第二发送单 元 402, 与第一发送单元 302耦合, 用于在上述终端接收到上述服务器返回 的认证未通过消息之后, 向上述服务器发送指示消息, 其中, 上述指示消 息, 用于指示上述服务器将上述认证未通过消息发送给上述终端对应的用 户。
本发明实施例的目的是为了提供一种机卡绑定方法, 从而使得卡以及 卡内的私密信息可以得到有效地保护。 本发明实施例的机卡绑定流程如下 所示, 包括: 情况需要终端发起认证请求:
1 )终端开机; 2 ) 更换 U卡 /SIM卡; 3 )终端注册网络发生变化。
S2: 服务端, 如服务器通过对比终端上报的注册信息判定 SIM卡是否 合法;
S3 : 若认证不通过, 即不合法, 则用户不可读取终端内的用户数据, 优选地, 受保护的所述用户数据主要包括:
1 )联系人、 短消息以及通话记录; 2 )照片、 聊天记录; 3 )用户指定 的某应用私有数据或目录。
S4: 若用户通过服务网络的认证,则可以发起解绑请求,将终端及 SIM 卡设置为未绑定状态,只有当终端处于未绑定状态时,终端才可以更换 SIM 卡并重新在服务端对新的 SIM卡进行注册。
优选地, 终端在绑定 SIM卡的状态下不能识别其他的 SIM卡, 若终端 换上未进行认证的 SIM卡, 则换卡后用户数据不可读取, 并设置终端为非 法状态;
在终端处于非法状态时, 则终端的后台服务程序可以自动发起与服务 端的消息通告, 从而将当前 SIM卡的关键信息上传至服务端;
当终端在服务器侧进行注册后, 可在任何情况下接收服务端自毁数据 短信或指令并将用户数据销毁; 在自毁数据后, 并不会改变终端当前的状 态。
下面将结合几个交互图对上述方案进行描述:
如图 5所示, 初始化流程包括以下步驟:
步驟 S502: 终端开机后, 向服务器发起认证请求并上报认证参数, 其 中, 上述的认证参数包括终端的识别码和卡的识别码;
步驟 S504: 服务器对认证参数进行校验, 校验通过后向终端发送认证 成功消息, 并执行步驟 S506; 否则, 执行步驟 S508;
步驟 S506: 终端在接收到认证成功消息后, 将终端设置合法状态, 即: 认证通过状态, 此时用户可以对终端中的数据进行读取操作;
步驟 S508: 如果服务器校验机卡信息为不合法, 即: 未通过认证, 则 向终端发送认证不成功消息, 在终端接收到认证不成功消息以后, 将终端 设置为非法状态, 并启动私密数据保护程序。
如图 6所示, 终端主动发起请求解除绑定请求流程包括以下步驟: 步驟 S602: 终端通过特定的应用在验证成功之后,发起解除绑定请求, 并上报终端当前的机卡信息;
步驟 S604: 服务器在接收到解除绑定请求, 并验证成功后, 将服务器 中的机卡状态重置为未绑定状态, 并向终端发送确认解除绑定的信息; 步驟 S606: 在终端接收到确认解除绑定的信息后, 将终端设置为未绑 定状态;
如图 7所示, 终端上报关键信息流程包括以下步驟:
步驟 S702: 若开机后终端处于非法状态, 则终端通过后台应用自动将 当前的不合法状态以及关键信息上报服务器;
步驟 S704: 服务器在接收到终端上报的消息后, 通过其他通道将关键 信息通告给该终端对应的注册用户。
如图 8所示, 服务器发起解除绑定流程包括以下步驟: S802: 服务器向终端发送解除绑定消息;
S804: 终端在接收到该消息后, 将终端设置为非绑定状态, 并向服务 器发送解绑成功消息。
如图 9所示, 自毁私密数据流程包括以下步驟:
步驟 S902: 服务器向终端发送自毁数据消息, 即发送指示终端删除自 身存储的数据的指示消息;
步驟 S904: 在终端接收到上述消息后, 终端启动销毁私密数据程序并 删除内部存储的数据, 其中, 可以是删除终端内存储的所有数据, 也可以 是删除预先设定的一些数据。
通过本发明提出的一种在无线终端中实现机卡绑定的方法, 通过网络 同步认证卡的合法性, 并通过后台接收短信或指令来保护用户私密数据; 当终端处于非法状态时, 终端可以主动与服务器发起交互流程并上传关键 信息, 从而可以有效地保护终端内的用户数据, 并通过将终端内关键信息 的上报, 使得用户在丟失终端后能够对终端进行追踪, 同时, 通过自毁数 据流程可以有效避免用户数据的泄密。
在另外一个实施例中, 还提供了一种软件, 该软件用于执行上述实施 例及优选实施方式中描述的技术方案。
在另外一个实施例中, 还提供了一种存储介质, 该存储介质中存储有 上述软件, 该存储介质包括但不限于: 光盘、 软盘、 硬盘、 可擦写存储器 等。
从以上的描述中, 可以看出, 本发明实现了如下技术效果: 在服务器 侧, 终端和 SIM卡处于一种绑定的状态, 即——对应的状态, 终端可以向 服务器发送一个认证请求以确定终端当前的 SIM卡是否是在服务器中注册 的 SIM卡, 以判断终端是否安全, 如果不是, 则认定当前终端当前是不安 全, 此时终端并将自身存储的数据设置为不可读状态, 从而有效提高了数 据的安全性。 通过上述方式, 解决了现有技术中终端和 SIM卡仅仅是一个 绑定的状态并未起到提高数据安全性的目的的技术问题, 达到了提高终端 中数据安全性的技术效果。
显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步驟 可以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者 分布在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执 行的程序代码来实现, 从而, 可以将它们存储在存储装置中由计算装置来 执行, 并且在某些情况下, 可以以不同于此处的顺序执行所示出或描述的 步驟, 或者将它们分别制作成各个集成电路模块, 或者将它们中的多个模 块或步驟制作成单个集成电路模块来实现。 这样, 本发明不限制于任何特 定的硬件和软件结合。
以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于 本领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精 神和原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明 的保护范围之内。 工业实用性
本发明实施例中, 服务器侧、 终端和 SIM卡处于一种绑定的状态, 终 端可以向服务器发送一个认证请求以确定终端当前的 SIM卡是否是在服务 器中注册的 SIM卡, 如果不是, 则认定终端当前不安全, 终端将自身存储 的数据设置为不可读状态, 从而有效提高了数据的安全性。 通过上述方式, 解决了现有技术中终端和 SIM卡仅仅是一个绑定的状态, 而未起到提高数 据安全性的目的的技术问题, 达到了提高终端中数据安全性的技术效果。

Claims

权利要求书
1.一种数据访问方法, 该方法包括:
终端向服务器发送认证请求; 其中, 所述认证请求, 用于请求所述服 务器对当前所述终端中的 SIM 卡是否是所述终端在所述服务器中绑定的 SIM卡进行验证;
如果所述终端收到所述服务器返回的认证未通过的消息, 则所述终端 不允许所述用户对所述终端中的数据进行访问; 其中, 所述认证未通过消 息, 用于指示当前所述终端中的 SIM卡不是所述终端在所述服务器中绑定 的 SIM卡。
2.根据权利要求 1 所述的方法, 其中, 在所述终端收到所述服务器返 回的认证未通过的消息之后, 所述方法还包括:
所述终端将终端的标识信息和当前所述终端中 SIM卡的标识信息上传 至所述服务器。
3.根据权利要求 1 所述的方法, 其中, 在所述终端收到所述服务器返 回的认证未通过的消息之后, 所述方法还包括:
所述终端向所述服务器发送指示消息; 其中, 所述指示消息, 用于指 示所述服务器将所述认证未通过消息发送给所述终端对应的用户。
4.根据权利要求 1至 3 中任一项所述的方法, 其中, 所述终端向服务 器发送认证请求至少包括以下方法之一:
当所述终端检测到自身正在进行开机操作时, 所述终端向服务器发送 所述认证请求;
当所述终端检测到自身的 SIM卡与上一次检测到的 SIM卡不是同一张 SIM卡时, 所述终端向服务器发送所述认证请求; 或者,
当所述终端检测到当前的注册网络与上一次检测到的注册网络不是同 一个注册网络时, 所述终端向服务器发送所述认证请求。
5.根据权利要求 1 所述的方法, 其中, 在终端向服务器发送认证请求 之后, 所述方法还包括:
如果所述终端收到所述服务器返回的认证通过的消息, 则所述终端允 许用户对所述终端中的数据进行访问; 其中, 所述认证通过消息, 用于指 示当前所述终端中的 SIM卡是所述终端在所述服务器中绑定的 SIM卡。
6.根据权利要求 5所述的方法, 其中, 所述服务器返回所述认证通过 的消息, 包括:
所述服务器将所述认证请求中携带的当前所述终端中的 SIM卡的 SIM 卡标识,与在所述服务器中与该终端绑定的 SIM卡的 SIM卡标识进行比较; 如果相同, 则所述服务器向所述终端发送所述认证通过的消息。
7.根据权利要求 5所述的方法, 其中, 在所述终端收到所述服务器返 回的认证通过消息之后, 所述方法还包括:
所述终端向所述服务器发送解除绑定请求的消息; 其中, 所述解除绑 定请求消息, 用于指示所述服务器取消终端在所述服务器中与所述绑定的 SIM卡之间的绑定关系。
8.根据权利要求 5所述的方法, 其中, 在所述终端收到所述服务器返 回的认证通过消息之后, 所述方法还包括:
所述终端接收所述服务器发送的删除数据的请求;
所述终端响应所述删除数据请求, 并删除自身存储的数据。
9.一种数据访问装置, 所述装置位于终端中, 包括:
第一发送单元, 配置为向服务器发送认证请求; 其中, 所述认证请求 用于请求所述服务器对当前所述终端中的 SIM卡是否是所述终端在所述服 务器中绑定的 SIM卡进行验证;
禁止单元, 配置为如果所述终端收到所述服务器返回的认证未通过的 消息, 则不允许所述用户对所述终端中的数据进行访问; 其中, 所述认证 未通过消息, 用于指示当前所述终端中的 SIM卡不是所述终端在所述服务 器中绑定的 SIM卡。
10.根据权利要求 9所述的装置, 其特征在于, 所述装置还包括: 第二发送单元, 配置为在所述终端收到所述服务器返回的认证未通过 的消息之后, 向所述服务器发送指示消息; 其中, 所述指示消息, 用于指 示所述服务器将所述认证未通过消息发送给所述终端对应的用户。
PCT/CN2013/077714 2012-08-17 2013-06-21 数据访问方法和装置 WO2014026505A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
IN2094DEN2015 IN2015DN02094A (zh) 2012-08-17 2013-06-21
CA2882033A CA2882033C (en) 2012-08-17 2013-06-21 Data access method and device
US14/421,630 US9325704B2 (en) 2012-08-17 2013-06-21 Data access method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210294823.0A CN102843669B (zh) 2012-08-17 2012-08-17 数据访问方法和装置
CN201210294823.0 2012-08-17

Publications (1)

Publication Number Publication Date
WO2014026505A1 true WO2014026505A1 (zh) 2014-02-20

Family

ID=47370672

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/077714 WO2014026505A1 (zh) 2012-08-17 2013-06-21 数据访问方法和装置

Country Status (5)

Country Link
US (1) US9325704B2 (zh)
CN (1) CN102843669B (zh)
CA (1) CA2882033C (zh)
IN (1) IN2015DN02094A (zh)
WO (1) WO2014026505A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115175108A (zh) * 2022-05-05 2022-10-11 中国信息通信研究院 分离式载体与通信终端协同的通信方法、电子设备和存储介质

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843669B (zh) * 2012-08-17 2019-03-15 中兴通讯股份有限公司 数据访问方法和装置
CN103118327A (zh) * 2013-01-25 2013-05-22 无锡万事通科技有限公司 基于WiFi的信息传递系统及方法
CN103200169A (zh) * 2013-01-30 2013-07-10 中国科学院自动化研究所 一种基于Proxy代理的用户数据保护方法及其系统
CN104243152B (zh) * 2013-06-06 2018-01-12 中国银联股份有限公司 安全性信息交互系统、设备和方法
CN104281811A (zh) * 2013-07-10 2015-01-14 中国移动通信集团北京有限公司 一种终端的自毁方法、系统及装置
CN105323365A (zh) * 2014-07-10 2016-02-10 中兴通讯股份有限公司 数据处理方法及装置
CN105871886A (zh) * 2016-05-11 2016-08-17 深圳市金立通信设备有限公司 一种应用访问权限控制方法及终端
CN106231534B (zh) * 2016-07-28 2020-02-21 宇龙计算机通信科技(深圳)有限公司 移动终端及其写号及消号方法、装置
CN106101154A (zh) * 2016-08-23 2016-11-09 北京奇虎科技有限公司 一种基于移动终端的防护方法和装置
KR20190094746A (ko) * 2018-02-05 2019-08-14 삼성전자주식회사 심 카드를 적재하는 트레이가 삽입되는 전자 장치 및 그의 제어 방법
CN110958598B (zh) * 2018-09-26 2022-05-06 中国移动通信有限公司研究院 一种移动终端和sim卡的绑定认证方法和装置
CN114390509B (zh) * 2021-12-28 2023-12-05 天翼物联科技有限公司 基于物联网的机卡绑定池实现方法、装置、设备及介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1921661A (zh) * 2005-08-24 2007-02-28 乐金电子(中国)研究开发中心有限公司 Gsm终端的认证处理方法
CN101141743A (zh) * 2007-10-17 2008-03-12 北京立通无限科技有限公司 一种保护移动台用户数据的方法、移动台及服务器
US20120058743A1 (en) * 2010-09-02 2012-03-08 Chen Kuo-Yi Method for legitimately unlocking a sim card lock, unlocking server, and unlocking system for a sim card lock
CN102843669A (zh) * 2012-08-17 2012-12-26 中兴通讯股份有限公司 数据访问方法和装置

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6125283A (en) * 1998-05-18 2000-09-26 Ericsson Inc. Multi-mode mobile terminal and methods for operating the same
CN1285235C (zh) * 2003-10-31 2006-11-15 大唐微电子技术有限公司 应用国际移动设备识别码实现手机防盗的方法及其系统
CN1780435A (zh) * 2004-11-25 2006-05-31 李杨 一种防盗手机及其防盗方法
JP2008522470A (ja) * 2004-11-25 2008-06-26 フランス テレコム 端末ユーザ識別情報モジュールを接続した通信端末を保護する方法
CN1980457A (zh) * 2005-11-30 2007-06-13 中兴通讯股份有限公司 一种网络侧实现报警的方法
US20080161050A1 (en) * 2006-12-29 2008-07-03 Shudark Jeffrey B Method for configuring a wireless communication device to operate in a wireless communication system through automatic SIM pairing and associated wireless communication device
CN101287298B (zh) * 2008-05-29 2011-06-22 德信无线通讯科技(北京)有限公司 一种移动通信终端的鉴权方法与系统
EP2330820A4 (en) * 2008-09-10 2016-11-23 Nec Corp CONTENT DISTRIBUTION SYSTEM
CN101765113A (zh) * 2009-12-18 2010-06-30 中兴通讯股份有限公司 一种数据卡防盗用系统及方法
US8732460B2 (en) * 2010-01-28 2014-05-20 At&T Intellectual Property I, L.P. System and method for providing a one-time key for identification
CN102413224B (zh) * 2010-09-25 2015-02-04 中国移动通信有限公司 绑定、运行安全数码卡的方法、系统及设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1921661A (zh) * 2005-08-24 2007-02-28 乐金电子(中国)研究开发中心有限公司 Gsm终端的认证处理方法
CN101141743A (zh) * 2007-10-17 2008-03-12 北京立通无限科技有限公司 一种保护移动台用户数据的方法、移动台及服务器
US20120058743A1 (en) * 2010-09-02 2012-03-08 Chen Kuo-Yi Method for legitimately unlocking a sim card lock, unlocking server, and unlocking system for a sim card lock
CN102843669A (zh) * 2012-08-17 2012-12-26 中兴通讯股份有限公司 数据访问方法和装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115175108A (zh) * 2022-05-05 2022-10-11 中国信息通信研究院 分离式载体与通信终端协同的通信方法、电子设备和存储介质

Also Published As

Publication number Publication date
US9325704B2 (en) 2016-04-26
CN102843669B (zh) 2019-03-15
CN102843669A (zh) 2012-12-26
US20150304317A1 (en) 2015-10-22
CA2882033C (en) 2017-09-19
CA2882033A1 (en) 2014-02-20
IN2015DN02094A (zh) 2015-08-14

Similar Documents

Publication Publication Date Title
WO2014026505A1 (zh) 数据访问方法和装置
RU2726279C1 (ru) Защищенный способ запуска устройства связи машинного типа
KR102307665B1 (ko) 신원 인증
CN105916133B (zh) 管理移动设备内集成组件的固件更新的方法、设备和介质
US9143922B2 (en) Method and system for controlling communication between an UICC and an external application
US10440034B2 (en) Network assisted fraud detection apparatus and methods
JP6386069B2 (ja) 接続管理方法、装置、電子設備、プログラム、及び記録媒体
US9686399B2 (en) Protection of a wireless communications device against unauthorized use
KR101474096B1 (ko) 가입자 디바이스들의 네트워크 개인화를 위한 방법 및 장치
US9578019B2 (en) Method and system for managing an embedded secure element eSE
BR102015032941A2 (pt) método para gerenciamento de uma pluralidade de perfis em um módulo sim, módulo sim e produto de programa de computador
EP2611226B1 (en) Processing method and system for over-the-air bootstrap
US20170223536A1 (en) Advertising multiple service set identifiers
US8571522B2 (en) Authentication method for the mobile terminal and a system thereof
US20140025964A1 (en) Mobile terminal encryption method, hardware encryption device and mobile terminal
WO2013166886A1 (en) Anti-theft method, device and system for portable computer equipment
US20160353258A1 (en) Transmitting management commands to a client device
US10382271B2 (en) Method and network node device for controlling the run of technology specific push-button configuration sessions within a heterogeneous or homogeneous wireless network and heterogeneous or homogeneous wireless network
CN106559213B (zh) 设备管理方法、设备及系统
WO2013185689A1 (zh) 一种认证方法、认证装置及认证设备
WO2017219587A1 (zh) 主从设备切换方法、从设备、管理服务器及存储介质
WO2013185701A1 (zh) 一种利用用户识别卡对终端进行加密的方法和系统
CN110247877B (zh) 一种离线管理指令的管理方法和终端
WO2017197689A1 (zh) 一种sim卡处理方法、装置、终端及esam芯片
KR101915718B1 (ko) Ps-lte 단말장치 및 ps-lte 통신망의 보안 방법 및 그 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13829124

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2882033

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 14421630

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13829124

Country of ref document: EP

Kind code of ref document: A1